April 2020 Archives by date
Starting: Wed Apr 1 05:07:46 UTC 2020
Ending: Thu Apr 30 23:50:13 UTC 2020
Messages: 555
- [PATCH v3] tpm: Add support for event log pointer found in TPM2 ACPI table
kbuild test robot
- [PATCH 00/13] VFS: Filesystem information [ver #19]
Ian Kent
- [PATCH -next] smack: fix a missing-check bug in smack_sb_eat_lsm_opts()
Chen Zhou
- [PATCH 00/13] VFS: Filesystem information [ver #19]
Miklos Szeredi
- [PATCH 00/13] VFS: Filesystem information [ver #19]
David Howells
- [PATCH 00/13] VFS: Filesystem information [ver #19]
Miklos Szeredi
- [PATCH v3] acpi: Extend TPM2 ACPI table with missing log fields
Jarkko Sakkinen
- [PATCH v3] tpm: Add support for event log pointer found in TPM2 ACPI table
Jarkko Sakkinen
- [PATCH v3] acpi: Extend TPM2 ACPI table with missing log fields
Rafael J. Wysocki
- [PATCH v3] tpm: Add support for event log pointer found in TPM2 ACPI table
Stefan Berger
- [PATCH 00/13] VFS: Filesystem information [ver #19]
Miklos Szeredi
- [PATCH -next] smack: fix a missing-check bug in smack_sb_eat_lsm_opts()
Tetsuo Handa
- [PATCH 00/13] VFS: Filesystem information [ver #19]
David Howells
- [PATCH v5 0/3] SELinux support for anonymous inodes and UFFD
Daniel Colascione
- [PATCH v5 1/3] Add a new LSM-supporting anonymous inode interface
Daniel Colascione
- [PATCH v5 2/3] Teach SELinux about anonymous inodes
Daniel Colascione
- [PATCH v5 3/3] Wire UFFD up to SELinux
Daniel Colascione
- [PATCH 00/13] VFS: Filesystem information [ver #19]
Ian Kent
- [PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
Alexey Budankov
- [PATCH v8 01/12] capabilities: introduce CAP_PERFMON to kernel and user space
Alexey Budankov
- [PATCH v8 02/12] perf/core: open access to the core for CAP_PERFMON privileged process
Alexey Budankov
- [PATCH v8 03/12] perf/core: open access to probes for CAP_PERFMON privileged process
Alexey Budankov
- [PATCH v8 04/12] perf tool: extend Perf tool with CAP_PERFMON capability support
Alexey Budankov
- [PATCH v8 05/12] drm/i915/perf: open access for CAP_PERFMON privileged process
Alexey Budankov
- [PATCH v8 06/12] trace/bpf_trace: open access for CAP_PERFMON privileged process
Alexey Budankov
- [PATCH v8 07/12] powerpc/perf: open access for CAP_PERFMON privileged process
Alexey Budankov
- [PATCH v8 08/12] parisc/perf: open access for CAP_PERFMON privileged process
Alexey Budankov
- [PATCH v8 09/12] drivers/perf: open access for CAP_PERFMON privileged process
Alexey Budankov
- [PATCH v8 10/12] drivers/oprofile: open access for CAP_PERFMON privileged process
Alexey Budankov
- [PATCH v8 11/12] doc/admin-guide: update perf-security.rst with CAP_PERFMON information
Alexey Budankov
- [PATCH v8 12/12] doc/admin-guide: update kernel.rst with CAP_PERFMON information
Alexey Budankov
- [PATCH ghak96] audit: set cwd in audit context for file-related LSM audit records
Vladis Dronov
- [PATCH 00/13] VFS: Filesystem information [ver #19]
Karel Zak
- [PATCH 13/17] watch_queue: Implement mount topology and attribute change notifications [ver #5]
Miklos Szeredi
- [PATCH v10 2/9] proc: allow to mount many instances of proc in one pid namespace
Eric W. Biederman
- [PATCH ghak96] audit: set cwd in audit context for file-related LSM audit records
Casey Schaufler
- [PATCH v10 8/9] proc: use human-readable values for hidehid
Eric W. Biederman
- [PATCH v11 8/9] proc: use human-readable values for hidehid
Jann Horn
- [PATCH ghak96] audit: set cwd in audit context for file-related LSM audit records
Vladis Dronov
- [PATCH v10 2/9] proc: allow to mount many instances of proc in one pid namespace
Alexey Gladkov
- [PATCH v10 8/9] proc: use human-readable values for hidehid
Alexey Gladkov
- [PATCH v10 7/9] proc: move hidepid values to uapi as they are user interface to mount
Eric W. Biederman
- [PATCH v10 0/9] proc: modernize proc to support multiple private instances
Eric W. Biederman
- [PATCH v10 8/9] proc: use human-readable values for hidehid
Eric W. Biederman
- [PATCH v3] acpi: Extend TPM2 ACPI table with missing log fields
Jarkko Sakkinen
- [PATCH v3] tpm: Add support for event log pointer found in TPM2 ACPI table
Jarkko Sakkinen
- [PATCH v4 0/2] tpm2: Make TPM2 logs accessible for non-UEFI firmware
Stefan Berger
- [PATCH v4 1/2] acpi: Extend TPM2 ACPI table with missing log fields
Stefan Berger
- [PATCH v4 2/2] tpm: Add support for event log pointer found in TPM2 ACPI table
Stefan Berger
- [PATCH v4 1/7] ima: Switch to ima_hash_algo for boot aggregate
Mimi Zohar
- [PATCH] integrity: make integrity_add_key() static
Jason Yan
- [PATCH] ima: make ima_mok_init() static
Jason Yan
- [PATCH v4 0/2] tpm2: Make TPM2 logs accessible for non-UEFI firmware
Jarkko Sakkinen
- [PATCH v8 04/12] perf tool: extend Perf tool with CAP_PERFMON capability support
Jiri Olsa
- [PATCH v4 0/2] tpm2: Make TPM2 logs accessible for non-UEFI firmware
Stefan Berger
- [PATCH v8 04/12] perf tool: extend Perf tool with CAP_PERFMON capability support
Alexey Budankov
- [PATCH] device_cgroup: Cleanup cgroup eBPF device filter code
Odin Ugedal
- [PATCH] device_cgroup: Cleanup cgroup eBPF device filter code
Odin Ugedal
- [PATCH v11 0/8] proc: modernize proc to support multiple private instances
Alexey Gladkov
- [PATCH v11 1/8] proc: rename struct proc_fs_info to proc_fs_opts
Alexey Gladkov
- [PATCH v11 2/8] proc: allow to mount many instances of proc in one pid namespace
Alexey Gladkov
- [PATCH v11 3/8] proc: move hide_pid, pid_gid from pid_namespace to proc_fs_info
Alexey Gladkov
- [PATCH v11 4/8] proc: instantiate only pids that we can ptrace on 'hidepid=4' mount option
Alexey Gladkov
- [PATCH v11 5/8] proc: add option to mount only a pids subset
Alexey Gladkov
- [PATCH v11 6/8] docs: proc: add documentation for "hidepid=4" and "subset=pid" options and new mount behavior
Alexey Gladkov
- [PATCH v11 7/8] proc: use human-readable values for hidepid
Alexey Gladkov
- [PATCH v11 8/8] proc: use named enums for better readability
Alexey Gladkov
- [PATCH] device_cgroup: Cleanup cgroup eBPF device filter code
Roman Gushchin
- [PATCH v10 7/9] proc: move hidepid values to uapi as they are user interface to mount
Kees Cook
