March 2020 Archives by subject
Starting: Sun Mar 1 19:59:28 UTC 2020
Ending: Tue Mar 31 23:00:14 UTC 2020
Messages: 585
-
Francois Pinault
- [GIT PULL] keys: Fix key->sem vs mmap_sem issue when reading key
David Howells
- [GIT PULL] Security subsystem updates for 5.7
James Morris
- [GIT PULL] Security subsystem updates for 5.7
pr-tracker-bot at kernel.org
- [GIT PULL] SELinux patches for v5.7
Paul Moore
- [GIT PULL] SELinux patches for v5.7
Linus Torvalds
- [GIT PULL] SELinux patches for v5.7
pr-tracker-bot at kernel.org
- [ima] 9165b814d2: BUG:kernel_NULL_pointer_dereference,address
Roberto Sassu
- [Intel-gfx] [PATCH v7 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
Serge Hallyn
- [Intel-gfx] [PATCH v7 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
James Morris
- [Intel-gfx] [PATCH v7 00/12] Introduce CAP_PERFMON to secure system performance monitoring and observability
James Morris
- [PATCH 00/13] VFS: Filesystem information [ver #19]
David Howells
- [PATCH 00/13] VFS: Filesystem information [ver #19]
Miklos Szeredi
- [PATCH 00/13] VFS: Filesystem information [ver #19]
David Howells
- [PATCH 00/13] VFS: Filesystem information [ver #19]
Miklos Szeredi
- [PATCH 00/14] VFS: Filesystem information [ver #18]
David Howells
- [PATCH 00/14] VFS: Filesystem information [ver #18]
Jeff Layton
- [PATCH 00/14] VFS: Filesystem information [ver #18]
Andres Freund
- [PATCH 00/14] VFS: Filesystem information [ver #18]
Miklos Szeredi
- [PATCH 00/14] VFS: Filesystem information [ver #18]
Jeff Layton
- [PATCH 00/14] VFS: Filesystem information [ver #18]
David Howells
- [PATCH 00/14] VFS: Filesystem information [ver #18]
Andres Freund
- [PATCH 00/14] VFS: Filesystem information [ver #18]
Miklos Szeredi
- [PATCH 00/17] pipe: Keyrings, mount and superblock notifications [ver #5]
David Howells
- [PATCH 01/13] fsinfo: Add fsinfo() syscall to query filesystem information [ver #19]
David Howells
- [PATCH 01/14] VFS: Add additional RESOLVE_* flags [ver #18]
David Howells
- [PATCH 01/14] VFS: Add additional RESOLVE_* flags [ver #18]
David Howells
- [PATCH 01/14] VFS: Add additional RESOLVE_* flags [ver #18]
Linus Torvalds
- [PATCH 01/14] VFS: Add additional RESOLVE_* flags [ver #18]
David Howells
- [PATCH 01/14] VFS: Add additional RESOLVE_* flags [ver #18]
Linus Torvalds
- [PATCH 01/14] VFS: Add additional RESOLVE_* flags [ver #18]
Linus Torvalds
- [PATCH 01/14] VFS: Add additional RESOLVE_* flags [ver #18]
David Howells
- [PATCH 01/14] VFS: Add additional RESOLVE_* flags [ver #18]
Linus Torvalds
- [PATCH 01/14] VFS: Add additional RESOLVE_* flags [ver #18]
Al Viro
- [PATCH 01/14] VFS: Add additional RESOLVE_* flags [ver #18]
Al Viro
- [PATCH 01/14] VFS: Add additional RESOLVE_* flags [ver #18]
Jeremy Allison
- [PATCH 01/14] VFS: Add additional RESOLVE_* flags [ver #18]
Jeremy Allison
- [PATCH 01/14] VFS: Add additional RESOLVE_* flags [ver #18]
Al Viro
- [PATCH 01/14] VFS: Add additional RESOLVE_* flags [ver #18]
Jeremy Allison
- [PATCH 01/17] uapi: General notification queue definitions [ver #5]
David Howells
- [PATCH 02/13] fsinfo: Provide a bitmap of supported features [ver #19]
David Howells
- [PATCH 02/14] fsinfo: Add fsinfo() syscall to query filesystem information [ver #18]
David Howells
- [PATCH 02/14] fsinfo: Add fsinfo() syscall to query filesystem information [ver #18]
Christian Brauner
- [PATCH 02/17] security: Add hooks to rule on setting a watch [ver #5]
James Morris
- [PATCH 02/17] security: Add hooks to rule on setting a watch [ver #5]
David Howells
- [PATCH 03/13] fsinfo: Allow retrieval of superblock devname, options and stats [ver #19]
David Howells
- [PATCH 03/14] fsinfo: Provide a bitmap of supported features [ver #18]
David Howells
- [PATCH 03/17] security: Add a hook for the point of notification insertion [ver #5]
David Howells
- [PATCH 03/17] security: Add a hook for the point of notification insertion [ver #5]
James Morris
- [PATCH 04/13] fsinfo: Allow fsinfo() to look up a mount object by ID [ver #19]
David Howells
- [PATCH 04/14] fsinfo: Allow retrieval of superblock devname, options and stats [ver #18]
David Howells
- [PATCH 04/17] pipe: Add O_NOTIFICATION_PIPE [ver #5]
David Howells
- [PATCH 05/13] fsinfo: Add a uniquifier ID to struct mount [ver #19]
David Howells
- [PATCH 05/14] fsinfo: Allow fsinfo() to look up a mount object by ID [ver #18]
David Howells
- [PATCH 05/17] pipe: Add general notification queue support [ver #5]
David Howells
- [PATCH 06/13] fsinfo: Allow mount information to be queried [ver #19]
David Howells
- [PATCH 06/14] fsinfo: Add a uniquifier ID to struct mount [ver #18]
David Howells
- [PATCH 06/17] watch_queue: Add a key/keyring notification facility [ver #5]
David Howells
- [PATCH 06/17] watch_queue: Add a key/keyring notification facility [ver #5]
