July 2020 Archives by author
Starting: Wed Jul 1 00:29:00 UTC 2020
Ending: Fri Jul 31 20:08:04 UTC 2020
Messages: 937
- [PATCH 01/16] Manual pages: getcap.8, getpcaps.8, setcap.8: SEE ALSO: add capabilities(7)
Michael Kerrisk (man-pages)
- [PATCH 02/16] Manual pages: cap_get_file.3, getcap.8, setcap.8: SEE ALSO: add user_namespaces(7)
Michael Kerrisk (man-pages)
- [PATCH 03/16] Manual pages: setcap.8: Formatting fix: use bold for function name
Michael Kerrisk (man-pages)
- [PATCH 04/16] Manual pages: cap_from_text.3: typo fix
Michael Kerrisk (man-pages)
- [PATCH 05/16] Manual pages: cap_get_file.3, getcap.8, setcap.8: clarify "namespace"
Michael Kerrisk (man-pages)
- [PATCH 06/16] Manual pages: cap_get_file.3: Remove stray macros that have no effect
Michael Kerrisk (man-pages)
- [PATCH 07/16] Manual pages: cap_get_proc.3: s/UNCERTAIN/CAP_MODE_UNCERTAIN/
Michael Kerrisk (man-pages)
- [PATCH 08/16] Manual pages: cap_get_proc.3: formatting fix
Michael Kerrisk (man-pages)
- [PATCH 09/16] Manual pages: capsh.1: spelling fixes
Michael Kerrisk (man-pages)
- [PATCH 10/16] Manual pages: capsh.1: Remove stray .TP macro
Michael Kerrisk (man-pages)
- [PATCH 11/16] Manual pages: capsh.1: Correct/update the Cap field example for /proc/PID/status
Michael Kerrisk (man-pages)
- [PATCH 12/16] Manual pages: capsh.1: Update the capsh --decode example
Michael Kerrisk (man-pages)
- [PATCH 13/16] Manual pages: capsh.1: Describe the argument of --secbits in more detail
Michael Kerrisk (man-pages)
- [PATCH 14/16] pam_cap.c: Spelling fix in output string
Michael Kerrisk (man-pages)
- [PATCH 15/16] Various source files: spelling fixes on comments
Michael Kerrisk (man-pages)
- [PATCH 16/16] capsh.c: Spelling fixes in usage() message
Michael Kerrisk (man-pages)
- [PATCH 16/16] capsh.c: Spelling fixes in usage() message
Michael Kerrisk (man-pages)
- [PATCH 00/15] [libcap] Manual pages: various fixes
Michael Kerrisk (man-pages)
- [PATCH 01/15] Manual pages: various pages: Use "\-" for real minus signs
Michael Kerrisk (man-pages)
- [PATCH 02/15] Manual pages: cap_init.3: Formatting fix
Michael Kerrisk (man-pages)
- [PATCH 03/15] Manual pages: capsh.1: Various minor wording and formatting fixes
Michael Kerrisk (man-pages)
- [PATCH 04/15] Manual pages: cap_copy_ext.3: Typo fix
Michael Kerrisk (man-pages)
- [PATCH 05/15] Manual pages; cap_get_file.3: Fix some clumsily worded text
Michael Kerrisk (man-pages)
- [PATCH 06/15] Manual pages: getcap.8: Add missing word
Michael Kerrisk (man-pages)
- [PATCH 07/15] Manual pages: getcap.8: Fix a clumsily worded sentence
Michael Kerrisk (man-pages)
- [PATCH 08/15] Manual pages: getpcaps.8: Format options as a hanging list
Michael Kerrisk (man-pages)
- [PATCH 09/15] Manual pages: getpcaps.8: Remove a stray .br macro
Michael Kerrisk (man-pages)
- [PATCH 10/15] Manual pages: getpcaps.8: SEE ALSO: fix section number for capsh
Michael Kerrisk (man-pages)
- [PATCH 11/15] Manual pages: setcap.8: Typo fix
Michael Kerrisk (man-pages)
- [PATCH 12/15] Manual pages: cap_get_file.3: NOTES: note the effect of the Ambient set
Michael Kerrisk (man-pages)
- [PATCH 13/15] Manual pages: cap_get_proc.3: Update description of capsetp()
Michael Kerrisk (man-pages)
- [PATCH 14/15] Manual pages: cap_get_proc.3, capsh.1: Use "UID" and "GID" consistently
Michael Kerrisk (man-pages)
- [PATCH 15/15] Manual pages: capsh.1: Change .TP indent to the default
Michael Kerrisk (man-pages)
- [PATCH 12/15] Manual pages: cap_get_file.3: NOTES: note the effect of the Ambient set
Michael Kerrisk (man-pages)
- [PATCH] Manual pages: cap_from_text.3: Clarify a detail of cap_from_text() action list
Michael Kerrisk (man-pages)
- [PATCH] Manual pages: use "root user ID" rather than "rootid"
Michael Kerrisk (man-pages)
- PROJECT FINANCING / CAPITAL INVESTMENT.
Engr. Issah Ahmed
- Your Partnership
Rashid Al-Wahaibi
- [PATCH v2] netfilter: Replace HTTP links with HTTPS ones
Pablo Neira Ayuso
- [PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
Ravi Bangoria
- [V2 PATCH 1/3] Refactoring powerpc code for carrying over IMA measurement logs, to move non architecture specific code to security/ima.
Thiago Jung Bauermann
- [PATCH v9 0/2] tpm2: Make TPM2 logs accessible for non-UEFI firmware
Stefan Berger
- [PATCH v9 1/2] acpi: Extend TPM2 ACPI table with missing log fields
Stefan Berger
- [PATCH v9 2/2] tpm: Add support for event log pointer found in TPM2 ACPI table
Stefan Berger
- [PATCH v9 2/2] tpm: Add support for event log pointer found in TPM2 ACPI table
Stefan Berger
- [RESEND, PATCH v9 0/2] tpm2: Make TPM2 logs accessible for non-UEFI firmware
Stefan Berger
- [RESEND, PATCH v9 1/2] acpi: Extend TPM2 ACPI table with missing log fields
Stefan Berger
- [RESEND, PATCH v9 2/2] tpm: Add support for event log pointer found in TPM2 ACPI table
Stefan Berger
- [PATCH v9 2/2] tpm: Add support for event log pointer found in TPM2 ACPI table
Stefan Berger
- [PATCH v9 2/2] tpm: Add support for event log pointer found in TPM2 ACPI table
Stefan Berger
- [PATCH v9 2/2] tpm: Add support for event log pointer found in TPM2 ACPI table
Stefan Berger
- [PATCH v9 2/2] tpm: Add support for event log pointer found in TPM2 ACPI table
Stefan Berger
- [PATCH v19 09/12] arch: Wire up landlock() syscall
Arnd Bergmann
- [PATCH v19 09/12] arch: Wire up landlock() syscall
Arnd Bergmann
- [PATCH v19 08/12] landlock: Add syscall implementation
Arnd Bergmann
- [PATCH v19 09/12] arch: Wire up landlock() syscall
Arnd Bergmann
- [PATCH v19 08/12] landlock: Add syscall implementation
Arnd Bergmann
- [PATCH v19 08/12] landlock: Add syscall implementation
Arnd Bergmann
- [PATCH v2 00/15] Make the user mode driver code a better citizen
Eric W. Biederman
- [PATCH v2 05/15] umh: Separate the user mode driver and the user mode helper support
Eric W. Biederman
- [PATCH v2 00/15] Make the user mode driver code a better citizen
Eric W. Biederman
- [PATCH v2 00/15] Make the user mode driver code a better citizen
Eric W. Biederman
- [PATCH v3 00/16] Make the user mode driver code a better citizen
Eric W. Biederman
- [PATCH v3 01/16] umh: Capture the pid in umh_pipe_setup
Eric W. Biederman
- [PATCH v3 02/16] umh: Move setting PF_UMH into umh_pipe_setup
Eric W. Biederman
- [PATCH v3 03/16] umh: Rename the user mode driver helpers for clarity
Eric W. Biederman
- [PATCH v3 04/16] umh: Remove call_usermodehelper_setup_file.
Eric W. Biederman
- [PATCH v3 05/16] umh: Separate the user mode driver and the user mode helper support
Eric W. Biederman
- [PATCH v3 06/16] umd: For clarity rename umh_info umd_info
Eric W. Biederman
- [PATCH v3 07/16] umd: Rename umd_info.cmdline umd_info.driver_name
Eric W. Biederman
- [PATCH v3 08/16] umd: Transform fork_usermode_blob into fork_usermode_driver
Eric W. Biederman
- [PATCH v3 09/16] umh: Stop calling do_execve_file
Eric W. Biederman
- [PATCH v3 10/16] exec: Remove do_execve_file
Eric W. Biederman
- [PATCH v3 11/16] bpfilter: Move bpfilter_umh back into init data
Eric W. Biederman
- [PATCH v3 12/16] umd: Track user space drivers with struct pid
Eric W. Biederman
- [PATCH v3 13/16] exit: Factor thread_group_exited out of pidfd_poll
Eric W. Biederman
- [PATCH v3 14/16] bpfilter: Take advantage of the facilities of struct pid
Eric W. Biederman
- [PATCH v3 15/16] umd: Remove exit_umh
Eric W. Biederman
- [PATCH v3 16/16] umd: Stop using split_argv
Eric W. Biederman
- [PATCH v3 13/16] exit: Factor thread_group_exited out of pidfd_poll
Eric W. Biederman
- [PATCH v2 00/15] Make the user mode driver code a better citizen
Eric W. Biederman
- [PATCH v3 13/16] exit: Factor thread_group_exited out of pidfd_poll
Eric W. Biederman
- [PATCH v3 13/16] exit: Factor thread_group_exited out of pidfd_poll
Eric W. Biederman
- [PATCH v2 00/15] Make the user mode driver code a better citizen
Eric W. Biederman
- [PATCH v3 10/16] exec: Remove do_execve_file
Eric W. Biederman
- [merged][PATCH v3 00/16] Make the user mode driver code a better citizen
Eric W. Biederman
- [PATCH 0/7] Implementing kernel_execve
Eric W. Biederman
- [PATCH 1/7] exec: Remove unnecessary spaces from binfmts.h
Eric W. Biederman
- [PATCH 2/7] exec: Factor out alloc_bprm
Eric W. Biederman
- [PATCH 3/7] exec: Move initialization of bprm->filename into alloc_bprm
Eric W. Biederman
- [PATCH 4/7] exec: Move bprm_mm_init into alloc_bprm
Eric W. Biederman
- [PATCH 5/7] exec: Factor bprm_execve out of do_execve_common
Eric W. Biederman
- [PATCH 6/7] exec: Factor bprm_stack_limits out of prepare_arg_pages
Eric W. Biederman
- [PATCH 7/7] exec: Implement kernel_execve
Eric W. Biederman
- [PATCH 7/7] exec: Implement kernel_execve
Eric W. Biederman
- [RFC PATCH 0/5] keys: Security changes, ACLs and Container keyring
Eric W. Biederman
- [PATCH] Smack: fix use-after-free in smk_write_relabel_self()
Eric Biggers
- kernel panic: smack: Failed to initialize cipso DOI.
