July 2020 Archives by author
      
      Starting: Wed Jul  1 00:29:00 UTC 2020
         Ending: Fri Jul 31 20:08:04 UTC 2020
         Messages: 937
     
- [PATCH 01/16] Manual pages: getcap.8, getpcaps.8,	setcap.8: SEE ALSO: add capabilities(7)
 
Michael Kerrisk (man-pages)
- [PATCH 02/16] Manual pages: cap_get_file.3, getcap.8,	setcap.8: SEE ALSO: add user_namespaces(7)
 
Michael Kerrisk (man-pages)
- [PATCH 03/16] Manual pages: setcap.8: Formatting fix: use bold for	function name
 
Michael Kerrisk (man-pages)
- [PATCH 04/16] Manual pages: cap_from_text.3: typo fix
 
Michael Kerrisk (man-pages)
- [PATCH 05/16] Manual pages: cap_get_file.3, getcap.8,	setcap.8: clarify "namespace"
 
Michael Kerrisk (man-pages)
- [PATCH 06/16] Manual pages: cap_get_file.3: Remove stray macros that	have no effect
 
Michael Kerrisk (man-pages)
- [PATCH 07/16] Manual pages: cap_get_proc.3:	s/UNCERTAIN/CAP_MODE_UNCERTAIN/
 
Michael Kerrisk (man-pages)
- [PATCH 08/16] Manual pages: cap_get_proc.3: formatting fix
 
Michael Kerrisk (man-pages)
- [PATCH 09/16] Manual pages: capsh.1: spelling fixes
 
Michael Kerrisk (man-pages)
- [PATCH 10/16] Manual pages: capsh.1: Remove stray .TP macro
 
Michael Kerrisk (man-pages)
- [PATCH 11/16] Manual pages: capsh.1: Correct/update the Cap field	example for /proc/PID/status
 
Michael Kerrisk (man-pages)
- [PATCH 12/16] Manual pages: capsh.1: Update the capsh --decode example
 
Michael Kerrisk (man-pages)
- [PATCH 13/16] Manual pages: capsh.1: Describe the argument of	--secbits in more detail
 
Michael Kerrisk (man-pages)
- [PATCH 14/16] pam_cap.c: Spelling fix in output string
 
Michael Kerrisk (man-pages)
- [PATCH 15/16] Various source files: spelling fixes on comments
 
Michael Kerrisk (man-pages)
- [PATCH 16/16] capsh.c: Spelling fixes in usage() message
 
Michael Kerrisk (man-pages)
- [PATCH 16/16] capsh.c: Spelling fixes in usage() message
 
Michael Kerrisk (man-pages)
- [PATCH 00/15] [libcap] Manual pages: various fixes
 
Michael Kerrisk (man-pages)
- [PATCH 01/15] Manual pages: various pages: Use "\-" for real minus	signs
 
Michael Kerrisk (man-pages)
- [PATCH 02/15] Manual pages: cap_init.3: Formatting fix
 
Michael Kerrisk (man-pages)
- [PATCH 03/15] Manual pages: capsh.1: Various minor wording and	formatting fixes
 
Michael Kerrisk (man-pages)
- [PATCH 04/15] Manual pages: cap_copy_ext.3: Typo fix
 
Michael Kerrisk (man-pages)
- [PATCH 05/15] Manual pages;	cap_get_file.3: Fix some clumsily worded text
 
Michael Kerrisk (man-pages)
- [PATCH 06/15] Manual pages: getcap.8: Add missing word
 
Michael Kerrisk (man-pages)
- [PATCH 07/15] Manual pages: getcap.8: Fix a clumsily worded sentence
 
Michael Kerrisk (man-pages)
- [PATCH 08/15] Manual pages: getpcaps.8: Format options as a hanging	list
 
Michael Kerrisk (man-pages)
- [PATCH 09/15] Manual pages: getpcaps.8: Remove a stray .br macro
 
Michael Kerrisk (man-pages)
- [PATCH 10/15] Manual pages: getpcaps.8: SEE ALSO: fix section number	for capsh
 
Michael Kerrisk (man-pages)
- [PATCH 11/15] Manual pages: setcap.8: Typo fix
 
Michael Kerrisk (man-pages)
- [PATCH 12/15] Manual pages: cap_get_file.3: NOTES: note the effect of	the Ambient set
 
Michael Kerrisk (man-pages)
- [PATCH 13/15] Manual pages: cap_get_proc.3: Update description of	capsetp()
 
Michael Kerrisk (man-pages)
- [PATCH 14/15] Manual pages: cap_get_proc.3,	capsh.1: Use "UID" and "GID" consistently
 
Michael Kerrisk (man-pages)
- [PATCH 15/15] Manual pages: capsh.1: Change .TP indent to the default
 
Michael Kerrisk (man-pages)
- [PATCH 12/15] Manual pages: cap_get_file.3: NOTES: note the	effect of the Ambient set
 
Michael Kerrisk (man-pages)
- [PATCH] Manual pages: cap_from_text.3: Clarify a detail of	cap_from_text() action list
 
Michael Kerrisk (man-pages)
- [PATCH] Manual pages: use "root user ID" rather than "rootid"
 
Michael Kerrisk (man-pages)
- PROJECT FINANCING / CAPITAL INVESTMENT.
 
Engr. Issah Ahmed
- Your Partnership
 
Rashid Al-Wahaibi
- [PATCH v2] netfilter: Replace HTTP links with HTTPS ones
 
Pablo Neira Ayuso
- [PATCH v8 00/12] Introduce CAP_PERFMON to secure system	performance monitoring and observability
 
Ravi Bangoria
- [V2 PATCH 1/3] Refactoring powerpc code for carrying over IMA	measurement logs,	to move non architecture specific code to security/ima.
 
Thiago Jung Bauermann
- [PATCH v9 0/2] tpm2: Make TPM2 logs accessible for non-UEFI firmware
 
Stefan Berger
- [PATCH v9 1/2] acpi: Extend TPM2 ACPI table with missing log fields
 
Stefan Berger
- [PATCH v9 2/2] tpm: Add support for event log pointer found in TPM2	ACPI table
 
Stefan Berger
- [PATCH v9 2/2] tpm: Add support for event log pointer found in	TPM2 ACPI table
 
Stefan Berger
- [RESEND,	PATCH v9 0/2] tpm2: Make TPM2 logs accessible for non-UEFI firmware
 
Stefan Berger
- [RESEND,	PATCH v9 1/2] acpi: Extend TPM2 ACPI table with missing log fields
 
Stefan Berger
- [RESEND,	PATCH v9 2/2] tpm: Add support for event log pointer found in TPM2	ACPI table
 
Stefan Berger
- [PATCH v9 2/2] tpm: Add support for event log pointer found in	TPM2 ACPI table
 
Stefan Berger
- [PATCH v9 2/2] tpm: Add support for event log pointer found in	TPM2 ACPI table
 
Stefan Berger
- [PATCH v9 2/2] tpm: Add support for event log pointer found in	TPM2 ACPI table
 
Stefan Berger
- [PATCH v9 2/2] tpm: Add support for event log pointer found in	TPM2 ACPI table
 
Stefan Berger
- [PATCH v19 09/12] arch: Wire up landlock() syscall
 
Arnd Bergmann
- [PATCH v19 09/12] arch: Wire up landlock() syscall
 
Arnd Bergmann
- [PATCH v19 08/12] landlock: Add syscall implementation
 
Arnd Bergmann
- [PATCH v19 09/12] arch: Wire up landlock() syscall
 
Arnd Bergmann
- [PATCH v19 08/12] landlock: Add syscall implementation
 
Arnd Bergmann
- [PATCH v19 08/12] landlock: Add syscall implementation
 
Arnd Bergmann
- [PATCH v2 00/15] Make the user mode driver code a better citizen
 
Eric W. Biederman
- [PATCH v2 05/15] umh: Separate the user mode driver and the user	mode helper support
 
Eric W. Biederman
- [PATCH v2 00/15] Make the user mode driver code a better citizen
 
Eric W. Biederman
- [PATCH v2 00/15] Make the user mode driver code a better citizen
 
Eric W. Biederman
- [PATCH v3 00/16] Make the user mode driver code a better citizen
 
Eric W. Biederman
- [PATCH v3 01/16] umh: Capture the pid in umh_pipe_setup
 
Eric W. Biederman
- [PATCH v3 02/16] umh: Move setting PF_UMH into umh_pipe_setup
 
Eric W. Biederman
- [PATCH v3 03/16] umh: Rename the user mode driver helpers for clarity
 
Eric W. Biederman
- [PATCH v3 04/16] umh: Remove call_usermodehelper_setup_file.
 
Eric W. Biederman
- [PATCH v3 05/16] umh: Separate the user mode driver and the user mode	helper support
 
Eric W. Biederman
- [PATCH v3 06/16] umd: For clarity rename umh_info umd_info
 
Eric W. Biederman
- [PATCH v3 07/16] umd: Rename umd_info.cmdline umd_info.driver_name
 
Eric W. Biederman
- [PATCH v3 08/16] umd: Transform fork_usermode_blob into	fork_usermode_driver
 
Eric W. Biederman
- [PATCH v3 09/16] umh: Stop calling do_execve_file
 
Eric W. Biederman
- [PATCH v3 10/16] exec: Remove do_execve_file
 
Eric W. Biederman
- [PATCH v3 11/16] bpfilter: Move bpfilter_umh back into init data
 
Eric W. Biederman
- [PATCH v3 12/16] umd: Track user space drivers with struct pid
 
Eric W. Biederman
- [PATCH v3 13/16] exit: Factor thread_group_exited out of pidfd_poll
 
Eric W. Biederman
- [PATCH v3 14/16] bpfilter: Take advantage of the facilities of struct	pid
 
Eric W. Biederman
- [PATCH v3 15/16] umd: Remove exit_umh
 
Eric W. Biederman
- [PATCH v3 16/16] umd: Stop using split_argv
 
Eric W. Biederman
- [PATCH v3 13/16] exit: Factor thread_group_exited out of	pidfd_poll
 
Eric W. Biederman
- [PATCH v2 00/15] Make the user mode driver code a better citizen
 
Eric W. Biederman
- [PATCH v3 13/16] exit: Factor thread_group_exited out of	pidfd_poll
 
Eric W. Biederman
- [PATCH v3 13/16] exit: Factor thread_group_exited out of	pidfd_poll
 
Eric W. Biederman
- [PATCH v2 00/15] Make the user mode driver code a better citizen
 
Eric W. Biederman
- [PATCH v3 10/16] exec: Remove do_execve_file
 
Eric W. Biederman
- [merged][PATCH v3 00/16] Make the user mode driver code a better	citizen
 
Eric W. Biederman
- [PATCH 0/7] Implementing kernel_execve
 
Eric W. Biederman
- [PATCH 1/7] exec: Remove unnecessary spaces from binfmts.h
 
Eric W. Biederman
- [PATCH 2/7] exec: Factor out alloc_bprm
 
Eric W. Biederman
- [PATCH 3/7] exec: Move initialization of bprm->filename into	alloc_bprm
 
Eric W. Biederman
- [PATCH 4/7] exec: Move bprm_mm_init into alloc_bprm
 
Eric W. Biederman
- [PATCH 5/7] exec: Factor bprm_execve out of do_execve_common
 
Eric W. Biederman
- [PATCH 6/7] exec: Factor bprm_stack_limits out of prepare_arg_pages
 
Eric W. Biederman
- [PATCH 7/7] exec: Implement kernel_execve
 
Eric W. Biederman
- [PATCH 7/7] exec: Implement kernel_execve
 
Eric W. Biederman
- [RFC PATCH 0/5] keys: Security changes, ACLs and Container keyring
 
Eric W. Biederman
- [PATCH] Smack: fix use-after-free in smk_write_relabel_self()
 
Eric Biggers
- kernel panic: smack: Failed to initialize cipso DOI.
 
