March 2020 Archives by date
      
      Starting: Sun Mar  1 19:59:28 UTC 2020
         Ending: Tue Mar 31 23:00:14 UTC 2020
         Messages: 585
     
- Hello
 
Peter Wong
 - Hello
 
Peter Wong
 - [Intel-gfx] [PATCH v7 00/12] Introduce CAP_PERFMON to secure	system performance monitoring and observability
 
Serge Hallyn
 - kernel BUG at lib/assoc_array.c:LINE!
 
David Howells
 - kernel BUG at lib/assoc_array.c:LINE!
 
David Howells
 - [ima] 9165b814d2: BUG:kernel_NULL_pointer_dereference,address
 
Roberto Sassu
 - [RFC PATCH v14 10/10] landlock: Add user and kernel documentation
 
Mickaël Salaün
 - [PATCH v3 2/8] ima: Switch to ima_hash_algo for boot aggregate
 
Mimi Zohar
 - [PATCH v3 2/8] ima: Switch to ima_hash_algo for boot aggregate
 
Roberto Sassu
 - [PATCH v3 00/25] user_namespace: introduce fsid mappings
 
Serge E. Hallyn
 - [PATCH v3 2/8] ima: Switch to ima_hash_algo for boot aggregate
 
Mimi Zohar
 - [PATCH v3 2/8] ima: Switch to ima_hash_algo for boot aggregate
 
Roberto Sassu
 - [PATCHv2] exec: Fix a deadlock in ptrace
 
Jann Horn
 - [PATCHv2] exec: Fix a deadlock in ptrace
 
Bernd Edlinger
 - [PATCH v3 2/8] ima: Switch to ima_hash_algo for boot aggregate
 
Mimi Zohar
 - [PATCHv2] exec: Fix a deadlock in ptrace
 
Jann Horn
 - [PATCHv2] exec: Fix a deadlock in ptrace
 
christian at brauner.io
 - [PATCHv2] exec: Fix a deadlock in ptrace
 
Jann Horn
 - [Intel-gfx] [PATCH v7 00/12] Introduce CAP_PERFMON to secure	system performance monitoring and observability
 
James Morris
 - [PATCHv3] exec: Fix a deadlock in ptrace
 
Bernd Edlinger
 - [PATCHv3] exec: Fix a deadlock in ptrace
 
Bernd Edlinger
 - [PATCH v3 5/8] ima: Switch to dynamically allocated buffer for	template digests
 
Mimi Zohar
 - [PATCH AUTOSEL 5.5 41/66] efi: Only print errors about failing to get	certs if EFI vars are found
 
Sasha Levin
 - [PATCH AUTOSEL 5.4 36/58] efi: Only print errors about failing to get	certs if EFI vars are found
 
Sasha Levin
 - [PATCH v3 7/8] ima: Calculate and extend PCR with digests in	ima_template_entry
 
Mimi Zohar
 - Hello Dear
 
DR CHALLY NOAH
 - [PATCH] security/apparmor/label.c: Clean code by removing redundant	instructions
 
mateusznosek0 at gmail.com
 - [PATCH] security/apparmor/label.c: Clean code by removing	redundant instructions
 
John Johansen
 - [PATCH v28 11/22] x86/sgx: Linux Enclave Driver
 
Jarkko Sakkinen
 - [PATCH v28 15/22] x86/sgx: Add provisioning
 
Jarkko Sakkinen
 - [PATCH bpf-next v2 0/7] Introduce BPF_MODIFY_RET tracing progs
 
KP Singh
 - [PATCH bpf-next v2 1/7] bpf: Refactor trampoline update code
 
KP Singh
 - [PATCH bpf-next v2 2/7] bpf: JIT helpers for fmod_ret progs
 
KP Singh
 - [PATCH bpf-next v2 3/7] bpf: Introduce BPF_MODIFY_RETURN
 
KP Singh
 - [PATCH bpf-next v2 4/7] bpf: Attachment verification for	BPF_MODIFY_RETURN
 
KP Singh
 - [PATCH bpf-next v2 5/7] tools/libbpf: Add support for	BPF_MODIFY_RETURN
 
KP Singh
 - [PATCH bpf-next v2 6/7] bpf: Add test ops for BPF_PROG_TYPE_TRACING
 
KP Singh
 - [PATCH bpf-next v2 7/7] bpf: Add selftests for BPF_MODIFY_RETURN
 
KP Singh
 - [PATCH bpf-next v2 1/7] bpf: Refactor trampoline update code
 
Andrii Nakryiko
 - [PATCH bpf-next v2 2/7] bpf: JIT helpers for fmod_ret progs
 
Andrii Nakryiko
 - [PATCH bpf-next v2 3/7] bpf: Introduce BPF_MODIFY_RETURN
 
Andrii Nakryiko
 - [PATCH bpf-next v2 4/7] bpf: Attachment verification for	BPF_MODIFY_RETURN
 
Andrii Nakryiko
 - [PATCH bpf-next v2 6/7] bpf: Add test ops for	BPF_PROG_TYPE_TRACING
 
Andrii Nakryiko
 - [PATCH bpf-next v2 1/7] bpf: Refactor trampoline update code
 
KP Singh
 - [PATCH bpf-next v2 2/7] bpf: JIT helpers for fmod_ret progs
 
KP Singh
 - [PATCH bpf-next v2 3/7] bpf: Introduce BPF_MODIFY_RETURN
 
KP Singh
 - [PATCH bpf-next v2 4/7] bpf: Attachment verification for	BPF_MODIFY_RETURN
 
KP Singh
 - [PATCH bpf-next v2 2/7] bpf: JIT helpers for fmod_ret progs
 
KP Singh
 - [PATCH bpf-next v3 0/7] Introduce BPF_MODIFY_RET tracing progs
 
KP Singh
 - [PATCH bpf-next v3 1/7] bpf: Refactor trampoline update code
 
KP Singh
 - [PATCH bpf-next v3 2/7] bpf: JIT helpers for fmod_ret progs
 
KP Singh
 - [PATCH bpf-next v3 3/7] bpf: Introduce BPF_MODIFY_RETURN
 
KP Singh
 - [PATCH bpf-next v3 4/7] bpf: Attachment verification for	BPF_MODIFY_RETURN
 
KP Singh
 - [PATCH bpf-next v3 5/7] tools/libbpf: Add support for	BPF_MODIFY_RETURN
 
KP Singh
 - [PATCH bpf-next v3 6/7] bpf: Add test ops for BPF_PROG_TYPE_TRACING
 
KP Singh
 - [PATCH bpf-next v3 7/7] bpf: Add selftests for BPF_MODIFY_RETURN
 
KP Singh
 - [PATCH bpf-next v3 4/7] bpf: Attachment verification for	BPF_MODIFY_RETURN
 
Casey Schaufler
 - [PATCH bpf-next v3 1/7] bpf: Refactor trampoline update code
 
Daniel Borkmann
 - [PATCH bpf-next v3 1/7] bpf: Refactor trampoline update code
 
KP Singh
 - [PATCH bpf-next v3 1/7] bpf: Refactor trampoline update code
 
Andrii Nakryiko
 - [PATCH bpf-next v3 1/7] bpf: Refactor trampoline update code
 
KP Singh
 - [PATCH bpf-next v4 0/7] Introduce BPF_MODIFY_RET tracing progs
 
KP Singh
 - [PATCH bpf-next v4 1/7] bpf: Refactor trampoline update code
 
KP Singh
 - [PATCH bpf-next v4 2/7] bpf: JIT helpers for fmod_ret progs
 
KP Singh
 - [PATCH bpf-next v4 3/7] bpf: Introduce BPF_MODIFY_RETURN
 
KP Singh
 - [PATCH bpf-next v4 4/7] bpf: Attachment verification for	BPF_MODIFY_RETURN
 
KP Singh
 - [PATCH bpf-next v4 5/7] tools/libbpf: Add support for	BPF_MODIFY_RETURN
 
KP Singh
 - [PATCH bpf-next v4 6/7] bpf: Add test ops for BPF_PROG_TYPE_TRACING
 
KP Singh
 - [PATCH bpf-next v4 7/7] bpf: Add selftests for BPF_MODIFY_RETURN
 
KP Singh
 - [PATCH bpf-next v4 0/7] Introduce BPF_MODIFY_RET tracing progs
 
Alexei Starovoitov
 - No subject
 
Juanito S. Galang
 - [PATCH bpf-next v4 4/7] bpf: Attachment verification for	BPF_MODIFY_RETURN
 