- [PATCH v8 04/12] perf tool: extend Perf tool with CAP_PERFMON capability support
Namhyung Kim
- [PATCH v8 04/12] perf tool: extend Perf tool with CAP_PERFMON capability support
Alexey Budankov
- [GIT PULL] keys: Fix key->sem vs mmap_sem issue when reading key
Linus Torvalds
- [GIT PULL] keys: Fix key->sem vs mmap_sem issue when reading key
pr-tracker-bot at kernel.org
- [PATCH] apparmor: fix potential label refcnt leak in aa_change_profile
John Johansen
- [GIT PULL] keys: Fix key->sem vs mmap_sem issue when reading key
Waiman Long
- [PATCH v2] apparmor: fix potential label refcnt leak in aa_change_profile
Xiyu Yang
- [GIT PULL] keys: Fix key->sem vs mmap_sem issue when reading key
David Howells
- [PATCH v8 12/12] doc/admin-guide: update kernel.rst with CAP_PERFMON information
Arnaldo Carvalho de Melo
- [PATCH v8 12/12] doc/admin-guide: update kernel.rst with CAP_PERFMON information
Alexey Budankov
- [PATCH v8 12/12] doc/admin-guide: update kernel.rst with CAP_PERFMON information
Alexey Budankov
- [PATCH v8 12/12] doc/admin-guide: update kernel.rst with CAP_PERFMON information
Arnaldo Carvalho de Melo
- [PATCH v8 12/12] doc/admin-guide: update kernel.rst with CAP_PERFMON information
Alexey Budankov
- [GIT PULL] keys: Fix key->sem vs mmap_sem issue when reading key
Linus Torvalds
- [GIT PULL] keys: Fix key->sem vs mmap_sem issue when reading key
Waiman Long
- [PATCH RESEND] device_cgroup: Fix RCU list debugging warning
Amol Grover
- WARNING: suspicious RCU usage with PROVE_RCU_LIST=y
Amol Grover
- [SMACK] Build-time warning from Linux 5.6.2: unused variable ‘sip’
Jordan Glover
- Re: [SMACK] Build-time warning from Linux 5.6.2: unused variable ‘sip’
Casey Schaufler
- [PATCH 00/11] Integrity Policy Enforcement LSM (IPE)
deven.desai at linux.microsoft.com
- [PATCH 01/11] scripts: add ipe tooling to generate boot policy
deven.desai at linux.microsoft.com
- [PATCH 03/11] ipe: add property for trust of boot volume
deven.desai at linux.microsoft.com
- [PATCH 04/11] fs: add security blob and hooks for block_device
deven.desai at linux.microsoft.com
- [PATCH 05/11] dm|dm-verity: refactor root-hash signature option
deven.desai at linux.microsoft.com
- [PATCH 05/11] dm-verity: move signature check after tree validation
deven.desai at linux.microsoft.com
- [PATCH 06/11] dm-verity: add bdev_setsecurity hook for dm-verity signature
deven.desai at linux.microsoft.com
- [PATCH 07/11] ipe: add property for signed dmverity volumes
deven.desai at linux.microsoft.com
- [PATCH 08/11] dm-verity: add bdev_setsecurity hook for root-hash
deven.desai at linux.microsoft.com
- [PATCH 09/11] ipe: add property for dmverity roothash
deven.desai at linux.microsoft.com
- [PATCH 10/11] documentation: Add IPE Documentation
deven.desai at linux.microsoft.com
- [PATCH 11/11] cleanup: uapi/linux/audit.h
deven.desai at linux.microsoft.com
- [RESEND PATCH 00/11] Integrity Policy Enforcement LSM (IPE)
deven.desai at linux.microsoft.com
- [RESEND PATCH 01/11] scripts: add ipe tooling to generate boot policy
deven.desai at linux.microsoft.com
- [RESEND PATCH 03/11] ipe: add property for trust of boot volume
deven.desai at linux.microsoft.com
- [RESEND PATCH 04/11] fs: add security blob and hooks for block_device
deven.desai at linux.microsoft.com
- [RESEND PATCH 05/11] dm-verity: move signature check after tree validation
deven.desai at linux.microsoft.com
- [RESEND PATCH 06/11] dm-verity: add bdev_setsecurity hook for dm-verity signature
deven.desai at linux.microsoft.com
- [RESEND PATCH 07/11] ipe: add property for signed dmverity volumes
deven.desai at linux.microsoft.com
- [RESEND PATCH 08/11] dm-verity: add bdev_setsecurity hook for root-hash
deven.desai at linux.microsoft.com
- [RESEND PATCH 09/11] ipe: add property for dmverity roothash
deven.desai at linux.microsoft.com
- [RESEND PATCH 10/11] documentation: Add IPE Documentation
deven.desai at linux.microsoft.com
- [RESEND PATCH 11/11] cleanup: uapi/linux/audit.h
deven.desai at linux.microsoft.com
- [RESEND PATCH 00/11] Integrity Policy Enforcement LSM (IPE)
Deven Bowers
- [RESEND PATCH 00/11] Integrity Policy Enforcement LSM (IPE)
Jann Horn
- [RESEND PATCH 00/11] Integrity Policy Enforcement LSM (IPE)
Deven Bowers
- [RESEND PATCH 00/11] Integrity Policy Enforcement LSM (IPE)
Sasha Levin
- [PATCH] device_cgroup: Cleanup cgroup eBPF device filter code
Daniel Borkmann
- [PATCH v15 00/23] LSM: Module stacking for AppArmor
Casey Schaufler
- [PATCH v15 00/23] LSM: Module stacking for AppArmor
Casey Schaufler
- [PATCH v16 01/23] LSM: Infrastructure management of the sock security
Casey Schaufler
- [PATCH v16 02/23] LSM: Create and manage the lsmblob data structure.
Casey Schaufler
- [PATCH v16 03/23] LSM: Use lsmblob in security_audit_rule_match
Casey Schaufler
- [PATCH v16 04/23] LSM: Use lsmblob in security_kernel_act_as
Casey Schaufler
- [PATCH v16 05/23] net: Prepare UDS for security module stacking
Casey Schaufler
- [PATCH v16 06/23] Use lsmblob in security_secctx_to_secid
Casey Schaufler
- [PATCH v16 07/23] LSM: Use lsmblob in security_secid_to_secctx
Casey Schaufler
- [PATCH v16 08/23] LSM: Use lsmblob in security_ipc_getsecid
Casey Schaufler
- [PATCH v15 00/23] LSM: Module stacking for AppArmor
Casey Schaufler
- [PATCH v16 01/23] LSM: Infrastructure management of the sock security
Casey Schaufler
- [PATCH v16 02/23] LSM: Create and manage the lsmblob data structure.
Casey Schaufler
- [PATCH v16 03/23] LSM: Use lsmblob in security_audit_rule_match
Casey Schaufler
- [PATCH v16 04/23] LSM: Use lsmblob in security_kernel_act_as
Casey Schaufler
- [PATCH v16 05/23] net: Prepare UDS for security module stacking
Casey Schaufler
- [PATCH v16 06/23] Use lsmblob in security_secctx_to_secid
Casey Schaufler
- [PATCH v16 07/23] LSM: Use lsmblob in security_secid_to_secctx
Casey Schaufler
- [PATCH v16 08/23] LSM: Use lsmblob in security_ipc_getsecid
Casey Schaufler
- [PATCH v15 00/23] LSM: Module stacking for AppArmor
Casey Schaufler
- [PATCH v16 01/23] LSM: Infrastructure management of the sock security
Casey Schaufler
- [PATCH v16 02/23] LSM: Create and manage the lsmblob data structure.