Eric Biggers
- [PATCH] Smack: fix use-after-free in smk_write_relabel_self()
 
Eric Biggers
- [RFC PATCH v5 06/11] dm-verity: move signature check after tree	validation
 
Eric Biggers
- [PATCH] bpf: lsm: Disable or enable BPF LSM at boot time
 
Daniel Borkmann
- [PATCH v3 13/16] exit: Factor thread_group_exited out of	pidfd_poll
 
Daniel Borkmann
- linux-next: umh: fix processed error when UMH_WAIT_PROC is used	seems to break linux bridge on s390x (bisected)
 
Christian Borntraeger
- linux-next: umh: fix processed error when UMH_WAIT_PROC is used	seems to break linux bridge on s390x (bisected)
 
Christian Borntraeger
- linux-next: umh: fix processed error when UMH_WAIT_PROC is used	seems to break linux bridge on s390x (bisected)
 
Christian Borntraeger
- linux-next: umh: fix processed error when UMH_WAIT_PROC is used	seems to break linux bridge on s390x (bisected)
 
Christian Borntraeger
- [RFC PATCH v4 00/12] Integrity Policy Enforcement LSM (IPE)
 
Deven Bowers
- [RFC PATCH v4 01/12] scripts: add ipe tooling to generate boot policy
 
Deven Bowers
- [RFC PATCH v4 02/12] security: add ipe lsm evaluation loop and audit	system
 
Deven Bowers
- [RFC PATCH v4 03/12] security: add ipe lsm policy parser and policy	loading
 
Deven Bowers
- [RFC PATCH v4 04/12] ipe: add property for trust of boot volume
 
Deven Bowers
- [RFC PATCH v4 05/12] fs: add security blob and hooks for block_device
 
Deven Bowers
- [RFC PATCH v4 06/12] dm-verity: move signature check after tree	validation
 
Deven Bowers
- [RFC PATCH v4 07/12] dm-verity: add bdev_setsecurity hook for	dm-verity signature
 
Deven Bowers
- [RFC PATCH v4 08/12] ipe: add property for signed dmverity volumes
 
Deven Bowers
- [RFC PATCH v4 09/12] dm-verity: add bdev_setsecurity hook for	root-hash
 
Deven Bowers
- [RFC PATCH v4 10/12] ipe: add property for dmverity roothash
 
Deven Bowers
- [RFC PATCH v4 11/12] documentation: add ipe documentation
 
Deven Bowers
- [RFC PATCH v4 12/12] cleanup: uapi/linux/audit.h
 
Deven Bowers
- [RFC PATCH v4 05/12] fs: add security blob and hooks for	block_device
 
Deven Bowers
- [RFC PATCH v4 02/12] security: add ipe lsm evaluation loop and	audit system
 
Deven Bowers
- [RFC PATCH v5 00/11] Integrity Policy Enforcement LSM (IPE)
 
Deven Bowers
- [RFC PATCH v5 01/11] scripts: add ipe tooling to generate boot policy
 
Deven Bowers
- [RFC PATCH v5 02/11] security: add ipe lsm evaluation loop and audit	system
 
Deven Bowers
- [RFC PATCH v5 03/11] security: add ipe lsm policy parser and policy	loading
 
Deven Bowers
- [RFC PATCH v5 04/11] ipe: add property for trust of boot volume
 
Deven Bowers
- [RFC PATCH v5 05/11] fs: add security blob and hooks for block_device
 
Deven Bowers
- [RFC PATCH v5 06/11] dm-verity: move signature check after tree	validation
 
Deven Bowers
- [RFC PATCH v5 07/11] dm-verity: add bdev_setsecurity hook for	dm-verity signature
 
Deven Bowers
- [RFC PATCH v5 08/11] ipe: add property for signed dmverity volumes
 
Deven Bowers
- [RFC PATCH v5 09/11] dm-verity: add bdev_setsecurity hook for	root-hash
 
Deven Bowers
- [RFC PATCH v5 10/11] documentation: add ipe documentation
 
Deven Bowers
- [RFC PATCH v5 10/12] ipe: add property for dmverity roothash
 
Deven Bowers
- [RFC PATCH v5 11/11] cleanup: uapi/linux/audit.h
 
Deven Bowers
- [RFC PATCH v5 11/12] documentation: add ipe documentation
 
Deven Bowers
- [RFC PATCH v5 12/12] cleanup: uapi/linux/audit.h
 
Deven Bowers
- [RFC PATCH v5 06/11] dm-verity: move signature check after tree	validation
 
Deven Bowers
- [RFC PATCH v5 05/11] fs: add security blob and hooks for	block_device
 
Deven Bowers
- [RFC PATCH v6 00/11] Integrity Policy Enforcement LSM (IPE)
 
Deven Bowers
- [RFC PATCH v6 01/11] scripts: add ipe tooling to generate boot policy
 
Deven Bowers
- [RFC PATCH v6 02/11] security: add ipe lsm evaluation loop and audit	system
 
Deven Bowers
- [RFC PATCH v6 03/11] security: add ipe lsm policy parser and policy	loading
 
Deven Bowers
- [RFC PATCH v6 04/11] ipe: add property for trust of boot volume
 
Deven Bowers
- [RFC PATCH v6 05/11] fs: add security blob and hooks for block_device
 
Deven Bowers
- [RFC PATCH v6 06/11] dm-verity: add bdev_setsecurity hook for	dm-verity signature
 
Deven Bowers
- [RFC PATCH v6 07/11] ipe: add property for signed dmverity volumes
 
Deven Bowers
- [RFC PATCH v6 08/11] dm-verity: add bdev_setsecurity hook for	root-hash
 
Deven Bowers
- [RFC PATCH v6 09/11] ipe: add property for dmverity roothash
 
Deven Bowers
- [RFC PATCH v6 10/11] documentation: add ipe documentation
 
Deven Bowers
- [RFC PATCH v6 11/11] cleanup: uapi/linux/audit.h
 
Deven Bowers
- [PATCH v10 0/9] firmware: add request_partial_firmware_into_buf
 
Scott Branden
- [PATCH v10 1/9] fs: move kernel_read_file* to its own include file
 
Scott Branden
- [PATCH v10 2/9] fs: introduce kernel_pread_file* support
 
Scott Branden
- [PATCH v10 3/9] firmware: add request_partial_firmware_into_buf
 
Scott Branden
- [PATCH v10 4/9] test_firmware: add partial read support for	request_firmware_into_buf
 
Scott Branden
- [PATCH v10 5/9] firmware: test partial file reads of	request_partial_firmware_into_buf
 
Scott Branden
- [PATCH v10 6/9] bcm-vk: add bcm_vk UAPI
 
Scott Branden
- [PATCH v10 8/9] MAINTAINERS: bcm-vk: add maintainer for Broadcom VK	Driver
 
Scott Branden
- [PATCH v10 9/9] ima: add FIRMWARE_PARTIAL_READ support
 
Scott Branden
- [PATCH 2/4] fs: Remove FIRMWARE_PREALLOC_BUFFER from	kernel_read_file() enums
 
Scott Branden
- [PATCH v10 9/9] ima: add FIRMWARE_PARTIAL_READ support
 
Scott Branden
- [PATCH 2/4] fs: Remove FIRMWARE_PREALLOC_BUFFER from	kernel_read_file() enums
 
Scott Branden
- [PATCH v10 9/9] ima: add FIRMWARE_PARTIAL_READ support
 
Scott Branden
- [PATCH v10 1/9] fs: move kernel_read_file* to its own include file
 
Scott Branden
- [PATCH v10 2/9] fs: introduce kernel_pread_file* support
 
Scott Branden
- [PATCH v10 3/9] firmware: add request_partial_firmware_into_buf
 
Scott Branden
- [PATCH v10 4/9] test_firmware: add partial read support for	request_firmware_into_buf
 
Scott Branden
- [PATCH v10 7/9] misc: bcm-vk: add Broadcom VK driver
 
Scott Branden
- [PATCH v10 2/9] fs: introduce kernel_pread_file* support
 
Scott Branden
- [PATCH v10 0/9] firmware: add request_partial_firmware_into_buf
 
Scott Branden
- [PATCH 2/4] fs: Remove FIRMWARE_PREALLOC_BUFFER from	kernel_read_file() enums
 
Scott Branden
- [PATCH 2/4] fs: Remove FIRMWARE_PREALLOC_BUFFER from	kernel_read_file() enums
 
Scott Branden
- [PATCH 2/4] fs: Remove FIRMWARE_PREALLOC_BUFFER from	kernel_read_file() enums
 
Scott Branden
- [PATCH 2/4] fs: Remove FIRMWARE_PREALLOC_BUFFER from	kernel_read_file() enums
 
Scott Branden
- [PATCH 06/13] fs/kernel_read_file: Remove redundant size argument
 
Scott Branden
- [PATCH 01/13] firmware_loader: EFI firmware loader must handle	pre-allocated buffer
 
Scott Branden
- [PATCH 02/13] fs/kernel_read_file: Remove	FIRMWARE_PREALLOC_BUFFER enum
 
Scott Branden
- [PATCH 03/13] fs/kernel_read_file: Remove FIRMWARE_EFI_EMBEDDED	enum
 
Scott Branden
- [PATCH 05/13] fs/kernel_read_file: Split into separate source file
 
Scott Branden
- [PATCH 00/13] Introduce partial kernel_read_file() support
 
Scott Branden
- [PATCH 06/13] fs/kernel_read_file: Remove redundant size argument
 
Scott Branden
- [PATCH 06/13] fs/kernel_read_file: Remove redundant size argument
 
Scott Branden
- [PATCH 06/13] fs/kernel_read_file: Remove redundant size argument
 
Scott Branden
- [PATCH v3 00/19] Introduce partial kernel_read_file() support
 
Scott Branden
- [PATCH v3 00/19] Introduce partial kernel_read_file() support
 
Scott Branden
- [PATCH v3 00/19] Introduce partial kernel_read_file() support
 
Scott Branden
- [PATCH v4 1/3] capabilities: Introduce CAP_CHECKPOINT_RESTORE
 
Christian Brauner
- [PATCH v4 3/3] prctl: Allow ptrace capable processes to change	/proc/self/exe
 
Christian Brauner
- [PATCH v3 13/16] exit: Factor thread_group_exited out of	pidfd_poll
 
Christian Brauner
- [PATCH v3 13/16] exit: Factor thread_group_exited out of	pidfd_poll
 
Christian Brauner
- [PATCH v4 3/3] prctl: Allow ptrace capable processes to change	/proc/self/exe
 
Christian Brauner
- [PATCH v4 3/3] prctl: Allow ptrace capable processes to change	/proc/self/exe
 
Christian Brauner
- [PATCH v19 08/12] landlock: Add syscall implementation
 
Christian Brauner
- [PATCH v5 1/6] capabilities: Introduce CAP_CHECKPOINT_RESTORE
 
Christian Brauner
- [PATCH v5 2/6] pid: use checkpoint_restore_ns_capable() for	set_tid
 
Christian Brauner
- [PATCH v5 3/6] pid_namespace: use	checkpoint_restore_ns_capable() for ns_last_pid
 
Christian Brauner
- [PATCH v5 5/6] prctl: Allow checkpoint/restore capable processes	to change exe link
 
Christian Brauner
- [PATCH v5 6/6] selftests: add clone3() CAP_CHECKPOINT_RESTORE test
 
Christian Brauner
- [PATCH v5 4/6] proc: allow access in init userns for map_files	with CAP_CHECKPOINT_RESTORE
 
Christian Brauner
- [PATCH v5 0/6] capabilities: Introduce CAP_CHECKPOINT_RESTORE
 
Christian Brauner
- [PATCH v6 0/7] capabilities: Introduce CAP_CHECKPOINT_RESTORE
 
Christian Brauner
- [PATCH v6 0/7] capabilities: Introduce CAP_CHECKPOINT_RESTORE
 
Christian Brauner
- [PATCH v6 0/7] capabilities: Introduce CAP_CHECKPOINT_RESTORE
 
Christian Brauner
- [PATCH v7 0/7] Add support for O_MAYEXEC
 
Christian Brauner
- [PATCH ghak96 v3] audit: issue CWD record to accompany	LSM_AUDIT_DATA_* records
 
Richard Guy Briggs
- [PATCH ghak84 v2] audit: purge audit_log_string from the intra-kernel	audit API
 
Richard Guy Briggs
- [PATCH ghak84 v3] audit: purge audit_log_string from the intra-kernel	audit API
 
Richard Guy Briggs
- [PATCH ghak84 v3] audit: purge audit_log_string from the	intra-kernel audit API
 
Richard Guy Briggs
- [PATCH ghak84 v4] audit: purge audit_log_string from the intra-kernel	audit API
 
Richard Guy Briggs
- [PATCH ghak84 v4] audit: purge audit_log_string from the	intra-kernel audit API
 
Richard Guy Briggs
- [PATCH ghak84 v4] audit: purge audit_log_string from the	intra-kernel audit API
 
Richard Guy Briggs
- [PATCH V3fix ghak120] audit: initialize context values in case of	mandatory events
 
Richard Guy Briggs
- [PATCH V3fix ghak120] audit: initialize context values in case	of mandatory events
 
Richard Guy Briggs
- [PATCH V3fix ghak120] audit: initialize context values in case	of mandatory events
 
Richard Guy Briggs
- [PATCH v8 00/12] Introduce CAP_PERFMON to secure system	performance monitoring and observability
 
Alexey Budankov
- [PATCH v8 00/12] Introduce CAP_PERFMON to secure system	performance monitoring and observability
 
Alexey Budankov
- [PATCH v8 00/12] Introduce CAP_PERFMON to secure system	performance monitoring and observability
 
Alexey Budankov
- [PATCH v8 00/12] Introduce CAP_PERFMON to secure system	performance monitoring and observability
 
Alexey Budankov
- [PATCH 1/2] Smack: fix another vsscanf out of bounds
 
Dan Carpenter
- [PATCH 2/2] Smack: prevent underflow in smk_set_cipso()
 
Dan Carpenter
- [PATCH 2/2] LSM: SafeSetID: Add GID security policy handling
 
Thomas Cedeno
- INFO: task hung in request_key_tag
 
Luis Chamberlain
- linux-next: umh: fix processed error when UMH_WAIT_PROC is used	seems to break linux bridge on s390x (bisected)
 
Luis Chamberlain
- linux-next: umh: fix processed error when UMH_WAIT_PROC is used	seems to break linux bridge on s390x (bisected)
 