Stephen Smalley
 - [PATCH bpf-next v4 3/7] bpf: Introduce BPF_MODIFY_RETURN
 
Stephen Smalley
 - [PATCH bpf-next v4 3/7] bpf: Introduce BPF_MODIFY_RETURN
 
KP Singh
 - [PATCH bpf-next v4 4/7] bpf: Attachment verification for	BPF_MODIFY_RETURN
 
Alexei Starovoitov
 - [PATCH bpf-next v4 3/7] bpf: Introduce BPF_MODIFY_RETURN
 
Casey Schaufler
 - [PATCH v28 11/22] x86/sgx: Linux Enclave Driver
 
Sean Christopherson
 - [PATCH bpf-next v4 0/7] Introduce BPF_MODIFY_RET tracing progs
 
KP Singh
 - [PATCH bpf-next v4 3/7] bpf: Introduce BPF_MODIFY_RETURN
 
Stephen Smalley
 - [PATCH bpf-next v4 3/7] bpf: Introduce BPF_MODIFY_RETURN
 
Casey Schaufler
 - [PATCH v28 11/22] x86/sgx: Linux Enclave Driver
 
Sean Christopherson
 - [PATCH bpf-next v4 3/7] bpf: Introduce BPF_MODIFY_RETURN
 
Stephen Smalley
 - [PATCH bpf-next] bpf: Remove unnecessary CAP_MAC_ADMIN check
 
KP Singh
 - [PATCH] KEYS: Don't write out to userspace while holding key semaphore
 
Waiman Long
 - [PATCH bpf-next v4 3/7] bpf: Introduce BPF_MODIFY_RETURN
 
KP Singh
 - [PATCH] KEYS: Don't write out to userspace while holding key	semaphore
 
Eric Biggers
 - [PATCH] KEYS: Don't write out to userspace while holding key	semaphore
 
Waiman Long
 - [PATCH bpf-next] bpf: Fix bpf_prog_test_run_tracing for !CONFIG_NET
 
KP Singh
 - [PATCH bpf-next] bpf: Remove unnecessary CAP_MAC_ADMIN check
 
Alexei Starovoitov
 - [PATCH bpf-next] bpf: Fix bpf_prog_test_run_tracing for	!CONFIG_NET
 
Alexei Starovoitov
 - [PATCH bpf-next] bpf: Fix bpf_prog_test_run_tracing for	!CONFIG_NET
 
Randy Dunlap
 - [PATCH bpf-next] bpf: Fix bpf_prog_test_run_tracing for	!CONFIG_NET
 
Alexei Starovoitov
 - [PATCH bpf-next] bpf: Fix bpf_prog_test_run_tracing for	!CONFIG_NET
 
KP Singh
 - [PATCH] KEYS: Don't write out to userspace while holding key	semaphore
 
Jarkko Sakkinen
 - [PATCH v28 11/22] x86/sgx: Linux Enclave Driver
 
Jarkko Sakkinen
 - [PATCH v28 11/22] x86/sgx: Linux Enclave Driver
 
Jarkko Sakkinen
 - [PATCH v15 01/23] LSM: Infrastructure management of the sock	security
 
Paul Moore
 - [PATCH v15 04/23] LSM: Use lsmblob in security_kernel_act_as
 
Paul Moore
 - [PATCH v15 05/23] net: Prepare UDS for security module stacking
 
Paul Moore
 - [PATCH v15 06/23] Use lsmblob in security_secctx_to_secid
 
Paul Moore
 - [PATCH v15 13/23] LSM: Specify which LSM to display
 
Paul Moore
 - [PATCH v15 17/23] LSM: security_secid_to_secctx in netlink	netfilter
 
Paul Moore
 - [PATCH v15 18/23] NET: Store LSM netlabel data in a lsmblob
 
Paul Moore
 - BUSINESS PROPOSAL
 
postmaster at hokusetubad.sakura.ne.jp
 - [PATCH v2 0/2] KEYS: Read keys to internal buffer & then copy to	userspace
 
Waiman Long
 - [PATCH v2 1/2] KEYS: Don't write out to userspace while holding key	semaphore
 
Waiman Long
 - [PATCH v2 2/2] KEYS: Avoid false positive ENOMEM error on key read
 
Waiman Long
 - 
 
Francois Pinault
 - [RFC PATCH 00/17] pipe: Keyrings,	mount and superblock notifications [ver #4]
 
David Howells
 - [RFC PATCH 01/17] uapi: General notification queue definitions [ver	#4]
 
David Howells
 - [RFC PATCH 02/17] security: Add hooks to rule on setting a watch [ver	#4]
 
David Howells
 - [RFC PATCH 03/17] security: Add a hook for the point of notification	insertion [ver #4]
 
David Howells
 - [RFC PATCH 04/17] pipe: Add O_NOTIFICATION_PIPE [ver #4]
 
David Howells
 - [RFC PATCH 05/17] pipe: Add general notification queue support [ver	#4]
 
David Howells
 - [RFC PATCH 06/17] watch_queue: Add a key/keyring notification	facility [ver #4]
 
David Howells
 - [RFC PATCH 07/17] Add sample notification program [ver #4]
 
David Howells
 - [RFC PATCH 08/17] pipe: Allow buffers to be marked	read-whole-or-error for notifications [ver #4]
 
David Howells
 - [RFC PATCH 09/17] pipe: Add notification lossage handling [ver #4]
 
David Howells
 - [RFC PATCH 10/17] selinux: Implement the watch_key security hook [ver	#4]
 
David Howells
 - [RFC PATCH 11/17] smack: Implement the watch_key and	post_notification hooks [ver #4]
 
David Howells
 - [RFC PATCH 12/17] watch_queue: Add security hooks to rule on setting	mount and sb watches [ver #4]
 
David Howells
 - [RFC PATCH 13/17] watch_queue: Implement mount topology and attribute	change notifications [ver #4]
 
David Howells
 - [RFC PATCH 14/17] watch_queue: sample: Display mount tree change	notifications [ver #4]
 
David Howells
 - [RFC PATCH 15/17] watch_queue: Introduce a non-repeating	system-unique superblock ID [ver #4]
 
David Howells
 - [RFC PATCH 16/17] watch_queue: Add superblock notifications [ver #4]
 
David Howells
 - [RFC PATCH 17/17] watch_queue: sample: Display superblock	notifications [ver #4]
 
David Howells
 - [PATCH 00/14] VFS: Filesystem information [ver #18]
 
David Howells
 - [PATCH 01/14] VFS: Add additional RESOLVE_* flags [ver #18]
 
David Howells
 - [PATCH 02/14] fsinfo: Add fsinfo() syscall to query filesystem	information [ver #18]
 
David Howells
 - [PATCH 03/14] fsinfo: Provide a bitmap of supported features [ver #18]
 
David Howells
 - [PATCH 04/14] fsinfo: Allow retrieval of superblock devname,	options and stats [ver #18]
 
David Howells
 - [PATCH 05/14] fsinfo: Allow fsinfo() to look up a mount object by ID	[ver #18]
 
David Howells
 - [PATCH 06/14] fsinfo: Add a uniquifier ID to struct mount [ver #18]
 
David Howells
 - [PATCH 07/14] fsinfo: Allow mount information to be queried [ver #18]
 
David Howells
 - [PATCH 08/14] fsinfo: Allow the mount topology propogation flags to	be retrieved [ver #18]
 
David Howells
 - [PATCH 09/14] fsinfo: Provide notification overrun handling support	[ver #18]
 
David Howells
 - [PATCH 10/14] fsinfo: sample: Mount listing program [ver #18]
 
David Howells
 - [PATCH 11/14] fsinfo: Add API documentation [ver #18]
 
David Howells
 - [PATCH 12/14] fsinfo: Add support for AFS [ver #18]
 
David Howells
 - [PATCH 13/14] fsinfo: Example support for Ext4 [ver #18]
 
David Howells
 - [PATCH 14/14] fsinfo: Example support for NFS [ver #18]
 
David Howells
 - [PATCH v2 2/2] KEYS: Avoid false positive ENOMEM error on key read
 
David Howells
 - [PATCH 00/14] VFS: Filesystem information [ver #18]
 
Jeff Layton
 - [PATCH 00/14] VFS: Filesystem information [ver #18]
 
Andres Freund
 - [PATCH 00/14] VFS: Filesystem information [ver #18]
 
Miklos Szeredi
 - [PATCH 01/14] VFS: Add additional RESOLVE_* flags [ver #18]
 
David Howells
 - [PATCH 00/14] VFS: Filesystem information [ver #18]
 
Jeff Layton
 - [PATCH 00/14] VFS: Filesystem information [ver #18]
 