Casey Schaufler
- [PATCH v16 03/23] LSM: Use lsmblob in security_audit_rule_match
Casey Schaufler
- [PATCH v16 04/23] LSM: Use lsmblob in security_kernel_act_as
Casey Schaufler
- [PATCH v16 05/23] net: Prepare UDS for security module stacking
Casey Schaufler
- [PATCH v16 06/23] Use lsmblob in security_secctx_to_secid
Casey Schaufler
- [PATCH v16 07/23] LSM: Use lsmblob in security_secid_to_secctx
Casey Schaufler
- [PATCH v16 08/23] LSM: Use lsmblob in security_ipc_getsecid
Casey Schaufler
- [PATCH v15 00/23] LSM: Module stacking for AppArmor
Casey Schaufler
- [PATCH v16 01/23] LSM: Infrastructure management of the sock security
Casey Schaufler
- [PATCH v16 02/23] LSM: Create and manage the lsmblob data structure.
Casey Schaufler
- [PATCH v16 03/23] LSM: Use lsmblob in security_audit_rule_match
Casey Schaufler
- [PATCH v16 04/23] LSM: Use lsmblob in security_kernel_act_as
Casey Schaufler
- [PATCH v16 05/23] net: Prepare UDS for security module stacking
Casey Schaufler
- [PATCH v16 06/23] Use lsmblob in security_secctx_to_secid
Casey Schaufler
- [PATCH v16 07/23] LSM: Use lsmblob in security_secid_to_secctx
Casey Schaufler
- [PATCH v16 08/23] LSM: Use lsmblob in security_ipc_getsecid
Casey Schaufler
- [PATCH v16 09/23] LSM: Use lsmblob in security_task_getsecid
Casey Schaufler
- [RFC PATCH v2 00/12] Integrity Policy Enforcement LSM (IPE)
deven.desai at linux.microsoft.com
- [RFC PATCH v2 01/12] scripts: add ipe tooling to generate boot policy
deven.desai at linux.microsoft.com
- [RFC PATCH v2 02/12] security: add ipe lsm evaluation loop and audit system
deven.desai at linux.microsoft.com
- [RFC PATCH v2 03/12] security: add ipe lsm policy parser and policy loading
deven.desai at linux.microsoft.com
- [RFC PATCH v2 04/12] ipe: add property for trust of boot volume
deven.desai at linux.microsoft.com
- [RFC PATCH v2 05/12] fs: add security blob and hooks for block_device
deven.desai at linux.microsoft.com
- [RFC PATCH v2 06/12] dm-verity: move signature check after tree validation
deven.desai at linux.microsoft.com
- [RFC PATCH v2 07/12] dm-verity: add bdev_setsecurity hook for dm-verity signature
deven.desai at linux.microsoft.com
- [RFC PATCH v2 08/12] ipe: add property for signed dmverity volumes
deven.desai at linux.microsoft.com
- [RFC PATCH v2 09/12] dm-verity: add bdev_setsecurity hook for root-hash
deven.desai at linux.microsoft.com
- [RFC PATCH v2 10/12] ipe: add property for dmverity roothash
deven.desai at linux.microsoft.com
- [RFC PATCH v2 11/12] documentation: Add IPE Documentation
deven.desai at linux.microsoft.com
- [RFC PATCH v2 12/12] cleanup: uapi/linux/audit.h
deven.desai at linux.microsoft.com
- [PATCH v16 00/23] LSM: Module stacking for AppArmor
Casey Schaufler
- [PATCH v16 01/23] LSM: Infrastructure management of the sock security
Casey Schaufler
- [PATCH v16 02/23] LSM: Create and manage the lsmblob data structure.
Casey Schaufler
- [PATCH v16 03/23] LSM: Use lsmblob in security_audit_rule_match
Casey Schaufler
- [PATCH v16 04/23] LSM: Use lsmblob in security_kernel_act_as
Casey Schaufler
- [PATCH v16 05/23] net: Prepare UDS for security module stacking
Casey Schaufler
- [PATCH v16 06/23] Use lsmblob in security_secctx_to_secid
Casey Schaufler
- [PATCH v16 07/23] LSM: Use lsmblob in security_secid_to_secctx
Casey Schaufler
- [PATCH v16 08/23] LSM: Use lsmblob in security_ipc_getsecid
Casey Schaufler
- [PATCH v16 09/23] LSM: Use lsmblob in security_task_getsecid
Casey Schaufler
- [PATCH v16 10/23] LSM: Use lsmblob in security_inode_getsecid
Casey Schaufler
- [PATCH v16 11/23] LSM: Use lsmblob in security_cred_getsecid
Casey Schaufler
- [PATCH v16 12/23] IMA: Change internal interfaces to use lsmblobs
Casey Schaufler
- [PATCH v16 13/23] LSM: Specify which LSM to display
Casey Schaufler
- [PATCH v16 14/23] LSM: Ensure the correct LSM context releaser
Casey Schaufler
- [PATCH v16 15/23] LSM: Use lsmcontext in security_secid_to_secctx
Casey Schaufler
- [PATCH v16 16/23] LSM: Use lsmcontext in security_inode_getsecctx
Casey Schaufler
- [PATCH v16 17/23] LSM: security_secid_to_secctx in netlink netfilter
Casey Schaufler
- [PATCH v16 18/23] NET: Store LSM netlabel data in a lsmblob
Casey Schaufler
- [PATCH v16 19/23] LSM: Verify LSM display sanity in binder
Casey Schaufler
- [PATCH v16 20/23] Audit: Add a new record for multiple subject LSM attributes
Casey Schaufler
- [PATCH v16 21/23] Audit: Add a new record for multiple object LSM attributes
Casey Schaufler
- [PATCH v16 22/23] LSM: Add /proc attr entry for full LSM context
Casey Schaufler
- [PATCH v16 23/23] AppArmor: Remove the exclusive flag
Casey Schaufler
- whether this is your correct email address or not
SANDRA DEWI
- [RFC PATCH v2 02/12] security: add ipe lsm evaluation loop and audit system
Jann Horn
- [PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
Arnaldo Carvalho de Melo
- [PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
Arnaldo Carvalho de Melo
- [PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
Alexey Budankov
- [RFC PATCH v2 03/12] security: add ipe lsm policy parser and policy loading
Jann Horn
- [PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
Arnaldo Carvalho de Melo
- [PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
Arnaldo Carvalho de Melo
- [PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
Alexey Budankov
- [PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
Arnaldo Carvalho de Melo
- [PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
Arnaldo Carvalho de Melo
- [PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
Alexey Budankov
- [PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
Arnaldo Carvalho de Melo
- [PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
Alexey Budankov
- [PATCH v16 05/23] net: Prepare UDS for security module stacking
Kees Cook
- [PATCH v16 06/23] Use lsmblob in security_secctx_to_secid
Kees Cook
- [PATCH v16 13/23] LSM: Specify which LSM to display
Kees Cook
- [PATCH v16 15/23] LSM: Use lsmcontext in security_secid_to_secctx
Kees Cook
- [PATCH v16 16/23] LSM: Use lsmcontext in security_inode_getsecctx
Kees Cook
- [PATCH v16 19/23] LSM: Verify LSM display sanity in binder
Kees Cook
- [PATCH v16 20/23] Audit: Add a new record for multiple subject LSM attributes
Kees Cook
- [PATCH v16 21/23] Audit: Add a new record for multiple object LSM attributes