Eric Biggers
- [PATCH] Smack: fix use-after-free in smk_write_relabel_self()
Eric Biggers
- [RFC PATCH v5 06/11] dm-verity: move signature check after tree validation
Eric Biggers
- [PATCH] bpf: lsm: Disable or enable BPF LSM at boot time
Daniel Borkmann
- [PATCH v3 13/16] exit: Factor thread_group_exited out of pidfd_poll
Daniel Borkmann
- linux-next: umh: fix processed error when UMH_WAIT_PROC is used seems to break linux bridge on s390x (bisected)
Christian Borntraeger
- linux-next: umh: fix processed error when UMH_WAIT_PROC is used seems to break linux bridge on s390x (bisected)
Christian Borntraeger
- linux-next: umh: fix processed error when UMH_WAIT_PROC is used seems to break linux bridge on s390x (bisected)
Christian Borntraeger
- linux-next: umh: fix processed error when UMH_WAIT_PROC is used seems to break linux bridge on s390x (bisected)
Christian Borntraeger
- [RFC PATCH v4 00/12] Integrity Policy Enforcement LSM (IPE)
Deven Bowers
- [RFC PATCH v4 01/12] scripts: add ipe tooling to generate boot policy
Deven Bowers
- [RFC PATCH v4 02/12] security: add ipe lsm evaluation loop and audit system
Deven Bowers
- [RFC PATCH v4 03/12] security: add ipe lsm policy parser and policy loading
Deven Bowers
- [RFC PATCH v4 04/12] ipe: add property for trust of boot volume
Deven Bowers
- [RFC PATCH v4 05/12] fs: add security blob and hooks for block_device
Deven Bowers
- [RFC PATCH v4 06/12] dm-verity: move signature check after tree validation
Deven Bowers
- [RFC PATCH v4 07/12] dm-verity: add bdev_setsecurity hook for dm-verity signature
Deven Bowers
- [RFC PATCH v4 08/12] ipe: add property for signed dmverity volumes
Deven Bowers
- [RFC PATCH v4 09/12] dm-verity: add bdev_setsecurity hook for root-hash
Deven Bowers
- [RFC PATCH v4 10/12] ipe: add property for dmverity roothash
Deven Bowers
- [RFC PATCH v4 11/12] documentation: add ipe documentation
Deven Bowers
- [RFC PATCH v4 12/12] cleanup: uapi/linux/audit.h
Deven Bowers
- [RFC PATCH v4 05/12] fs: add security blob and hooks for block_device
Deven Bowers
- [RFC PATCH v4 02/12] security: add ipe lsm evaluation loop and audit system
Deven Bowers
- [RFC PATCH v5 00/11] Integrity Policy Enforcement LSM (IPE)
Deven Bowers
- [RFC PATCH v5 01/11] scripts: add ipe tooling to generate boot policy
Deven Bowers
- [RFC PATCH v5 02/11] security: add ipe lsm evaluation loop and audit system
Deven Bowers
- [RFC PATCH v5 03/11] security: add ipe lsm policy parser and policy loading
Deven Bowers
- [RFC PATCH v5 04/11] ipe: add property for trust of boot volume
Deven Bowers
- [RFC PATCH v5 05/11] fs: add security blob and hooks for block_device
Deven Bowers
- [RFC PATCH v5 06/11] dm-verity: move signature check after tree validation
Deven Bowers
- [RFC PATCH v5 07/11] dm-verity: add bdev_setsecurity hook for dm-verity signature
Deven Bowers
- [RFC PATCH v5 08/11] ipe: add property for signed dmverity volumes
Deven Bowers
- [RFC PATCH v5 09/11] dm-verity: add bdev_setsecurity hook for root-hash
Deven Bowers
- [RFC PATCH v5 10/11] documentation: add ipe documentation
Deven Bowers
- [RFC PATCH v5 10/12] ipe: add property for dmverity roothash
Deven Bowers
- [RFC PATCH v5 11/11] cleanup: uapi/linux/audit.h
Deven Bowers
- [RFC PATCH v5 11/12] documentation: add ipe documentation
Deven Bowers
- [RFC PATCH v5 12/12] cleanup: uapi/linux/audit.h
Deven Bowers
- [RFC PATCH v5 06/11] dm-verity: move signature check after tree validation
Deven Bowers
- [RFC PATCH v5 05/11] fs: add security blob and hooks for block_device
Deven Bowers
- [RFC PATCH v6 00/11] Integrity Policy Enforcement LSM (IPE)
Deven Bowers
- [RFC PATCH v6 01/11] scripts: add ipe tooling to generate boot policy
Deven Bowers
- [RFC PATCH v6 02/11] security: add ipe lsm evaluation loop and audit system
Deven Bowers
- [RFC PATCH v6 03/11] security: add ipe lsm policy parser and policy loading
Deven Bowers
- [RFC PATCH v6 04/11] ipe: add property for trust of boot volume
Deven Bowers
- [RFC PATCH v6 05/11] fs: add security blob and hooks for block_device
Deven Bowers
- [RFC PATCH v6 06/11] dm-verity: add bdev_setsecurity hook for dm-verity signature
Deven Bowers
- [RFC PATCH v6 07/11] ipe: add property for signed dmverity volumes
Deven Bowers
- [RFC PATCH v6 08/11] dm-verity: add bdev_setsecurity hook for root-hash
Deven Bowers
- [RFC PATCH v6 09/11] ipe: add property for dmverity roothash
Deven Bowers
- [RFC PATCH v6 10/11] documentation: add ipe documentation
Deven Bowers
- [RFC PATCH v6 11/11] cleanup: uapi/linux/audit.h
Deven Bowers
- [PATCH v10 0/9] firmware: add request_partial_firmware_into_buf
Scott Branden
- [PATCH v10 1/9] fs: move kernel_read_file* to its own include file
Scott Branden
- [PATCH v10 2/9] fs: introduce kernel_pread_file* support
Scott Branden
- [PATCH v10 3/9] firmware: add request_partial_firmware_into_buf
Scott Branden
- [PATCH v10 4/9] test_firmware: add partial read support for request_firmware_into_buf
Scott Branden
- [PATCH v10 5/9] firmware: test partial file reads of request_partial_firmware_into_buf
Scott Branden
- [PATCH v10 6/9] bcm-vk: add bcm_vk UAPI
Scott Branden
- [PATCH v10 8/9] MAINTAINERS: bcm-vk: add maintainer for Broadcom VK Driver
Scott Branden
- [PATCH v10 9/9] ima: add FIRMWARE_PARTIAL_READ support
Scott Branden
- [PATCH 2/4] fs: Remove FIRMWARE_PREALLOC_BUFFER from kernel_read_file() enums
Scott Branden
- [PATCH v10 9/9] ima: add FIRMWARE_PARTIAL_READ support
Scott Branden
- [PATCH 2/4] fs: Remove FIRMWARE_PREALLOC_BUFFER from kernel_read_file() enums
Scott Branden
- [PATCH v10 9/9] ima: add FIRMWARE_PARTIAL_READ support
Scott Branden
- [PATCH v10 1/9] fs: move kernel_read_file* to its own include file
Scott Branden
- [PATCH v10 2/9] fs: introduce kernel_pread_file* support
Scott Branden
- [PATCH v10 3/9] firmware: add request_partial_firmware_into_buf
Scott Branden
- [PATCH v10 4/9] test_firmware: add partial read support for request_firmware_into_buf
Scott Branden
- [PATCH v10 7/9] misc: bcm-vk: add Broadcom VK driver
Scott Branden
- [PATCH v10 2/9] fs: introduce kernel_pread_file* support
Scott Branden
- [PATCH v10 0/9] firmware: add request_partial_firmware_into_buf
Scott Branden
- [PATCH 2/4] fs: Remove FIRMWARE_PREALLOC_BUFFER from kernel_read_file() enums
Scott Branden
- [PATCH 2/4] fs: Remove FIRMWARE_PREALLOC_BUFFER from kernel_read_file() enums
Scott Branden
- [PATCH 2/4] fs: Remove FIRMWARE_PREALLOC_BUFFER from kernel_read_file() enums
Scott Branden
- [PATCH 2/4] fs: Remove FIRMWARE_PREALLOC_BUFFER from kernel_read_file() enums
Scott Branden
- [PATCH 06/13] fs/kernel_read_file: Remove redundant size argument
Scott Branden
- [PATCH 01/13] firmware_loader: EFI firmware loader must handle pre-allocated buffer
Scott Branden
- [PATCH 02/13] fs/kernel_read_file: Remove FIRMWARE_PREALLOC_BUFFER enum
Scott Branden
- [PATCH 03/13] fs/kernel_read_file: Remove FIRMWARE_EFI_EMBEDDED enum
Scott Branden
- [PATCH 05/13] fs/kernel_read_file: Split into separate source file
Scott Branden
- [PATCH 00/13] Introduce partial kernel_read_file() support
Scott Branden
- [PATCH 06/13] fs/kernel_read_file: Remove redundant size argument
Scott Branden
- [PATCH 06/13] fs/kernel_read_file: Remove redundant size argument
Scott Branden
- [PATCH 06/13] fs/kernel_read_file: Remove redundant size argument
Scott Branden
- [PATCH v3 00/19] Introduce partial kernel_read_file() support
Scott Branden
- [PATCH v3 00/19] Introduce partial kernel_read_file() support
Scott Branden
- [PATCH v3 00/19] Introduce partial kernel_read_file() support
Scott Branden
- [PATCH v4 1/3] capabilities: Introduce CAP_CHECKPOINT_RESTORE
Christian Brauner
- [PATCH v4 3/3] prctl: Allow ptrace capable processes to change /proc/self/exe
Christian Brauner
- [PATCH v3 13/16] exit: Factor thread_group_exited out of pidfd_poll
Christian Brauner
- [PATCH v3 13/16] exit: Factor thread_group_exited out of pidfd_poll
Christian Brauner
- [PATCH v4 3/3] prctl: Allow ptrace capable processes to change /proc/self/exe
Christian Brauner
- [PATCH v4 3/3] prctl: Allow ptrace capable processes to change /proc/self/exe
Christian Brauner
- [PATCH v19 08/12] landlock: Add syscall implementation
Christian Brauner
- [PATCH v5 1/6] capabilities: Introduce CAP_CHECKPOINT_RESTORE
Christian Brauner
- [PATCH v5 2/6] pid: use checkpoint_restore_ns_capable() for set_tid
Christian Brauner
- [PATCH v5 3/6] pid_namespace: use checkpoint_restore_ns_capable() for ns_last_pid
Christian Brauner
- [PATCH v5 5/6] prctl: Allow checkpoint/restore capable processes to change exe link
Christian Brauner
- [PATCH v5 6/6] selftests: add clone3() CAP_CHECKPOINT_RESTORE test
Christian Brauner
- [PATCH v5 4/6] proc: allow access in init userns for map_files with CAP_CHECKPOINT_RESTORE
Christian Brauner
- [PATCH v5 0/6] capabilities: Introduce CAP_CHECKPOINT_RESTORE
Christian Brauner
- [PATCH v6 0/7] capabilities: Introduce CAP_CHECKPOINT_RESTORE
Christian Brauner
- [PATCH v6 0/7] capabilities: Introduce CAP_CHECKPOINT_RESTORE
Christian Brauner
- [PATCH v6 0/7] capabilities: Introduce CAP_CHECKPOINT_RESTORE
Christian Brauner
- [PATCH v7 0/7] Add support for O_MAYEXEC
Christian Brauner
- [PATCH ghak96 v3] audit: issue CWD record to accompany LSM_AUDIT_DATA_* records
Richard Guy Briggs
- [PATCH ghak84 v2] audit: purge audit_log_string from the intra-kernel audit API
Richard Guy Briggs
- [PATCH ghak84 v3] audit: purge audit_log_string from the intra-kernel audit API
Richard Guy Briggs
- [PATCH ghak84 v3] audit: purge audit_log_string from the intra-kernel audit API
Richard Guy Briggs
- [PATCH ghak84 v4] audit: purge audit_log_string from the intra-kernel audit API
Richard Guy Briggs
- [PATCH ghak84 v4] audit: purge audit_log_string from the intra-kernel audit API
Richard Guy Briggs
- [PATCH ghak84 v4] audit: purge audit_log_string from the intra-kernel audit API
Richard Guy Briggs
- [PATCH V3fix ghak120] audit: initialize context values in case of mandatory events
Richard Guy Briggs
- [PATCH V3fix ghak120] audit: initialize context values in case of mandatory events
Richard Guy Briggs
- [PATCH V3fix ghak120] audit: initialize context values in case of mandatory events
Richard Guy Briggs
- [PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
Alexey Budankov
- [PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
Alexey Budankov
- [PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
Alexey Budankov
- [PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
Alexey Budankov
- [PATCH 1/2] Smack: fix another vsscanf out of bounds
Dan Carpenter
- [PATCH 2/2] Smack: prevent underflow in smk_set_cipso()
Dan Carpenter
- [PATCH 2/2] LSM: SafeSetID: Add GID security policy handling
Thomas Cedeno
- INFO: task hung in request_key_tag