David Howells
 - [RFC PATCH v14 00/10] Landlock LSM
 
Jann Horn
 - [PATCH v15 05/23] net: Prepare UDS for security module stacking
 
Casey Schaufler
 - [PATCH 00/14] VFS: Filesystem information [ver #18]
 
Andres Freund
 - [PATCH v15 05/23] net: Prepare UDS for security module stacking
 
Paul Moore
 - [PATCH v15 06/23] Use lsmblob in security_secctx_to_secid
 
Casey Schaufler
 - [PATCH 01/14] VFS: Add additional RESOLVE_* flags [ver #18]
 
Linus Torvalds
 - [PATCH v15 18/23] NET: Store LSM netlabel data in a lsmblob
 
Casey Schaufler
 - [PATCH 01/14] VFS: Add additional RESOLVE_* flags [ver #18]
 
David Howells
 - [PATCH 08/14] fsinfo: Allow the mount topology propogation flags	to be retrieved [ver #18]
 
Christian Brauner
 - [PATCH 07/14] fsinfo: Allow mount information to be queried [ver	#18]
 
Miklos Szeredi
 - [PATCH 00/14] VFS: Filesystem information [ver #18]
 
Miklos Szeredi
 - [PATCH 02/14] fsinfo: Add fsinfo() syscall to query filesystem	information [ver #18]
 
Christian Brauner
 - [PATCH v19 01/14] fsinfo: Add fsinfo() syscall to query filesystem	information
 
Christian Brauner
 - [PATCH v19 14/14] arch: wire up fsinfo syscall
 
Christian Brauner
 - No subject
 
Cy.Eden
 - [PATCH v2 2/2] KEYS: Avoid false positive ENOMEM error on key read
 
Waiman Long
 - [PATCH v2 2/2] KEYS: Avoid false positive ENOMEM error on key read
 
Waiman Long
 - [PATCH v2 2/2] KEYS: Avoid false positive ENOMEM error on key read
 
David Howells
 - [RFC PATCH] security, anon_inodes,	kvm: enable security support for anon inodes
 
Daniel Colascione
 - [RFC PATCH] security, anon_inodes,	kvm: enable security support for anon inodes
 
Stephen Smalley
 - [RFC PATCH] security, anon_inodes,	kvm: enable security support for anon inodes
 
Daniel Colascione
 - [PATCH] tomoyo: Use scnprintf() for avoiding potential buffer overflow
 
Takashi Iwai
 - [PATCH] tomoyo: Use scnprintf() for avoiding potential buffer	overflow
 
Tetsuo Handa
 - [PATCH] tomoyo: Use scnprintf() for avoiding potential buffer	overflow
 
Takashi Iwai
 - [RFC PATCH] security, anon_inodes,	kvm: enable security support for anon inodes
 
Stephen Smalley
 - [PATCH v2 2/2] KEYS: Avoid false positive ENOMEM error on key read
 
Waiman Long
 - [PATCH 01/14] VFS: Add additional RESOLVE_* flags [ver #18]
 
Linus Torvalds
 - [RFC PATCH v14 00/10] Landlock LSM
 
Mickaël Salaün
 - [PATCH 01/14] VFS: Add additional RESOLVE_* flags [ver #18]
 
Linus Torvalds
 - [PATCH 01/14] VFS: Add additional RESOLVE_* flags [ver #18]
 
David Howells
 - [PATCH 01/14] VFS: Add additional RESOLVE_* flags [ver #18]
 
Linus Torvalds
 - [PATCH 01/14] VFS: Add additional RESOLVE_* flags [ver #18]
 
Al Viro
 - [PATCH 01/14] VFS: Add additional RESOLVE_* flags [ver #18]
 
Al Viro
 - [PATCH 01/14] VFS: Add additional RESOLVE_* flags [ver #18]
 
Jeremy Allison
 - [PATCH v2 1/2] KEYS: Don't write out to userspace while holding	key semaphore
 
Jarkko Sakkinen
 - [PATCH v2 1/2] KEYS: Don't write out to userspace while holding	key semaphore
 
Waiman Long
 - [PATCH v3 0/3] KEYS: Read keys to internal buffer & then copy to	userspace
 
Waiman Long
 - [PATCH v3 1/3] KEYS: Don't write out to userspace while holding key	semaphore
 
Waiman Long
 - [PATCH v3 2/3] KEYS: Avoid false positive ENOMEM error on key read
 
Waiman Long
 - [PATCH v3 3/3] KEYS: Use kvmalloc() to better handle large buffer	allocation
 
Waiman Long
 - [PATCH v2 1/2] KEYS: Don't write out to userspace while holding	key semaphore
 
Jarkko Sakkinen
 - [PATCH v3 3/3] KEYS: Use kvmalloc() to better handle large	buffer allocation
 
Eric Biggers
 - [PATCH 01/14] VFS: Add additional RESOLVE_* flags [ver #18]
 
Jeremy Allison
 - [PATCH v2 1/2] KEYS: Don't write out to userspace while holding	key semaphore
 
Waiman Long
 - [PATCH v1] perf tool: make Perf tool aware of SELinux access control
 
Alexey Budankov
 - [PATCH v3 3/3] KEYS: Use kvmalloc() to better handle large buffer	allocation
 
Waiman Long
 - [PATCH 01/14] VFS: Add additional RESOLVE_* flags [ver #18]
 
Al Viro
 - [PATCH 01/14] VFS: Add additional RESOLVE_* flags [ver #18]
 
Jeremy Allison
 - You received my last mail,,,,
 
Omar Ousman
 - [PATCH v9 0/8] proc: modernize proc to support multiple private	instances
 
Alexey Gladkov
 - [PATCH v9 1/8] proc: rename struct proc_fs_info to proc_fs_opts
 
Alexey Gladkov
 - [PATCH v9 2/8] proc: allow to mount many instances of proc in one pid	namespace
 
Alexey Gladkov
 - [PATCH v9 3/8] proc: move hide_pid,	pid_gid from pid_namespace to proc_fs_info
 
Alexey Gladkov
 - [PATCH v9 4/8] proc: instantiate only pids that we can ptrace on	'hidepid=4' mount option
 
Alexey Gladkov
 - [PATCH v9 5/8] proc: add option to mount only a pids subset
 
Alexey Gladkov
 - [PATCH v9 6/8] docs: proc: add documentation for "hidepid=4" and	"subset=pidfs" options and new mount behavior
 
Alexey Gladkov
 - [PATCH v9 7/8] proc: move hidepid values to uapi as they are user	interface to mount
 
Alexey Gladkov
 - [PATCH v9 8/8] proc: use human-readable values for hidehid
 
Alexey Gladkov
 - [PATCH v3 1/3] KEYS: Don't write out to userspace while holding	key semaphore
 
Jarkko Sakkinen
 - [PATCH v3 1/3] KEYS: Don't write out to userspace while holding	key semaphore
 
Jarkko Sakkinen
 - [PATCH v3 2/3] KEYS: Avoid false positive ENOMEM error on key read
 
Jarkko Sakkinen
 - [PATCH v3 3/3] KEYS: Use kvmalloc() to better handle large	buffer allocation
 
Jarkko Sakkinen
 - [PATCH v3 3/3] KEYS: Use kvmalloc() to better handle large buffer	allocation
 
Waiman Long
 - VERY URGENT
 
Mr.Sébastien Toni
 - [PATCH v3 1/3] KEYS: Don't write out to userspace while holding	key semaphore
 
David Howells
 - [PATCH v3 1/3] KEYS: Don't write out to userspace while holding	key semaphore
 
David Howells
 - [PATCH v3 1/3] KEYS: Don't write out to userspace while holding	key semaphore
 
David Howells
 - [PATCH v3 1/3] KEYS: Don't write out to userspace while holding	key semaphore
 
Jarkko Sakkinen
 - [PATCH v3 3/3] KEYS: Use kvmalloc() to better handle large buffer	allocation
 
David Howells
 - [PATCH v3 3/3] KEYS: Use kvmalloc() to better handle large buffer	allocation
 
Waiman Long
 - [PATCH v3 1/3] KEYS: Don't write out to userspace while holding	key semaphore
 
Waiman Long
 - [PATCH v3 3/3] KEYS: Use kvmalloc() to better handle large	buffer allocation
 