Kees Cook
- [PATCH v16 22/23] LSM: Add /proc attr entry for full LSM context
Kees Cook
- [RFC PATCH v2 00/12] Integrity Policy Enforcement LSM (IPE)
Nayna
- [PATCH] ima: Simplify the implementation of ima_fs_init function
Tianjia Zhang
- [RFC] IMA: New IMA measurements for dm-crypt and selinux
Tushar Sugandhi
- [RFC] IMA: New IMA measurements for dm-crypt and selinux
Milan Broz
- [RFC] IMA: New IMA measurements for dm-crypt and selinux
Casey Schaufler
- [PATCH] smack: avoid unused 'sip' variable warning
Arnd Bergmann
- [PATCH] smack: avoid unused 'sip' variable warning
Casey Schaufler
- [PATCH 0/2] support to read and tune appraise mode in runtime
Tianjia Zhang
- [PATCH 1/2] ima: support to read appraise mode
Tianjia Zhang
- [PATCH 2/2] ima: support to tune appraise mode in runtime
Tianjia Zhang
- [PATCH 2/2] ima: support to tune appraise mode in runtime
kbuild test robot
- [PATCH v2 0/2] support to read and tune appraise mode in runtime
Tianjia Zhang
- [PATCH v2 1/2] ima: support to read appraise mode
Tianjia Zhang
- [PATCH v2 2/2] ima: support to tune appraise mode in runtime
Tianjia Zhang
- [PATCH RESEND v11 0/8] proc: modernize proc to support multiple private instances
Alexey Gladkov
- [PATCH RESEND v11 1/8] proc: rename struct proc_fs_info to proc_fs_opts
Alexey Gladkov
- [PATCH RESEND v11 2/8] proc: allow to mount many instances of proc in one pid namespace
Alexey Gladkov
- [PATCH RESEND v11 3/8] proc: move hide_pid, pid_gid from pid_namespace to proc_fs_info
Alexey Gladkov
- [PATCH RESEND v11 4/8] proc: instantiate only pids that we can ptrace on 'hidepid=4' mount option
Alexey Gladkov
- [PATCH RESEND v11 5/8] proc: add option to mount only a pids subset
Alexey Gladkov
- [PATCH RESEND v11 6/8] docs: proc: add documentation for "hidepid=4" and "subset=pid" options and new mount behavior
Alexey Gladkov
- [PATCH RESEND v11 7/8] proc: use human-readable values for hidepid
Alexey Gladkov
- [PATCH RESEND v11 8/8] proc: use named enums for better readability
Alexey Gladkov
- [PATCH 1/1] smack: remove redundant structure variable from header.
Maninder Singh
- [PATCH RESEND v11 0/8] proc: modernize proc to support multiple private instances
Eric W. Biederman
- [PATCH RESEND v11 0/8] proc: modernize proc to support multiple private instances
Alexey Gladkov
- [PATCH RESEND v11 0/8] proc: modernize proc to support multiple private instances
Eric W. Biederman
- [PATCH v10 8/9] proc: use human-readable values for hidehid
Alexey Gladkov
- [RFC PATCH v2 00/12] Integrity Policy Enforcement LSM (IPE)
Deven Bowers
- [RFC PATCH v2 02/12] security: add ipe lsm evaluation loop and audit system
Deven Bowers
- [RFC PATCH v2 03/12] security: add ipe lsm policy parser and policy loading
Deven Bowers
- [PATCH 1/1] smack: remove redundant structure variable from header.
Casey Schaufler
- [PATCH ghak96] audit: set cwd in audit context for file-related LSM audit records
Richard Guy Briggs
- [selftests/landlock] d9d464ccf6: kernel-selftests.landlock.test_base.fail
Mickaël Salaün
- [selftests/landlock] d9d464ccf6: kernel-selftests.landlock.test_base.fail
Rong Chen
- [RFC] IMA: New IMA measurements for dm-crypt and selinux
Stephen Smalley
- [PATCH v2 0/2] support to read and tune appraise mode in runtime
Nayna
- [RFC] IMA: New IMA measurements for dm-crypt and selinux
Lev R. Oshvang .
- [PATCH v2 0/2] support to read and tune appraise mode in runtime
Tianjia Zhang
- I have already sent you first payment US$5000.00 this morning through MONEY Gram service.it is available to pick up in address now.
Barrister Robert Richter UN-Attorney at Law Court-Benin
- [PATCH v5 0/3] SELinux support for anonymous inodes and UFFD
Daniel Colascione
- [PATCH 05/26] capabilities: Introduce CAP_PERFMON to kernel and user space
Arnaldo Carvalho de Melo
- [PATCH 06/26] perf/core: Open access to the core for CAP_PERFMON privileged process
Arnaldo Carvalho de Melo
- [PATCH 07/26] perf/core: open access to probes for CAP_PERFMON privileged process
Arnaldo Carvalho de Melo
- [PATCH 08/26] perf tools: Support CAP_PERFMON capability
Arnaldo Carvalho de Melo
- [PATCH 09/26] drm/i915/perf: Open access for CAP_PERFMON privileged process
Arnaldo Carvalho de Melo
- [PATCH 10/26] trace/bpf_trace: Open access for CAP_PERFMON privileged process
Arnaldo Carvalho de Melo
- [PATCH 11/26] powerpc/perf: open access for CAP_PERFMON privileged process
Arnaldo Carvalho de Melo
- [PATCH 12/26] parisc/perf: open access for CAP_PERFMON privileged process
Arnaldo Carvalho de Melo
- [PATCH 13/26] drivers/perf: Open access for CAP_PERFMON privileged process
Arnaldo Carvalho de Melo
- [PATCH 14/26] drivers/oprofile: Open access for CAP_PERFMON privileged process
Arnaldo Carvalho de Melo
- [PATCH 15/26] doc/admin-guide: Update perf-security.rst with CAP_PERFMON information
Arnaldo Carvalho de Melo
- [PATCH 16/26] doc/admin-guide: update kernel.rst with CAP_PERFMON information
Arnaldo Carvalho de Melo
- [PATCH] device_cgroup: Cleanup cgroup eBPF device filter code
Tejun Heo
- [PATCH 0/2] mm, treewide: Rename kzfree() to kfree_sensitive()
Waiman Long
- [PATCH 1/2] mm, treewide: Rename kzfree() to kfree_sensitive()
Waiman Long
- [PATCH 2/2] crypto: Remove unnecessary memzero_explicit()
Waiman Long
- [PATCH 2/2] crypto: Remove unnecessary memzero_explicit()
Joe Perches
- [PATCH 2/2] crypto: Remove unnecessary memzero_explicit()
Waiman Long
- [PATCH 0/2] support to read and tune appraise mode in runtime
Mimi Zohar
- [PATCH v2 2/2] crypto: Remove unnecessary memzero_explicit()
Waiman Long
- [PATCH 1/2] mm, treewide: Rename kzfree() to kfree_sensitive()
David Rientjes
- [RFC] IMA: New IMA measurements for dm-crypt and selinux
Mimi Zohar
- [PATCH 0/2] support to read and tune appraise mode in runtime
Tianjia Zhang
- [PATCH v2 2/2] crypto: Remove unnecessary memzero_explicit()
Christophe Leroy
- [PATCH] evm: Fix possible memory leak in evm_calc_hmac_or_hash()
Roberto Sassu
- [PATCH -next] tomoyo: use true for bool variable
Zou Wei
- [PATCH -next] IMA: fix memdup.cocci warnings
Zou Wei
- [PATCH 1/2] mm, treewide: Rename kzfree() to kfree_sensitive()
Jason A. Donenfeld
- [PATCH -next] IMA: Fix a memdup.cocci warning
Markus Elfring
- [PATCH 1/2] mm, treewide: Rename kzfree() to kfree_sensitive()
Michal Hocko
- [RFC] IMA: New IMA measurements for dm-crypt and selinux
Lev R. Oshvang .