James Morris
- [PATCH 07/13] fsinfo: Allow mount topology and propagation info to be retrieved [ver #19]
David Howells
- [PATCH 07/14] fsinfo: Allow mount information to be queried [ver #18]
Miklos Szeredi
- [PATCH 07/14] fsinfo: Allow mount information to be queried [ver #18]
David Howells
- [PATCH 07/17] Add sample notification program [ver #5]
David Howells
- [PATCH 08/13] fsinfo: Provide notification overrun handling support [ver #19]
David Howells
- [PATCH 08/14] fsinfo: Allow the mount topology propogation flags to be retrieved [ver #18]
Christian Brauner
- [PATCH 08/14] fsinfo: Allow the mount topology propogation flags to be retrieved [ver #18]
David Howells
- [PATCH 08/17] pipe: Allow buffers to be marked read-whole-or-error for notifications [ver #5]
David Howells
- [PATCH 09/13] fsinfo: sample: Mount listing program [ver #19]
David Howells
- [PATCH 09/14] fsinfo: Provide notification overrun handling support [ver #18]
David Howells
- [PATCH 09/17] pipe: Add notification lossage handling [ver #5]
David Howells
- [PATCH 1/5] ima: Set file->f_mode instead of file->f_flags in ima_calc_file_hash()
Roberto Sassu
- [PATCH 10/13] fsinfo: Add API documentation [ver #19]
David Howells
- [PATCH 10/14] fsinfo: sample: Mount listing program [ver #18]
David Howells
- [PATCH 10/17] selinux: Implement the watch_key security hook [ver #5]
James Morris
- [PATCH 10/17] selinux: Implement the watch_key security hook [ver #5]
David Howells
- [PATCH 11/13] fsinfo: Add support for AFS [ver #19]
David Howells
- [PATCH 11/14] fsinfo: Add API documentation [ver #18]
David Howells
- [PATCH 11/17] smack: Implement the watch_key and post_notification hooks [ver #5]
David Howells
- [PATCH 12/13] fsinfo: Example support for Ext4 [ver #19]
David Howells
- [PATCH 12/14] fsinfo: Add support for AFS [ver #18]
David Howells
- [PATCH 12/17] watch_queue: Add security hooks to rule on setting mount and sb watches [ver #5]
David Howells
- [PATCH 12/17] watch_queue: Add security hooks to rule on setting mount and sb watches [ver #5]
James Morris
- [PATCH 13/13] fsinfo: Example support for NFS [ver #19]
David Howells
- [PATCH 13/14] fsinfo: Example support for Ext4 [ver #18]
David Howells
- [PATCH 13/17] watch_queue: Implement mount topology and attribute change notifications [ver #5]
David Howells
- [PATCH 14/14] fsinfo: Example support for NFS [ver #18]
David Howells
- [PATCH 14/17] watch_queue: sample: Display mount tree change notifications [ver #5]
David Howells
- [PATCH 15/17] watch_queue: Introduce a non-repeating system-unique superblock ID [ver #5]
David Howells
- [PATCH 16/17] watch_queue: Add superblock notifications [ver #5]
David Howells
- [PATCH 17/17] watch_queue: sample: Display superblock notifications [ver #5]
David Howells
- [PATCH 2/5] evm: Check also if *tfm is an error pointer in init_desc()
Roberto Sassu
- [PATCH 3/5] ima: Fix ima digest hash table key calculation
Roberto Sassu
- [PATCH 4/5] ima: Remove redundant policy rule set in add_rules()
Roberto Sassu
- [PATCH 5/5] ima: Remove unused build_ima_appraise variable
Roberto Sassu
- [PATCH AUTOSEL 5.4 36/58] efi: Only print errors about failing to get certs if EFI vars are found
Sasha Levin
- [PATCH AUTOSEL 5.5 41/66] efi: Only print errors about failing to get certs if EFI vars are found
Sasha Levin
- [PATCH bpf-next v2 0/7] Introduce BPF_MODIFY_RET tracing progs
KP Singh
- [PATCH bpf-next v2 1/7] bpf: Refactor trampoline update code
KP Singh
- [PATCH bpf-next v2 1/7] bpf: Refactor trampoline update code
Andrii Nakryiko
- [PATCH bpf-next v2 1/7] bpf: Refactor trampoline update code
KP Singh
- [PATCH bpf-next v2 2/7] bpf: JIT helpers for fmod_ret progs
KP Singh
- [PATCH bpf-next v2 2/7] bpf: JIT helpers for fmod_ret progs
Andrii Nakryiko
- [PATCH bpf-next v2 2/7] bpf: JIT helpers for fmod_ret progs
KP Singh
- [PATCH bpf-next v2 2/7] bpf: JIT helpers for fmod_ret progs
KP Singh
- [PATCH bpf-next v2 3/7] bpf: Introduce BPF_MODIFY_RETURN
KP Singh
- [PATCH bpf-next v2 3/7] bpf: Introduce BPF_MODIFY_RETURN
Andrii Nakryiko
- [PATCH bpf-next v2 3/7] bpf: Introduce BPF_MODIFY_RETURN
KP Singh
- [PATCH bpf-next v2 4/7] bpf: Attachment verification for BPF_MODIFY_RETURN
KP Singh
- [PATCH bpf-next v2 4/7] bpf: Attachment verification for BPF_MODIFY_RETURN
Andrii Nakryiko
- [PATCH bpf-next v2 4/7] bpf: Attachment verification for BPF_MODIFY_RETURN
KP Singh
- [PATCH bpf-next v2 5/7] tools/libbpf: Add support for BPF_MODIFY_RETURN
KP Singh
- [PATCH bpf-next v2 6/7] bpf: Add test ops for BPF_PROG_TYPE_TRACING
Andrii Nakryiko
- [PATCH bpf-next v2 6/7] bpf: Add test ops for BPF_PROG_TYPE_TRACING
KP Singh
- [PATCH bpf-next v2 7/7] bpf: Add selftests for BPF_MODIFY_RETURN
KP Singh