Jarkko Sakkinen
 - No subject
 
David Ibe
 - REF
 
Stephen Li
 - [RFC PATCH v14 00/10] Landlock LSM
 
Jann Horn
 - [RFC PATCH v14 06/10] landlock: Add syscall implementation
 
Al Viro
 - [RFC PATCH v14 00/10] Landlock LSM
 
Mickaël Salaün
 - [RFC PATCH v14 06/10] landlock: Add syscall implementation
 
Mickaël Salaün
 - [PATCH v3 1/3] KEYS: Don't write out to userspace while holding	key semaphore
 
Waiman Long
 - [PATCH v3 1/3] KEYS: Don't write out to userspace while holding	key semaphore
 
Waiman Long
 - [PATCH v3 2/3] KEYS: Avoid false positive ENOMEM error on key read
 
Waiman Long
 - [PATCH v4 0/4] KEYS: Read keys to internal buffer & then copy to	userspace
 
Waiman Long
 - [PATCH v4 1/4] KEYS: Don't write out to userspace while holding key	semaphore
 
Waiman Long
 - [PATCH v4 2/4] KEYS: Remove __user annotation from rxrpc_read()
 
Waiman Long
 - [PATCH v4 3/4] KEYS: Remove __user annotation from dns_resolver_read()
 
Waiman Long
 - [PATCH v4 4/4] KEYS: Avoid false positive ENOMEM error on key read
 
Waiman Long
 - [RFC PATCH v14 00/10] Landlock LSM
 
Jann Horn
 - [PATCH v4 2/4] KEYS: Remove __user annotation from rxrpc_read()
 
David Howells
 - [PATCH v4 4/4] KEYS: Avoid false positive ENOMEM error on key read
 
David Howells
 - [RFC PATCH v14 00/10] Landlock LSM
 
Mickaël Salaün
 - [PATCH v3 7/8] ima: Calculate and extend PCR with digests in	ima_template_entry
 
Roberto Sassu
 - [PATCH v4 2/4] KEYS: Remove __user annotation from rxrpc_read()
 
Waiman Long
 - [PATCH v4 4/4] KEYS: Avoid false positive ENOMEM error on key read
 
Waiman Long
 - [PATCH 00/17] pipe: Keyrings,	mount and superblock notifications [ver #5]
 
David Howells
 - [PATCH 01/17] uapi: General notification queue definitions [ver #5]
 
David Howells
 - [PATCH 02/17] security: Add hooks to rule on setting a watch [ver #5]
 
David Howells
 - [PATCH 03/17] security: Add a hook for the point of notification	insertion [ver #5]
 
David Howells
 - [PATCH 04/17] pipe: Add O_NOTIFICATION_PIPE [ver #5]
 
David Howells
 - [PATCH 05/17] pipe: Add general notification queue support [ver #5]
 
David Howells
 - [PATCH 06/17] watch_queue: Add a key/keyring notification facility	[ver #5]
 
David Howells
 - [PATCH 07/17] Add sample notification program [ver #5]
 
David Howells
 - [PATCH 08/17] pipe: Allow buffers to be marked read-whole-or-error	for notifications [ver #5]
 
David Howells
 - [PATCH 09/17] pipe: Add notification lossage handling [ver #5]
 
David Howells
 - [PATCH 10/17] selinux: Implement the watch_key security hook [ver #5]
 
David Howells
 - [PATCH 11/17] smack: Implement the watch_key and post_notification	hooks [ver #5]
 
David Howells
 - [PATCH 12/17] watch_queue: Add security hooks to rule on setting	mount and sb watches [ver #5]
 
David Howells
 - [PATCH 13/17] watch_queue: Implement mount topology and attribute	change notifications [ver #5]
 
David Howells
 - [PATCH 14/17] watch_queue: sample: Display mount tree change	notifications [ver #5]
 
David Howells
 - [PATCH 15/17] watch_queue: Introduce a non-repeating system-unique	superblock ID [ver #5]
 
David Howells
 - [PATCH 16/17] watch_queue: Add superblock notifications [ver #5]
 
David Howells
 - [PATCH 17/17] watch_queue: sample: Display superblock notifications	[ver #5]
 
David Howells
 - [PATCH 00/13] VFS: Filesystem information [ver #19]
 
David Howells
 - [PATCH 01/13] fsinfo: Add fsinfo() syscall to query filesystem	information [ver #19]
 
David Howells
 - [PATCH 02/13] fsinfo: Provide a bitmap of supported features [ver #19]
 
David Howells
 - [PATCH 03/13] fsinfo: Allow retrieval of superblock devname,	options and stats [ver #19]
 
David Howells
 - [PATCH 04/13] fsinfo: Allow fsinfo() to look up a mount object by ID	[ver #19]
 
David Howells
 - [PATCH 05/13] fsinfo: Add a uniquifier ID to struct mount [ver #19]
 
David Howells
 - [PATCH 06/13] fsinfo: Allow mount information to be queried [ver #19]
 
David Howells
 - [PATCH 07/13] fsinfo: Allow mount topology and propagation info to be	retrieved [ver #19]
 
David Howells
 - [PATCH 08/13] fsinfo: Provide notification overrun handling support	[ver #19]
 
David Howells
 - [PATCH 09/13] fsinfo: sample: Mount listing program [ver #19]
 
David Howells
 - [PATCH 10/13] fsinfo: Add API documentation [ver #19]
 
David Howells
 - [PATCH 11/13] fsinfo: Add support for AFS [ver #19]
 
David Howells
 - [PATCH 12/13] fsinfo: Example support for Ext4 [ver #19]
 
David Howells
 - [PATCH 13/13] fsinfo: Example support for NFS [ver #19]
 
David Howells
 - [PATCH v4 4/4] KEYS: Avoid false positive ENOMEM error on key read
 
David Howells
 - [PATCH 00/13] VFS: Filesystem information [ver #19]
 
Miklos Szeredi
 - Looking for help testing patch attestation
 
Konstantin Ryabitsev
 - [PATCH 02/17] security: Add hooks to rule on setting a watch	[ver #5]
 
James Morris
 - [PATCH 03/17] security: Add a hook for the point of notification	insertion [ver #5]
 
James Morris
 - [PATCH 06/17] watch_queue: Add a key/keyring notification facility	[ver #5]
 
James Morris
 - [PATCH 10/17] selinux: Implement the watch_key security hook	[ver #5]
 
James Morris
 - [PATCH 12/17] watch_queue: Add security hooks to rule on setting	mount and sb watches [ver #5]
 
James Morris
 - [PATCH v3 7/8] ima: Calculate and extend PCR with digests in	ima_template_entry
 
Mimi Zohar
 - [PATCH v5 0/2] KEYS: Read keys to internal buffer & then copy to	userspace
 
Waiman Long
 - [PATCH v5 1/2] KEYS: Don't write out to userspace while holding key	semaphore
 
Waiman Long
 - [PATCH v5 2/2] KEYS: Avoid false positive ENOMEM error on key read
 
Waiman Long
 - [RFC PATCH v14 00/10] Landlock LSM
 
Jann Horn
 - [PATCH v1] perf tool: make Perf tool aware of SELinux access	control
 
Alexey Budankov
 - [PATCH v3 7/8] ima: Calculate and extend PCR with digests in	ima_template_entry
 
Roberto Sassu
 - [PATCH v3 7/8] ima: Calculate and extend PCR with digests in	ima_template_entry
 
Mimi Zohar
 - [PATCH 00/13] VFS: Filesystem information [ver #19]
 
David Howells
 - [PATCH 00/13] VFS: Filesystem information [ver #19]
 
Miklos Szeredi
 - [RFC PATCH v14 00/10] Landlock LSM
 
Mickaël Salaün
 - [PATCH v28 11/22] x86/sgx: Linux Enclave Driver
 
Dr. Greg
 - [PATCH v1] perf tool: make Perf tool aware of SELinux access	control
 
Arnaldo Carvalho de Melo
 - [PATCH v1] perf tool: make Perf tool aware of SELinux access	control
 
Arnaldo Carvalho de Melo
 - [PATCH v5 2/2] KEYS: Avoid false positive ENOMEM error on key read
 
Jarkko Sakkinen
 - [RFC PATCH v14 00/10] Landlock LSM
 
Jann Horn
 - [PATCH v5 2/2] KEYS: Avoid false positive ENOMEM error on key read
 
Waiman Long
 - [PATCH v5 2/2] KEYS: Avoid false positive ENOMEM error on key read
 
Jarkko Sakkinen
 - [PATCH v5 1/2] KEYS: Don't write out to userspace while holding	key semaphore
 
David Howells
 - HAPPY SURVIVAL OF CORONAVIRUS
 
ECOWAS COMMITEE
 - [PATCH v1] perf tool: make Perf tool aware of SELinux access	control
 