- [PATCH -next v2] IMA: fix memdup.cocci warnings
Zou Wei
- [PATCH 0/2] Simplify the implementation of some functions in IMA
Tianjia Zhang
- [PATCH 1/2] ima: simplify function ima_store_template
Tianjia Zhang
- [PATCH 2/2] ima: simplify function process_buffer_measurement
Tianjia Zhang
- [PATCH] ima: optimize ima_pcr_extend function by asynchronous
Tianjia Zhang
- [PATCH 1/2] mm, treewide: Rename kzfree() to kfree_sensitive()
David Sterba
- [PATCH 1/2] mm, treewide: Rename kzfree() to kfree_sensitive()
David Howells
- [PATCH 0/2] support to read and tune appraise mode in runtime
Mimi Zohar
- [PATCH] evm: Fix possible memory leak in evm_calc_hmac_or_hash()
Mimi Zohar
- [PATCH 1/2] ima: simplify function ima_store_template
Lakshmi Ramasubramanian
- [PATCH 2/2] ima: simplify function process_buffer_measurement
Lakshmi Ramasubramanian
- [RFC PATCH v2 11/12] documentation: Add IPE Documentation
Jonathan Corbet
- [PATCH] capabilities: add description for CAP_SETFCAP
Stefan Hajnoczi
- [PATCH] ima: optimize ima_pcr_extend function by asynchronous
Mimi Zohar
- [PATCH v2 2/2] crypto: Remove unnecessary memzero_explicit()
Waiman Long
- [PATCH] ima: optimize ima_pcr_extend function by asynchronous
Ken Goldman
- [PATCH 1/2] mm, treewide: Rename kzfree() to kfree_sensitive()
Waiman Long
- [PATCH v2 2/2] crypto: Remove unnecessary memzero_explicit()
Michal Suchánek
- [PATCH v2 2/2] crypto: Remove unnecessary memzero_explicit()
Waiman Long
- [PATCH v2 2/2] crypto: Remove unnecessary memzero_explicit()
Joe Perches
- [PATCH] keys: Fix proc_keys_next to increase position index
David Howells
- [RFC PATCH v2 11/12] documentation: Add IPE Documentation
Deven Bowers
- [PATCH 0/2] support to read and tune appraise mode in runtime
Tianjia Zhang
- [PATCH] ima: optimize ima_pcr_extend function by asynchronous
Tianjia Zhang
- [PATCH 1/2] mm, treewide: Rename kzfree() to kfree_sensitive()
Johannes Weiner
- [PATCH v2] ima: optimize ima_pcr_extend function by asynchronous
Tianjia Zhang
- [PATCH] ima: remove redundant code
Tianjia Zhang
- Regards
Mr. H.A.Scholze
- [PATCH v2] apparmor: fix potential label refcnt leak in aa_change_profile
Markus Elfring
- [RFC PATCH v3 00/12] Integrity Policy Enforcement LSM (IPE)
deven.desai at linux.microsoft.com
- [RFC PATCH v3 01/12] scripts: add ipe tooling to generate boot policy
deven.desai at linux.microsoft.com
- [RFC PATCH v3 02/12] security: add ipe lsm evaluation loop and audit system
deven.desai at linux.microsoft.com
- [RFC PATCH v3 03/12] security: add ipe lsm policy parser and policy loading
deven.desai at linux.microsoft.com
- [RFC PATCH v3 04/12] ipe: add property for trust of boot volume
deven.desai at linux.microsoft.com
- [RFC PATCH v3 05/12] fs: add security blob and hooks for block_device
deven.desai at linux.microsoft.com
- [RFC PATCH v3 06/12] dm-verity: move signature check after tree validation
deven.desai at linux.microsoft.com
- [RFC PATCH v3 07/12] dm-verity: add bdev_setsecurity hook for dm-verity signature
deven.desai at linux.microsoft.com
- [RFC PATCH v3 08/12] ipe: add property for signed dmverity volumes
deven.desai at linux.microsoft.com
- [RFC PATCH v3 09/12] dm-verity: add bdev_setsecurity hook for root-hash
deven.desai at linux.microsoft.com
- [RFC PATCH v3 10/12] ipe: add property for dmverity roothash
deven.desai at linux.microsoft.com
- [RFC PATCH v3 11/12] documentation: add ipe documentation
deven.desai at linux.microsoft.com
- [RFC PATCH v3 12/12] cleanup: uapi/linux/audit.h
deven.desai at linux.microsoft.com
- [PATCH v2] apparmor: fix potential label refcnt leak in aa_change_profile
John Johansen
- [PATCH v16 00/10] Landlock LSM
Mickaël Salaün
- [PATCH v16 01/10] landlock: Add object management
Mickaël Salaün
- [PATCH v16 02/10] landlock: Add ruleset and domain management
Mickaël Salaün
- [PATCH v16 03/10] landlock: Set up the security framework and manage credentials
Mickaël Salaün
- [PATCH v16 04/10] landlock: Add ptrace restrictions
Mickaël Salaün
- [PATCH v16 05/10] fs,landlock: Support filesystem access-control
Mickaël Salaün
- [PATCH v16 06/10] landlock: Add syscall implementation
Mickaël Salaün
- [PATCH v16 07/10] arch: Wire up landlock() syscall
Mickaël Salaün
- [PATCH v16 08/10] selftests/landlock: Add initial tests
Mickaël Salaün
- [PATCH v16 09/10] samples/landlock: Add a sandbox manager example
Mickaël Salaün
- [PATCH v16 10/10] landlock: Add user and kernel documentation
Mickaël Salaün
- [PATCH] keys: Fix proc_keys_next to increase position index
Jarkko Sakkinen
- [GIT PULL] SELinux fixes for v5.7 (#1)
Paul Moore
- [GIT PULL] SELinux fixes for v5.7 (#1)
pr-tracker-bot at kernel.org
- Hey, how are u, can we talk?