Luis Chamberlain
- linux-next: umh: fix processed error when UMH_WAIT_PROC is used	seems to break linux bridge on s390x (bisected)
 
Luis Chamberlain
- linux-next: umh: fix processed error when UMH_WAIT_PROC is used	seems to break linux bridge on s390x (bisected)
 
Luis Chamberlain
- linux-next: umh: fix processed error when UMH_WAIT_PROC is used	seems to break linux bridge on s390x (bisected)
 
Luis Chamberlain
- linux-next: umh: fix processed error when UMH_WAIT_PROC is used	seems to break linux bridge on s390x (bisected)
 
Luis Chamberlain
- [v2 PATCH] crypto: af_alg - Fix regression on empty requests
 
Luis Chamberlain
- [PATCH v2 00/15] Make the user mode driver code a better citizen
 
Luis Chamberlain
- [PATCH v3 10/16] exec: Remove do_execve_file
 
Luis Chamberlain
- [PATCH 0/4] Fix misused kernel_read_file() enums
 
Luis Chamberlain
- [PATCH v3 10/16] exec: Remove do_execve_file
 
Luis Chamberlain
- [PATCH 0/4] Fix misused kernel_read_file() enums
 
Luis Chamberlain
- [PATCH v3 10/16] exec: Remove do_execve_file
 
Luis Chamberlain
- [PATCH v3 18/19] firmware: Add request_partial_firmware_into_buf()
 
Luis Chamberlain
- [PATCH v3 00/19] Introduce partial kernel_read_file() support
 
Luis Chamberlain
- [PATCH 0/3] fs: reduce export usage of kerne_read*() calls
 
Luis Chamberlain
- [PATCH v33 11/21] x86/sgx: Linux Enclave Driver
 
Sean Christopherson
- [PATCH v33 11/21] x86/sgx: Linux Enclave Driver
 
Sean Christopherson
- [PATCH v34 11/24] x86/sgx: Add SGX enclave driver
 
Sean Christopherson
- [PATCH v34 11/24] x86/sgx: Add SGX enclave driver
 
Sean Christopherson
- [PATCH v10 9/9] ima: add FIRMWARE_PARTIAL_READ support
 
Kees Cook
- [PATCH 0/4] Fix misused kernel_read_file() enums
 
Kees Cook
- [PATCH 1/4] firmware_loader: EFI firmware loader must handle	pre-allocated buffer
 
Kees Cook
- [PATCH 2/4] fs: Remove FIRMWARE_PREALLOC_BUFFER from	kernel_read_file() enums
 
Kees Cook
- [PATCH 3/4] fs: Remove FIRMWARE_EFI_EMBEDDED from kernel_read_file()	enums
 
Kees Cook
- [PATCH 4/4] module: Add hook for security_kernel_post_read_file()
 
Kees Cook
- [PATCH 0/4] Fix misused kernel_read_file() enums
 
Kees Cook
- [PATCH 2/4] fs: Remove FIRMWARE_PREALLOC_BUFFER from	kernel_read_file() enums
 
Kees Cook
- [PATCH v10 9/9] ima: add FIRMWARE_PARTIAL_READ support
 
Kees Cook
- [PATCH v10 1/9] fs: move kernel_read_file* to its own include file
 
Kees Cook
- [PATCH v10 2/9] fs: introduce kernel_pread_file* support
 
Kees Cook
- [PATCH v10 3/9] firmware: add request_partial_firmware_into_buf
 
Kees Cook
- [PATCH v10 4/9] test_firmware: add partial read support for	request_firmware_into_buf
 
Kees Cook
- [PATCH v10 7/9] misc: bcm-vk: add Broadcom VK driver
 
Kees Cook
- [PATCH 4/4] module: Add hook for security_kernel_post_read_file()
 
Kees Cook
- [PATCH 2/4] fs: Remove FIRMWARE_PREALLOC_BUFFER from	kernel_read_file() enums
 
Kees Cook
- [PATCH 0/4] Fix misused kernel_read_file() enums
 
Kees Cook
- [PATCH 2/4] fs: Remove FIRMWARE_PREALLOC_BUFFER from	kernel_read_file() enums
 
Kees Cook
- [PATCH 4/7] exec: Move bprm_mm_init into alloc_bprm
 
Kees Cook
- [PATCH 5/7] exec: Factor bprm_execve out of do_execve_common
 
Kees Cook
- [PATCH 1/7] exec: Remove unnecessary spaces from binfmts.h
 
Kees Cook
- [PATCH 2/7] exec: Factor out alloc_bprm
 
Kees Cook
- [PATCH 3/7] exec: Move initialization of bprm->filename into	alloc_bprm
 
Kees Cook
- [PATCH 6/7] exec: Factor bprm_stack_limits out of	prepare_arg_pages
 
Kees Cook
- [PATCH 7/7] exec: Implement kernel_execve
 
Kees Cook
- [PATCH 7/7] exec: Implement kernel_execve
 
Kees Cook
- [PATCH 7/7] exec: Implement kernel_execve
 
Kees Cook
- [PATCH v6 4/7] fs: Introduce O_MAYEXEC flag for openat2(2)
 
Kees Cook
- [PATCH v6 5/7] fs,doc: Enable to enforce noexec mounts or file	exec through O_MAYEXEC
 
Kees Cook
- [PATCH v6 6/7] selftest/openat2: Add tests for O_MAYEXEC enforcing
 
Kees Cook
- [PATCH v6 7/7] ima: add policy support for the new file open	MAY_OPENEXEC flag
 
Kees Cook
- [PATCH v6 4/7] fs: Introduce O_MAYEXEC flag for openat2(2)
 
Kees Cook
- [PATCH v6 7/7] ima: add policy support for the new file open	MAY_OPENEXEC flag
 
Kees Cook
- [PATCH v6 7/7] ima: add policy support for the new file open	MAY_OPENEXEC flag
 
Kees Cook
- [PATCH 2/4] fs: Remove FIRMWARE_PREALLOC_BUFFER from	kernel_read_file() enums
 
Kees Cook
- [PATCH 00/13] Introduce partial kernel_read_file() support
 
Kees Cook
- [PATCH 01/13] firmware_loader: EFI firmware loader must handle	pre-allocated buffer
 
Kees Cook
- [PATCH 02/13] fs/kernel_read_file: Remove FIRMWARE_PREALLOC_BUFFER	enum
 
Kees Cook
- [PATCH 03/13] fs/kernel_read_file: Remove FIRMWARE_EFI_EMBEDDED enum
 
Kees Cook
- [PATCH 04/13] fs/kernel_read_file: Split into separate include file
 
Kees Cook
- [PATCH 05/13] fs/kernel_read_file: Split into separate source file
 
Kees Cook
- [PATCH 06/13] fs/kernel_read_file: Remove redundant size argument
 
Kees Cook
- [PATCH 07/13] fs/kernel_read_file: Switch buffer size arg to size_t
 
Kees Cook
- [PATCH 08/13] fs/kernel_read_file: Add file_size output argument
 
Kees Cook
- [PATCH 09/13] LSM: Introduce kernel_post_load_data() hook
 
Kees Cook
- [PATCH 10/13] firmware_loader: Use security_post_load_data()
 
Kees Cook
- [PATCH 11/13] module: Call security_kernel_post_load_data()
 
Kees Cook
- [PATCH 12/13] LSM: Add "contents" flag to kernel_read_file hook
 
Kees Cook
- [PATCH 13/13] fs/kernel_file_read: Add "offset" arg for partial reads
 
Kees Cook
- [PATCH 06/13] fs/kernel_read_file: Remove redundant size argument
 
Kees Cook
- [PATCH 00/13] Introduce partial kernel_read_file() support
 
Kees Cook
- [PATCH 06/13] fs/kernel_read_file: Remove redundant size argument
 
Kees Cook
- [PATCH v6 5/7] fs,doc: Enable to enforce noexec mounts or file	exec through O_MAYEXEC
 
Kees Cook
- [PATCH v7 4/7] fs: Introduce O_MAYEXEC flag for openat2(2)
 
Kees Cook
- [PATCH v7 5/7] fs,doc: Enable to enforce noexec mounts or file	exec through O_MAYEXEC
 
Kees Cook
- [PATCH v7 6/7] selftest/openat2: Add tests for O_MAYEXEC enforcing
 
Kees Cook
- [PATCH v7 7/7] ima: add policy support for the new file open	MAY_OPENEXEC flag
 
Kees Cook
- [PATCH v7 0/7] Add support for O_MAYEXEC
 
Kees Cook
- [PATCH v3 00/19] Introduce partial kernel_read_file() support
 
Kees Cook
- [PATCH v3 01/19] test_firmware: Test platform fw loading on non-EFI	systems
 
Kees Cook
- [PATCH v3 02/19] selftest/firmware: Add selftest timeout in settings
 
Kees Cook
- [PATCH v3 03/19] firmware_loader: EFI firmware loader must handle	pre-allocated buffer
 
Kees Cook
- [PATCH v3 04/19] fs/kernel_read_file: Remove FIRMWARE_PREALLOC_BUFFER	enum
 
Kees Cook
- [PATCH v3 05/19] fs/kernel_read_file: Remove FIRMWARE_EFI_EMBEDDED	enum
 
Kees Cook
- [PATCH v3 06/19] fs/kernel_read_file: Split into separate include file
 
Kees Cook
- [PATCH v3 07/19] fs/kernel_read_file: Split into separate source file
 
Kees Cook
- [PATCH v3 08/19] fs/kernel_read_file: Remove redundant size argument
 
Kees Cook
- [PATCH v3 09/19] fs/kernel_read_file: Switch buffer size arg to size_t
 
Kees Cook
- [PATCH v3 10/19] fs/kernel_read_file: Add file_size output argument
 
Kees Cook
- [PATCH v3 11/19] LSM: Introduce kernel_post_load_data() hook
 
Kees Cook
- [PATCH v3 12/19] firmware_loader: Use security_post_load_data()
 
Kees Cook
- [PATCH v3 13/19] module: Call security_kernel_post_load_data()
 
Kees Cook
- [PATCH v3 14/19] LSM: Add "contents" flag to kernel_read_file hook
 
Kees Cook
- [PATCH v3 15/19] IMA: Add support for file reads without contents
 
Kees Cook
- [PATCH v3 16/19] fs/kernel_file_read: Add "offset" arg for partial	reads
 
Kees Cook
- [PATCH v3 17/19] firmware: Store opt_flags in fw_priv
 
Kees Cook
- [PATCH v3 18/19] firmware: Add request_partial_firmware_into_buf()
 
Kees Cook
- [PATCH v3 19/19] test_firmware: Test partial read support
 
Kees Cook
- [PATCH v3 00/19] Introduce partial kernel_read_file() support
 
Kees Cook
- [PATCH v3 03/19] firmware_loader: EFI firmware loader must	handle pre-allocated buffer
 
Kees Cook
- [PATCH v3 11/19] LSM: Introduce kernel_post_load_data() hook
 
Kees Cook
- [PATCH v3 12/19] firmware_loader: Use security_post_load_data()
 
Kees Cook
- [PATCH v3 15/19] IMA: Add support for file reads without contents
 
Kees Cook
- [PATCH v3 15/19] IMA: Add support for file reads without contents
 
Kees Cook
- [PATCH v3 18/19] firmware: Add request_partial_firmware_into_buf()
 
Kees Cook
- [PATCH v4 00/17] Introduce partial kernel_read_file() support
 
Kees Cook
- [PATCH v4 01/17] test_firmware: Test platform fw loading on non-EFI	systems
 
Kees Cook
- [PATCH v4 02/17] fs/kernel_read_file: Remove FIRMWARE_PREALLOC_BUFFER	enum
 
Kees Cook
- [PATCH v4 03/17] fs/kernel_read_file: Remove FIRMWARE_EFI_EMBEDDED	enum
 
Kees Cook
- [PATCH v4 04/17] fs/kernel_read_file: Split into separate include file
 
Kees Cook
- [PATCH v4 05/17] fs/kernel_read_file: Split into separate source file
 
Kees Cook
- [PATCH v4 06/17] fs/kernel_read_file: Remove redundant size argument
 
Kees Cook
- [PATCH v4 07/17] fs/kernel_read_file: Switch buffer size arg to size_t
 
Kees Cook
- [PATCH v4 08/17] fs/kernel_read_file: Add file_size output argument
 
Kees Cook
- [PATCH v4 09/17] LSM: Introduce kernel_post_load_data() hook
 
Kees Cook
- [PATCH v4 10/17] firmware_loader: Use security_post_load_data()
 
Kees Cook
- [PATCH v4 11/17] module: Call security_kernel_post_load_data()
 
Kees Cook
- [PATCH v4 12/17] LSM: Add "contents" flag to kernel_read_file hook
 
Kees Cook
- [PATCH v4 13/17] IMA: Add support for file reads without contents
 
Kees Cook
- [PATCH v4 14/17] fs/kernel_file_read: Add "offset" arg for partial	reads
 
Kees Cook
- [PATCH v4 15/17] firmware: Store opt_flags in fw_priv
 
Kees Cook
- [PATCH v4 16/17] firmware: Add request_partial_firmware_into_buf()
 