- [PATCH bpf-next v3 0/7] Introduce BPF_MODIFY_RET tracing progs
KP Singh
- [PATCH bpf-next v3 1/7] bpf: Refactor trampoline update code
KP Singh
- [PATCH bpf-next v3 1/7] bpf: Refactor trampoline update code
Daniel Borkmann
- [PATCH bpf-next v3 1/7] bpf: Refactor trampoline update code
KP Singh
- [PATCH bpf-next v3 1/7] bpf: Refactor trampoline update code
Andrii Nakryiko
- [PATCH bpf-next v3 1/7] bpf: Refactor trampoline update code
KP Singh
- [PATCH bpf-next v3 2/7] bpf: JIT helpers for fmod_ret progs
KP Singh
- [PATCH bpf-next v3 3/7] bpf: Introduce BPF_MODIFY_RETURN
KP Singh
- [PATCH bpf-next v3 4/7] bpf: Attachment verification for BPF_MODIFY_RETURN
KP Singh
- [PATCH bpf-next v3 4/7] bpf: Attachment verification for BPF_MODIFY_RETURN
Casey Schaufler
- [PATCH bpf-next v3 5/7] tools/libbpf: Add support for BPF_MODIFY_RETURN
KP Singh
- [PATCH bpf-next v3 6/7] bpf: Add test ops for BPF_PROG_TYPE_TRACING
KP Singh
- [PATCH bpf-next v3 7/7] bpf: Add selftests for BPF_MODIFY_RETURN
KP Singh
- [PATCH bpf-next v4 0/7] Introduce BPF_MODIFY_RET tracing progs
KP Singh
- [PATCH bpf-next v4 0/7] Introduce BPF_MODIFY_RET tracing progs
Alexei Starovoitov
- [PATCH bpf-next v4 0/7] Introduce BPF_MODIFY_RET tracing progs
KP Singh
- [PATCH bpf-next v4 1/7] bpf: Refactor trampoline update code
KP Singh
- [PATCH bpf-next v4 2/7] bpf: JIT helpers for fmod_ret progs
KP Singh
- [PATCH bpf-next v4 3/7] bpf: Introduce BPF_MODIFY_RETURN
KP Singh
- [PATCH bpf-next v4 3/7] bpf: Introduce BPF_MODIFY_RETURN
Stephen Smalley
- [PATCH bpf-next v4 3/7] bpf: Introduce BPF_MODIFY_RETURN
KP Singh
- [PATCH bpf-next v4 3/7] bpf: Introduce BPF_MODIFY_RETURN
Casey Schaufler
- [PATCH bpf-next v4 3/7] bpf: Introduce BPF_MODIFY_RETURN
Stephen Smalley
- [PATCH bpf-next v4 3/7] bpf: Introduce BPF_MODIFY_RETURN
Casey Schaufler
- [PATCH bpf-next v4 3/7] bpf: Introduce BPF_MODIFY_RETURN
Stephen Smalley
- [PATCH bpf-next v4 3/7] bpf: Introduce BPF_MODIFY_RETURN
KP Singh
- [PATCH bpf-next v4 4/7] bpf: Attachment verification for BPF_MODIFY_RETURN
KP Singh
- [PATCH bpf-next v4 4/7] bpf: Attachment verification for BPF_MODIFY_RETURN
Stephen Smalley
- [PATCH bpf-next v4 4/7] bpf: Attachment verification for BPF_MODIFY_RETURN
Alexei Starovoitov
- [PATCH bpf-next v4 5/7] tools/libbpf: Add support for BPF_MODIFY_RETURN
KP Singh
- [PATCH bpf-next v4 6/7] bpf: Add test ops for BPF_PROG_TYPE_TRACING
KP Singh
- [PATCH bpf-next v4 7/7] bpf: Add selftests for BPF_MODIFY_RETURN
KP Singh
- [PATCH bpf-next v5 0/8] MAC and Audit policy using eBPF (KRSI)
KP Singh
- [PATCH bpf-next v5 1/7] bpf: Introduce BPF_PROG_TYPE_LSM
KP Singh
- [PATCH bpf-next v5 1/7] bpf: Introduce BPF_PROG_TYPE_LSM
Yonghong Song
- [PATCH bpf-next v5 2/7] security: Refactor declaration of LSM hooks
Kees Cook
- [PATCH bpf-next v5 2/7] security: Refactor declaration of LSM hooks
Andrii Nakryiko
- [PATCH bpf-next v5 2/7] security: Refactor declaration of LSM hooks
KP Singh
- [PATCH bpf-next v5 2/7] security: Refactor declaration of LSM hooks
KP Singh
- [PATCH bpf-next v5 3/7] bpf: lsm: provide attachment points for BPF LSM programs
Yonghong Song
- [PATCH bpf-next v5 3/7] bpf: lsm: provide attachment points for BPF LSM programs
Kees Cook
- [PATCH bpf-next v5 3/7] bpf: lsm: provide attachment points for BPF LSM programs
Andrii Nakryiko
- [PATCH bpf-next v5 3/7] bpf: lsm: provide attachment points for BPF LSM programs
KP Singh
- [PATCH bpf-next v5 3/7] bpf: lsm: provide attachment points for BPF LSM programs
KP Singh
- [PATCH bpf-next v5 3/7] bpf: lsm: provide attachment points for BPF LSM programs
Andrii Nakryiko
- [PATCH bpf-next v5 3/7] bpf: lsm: provide attachment points for BPF LSM programs
KP Singh
- [PATCH bpf-next v5 3/7] bpf: lsm: provide attachment points for BPF LSM programs
KP Singh
- [PATCH bpf-next v5 4/7] bpf: lsm: Implement attach, detach and execution
KP Singh
- [PATCH bpf-next v5 4/7] bpf: lsm: Implement attach, detach and execution
Andrii Nakryiko
- [PATCH bpf-next v5 4/7] bpf: lsm: Implement attach, detach and execution
Stephen Smalley
- [PATCH bpf-next v5 4/7] bpf: lsm: Implement attach, detach and execution
Stephen Smalley
- [PATCH bpf-next v5 4/7] bpf: lsm: Implement attach, detach and execution
Stephen Smalley
- [PATCH bpf-next v5 4/7] bpf: lsm: Implement attach, detach and execution
Stephen Smalley
- [PATCH bpf-next v5 4/7] bpf: lsm: Implement attach, detach and execution
Yonghong Song
- [PATCH bpf-next v5 4/7] bpf: lsm: Implement attach, detach and execution
KP Singh
- [PATCH bpf-next v5 4/7] bpf: lsm: Implement attach, detach and execution
KP Singh
- [PATCH bpf-next v5 4/7] bpf: lsm: Implement attach, detach and execution
Casey Schaufler
- [PATCH bpf-next v5 4/7] bpf: lsm: Implement attach, detach and execution
Kees Cook