Saleem Netanyahu
- WARNING: locking bug in tomoyo_supervisor
syzbot
- [RFC] IMA: New IMA measurements for dm-crypt and selinux
Tushar Sugandhi
- [RFC] IMA: New IMA measurements for dm-crypt and selinux
Tushar Sugandhi
- [RFC] IMA: New IMA measurements for dm-crypt and selinux
Tushar Sugandhi
- [RFC] IMA: New IMA measurements for dm-crypt and selinux
Tushar Sugandhi
- WARNING: locking bug in tomoyo_supervisor
Tetsuo Handa
- Problem with 9ba09998baa9 ("selinux: Implement the watch_key security hook") in linux-next
Paul Moore
- Problem with 9ba09998baa9 ("selinux: Implement the watch_key security hook") in linux-next
Richard Haines
- Problem with 9ba09998baa9 ("selinux: Implement the watch_key security hook") in linux-next
Paul Moore
- [PATCH RESEND v11 2/8] proc: allow to mount many instances of proc in one pid namespace
Eric W. Biederman
- [PATCH RESEND v11 7/8] proc: use human-readable values for hidepid
Eric W. Biederman
- [PATCH ghak96] audit: set cwd in audit context for file-related LSM audit records
Paul Moore
- [PATCH v12 0/7] proc: modernize proc to support multiple private instances
Alexey Gladkov
- [PATCH v12 1/7] proc: rename struct proc_fs_info to proc_fs_opts
Alexey Gladkov
- [PATCH v12 2/7] proc: allow to mount many instances of proc in one pid namespace
Alexey Gladkov
- [PATCH v12 3/7] proc: instantiate only pids that we can ptrace on 'hidepid=4' mount option
Alexey Gladkov
- [PATCH v12 4/7] proc: add option to mount only a pids subset
Alexey Gladkov
- [PATCH v12 5/7] docs: proc: add documentation for "hidepid=4" and "subset=pid" options and new mount behavior
Alexey Gladkov
- [PATCH v12 6/7] proc: use human-readable values for hidepid
Alexey Gladkov
- [PATCH v12 7/7] proc: use named enums for better readability
Alexey Gladkov
- [PATCH RESEND v11 2/8] proc: allow to mount many instances of proc in one pid namespace
Alexey Gladkov
- [PATCH RESEND v11 7/8] proc: use human-readable values for hidepid
Alexey Gladkov
- [PATCH] apparmor: Fix aa_label refcnt leak in policy_update
Xiyu Yang
- [PATCH 05/60] capabilities: Introduce CAP_PERFMON to kernel and user space
Arnaldo Carvalho de Melo
- [PATCH 06/60] perf/core: Open access to the core for CAP_PERFMON privileged process
Arnaldo Carvalho de Melo
- [PATCH 07/60] perf/core: open access to probes for CAP_PERFMON privileged process
Arnaldo Carvalho de Melo
- [PATCH 08/60] perf tools: Support CAP_PERFMON capability
Arnaldo Carvalho de Melo
- [PATCH 09/60] drm/i915/perf: Open access for CAP_PERFMON privileged process
Arnaldo Carvalho de Melo
- [PATCH 10/60] trace/bpf_trace: Open access for CAP_PERFMON privileged process
Arnaldo Carvalho de Melo
- [PATCH 11/60] powerpc/perf: open access for CAP_PERFMON privileged process
Arnaldo Carvalho de Melo
- [PATCH 12/60] parisc/perf: open access for CAP_PERFMON privileged process
Arnaldo Carvalho de Melo
- [PATCH 13/60] drivers/perf: Open access for CAP_PERFMON privileged process
Arnaldo Carvalho de Melo
- [PATCH 14/60] drivers/oprofile: Open access for CAP_PERFMON privileged process
Arnaldo Carvalho de Melo
- [PATCH 15/60] doc/admin-guide: Update perf-security.rst with CAP_PERFMON information
Arnaldo Carvalho de Melo
- [PATCH 16/60] doc/admin-guide: update kernel.rst with CAP_PERFMON information
Arnaldo Carvalho de Melo
- IMA: policy update LSM rules failed
Mimi Zohar
- [PATCH RFC] Documentation: LSM: Correct the basic LSM description
Casey Schaufler
- [PATCH] ima: Fix return value of ima_write_policy()
Roberto Sassu
- [PATCH] ima: Allow imasig requirement to be satisfied by EVM portable signatures
Roberto Sassu
- Problem with 9ba09998baa9 ("selinux: Implement the watch_key security hook") in linux-next
David Howells
- [PATCH v2 0/7] libfs: group and simplify linux fs code
Emanuele Giuseppe Esposito
- [PATCH v2 1/7] apparmor: just use vfs_kern_mount to make .null
Emanuele Giuseppe Esposito
- [PATCH v2 2/7] libfs: wrap simple_pin_fs/simple_release_fs arguments in a struct
Emanuele Giuseppe Esposito
- [PATCH v2 3/7] libfs: introduce new_inode_current_time
Emanuele Giuseppe Esposito
- [PATCH v2 4/7] libfs: add alloc_anon_inode wrapper
Emanuele Giuseppe Esposito
- [PATCH v2 5/7] libfs: add file creation functions
Emanuele Giuseppe Esposito
- [PATCH v2 6/7] debugfs: switch to simplefs inode creation API
Emanuele Giuseppe Esposito
- [PATCH v2 7/7] tracefs: switch to simplefs inode creation API
Emanuele Giuseppe Esposito
- [PATCH RFC] Documentation: LSM: Correct the basic LSM description
Jonathan Corbet
- [PATCH RFC] Documentation: LSM: Correct the basic LSM description
Randy Dunlap
- [PATCH v29 11/20] x86/sgx: Linux Enclave Driver
Jarkko Sakkinen
- [PATCH v29 12/20] x86/sgx: Add provisioning
Jarkko Sakkinen
- Lieber Freund (Assalamu Alaikum),?
AISHA GADDAFI
- [PATCH 1/5] ima: Set file->f_mode instead of file->f_flags in ima_calc_file_hash()
Mimi Zohar
- [tip: perf/core] doc/admin-guide: update kernel.rst with CAP_PERFMON information
tip-bot2 for Alexey Budankov
- [tip: perf/core] doc/admin-guide: Update perf-security.rst with CAP_PERFMON information
tip-bot2 for Alexey Budankov
- [tip: perf/core] drivers/oprofile: Open access for CAP_PERFMON privileged process
tip-bot2 for Alexey Budankov
- [tip: perf/core] drivers/perf: Open access for CAP_PERFMON privileged process
tip-bot2 for Alexey Budankov
- [tip: perf/core] parisc/perf: open access for CAP_PERFMON privileged process
tip-bot2 for Alexey Budankov
- [tip: perf/core] powerpc/perf: open access for CAP_PERFMON privileged process
tip-bot2 for Alexey Budankov
- [tip: perf/core] trace/bpf_trace: Open access for CAP_PERFMON privileged process
tip-bot2 for Alexey Budankov
- [tip: perf/core] drm/i915/perf: Open access for CAP_PERFMON privileged process
tip-bot2 for Alexey Budankov
- [tip: perf/core] perf tools: Support CAP_PERFMON capability