Kees Cook
- [PATCH v4 17/17] test_firmware: Test partial read support
 
Kees Cook
- [PATCH v3 12/19] firmware_loader: Use security_post_load_data()
 
Kees Cook
- [PATCH v19 07/12] landlock: Support filesystem access-control
 
Randy Dunlap
- [PATCH v6 5/7] fs,doc: Enable to enforce noexec mounts or file	exec through O_MAYEXEC
 
Randy Dunlap
- [PATCH v6 7/7] ima: add policy support for the new file open	MAY_OPENEXEC flag
 
Randy Dunlap
- [RFC PATCH v4 02/12] security: add ipe lsm evaluation loop and	audit system
 
Randy Dunlap
- [PATCH] LSM: drop duplicated words in header file comments
 
Randy Dunlap
- [PATCH v10 0/9] firmware: add request_partial_firmware_into_buf
 
Florian Fainelli
- [PATCH] bpf: lsm: Disable or enable BPF LSM at boot time
 
Lorenzo Fontana
- [PATCH] bpf: lsm: Disable or enable BPF LSM at boot time
 
Lorenzo Fontana
- [PATCH 0/4] Fix misused kernel_read_file() enums
 
Hans de Goede
- [PATCH 0/4] Fix misused kernel_read_file() enums
 
Hans de Goede
- [PATCH 0/4] Fix misused kernel_read_file() enums
 
Hans de Goede
- [PATCH v4 3/3] prctl: Allow ptrace capable processes to change	/proc/self/exe
 
Cyrill Gorcunov
- [PATCH v5 4/6] proc: allow access in init userns for map_files	with CAP_CHECKPOINT_RESTORE
 
Cyrill Gorcunov
- [PATCH v33 12/21] x86/sgx: Allow a limited use of	ATTRIBUTE.PROVISIONKEY for attestation
 
Dr. Greg
- [PATCH v4 2/3] selftests: add clone3() CAP_CHECKPOINT_RESTORE test
 
Serge E. Hallyn
- [PATCH v4 3/3] prctl: Allow ptrace capable processes to change	/proc/self/exe
 
Serge E. Hallyn
- [PATCH v4 3/3] prctl: Allow ptrace capable processes to change	/proc/self/exe
 
Serge E. Hallyn
- [PATCH v4 2/3] selftests: add clone3() CAP_CHECKPOINT_RESTORE test
 
Serge E. Hallyn
- [PATCH] capabilities: Replace HTTP links with HTTPS ones
 
Serge E. Hallyn
- [PATCH] LSM: drop duplicated words in header file comments
 
Serge E. Hallyn
- [PATCH v5 0/6] capabilities: Introduce CAP_CHECKPOINT_RESTORE
 
Serge E. Hallyn
- [PATCH v6 4/7] proc: allow access in init userns for map_files	with CAP_CHECKPOINT_RESTORE
 
Serge E. Hallyn
- [PATCH v6 6/7] prctl: exe link permission error changed from	-EINVAL to -EPERM
 
Serge E. Hallyn
- [PATCH 1/2] LSM: Signal to SafeSetID when in set*gid syscall
 
Serge E. Hallyn
- [PATCH 2/2] LSM: SafeSetID: Add GID security policy handling
 
Serge E. Hallyn
- [PATCH 2/2] LSM: SafeSetID: Add GID security policy handling
 
Serge E. Hallyn
- Ich grüße dich im Namen des Herrn
 
Theresa Han
- INFO: task hung in request_key_tag
 
Tetsuo Handa
- INFO: task hung in request_key_tag
 
Tetsuo Handa
- linux-next: umh: fix processed error when UMH_WAIT_PROC is used	seems to break linux bridge on s390x (bisected)
 
Tetsuo Handa
- linux-next: umh: fix processed error when UMH_WAIT_PROC is used	seems to break linux bridge on s390x (bisected)
 
Tetsuo Handa
- linux-next: umh: fix processed error when UMH_WAIT_PROC is used	seems to break linux bridge on s390x (bisected)
 
Tetsuo Handa
- [PATCH v2 00/15] Make the user mode driver code a better citizen
 
Tetsuo Handa
- [PATCH v3 00/16] Make the user mode driver code a better citizen
 
Tetsuo Handa
- linux-next: umh: fix processed error when UMH_WAIT_PROC is used	seems to break linux bridge on s390x (bisected)
 
Tetsuo Handa
- [PATCH v2 00/15] Make the user mode driver code a better citizen
 
Tetsuo Handa
- [PATCH v2 00/15] Make the user mode driver code a better citizen
 
Tetsuo Handa
- [fs] 140402bab8: stress-ng.splice.ops_per_sec -100.0% regression
 
Christoph Hellwig
- [PATCH 1/7] exec: Remove unnecessary spaces from binfmts.h
 
Christoph Hellwig
- [PATCH 2/7] exec: Factor out alloc_bprm
 
Christoph Hellwig
- [PATCH 3/7] exec: Move initialization of bprm->filename into	alloc_bprm
 
Christoph Hellwig
- [PATCH 4/7] exec: Move bprm_mm_init into alloc_bprm
 
Christoph Hellwig
- [PATCH 5/7] exec: Factor bprm_execve out of do_execve_common
 
Christoph Hellwig
- [PATCH 6/7] exec: Factor bprm_stack_limits out of	prepare_arg_pages
 
Christoph Hellwig
- [PATCH 7/7] exec: Implement kernel_execve
 
Christoph Hellwig
- [PATCH 7/7] exec: Implement kernel_execve
 
Christoph Hellwig
- [PATCH 7/7] exec: Implement kernel_execve
 
Christoph Hellwig
- [PATCH v2 11/11] ima: Support additional conditionals in the	KEXEC_CMDLINE hook function
 
Tyler Hicks
- [PATCH v2 09/11] ima: Move validation of the keyrings	conditional into ima_validate_rule()
 
Tyler Hicks
- [PATCH v2 09/11] ima: Move validation of the keyrings	conditional into ima_validate_rule()
 
Tyler Hicks
- [PATCH v3 00/12] ima: Fix rule parsing bugs and extend KEXEC_CMDLINE	rule support
 
Tyler Hicks
- [PATCH v3 01/12] ima: Have the LSM free its audit rule
 
Tyler Hicks
- [PATCH v3 02/12] ima: Free the entire rule when deleting a list of	rules
 
Tyler Hicks
- [PATCH v3 03/12] ima: Free the entire rule if it fails to parse
 
Tyler Hicks
- [PATCH v3 04/12] ima: Fail rule parsing when buffer hook functions	have an invalid action
 
Tyler Hicks
- [PATCH v3 05/12] ima: Fail rule parsing when the KEXEC_CMDLINE hook	is combined with an invalid cond
 
Tyler Hicks
- [PATCH v3 06/12] ima: Fail rule parsing when the KEY_CHECK hook is	combined with an invalid cond
 
Tyler Hicks
- [PATCH v3 07/12] ima: Fail rule parsing when appraise_flag=blacklist	is unsupportable
 
Tyler Hicks
- [PATCH v3 08/12] ima: Shallow copy the args_p member of	ima_rule_entry.lsm elements
 
Tyler Hicks
- [PATCH v3 09/12] ima: Use correct type for the args_p member of	ima_rule_entry.lsm elements
 
Tyler Hicks
- [PATCH v3 10/12] ima: Move comprehensive rule validation checks out	of the token parser
 
Tyler Hicks
- [PATCH v3 11/12] ima: Use the common function to detect LSM	conditionals in a rule
 
Tyler Hicks
- [PATCH v3 12/12] ima: Support additional conditionals in the	KEXEC_CMDLINE hook function
 
Tyler Hicks
- [PATCH] ima: Rename internal audit rule functions
 
Tyler Hicks
- [PATCH v2] ima: Rename internal audit rule functions
 
Tyler Hicks
- [RFC PATCH v3 03/12] security: add ipe lsm policy parser and	policy loading
 
Tyler Hicks
- [PATCH v3 07/12] ima: Fail rule parsing when	appraise_flag=blacklist is unsupportable
 
Tyler Hicks
- [PATCH v3 00/12] ima: Fix rule parsing bugs and extend	KEXEC_CMDLINE rule support
 
Tyler Hicks
- [PATCH v3 08/12] ima: Shallow copy the args_p member of	ima_rule_entry.lsm elements
 
Tyler Hicks
- [PATCH v3 07/12] ima: Fail rule parsing when	appraise_flag=blacklist is unsupportable
 
Tyler Hicks
- [PATCH v3 06/12] ima: Fail rule parsing when the KEY_CHECK hook	is combined with an invalid cond
 
Tyler Hicks
- [PATCH v3 01/12] ima: Have the LSM free its audit rule
 
Tyler Hicks
- [PATCH v3 06/12] ima: Fail rule parsing when the KEY_CHECK hook	is combined with an invalid cond
 
Tyler Hicks
- [PATCH 0/2] ima: Fix keyrings race condition and other key related	bugs
 
Tyler Hicks
- [PATCH 1/2] ima: Pre-parse the list of keyrings in a KEY_CHECK rule
 
Tyler Hicks
- [PATCH 2/2] ima: Fail rule parsing when asymmetric key measurement	isn't supportable
 
Tyler Hicks
- [PATCH v5 1/4] IMA: Add func to measure LSM state and policy
 
Tyler Hicks
- [PATCH v5 2/4] IMA: Define IMA hooks to measure LSM state and	policy
 
Tyler Hicks
- [PATCH v5 1/4] IMA: Add func to measure LSM state and policy
 
Tyler Hicks
- [PATCH v5 4/4] IMA: Handle early boot data measurement
 
Tyler Hicks
- [PATCH v18 22/23] LSM: Add /proc attr entry for full LSM context
 
Jann Horn
- [PATCH] keys: asymmetric: fix error return code in	software_key_query()
 
David Howells
- [RFC PATCH 0/5] keys: Security changes, ACLs and Container keyring
 
David Howells
- [RFC PATCH 1/5] keys: Move permissions checking decisions into the	checking code
 
David Howells
- [RFC PATCH 3/5] keys: Provide KEYCTL_GRANT_PERMISSION
 
David Howells
- [RFC PATCH 4/5] keys: Split the search perms between KEY_NEED_USE and	KEY_NEED_SEARCH
 
David Howells
- [RFC PATCH 5/5] keys: Implement a 'container' keyring
 
David Howells
- [PATCH] KEYS: remove redundant memsets
 
David Howells
- [PATCH] keys: asymmetric: fix error return code in	software_key_query()
 
David Howells
- [PATCH] keys: asymmetric: fix error return code in	software_key_query()
 
David Howells
- [PATCH 13/17] watch_queue: Implement mount topology and attribute	change notifications [ver #5]
 
David Howells
- [PATCH 13/17] watch_queue: Implement mount topology and attribute	change notifications [ver #5]
 
David Howells
- [PATCH 13/17] watch_queue: Implement mount topology and attribute	change notifications [ver #5]
 
David Howells
- [PATCH 0/4] Mount notifications
 
David Howells
- [PATCH 1/4] watch_queue: Make watch_sizeof() check record size
 
David Howells
- [PATCH 2/4] watch_queue: Add security hooks to rule on setting mount	watches
 
David Howells
- [PATCH 3/4] watch_queue: Implement mount topology and attribute	change notifications
 
David Howells
- [PATCH 4/4] watch_queue: sample: Display mount tree change	notifications
 
David Howells
- [PATCH 00/17] VFS: Filesystem information [ver #20]
 
David Howells
- [PATCH 01/17] fsinfo: Introduce a non-repeating system-unique	superblock ID [ver #20]
 
David Howells
- [PATCH 02/17] fsinfo: Add fsinfo() syscall to query filesystem	information [ver #20]
 
David Howells
- [PATCH 03/17] fsinfo: Provide a bitmap of the features a filesystem	supports [ver #20]
 
David Howells
- [PATCH 04/17] fsinfo: Allow retrieval of superblock devname,	options and stats [ver #20]
 
David Howells
- [PATCH 05/17] fsinfo: Allow fsinfo() to look up a mount object by ID	[ver #20]
 
David Howells
- [PATCH 06/17] fsinfo: Add a uniquifier ID to struct mount [ver #20]
 
David Howells
- [PATCH 07/17] fsinfo: Allow mount information to be queried [ver #20]
 
David Howells
- [PATCH 08/17] fsinfo: Allow mount topology and propagation info to be	retrieved [ver #20]
 
David Howells
- [PATCH 09/17] fsinfo: Provide notification overrun handling support	[ver #20]
 
David Howells
- [PATCH 10/17] fsinfo: sample: Mount listing program [ver #20]
 
David Howells
- [PATCH 11/17] fsinfo: Add API documentation [ver #20]
 
David Howells
- [PATCH 12/17] fsinfo: Add support for AFS [ver #20]
 
David Howells
- [PATCH 13/17] fsinfo: Add support to ext4 [ver #20]
 
David Howells
- [PATCH 14/17] fsinfo: Add an attribute that lists all the visible	mounts in a namespace [ver #20]
 
David Howells
- [PATCH 15/17] errseq: add a new errseq_scrape function [ver #20]
 
David Howells
- [PATCH 16/17] vfs: allow fsinfo to fetch the current state of	s_wb_err [ver #20]
 
David Howells
- [PATCH 17/17] samples: add error state information to test-fsinfo.c	[ver #20]
 
David Howells
- [PATCH 3/4] watch_queue: Implement mount topology and attribute	change notifications
 
David Howells
- [PATCH 3/4] watch_queue: Implement mount topology and attribute	change notifications
 
David Howells
- [PATCH] watch_queue: Limit the number of watches a user can hold
 
David Howells
- [PATCH] watch_queue: Limit the number of watches a user can hold
 
David Howells
- [PATCH] watch_queue: Limit the number of watches a user can hold
 
David Howells
- [PATCH v3 18/19] firmware: Add request_partial_firmware_into_buf()
 
Takashi Iwai
- [PATCH] Replace HTTP links with HTTPS ones: security
 
John Johansen
- [PATCH v18 05/23] net: Prepare UDS for security module stacking
 
John Johansen
- [PATCH ghak84 v4] audit: purge audit_log_string from the	intra-kernel audit API
 
John Johansen
- [PATCH v19 13/23] LSM: Specify which LSM to display
 
John Johansen
- [PATCH v19 04/23] LSM: Use lsmblob in security_kernel_act_as
 
John Johansen
- [PATCH v19 05/23] net: Prepare UDS for security module stacking
 
John Johansen
- [PATCH v19 06/23] LSM: Use lsmblob in security_secctx_to_secid
 
John Johansen
- [PATCH v19 13/23] LSM: Specify which LSM to display
 
John Johansen
- [PATCH v19 02/23] LSM: Create and manage the lsmblob data	structure.
 