Alexey Budankov
 - [PATCH v5 2/2] KEYS: Avoid false positive ENOMEM error on key read
 
Waiman Long
 - [PATCH v1] perf tool: make Perf tool aware of SELinux access	control
 
Arnaldo Carvalho de Melo
 - [PATCH v5 1/2] KEYS: Don't write out to userspace while holding	key semaphore
 
Waiman Long
 - [PATCH v5 2/2] KEYS: Avoid false positive ENOMEM error on key read
 
Jarkko Sakkinen
 - [PATCH v5 2/2] KEYS: Avoid false positive ENOMEM error on key read
 
Waiman Long
 - [PATCH] security, keys: Optimize barrier usage for Rmw atomic	bitops
 
Davidlohr Bueso
 - [PATCH v6 0/2] KEYS: Read keys to internal buffer & then copy to	userspace
 
Waiman Long
 - [PATCH v6 1/2] KEYS: Don't write out to userspace while holding key	semaphore
 
Waiman Long
 - [PATCH v6 2/2] KEYS: Avoid false positive ENOMEM error on key read
 
Waiman Long
 - [PATCH v6 2/2] KEYS: Avoid false positive ENOMEM error on key read
 
Jarkko Sakkinen
 - [PATCH v6 2/2] KEYS: Avoid false positive ENOMEM error on key read
 
Jarkko Sakkinen
 - [PATCH v5 2/2] KEYS: Avoid false positive ENOMEM error on key read
 
David Howells
 - [PATCH v5 2/2] KEYS: Avoid false positive ENOMEM error on key read
 
Jarkko Sakkinen
 - [PATCH v6 2/2] KEYS: Avoid false positive ENOMEM error on key read
 
Waiman Long
 - [PATCH v7 0/2] KEYS: Read keys to internal buffer & then copy to	userspace
 
Waiman Long
 - [PATCH v7 1/2] KEYS: Don't write out to userspace while holding key	semaphore
 
Waiman Long
 - [PATCH v7 2/2] KEYS: Avoid false positive ENOMEM error on key read
 
Waiman Long
 - [PATCH v7 2/2] KEYS: Avoid false positive ENOMEM error on key read
 
Tetsuo Handa
 - [PATCH v7 2/2] KEYS: Avoid false positive ENOMEM error on key read
 
Waiman Long
 - [PATCH v8 0/2] KEYS: Read keys to internal buffer & then copy to	userspace
 
Waiman Long
 - [PATCH v8 1/2] KEYS: Don't write out to userspace while holding key	semaphore
 
Waiman Long
 - [PATCH v8 2/2] KEYS: Avoid false positive ENOMEM error on key read
 
Waiman Long
 - [PATCH bpf-next v5 0/8] MAC and Audit policy using eBPF (KRSI)
 
KP Singh
 - [PATCH bpf-next v5 1/7] bpf: Introduce BPF_PROG_TYPE_LSM
 
KP Singh
 - [PATCH bpf-next v5 2/7] security: Refactor declaration of LSM hooks
 
KP Singh
 - [PATCH bpf-next v5 3/7] bpf: lsm: provide attachment points for BPF	LSM programs
 
KP Singh
 - [PATCH bpf-next v5 4/7] bpf: lsm: Implement attach,	detach and execution
 
KP Singh
 - [PATCH bpf-next v5 5/7] bpf: lsm: Initialize the BPF LSM hooks
 
KP Singh
 - [PATCH bpf-next v5 6/7] tools/libbpf: Add support for	BPF_PROG_TYPE_LSM
 
KP Singh
 - [PATCH bpf-next v5 7/7] bpf: lsm: Add selftests for BPF_PROG_TYPE_LSM
 
KP Singh
 - [PATCH bpf-next v5 1/7] bpf: Introduce BPF_PROG_TYPE_LSM
 
Yonghong Song
 - [PATCH bpf-next v5 3/7] bpf: lsm: provide attachment points for	BPF LSM programs
 
Yonghong Song
 - [PATCH bpf-next v5 4/7] bpf: lsm: Implement attach, detach and	execution
 
Yonghong Song
 - [PATCH bpf-next v5 6/7] tools/libbpf: Add support for	BPF_PROG_TYPE_LSM
 
Yonghong Song
 - [PATCH bpf-next v5 2/7] security: Refactor declaration of LSM	hooks
 
Kees Cook
 - [PATCH bpf-next v5 3/7] bpf: lsm: provide attachment points for	BPF LSM programs
 
Kees Cook
 - [PATCH bpf-next v5 4/7] bpf: lsm: Implement attach, detach and	execution
 
KP Singh
 - [PATCH bpf-next v5 5/7] bpf: lsm: Initialize the BPF LSM hooks
 
Kees Cook
 - [PATCH bpf-next v5 5/7] bpf: lsm: Initialize the BPF LSM hooks
 
KP Singh
 - [PATCH bpf-next v5 2/7] security: Refactor declaration of LSM	hooks
 
Andrii Nakryiko
 - [PATCH bpf-next v5 3/7] bpf: lsm: provide attachment points for	BPF LSM programs
 
Andrii Nakryiko
 - [PATCH bpf-next v5 7/7] bpf: lsm: Add selftests for	BPF_PROG_TYPE_LSM
 
Yonghong Song
 - [PATCH bpf-next v5 4/7] bpf: lsm: Implement attach,	detach and execution
 
Andrii Nakryiko
 - [PATCH bpf-next v5 5/7] bpf: lsm: Initialize the BPF LSM hooks
 
Andrii Nakryiko
 - [PATCH bpf-next v5 6/7] tools/libbpf: Add support for	BPF_PROG_TYPE_LSM
 
Andrii Nakryiko
 - [PATCH bpf-next v5 5/7] bpf: lsm: Initialize the BPF LSM hooks
 
Casey Schaufler
 - [PATCH bpf-next v5 5/7] bpf: lsm: Initialize the BPF LSM hooks
 
Kees Cook
 - [PATCH bpf-next v5 5/7] bpf: lsm: Initialize the BPF LSM hooks
 
Casey Schaufler
 - [PATCH bpf-next v5 5/7] bpf: lsm: Initialize the BPF LSM hooks
 
Kees Cook
 - [PATCH bpf-next v5 5/7] bpf: lsm: Initialize the BPF LSM hooks
 
Casey Schaufler
 - [PATCH bpf-next v5 5/7] bpf: lsm: Initialize the BPF LSM hooks
 
Casey Schaufler
 - [PATCH bpf-next v5 5/7] bpf: lsm: Initialize the BPF LSM hooks
 
KP Singh
 - [PATCH bpf-next v5 5/7] bpf: lsm: Initialize the BPF LSM hooks
 
KP Singh
 - [PATCH bpf-next v5 6/7] tools/libbpf: Add support for	BPF_PROG_TYPE_LSM
 
KP Singh
 - [PATCH bpf-next v5 3/7] bpf: lsm: provide attachment points for	BPF LSM programs
 
KP Singh
 - [PATCH bpf-next v5 4/7] bpf: lsm: Implement attach,	detach and execution
 
Stephen Smalley
 - [PATCH bpf-next v5 5/7] bpf: lsm: Initialize the BPF LSM hooks
 
Stephen Smalley
 - [PATCH bpf-next v5 5/7] bpf: lsm: Initialize the BPF LSM hooks
 
KP Singh
 - [PATCH bpf-next v5 4/7] bpf: lsm: Implement attach, detach and	execution
 
KP Singh
 - [PATCH bpf-next v5 5/7] bpf: lsm: Initialize the BPF LSM hooks
 
Stephen Smalley
 - [PATCH bpf-next v5 5/7] bpf: lsm: Initialize the BPF LSM hooks
 
KP Singh
 - [PATCH bpf-next v5 4/7] bpf: lsm: Implement attach,	detach and execution
 
Stephen Smalley
 - [PATCH bpf-next v5 2/7] security: Refactor declaration of LSM	hooks
 
KP Singh
 - [PATCH bpf-next v5 3/7] bpf: lsm: provide attachment points for	BPF LSM programs
 
KP Singh
 - [PATCH bpf-next v5 4/7] bpf: lsm: Implement attach, detach and	execution
 
Casey Schaufler
 - [PATCH bpf-next v5 4/7] bpf: lsm: Implement attach,	detach and execution
 
Stephen Smalley
 - [PATCH bpf-next v5 5/7] bpf: lsm: Initialize the BPF LSM hooks
 
Kees Cook
 - [PATCH bpf-next v5 4/7] bpf: lsm: Implement attach, detach and	execution
 