Luis Chamberlain
- linux-next: umh: fix processed error when UMH_WAIT_PROC is used seems to break linux bridge on s390x (bisected)
Luis Chamberlain
- linux-next: umh: fix processed error when UMH_WAIT_PROC is used seems to break linux bridge on s390x (bisected)
Luis Chamberlain
- linux-next: umh: fix processed error when UMH_WAIT_PROC is used seems to break linux bridge on s390x (bisected)
Luis Chamberlain
- linux-next: umh: fix processed error when UMH_WAIT_PROC is used seems to break linux bridge on s390x (bisected)
Luis Chamberlain
- linux-next: umh: fix processed error when UMH_WAIT_PROC is used seems to break linux bridge on s390x (bisected)
Luis Chamberlain
- linux-next: umh: fix processed error when UMH_WAIT_PROC is used seems to break linux bridge on s390x (bisected)
Luis Chamberlain
- [v2 PATCH] crypto: af_alg - Fix regression on empty requests
Luis Chamberlain
- [PATCH v2 00/15] Make the user mode driver code a better citizen
Luis Chamberlain
- [PATCH v3 10/16] exec: Remove do_execve_file
Luis Chamberlain
- [PATCH 0/4] Fix misused kernel_read_file() enums
Luis Chamberlain
- [PATCH v3 10/16] exec: Remove do_execve_file
Luis Chamberlain
- [PATCH 0/4] Fix misused kernel_read_file() enums
Luis Chamberlain
- [PATCH v3 10/16] exec: Remove do_execve_file
Luis Chamberlain
- [PATCH v3 18/19] firmware: Add request_partial_firmware_into_buf()
Luis Chamberlain
- [PATCH v3 00/19] Introduce partial kernel_read_file() support
Luis Chamberlain
- [PATCH 0/3] fs: reduce export usage of kerne_read*() calls
Luis Chamberlain
- [PATCH v33 11/21] x86/sgx: Linux Enclave Driver
Sean Christopherson
- [PATCH v33 11/21] x86/sgx: Linux Enclave Driver
Sean Christopherson
- [PATCH v34 11/24] x86/sgx: Add SGX enclave driver
Sean Christopherson
- [PATCH v34 11/24] x86/sgx: Add SGX enclave driver
Sean Christopherson
- [PATCH v10 9/9] ima: add FIRMWARE_PARTIAL_READ support
Kees Cook
- [PATCH 0/4] Fix misused kernel_read_file() enums
Kees Cook
- [PATCH 1/4] firmware_loader: EFI firmware loader must handle pre-allocated buffer
Kees Cook
- [PATCH 2/4] fs: Remove FIRMWARE_PREALLOC_BUFFER from kernel_read_file() enums
Kees Cook
- [PATCH 3/4] fs: Remove FIRMWARE_EFI_EMBEDDED from kernel_read_file() enums
Kees Cook
- [PATCH 4/4] module: Add hook for security_kernel_post_read_file()
Kees Cook
- [PATCH 0/4] Fix misused kernel_read_file() enums
Kees Cook
- [PATCH 2/4] fs: Remove FIRMWARE_PREALLOC_BUFFER from kernel_read_file() enums
Kees Cook
- [PATCH v10 9/9] ima: add FIRMWARE_PARTIAL_READ support
Kees Cook
- [PATCH v10 1/9] fs: move kernel_read_file* to its own include file
Kees Cook
- [PATCH v10 2/9] fs: introduce kernel_pread_file* support
Kees Cook
- [PATCH v10 3/9] firmware: add request_partial_firmware_into_buf
Kees Cook
- [PATCH v10 4/9] test_firmware: add partial read support for request_firmware_into_buf
Kees Cook
- [PATCH v10 7/9] misc: bcm-vk: add Broadcom VK driver
Kees Cook
- [PATCH 4/4] module: Add hook for security_kernel_post_read_file()
Kees Cook
- [PATCH 2/4] fs: Remove FIRMWARE_PREALLOC_BUFFER from kernel_read_file() enums
Kees Cook
- [PATCH 0/4] Fix misused kernel_read_file() enums
Kees Cook
- [PATCH 2/4] fs: Remove FIRMWARE_PREALLOC_BUFFER from kernel_read_file() enums
Kees Cook
- [PATCH 4/7] exec: Move bprm_mm_init into alloc_bprm
Kees Cook
- [PATCH 5/7] exec: Factor bprm_execve out of do_execve_common
Kees Cook
- [PATCH 1/7] exec: Remove unnecessary spaces from binfmts.h
Kees Cook
- [PATCH 2/7] exec: Factor out alloc_bprm
Kees Cook
- [PATCH 3/7] exec: Move initialization of bprm->filename into alloc_bprm
Kees Cook
- [PATCH 6/7] exec: Factor bprm_stack_limits out of prepare_arg_pages
Kees Cook
- [PATCH 7/7] exec: Implement kernel_execve
Kees Cook
- [PATCH 7/7] exec: Implement kernel_execve
Kees Cook
- [PATCH 7/7] exec: Implement kernel_execve
Kees Cook
- [PATCH v6 4/7] fs: Introduce O_MAYEXEC flag for openat2(2)
Kees Cook
- [PATCH v6 5/7] fs,doc: Enable to enforce noexec mounts or file exec through O_MAYEXEC
Kees Cook
- [PATCH v6 6/7] selftest/openat2: Add tests for O_MAYEXEC enforcing
Kees Cook
- [PATCH v6 7/7] ima: add policy support for the new file open MAY_OPENEXEC flag
Kees Cook
- [PATCH v6 4/7] fs: Introduce O_MAYEXEC flag for openat2(2)
Kees Cook
- [PATCH v6 7/7] ima: add policy support for the new file open MAY_OPENEXEC flag
Kees Cook
- [PATCH v6 7/7] ima: add policy support for the new file open MAY_OPENEXEC flag
Kees Cook
- [PATCH 2/4] fs: Remove FIRMWARE_PREALLOC_BUFFER from kernel_read_file() enums
Kees Cook
- [PATCH 00/13] Introduce partial kernel_read_file() support
Kees Cook
- [PATCH 01/13] firmware_loader: EFI firmware loader must handle pre-allocated buffer
Kees Cook
- [PATCH 02/13] fs/kernel_read_file: Remove FIRMWARE_PREALLOC_BUFFER enum
Kees Cook
- [PATCH 03/13] fs/kernel_read_file: Remove FIRMWARE_EFI_EMBEDDED enum
Kees Cook
- [PATCH 04/13] fs/kernel_read_file: Split into separate include file
Kees Cook
- [PATCH 05/13] fs/kernel_read_file: Split into separate source file
Kees Cook
- [PATCH 06/13] fs/kernel_read_file: Remove redundant size argument
Kees Cook
- [PATCH 07/13] fs/kernel_read_file: Switch buffer size arg to size_t
Kees Cook
- [PATCH 08/13] fs/kernel_read_file: Add file_size output argument
Kees Cook
- [PATCH 09/13] LSM: Introduce kernel_post_load_data() hook
Kees Cook
- [PATCH 10/13] firmware_loader: Use security_post_load_data()
Kees Cook
- [PATCH 11/13] module: Call security_kernel_post_load_data()
Kees Cook
- [PATCH 12/13] LSM: Add "contents" flag to kernel_read_file hook
Kees Cook
- [PATCH 13/13] fs/kernel_file_read: Add "offset" arg for partial reads
Kees Cook
- [PATCH 06/13] fs/kernel_read_file: Remove redundant size argument
Kees Cook
- [PATCH 00/13] Introduce partial kernel_read_file() support
Kees Cook
- [PATCH 06/13] fs/kernel_read_file: Remove redundant size argument
Kees Cook
- [PATCH v6 5/7] fs,doc: Enable to enforce noexec mounts or file exec through O_MAYEXEC
Kees Cook
- [PATCH v7 4/7] fs: Introduce O_MAYEXEC flag for openat2(2)
Kees Cook
- [PATCH v7 5/7] fs,doc: Enable to enforce noexec mounts or file exec through O_MAYEXEC
Kees Cook
- [PATCH v7 6/7] selftest/openat2: Add tests for O_MAYEXEC enforcing
Kees Cook
- [PATCH v7 7/7] ima: add policy support for the new file open MAY_OPENEXEC flag
Kees Cook
- [PATCH v7 0/7] Add support for O_MAYEXEC
Kees Cook
- [PATCH v3 00/19] Introduce partial kernel_read_file() support
Kees Cook
- [PATCH v3 01/19] test_firmware: Test platform fw loading on non-EFI systems
Kees Cook
- [PATCH v3 02/19] selftest/firmware: Add selftest timeout in settings
Kees Cook
- [PATCH v3 03/19] firmware_loader: EFI firmware loader must handle pre-allocated buffer
Kees Cook
- [PATCH v3 04/19] fs/kernel_read_file: Remove FIRMWARE_PREALLOC_BUFFER enum
Kees Cook
- [PATCH v3 05/19] fs/kernel_read_file: Remove FIRMWARE_EFI_EMBEDDED enum
Kees Cook
- [PATCH v3 06/19] fs/kernel_read_file: Split into separate include file
Kees Cook
- [PATCH v3 07/19] fs/kernel_read_file: Split into separate source file
Kees Cook
- [PATCH v3 08/19] fs/kernel_read_file: Remove redundant size argument
Kees Cook
- [PATCH v3 09/19] fs/kernel_read_file: Switch buffer size arg to size_t
Kees Cook
- [PATCH v3 10/19] fs/kernel_read_file: Add file_size output argument
Kees Cook
- [PATCH v3 11/19] LSM: Introduce kernel_post_load_data() hook
Kees Cook
- [PATCH v3 12/19] firmware_loader: Use security_post_load_data()
Kees Cook
- [PATCH v3 13/19] module: Call security_kernel_post_load_data()
Kees Cook
- [PATCH v3 14/19] LSM: Add "contents" flag to kernel_read_file hook
Kees Cook
- [PATCH v3 15/19] IMA: Add support for file reads without contents
Kees Cook
- [PATCH v3 16/19] fs/kernel_file_read: Add "offset" arg for partial reads
Kees Cook
- [PATCH v3 17/19] firmware: Store opt_flags in fw_priv
Kees Cook
- [PATCH v3 18/19] firmware: Add request_partial_firmware_into_buf()
Kees Cook
- [PATCH v3 19/19] test_firmware: Test partial read support
Kees Cook
- [PATCH v3 00/19] Introduce partial kernel_read_file() support
Kees Cook
- [PATCH v3 03/19] firmware_loader: EFI firmware loader must handle pre-allocated buffer
Kees Cook
- [PATCH v3 11/19] LSM: Introduce kernel_post_load_data() hook
Kees Cook
- [PATCH v3 12/19] firmware_loader: Use security_post_load_data()
Kees Cook
- [PATCH v3 15/19] IMA: Add support for file reads without contents
Kees Cook
- [PATCH v3 15/19] IMA: Add support for file reads without contents
Kees Cook
- [PATCH v3 18/19] firmware: Add request_partial_firmware_into_buf()
Kees Cook
- [PATCH v4 00/17] Introduce partial kernel_read_file() support
Kees Cook
- [PATCH v4 01/17] test_firmware: Test platform fw loading on non-EFI systems
Kees Cook
- [PATCH v4 02/17] fs/kernel_read_file: Remove FIRMWARE_PREALLOC_BUFFER enum
Kees Cook
- [PATCH v4 03/17] fs/kernel_read_file: Remove FIRMWARE_EFI_EMBEDDED enum
Kees Cook
- [PATCH v4 04/17] fs/kernel_read_file: Split into separate include file
Kees Cook
- [PATCH v4 05/17] fs/kernel_read_file: Split into separate source file
Kees Cook
- [PATCH v4 06/17] fs/kernel_read_file: Remove redundant size argument
Kees Cook
- [PATCH v4 07/17] fs/kernel_read_file: Switch buffer size arg to size_t
Kees Cook
- [PATCH v4 08/17] fs/kernel_read_file: Add file_size output argument
Kees Cook
- [PATCH v4 09/17] LSM: Introduce kernel_post_load_data() hook
Kees Cook
- [PATCH v4 10/17] firmware_loader: Use security_post_load_data()
Kees Cook
- [PATCH v4 11/17] module: Call security_kernel_post_load_data()
Kees Cook
- [PATCH v4 12/17] LSM: Add "contents" flag to kernel_read_file hook
Kees Cook
- [PATCH v4 13/17] IMA: Add support for file reads without contents
Kees Cook
- [PATCH v4 14/17] fs/kernel_file_read: Add "offset" arg for partial reads
Kees Cook
- [PATCH v4 15/17] firmware: Store opt_flags in fw_priv
Kees Cook
- [PATCH v4 16/17] firmware: Add request_partial_firmware_into_buf()
Kees Cook
- [PATCH v4 17/17] test_firmware: Test partial read support
Kees Cook
- [PATCH v3 12/19] firmware_loader: Use security_post_load_data()
Kees Cook
- [PATCH v19 07/12] landlock: Support filesystem access-control
Randy Dunlap
- [PATCH v6 5/7] fs,doc: Enable to enforce noexec mounts or file exec through O_MAYEXEC
Randy Dunlap
- [PATCH v6 7/7] ima: add policy support for the new file open MAY_OPENEXEC flag
Randy Dunlap
- [RFC PATCH v4 02/12] security: add ipe lsm evaluation loop and audit system
Randy Dunlap
- [PATCH] LSM: drop duplicated words in header file comments
Randy Dunlap
- [PATCH v10 0/9] firmware: add request_partial_firmware_into_buf
Florian Fainelli
- [PATCH] bpf: lsm: Disable or enable BPF LSM at boot time
Lorenzo Fontana
- [PATCH] bpf: lsm: Disable or enable BPF LSM at boot time
Lorenzo Fontana
- [PATCH 0/4] Fix misused kernel_read_file() enums