John Johansen
- [PATCH v19 15/23] LSM: Use lsmcontext in security_secid_to_secctx
 
John Johansen
- [PATCH v19 16/23] LSM: Use lsmcontext in security_inode_getsecctx
 
John Johansen
- [PATCH v19 06/23] LSM: Use lsmblob in security_secctx_to_secid
 
John Johansen
- [PATCH v19 19/23] LSM: Verify LSM display sanity in binder
 
John Johansen
- [PATCH v19 23/23] AppArmor: Remove the exclusive flag
 
John Johansen
- [PATCH v19 22/23] LSM: Add /proc attr entry for full LSM context
 
John Johansen
- [PATCH v19 22/23] LSM: Add /proc attr entry for full LSM context
 
John Johansen
- [PATCH v1 2/4] [RFC] x86/trampfd: Provide support for the	trampoline file descriptor
 
Greg KH
- [PATCH v3 08/12] ima: Shallow copy the args_p member of	ima_rule_entry.lsm elements
 
Konsta Karsisto
- [PATCH 13/17] watch_queue: Implement mount topology and	attribute change notifications [ver #5]
 
Ian Kent
- [PATCH] integrity: remove redundant initialization of variable ret
 
Colin King
- [PATCH] Replace HTTP links with HTTPS ones: security
 
Alexander A. Klimov
- [PATCH] Replace HTTP links with HTTPS ones: IPv*
 
Alexander A. Klimov
- [PATCH] capabilities: Replace HTTP links with HTTPS ones
 
Alexander A. Klimov
- [PATCH for v5.9] netfilter: xtables: Replace HTTP links with HTTPS	ones
 
Alexander A. Klimov
- [PATCH v2] netfilter: Replace HTTP links with HTTPS ones
 
Alexander A. Klimov
- [PATCH v3 1/1] fs: move kernel_read_file* to its own include file
 
Greg Kroah-Hartman
- [PATCH 0/4] Fix misused kernel_read_file() enums
 
Greg Kroah-Hartman
- [PATCH v3 00/19] Introduce partial kernel_read_file() support
 
Greg Kroah-Hartman
- [PATCH v3 03/19] firmware_loader: EFI firmware loader must	handle pre-allocated buffer
 
Greg Kroah-Hartman
- [PATCH v3 03/19] firmware_loader: EFI firmware loader must	handle pre-allocated buffer
 
Greg Kroah-Hartman
- [PATCH v3 15/19] IMA: Add support for file reads without contents
 
Greg Kroah-Hartman
- FROM MR. MOORE
 
MOORE GATES LTD
- [PATCH 7/7] exec: Implement kernel_execve
 
David Laight
- [PATCH 7/7] exec: Implement kernel_execve
 
David Laight
- [PATCH 07/13] fs/kernel_read_file: Switch buffer size arg to	size_t
 
David Laight
- [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
 
David Laight
- [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
 
David Laight
- [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
 
David Laight
- [PATCH bpf-next v2 1/4] bpf: Generalize bpf_sk_storage
 
Martin KaFai Lau
- [PATCH bpf-next v4 1/4] bpf: Generalize bpf_sk_storage
 
Martin KaFai Lau
- [PATCH bpf-next v4 2/4] bpf: Implement bpf_local_storage for	inodes
 
Martin KaFai Lau
- [PATCH bpf-next v6 1/7] bpf: Renames to prepare for generalizing	sk_storage.
 
Martin KaFai Lau
- [PATCH bpf-next v6 3/7] bpf: Generalize bpf_sk_storage
 
Martin KaFai Lau
- [RFC PATCH bpf-next] bpf: POC on local_storage charge and uncharge	map_ops
 
Martin KaFai Lau
- [RFC PATCH bpf-next] bpf: POC on local_storage charge and	uncharge map_ops
 
Martin KaFai Lau
- [PATCH bpf-next v7 5/7] bpf: Implement bpf_local_storage for	inodes
 
Martin KaFai Lau
- [PATCH bpf-next v7 5/7] bpf: Implement bpf_local_storage for	inodes
 
Martin KaFai Lau
- [PATCH AUTOSEL 5.7 03/30] ima: extend boot_aggregate with kernel	measurements
 
Sasha Levin
- [PATCH AUTOSEL 5.4 03/16] ima: extend boot_aggregate with kernel	measurements
 
Sasha Levin
- [PATCH AUTOSEL 5.7 03/30] ima: extend boot_aggregate with kernel	measurements
 
Sasha Levin
- [PATCH] Smack: fix use-after-free in smk_write_relabel_self()
 
Sasha Levin
- [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
 
Andy Lutomirski
- [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
 
Andy Lutomirski
- [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
 
Andy Lutomirski
- [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
 
Andy Lutomirski
- [PATCH v3 10/16] exec: Remove do_execve_file
 
Pavel Machek
- [PATCH v8 00/12] Introduce CAP_PERFMON to secure system	performance monitoring and observability
 
Arnaldo Carvalho de Melo
- [PATCH v8 00/12] Introduce CAP_PERFMON to secure system	performance monitoring and observability
 
Arnaldo Carvalho de Melo
- [PATCH v8 00/12] Introduce CAP_PERFMON to secure system	performance monitoring and observability
 
Arnaldo Carvalho de Melo
- [PATCH v8 00/12] Introduce CAP_PERFMON to secure system	performance monitoring and observability
 
Arnaldo Carvalho de Melo
- [PATCH v8 00/12] Introduce CAP_PERFMON to secure system	performance monitoring and observability
 
Arnaldo Carvalho de Melo
- [PATCH] Replace HTTP links with HTTPS ones: IPv*
 
David Miller
- [PATCH net-next] cipso: Remove unused inline functions
 
David Miller
- [PATCH v4 3/3] prctl: Allow ptrace capable processes to change	/proc/self/exe
 
Paul Moore
- [PATCH ghak84 v3] audit: purge audit_log_string from the	intra-kernel audit API
 
Paul Moore
- [PATCH ghak96 v3] audit: issue CWD record to accompany	LSM_AUDIT_DATA_* records
 
Paul Moore
- [PATCH ghak84 v3] audit: purge audit_log_string from the	intra-kernel audit API
 
Paul Moore
- [PATCH ghak84 v4] audit: purge audit_log_string from the	intra-kernel audit API
 
Paul Moore
- [PATCH ghak84 v4] audit: purge audit_log_string from the	intra-kernel audit API
 
Paul Moore
- [PATCH net-next] cipso: Remove unused inline functions
 
Paul Moore
- ANN: libseccomp v2.5.0 released
 
Paul Moore
- [PATCH ghak84 v4] audit: purge audit_log_string from the	intra-kernel audit API
 
Paul Moore
- [PATCH ghak84 v4] audit: purge audit_log_string from the	intra-kernel audit API
 
Paul Moore
- [PATCH V3fix ghak120] audit: initialize context values in case of	mandatory events
 
Paul Moore
- [PATCH V3fix ghak120] audit: initialize context values in case of	mandatory events
 
Paul Moore
- [PATCH V3fix ghak120] audit: initialize context values in case of	mandatory events
 
Paul Moore
- [PATCH 16/16] capsh.c: Spelling fixes in usage() message
 
Andrew G. Morgan
- [PATCH 12/15] Manual pages: cap_get_file.3: NOTES: note the	effect of the Ambient set
 
Andrew G. Morgan
- [PATCH] Manual pages: use "root user ID" rather than "rootid"
 
Andrew G. Morgan
- [PATCH] Replace HTTP links with HTTPS ones: security
 
James Morris
- [PATCH] integrity: remove redundant initialization of variable ret
 
James Morris
- [PATCH] LSM: drop duplicated words in header file comments
 
James Morris
- [PATCH 1/2] LSM: Signal to SafeSetID when in set*gid syscall
 
James Morris
- [PATCH v19 13/23] LSM: Specify which LSM to display
 
James Morris
- [PATCH v19 17/23] LSM: security_secid_to_secctx in netlink	netfilter
 
James Morris
- [PATCH v19 21/23] Audit: Add a new record for multiple object	LSM  attributes
 
James Morris
- [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
 
James Morris
- [PATCH v4 04/17] fs/kernel_read_file: Split into separate include	file
 
James Morris
- [PATCH v4 06/17] fs/kernel_read_file: Remove redundant size	argument
 
James Morris
- [PATCH v4 07/17] fs/kernel_read_file: Switch buffer size arg to	size_t
 
James Morris
- [PATCH v4 08/17] fs/kernel_read_file: Add file_size output	argument
 
James Morris
- [PATCH 1/2] LSM: Signal to SafeSetID when in set*gid syscall
 
Micah Morton
- [PATCH 2/2] LSM: SafeSetID: Add GID security policy handling
 
Micah Morton
- [PATCH v2 2/2] LSM: SafeSetID: Add GID security policy handling
 
Micah Morton
- [PATCH v3 06/12] ima: Fail rule parsing when the KEY_CHECK hook	is combined with an invalid cond
 
Nayna
- [PATCH v3 01/12] ima: Have the LSM free its audit rule
 
Nayna
- [PATCH v3 07/12] ima: Fail rule parsing when	appraise_flag=blacklist is unsupportable
 
Nayna
- [PATCH v1 1/4] [RFC] fs/trampfd: Implement the trampoline file	descriptor API
 
Oleg Nesterov
- [PATCH v1 1/4] [RFC] fs/trampfd: Implement the trampoline file	descriptor API
 
Oleg Nesterov
- [PATCH v2] KEYS: remove redundant memset
 
Joe Perches
- [PATCH v2] KEYS: remove redundant memset
 
Joe Perches
- [PATCH v1 0/5] LSM: Measure security module state
 
Lakshmi Ramasubramanian
- [PATCH v1 1/5] IMA: Add LSM_STATE func to measure LSM data
 
Lakshmi Ramasubramanian
- [PATCH v1 2/5] IMA: Define an IMA hook to measure LSM data
 
Lakshmi Ramasubramanian
- [PATCH v1 3/5] LSM: Add security_state function pointer in lsm_info	struct
 
Lakshmi Ramasubramanian
- [PATCH v1 4/5] LSM: Define SELinux function to measure security state
 
Lakshmi Ramasubramanian
- [PATCH v1 5/5] LSM: Define workqueue for measuring security module	state
 
Lakshmi Ramasubramanian
- [PATCH v1 4/5] LSM: Define SELinux function to measure security	state
 
Lakshmi Ramasubramanian
- [PATCH v2 0/5] LSM: Measure security module state
 
Lakshmi Ramasubramanian
- [PATCH v2 1/5] IMA: Add LSM_STATE func to measure LSM data
 
Lakshmi Ramasubramanian
- [PATCH v2 2/5] IMA: Define an IMA hook to measure LSM data
 
Lakshmi Ramasubramanian
- [PATCH v3 3/5] LSM: Add security_measure_data in lsm_info struct
 
Lakshmi Ramasubramanian
- [PATCH v2 4/5] LSM: Define SELinux function to measure security state
 
Lakshmi Ramasubramanian
- [PATCH v2 5/5] LSM: Define workqueue for measuring security module	state
 
Lakshmi Ramasubramanian
- [PATCH v2 4/5] LSM: Define SELinux function to measure security	state
 
Lakshmi Ramasubramanian
- [PATCH v2 4/5] LSM: Define SELinux function to measure security	state
 
Lakshmi Ramasubramanian
- [PATCH v3 0/5] LSM: Measure security module state
 
Lakshmi Ramasubramanian
- [PATCH v3 1/5] IMA: Add LSM_STATE func to measure LSM data
 