Kees Cook
 - [PATCH bpf-next v5 4/7] bpf: lsm: Implement attach, detach and	execution
 
KP Singh
 - [PATCH bpf-next v5 4/7] bpf: lsm: Implement attach,	detach and execution
 
Stephen Smalley
 - [PATCH bpf-next v5 4/7] bpf: lsm: Implement attach, detach and	execution
 
KP Singh
 - [PATCH bpf-next v5 4/7] bpf: lsm: Implement attach, detach and	execution
 
KP Singh
 - [PATCH bpf-next v5 4/7] bpf: lsm: Implement attach, detach and	execution
 
Kees Cook
 - [PATCH bpf-next v5 4/7] bpf: lsm: Implement attach, detach and	execution
 
Kees Cook
 - [PATCH bpf-next v5 4/7] bpf: lsm: Implement attach, detach and	execution
 
KP Singh
 - [PATCH bpf-next v5 7/7] bpf: lsm: Add selftests for	BPF_PROG_TYPE_LSM
 
KP Singh
 - [PATCH RESEND v9 0/8] proc: modernize proc to support multiple	private instances
 
Alexey Gladkov
 - [PATCH RESEND v9 1/8] proc: rename struct proc_fs_info to proc_fs_opts
 
Alexey Gladkov
 - [PATCH RESEND v9 2/8] proc: allow to mount many instances of proc in	one pid namespace
 
Alexey Gladkov
 - [PATCH RESEND v9 3/8] proc: move hide_pid,	pid_gid from pid_namespace to proc_fs_info
 
Alexey Gladkov
 - [PATCH RESEND v9 4/8] proc: instantiate only pids that we can ptrace	on 'hidepid=4' mount option
 
Alexey Gladkov
 - [PATCH RESEND v9 5/8] proc: add option to mount only a pids subset
 
Alexey Gladkov
 - [PATCH RESEND v9 6/8] docs: proc: add documentation for "hidepid=4"	and "subset=pidfs" options and new mount behavior
 
Alexey Gladkov
 - [PATCH RESEND v9 7/8] proc: move hidepid values to uapi as they are	user interface to mount
 
Alexey Gladkov
 - [PATCH RESEND v9 8/8] proc: use human-readable values for hidehid
 
Alexey Gladkov
 - [PATCH RESEND v9 3/8] proc: move hide_pid, pid_gid from	pid_namespace to proc_fs_info
 
Linus Torvalds
 - [PATCH bpf-next v5 3/7] bpf: lsm: provide attachment points for	BPF LSM programs
 
Andrii Nakryiko
 - [PATCH bpf-next v5 3/7] bpf: lsm: provide attachment points for	BPF LSM programs
 
KP Singh
 - [PATCH bpf-next v5 7/7] bpf: lsm: Add selftests for	BPF_PROG_TYPE_LSM
 
Andrii Nakryiko
 - [PATCH bpf-next v5 7/7] bpf: lsm: Add selftests for	BPF_PROG_TYPE_LSM
 
KP Singh
 - [PATCH v4 0/7] ima: support stronger algorithms for attestation
 
Roberto Sassu
 - [PATCH v4 1/7] ima: Switch to ima_hash_algo for boot aggregate
 
Roberto Sassu
 - [PATCH v4 2/7] ima: Evaluate error in init_ima()
 
Roberto Sassu
 - [PATCH v4 3/7] ima: Store template digest directly in	ima_template_entry
 
Roberto Sassu
 - [PATCH v4 4/7] ima: Switch to dynamically allocated buffer for	template digests
 
Roberto Sassu
 - [PATCH v4 5/7] ima: Allocate and initialize tfm for each PCR bank
 
Roberto Sassu
 - [PATCH v4 6/7] ima: Calculate and extend PCR with digests in	ima_template_entry
 
Roberto Sassu
 - [PATCH v4 7/7] ima: Use ima_hash_algo for collision detection in the	measurement list
 
Roberto Sassu
 - [PATCH bpf-next v5 5/7] bpf: lsm: Initialize the BPF LSM hooks
 
KP Singh
 - [PATCH bpf-next v6 0/8] MAC and Audit policy using eBPF (KRSI)
 
KP Singh
 - [PATCH bpf-next v6 1/8] bpf: Introduce BPF_PROG_TYPE_LSM
 
KP Singh
 - [PATCH bpf-next v6 2/8] security: Refactor declaration of LSM hooks
 
KP Singh
 - [PATCH bpf-next v6 3/8] bpf: lsm: provide attachment points for BPF	LSM programs
 
KP Singh
 - [PATCH bpf-next v6 4/8] bpf: lsm: Implement attach,	detach and execution
 
KP Singh
 - [PATCH bpf-next v6 5/8] bpf: lsm: Initialize the BPF LSM hooks
 
KP Singh
 - [PATCH bpf-next v6 6/8] tools/libbpf: Add support for	BPF_PROG_TYPE_LSM
 
KP Singh
 - [PATCH bpf-next v6 7/8] bpf: lsm: Add selftests for BPF_PROG_TYPE_LSM
 
KP Singh
 - [PATCH bpf-next v6 8/8] bpf: lsm: Add Documentation
 
KP Singh
 - [PATCH 1/5] ima: Set file->f_mode instead of file->f_flags in	ima_calc_file_hash()
 
Roberto Sassu
 - [PATCH 2/5] evm: Check also if *tfm is an error pointer in init_desc()
 
Roberto Sassu
 - [PATCH 3/5] ima: Fix ima digest hash table key calculation
 
Roberto Sassu
 - [PATCH 4/5] ima: Remove redundant policy rule set in add_rules()
 
Roberto Sassu
 - [PATCH 5/5] ima: Remove unused build_ima_appraise variable
 
Roberto Sassu
 - [PATCH v9 9/8] proc: use named enums for better readability
 
Alexey Gladkov
 - [PATCH RESEND v9 3/8] proc: move hide_pid, pid_gid from	pid_namespace to proc_fs_info
 
Alexey Dobriyan
 - [PATCH RESEND v9 3/8] proc: move hide_pid, pid_gid from	pid_namespace to proc_fs_info
 
Alexey Gladkov
 - [PATCH v9 9/8] proc: use named enums for better readability
 
Kees Cook
 - [PATCH bpf-next v6 0/8] MAC and Audit policy using eBPF (KRSI)
 
Kees Cook
 - [PATCH bpf-next v6 3/8] bpf: lsm: provide attachment points for	BPF LSM programs
 
Kees Cook
 - [PATCH bpf-next v6 5/8] bpf: lsm: Initialize the BPF LSM hooks
 
Kees Cook
 - [PATCH bpf-next v6 3/8] bpf: lsm: provide attachment points for	BPF LSM programs
 
KP Singh
 - [PATCH bpf-next v6 0/8] MAC and Audit policy using eBPF (KRSI)
 
KP Singh
 - [PATCH bpf-next v6 3/8] bpf: lsm: provide attachment points for	BPF LSM programs
 
Kees Cook
 - [PATCH bpf-next v6 3/8] bpf: lsm: provide attachment points for	BPF LSM programs
 
KP Singh
 - [PATCH bpf-next v6 2/8] security: Refactor declaration of LSM	hooks
 
Casey Schaufler
 - [PATCH v2 0/3] SELinux support for anonymous inodes and UFFD
 
Daniel Colascione
 - [PATCH v2 1/3] Add a new LSM-supporting anonymous inode interface
 
Daniel Colascione
 - [PATCH v2 2/3] Teach SELinux about anonymous inodes
 
Daniel Colascione
 - [PATCH v2 3/3] Wire UFFD up to SELinux
 
Daniel Colascione
 - [PATCH bpf-next v6 2/8] security: Refactor declaration of LSM	hooks
 
KP Singh
 - [PATCH v2 3/3] Wire UFFD up to SELinux
 
Casey Schaufler
 - [PATCH bpf-next v6 4/8] bpf: lsm: Implement attach,	detach and execution
 
Andrii Nakryiko
 - [PATCH bpf-next v6 1/8] bpf: Introduce BPF_PROG_TYPE_LSM
 
Andrii Nakryiko
 - [PATCH bpf-next v6 6/8] tools/libbpf: Add support for	BPF_PROG_TYPE_LSM
 
Andrii Nakryiko
 - [PATCH bpf-next v6 7/8] bpf: lsm: Add selftests for	BPF_PROG_TYPE_LSM
 
Andrii Nakryiko
 - [PATCH v8 0/2] KEYS: Read keys to internal buffer & then copy	to userspace
 