Hans de Goede
- [PATCH 0/4] Fix misused kernel_read_file() enums
Hans de Goede
- [PATCH 0/4] Fix misused kernel_read_file() enums
Hans de Goede
- [PATCH v4 3/3] prctl: Allow ptrace capable processes to change /proc/self/exe
Cyrill Gorcunov
- [PATCH v5 4/6] proc: allow access in init userns for map_files with CAP_CHECKPOINT_RESTORE
Cyrill Gorcunov
- [PATCH v33 12/21] x86/sgx: Allow a limited use of ATTRIBUTE.PROVISIONKEY for attestation
Dr. Greg
- [PATCH v4 2/3] selftests: add clone3() CAP_CHECKPOINT_RESTORE test
Serge E. Hallyn
- [PATCH v4 3/3] prctl: Allow ptrace capable processes to change /proc/self/exe
Serge E. Hallyn
- [PATCH v4 3/3] prctl: Allow ptrace capable processes to change /proc/self/exe
Serge E. Hallyn
- [PATCH v4 2/3] selftests: add clone3() CAP_CHECKPOINT_RESTORE test
Serge E. Hallyn
- [PATCH] capabilities: Replace HTTP links with HTTPS ones
Serge E. Hallyn
- [PATCH] LSM: drop duplicated words in header file comments
Serge E. Hallyn
- [PATCH v5 0/6] capabilities: Introduce CAP_CHECKPOINT_RESTORE
Serge E. Hallyn
- [PATCH v6 4/7] proc: allow access in init userns for map_files with CAP_CHECKPOINT_RESTORE
Serge E. Hallyn
- [PATCH v6 6/7] prctl: exe link permission error changed from -EINVAL to -EPERM
Serge E. Hallyn
- [PATCH 1/2] LSM: Signal to SafeSetID when in set*gid syscall
Serge E. Hallyn
- [PATCH 2/2] LSM: SafeSetID: Add GID security policy handling
Serge E. Hallyn
- [PATCH 2/2] LSM: SafeSetID: Add GID security policy handling
Serge E. Hallyn
- Ich grüße dich im Namen des Herrn
Theresa Han
- INFO: task hung in request_key_tag
Tetsuo Handa
- INFO: task hung in request_key_tag
Tetsuo Handa
- linux-next: umh: fix processed error when UMH_WAIT_PROC is used seems to break linux bridge on s390x (bisected)
Tetsuo Handa
- linux-next: umh: fix processed error when UMH_WAIT_PROC is used seems to break linux bridge on s390x (bisected)
Tetsuo Handa
- linux-next: umh: fix processed error when UMH_WAIT_PROC is used seems to break linux bridge on s390x (bisected)
Tetsuo Handa
- [PATCH v2 00/15] Make the user mode driver code a better citizen
Tetsuo Handa
- [PATCH v3 00/16] Make the user mode driver code a better citizen
Tetsuo Handa
- linux-next: umh: fix processed error when UMH_WAIT_PROC is used seems to break linux bridge on s390x (bisected)
Tetsuo Handa
- [PATCH v2 00/15] Make the user mode driver code a better citizen
Tetsuo Handa
- [PATCH v2 00/15] Make the user mode driver code a better citizen
Tetsuo Handa
- [fs] 140402bab8: stress-ng.splice.ops_per_sec -100.0% regression
Christoph Hellwig
- [PATCH 1/7] exec: Remove unnecessary spaces from binfmts.h
Christoph Hellwig
- [PATCH 2/7] exec: Factor out alloc_bprm
Christoph Hellwig
- [PATCH 3/7] exec: Move initialization of bprm->filename into alloc_bprm
Christoph Hellwig
- [PATCH 4/7] exec: Move bprm_mm_init into alloc_bprm
Christoph Hellwig
- [PATCH 5/7] exec: Factor bprm_execve out of do_execve_common
Christoph Hellwig
- [PATCH 6/7] exec: Factor bprm_stack_limits out of prepare_arg_pages
Christoph Hellwig
- [PATCH 7/7] exec: Implement kernel_execve
Christoph Hellwig
- [PATCH 7/7] exec: Implement kernel_execve
Christoph Hellwig
- [PATCH 7/7] exec: Implement kernel_execve
Christoph Hellwig
- [PATCH v2 11/11] ima: Support additional conditionals in the KEXEC_CMDLINE hook function
Tyler Hicks
- [PATCH v2 09/11] ima: Move validation of the keyrings conditional into ima_validate_rule()
Tyler Hicks
- [PATCH v2 09/11] ima: Move validation of the keyrings conditional into ima_validate_rule()
Tyler Hicks
- [PATCH v3 00/12] ima: Fix rule parsing bugs and extend KEXEC_CMDLINE rule support
Tyler Hicks
- [PATCH v3 01/12] ima: Have the LSM free its audit rule
Tyler Hicks
- [PATCH v3 02/12] ima: Free the entire rule when deleting a list of rules
Tyler Hicks
- [PATCH v3 03/12] ima: Free the entire rule if it fails to parse
Tyler Hicks
- [PATCH v3 04/12] ima: Fail rule parsing when buffer hook functions have an invalid action
Tyler Hicks
- [PATCH v3 05/12] ima: Fail rule parsing when the KEXEC_CMDLINE hook is combined with an invalid cond
Tyler Hicks
- [PATCH v3 06/12] ima: Fail rule parsing when the KEY_CHECK hook is combined with an invalid cond
Tyler Hicks
- [PATCH v3 07/12] ima: Fail rule parsing when appraise_flag=blacklist is unsupportable
Tyler Hicks
- [PATCH v3 08/12] ima: Shallow copy the args_p member of ima_rule_entry.lsm elements
Tyler Hicks
- [PATCH v3 09/12] ima: Use correct type for the args_p member of ima_rule_entry.lsm elements
Tyler Hicks
- [PATCH v3 10/12] ima: Move comprehensive rule validation checks out of the token parser
Tyler Hicks
- [PATCH v3 11/12] ima: Use the common function to detect LSM conditionals in a rule
Tyler Hicks
- [PATCH v3 12/12] ima: Support additional conditionals in the KEXEC_CMDLINE hook function
Tyler Hicks
- [PATCH] ima: Rename internal audit rule functions
Tyler Hicks
- [PATCH v2] ima: Rename internal audit rule functions
Tyler Hicks
- [RFC PATCH v3 03/12] security: add ipe lsm policy parser and policy loading
Tyler Hicks
- [PATCH v3 07/12] ima: Fail rule parsing when appraise_flag=blacklist is unsupportable
Tyler Hicks
- [PATCH v3 00/12] ima: Fix rule parsing bugs and extend KEXEC_CMDLINE rule support
Tyler Hicks
- [PATCH v3 08/12] ima: Shallow copy the args_p member of ima_rule_entry.lsm elements
Tyler Hicks
- [PATCH v3 07/12] ima: Fail rule parsing when appraise_flag=blacklist is unsupportable
Tyler Hicks
- [PATCH v3 06/12] ima: Fail rule parsing when the KEY_CHECK hook is combined with an invalid cond
Tyler Hicks
- [PATCH v3 01/12] ima: Have the LSM free its audit rule
Tyler Hicks
- [PATCH v3 06/12] ima: Fail rule parsing when the KEY_CHECK hook is combined with an invalid cond
Tyler Hicks
- [PATCH 0/2] ima: Fix keyrings race condition and other key related bugs
Tyler Hicks
- [PATCH 1/2] ima: Pre-parse the list of keyrings in a KEY_CHECK rule
Tyler Hicks
- [PATCH 2/2] ima: Fail rule parsing when asymmetric key measurement isn't supportable
Tyler Hicks
- [PATCH v5 1/4] IMA: Add func to measure LSM state and policy
Tyler Hicks
- [PATCH v5 2/4] IMA: Define IMA hooks to measure LSM state and policy
Tyler Hicks
- [PATCH v5 1/4] IMA: Add func to measure LSM state and policy
Tyler Hicks
- [PATCH v5 4/4] IMA: Handle early boot data measurement
Tyler Hicks
- [PATCH v18 22/23] LSM: Add /proc attr entry for full LSM context
Jann Horn
- [PATCH] keys: asymmetric: fix error return code in software_key_query()
David Howells
- [RFC PATCH 0/5] keys: Security changes, ACLs and Container keyring
David Howells
- [RFC PATCH 1/5] keys: Move permissions checking decisions into the checking code
David Howells
- [RFC PATCH 3/5] keys: Provide KEYCTL_GRANT_PERMISSION
David Howells
- [RFC PATCH 4/5] keys: Split the search perms between KEY_NEED_USE and KEY_NEED_SEARCH
David Howells
- [RFC PATCH 5/5] keys: Implement a 'container' keyring
David Howells
- [PATCH] KEYS: remove redundant memsets
David Howells
- [PATCH] keys: asymmetric: fix error return code in software_key_query()
David Howells
- [PATCH] keys: asymmetric: fix error return code in software_key_query()
David Howells
- [PATCH 13/17] watch_queue: Implement mount topology and attribute change notifications [ver #5]
David Howells
- [PATCH 13/17] watch_queue: Implement mount topology and attribute change notifications [ver #5]
David Howells
- [PATCH 13/17] watch_queue: Implement mount topology and attribute change notifications [ver #5]
David Howells
- [PATCH 0/4] Mount notifications
David Howells
- [PATCH 1/4] watch_queue: Make watch_sizeof() check record size
David Howells
- [PATCH 2/4] watch_queue: Add security hooks to rule on setting mount watches
David Howells
- [PATCH 3/4] watch_queue: Implement mount topology and attribute change notifications
David Howells
- [PATCH 4/4] watch_queue: sample: Display mount tree change notifications
David Howells
- [PATCH 00/17] VFS: Filesystem information [ver #20]
David Howells
- [PATCH 01/17] fsinfo: Introduce a non-repeating system-unique superblock ID [ver #20]
David Howells
- [PATCH 02/17] fsinfo: Add fsinfo() syscall to query filesystem information [ver #20]
David Howells
- [PATCH 03/17] fsinfo: Provide a bitmap of the features a filesystem supports [ver #20]
David Howells
- [PATCH 04/17] fsinfo: Allow retrieval of superblock devname, options and stats [ver #20]
David Howells
- [PATCH 05/17] fsinfo: Allow fsinfo() to look up a mount object by ID [ver #20]
David Howells
- [PATCH 06/17] fsinfo: Add a uniquifier ID to struct mount [ver #20]
David Howells
- [PATCH 07/17] fsinfo: Allow mount information to be queried [ver #20]
David Howells
- [PATCH 08/17] fsinfo: Allow mount topology and propagation info to be retrieved [ver #20]
David Howells
- [PATCH 09/17] fsinfo: Provide notification overrun handling support [ver #20]
David Howells
- [PATCH 10/17] fsinfo: sample: Mount listing program [ver #20]
David Howells
- [PATCH 11/17] fsinfo: Add API documentation [ver #20]
David Howells
- [PATCH 12/17] fsinfo: Add support for AFS [ver #20]
David Howells
- [PATCH 13/17] fsinfo: Add support to ext4 [ver #20]
David Howells
- [PATCH 14/17] fsinfo: Add an attribute that lists all the visible mounts in a namespace [ver #20]
David Howells
- [PATCH 15/17] errseq: add a new errseq_scrape function [ver #20]
David Howells
- [PATCH 16/17] vfs: allow fsinfo to fetch the current state of s_wb_err [ver #20]
David Howells
- [PATCH 17/17] samples: add error state information to test-fsinfo.c [ver #20]
David Howells
- [PATCH 3/4] watch_queue: Implement mount topology and attribute change notifications
David Howells
- [PATCH 3/4] watch_queue: Implement mount topology and attribute change notifications
David Howells
- [PATCH] watch_queue: Limit the number of watches a user can hold
David Howells
- [PATCH] watch_queue: Limit the number of watches a user can hold
David Howells
- [PATCH] watch_queue: Limit the number of watches a user can hold
David Howells
- [PATCH v3 18/19] firmware: Add request_partial_firmware_into_buf()
Takashi Iwai
- [PATCH] Replace HTTP links with HTTPS ones: security
John Johansen
- [PATCH v18 05/23] net: Prepare UDS for security module stacking
John Johansen
- [PATCH ghak84 v4] audit: purge audit_log_string from the intra-kernel audit API
John Johansen
- [PATCH v19 13/23] LSM: Specify which LSM to display
John Johansen
- [PATCH v19 04/23] LSM: Use lsmblob in security_kernel_act_as
John Johansen
- [PATCH v19 05/23] net: Prepare UDS for security module stacking
John Johansen
- [PATCH v19 06/23] LSM: Use lsmblob in security_secctx_to_secid
John Johansen
- [PATCH v19 13/23] LSM: Specify which LSM to display
John Johansen
- [PATCH v19 02/23] LSM: Create and manage the lsmblob data structure.