Lakshmi Ramasubramanian
- [PATCH v3 2/5] IMA: Define an IMA hook to measure LSM data
 
Lakshmi Ramasubramanian
- [PATCH v3 3/5] LSM: Add security_measure_data in lsm_info struct
 
Lakshmi Ramasubramanian
- [PATCH v3 4/5] LSM: Define SELinux function to measure security state
 
Lakshmi Ramasubramanian
- [PATCH v3 5/5] LSM: Define workqueue for measuring security module	state
 
Lakshmi Ramasubramanian
- [PATCH v3 4/5] LSM: Define SELinux function to measure security	state
 
Lakshmi Ramasubramanian
- [PATCH v3 4/5] LSM: Define SELinux function to measure security	state
 
Lakshmi Ramasubramanian
- [PATCH v3 4/5] LSM: Define SELinux function to measure security	state
 
Lakshmi Ramasubramanian
- [PATCH v3 4/5] LSM: Define SELinux function to measure security	state
 
Lakshmi Ramasubramanian
- [PATCH v3 4/5] LSM: Define SELinux function to measure security	state
 
Lakshmi Ramasubramanian
- [PATCH 2/2] ima: Fail rule parsing when asymmetric key	measurement isn't supportable
 
Lakshmi Ramasubramanian
- [PATCH 1/2] ima: Pre-parse the list of keyrings in a KEY_CHECK	rule
 
Lakshmi Ramasubramanian
- [PATCH v5 0/4] LSM: Measure security module data
 
Lakshmi Ramasubramanian
- [PATCH v5 1/4] IMA: Add func to measure LSM state and policy
 
Lakshmi Ramasubramanian
- [PATCH v5 2/4] IMA: Define IMA hooks to measure LSM state and policy
 
Lakshmi Ramasubramanian
- [PATCH v5 3/4] LSM: Define SELinux function to measure state and	policy
 
Lakshmi Ramasubramanian
- [PATCH v5 4/4] IMA: Handle early boot data measurement
 
Lakshmi Ramasubramanian
- [PATCH v5 1/4] IMA: Add func to measure LSM state and policy
 
Lakshmi Ramasubramanian
- [PATCH v5 1/4] IMA: Add func to measure LSM state and policy
 
Lakshmi Ramasubramanian
- [PATCH v5 4/4] IMA: Handle early boot data measurement
 
Lakshmi Ramasubramanian
- [PATCH v4 0/3] capabilities: Introduce CAP_CHECKPOINT_RESTORE
 
Adrian Reber
- [PATCH v4 1/3] capabilities: Introduce CAP_CHECKPOINT_RESTORE
 
Adrian Reber
- [PATCH v4 2/3] selftests: add clone3() CAP_CHECKPOINT_RESTORE test
 
Adrian Reber
- [PATCH v4 3/3] prctl: Allow ptrace capable processes to change	/proc/self/exe
 
Adrian Reber
- [PATCH v4 1/3] capabilities: Introduce CAP_CHECKPOINT_RESTORE
 
Adrian Reber
- [PATCH v4 2/3] selftests: add clone3() CAP_CHECKPOINT_RESTORE test
 
Adrian Reber
- [PATCH v5 0/6] capabilities: Introduce CAP_CHECKPOINT_RESTORE
 
Adrian Reber
- [PATCH v5 1/6] capabilities: Introduce CAP_CHECKPOINT_RESTORE
 
Adrian Reber
- [PATCH v5 2/6] pid: use checkpoint_restore_ns_capable() for set_tid
 
Adrian Reber
- [PATCH v5 3/6] pid_namespace: use checkpoint_restore_ns_capable() for	ns_last_pid
 
Adrian Reber
- [PATCH v5 4/6] proc: allow access in init userns for map_files with	CAP_CHECKPOINT_RESTORE
 
Adrian Reber
- [PATCH v5 5/6] prctl: Allow checkpoint/restore capable processes to	change exe link
 
Adrian Reber
- [PATCH v5 6/6] selftests: add clone3() CAP_CHECKPOINT_RESTORE test
 
Adrian Reber
- [PATCH v6 0/7] capabilities: Introduce CAP_CHECKPOINT_RESTORE
 
Adrian Reber
- [PATCH v6 1/7] capabilities: Introduce CAP_CHECKPOINT_RESTORE
 
Adrian Reber
- [PATCH v6 2/7] pid: use checkpoint_restore_ns_capable() for set_tid
 
Adrian Reber
- [PATCH v6 3/7] pid_namespace: use checkpoint_restore_ns_capable() for	ns_last_pid
 
Adrian Reber
- [PATCH v6 4/7] proc: allow access in init userns for map_files with	CAP_CHECKPOINT_RESTORE
 
Adrian Reber
- [PATCH v6 5/7] prctl: Allow local CAP_CHECKPOINT_RESTORE to change	/proc/self/exe
 
Adrian Reber
- [PATCH v6 6/7] prctl: exe link permission error changed from -EINVAL	to -EPERM
 
Adrian Reber
- [PATCH v6 7/7] selftests: add clone3() CAP_CHECKPOINT_RESTORE test
 
Adrian Reber
- [PATCH v6 0/7] capabilities: Introduce CAP_CHECKPOINT_RESTORE
 
Adrian Reber
- [PATCH v2] KEYS: remove redundant memset
 
Tom Rix
- [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
 
Mark Rutland
- [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
 
Mark Rutland
- [PATCH v8 2/2] tpm: Add support for event log pointer found in	TPM2 ACPI table
 
Jarkko Sakkinen
- [PATCH v33 12/21] x86/sgx: Allow a limited use of	ATTRIBUTE.PROVISIONKEY for attestation
 
Jarkko Sakkinen
- [PATCH v33 12/21] x86/sgx: Allow a limited use of	ATTRIBUTE.PROVISIONKEY for attestation
 
Jarkko Sakkinen
- [PATCH v33 12/21] x86/sgx: Allow a limited use of	ATTRIBUTE.PROVISIONKEY for attestation
 
Jarkko Sakkinen
- [PATCH v33 12/21] x86/sgx: Allow a limited use of	ATTRIBUTE.PROVISIONKEY for attestation
 
Jarkko Sakkinen
- [PATCH v33 11/21] x86/sgx: Linux Enclave Driver
 
Jarkko Sakkinen
- [PATCH v33 11/21] x86/sgx: Linux Enclave Driver
 
Jarkko Sakkinen
- [PATCH v33 11/21] x86/sgx: Linux Enclave Driver
 
Jarkko Sakkinen
- [PATCH v33 11/21] x86/sgx: Linux Enclave Driver
 
Jarkko Sakkinen
- [PATCH v33 11/21] x86/sgx: Linux Enclave Driver
 
Jarkko Sakkinen
- [PATCH v33 11/21] x86/sgx: Linux Enclave Driver
 
Jarkko Sakkinen
- [PATCH v9 2/2] tpm: Add support for event log pointer found in	TPM2 ACPI table
 
Jarkko Sakkinen
- [PATCH v9 2/2] tpm: Add support for event log pointer found in	TPM2 ACPI table
 
Jarkko Sakkinen
- [PATCH v9 2/2] tpm: Add support for event log pointer found in	TPM2 ACPI table
 
Jarkko Sakkinen
- [PATCH v9 2/2] tpm: Add support for event log pointer found in	TPM2 ACPI table
 
Jarkko Sakkinen
- [PATCH v34 11/24] x86/sgx: Add SGX enclave driver
 
Jarkko Sakkinen
- [PATCH v34 15/24] x86/sgx: Allow a limited use of	ATTRIBUTE.PROVISIONKEY for attestation
 
Jarkko Sakkinen
- [PATCH v33 11/21] x86/sgx: Linux Enclave Driver
 
Jarkko Sakkinen
- [PATCH v35 11/24] x86/sgx: Add SGX enclave driver
 
Jarkko Sakkinen
- [PATCH v35 15/24] x86/sgx: Allow a limited use of	ATTRIBUTE.PROVISIONKEY for attestation
 
Jarkko Sakkinen
- [PATCH v9 2/2] tpm: Add support for event log pointer found in	TPM2 ACPI table
 
Jarkko Sakkinen
- [PATCH v34 11/24] x86/sgx: Add SGX enclave driver
 
Jarkko Sakkinen
- [PATCH v9 2/2] tpm: Add support for event log pointer found in	TPM2 ACPI table
 
Jarkko Sakkinen
- [PATCH v9 2/2] tpm: Add support for event log pointer found in	TPM2 ACPI table
 
Jarkko Sakkinen
- [PATCH v36 11/24] x86/sgx: Add SGX enclave driver
 
Jarkko Sakkinen
- [PATCH v36 15/24] x86/sgx: Allow a limited use of	ATTRIBUTE.PROVISIONKEY for attestation
 
Jarkko Sakkinen
- [PATCH v9 2/2] tpm: Add support for event log pointer found in	TPM2 ACPI table
 
Jarkko Sakkinen
- [PATCH] keys: asymmetric: fix error return code in	software_key_query()
 
Jarkko Sakkinen
- [PATCH] keys: asymmetric: fix error return code in	software_key_query()
 
Jarkko Sakkinen
- [PATCH v2] KEYS: remove redundant memset
 
Jarkko Sakkinen
- [PATCH] keys: asymmetric: fix error return code in	software_key_query()
 
Jarkko Sakkinen
- [PATCH] watch_queue: Limit the number of watches a user can hold
 
Jarkko Sakkinen
- [PATCH v19 00/12] Landlock LSM
 
Mickaël Salaün
- [PATCH v19 01/12] landlock: Add object management
 
Mickaël Salaün
- [PATCH v19 02/12] landlock: Add ruleset and domain management
 
Mickaël Salaün
- [PATCH v19 03/12] landlock: Set up the security framework and manage	credentials
 
Mickaël Salaün
- [PATCH v19 04/12] landlock: Add ptrace restrictions
 
Mickaël Salaün
- [PATCH v19 05/12] LSM: Infrastructure management of the superblock
 
Mickaël Salaün
- [PATCH v19 06/12] fs,security: Add sb_delete hook
 
Mickaël Salaün
- [PATCH v19 07/12] landlock: Support filesystem access-control
 
Mickaël Salaün
- [PATCH v19 08/12] landlock: Add syscall implementation
 
Mickaël Salaün
- [PATCH v19 09/12] arch: Wire up landlock() syscall
 
Mickaël Salaün
- [PATCH v19 10/12] selftests/landlock: Add initial tests
 
Mickaël Salaün
- [PATCH v19 11/12] samples/landlock: Add a sandbox manager example
 
Mickaël Salaün
- [PATCH v19 12/12] landlock: Add user and kernel documentation
 
Mickaël Salaün
- [PATCH v19 07/12] landlock: Support filesystem access-control
 
Mickaël Salaün
- [PATCH v19 09/12] arch: Wire up landlock() syscall
 
Mickaël Salaün
- [PATCH v19 09/12] arch: Wire up landlock() syscall
 
Mickaël Salaün
- [PATCH v19 08/12] landlock: Add syscall implementation
 
Mickaël Salaün
- [PATCH v19 08/12] landlock: Add syscall implementation
 
Mickaël Salaün
- [PATCH v19 08/12] landlock: Add syscall implementation
 
Mickaël Salaün
- [PATCH v6 0/7] Add support for O_MAYEXEC
 
Mickaël Salaün
- [PATCH v6 1/7] exec: Change uselib(2) IS_SREG() failure to EACCES
 
Mickaël Salaün
- [PATCH v6 2/7] exec: Move S_ISREG() check earlier
 
Mickaël Salaün
- [PATCH v6 3/7] exec: Move path_noexec() check earlier
 
Mickaël Salaün
- [PATCH v6 4/7] fs: Introduce O_MAYEXEC flag for openat2(2)
 
Mickaël Salaün
- [PATCH v6 5/7] fs,	doc: Enable to enforce noexec mounts or file exec through O_MAYEXEC
 
Mickaël Salaün
- [PATCH v6 6/7] selftest/openat2: Add tests for O_MAYEXEC enforcing
 
Mickaël Salaün
- [PATCH v6 7/7] ima: add policy support for the new file open	MAY_OPENEXEC flag
 
Mickaël Salaün
- [PATCH v6 4/7] fs: Introduce O_MAYEXEC flag for openat2(2)
 
Mickaël Salaün
- [PATCH v6 5/7] fs,doc: Enable to enforce noexec mounts or file	exec through O_MAYEXEC
 
Mickaël Salaün
- [PATCH v6 7/7] ima: add policy support for the new file open	MAY_OPENEXEC flag
 
Mickaël Salaün
- [PATCH v6 5/7] fs,doc: Enable to enforce noexec mounts or file	exec through O_MAYEXEC
 
Mickaël Salaün
- [PATCH v6 7/7] ima: add policy support for the new file open	MAY_OPENEXEC flag
 
Mickaël Salaün
- [PATCH v6 5/7] fs,doc: Enable to enforce noexec mounts or file	exec through O_MAYEXEC
 
Mickaël Salaün
- [PATCH v7 0/7] Add support for O_MAYEXEC
 
Mickaël Salaün
- [PATCH v7 1/7] exec: Change uselib(2) IS_SREG() failure to EACCES
 
Mickaël Salaün
- [PATCH v7 2/7] exec: Move S_ISREG() check earlier
 
Mickaël Salaün
- [PATCH v7 3/7] exec: Move path_noexec() check earlier
 
Mickaël Salaün
- [PATCH v7 4/7] fs: Introduce O_MAYEXEC flag for openat2(2)
 
Mickaël Salaün
- [PATCH v7 5/7] fs,	doc: Enable to enforce noexec mounts or file exec through O_MAYEXEC
 
Mickaël Salaün
- [PATCH v7 6/7] selftest/openat2: Add tests for O_MAYEXEC enforcing
 
Mickaël Salaün
- [PATCH v7 7/7] ima: add policy support for the new file open	MAY_OPENEXEC flag
 
Mickaël Salaün
- [PATCH v7 4/7] fs: Introduce O_MAYEXEC flag for openat2(2)
 
Mickaël Salaün
- [PATCH v6 5/7] fs,doc: Enable to enforce noexec mounts or file	exec through O_MAYEXEC
 
Thibaut Sautereau
- [PATCH v7 0/7] Add support for O_MAYEXEC
 
Thibaut Sautereau
- [PATCH v18 00/23] LSM: Module stacking for AppArmor
 
Casey Schaufler
- [PATCH v18 01/23] LSM: Infrastructure management of the sock security
 
Casey Schaufler
- [PATCH v18 02/23] LSM: Create and manage the lsmblob data structure.
 