- [PATCH bpf-next v5 4/7] bpf: lsm: Implement attach, detach and execution
KP Singh
- [PATCH bpf-next v5 4/7] bpf: lsm: Implement attach, detach and execution
KP Singh
- [PATCH bpf-next v5 4/7] bpf: lsm: Implement attach, detach and execution
KP Singh
- [PATCH bpf-next v5 4/7] bpf: lsm: Implement attach, detach and execution
Kees Cook
- [PATCH bpf-next v5 4/7] bpf: lsm: Implement attach, detach and execution
Kees Cook
- [PATCH bpf-next v5 4/7] bpf: lsm: Implement attach, detach and execution
KP Singh
- [PATCH bpf-next v5 5/7] bpf: lsm: Initialize the BPF LSM hooks
KP Singh
- [PATCH bpf-next v5 5/7] bpf: lsm: Initialize the BPF LSM hooks
Kees Cook
- [PATCH bpf-next v5 5/7] bpf: lsm: Initialize the BPF LSM hooks
KP Singh
- [PATCH bpf-next v5 5/7] bpf: lsm: Initialize the BPF LSM hooks
Andrii Nakryiko
- [PATCH bpf-next v5 5/7] bpf: lsm: Initialize the BPF LSM hooks
Casey Schaufler
- [PATCH bpf-next v5 5/7] bpf: lsm: Initialize the BPF LSM hooks
Kees Cook
- [PATCH bpf-next v5 5/7] bpf: lsm: Initialize the BPF LSM hooks
Casey Schaufler
- [PATCH bpf-next v5 5/7] bpf: lsm: Initialize the BPF LSM hooks
Kees Cook
- [PATCH bpf-next v5 5/7] bpf: lsm: Initialize the BPF LSM hooks
Casey Schaufler
- [PATCH bpf-next v5 5/7] bpf: lsm: Initialize the BPF LSM hooks
Casey Schaufler
- [PATCH bpf-next v5 5/7] bpf: lsm: Initialize the BPF LSM hooks
KP Singh
- [PATCH bpf-next v5 5/7] bpf: lsm: Initialize the BPF LSM hooks
KP Singh
- [PATCH bpf-next v5 5/7] bpf: lsm: Initialize the BPF LSM hooks
Stephen Smalley
- [PATCH bpf-next v5 5/7] bpf: lsm: Initialize the BPF LSM hooks
KP Singh
- [PATCH bpf-next v5 5/7] bpf: lsm: Initialize the BPF LSM hooks
Stephen Smalley
- [PATCH bpf-next v5 5/7] bpf: lsm: Initialize the BPF LSM hooks
KP Singh
- [PATCH bpf-next v5 5/7] bpf: lsm: Initialize the BPF LSM hooks
Kees Cook
- [PATCH bpf-next v5 5/7] bpf: lsm: Initialize the BPF LSM hooks
KP Singh
- [PATCH bpf-next v5 6/7] tools/libbpf: Add support for BPF_PROG_TYPE_LSM
KP Singh
- [PATCH bpf-next v5 6/7] tools/libbpf: Add support for BPF_PROG_TYPE_LSM
Yonghong Song
- [PATCH bpf-next v5 6/7] tools/libbpf: Add support for BPF_PROG_TYPE_LSM
Andrii Nakryiko
- [PATCH bpf-next v5 6/7] tools/libbpf: Add support for BPF_PROG_TYPE_LSM
KP Singh
- [PATCH bpf-next v5 7/7] bpf: lsm: Add selftests for BPF_PROG_TYPE_LSM
Yonghong Song
- [PATCH bpf-next v5 7/7] bpf: lsm: Add selftests for BPF_PROG_TYPE_LSM
KP Singh
- [PATCH bpf-next v5 7/7] bpf: lsm: Add selftests for BPF_PROG_TYPE_LSM
Andrii Nakryiko
- [PATCH bpf-next v5 7/7] bpf: lsm: Add selftests for BPF_PROG_TYPE_LSM
KP Singh
- [PATCH bpf-next v5 7/7] bpf: lsm: Add selftests for BPF_PROG_TYPE_LSM
KP Singh
- [PATCH bpf-next v6 0/8] MAC and Audit policy using eBPF (KRSI)
KP Singh
- [PATCH bpf-next v6 0/8] MAC and Audit policy using eBPF (KRSI)
Kees Cook
- [PATCH bpf-next v6 0/8] MAC and Audit policy using eBPF (KRSI)
KP Singh
- [PATCH bpf-next v6 1/8] bpf: Introduce BPF_PROG_TYPE_LSM
KP Singh
- [PATCH bpf-next v6 1/8] bpf: Introduce BPF_PROG_TYPE_LSM
Andrii Nakryiko
- [PATCH bpf-next v6 1/8] bpf: Introduce BPF_PROG_TYPE_LSM
KP Singh
- [PATCH bpf-next v6 2/8] security: Refactor declaration of LSM hooks
Casey Schaufler
- [PATCH bpf-next v6 2/8] security: Refactor declaration of LSM hooks
KP Singh
- [PATCH bpf-next v6 2/8] security: Refactor declaration of LSM hooks
KP Singh
- [PATCH bpf-next v6 3/8] bpf: lsm: provide attachment points for BPF LSM programs
Kees Cook
- [PATCH bpf-next v6 3/8] bpf: lsm: provide attachment points for BPF LSM programs
KP Singh
- [PATCH bpf-next v6 3/8] bpf: lsm: provide attachment points for BPF LSM programs
Kees Cook
- [PATCH bpf-next v6 3/8] bpf: lsm: provide attachment points for BPF LSM programs
KP Singh
- [PATCH bpf-next v6 3/8] bpf: lsm: provide attachment points for BPF LSM programs
KP Singh
- [PATCH bpf-next v6 4/8] bpf: lsm: Implement attach, detach and execution
KP Singh
- [PATCH bpf-next v6 4/8] bpf: lsm: Implement attach, detach and execution
Andrii Nakryiko
- [PATCH bpf-next v6 4/8] bpf: lsm: Implement attach, detach and execution
KP Singh
- [PATCH bpf-next v6 5/8] bpf: lsm: Initialize the BPF LSM hooks
KP Singh
- [PATCH bpf-next v6 5/8] bpf: lsm: Initialize the BPF LSM hooks
Kees Cook
- [PATCH bpf-next v6 6/8] tools/libbpf: Add support for BPF_PROG_TYPE_LSM
KP Singh
- [PATCH bpf-next v6 6/8] tools/libbpf: Add support for BPF_PROG_TYPE_LSM
Andrii Nakryiko
- [PATCH bpf-next v6 7/8] bpf: lsm: Add selftests for BPF_PROG_TYPE_LSM
Andrii Nakryiko
- [PATCH bpf-next v6 7/8] bpf: lsm: Add selftests for BPF_PROG_TYPE_LSM
KP Singh
- [PATCH bpf-next v6 7/8] bpf: lsm: Add selftests for BPF_PROG_TYPE_LSM
KP Singh
- [PATCH bpf-next v6 8/8] bpf: lsm: Add Documentation
KP Singh
- [PATCH bpf-next v7 0/8] MAC and Audit policy using eBPF (KRSI)
KP Singh