John Johansen
- [PATCH v19 15/23] LSM: Use lsmcontext in security_secid_to_secctx
John Johansen
- [PATCH v19 16/23] LSM: Use lsmcontext in security_inode_getsecctx
John Johansen
- [PATCH v19 06/23] LSM: Use lsmblob in security_secctx_to_secid
John Johansen
- [PATCH v19 19/23] LSM: Verify LSM display sanity in binder
John Johansen
- [PATCH v19 23/23] AppArmor: Remove the exclusive flag
John Johansen
- [PATCH v19 22/23] LSM: Add /proc attr entry for full LSM context
John Johansen
- [PATCH v19 22/23] LSM: Add /proc attr entry for full LSM context
John Johansen
- [PATCH v1 2/4] [RFC] x86/trampfd: Provide support for the trampoline file descriptor
Greg KH
- [PATCH v3 08/12] ima: Shallow copy the args_p member of ima_rule_entry.lsm elements
Konsta Karsisto
- [PATCH 13/17] watch_queue: Implement mount topology and attribute change notifications [ver #5]
Ian Kent
- [PATCH] integrity: remove redundant initialization of variable ret
Colin King
- [PATCH] Replace HTTP links with HTTPS ones: security
Alexander A. Klimov
- [PATCH] Replace HTTP links with HTTPS ones: IPv*
Alexander A. Klimov
- [PATCH] capabilities: Replace HTTP links with HTTPS ones
Alexander A. Klimov
- [PATCH for v5.9] netfilter: xtables: Replace HTTP links with HTTPS ones
Alexander A. Klimov
- [PATCH v2] netfilter: Replace HTTP links with HTTPS ones
Alexander A. Klimov
- [PATCH v3 1/1] fs: move kernel_read_file* to its own include file
Greg Kroah-Hartman
- [PATCH 0/4] Fix misused kernel_read_file() enums
Greg Kroah-Hartman
- [PATCH v3 00/19] Introduce partial kernel_read_file() support
Greg Kroah-Hartman
- [PATCH v3 03/19] firmware_loader: EFI firmware loader must handle pre-allocated buffer
Greg Kroah-Hartman
- [PATCH v3 03/19] firmware_loader: EFI firmware loader must handle pre-allocated buffer
Greg Kroah-Hartman
- [PATCH v3 15/19] IMA: Add support for file reads without contents
Greg Kroah-Hartman
- FROM MR. MOORE
MOORE GATES LTD
- [PATCH 7/7] exec: Implement kernel_execve
David Laight
- [PATCH 7/7] exec: Implement kernel_execve
David Laight
- [PATCH 07/13] fs/kernel_read_file: Switch buffer size arg to size_t
David Laight
- [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
David Laight
- [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
David Laight
- [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
David Laight
- [PATCH bpf-next v2 1/4] bpf: Generalize bpf_sk_storage
Martin KaFai Lau
- [PATCH bpf-next v4 1/4] bpf: Generalize bpf_sk_storage
Martin KaFai Lau
- [PATCH bpf-next v4 2/4] bpf: Implement bpf_local_storage for inodes
Martin KaFai Lau
- [PATCH bpf-next v6 1/7] bpf: Renames to prepare for generalizing sk_storage.
Martin KaFai Lau
- [PATCH bpf-next v6 3/7] bpf: Generalize bpf_sk_storage
Martin KaFai Lau
- [RFC PATCH bpf-next] bpf: POC on local_storage charge and uncharge map_ops
Martin KaFai Lau
- [RFC PATCH bpf-next] bpf: POC on local_storage charge and uncharge map_ops
Martin KaFai Lau
- [PATCH bpf-next v7 5/7] bpf: Implement bpf_local_storage for inodes
Martin KaFai Lau
- [PATCH bpf-next v7 5/7] bpf: Implement bpf_local_storage for inodes
Martin KaFai Lau
- [PATCH AUTOSEL 5.7 03/30] ima: extend boot_aggregate with kernel measurements
Sasha Levin
- [PATCH AUTOSEL 5.4 03/16] ima: extend boot_aggregate with kernel measurements
Sasha Levin
- [PATCH AUTOSEL 5.7 03/30] ima: extend boot_aggregate with kernel measurements
Sasha Levin
- [PATCH] Smack: fix use-after-free in smk_write_relabel_self()
Sasha Levin
- [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
Andy Lutomirski
- [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
Andy Lutomirski
- [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
Andy Lutomirski
- [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
Andy Lutomirski
- [PATCH v3 10/16] exec: Remove do_execve_file
Pavel Machek
- [PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
Arnaldo Carvalho de Melo
- [PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
Arnaldo Carvalho de Melo
- [PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
Arnaldo Carvalho de Melo
- [PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
Arnaldo Carvalho de Melo
- [PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
Arnaldo Carvalho de Melo
- [PATCH] Replace HTTP links with HTTPS ones: IPv*
David Miller
- [PATCH net-next] cipso: Remove unused inline functions
David Miller
- [PATCH v4 3/3] prctl: Allow ptrace capable processes to change /proc/self/exe
Paul Moore
- [PATCH ghak84 v3] audit: purge audit_log_string from the intra-kernel audit API
Paul Moore
- [PATCH ghak96 v3] audit: issue CWD record to accompany LSM_AUDIT_DATA_* records
Paul Moore
- [PATCH ghak84 v3] audit: purge audit_log_string from the intra-kernel audit API
Paul Moore
- [PATCH ghak84 v4] audit: purge audit_log_string from the intra-kernel audit API
Paul Moore
- [PATCH ghak84 v4] audit: purge audit_log_string from the intra-kernel audit API
Paul Moore
- [PATCH net-next] cipso: Remove unused inline functions
Paul Moore
- ANN: libseccomp v2.5.0 released
Paul Moore
- [PATCH ghak84 v4] audit: purge audit_log_string from the intra-kernel audit API
Paul Moore
- [PATCH ghak84 v4] audit: purge audit_log_string from the intra-kernel audit API
Paul Moore
- [PATCH V3fix ghak120] audit: initialize context values in case of mandatory events
Paul Moore
- [PATCH V3fix ghak120] audit: initialize context values in case of mandatory events
Paul Moore
- [PATCH V3fix ghak120] audit: initialize context values in case of mandatory events
Paul Moore
- [PATCH 16/16] capsh.c: Spelling fixes in usage() message
Andrew G. Morgan
- [PATCH 12/15] Manual pages: cap_get_file.3: NOTES: note the effect of the Ambient set
Andrew G. Morgan
- [PATCH] Manual pages: use "root user ID" rather than "rootid"
Andrew G. Morgan
- [PATCH] Replace HTTP links with HTTPS ones: security
James Morris
- [PATCH] integrity: remove redundant initialization of variable ret
James Morris
- [PATCH] LSM: drop duplicated words in header file comments
James Morris
- [PATCH 1/2] LSM: Signal to SafeSetID when in set*gid syscall
James Morris
- [PATCH v19 13/23] LSM: Specify which LSM to display
James Morris
- [PATCH v19 17/23] LSM: security_secid_to_secctx in netlink netfilter
James Morris
- [PATCH v19 21/23] Audit: Add a new record for multiple object LSM attributes
James Morris
- [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
James Morris
- [PATCH v4 04/17] fs/kernel_read_file: Split into separate include file
James Morris
- [PATCH v4 06/17] fs/kernel_read_file: Remove redundant size argument
James Morris
- [PATCH v4 07/17] fs/kernel_read_file: Switch buffer size arg to size_t
James Morris
- [PATCH v4 08/17] fs/kernel_read_file: Add file_size output argument
James Morris
- [PATCH 1/2] LSM: Signal to SafeSetID when in set*gid syscall
Micah Morton
- [PATCH 2/2] LSM: SafeSetID: Add GID security policy handling
Micah Morton
- [PATCH v2 2/2] LSM: SafeSetID: Add GID security policy handling
Micah Morton
- [PATCH v3 06/12] ima: Fail rule parsing when the KEY_CHECK hook is combined with an invalid cond
Nayna
- [PATCH v3 01/12] ima: Have the LSM free its audit rule
Nayna
- [PATCH v3 07/12] ima: Fail rule parsing when appraise_flag=blacklist is unsupportable
Nayna
- [PATCH v1 1/4] [RFC] fs/trampfd: Implement the trampoline file descriptor API
Oleg Nesterov
- [PATCH v1 1/4] [RFC] fs/trampfd: Implement the trampoline file descriptor API
Oleg Nesterov
- [PATCH v2] KEYS: remove redundant memset
Joe Perches
- [PATCH v2] KEYS: remove redundant memset
Joe Perches
- [PATCH v1 0/5] LSM: Measure security module state
Lakshmi Ramasubramanian
- [PATCH v1 1/5] IMA: Add LSM_STATE func to measure LSM data
Lakshmi Ramasubramanian
- [PATCH v1 2/5] IMA: Define an IMA hook to measure LSM data
Lakshmi Ramasubramanian
- [PATCH v1 3/5] LSM: Add security_state function pointer in lsm_info struct
Lakshmi Ramasubramanian
- [PATCH v1 4/5] LSM: Define SELinux function to measure security state
Lakshmi Ramasubramanian
- [PATCH v1 5/5] LSM: Define workqueue for measuring security module state
Lakshmi Ramasubramanian
- [PATCH v1 4/5] LSM: Define SELinux function to measure security state
Lakshmi Ramasubramanian
- [PATCH v2 0/5] LSM: Measure security module state
Lakshmi Ramasubramanian
- [PATCH v2 1/5] IMA: Add LSM_STATE func to measure LSM data
Lakshmi Ramasubramanian
- [PATCH v2 2/5] IMA: Define an IMA hook to measure LSM data
Lakshmi Ramasubramanian
- [PATCH v3 3/5] LSM: Add security_measure_data in lsm_info struct
Lakshmi Ramasubramanian
- [PATCH v2 4/5] LSM: Define SELinux function to measure security state
Lakshmi Ramasubramanian
- [PATCH v2 5/5] LSM: Define workqueue for measuring security module state
Lakshmi Ramasubramanian
- [PATCH v2 4/5] LSM: Define SELinux function to measure security state
Lakshmi Ramasubramanian
- [PATCH v2 4/5] LSM: Define SELinux function to measure security state
Lakshmi Ramasubramanian
- [PATCH v3 0/5] LSM: Measure security module state
Lakshmi Ramasubramanian
- [PATCH v3 1/5] IMA: Add LSM_STATE func to measure LSM data
Lakshmi Ramasubramanian
- [PATCH v3 2/5] IMA: Define an IMA hook to measure LSM data
Lakshmi Ramasubramanian
- [PATCH v3 3/5] LSM: Add security_measure_data in lsm_info struct
Lakshmi Ramasubramanian
- [PATCH v3 4/5] LSM: Define SELinux function to measure security state
Lakshmi Ramasubramanian
- [PATCH v3 5/5] LSM: Define workqueue for measuring security module state
Lakshmi Ramasubramanian
- [PATCH v3 4/5] LSM: Define SELinux function to measure security state
Lakshmi Ramasubramanian
- [PATCH v3 4/5] LSM: Define SELinux function to measure security state
Lakshmi Ramasubramanian
- [PATCH v3 4/5] LSM: Define SELinux function to measure security state
Lakshmi Ramasubramanian