Casey Schaufler
- [PATCH v18 03/23] LSM: Use lsmblob in security_audit_rule_match
 
Casey Schaufler
- [PATCH v18 04/23] LSM: Use lsmblob in security_kernel_act_as
 
Casey Schaufler
- [PATCH v18 05/23] net: Prepare UDS for security module stacking
 
Casey Schaufler
- [PATCH v18 06/23] LSM: Use lsmblob in security_secctx_to_secid
 
Casey Schaufler
- [PATCH v18 07/23] LSM: Use lsmblob in security_secid_to_secctx
 
Casey Schaufler
- [PATCH v18 08/23] LSM: Use lsmblob in security_ipc_getsecid
 
Casey Schaufler
- [PATCH v18 09/23] LSM: Use lsmblob in security_task_getsecid
 
Casey Schaufler
- [PATCH v18 10/23] LSM: Use lsmblob in security_inode_getsecid
 
Casey Schaufler
- [PATCH v18 11/23] LSM: Use lsmblob in security_cred_getsecid
 
Casey Schaufler
- [PATCH v18 12/23] IMA: Change internal interfaces to use lsmblobs
 
Casey Schaufler
- [PATCH v18 13/23] LSM: Specify which LSM to display
 
Casey Schaufler
- [PATCH v18 14/23] LSM: Ensure the correct LSM context releaser
 
Casey Schaufler
- [PATCH v18 15/23] LSM: Use lsmcontext in security_secid_to_secctx
 
Casey Schaufler
- [PATCH v18 16/23] LSM: Use lsmcontext in security_inode_getsecctx
 
Casey Schaufler
- [PATCH v18 17/23] LSM: security_secid_to_secctx in netlink netfilter
 
Casey Schaufler
- [PATCH v18 18/23] NET: Store LSM netlabel data in a lsmblob
 
Casey Schaufler
- [PATCH v18 19/23] LSM: Verify LSM display sanity in binder
 
Casey Schaufler
- [PATCH v18 20/23] Audit: Add new record for multiple process LSM	attributes
 
Casey Schaufler
- [PATCH v18 21/23] Audit: Add a new record for multiple object LSM	attributes
 
Casey Schaufler
- [PATCH v18 22/23] LSM: Add /proc attr entry for full LSM context
 
Casey Schaufler
- [PATCH v18 23/23] AppArmor: Remove the exclusive flag
 
Casey Schaufler
- [PATCH v18 05/23] net: Prepare UDS for security module stacking
 
Casey Schaufler
- [RFC PATCH v4 05/12] fs: add security blob and hooks for	block_device
 
Casey Schaufler
- [PATCH] Smack: fix use-after-free in smk_write_relabel_self()
 
Casey Schaufler
- [PATCH 1/2] Smack: fix another vsscanf out of bounds
 
Casey Schaufler
- [PATCH v18 22/23] LSM: Add /proc attr entry for full LSM context
 
Casey Schaufler
- [PATCH v19 00/23] LSM: Module stacking for AppArmor
 
Casey Schaufler
- [PATCH v19 01/23] LSM: Infrastructure management of the sock security
 
Casey Schaufler
- [PATCH v19 02/23] LSM: Create and manage the lsmblob data structure.
 
Casey Schaufler
- [PATCH v19 03/23] LSM: Use lsmblob in security_audit_rule_match
 
Casey Schaufler
- [PATCH v19 04/23] LSM: Use lsmblob in security_kernel_act_as
 
Casey Schaufler
- [PATCH v19 05/23] net: Prepare UDS for security module stacking
 
Casey Schaufler
- [PATCH v19 06/23] LSM: Use lsmblob in security_secctx_to_secid
 
Casey Schaufler
- [PATCH v19 07/23] LSM: Use lsmblob in security_secid_to_secctx
 
Casey Schaufler
- [PATCH v19 08/23] LSM: Use lsmblob in security_ipc_getsecid
 
Casey Schaufler
- [PATCH v19 09/23] LSM: Use lsmblob in security_task_getsecid
 
Casey Schaufler
- [PATCH v19 10/23] LSM: Use lsmblob in security_inode_getsecid
 
Casey Schaufler
- [PATCH v19 11/23] LSM: Use lsmblob in security_cred_getsecid
 
Casey Schaufler
- [PATCH v19 12/23] IMA: Change internal interfaces to use lsmblobs
 
Casey Schaufler
- [PATCH v19 13/23] LSM: Specify which LSM to display
 
Casey Schaufler
- [PATCH v19 14/23] LSM: Ensure the correct LSM context releaser
 
Casey Schaufler
- [PATCH v19 15/23] LSM: Use lsmcontext in security_secid_to_secctx
 
Casey Schaufler
- [PATCH v19 16/23] LSM: Use lsmcontext in security_inode_getsecctx
 
Casey Schaufler
- [PATCH v19 17/23] LSM: security_secid_to_secctx in netlink netfilter
 
Casey Schaufler
- [PATCH v19 18/23] NET: Store LSM netlabel data in a lsmblob
 
Casey Schaufler
- [PATCH v19 19/23] LSM: Verify LSM display sanity in binder
 
Casey Schaufler
- [PATCH v19 20/23] Audit: Add new record for multiple process LSM	attributes
 
Casey Schaufler
- [PATCH v19 21/23] Audit: Add a new record for multiple object LSM	attributes
 
Casey Schaufler
- [PATCH v19 22/23] LSM: Add /proc attr entry for full LSM context
 
Casey Schaufler
- [PATCH v19 23/23] AppArmor: Remove the exclusive flag
 
Casey Schaufler
- [PATCH] smack: fix slab-out-of-bounds by checking for overflow
 
Casey Schaufler
- [PATCH v19 02/23] LSM: Create and manage the lsmblob data	structure.
 
Casey Schaufler
- [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
 
Casey Schaufler
- [RFC PATCH v5 05/11] fs: add security blob and hooks for	block_device
 
Casey Schaufler
- [PATCH v19 06/23] LSM: Use lsmblob in security_secctx_to_secid
 
Casey Schaufler
- [PATCH v5 1/4] IMA: Add func to measure LSM state and policy
 
Casey Schaufler
- [PATCH v19 22/23] LSM: Add /proc attr entry for full LSM context
 
Casey Schaufler
- [PATCH v19 22/23] LSM: Add /proc attr entry for full LSM context
 
Casey Schaufler
- [PATCH] bpf: lsm: Disable or enable BPF LSM at boot time
 
KP Singh
- [PATCH] bpf: lsm: Disable or enable BPF LSM at boot time
 
KP Singh
- [PATCH bpf-next v3 0/4] Generalizing bpf_local_storage
 
KP Singh
- [PATCH bpf-next v3 1/4] bpf: Generalize bpf_sk_storage
 
KP Singh
- [PATCH bpf-next v3 2/4] bpf: Implement bpf_local_storage for inodes
 
KP Singh
- [PATCH bpf-next v3 3/4] bpf: Allow local storage to be used from LSM	programs
 
KP Singh
- [PATCH bpf-next v3 4/4] bpf: Add selftests for local_storage
 
KP Singh
- [PATCH bpf-next v3 1/4] bpf: Generalize bpf_sk_storage
 
KP Singh
- [PATCH bpf-next v3 2/4] bpf: Implement bpf_local_storage for	inodes
 
KP Singh
- [PATCH bpf-next v4 0/4] Generalizing bpf_local_storage
 
KP Singh
- [PATCH bpf-next v4 1/4] bpf: Generalize bpf_sk_storage
 
KP Singh
- [PATCH bpf-next v4 2/4] bpf: Implement bpf_local_storage for inodes
 
KP Singh
- [PATCH bpf-next v4 3/4] bpf: Allow local storage to be used from LSM	programs
 
KP Singh
- [PATCH bpf-next v4 4/4] bpf: Add selftests for local_storage
 
KP Singh
- [PATCH bpf-next v4 1/4] bpf: Generalize bpf_sk_storage
 
KP Singh
- [PATCH bpf-next v4 2/4] bpf: Implement bpf_local_storage for	inodes
 
KP Singh
- [PATCH bpf-next v4 2/4] bpf: Implement bpf_local_storage for	inodes
 
KP Singh
- [PATCH bpf-next v5 0/7] Generalizing bpf_local_storage
 
KP Singh
- [PATCH bpf-next v5 1/7] bpf: Renames to prepare for generalizing	sk_storage.
 
KP Singh
- [PATCH bpf-next v5 2/7] bpf: Generalize caching for sk_storage.
 
KP Singh
- [PATCH bpf-next v5 3/7] bpf: Generalize bpf_sk_storage
 
KP Singh
- [PATCH bpf-next v5 4/7] bpf: Split bpf_local_storage to bpf_sk_storage
 
KP Singh
- [PATCH bpf-next v5 5/7] bpf: Implement bpf_local_storage for inodes
 
KP Singh
- [PATCH bpf-next v5 6/7] bpf: Allow local storage to be used from LSM	programs
 
KP Singh
- [PATCH bpf-next v5 7/7] bpf: Add selftests for local_storage
 
KP Singh
- [PATCH bpf-next v6 0/7] Generalizing bpf_local_storage
 
KP Singh
- [PATCH bpf-next v6 1/7] bpf: Renames to prepare for generalizing	sk_storage.
 
KP Singh
- [PATCH bpf-next v6 2/7] bpf: Generalize caching for sk_storage.
 
KP Singh
- [PATCH bpf-next v6 3/7] bpf: Generalize bpf_sk_storage
 
KP Singh
- [PATCH bpf-next v6 4/7] bpf: Split bpf_local_storage to bpf_sk_storage
 
KP Singh
- [PATCH bpf-next v6 5/7] bpf: Implement bpf_local_storage for inodes
 
KP Singh
- [PATCH bpf-next v6 6/7] bpf: Allow local storage to be used from LSM	programs
 
KP Singh
- [PATCH bpf-next v6 7/7] bpf: Add selftests for local_storage
 
KP Singh
- [PATCH bpf-next v5 5/7] bpf: Implement bpf_local_storage for	inodes
 
KP Singh
- [PATCH bpf-next v6 1/7] bpf: Renames to prepare for generalizing	sk_storage.
 
KP Singh
- [RFC PATCH bpf-next] bpf: POC on local_storage charge and	uncharge map_ops
 
KP Singh
- [PATCH bpf-next v6 3/7] bpf: Generalize bpf_sk_storage
 
KP Singh
- [PATCH bpf-next v7 0/7] Generalizing bpf_local_storage
 
KP Singh
- [PATCH bpf-next v7 1/7] A purely mechanical change to split the	renaming from the actual generalization.
 
KP Singh
- [PATCH bpf-next v7 2/7] bpf: Generalize caching for sk_storage.
 
KP Singh
- [PATCH bpf-next v7 3/7] bpf: Generalize bpf_sk_storage
 
KP Singh
- [PATCH bpf-next v7 4/7] bpf: Split bpf_local_storage to bpf_sk_storage
 
KP Singh
- [PATCH bpf-next v7 5/7] bpf: Implement bpf_local_storage for inodes
 
KP Singh
- [PATCH bpf-next v7 6/7] bpf: Allow local storage to be used from LSM	programs
 
KP Singh
- [PATCH bpf-next v7 7/7] bpf: Add selftests for local_storage
 
KP Singh
- [PATCH bpf-next v7 5/7] bpf: Implement bpf_local_storage for	inodes
 
KP Singh
- [PATCH v18 05/23] net: Prepare UDS for security module stacking
 
Stephen Smalley
- [PATCH v18 05/23] net: Prepare UDS for security module stacking
 
Stephen Smalley
- [PATCH v1 4/5] LSM: Define SELinux function to measure security	state
 
Stephen Smalley
- [PATCH v2 4/5] LSM: Define SELinux function to measure security	state
 
Stephen Smalley
- [PATCH v2 4/5] LSM: Define SELinux function to measure security	state
 
Stephen Smalley
- [PATCH v3 4/5] LSM: Define SELinux function to measure security	state
 
Stephen Smalley
- [PATCH v3 4/5] LSM: Define SELinux function to measure security	state
 
Stephen Smalley
- [PATCH v3 4/5] LSM: Define SELinux function to measure security	state
 
Stephen Smalley
- [PATCH v3 4/5] LSM: Define SELinux function to measure security	state
 
Stephen Smalley
- [PATCH v3 4/5] LSM: Define SELinux function to measure security	state
 
Stephen Smalley
- [PATCH v19 02/23] LSM: Create and manage the lsmblob data	structure.
 