- [PATCH bpf-next v7 1/8] bpf: Introduce BPF_PROG_TYPE_LSM
KP Singh
- [PATCH bpf-next v7 1/8] bpf: Introduce BPF_PROG_TYPE_LSM
James Morris
- [PATCH bpf-next v7 2/8] security: Refactor declaration of LSM hooks
James Morris
- [PATCH bpf-next v7 2/8] security: Refactor declaration of LSM hooks
KP Singh
- [PATCH bpf-next v7 3/8] bpf: lsm: provide attachment points for BPF LSM programs
James Morris
- [PATCH bpf-next v7 3/8] bpf: lsm: provide attachment points for BPF LSM programs
KP Singh
- [PATCH bpf-next v7 4/8] bpf: lsm: Implement attach, detach and execution
KP Singh
- [PATCH bpf-next v7 4/8] bpf: lsm: Implement attach, detach and execution
Andrii Nakryiko
- [PATCH bpf-next v7 4/8] bpf: lsm: Implement attach, detach and execution
KP Singh
- [PATCH bpf-next v7 4/8] bpf: lsm: Implement attach, detach and execution
James Morris
- [PATCH bpf-next v7 4/8] bpf: lsm: Implement attach, detach and execution
Alexei Starovoitov
- [PATCH bpf-next v7 4/8] bpf: lsm: Implement attach, detach and execution
Stephen Smalley
- [PATCH bpf-next v7 4/8] bpf: lsm: Implement attach, detach and execution
KP Singh
- [PATCH bpf-next v7 4/8] bpf: lsm: Implement attach, detach and execution
Stephen Smalley
- [PATCH bpf-next v7 4/8] bpf: lsm: Implement attach, detach and execution
KP Singh
- [PATCH bpf-next v7 4/8] bpf: lsm: Implement attach, detach and execution
KP Singh
- [PATCH bpf-next v7 4/8] bpf: lsm: Implement attach, detach and execution
Casey Schaufler
- [PATCH bpf-next v7 4/8] bpf: lsm: Implement attach, detach and execution
Kees Cook
- [PATCH bpf-next v7 4/8] bpf: lsm: Implement attach, detach and execution
KP Singh
- [PATCH bpf-next v7 5/8] bpf: lsm: Initialize the BPF LSM hooks
KP Singh
- [PATCH bpf-next v7 5/8] bpf: lsm: Initialize the BPF LSM hooks
James Morris
- [PATCH bpf-next v7 6/8] tools/libbpf: Add support for BPF_PROG_TYPE_LSM
KP Singh
- [PATCH bpf-next v7 6/8] tools/libbpf: Add support for BPF_PROG_TYPE_LSM
James Morris
- [PATCH bpf-next v7 7/8] bpf: lsm: Add selftests for BPF_PROG_TYPE_LSM
Andrii Nakryiko
- [PATCH bpf-next v7 7/8] bpf: lsm: Add selftests for BPF_PROG_TYPE_LSM
KP Singh
- [PATCH bpf-next v7 7/8] bpf: lsm: Add selftests for BPF_PROG_TYPE_LSM
James Morris
- [PATCH bpf-next v7 7/8] bpf: lsm: Add selftests for BPF_PROG_TYPE_LSM
KP Singh
- [PATCH bpf-next v7 8/8] bpf: lsm: Add Documentation
KP Singh
- [PATCH bpf-next v7 8/8] bpf: lsm: Add Documentation
Andrii Nakryiko
- [PATCH bpf-next v7 8/8] bpf: lsm: Add Documentation
KP Singh
- [PATCH bpf-next v7 8/8] bpf: lsm: Add Documentation
Andrii Nakryiko
- [PATCH bpf-next v7 8/8] bpf: lsm: Add Documentation
James Morris
- [PATCH bpf-next v8 0/8] MAC and Audit policy using eBPF (KRSI)
KP Singh
- [PATCH bpf-next v8 0/8] MAC and Audit policy using eBPF (KRSI)
Daniel Borkmann
- [PATCH bpf-next v8 0/8] MAC and Audit policy using eBPF (KRSI)
KP Singh
- [PATCH bpf-next v8 0/8] MAC and Audit policy using eBPF (KRSI)
Kees Cook
- [PATCH bpf-next v8 0/8] MAC and Audit policy using eBPF (KRSI)
KP Singh
- [PATCH bpf-next v8 0/8] MAC and Audit policy using eBPF (KRSI)
KP Singh
- [PATCH bpf-next v8 0/8] MAC and Audit policy using eBPF (KRSI)
Daniel Borkmann
- [PATCH bpf-next v8 1/8] bpf: Introduce BPF_PROG_TYPE_LSM
KP Singh
- [PATCH bpf-next v8 2/8] security: Refactor declaration of LSM hooks
KP Singh
- [PATCH bpf-next v8 3/8] bpf: lsm: provide attachment points for BPF LSM programs
KP Singh
- [PATCH bpf-next v8 4/8] bpf: lsm: Implement attach, detach and execution
KP Singh
- [PATCH bpf-next v8 4/8] bpf: lsm: Implement attach, detach and execution
James Morris
- [PATCH bpf-next v8 5/8] bpf: lsm: Initialize the BPF LSM hooks
KP Singh
- [PATCH bpf-next v8 6/8] tools/libbpf: Add support for BPF_PROG_TYPE_LSM
KP Singh
- [PATCH bpf-next v8 7/8] bpf: lsm: Add selftests for BPF_PROG_TYPE_LSM
KP Singh
- [PATCH bpf-next v8 8/8] bpf: lsm: Add Documentation
KP Singh
- [PATCH bpf-next v9 0/8] MAC and Audit policy using eBPF (KRSI)
KP Singh
- [PATCH bpf-next v9 0/8] MAC and Audit policy using eBPF (KRSI)
Daniel Borkmann
- [PATCH bpf-next v9 1/8] bpf: Introduce BPF_PROG_TYPE_LSM
KP Singh
- [PATCH bpf-next v9 2/8] security: Refactor declaration of LSM hooks
KP Singh
- [PATCH bpf-next v9 3/8] bpf: lsm: provide attachment points for BPF LSM programs
KP Singh
- [PATCH bpf-next v9 4/8] bpf: lsm: Implement attach, detach and execution
KP Singh
- [PATCH bpf-next v9 5/8] bpf: lsm: Initialize the BPF LSM hooks
KP Singh
- [PATCH bpf-next v9 6/8] tools/libbpf: Add support for BPF_PROG_TYPE_LSM
KP Singh
- [PATCH bpf-next v9 7/8] bpf: lsm: Add selftests for BPF_PROG_TYPE_LSM
KP Singh
- [PATCH bpf-next v9 8/8] bpf: lsm: Add Documentation
KP Singh
- [PATCH bpf-next] bpf: Fix bpf_prog_test_run_tracing for !CONFIG_NET
Alexei Starovoitov
- [PATCH bpf-next] bpf: Fix bpf_prog_test_run_tracing for !CONFIG_NET