- [PATCH v3 4/5] LSM: Define SELinux function to measure security state
Lakshmi Ramasubramanian
- [PATCH v3 4/5] LSM: Define SELinux function to measure security state
Lakshmi Ramasubramanian
- [PATCH 2/2] ima: Fail rule parsing when asymmetric key measurement isn't supportable
Lakshmi Ramasubramanian
- [PATCH 1/2] ima: Pre-parse the list of keyrings in a KEY_CHECK rule
Lakshmi Ramasubramanian
- [PATCH v5 0/4] LSM: Measure security module data
Lakshmi Ramasubramanian
- [PATCH v5 1/4] IMA: Add func to measure LSM state and policy
Lakshmi Ramasubramanian
- [PATCH v5 2/4] IMA: Define IMA hooks to measure LSM state and policy
Lakshmi Ramasubramanian
- [PATCH v5 3/4] LSM: Define SELinux function to measure state and policy
Lakshmi Ramasubramanian
- [PATCH v5 4/4] IMA: Handle early boot data measurement
Lakshmi Ramasubramanian
- [PATCH v5 1/4] IMA: Add func to measure LSM state and policy
Lakshmi Ramasubramanian
- [PATCH v5 1/4] IMA: Add func to measure LSM state and policy
Lakshmi Ramasubramanian
- [PATCH v5 4/4] IMA: Handle early boot data measurement
Lakshmi Ramasubramanian
- [PATCH v4 0/3] capabilities: Introduce CAP_CHECKPOINT_RESTORE
Adrian Reber
- [PATCH v4 1/3] capabilities: Introduce CAP_CHECKPOINT_RESTORE
Adrian Reber
- [PATCH v4 2/3] selftests: add clone3() CAP_CHECKPOINT_RESTORE test
Adrian Reber
- [PATCH v4 3/3] prctl: Allow ptrace capable processes to change /proc/self/exe
Adrian Reber
- [PATCH v4 1/3] capabilities: Introduce CAP_CHECKPOINT_RESTORE
Adrian Reber
- [PATCH v4 2/3] selftests: add clone3() CAP_CHECKPOINT_RESTORE test
Adrian Reber
- [PATCH v5 0/6] capabilities: Introduce CAP_CHECKPOINT_RESTORE
Adrian Reber
- [PATCH v5 1/6] capabilities: Introduce CAP_CHECKPOINT_RESTORE
Adrian Reber
- [PATCH v5 2/6] pid: use checkpoint_restore_ns_capable() for set_tid
Adrian Reber
- [PATCH v5 3/6] pid_namespace: use checkpoint_restore_ns_capable() for ns_last_pid
Adrian Reber
- [PATCH v5 4/6] proc: allow access in init userns for map_files with CAP_CHECKPOINT_RESTORE
Adrian Reber
- [PATCH v5 5/6] prctl: Allow checkpoint/restore capable processes to change exe link
Adrian Reber
- [PATCH v5 6/6] selftests: add clone3() CAP_CHECKPOINT_RESTORE test
Adrian Reber
- [PATCH v6 0/7] capabilities: Introduce CAP_CHECKPOINT_RESTORE
Adrian Reber
- [PATCH v6 1/7] capabilities: Introduce CAP_CHECKPOINT_RESTORE
Adrian Reber
- [PATCH v6 2/7] pid: use checkpoint_restore_ns_capable() for set_tid
Adrian Reber
- [PATCH v6 3/7] pid_namespace: use checkpoint_restore_ns_capable() for ns_last_pid
Adrian Reber
- [PATCH v6 4/7] proc: allow access in init userns for map_files with CAP_CHECKPOINT_RESTORE
Adrian Reber
- [PATCH v6 5/7] prctl: Allow local CAP_CHECKPOINT_RESTORE to change /proc/self/exe
Adrian Reber
- [PATCH v6 6/7] prctl: exe link permission error changed from -EINVAL to -EPERM
Adrian Reber
- [PATCH v6 7/7] selftests: add clone3() CAP_CHECKPOINT_RESTORE test
Adrian Reber
- [PATCH v6 0/7] capabilities: Introduce CAP_CHECKPOINT_RESTORE
Adrian Reber
- [PATCH v2] KEYS: remove redundant memset
Tom Rix
- [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
Mark Rutland
- [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
Mark Rutland
- [PATCH v8 2/2] tpm: Add support for event log pointer found in TPM2 ACPI table
Jarkko Sakkinen
- [PATCH v33 12/21] x86/sgx: Allow a limited use of ATTRIBUTE.PROVISIONKEY for attestation
Jarkko Sakkinen
- [PATCH v33 12/21] x86/sgx: Allow a limited use of ATTRIBUTE.PROVISIONKEY for attestation
Jarkko Sakkinen
- [PATCH v33 12/21] x86/sgx: Allow a limited use of ATTRIBUTE.PROVISIONKEY for attestation
Jarkko Sakkinen
- [PATCH v33 12/21] x86/sgx: Allow a limited use of ATTRIBUTE.PROVISIONKEY for attestation
Jarkko Sakkinen
- [PATCH v33 11/21] x86/sgx: Linux Enclave Driver
Jarkko Sakkinen
- [PATCH v33 11/21] x86/sgx: Linux Enclave Driver
Jarkko Sakkinen
- [PATCH v33 11/21] x86/sgx: Linux Enclave Driver
Jarkko Sakkinen
- [PATCH v33 11/21] x86/sgx: Linux Enclave Driver
Jarkko Sakkinen
- [PATCH v33 11/21] x86/sgx: Linux Enclave Driver
Jarkko Sakkinen
- [PATCH v33 11/21] x86/sgx: Linux Enclave Driver
Jarkko Sakkinen
- [PATCH v9 2/2] tpm: Add support for event log pointer found in TPM2 ACPI table
Jarkko Sakkinen
- [PATCH v9 2/2] tpm: Add support for event log pointer found in TPM2 ACPI table
Jarkko Sakkinen
- [PATCH v9 2/2] tpm: Add support for event log pointer found in TPM2 ACPI table
Jarkko Sakkinen
- [PATCH v9 2/2] tpm: Add support for event log pointer found in TPM2 ACPI table
Jarkko Sakkinen
- [PATCH v34 11/24] x86/sgx: Add SGX enclave driver
Jarkko Sakkinen
- [PATCH v34 15/24] x86/sgx: Allow a limited use of ATTRIBUTE.PROVISIONKEY for attestation
Jarkko Sakkinen
- [PATCH v33 11/21] x86/sgx: Linux Enclave Driver
Jarkko Sakkinen
- [PATCH v35 11/24] x86/sgx: Add SGX enclave driver
Jarkko Sakkinen
- [PATCH v35 15/24] x86/sgx: Allow a limited use of ATTRIBUTE.PROVISIONKEY for attestation
Jarkko Sakkinen
- [PATCH v9 2/2] tpm: Add support for event log pointer found in TPM2 ACPI table
Jarkko Sakkinen
- [PATCH v34 11/24] x86/sgx: Add SGX enclave driver
Jarkko Sakkinen
- [PATCH v9 2/2] tpm: Add support for event log pointer found in TPM2 ACPI table
Jarkko Sakkinen
- [PATCH v9 2/2] tpm: Add support for event log pointer found in TPM2 ACPI table
Jarkko Sakkinen
- [PATCH v36 11/24] x86/sgx: Add SGX enclave driver
Jarkko Sakkinen
- [PATCH v36 15/24] x86/sgx: Allow a limited use of ATTRIBUTE.PROVISIONKEY for attestation
Jarkko Sakkinen
- [PATCH v9 2/2] tpm: Add support for event log pointer found in TPM2 ACPI table
Jarkko Sakkinen
- [PATCH] keys: asymmetric: fix error return code in software_key_query()
Jarkko Sakkinen
- [PATCH] keys: asymmetric: fix error return code in software_key_query()
Jarkko Sakkinen
- [PATCH v2] KEYS: remove redundant memset
Jarkko Sakkinen
- [PATCH] keys: asymmetric: fix error return code in software_key_query()
Jarkko Sakkinen
- [PATCH] watch_queue: Limit the number of watches a user can hold
Jarkko Sakkinen
- [PATCH v19 00/12] Landlock LSM
Mickaël Salaün
- [PATCH v19 01/12] landlock: Add object management
Mickaël Salaün
- [PATCH v19 02/12] landlock: Add ruleset and domain management
Mickaël Salaün
- [PATCH v19 03/12] landlock: Set up the security framework and manage credentials
Mickaël Salaün
- [PATCH v19 04/12] landlock: Add ptrace restrictions
Mickaël Salaün
- [PATCH v19 05/12] LSM: Infrastructure management of the superblock
Mickaël Salaün
- [PATCH v19 06/12] fs,security: Add sb_delete hook
Mickaël Salaün
- [PATCH v19 07/12] landlock: Support filesystem access-control
Mickaël Salaün
- [PATCH v19 08/12] landlock: Add syscall implementation
Mickaël Salaün
- [PATCH v19 09/12] arch: Wire up landlock() syscall
Mickaël Salaün
- [PATCH v19 10/12] selftests/landlock: Add initial tests
Mickaël Salaün
- [PATCH v19 11/12] samples/landlock: Add a sandbox manager example
Mickaël Salaün
- [PATCH v19 12/12] landlock: Add user and kernel documentation
Mickaël Salaün
- [PATCH v19 07/12] landlock: Support filesystem access-control
Mickaël Salaün
- [PATCH v19 09/12] arch: Wire up landlock() syscall
Mickaël Salaün
- [PATCH v19 09/12] arch: Wire up landlock() syscall
Mickaël Salaün
- [PATCH v19 08/12] landlock: Add syscall implementation
Mickaël Salaün
- [PATCH v19 08/12] landlock: Add syscall implementation
Mickaël Salaün
- [PATCH v19 08/12] landlock: Add syscall implementation
Mickaël Salaün
- [PATCH v6 0/7] Add support for O_MAYEXEC
Mickaël Salaün
- [PATCH v6 1/7] exec: Change uselib(2) IS_SREG() failure to EACCES
Mickaël Salaün
- [PATCH v6 2/7] exec: Move S_ISREG() check earlier
Mickaël Salaün
- [PATCH v6 3/7] exec: Move path_noexec() check earlier
Mickaël Salaün
- [PATCH v6 4/7] fs: Introduce O_MAYEXEC flag for openat2(2)
Mickaël Salaün
- [PATCH v6 5/7] fs, doc: Enable to enforce noexec mounts or file exec through O_MAYEXEC
Mickaël Salaün
- [PATCH v6 6/7] selftest/openat2: Add tests for O_MAYEXEC enforcing
Mickaël Salaün
- [PATCH v6 7/7] ima: add policy support for the new file open MAY_OPENEXEC flag
Mickaël Salaün
- [PATCH v6 4/7] fs: Introduce O_MAYEXEC flag for openat2(2)
Mickaël Salaün
- [PATCH v6 5/7] fs,doc: Enable to enforce noexec mounts or file exec through O_MAYEXEC
Mickaël Salaün
- [PATCH v6 7/7] ima: add policy support for the new file open MAY_OPENEXEC flag
Mickaël Salaün
- [PATCH v6 5/7] fs,doc: Enable to enforce noexec mounts or file exec through O_MAYEXEC
Mickaël Salaün
- [PATCH v6 7/7] ima: add policy support for the new file open MAY_OPENEXEC flag
Mickaël Salaün
- [PATCH v6 5/7] fs,doc: Enable to enforce noexec mounts or file exec through O_MAYEXEC
Mickaël Salaün
- [PATCH v7 0/7] Add support for O_MAYEXEC
Mickaël Salaün
- [PATCH v7 1/7] exec: Change uselib(2) IS_SREG() failure to EACCES
Mickaël Salaün
- [PATCH v7 2/7] exec: Move S_ISREG() check earlier
Mickaël Salaün
- [PATCH v7 3/7] exec: Move path_noexec() check earlier
Mickaël Salaün
- [PATCH v7 4/7] fs: Introduce O_MAYEXEC flag for openat2(2)
Mickaël Salaün
- [PATCH v7 5/7] fs, doc: Enable to enforce noexec mounts or file exec through O_MAYEXEC
Mickaël Salaün
- [PATCH v7 6/7] selftest/openat2: Add tests for O_MAYEXEC enforcing
Mickaël Salaün
- [PATCH v7 7/7] ima: add policy support for the new file open MAY_OPENEXEC flag
Mickaël Salaün
- [PATCH v7 4/7] fs: Introduce O_MAYEXEC flag for openat2(2)
Mickaël Salaün
- [PATCH v6 5/7] fs,doc: Enable to enforce noexec mounts or file exec through O_MAYEXEC
Thibaut Sautereau
- [PATCH v7 0/7] Add support for O_MAYEXEC
Thibaut Sautereau
- [PATCH v18 00/23] LSM: Module stacking for AppArmor
Casey Schaufler
- [PATCH v18 01/23] LSM: Infrastructure management of the sock security
Casey Schaufler
- [PATCH v18 02/23] LSM: Create and manage the lsmblob data structure.