Stephen Smalley
- [PATCH v19 20/23] Audit: Add new record for multiple process LSM	attributes
 
Stephen Smalley
- [PATCH v9 1/2] acpi: Extend TPM2 ACPI table with missing log	fields
 
Jerry Snitselaar
- [PATCH v9 2/2] tpm: Add support for event log pointer found in	TPM2 ACPI table
 
Jerry Snitselaar
- [PATCH v9 2/2] tpm: Add support for event log pointer found in	TPM2 ACPI table
 
Jerry Snitselaar
- [V2 PATCH 1/3] Refactoring powerpc code for carrying over IMA	measurement logs,	to move non architecture specific code to security/ima.
 
Prakhar Srivastava
- [V2 PATCH 2/3] dt-bindings: chosen: Document ima-kexec-buffer
 
Prakhar Srivastava
- [PATCH v2 05/15] umh: Separate the user mode driver and the user	mode helper support
 
Alexei Starovoitov
- [PATCH v3 13/16] exit: Factor thread_group_exited out of	pidfd_poll
 
Alexei Starovoitov
- [PATCH v3 13/16] exit: Factor thread_group_exited out of	pidfd_poll
 
Alexei Starovoitov
- [merged][PATCH v3 00/16] Make the user mode driver code a better	citizen
 
Alexei Starovoitov
- [PATCH bpf-next v5 5/7] bpf: Implement bpf_local_storage for	inodes
 
Alexei Starovoitov
- [fs] 140402bab8: stress-ng.splice.ops_per_sec -100.0% regression
 
Linus Torvalds
- [PATCH 0/7] Implementing kernel_execve
 
Linus Torvalds
- [PATCH 3/4] watch_queue: Implement mount topology and attribute	change notifications
 
Linus Torvalds
- [PATCH 3/4] watch_queue: Implement mount topology and attribute	change notifications
 
Linus Torvalds
- [PATCH v1 1/4] [RFC] fs/trampfd: Implement the trampoline file	descriptor API
 
Madhavan T. Venkataraman
- [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
 
Madhavan T. Venkataraman
- [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
 
Madhavan T. Venkataraman
- [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
 
Madhavan T. Venkataraman
- [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
 
Madhavan T. Venkataraman
- [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
 
Madhavan T. Venkataraman
- [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
 
Madhavan T. Venkataraman
- [PATCH v1 2/4] [RFC] x86/trampfd: Provide support for the	trampoline file descriptor
 
Madhavan T. Venkataraman
- [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
 
Madhavan T. Venkataraman
- [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
 
Madhavan T. Venkataraman
- [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
 
Madhavan T. Venkataraman
- [PATCH v4 3/3] prctl: Allow ptrace capable processes to change	/proc/self/exe
 
Nicolas Viennot
- [PATCH v5 5/6] prctl: Allow checkpoint/restore capable processes	to change exe link
 
Nicolas Viennot
- [PATCH v7 4/7] fs: Introduce O_MAYEXEC flag for openat2(2)
 
Al Viro
- [RFC PATCH v5 05/11] fs: add security blob and hooks for	block_device
 
Al Viro
- INVESTMENT
 
CHRISTOPHER WANG
- [PATCH v7 4/7] fs: Introduce O_MAYEXEC flag for openat2(2)
 
Florian Weimer
- [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
 
Florian Weimer
- [PATCH v34 11/24] x86/sgx: Add SGX enclave driver
 
Matthew Wilcox
- [PATCH v34 11/24] x86/sgx: Add SGX enclave driver
 
Matthew Wilcox
- [PATCH 2/4] fs: Remove FIRMWARE_PREALLOC_BUFFER from	kernel_read_file() enums
 
Matthew Wilcox
- [v2 PATCH] crypto: af_alg - Fix regression on empty requests
 
Herbert Xu
- Reporting a use-after-free read bug in userfaultfd_release()
 
Peilin Ye
- [PATCH -next] IMA: Make ima_mok_init() static
 
Wei Yongjun
- [PATCH v2 11/11] ima: Support additional conditionals in the	KEXEC_CMDLINE hook function
 
Dave Young
- [PATCH net-next] cipso: Remove unused inline functions
 
YueHaibing
- [PATCH v4 0/8] crpyto: introduce OSCCA certificate and SM2 asymmetric	algorithm 
 
Tianjia Zhang
- [PATCH v4 1/8] crypto: sm3 - export crypto_sm3_final function
 
Tianjia Zhang
- [PATCH v4 2/8] lib/mpi: Extend the MPI library
 
Tianjia Zhang
- [PATCH v4 3/8] lib/mpi: Introduce ec implementation to MPI library
 
Tianjia Zhang
- [PATCH v4 4/8] crypto: sm2 - introduce OSCCA SM2 asymmetric cipher	algorithm
 
Tianjia Zhang
- [PATCH v4 5/8] crypto: testmgr - support test with different	ciphertext per encryption
 
Tianjia Zhang
- [PATCH v4 6/8] X.509: support OSCCA certificate parse
 
Tianjia Zhang
- [PATCH v4 7/8] X.509: support OSCCA sm2-with-sm3 certificate	verification
 
Tianjia Zhang
- [PATCH v4 8/8] integrity: Asymmetric digsig supports SM2-with-SM3	algorithm
 
Tianjia Zhang
- [PATCH v5 0/8] crpyto: introduce OSCCA certificate and SM2 asymmetric	algorithm 
 
Tianjia Zhang
- [PATCH v5 1/8] crypto: sm3 - export crypto_sm3_final function
 
Tianjia Zhang
- [PATCH v5 2/8] lib/mpi: Extend the MPI library
 
Tianjia Zhang
- [PATCH v5 3/8] lib/mpi: Introduce ec implementation to MPI library
 
Tianjia Zhang
- [PATCH v5 4/8] crypto: sm2 - introduce OSCCA SM2 asymmetric cipher	algorithm
 
Tianjia Zhang
- [PATCH v5 5/8] crypto: testmgr - support test with different	ciphertext per encryption
 
Tianjia Zhang
- [PATCH v5 6/8] X.509: support OSCCA certificate parse
 
Tianjia Zhang
- [PATCH v5 7/8] X.509: support OSCCA sm2-with-sm3 certificate	verification
 
Tianjia Zhang
- [PATCH v5 8/8] integrity: Asymmetric digsig supports SM2-with-SM3	algorithm
 
Tianjia Zhang
- [PATCH v5 2/8] lib/mpi: Extend the MPI library
 
Tianjia Zhang
- [PATCH v8 00/12] Introduce CAP_PERFMON to secure system	performance monitoring and observability
 
Peter Zijlstra
- [PATCH v2 00/11] ima: Fix rule parsing bugs and extend	KEXEC_CMDLINE rule support
 
Mimi Zohar
- [PATCH v2 09/11] ima: Move validation of the keyrings	conditional into ima_validate_rule()
 
Mimi Zohar
- [PATCH v2 09/11] ima: Move validation of the keyrings	conditional into ima_validate_rule()
 
Mimi Zohar
- [PATCH 0/4] Fix misused kernel_read_file() enums
 
Mimi Zohar
- [PATCH v10 2/9] fs: introduce kernel_pread_file* support
 
Mimi Zohar
- [PATCH 4/4] module: Add hook for security_kernel_post_read_file()
 
Mimi Zohar
- [PATCH 4/4] module: Add hook for security_kernel_post_read_file()
 
Mimi Zohar
- [PATCH AUTOSEL 5.7 03/30] ima: extend boot_aggregate with	kernel measurements
 
Mimi Zohar
- [PATCH] ima: Rename internal audit rule functions
 
Mimi Zohar
- [PATCH v3 07/12] ima: Fail rule parsing when	appraise_flag=blacklist is unsupportable
 
Mimi Zohar
- [PATCH v3 00/12] ima: Fix rule parsing bugs and extend	KEXEC_CMDLINE rule support
 
Mimi Zohar
- [PATCH v3 01/12] ima: Have the LSM free its audit rule
 
Mimi Zohar
- [PATCH v3 4/5] LSM: Define SELinux function to measure security	state
 
Mimi Zohar
- [PATCH v3 00/12] ima: Fix rule parsing bugs and extend	KEXEC_CMDLINE rule support
 
Mimi Zohar
- [PATCH v3 11/19] LSM: Introduce kernel_post_load_data() hook
 
Mimi Zohar
- [PATCH v3 12/19] firmware_loader: Use security_post_load_data()
 
Mimi Zohar
- [PATCH v3 00/19] Introduce partial kernel_read_file() support
 
Mimi Zohar
- [PATCH v3 15/19] IMA: Add support for file reads without contents
 
Mimi Zohar
- [PATCH v3 04/19] fs/kernel_read_file: Remove	FIRMWARE_PREALLOC_BUFFER enum
 
Mimi Zohar
- [PATCH v3 06/19] fs/kernel_read_file: Split into separate	include file
 
Mimi Zohar
- [PATCH v3 07/19] fs/kernel_read_file: Split into separate	source file
 
Mimi Zohar
- [PATCH v3 08/19] fs/kernel_read_file: Remove redundant size	argument
 
Mimi Zohar
- [PATCH v3 09/19] fs/kernel_read_file: Switch buffer size arg to	size_t
 
Mimi Zohar
- [PATCH v3 10/19] fs/kernel_read_file: Add file_size output	argument
 
Mimi Zohar
- [PATCH] integrity: remove redundant initialization of variable ret
 
Mimi Zohar
- [PATCH v3 00/19] Introduce partial kernel_read_file() support
 
Mimi Zohar
- [PATCH v3 12/19] firmware_loader: Use security_post_load_data()
 
Mimi Zohar
- [PATCH v3 12/19] firmware_loader: Use security_post_load_data()
 
Mimi Zohar
- My Dear Beloved One,
 
Mrs. Safitaou Zoungrana
- [GIT PULL] Security subsystem fixes for v5.8
 
pr-tracker-bot at kernel.org
- [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
 
madvenka at linux.microsoft.com
- [PATCH v1 1/4] [RFC] fs/trampfd: Implement the trampoline file	descriptor API
 
madvenka at linux.microsoft.com
- [PATCH v1 2/4] [RFC] x86/trampfd: Provide support for the trampoline	file descriptor
 
madvenka at linux.microsoft.com
- [PATCH v1 3/4] [RFC] arm64/trampfd: Provide support for the	trampoline file descriptor
 
madvenka at linux.microsoft.com
- [PATCH v1 4/4] [RFC] arm/trampfd: Provide support for the trampoline	file descriptor
 
madvenka at linux.microsoft.com
- [PATCH] KEYS: remove redundant memsets
 
trix at redhat.com
- [PATCH v2] KEYS: remove redundant memset
 
trix at redhat.com
- [security:secure_uffd_v5.9 1/3] fs/anon_inodes.c:92:10-17: WARNING:	ERR_CAST can be used with inode
 
kernel test robot
- [PATCH] fix err_cast.cocci warnings
 
kernel test robot
- [PATCH bpf-next v3 2/4] bpf: Implement bpf_local_storage for	inodes
 
kernel test robot
- [PATCH v3 4/5] LSM: Define SELinux function to measure security	state
 
kernel test robot
- [PATCH v3 4/5] LSM: Define SELinux function to measure security	state
 
kernel test robot
- [PATCH v3 4/5] LSM: Define SELinux function to measure security	state
 
kernel test robot
- [RFC PATCH] LSM: security_read_selinux_policy() can be static
 
kernel test robot
- [PATCH bpf-next v4 1/4] bpf: Generalize bpf_sk_storage
 
kernel test robot
- [PATCH] KEYS: remove redundant memsets
 
kernel test robot
- [PATCH bpf-next v5 5/7] bpf: Implement bpf_local_storage for	inodes
 
kernel test robot
- INFO: task hung in request_key_tag
 
syzbot
- INFO: task hung in request_key_tag
 
syzbot
- KASAN: slab-out-of-bounds Read in vsscanf (2)
 
syzbot
- general protection fault in security_inode_getattr
 
syzbot
- [RFC PATCH 0/7] x86: introduce system calls addess space isolation
 
黄金海
    
      Last message date: 
       Fri Jul 31 20:08:04 UTC 2020
    Archived on: Tue Oct 20 01:42:46 UTC 2020
    
   
     
     
     This archive was generated by
     Pipermail 0.09 (Mailman edition).