tip-bot2 for Alexey Budankov
- [tip: perf/core] perf/core: open access to probes for CAP_PERFMON privileged process
tip-bot2 for Alexey Budankov
- [tip: perf/core] perf/core: Open access to the core for CAP_PERFMON privileged process
tip-bot2 for Alexey Budankov
- [tip: perf/core] capabilities: Introduce CAP_PERFMON to kernel and user space
tip-bot2 for Alexey Budankov
- [PATCH 2/5] evm: Check also if *tfm is an error pointer in init_desc()
Mimi Zohar
- [PATCH v2 0/4] perf: make Perf tool aware of SELinux access control
Alexey Budankov
- [PATCH v2 1/4] perf trace: substitute CAP_SYS_ADMIN with CAP_PERFMON in error message
Alexey Budankov
- [PATCH v2 2/4] perf docs: substitute CAP_SYS_ADMIN with CAP_PERFMON where needed
Alexey Budankov
- [PATCH v2 3/4] perf tool: make Perf tool aware of SELinux access control
Alexey Budankov
- [PATCH v2 4/4] perf docs: introduce security.txt file to document related issues
Alexey Budankov
- [PATCH 2/5] evm: Check also if *tfm is an error pointer in init_desc()
Roberto Sassu
- [PATCH 1/5] ima: Set file->f_mode instead of file->f_flags in ima_calc_file_hash()
Roberto Sassu
- [RFC PATCH v3 05/12] fs: add security blob and hooks for block_device
James Morris
- [PATCH v2 2/7] libfs: wrap simple_pin_fs/simple_release_fs arguments in a struct
James Morris
- [RFC PATCH v3 05/12] fs: add security blob and hooks for block_device
Casey Schaufler
- [PATCH v5 0/3] SELinux support for anonymous inodes and UFFD
James Morris
- [PATCH v5 0/3] SELinux support for anonymous inodes and UFFD
Casey Schaufler
- [PATCH] netlabel: Kconfig: Update reference for NetLabel Tools project
Salvatore Bonaccorso
- [PATCH] netlabel: Kconfig: Update reference for NetLabel Tools project
Salvatore Bonaccorso
- Problem with 9ba09998baa9 ("selinux: Implement the watch_key security hook") in linux-next
Paul Moore
- [PATCH] netlabel: Kconfig: Update reference for NetLabel Tools project
Paul Moore
- [PATCH 3/5] ima: Fix ima digest hash table key calculation
Mimi Zohar
- Problem with 9ba09998baa9 ("selinux: Implement the watch_key security hook") in linux-next
Paul Moore
- [PATCH 5/5] ima: Remove unused build_ima_appraise variable
Mimi Zohar
- [PATCH RFC] Documentation: LSM: Correct the basic LSM description
James Morris
- [PATCH] ima: Fix return value of ima_write_policy()
Mimi Zohar
- [PATCH] netlabel: Kconfig: Update reference for NetLabel Tools project
David Miller
- [PATCH] ima: Fix return value of ima_write_policy()
Roberto Sassu
- [PATCH 3/5] ima: Fix ima digest hash table key calculation
Roberto Sassu
- [PATCH v13 2/7] proc: allow to mount many instances of proc in one pid namespace
Alexey Gladkov
- [PATCH v13 2/7] proc: allow to mount many instances of proc in one pid namespace
Eric W. Biederman
- [PATCH v2 1/4] perf trace: substitute CAP_SYS_ADMIN with CAP_PERFMON in error message
Arnaldo Carvalho de Melo
- [PATCH v2 2/4] perf docs: substitute CAP_SYS_ADMIN with CAP_PERFMON where needed
Arnaldo Carvalho de Melo
- [PATCH v2 3/4] perf tool: make Perf tool aware of SELinux access control
Arnaldo Carvalho de Melo
- [PATCH v2 1/4] perf trace: substitute CAP_SYS_ADMIN with CAP_PERFMON in error message
Alexey Budankov
- [PATCH v2 2/4] perf docs: substitute CAP_SYS_ADMIN with CAP_PERFMON where needed
Alexey Budankov
- [PATCH v2 3/4] perf tool: make Perf tool aware of SELinux access control
Alexey Budankov
- [PATCH 3/5] ima: Fix ima digest hash table key calculation
Mimi Zohar
- [PATCH v2 1/4] perf trace: substitute CAP_SYS_ADMIN with CAP_PERFMON in error message
Arnaldo Carvalho de Melo
- Contact Eco bank-Benin to receive your payment funds transfer amount of $12.800.000,00 Million USD,approved this morning by IMF.
Mrs. Angella Michelle
- [PATCH] ima: Fix return value of ima_write_policy()
Mimi Zohar
- [PATCH v13 2/7] proc: allow to mount many instances of proc in one pid namespace
Alexey Gladkov
- [PATCH v13 0/8] proc: modernize proc to support multiple private instances
Alexey Gladkov
- [PATCH v13 1/8] proc: rename struct proc_fs_info to proc_fs_opts
Alexey Gladkov
- [PATCH v13 2/8] Use proc_pid_ns() to get pid_namespace from the proc superblock
Alexey Gladkov
- [PATCH v13 3/8] proc: allow to mount many instances of proc in one pid namespace
Alexey Gladkov
- [PATCH v13 4/8] proc: instantiate only pids that we can ptrace on 'hidepid=4' mount option
Alexey Gladkov
- [PATCH v13 5/8] proc: add option to mount only a pids subset
Alexey Gladkov
- [PATCH v13 6/8] docs: proc: add documentation for "hidepid=4" and "subset=pid" options and new mount behavior
Alexey Gladkov
- [PATCH v13 7/8] proc: use human-readable values for hidepid
Alexey Gladkov
- [PATCH v13 8/8] proc: use named enums for better readability
Alexey Gladkov
- [PATCH] ima: Allow imasig requirement to be satisfied by EVM portable signatures
Mimi Zohar
- [PATCH v5 0/3] SELinux support for anonymous inodes and UFFD
Casey Schaufler
- [PATCH v3 0/3] perf: make Perf tool aware of SELinux access control
Alexey Budankov
- [PATCH v3 1/3] perf docs: extend CAP_SYS_ADMIN with CAP_PERFMON where needed
Alexey Budankov
- [PATCH v3 2/3] perf tool: make Perf tool aware of SELinux access control
Alexey Budankov
- [PATCH v3 3/3] perf docs: introduce security.txt file to document related issues
Alexey Budankov
- [PATCH] ima: Allow imasig requirement to be satisfied by EVM portable signatures
Roberto Sassu
- [PATCH] integrity: remove redundant assignment to variable ret
Colin King
- [PATCH 3/5] ima: Fix ima digest hash table key calculation
Roberto Sassu
- [PATCH 1/1] Smack:- Remove mutex lock "smk_lock" from inode_smack structure.
Vishal Goel
- [PATCH 3/5] ima: Fix ima digest hash table key calculation
Mimi Zohar
- [PATCH 1/1] Smack:- Remove mutex lock "smk_lock" from inode_smack structure.