Casey Schaufler
- [PATCH v18 03/23] LSM: Use lsmblob in security_audit_rule_match
Casey Schaufler
- [PATCH v18 04/23] LSM: Use lsmblob in security_kernel_act_as
Casey Schaufler
- [PATCH v18 05/23] net: Prepare UDS for security module stacking
Casey Schaufler
- [PATCH v18 06/23] LSM: Use lsmblob in security_secctx_to_secid
Casey Schaufler
- [PATCH v18 07/23] LSM: Use lsmblob in security_secid_to_secctx
Casey Schaufler
- [PATCH v18 08/23] LSM: Use lsmblob in security_ipc_getsecid
Casey Schaufler
- [PATCH v18 09/23] LSM: Use lsmblob in security_task_getsecid
Casey Schaufler
- [PATCH v18 10/23] LSM: Use lsmblob in security_inode_getsecid
Casey Schaufler
- [PATCH v18 11/23] LSM: Use lsmblob in security_cred_getsecid
Casey Schaufler
- [PATCH v18 12/23] IMA: Change internal interfaces to use lsmblobs
Casey Schaufler
- [PATCH v18 13/23] LSM: Specify which LSM to display
Casey Schaufler
- [PATCH v18 14/23] LSM: Ensure the correct LSM context releaser
Casey Schaufler
- [PATCH v18 15/23] LSM: Use lsmcontext in security_secid_to_secctx
Casey Schaufler
- [PATCH v18 16/23] LSM: Use lsmcontext in security_inode_getsecctx
Casey Schaufler
- [PATCH v18 17/23] LSM: security_secid_to_secctx in netlink netfilter
Casey Schaufler
- [PATCH v18 18/23] NET: Store LSM netlabel data in a lsmblob
Casey Schaufler
- [PATCH v18 19/23] LSM: Verify LSM display sanity in binder
Casey Schaufler
- [PATCH v18 20/23] Audit: Add new record for multiple process LSM attributes
Casey Schaufler
- [PATCH v18 21/23] Audit: Add a new record for multiple object LSM attributes
Casey Schaufler
- [PATCH v18 22/23] LSM: Add /proc attr entry for full LSM context
Casey Schaufler
- [PATCH v18 23/23] AppArmor: Remove the exclusive flag
Casey Schaufler
- [PATCH v18 05/23] net: Prepare UDS for security module stacking
Casey Schaufler
- [RFC PATCH v4 05/12] fs: add security blob and hooks for block_device
Casey Schaufler
- [PATCH] Smack: fix use-after-free in smk_write_relabel_self()
Casey Schaufler
- [PATCH 1/2] Smack: fix another vsscanf out of bounds
Casey Schaufler
- [PATCH v18 22/23] LSM: Add /proc attr entry for full LSM context
Casey Schaufler
- [PATCH v19 00/23] LSM: Module stacking for AppArmor
Casey Schaufler
- [PATCH v19 01/23] LSM: Infrastructure management of the sock security
Casey Schaufler
- [PATCH v19 02/23] LSM: Create and manage the lsmblob data structure.
Casey Schaufler
- [PATCH v19 03/23] LSM: Use lsmblob in security_audit_rule_match
Casey Schaufler
- [PATCH v19 04/23] LSM: Use lsmblob in security_kernel_act_as
Casey Schaufler
- [PATCH v19 05/23] net: Prepare UDS for security module stacking
Casey Schaufler
- [PATCH v19 06/23] LSM: Use lsmblob in security_secctx_to_secid
Casey Schaufler
- [PATCH v19 07/23] LSM: Use lsmblob in security_secid_to_secctx
Casey Schaufler
- [PATCH v19 08/23] LSM: Use lsmblob in security_ipc_getsecid
Casey Schaufler
- [PATCH v19 09/23] LSM: Use lsmblob in security_task_getsecid
Casey Schaufler
- [PATCH v19 10/23] LSM: Use lsmblob in security_inode_getsecid
Casey Schaufler
- [PATCH v19 11/23] LSM: Use lsmblob in security_cred_getsecid
Casey Schaufler
- [PATCH v19 12/23] IMA: Change internal interfaces to use lsmblobs
Casey Schaufler
- [PATCH v19 13/23] LSM: Specify which LSM to display
Casey Schaufler
- [PATCH v19 14/23] LSM: Ensure the correct LSM context releaser
Casey Schaufler
- [PATCH v19 15/23] LSM: Use lsmcontext in security_secid_to_secctx
Casey Schaufler
- [PATCH v19 16/23] LSM: Use lsmcontext in security_inode_getsecctx
Casey Schaufler
- [PATCH v19 17/23] LSM: security_secid_to_secctx in netlink netfilter
Casey Schaufler
- [PATCH v19 18/23] NET: Store LSM netlabel data in a lsmblob
Casey Schaufler
- [PATCH v19 19/23] LSM: Verify LSM display sanity in binder
Casey Schaufler
- [PATCH v19 20/23] Audit: Add new record for multiple process LSM attributes
Casey Schaufler
- [PATCH v19 21/23] Audit: Add a new record for multiple object LSM attributes
Casey Schaufler
- [PATCH v19 22/23] LSM: Add /proc attr entry for full LSM context
Casey Schaufler
- [PATCH v19 23/23] AppArmor: Remove the exclusive flag
Casey Schaufler
- [PATCH] smack: fix slab-out-of-bounds by checking for overflow
Casey Schaufler
- [PATCH v19 02/23] LSM: Create and manage the lsmblob data structure.
Casey Schaufler
- [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
Casey Schaufler
- [RFC PATCH v5 05/11] fs: add security blob and hooks for block_device
Casey Schaufler
- [PATCH v19 06/23] LSM: Use lsmblob in security_secctx_to_secid
Casey Schaufler
- [PATCH v5 1/4] IMA: Add func to measure LSM state and policy
Casey Schaufler
- [PATCH v19 22/23] LSM: Add /proc attr entry for full LSM context
Casey Schaufler
- [PATCH v19 22/23] LSM: Add /proc attr entry for full LSM context
Casey Schaufler
- [PATCH] bpf: lsm: Disable or enable BPF LSM at boot time
KP Singh
- [PATCH] bpf: lsm: Disable or enable BPF LSM at boot time
KP Singh
- [PATCH bpf-next v3 0/4] Generalizing bpf_local_storage
KP Singh
- [PATCH bpf-next v3 1/4] bpf: Generalize bpf_sk_storage
KP Singh
- [PATCH bpf-next v3 2/4] bpf: Implement bpf_local_storage for inodes
KP Singh
- [PATCH bpf-next v3 3/4] bpf: Allow local storage to be used from LSM programs
KP Singh
- [PATCH bpf-next v3 4/4] bpf: Add selftests for local_storage
KP Singh
- [PATCH bpf-next v3 1/4] bpf: Generalize bpf_sk_storage
KP Singh
- [PATCH bpf-next v3 2/4] bpf: Implement bpf_local_storage for inodes
KP Singh
- [PATCH bpf-next v4 0/4] Generalizing bpf_local_storage
KP Singh
- [PATCH bpf-next v4 1/4] bpf: Generalize bpf_sk_storage
KP Singh
- [PATCH bpf-next v4 2/4] bpf: Implement bpf_local_storage for inodes
KP Singh
- [PATCH bpf-next v4 3/4] bpf: Allow local storage to be used from LSM programs
KP Singh
- [PATCH bpf-next v4 4/4] bpf: Add selftests for local_storage
KP Singh
- [PATCH bpf-next v4 1/4] bpf: Generalize bpf_sk_storage
KP Singh
- [PATCH bpf-next v4 2/4] bpf: Implement bpf_local_storage for inodes
KP Singh
- [PATCH bpf-next v4 2/4] bpf: Implement bpf_local_storage for inodes
KP Singh
- [PATCH bpf-next v5 0/7] Generalizing bpf_local_storage
KP Singh
- [PATCH bpf-next v5 1/7] bpf: Renames to prepare for generalizing sk_storage.
KP Singh
- [PATCH bpf-next v5 2/7] bpf: Generalize caching for sk_storage.
KP Singh
- [PATCH bpf-next v5 3/7] bpf: Generalize bpf_sk_storage
KP Singh
- [PATCH bpf-next v5 4/7] bpf: Split bpf_local_storage to bpf_sk_storage
KP Singh
- [PATCH bpf-next v5 5/7] bpf: Implement bpf_local_storage for inodes
KP Singh
- [PATCH bpf-next v5 6/7] bpf: Allow local storage to be used from LSM programs
KP Singh
- [PATCH bpf-next v5 7/7] bpf: Add selftests for local_storage
KP Singh
- [PATCH bpf-next v6 0/7] Generalizing bpf_local_storage
KP Singh
- [PATCH bpf-next v6 1/7] bpf: Renames to prepare for generalizing sk_storage.
KP Singh
- [PATCH bpf-next v6 2/7] bpf: Generalize caching for sk_storage.
KP Singh
- [PATCH bpf-next v6 3/7] bpf: Generalize bpf_sk_storage
KP Singh
- [PATCH bpf-next v6 4/7] bpf: Split bpf_local_storage to bpf_sk_storage
KP Singh
- [PATCH bpf-next v6 5/7] bpf: Implement bpf_local_storage for inodes
KP Singh
- [PATCH bpf-next v6 6/7] bpf: Allow local storage to be used from LSM programs
KP Singh
- [PATCH bpf-next v6 7/7] bpf: Add selftests for local_storage
KP Singh
- [PATCH bpf-next v5 5/7] bpf: Implement bpf_local_storage for inodes
KP Singh
- [PATCH bpf-next v6 1/7] bpf: Renames to prepare for generalizing sk_storage.
KP Singh
- [RFC PATCH bpf-next] bpf: POC on local_storage charge and uncharge map_ops
KP Singh
- [PATCH bpf-next v6 3/7] bpf: Generalize bpf_sk_storage
KP Singh
- [PATCH bpf-next v7 0/7] Generalizing bpf_local_storage
KP Singh
- [PATCH bpf-next v7 1/7] A purely mechanical change to split the renaming from the actual generalization.
KP Singh
- [PATCH bpf-next v7 2/7] bpf: Generalize caching for sk_storage.
KP Singh
- [PATCH bpf-next v7 3/7] bpf: Generalize bpf_sk_storage
KP Singh
- [PATCH bpf-next v7 4/7] bpf: Split bpf_local_storage to bpf_sk_storage
KP Singh
- [PATCH bpf-next v7 5/7] bpf: Implement bpf_local_storage for inodes
KP Singh
- [PATCH bpf-next v7 6/7] bpf: Allow local storage to be used from LSM programs
KP Singh
- [PATCH bpf-next v7 7/7] bpf: Add selftests for local_storage
KP Singh
- [PATCH bpf-next v7 5/7] bpf: Implement bpf_local_storage for inodes
KP Singh
- [PATCH v18 05/23] net: Prepare UDS for security module stacking
Stephen Smalley
- [PATCH v18 05/23] net: Prepare UDS for security module stacking
Stephen Smalley
- [PATCH v1 4/5] LSM: Define SELinux function to measure security state
Stephen Smalley
- [PATCH v2 4/5] LSM: Define SELinux function to measure security state
Stephen Smalley
- [PATCH v2 4/5] LSM: Define SELinux function to measure security state
Stephen Smalley
- [PATCH v3 4/5] LSM: Define SELinux function to measure security state
Stephen Smalley
- [PATCH v3 4/5] LSM: Define SELinux function to measure security state
Stephen Smalley
- [PATCH v3 4/5] LSM: Define SELinux function to measure security state
Stephen Smalley
- [PATCH v3 4/5] LSM: Define SELinux function to measure security state
Stephen Smalley
- [PATCH v3 4/5] LSM: Define SELinux function to measure security state
Stephen Smalley
- [PATCH v19 02/23] LSM: Create and manage the lsmblob data structure.