David Miller
 - [PATCH bpf-next v6 1/8] bpf: Introduce BPF_PROG_TYPE_LSM
 
KP Singh
 - [PATCH bpf-next v6 4/8] bpf: lsm: Implement attach, detach and	execution
 
KP Singh
 - [PATCH bpf-next v6 7/8] bpf: lsm: Add selftests for	BPF_PROG_TYPE_LSM
 
KP Singh
 - [PATCH v2 1/3] Add a new LSM-supporting anonymous inode interface
 
Stephen Smalley
 - [PATCH v2 2/3] Teach SELinux about anonymous inodes
 
Stephen Smalley
 - [PATCH bpf-next v7 0/8] MAC and Audit policy using eBPF (KRSI)
 
KP Singh
 - [PATCH bpf-next v7 1/8] bpf: Introduce BPF_PROG_TYPE_LSM
 
KP Singh
 - [PATCH bpf-next v7 2/8] security: Refactor declaration of LSM hooks
 
KP Singh
 - [PATCH bpf-next v7 3/8] bpf: lsm: provide attachment points for BPF	LSM programs
 
KP Singh
 - [PATCH bpf-next v7 4/8] bpf: lsm: Implement attach,	detach and execution
 
KP Singh
 - [PATCH bpf-next v7 5/8] bpf: lsm: Initialize the BPF LSM hooks
 
KP Singh
 - [PATCH bpf-next v7 6/8] tools/libbpf: Add support for	BPF_PROG_TYPE_LSM
 
KP Singh
 - [PATCH bpf-next v7 7/8] bpf: lsm: Add selftests for BPF_PROG_TYPE_LSM
 
KP Singh
 - [PATCH bpf-next v7 8/8] bpf: lsm: Add Documentation
 
KP Singh
 - [PATCH v2 2/3] Teach SELinux about anonymous inodes
 
Stephen Smalley
 - [PATCH v2 2/3] Teach SELinux about anonymous inodes
 
Daniel Colascione
 - [PATCH v8 0/2] KEYS: Read keys to internal buffer & then copy to	userspace
 
David Howells
 - [PATCH v3 0/3] SELinux support for anonymous inodes and UFFD
 
Daniel Colascione
 - [PATCH v3 1/3] Add a new LSM-supporting anonymous inode interface
 
Daniel Colascione
 - [PATCH v3 2/3] Teach SELinux about anonymous inodes
 
Daniel Colascione
 - [PATCH v3 3/3] Wire UFFD up to SELinux
 
Daniel Colascione
 - [PATCH v3 1/3] Add a new LSM-supporting anonymous inode interface
 
Stephen Smalley
 - [PATCH v3 2/3] Teach SELinux about anonymous inodes
 
Stephen Smalley
 - [PATCH bpf-next v7 4/8] bpf: lsm: Implement attach,	detach and execution
 
Andrii Nakryiko
 - [PATCH bpf-next v7 7/8] bpf: lsm: Add selftests for	BPF_PROG_TYPE_LSM
 
Andrii Nakryiko
 - [PATCH bpf-next v7 8/8] bpf: lsm: Add Documentation
 
Andrii Nakryiko
 - [PATCH bpf-next v7 4/8] bpf: lsm: Implement attach, detach and	execution
 
KP Singh
 - [PATCH bpf-next v7 7/8] bpf: lsm: Add selftests for	BPF_PROG_TYPE_LSM
 
KP Singh
 - [PATCH v4 0/3] SELinux support for anonymous inodes and UFFD
 
Daniel Colascione
 - [PATCH v4 1/3] Add a new LSM-supporting anonymous inode interface
 
Daniel Colascione
 - [PATCH v4 2/3] Teach SELinux about anonymous inodes
 
Daniel Colascione
 - [PATCH v4 3/3] Wire UFFD up to SELinux
 
Daniel Colascione
 - [PATCH v15 00/10] Landlock LSM
 
Mickaël Salaün
 - [PATCH v15 01/10] landlock: Add object management
 
Mickaël Salaün
 - [PATCH v15 02/10] landlock: Add ruleset and domain management
 
Mickaël Salaün
 - [PATCH v15 03/10] landlock: Set up the security framework and manage	credentials
 
Mickaël Salaün
 - [PATCH v15 04/10] landlock: Add ptrace restrictions
 
Mickaël Salaün
 - [PATCH v15 05/10] fs,landlock: Support filesystem access-control
 
Mickaël Salaün
 - [PATCH v15 06/10] landlock: Add syscall implementation
 
Mickaël Salaün
 - [PATCH v15 07/10] arch: Wire up landlock() syscall
 
Mickaël Salaün
 - [PATCH v15 08/10] selftests/landlock: Add initial tests
 
Mickaël Salaün
 - [PATCH v15 09/10] samples/landlock: Add a sandbox manager example
 
Mickaël Salaün
 - [PATCH v15 10/10] landlock: Add user and kernel documentation
 
Mickaël Salaün
 - [PATCH bpf-next v7 8/8] bpf: lsm: Add Documentation
 
KP Singh
 - [PATCH bpf-next v7 8/8] bpf: lsm: Add Documentation
 
Andrii Nakryiko
 - [PATCH v8 0/2] KEYS: Read keys to internal buffer & then copy	to userspace
 
Jarkko Sakkinen
 - [Intel-gfx] [PATCH v7 00/12] Introduce CAP_PERFMON to secure	system performance monitoring and observability
 
James Morris
 - [PATCH v15 09/10] samples/landlock: Add a sandbox manager example
 
Randy Dunlap
 - [PATCH v4 2/7] ima: Evaluate error in init_ima()
 
James Morris
 - [PATCH bpf-next v7 4/8] bpf: lsm: Implement attach, detach and	execution
 
James Morris
 - [PATCH bpf-next v7 1/8] bpf: Introduce BPF_PROG_TYPE_LSM
 
James Morris
 - [PATCH bpf-next v7 2/8] security: Refactor declaration of LSM	hooks
 
James Morris
 - [PATCH bpf-next v7 3/8] bpf: lsm: provide attachment points for	BPF LSM programs
 
James Morris
 - [PATCH bpf-next v7 5/8] bpf: lsm: Initialize the BPF LSM hooks
 
James Morris
 - [PATCH bpf-next v7 6/8] tools/libbpf: Add support for	BPF_PROG_TYPE_LSM
 
James Morris
 - [PATCH bpf-next v7 7/8] bpf: lsm: Add selftests for	BPF_PROG_TYPE_LSM
 
James Morris
 - [PATCH bpf-next v7 8/8] bpf: lsm: Add Documentation
 
James Morris
 - KASAN: slab-out-of-bounds Read in vsscanf
 
syzbot
 - [PATCH bpf-next v7 4/8] bpf: lsm: Implement attach, detach and	execution
 
Alexei Starovoitov
 - [PATCH bpf-next v7 4/8] bpf: lsm: Implement attach, detach and	execution
 
Stephen Smalley
 - [PATCH bpf-next v7 4/8] bpf: lsm: Implement attach, detach and	execution
 
KP Singh
 - [PATCH v4 1/3] Add a new LSM-supporting anonymous inode interface
 
Stephen Smalley
 - [PATCH v4 2/3] Teach SELinux about anonymous inodes
 
Stephen Smalley
 - [PATCH bpf-next v7 4/8] bpf: lsm: Implement attach, detach and	execution
 
Stephen Smalley
 - [PATCH bpf-next v7 4/8] bpf: lsm: Implement attach, detach and	execution
 
KP Singh
 - [PATCH v15 09/10] samples/landlock: Add a sandbox manager example
 
Mickaël Salaün
 - [PATCH bpf-next v7 4/8] bpf: lsm: Implement attach, detach and	execution
 
KP Singh
 - KASAN: slab-out-of-bounds Read in vsscanf
 
Casey Schaufler
 - [PATCH bpf-next v7 4/8] bpf: lsm: Implement attach, detach and	execution
 
Casey Schaufler
 - [PATCH v10 0/9] proc: modernize proc to support multiple private	instances
 
Alexey Gladkov
 - [PATCH v10 1/9] proc: rename struct proc_fs_info to proc_fs_opts
 
Alexey Gladkov
 - [PATCH v10 2/9] proc: allow to mount many instances of proc in one	pid namespace
 
Alexey Gladkov
 - [PATCH v10 3/9] proc: move hide_pid,	pid_gid from pid_namespace to proc_fs_info
 
Alexey Gladkov
 - [PATCH v10 4/9] proc: instantiate only pids that we can ptrace on	'hidepid=4' mount option
 