Casey Schaufler
- Problem with 9ba09998baa9 ("selinux: Implement the watch_key security hook") in linux-next
David Howells
- Problem with 9ba09998baa9 ("selinux: Implement the watch_key security hook") in linux-next
Paul Moore
- [PATCH v2 1/6] ima: Set file->f_mode instead of file->f_flags in ima_calc_file_hash()
Roberto Sassu
- [PATCH v2 2/6] evm: Check also if *tfm is an error pointer in init_desc()
Roberto Sassu
- [PATCH v2 3/6] ima: Fix ima digest hash table key calculation
Roberto Sassu
- [PATCH v2 4/6] ima: Remove redundant policy rule set in add_rules()
Roberto Sassu
- [PATCH v2 5/6] ima: Set again build_ima_appraise variable
Roberto Sassu
- [PATCH v2 6/6] ima: Fix return value of ima_write_policy()
Roberto Sassu
- [PATCH v2 3/6] ima: Fix ima digest hash table key calculation
David Laight
- Why continued silence 2
Ruben CONVY
- [PATCH v2 3/6] ima: Fix ima digest hash table key calculation
Roberto Sassu
- [PATCH v2 1/6] ima: Set file->f_mode instead of file->f_flags in ima_calc_file_hash()
Goldwyn Rodrigues
- [PATCH] selinux: Fix use of KEY_NEED_* instead of KEY__* perms
David Howells
- [PATCH v2 3/6] ima: Fix ima digest hash table key calculation
David Laight
- [PATCH] selinux: Fix use of KEY_NEED_* instead of KEY__* perms
Stephen Smalley
- [PATCH v2 6/7] debugfs: switch to simplefs inode creation API
Paolo Bonzini
- [PATCH] selinux: Fix use of KEY_NEED_* instead of KEY__* perms
Paul Moore
- [PATCH v5 0/3] SELinux support for anonymous inodes and UFFD
Casey Schaufler
- [PATCH v5 0/3] SELinux support for anonymous inodes and UFFD
Stephen Smalley
- [PATCH] selinux: Fix use of KEY_NEED_* instead of KEY__* perms
Stephen Smalley
- [PATCH v5 0/3] SELinux support for anonymous inodes and UFFD
Casey Schaufler
- [PATCH v5 0/3] SELinux support for anonymous inodes and UFFD
Casey Schaufler
- [PATCH] nsproxy: attach to namespaces via pidfds
Jann Horn
- [PATCH] nsproxy: attach to namespaces via pidfds
Christian Brauner
- [PATCH v5 0/3] SELinux support for anonymous inodes and UFFD
Stephen Smalley
- [PATCH] nsproxy: attach to namespaces via pidfds
Jann Horn
- [PATCH] nsproxy: attach to namespaces via pidfds
Christian Brauner
- [PATCH] selinux: Fix use of KEY_NEED_* instead of KEY__* perms
Paul Moore
- [PATCH v2 3/6] ima: Fix ima digest hash table key calculation
Roberto Sassu
- [RESEND][PATCH v2 3/6] ima: Fix ima digest hash table key calculation
Roberto Sassu
- [PATCH -next] apparmor: Use true and false for bool variable
Zou Wei
- [PATCH] selinux: Fix use of KEY_NEED_* instead of KEY__* perms [v2]
David Howells
- [PATCH] selinux: Fix use of KEY_NEED_* instead of KEY__* perms [v2]
Stephen Smalley
- [PATCH] selinux: Fix use of KEY_NEED_* instead of KEY__* perms [v2]
David Howells
- [PATCH] selinux: Fix use of KEY_NEED_* instead of KEY__* perms [v2]
Stephen Smalley
- [PATCH v2 6/6] ima: Fix return value of ima_write_policy()
Mimi Zohar
- [PATCH v3 0/5] Add support for RESOLVE_MAYEXEC
Mickaël Salaün
- [PATCH v3 1/5] fs: Add support for a RESOLVE_MAYEXEC flag on openat2(2)
Mickaël Salaün
- [PATCH v3 2/5] fs: Add a MAY_EXECMOUNT flag to infer the noexec mount property
Mickaël Salaün
- [PATCH v3 3/5] fs: Enable to enforce noexec mounts or file exec through RESOLVE_MAYEXEC
Mickaël Salaün
- [PATCH v3 4/5] selftest/openat2: Add tests for RESOLVE_MAYEXEC enforcing
Mickaël Salaün
- [PATCH v3 5/5] doc: Add documentation for the fs.open_mayexec_enforce sysctl
Mickaël Salaün
- [PATCH v3 0/5] Add support for RESOLVE_MAYEXEC
Jann Horn
- [PATCH v3 0/5] Add support for RESOLVE_MAYEXEC
Florian Weimer
- [PATCH v3 0/5] Add support for RESOLVE_MAYEXEC
Jann Horn
- [PATCH v2 6/6] ima: Fix return value of ima_write_policy()
Krzysztof Struczynski
- [PATCH] Documentation: LSM: Correct the basic LSM description
James Morris
- [RFC][PATCH 1/3] evm: Move hooks outside LSM infrastructure
Roberto Sassu
- [RFC][PATCH 2/3] evm: Extend API of post hooks to pass the result of pre hooks
Roberto Sassu
- [RFC][PATCH 3/3] evm: Return -EAGAIN to ignore verification failures
Roberto Sassu
- [PATCH v3 0/5] Add support for RESOLVE_MAYEXEC
Mickaël Salaün
- [PATCH bpf-next v9 0/8] MAC and Audit policy using eBPF (KRSI)
Mikko Ylinen
- [PATCH bpf-next v9 0/8] MAC and Audit policy using eBPF (KRSI)
KP Singh
- [PATCH bpf-next v9 0/8] MAC and Audit policy using eBPF (KRSI)
Mikko Ylinen
- [PATCH 0/2] ima: extending IMA policy to support interpreters
Mimi Zohar
- [PATCH 1/2] ima: add policy support for identifying file execute mode bit
Mimi Zohar
- [PATCH 2/2] ima: add policy support for the new file open MAY_OPENEXEC flag
Mimi Zohar
- [PATCH bpf-next v9 0/8] MAC and Audit policy using eBPF (KRSI)
KP Singh
- [PATCH v5 0/3] SELinux support for anonymous inodes and UFFD
Stephen Smalley
- [PATCH 1/2] ima: add policy support for identifying file execute mode bit
Lakshmi Ramasubramanian
- [PATCH 2/2] ima: add policy support for the new file open MAY_OPENEXEC flag
Lakshmi Ramasubramanian
- [PATCH 2/2] ima: add policy support for the new file open MAY_OPENEXEC flag
kbuild test robot
- [PATCH v3 0/3] perf: make Perf tool aware of SELinux access control
Alexey Budankov
- [PATCH v3 1/3] perf docs: extend CAP_SYS_ADMIN with CAP_PERFMON where needed
Alexey Budankov
- [PATCH v3 2/3] perf tool: make Perf tool aware of SELinux access control
Alexey Budankov
- [PATCH v3 3/3] perf docs: introduce security.txt file to document related issues
Alexey Budankov
- [RESEND][PATCH v2 3/6] ima: Fix ima digest hash table key calculation
David Laight
- [PATCH v3 0/5] Add support for RESOLVE_MAYEXEC
Christian Brauner
- [PATCH v3 0/5] Add support for RESOLVE_MAYEXEC
Mickaël Salaün
- [PATCH v3 0/5] Add support for RESOLVE_MAYEXEC
Lev R. Oshvang .
- My Dearest,
Miss. Colette Kipkalya
- [PATCH v4 0/5] Add support for O_MAYEXEC
Mickaël Salaün
- [PATCH v4 1/5] fs: Add support for an O_MAYEXEC flag on openat2(2)
Mickaël Salaün
- [PATCH v4 2/5] fs: Add a MAY_EXECMOUNT flag to infer the noexec mount property
Mickaël Salaün
- [PATCH v4 3/5] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
Mickaël Salaün
- [PATCH v4 4/5] selftest/openat2: Add tests for O_MAYEXEC enforcing
Mickaël Salaün
- [PATCH v4 5/5] doc: Add documentation for the fs.open_mayexec_enforce sysctl
Mickaël Salaün
- [PATCH 2/2] ima: add policy support for the new file open MAY_OPENEXEC flag
Mimi Zohar
- [PATCH 2/2] ima: add policy support for the new file open MAY_OPENEXEC flag
Mickaël Salaün
- [PATCH bpf] security: Fix the default value of fs_context_parse_param hook
KP Singh
- [PATCH] integrity: evm: Fix RCU list related warnings.
madhuparnabhowmik10 at gmail.com
- [PATCH] integrity: evm: Fix RCU list related warnings.
Paul E. McKenney
- [GIT PULL] SELinux fixes for v5.7 (#2)
Paul Moore
- [GIT PULL] SELinux fixes for v5.7 (#2)
Linus Torvalds
- [PATCH v4 1/2] acpi: Extend TPM2 ACPI table with missing log fields
Stefan Berger
- [GIT PULL] SELinux fixes for v5.7 (#2)
pr-tracker-bot at kernel.org
Last message date:
Thu Apr 30 23:50:13 UTC 2020
Archived on: Thu Apr 30 23:50:20 UTC 2020
This archive was generated by
Pipermail 0.09 (Mailman edition).