Stephen Smalley
- [PATCH v19 20/23] Audit: Add new record for multiple process LSM attributes
Stephen Smalley
- [PATCH v9 1/2] acpi: Extend TPM2 ACPI table with missing log fields
Jerry Snitselaar
- [PATCH v9 2/2] tpm: Add support for event log pointer found in TPM2 ACPI table
Jerry Snitselaar
- [PATCH v9 2/2] tpm: Add support for event log pointer found in TPM2 ACPI table
Jerry Snitselaar
- [V2 PATCH 1/3] Refactoring powerpc code for carrying over IMA measurement logs, to move non architecture specific code to security/ima.
Prakhar Srivastava
- [V2 PATCH 2/3] dt-bindings: chosen: Document ima-kexec-buffer
Prakhar Srivastava
- [PATCH v2 05/15] umh: Separate the user mode driver and the user mode helper support
Alexei Starovoitov
- [PATCH v3 13/16] exit: Factor thread_group_exited out of pidfd_poll
Alexei Starovoitov
- [PATCH v3 13/16] exit: Factor thread_group_exited out of pidfd_poll
Alexei Starovoitov
- [merged][PATCH v3 00/16] Make the user mode driver code a better citizen
Alexei Starovoitov
- [PATCH bpf-next v5 5/7] bpf: Implement bpf_local_storage for inodes
Alexei Starovoitov
- [fs] 140402bab8: stress-ng.splice.ops_per_sec -100.0% regression
Linus Torvalds
- [PATCH 0/7] Implementing kernel_execve
Linus Torvalds
- [PATCH 3/4] watch_queue: Implement mount topology and attribute change notifications
Linus Torvalds
- [PATCH 3/4] watch_queue: Implement mount topology and attribute change notifications
Linus Torvalds
- [PATCH v1 1/4] [RFC] fs/trampfd: Implement the trampoline file descriptor API
Madhavan T. Venkataraman
- [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
Madhavan T. Venkataraman
- [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
Madhavan T. Venkataraman
- [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
Madhavan T. Venkataraman
- [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
Madhavan T. Venkataraman
- [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
Madhavan T. Venkataraman
- [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
Madhavan T. Venkataraman
- [PATCH v1 2/4] [RFC] x86/trampfd: Provide support for the trampoline file descriptor
Madhavan T. Venkataraman
- [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
Madhavan T. Venkataraman
- [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
Madhavan T. Venkataraman
- [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
Madhavan T. Venkataraman
- [PATCH v4 3/3] prctl: Allow ptrace capable processes to change /proc/self/exe
Nicolas Viennot
- [PATCH v5 5/6] prctl: Allow checkpoint/restore capable processes to change exe link
Nicolas Viennot
- [PATCH v7 4/7] fs: Introduce O_MAYEXEC flag for openat2(2)
Al Viro
- [RFC PATCH v5 05/11] fs: add security blob and hooks for block_device
Al Viro
- INVESTMENT
CHRISTOPHER WANG
- [PATCH v7 4/7] fs: Introduce O_MAYEXEC flag for openat2(2)
Florian Weimer
- [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
Florian Weimer
- [PATCH v34 11/24] x86/sgx: Add SGX enclave driver
Matthew Wilcox
- [PATCH v34 11/24] x86/sgx: Add SGX enclave driver
Matthew Wilcox
- [PATCH 2/4] fs: Remove FIRMWARE_PREALLOC_BUFFER from kernel_read_file() enums
Matthew Wilcox
- [v2 PATCH] crypto: af_alg - Fix regression on empty requests
Herbert Xu
- Reporting a use-after-free read bug in userfaultfd_release()
Peilin Ye
- [PATCH -next] IMA: Make ima_mok_init() static
Wei Yongjun
- [PATCH v2 11/11] ima: Support additional conditionals in the KEXEC_CMDLINE hook function
Dave Young
- [PATCH net-next] cipso: Remove unused inline functions
YueHaibing
- [PATCH v4 0/8] crpyto: introduce OSCCA certificate and SM2 asymmetric algorithm
Tianjia Zhang
- [PATCH v4 1/8] crypto: sm3 - export crypto_sm3_final function
Tianjia Zhang
- [PATCH v4 2/8] lib/mpi: Extend the MPI library
Tianjia Zhang
- [PATCH v4 3/8] lib/mpi: Introduce ec implementation to MPI library
Tianjia Zhang
- [PATCH v4 4/8] crypto: sm2 - introduce OSCCA SM2 asymmetric cipher algorithm
Tianjia Zhang
- [PATCH v4 5/8] crypto: testmgr - support test with different ciphertext per encryption
Tianjia Zhang
- [PATCH v4 6/8] X.509: support OSCCA certificate parse
Tianjia Zhang
- [PATCH v4 7/8] X.509: support OSCCA sm2-with-sm3 certificate verification
Tianjia Zhang
- [PATCH v4 8/8] integrity: Asymmetric digsig supports SM2-with-SM3 algorithm
Tianjia Zhang
- [PATCH v5 0/8] crpyto: introduce OSCCA certificate and SM2 asymmetric algorithm
Tianjia Zhang
- [PATCH v5 1/8] crypto: sm3 - export crypto_sm3_final function
Tianjia Zhang
- [PATCH v5 2/8] lib/mpi: Extend the MPI library
Tianjia Zhang
- [PATCH v5 3/8] lib/mpi: Introduce ec implementation to MPI library
Tianjia Zhang
- [PATCH v5 4/8] crypto: sm2 - introduce OSCCA SM2 asymmetric cipher algorithm
Tianjia Zhang
- [PATCH v5 5/8] crypto: testmgr - support test with different ciphertext per encryption
Tianjia Zhang
- [PATCH v5 6/8] X.509: support OSCCA certificate parse
Tianjia Zhang
- [PATCH v5 7/8] X.509: support OSCCA sm2-with-sm3 certificate verification
Tianjia Zhang
- [PATCH v5 8/8] integrity: Asymmetric digsig supports SM2-with-SM3 algorithm
Tianjia Zhang
- [PATCH v5 2/8] lib/mpi: Extend the MPI library
Tianjia Zhang
- [PATCH v8 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
Peter Zijlstra
- [PATCH v2 00/11] ima: Fix rule parsing bugs and extend KEXEC_CMDLINE rule support
Mimi Zohar
- [PATCH v2 09/11] ima: Move validation of the keyrings conditional into ima_validate_rule()
Mimi Zohar
- [PATCH v2 09/11] ima: Move validation of the keyrings conditional into ima_validate_rule()
Mimi Zohar
- [PATCH 0/4] Fix misused kernel_read_file() enums
Mimi Zohar
- [PATCH v10 2/9] fs: introduce kernel_pread_file* support
Mimi Zohar
- [PATCH 4/4] module: Add hook for security_kernel_post_read_file()
Mimi Zohar
- [PATCH 4/4] module: Add hook for security_kernel_post_read_file()
Mimi Zohar
- [PATCH AUTOSEL 5.7 03/30] ima: extend boot_aggregate with kernel measurements
Mimi Zohar
- [PATCH] ima: Rename internal audit rule functions
Mimi Zohar
- [PATCH v3 07/12] ima: Fail rule parsing when appraise_flag=blacklist is unsupportable
Mimi Zohar
- [PATCH v3 00/12] ima: Fix rule parsing bugs and extend KEXEC_CMDLINE rule support
Mimi Zohar
- [PATCH v3 01/12] ima: Have the LSM free its audit rule
Mimi Zohar
- [PATCH v3 4/5] LSM: Define SELinux function to measure security state
Mimi Zohar
- [PATCH v3 00/12] ima: Fix rule parsing bugs and extend KEXEC_CMDLINE rule support
Mimi Zohar
- [PATCH v3 11/19] LSM: Introduce kernel_post_load_data() hook
Mimi Zohar
- [PATCH v3 12/19] firmware_loader: Use security_post_load_data()
Mimi Zohar
- [PATCH v3 00/19] Introduce partial kernel_read_file() support
Mimi Zohar
- [PATCH v3 15/19] IMA: Add support for file reads without contents
Mimi Zohar
- [PATCH v3 04/19] fs/kernel_read_file: Remove FIRMWARE_PREALLOC_BUFFER enum
Mimi Zohar
- [PATCH v3 06/19] fs/kernel_read_file: Split into separate include file
Mimi Zohar
- [PATCH v3 07/19] fs/kernel_read_file: Split into separate source file
Mimi Zohar
- [PATCH v3 08/19] fs/kernel_read_file: Remove redundant size argument
Mimi Zohar
- [PATCH v3 09/19] fs/kernel_read_file: Switch buffer size arg to size_t
Mimi Zohar
- [PATCH v3 10/19] fs/kernel_read_file: Add file_size output argument
Mimi Zohar
- [PATCH] integrity: remove redundant initialization of variable ret
Mimi Zohar
- [PATCH v3 00/19] Introduce partial kernel_read_file() support
Mimi Zohar
- [PATCH v3 12/19] firmware_loader: Use security_post_load_data()
Mimi Zohar
- [PATCH v3 12/19] firmware_loader: Use security_post_load_data()
Mimi Zohar
- My Dear Beloved One,
Mrs. Safitaou Zoungrana
- [GIT PULL] Security subsystem fixes for v5.8
pr-tracker-bot at kernel.org
- [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
madvenka at linux.microsoft.com
- [PATCH v1 1/4] [RFC] fs/trampfd: Implement the trampoline file descriptor API
madvenka at linux.microsoft.com
- [PATCH v1 2/4] [RFC] x86/trampfd: Provide support for the trampoline file descriptor
madvenka at linux.microsoft.com
- [PATCH v1 3/4] [RFC] arm64/trampfd: Provide support for the trampoline file descriptor
madvenka at linux.microsoft.com
- [PATCH v1 4/4] [RFC] arm/trampfd: Provide support for the trampoline file descriptor
madvenka at linux.microsoft.com
- [PATCH] KEYS: remove redundant memsets
trix at redhat.com
- [PATCH v2] KEYS: remove redundant memset
trix at redhat.com
- [security:secure_uffd_v5.9 1/3] fs/anon_inodes.c:92:10-17: WARNING: ERR_CAST can be used with inode
kernel test robot
- [PATCH] fix err_cast.cocci warnings
kernel test robot
- [PATCH bpf-next v3 2/4] bpf: Implement bpf_local_storage for inodes
kernel test robot
- [PATCH v3 4/5] LSM: Define SELinux function to measure security state
kernel test robot
- [PATCH v3 4/5] LSM: Define SELinux function to measure security state
kernel test robot
- [PATCH v3 4/5] LSM: Define SELinux function to measure security state
kernel test robot
- [RFC PATCH] LSM: security_read_selinux_policy() can be static
kernel test robot
- [PATCH bpf-next v4 1/4] bpf: Generalize bpf_sk_storage
kernel test robot
- [PATCH] KEYS: remove redundant memsets
kernel test robot
- [PATCH bpf-next v5 5/7] bpf: Implement bpf_local_storage for inodes
kernel test robot
- INFO: task hung in request_key_tag
syzbot
- INFO: task hung in request_key_tag
syzbot
- KASAN: slab-out-of-bounds Read in vsscanf (2)
syzbot
- general protection fault in security_inode_getattr
syzbot
- [RFC PATCH 0/7] x86: introduce system calls addess space isolation
黄金海
Last message date:
Fri Jul 31 20:08:04 UTC 2020
Archived on: Tue Oct 20 01:42:46 UTC 2020
This archive was generated by
Pipermail 0.09 (Mailman edition).