Randy Dunlap
- [PATCH bpf-next] bpf: Fix bpf_prog_test_run_tracing for !CONFIG_NET
Alexei Starovoitov
- [PATCH bpf-next] bpf: Fix bpf_prog_test_run_tracing for !CONFIG_NET
KP Singh
- [PATCH bpf-next] bpf: Fix bpf_prog_test_run_tracing for !CONFIG_NET
KP Singh
- [PATCH bpf-next] bpf: Remove unnecessary CAP_MAC_ADMIN check
KP Singh
- [PATCH bpf-next] bpf: Remove unnecessary CAP_MAC_ADMIN check
Alexei Starovoitov
- [PATCH RESEND v9 0/8] proc: modernize proc to support multiple private instances
Alexey Gladkov
- [PATCH RESEND v9 1/8] proc: rename struct proc_fs_info to proc_fs_opts
Alexey Gladkov
- [PATCH RESEND v9 2/8] proc: allow to mount many instances of proc in one pid namespace
Alexey Gladkov
- [PATCH RESEND v9 3/8] proc: move hide_pid, pid_gid from pid_namespace to proc_fs_info
Alexey Gladkov
- [PATCH RESEND v9 3/8] proc: move hide_pid, pid_gid from pid_namespace to proc_fs_info
Linus Torvalds
- [PATCH RESEND v9 3/8] proc: move hide_pid, pid_gid from pid_namespace to proc_fs_info
Alexey Dobriyan
- [PATCH RESEND v9 3/8] proc: move hide_pid, pid_gid from pid_namespace to proc_fs_info
Alexey Gladkov
- [PATCH RESEND v9 4/8] proc: instantiate only pids that we can ptrace on 'hidepid=4' mount option
Alexey Gladkov
- [PATCH RESEND v9 5/8] proc: add option to mount only a pids subset
Alexey Gladkov
- [PATCH RESEND v9 6/8] docs: proc: add documentation for "hidepid=4" and "subset=pidfs" options and new mount behavior
Alexey Gladkov
- [PATCH RESEND v9 7/8] proc: move hidepid values to uapi as they are user interface to mount
Alexey Gladkov
- [PATCH RESEND v9 8/8] proc: use human-readable values for hidehid
Alexey Gladkov
- [PATCH v10 0/9] proc: modernize proc to support multiple private instances
Alexey Gladkov
- [PATCH v10 1/9] proc: rename struct proc_fs_info to proc_fs_opts
Alexey Gladkov
- [PATCH v10 2/9] proc: allow to mount many instances of proc in one pid namespace
Alexey Gladkov
- [PATCH v10 3/9] proc: move hide_pid, pid_gid from pid_namespace to proc_fs_info
Alexey Gladkov
- [PATCH v10 4/9] proc: instantiate only pids that we can ptrace on 'hidepid=4' mount option
Kees Cook
- [PATCH v10 4/9] proc: instantiate only pids that we can ptrace on 'hidepid=4' mount option
Alexey Gladkov
- [PATCH v10 4/9] proc: instantiate only pids that we can ptrace on 'hidepid=4' mount option
Alexey Gladkov
- [PATCH v10 5/9] proc: add option to mount only a pids subset
Alexey Gladkov
- [PATCH v10 6/9] docs: proc: add documentation for "hidepid=4" and "subset=pid" options and new mount behavior
Alexey Gladkov
- [PATCH v10 7/9] proc: move hidepid values to uapi as they are user interface to mount
Kees Cook
- [PATCH v10 7/9] proc: move hidepid values to uapi as they are user interface to mount
Alexey Gladkov
- [PATCH v10 7/9] proc: move hidepid values to uapi as they are user interface to mount
Kees Cook
- [PATCH v10 7/9] proc: move hidepid values to uapi as they are user interface to mount
Alexey Gladkov
- [PATCH v10 7/9] proc: move hidepid values to uapi as they are user interface to mount
Kees Cook
- [PATCH v10 7/9] proc: move hidepid values to uapi as they are user interface to mount
Alexey Gladkov
- [PATCH v10 8/9] proc: use human-readable values for hidehid
Alexey Gladkov
- [PATCH v10 8/9] proc: use human-readable values for hidehid
Kees Cook
- [PATCH v10 8/9] proc: use human-readable values for hidehid
Alexey Gladkov
- [PATCH v10 8/9] proc: use human-readable values for hidehid
Kees Cook
- [PATCH v10 8/9] proc: use human-readable values for hidehid
Alexey Gladkov
- [PATCH v10 9/9] proc: use named enums for better readability
Alexey Gladkov
- [PATCH v11 8/9] proc: use human-readable values for hidehid
Alexey Gladkov
- [PATCH v11 8/9] proc: use human-readable values for hidehid
Kees Cook
- [PATCH v15 00/10] Landlock LSM
Mickaël Salaün
- [PATCH v15 01/10] landlock: Add object management
Mickaël Salaün
- [PATCH v15 01/23] LSM: Infrastructure management of the sock security
Paul Moore
- [PATCH v15 02/10] landlock: Add ruleset and domain management
Mickaël Salaün
- [PATCH v15 03/10] landlock: Set up the security framework and manage credentials
Mickaël Salaün
- [PATCH v15 04/10] landlock: Add ptrace restrictions
Mickaël Salaün
- [PATCH v15 04/23] LSM: Use lsmblob in security_kernel_act_as
Paul Moore
- [PATCH v15 05/10] fs,landlock: Support filesystem access-control
Mickaël Salaün
- [PATCH v15 05/10] fs,landlock: Support filesystem access-control
Mickaël Salaün
- [PATCH v15 05/23] net: Prepare UDS for security module stacking
Paul Moore
- [PATCH v15 05/23] net: Prepare UDS for security module stacking
Casey Schaufler
- [PATCH v15 05/23] net: Prepare UDS for security module stacking
Paul Moore
- [PATCH v15 06/10] landlock: Add syscall implementation