Alexey Gladkov
 - [PATCH v10 5/9] proc: add option to mount only a pids subset
 
Alexey Gladkov
 - [PATCH v10 6/9] docs: proc: add documentation for "hidepid=4" and	"subset=pid" options and new mount behavior
 
Alexey Gladkov
 - [PATCH v10 7/9] proc: move hidepid values to uapi as they are user	interface to mount
 
Alexey Gladkov
 - [PATCH v10 8/9] proc: use human-readable values for hidehid
 
Alexey Gladkov
 - [PATCH v10 9/9] proc: use named enums for better readability
 
Alexey Gladkov
 - [PATCH bpf-next v7 4/8] bpf: lsm: Implement attach, detach and	execution
 
Kees Cook
 - [PATCH bpf-next v7 4/8] bpf: lsm: Implement attach, detach and	execution
 
KP Singh
 - [PATCH bpf-next v8 0/8] MAC and Audit policy using eBPF (KRSI)
 
KP Singh
 - [PATCH bpf-next v8 1/8] bpf: Introduce BPF_PROG_TYPE_LSM
 
KP Singh
 - [PATCH bpf-next v8 2/8] security: Refactor declaration of LSM hooks
 
KP Singh
 - [PATCH bpf-next v8 3/8] bpf: lsm: provide attachment points for BPF	LSM programs
 
KP Singh
 - [PATCH bpf-next v8 4/8] bpf: lsm: Implement attach,	detach and execution
 
KP Singh
 - [PATCH bpf-next v8 5/8] bpf: lsm: Initialize the BPF LSM hooks
 
KP Singh
 - [PATCH bpf-next v8 6/8] tools/libbpf: Add support for	BPF_PROG_TYPE_LSM
 
KP Singh
 - [PATCH bpf-next v8 7/8] bpf: lsm: Add selftests for BPF_PROG_TYPE_LSM
 
KP Singh
 - [PATCH bpf-next v8 8/8] bpf: lsm: Add Documentation
 
KP Singh
 - [PATCH bpf-next v8 4/8] bpf: lsm: Implement attach, detach and	execution
 
James Morris
 - [PATCH bpf-next v8 0/8] MAC and Audit policy using eBPF (KRSI)
 
Daniel Borkmann
 - [PATCH bpf-next v8 0/8] MAC and Audit policy using eBPF (KRSI)
 
KP Singh
 - [PATCH v10 8/9] proc: use human-readable values for hidehid
 
Kees Cook
 - [PATCH v10 4/9] proc: instantiate only pids that we can ptrace	on 'hidepid=4' mount option
 
Kees Cook
 - [PATCH v10 7/9] proc: move hidepid values to uapi as they are	user interface to mount
 
Kees Cook
 - [PATCH v10 8/9] proc: use human-readable values for hidehid
 
Alexey Gladkov
 - [PATCH v10 4/9] proc: instantiate only pids that we can ptrace	on 'hidepid=4' mount option
 
Alexey Gladkov
 - [PATCH v10 7/9] proc: move hidepid values to uapi as they are	user interface to mount
 
Alexey Gladkov
 - [PATCH bpf-next v8 0/8] MAC and Audit policy using eBPF (KRSI)
 
Kees Cook
 - [PATCH v10 8/9] proc: use human-readable values for hidehid
 
Kees Cook
 - [PATCH v10 7/9] proc: move hidepid values to uapi as they are	user interface to mount
 
Kees Cook
 - [PATCH bpf-next v8 0/8] MAC and Audit policy using eBPF (KRSI)
 
KP Singh
 - [PATCH v10 8/9] proc: use human-readable values for hidehid
 
Alexey Gladkov
 - [PATCH v10 7/9] proc: move hidepid values to uapi as they are	user interface to mount
 
Alexey Gladkov
 - [PATCH bpf-next v8 0/8] MAC and Audit policy using eBPF (KRSI)
 
KP Singh
 - [PATCH bpf-next v8 0/8] MAC and Audit policy using eBPF (KRSI)
 
Daniel Borkmann
 - [PATCH bpf-next v9 0/8] MAC and Audit policy using eBPF (KRSI)
 
KP Singh
 - [PATCH bpf-next v9 1/8] bpf: Introduce BPF_PROG_TYPE_LSM
 
KP Singh
 - [PATCH bpf-next v9 2/8] security: Refactor declaration of LSM hooks
 
KP Singh
 - [PATCH bpf-next v9 3/8] bpf: lsm: provide attachment points for BPF	LSM programs
 
KP Singh
 - [PATCH bpf-next v9 4/8] bpf: lsm: Implement attach,	detach and execution
 
KP Singh
 - [PATCH bpf-next v9 5/8] bpf: lsm: Initialize the BPF LSM hooks
 
KP Singh
 - [PATCH bpf-next v9 6/8] tools/libbpf: Add support for	BPF_PROG_TYPE_LSM
 
KP Singh
 - [PATCH bpf-next v9 7/8] bpf: lsm: Add selftests for BPF_PROG_TYPE_LSM
 
KP Singh
 - [PATCH bpf-next v9 8/8] bpf: lsm: Add Documentation
 
KP Singh
 - [PATCH v10 7/9] proc: move hidepid values to uapi as they are	user interface to mount
 
Kees Cook
 - [PATCH] apparmor: fix potential label refcnt leak in aa_change_profile
 
Xiyu Yang
 - [PATCH bpf-next v9 0/8] MAC and Audit policy using eBPF (KRSI)
 
Daniel Borkmann
 - Request for catalog and price list
 
Julian Smith
 - spende von 2.000.000,00 Euro
 
Manuel Franco
 - Reply For More Details.
 
Maryalice Williams
 - [PATCH v11 8/9] proc: use human-readable values for hidehid
 
Alexey Gladkov
 - [GIT PULL] keys: Fix key->sem vs mmap_sem issue when reading key
 
David Howells
 - kernel panic: smack: Failed to initialize cipso DOI.
 
syzbot
 - kernel panic: smack: Failed to initialize cipso DOI.
 
Tetsuo Handa
 - [PATCH v2 0/3] tpm2: Make TPM2 logs accessible for non-UEFI firmware
 
Stefan Berger
 - [PATCH v2 1/3] acpi: Extend TPM2 ACPI table with missing log fields
 
Stefan Berger
 - [PATCH v2 2/3] tpm: Rearrange ACPI log code to easier extend for TPM2	case
 
Stefan Berger
 - [PATCH v2 3/3] tpm: Add support for ACPI logs from TPM2 ACPI table
 
Stefan Berger
 - [RFC PATCH v14 00/10] Landlock LSM
 
Mickaël Salaün
 - [PATCH v15 05/10] fs,landlock: Support filesystem access-control
 
Mickaël Salaün
 - [PATCH v11 8/9] proc: use human-readable values for hidehid
 
Kees Cook
 - [PATCH v2 1/3] acpi: Extend TPM2 ACPI table with missing log	fields
 
Jarkko Sakkinen
 - [PATCH v2 2/3] tpm: Rearrange ACPI log code to easier extend for	TPM2 case
 
Jarkko Sakkinen
 - [PATCH v2 3/3] tpm: Add support for ACPI logs from TPM2 ACPI table
 
Jarkko Sakkinen
 - [PATCH v2 2/3] tpm: Rearrange ACPI log code to easier extend for	TPM2 case
 
Stefan Berger
 - [PATCH v2 1/3] acpi: Extend TPM2 ACPI table with missing log	fields
 
Stefan Berger
 - [GIT PULL] SELinux patches for v5.7
 
Paul Moore
 - [PATCH v2 2/3] tpm: Rearrange ACPI log code to easier extend for	TPM2 case
 
Jarkko Sakkinen
 - [PATCH v2 1/3] acpi: Extend TPM2 ACPI table with missing log	fields
 
Jarkko Sakkinen
 - [PATCH v3] acpi: Extend TPM2 ACPI table with missing log fields
 
Stefan Berger
 - [PATCH v3] tpm: Add support for event log pointer found in TPM2 ACPI	table
 
Stefan Berger
 - [GIT PULL] SELinux patches for v5.7
 
Linus Torvalds
 - [GIT PULL] SELinux patches for v5.7
 
pr-tracker-bot at kernel.org
 - [GIT PULL] Security subsystem updates for 5.7
 
James Morris
 - [GIT PULL] Security subsystem updates for 5.7
 
pr-tracker-bot at kernel.org
    
 
    
      Last message date: 
       Tue Mar 31 23:00:14 UTC 2020
    Archived on: Tue Mar 31 23:00:17 UTC 2020
    
   
     
     
     This archive was generated by
     Pipermail 0.09 (Mailman edition).