Mickaël Salaün
- [PATCH v15 06/23] Use lsmblob in security_secctx_to_secid
Paul Moore
- [PATCH v15 06/23] Use lsmblob in security_secctx_to_secid
Casey Schaufler
- [PATCH v15 07/10] arch: Wire up landlock() syscall
Mickaël Salaün
- [PATCH v15 08/10] selftests/landlock: Add initial tests
Mickaël Salaün
- [PATCH v15 09/10] samples/landlock: Add a sandbox manager example
Mickaël Salaün
- [PATCH v15 09/10] samples/landlock: Add a sandbox manager example
Randy Dunlap
- [PATCH v15 09/10] samples/landlock: Add a sandbox manager example
Mickaël Salaün
- [PATCH v15 10/10] landlock: Add user and kernel documentation
Mickaël Salaün
- [PATCH v15 13/23] LSM: Specify which LSM to display
Paul Moore
- [PATCH v15 17/23] LSM: security_secid_to_secctx in netlink netfilter
Paul Moore
- [PATCH v15 18/23] NET: Store LSM netlabel data in a lsmblob
Paul Moore
- [PATCH v15 18/23] NET: Store LSM netlabel data in a lsmblob
Casey Schaufler
- [PATCH v19 01/14] fsinfo: Add fsinfo() syscall to query filesystem information
Christian Brauner
- [PATCH v19 14/14] arch: wire up fsinfo syscall
Christian Brauner
- [PATCH v1] perf tool: make Perf tool aware of SELinux access control
Alexey Budankov
- [PATCH v1] perf tool: make Perf tool aware of SELinux access control
Arnaldo Carvalho de Melo
- [PATCH v1] perf tool: make Perf tool aware of SELinux access control
Arnaldo Carvalho de Melo
- [PATCH v1] perf tool: make Perf tool aware of SELinux access control
Alexey Budankov
- [PATCH v1] perf tool: make Perf tool aware of SELinux access control
Arnaldo Carvalho de Melo
- [PATCH v1] perf tool: make Perf tool aware of SELinux access control
Alexey Budankov
- [PATCH v2 0/2] KEYS: Read keys to internal buffer & then copy to userspace
Waiman Long
- [PATCH v2 0/3] SELinux support for anonymous inodes and UFFD
Daniel Colascione
- [PATCH v2 0/3] tpm2: Make TPM2 logs accessible for non-UEFI firmware
Stefan Berger
- [PATCH v2 1/2] KEYS: Don't write out to userspace while holding key semaphore
Jarkko Sakkinen
- [PATCH v2 1/2] KEYS: Don't write out to userspace while holding key semaphore
Waiman Long
- [PATCH v2 1/2] KEYS: Don't write out to userspace while holding key semaphore
Jarkko Sakkinen
- [PATCH v2 1/2] KEYS: Don't write out to userspace while holding key semaphore
Waiman Long
- [PATCH v2 1/2] KEYS: Don't write out to userspace while holding key semaphore
Waiman Long
- [PATCH v2 1/3] acpi: Extend TPM2 ACPI table with missing log fields
Jarkko Sakkinen
- [PATCH v2 1/3] acpi: Extend TPM2 ACPI table with missing log fields
Stefan Berger
- [PATCH v2 1/3] acpi: Extend TPM2 ACPI table with missing log fields
Jarkko Sakkinen
- [PATCH v2 1/3] acpi: Extend TPM2 ACPI table with missing log fields
Stefan Berger
- [PATCH v2 1/3] Add a new LSM-supporting anonymous inode interface
Daniel Colascione
- [PATCH v2 1/3] Add a new LSM-supporting anonymous inode interface
Stephen Smalley
- [PATCH v2 2/2] KEYS: Avoid false positive ENOMEM error on key read
Waiman Long
- [PATCH v2 2/2] KEYS: Avoid false positive ENOMEM error on key read
David Howells
- [PATCH v2 2/2] KEYS: Avoid false positive ENOMEM error on key read
Waiman Long
- [PATCH v2 2/2] KEYS: Avoid false positive ENOMEM error on key read
Waiman Long
- [PATCH v2 2/2] KEYS: Avoid false positive ENOMEM error on key read
David Howells
- [PATCH v2 2/2] KEYS: Avoid false positive ENOMEM error on key read
Waiman Long
- [PATCH v2 2/3] Teach SELinux about anonymous inodes
Daniel Colascione
- [PATCH v2 2/3] Teach SELinux about anonymous inodes
Stephen Smalley
- [PATCH v2 2/3] Teach SELinux about anonymous inodes
Stephen Smalley
- [PATCH v2 2/3] Teach SELinux about anonymous inodes
Daniel Colascione
- [PATCH v2 2/3] tpm: Rearrange ACPI log code to easier extend for TPM2 case
Jarkko Sakkinen
- [PATCH v2 2/3] tpm: Rearrange ACPI log code to easier extend for TPM2 case
Stefan Berger
- [PATCH v2 2/3] tpm: Rearrange ACPI log code to easier extend for TPM2 case
Jarkko Sakkinen
- [PATCH v2 2/3] tpm: Rearrange ACPI log code to easier extend for TPM2 case
Stefan Berger
- [PATCH v2 3/3] tpm: Add support for ACPI logs from TPM2 ACPI table
Stefan Berger
- [PATCH v2 3/3] tpm: Add support for ACPI logs from TPM2 ACPI table
Jarkko Sakkinen
- [PATCH v2 3/3] Wire UFFD up to SELinux
Daniel Colascione
- [PATCH v2 3/3] Wire UFFD up to SELinux
Casey Schaufler
- [PATCH v28 11/22] x86/sgx: Linux Enclave Driver
Jarkko Sakkinen
- [PATCH v28 11/22] x86/sgx: Linux Enclave Driver
Sean Christopherson
- [PATCH v28 11/22] x86/sgx: Linux Enclave Driver
Sean Christopherson
- [PATCH v28 11/22] x86/sgx: Linux Enclave Driver
Jarkko Sakkinen
- [PATCH v28 11/22] x86/sgx: Linux Enclave Driver
Jarkko Sakkinen
- [PATCH v28 11/22] x86/sgx: Linux Enclave Driver
Dr. Greg
- [PATCH v28 15/22] x86/sgx: Add provisioning
Jarkko Sakkinen
- [PATCH v3 0/3] KEYS: Read keys to internal buffer & then copy to userspace
Waiman Long
- [PATCH v3 0/3] SELinux support for anonymous inodes and UFFD
Daniel Colascione
- [PATCH v3 00/25] user_namespace: introduce fsid mappings
Serge E. Hallyn
- [PATCH v3 1/3] Add a new LSM-supporting anonymous inode interface
Daniel Colascione
- [PATCH v3 1/3] Add a new LSM-supporting anonymous inode interface
Stephen Smalley
- [PATCH v3 1/3] KEYS: Don't write out to userspace while holding key semaphore
Jarkko Sakkinen
- [PATCH v3 1/3] KEYS: Don't write out to userspace while holding key semaphore
Jarkko Sakkinen
- [PATCH v3 1/3] KEYS: Don't write out to userspace while holding key semaphore
David Howells
- [PATCH v3 1/3] KEYS: Don't write out to userspace while holding key semaphore
David Howells
- [PATCH v3 1/3] KEYS: Don't write out to userspace while holding key semaphore
David Howells
- [PATCH v3 1/3] KEYS: Don't write out to userspace while holding key semaphore
Jarkko Sakkinen
- [PATCH v3 1/3] KEYS: Don't write out to userspace while holding key semaphore
Waiman Long
- [PATCH v3 1/3] KEYS: Don't write out to userspace while holding key semaphore
Waiman Long
- [PATCH v3 1/3] KEYS: Don't write out to userspace while holding key semaphore
Waiman Long
- [PATCH v3 1/3] KEYS: Don't write out to userspace while holding key semaphore
Waiman Long
- [PATCH v3 2/3] KEYS: Avoid false positive ENOMEM error on key read
Waiman Long
- [PATCH v3 2/3] KEYS: Avoid false positive ENOMEM error on key read
Jarkko Sakkinen
- [PATCH v3 2/3] KEYS: Avoid false positive ENOMEM error on key read
Waiman Long
- [PATCH v3 2/3] Teach SELinux about anonymous inodes
Daniel Colascione
- [PATCH v3 2/3] Teach SELinux about anonymous inodes
Stephen Smalley
- [PATCH v3 2/8] ima: Switch to ima_hash_algo for boot aggregate
Mimi Zohar
- [PATCH v3 2/8] ima: Switch to ima_hash_algo for boot aggregate
Roberto Sassu
- [PATCH v3 2/8] ima: Switch to ima_hash_algo for boot aggregate
Mimi Zohar
- [PATCH v3 2/8] ima: Switch to ima_hash_algo for boot aggregate
Roberto Sassu
- [PATCH v3 2/8] ima: Switch to ima_hash_algo for boot aggregate
Mimi Zohar
- [PATCH v3 3/3] KEYS: Use kvmalloc() to better handle large buffer allocation
Eric Biggers
- [PATCH v3 3/3] KEYS: Use kvmalloc() to better handle large buffer allocation
Jarkko Sakkinen
- [PATCH v3 3/3] KEYS: Use kvmalloc() to better handle large buffer allocation
Jarkko Sakkinen
- [PATCH v3 3/3] KEYS: Use kvmalloc() to better handle large buffer allocation
Waiman Long
- [PATCH v3 3/3] KEYS: Use kvmalloc() to better handle large buffer allocation
Waiman Long
- [PATCH v3 3/3] KEYS: Use kvmalloc() to better handle large buffer allocation
Waiman Long
- [PATCH v3 3/3] KEYS: Use kvmalloc() to better handle large buffer allocation
David Howells
- [PATCH v3 3/3] KEYS: Use kvmalloc() to better handle large buffer allocation
Waiman Long
- [PATCH v3 3/3] Wire UFFD up to SELinux
Daniel Colascione
- [PATCH v3 5/8] ima: Switch to dynamically allocated buffer for template digests
Mimi Zohar
- [PATCH v3 7/8] ima: Calculate and extend PCR with digests in ima_template_entry
Mimi Zohar
- [PATCH v3 7/8] ima: Calculate and extend PCR with digests in ima_template_entry
Roberto Sassu
- [PATCH v3 7/8] ima: Calculate and extend PCR with digests in ima_template_entry
Mimi Zohar
- [PATCH v3 7/8] ima: Calculate and extend PCR with digests in ima_template_entry
Roberto Sassu
- [PATCH v3 7/8] ima: Calculate and extend PCR with digests in ima_template_entry
Mimi Zohar
- [PATCH v3] acpi: Extend TPM2 ACPI table with missing log fields
Stefan Berger
- [PATCH v3] tpm: Add support for event log pointer found in TPM2 ACPI table
Stefan Berger
- [PATCH v4 0/3] SELinux support for anonymous inodes and UFFD
Daniel Colascione
- [PATCH v4 0/4] KEYS: Read keys to internal buffer & then copy to userspace
Waiman Long
- [PATCH v4 0/7] ima: support stronger algorithms for attestation
Roberto Sassu
- [PATCH v4 1/3] Add a new LSM-supporting anonymous inode interface
Daniel Colascione
- [PATCH v4 1/3] Add a new LSM-supporting anonymous inode interface
Stephen Smalley
- [PATCH v4 1/4] KEYS: Don't write out to userspace while holding key semaphore
Waiman Long
- [PATCH v4 1/7] ima: Switch to ima_hash_algo for boot aggregate
Roberto Sassu
- [PATCH v4 2/3] Teach SELinux about anonymous inodes
Daniel Colascione
- [PATCH v4 2/3] Teach SELinux about anonymous inodes
Stephen Smalley
- [PATCH v4 2/4] KEYS: Remove __user annotation from rxrpc_read()
Waiman Long
- [PATCH v4 2/4] KEYS: Remove __user annotation from rxrpc_read()
David Howells
- [PATCH v4 2/4] KEYS: Remove __user annotation from rxrpc_read()
Waiman Long
- [PATCH v4 2/7] ima: Evaluate error in init_ima()
Roberto Sassu
- [PATCH v4 2/7] ima: Evaluate error in init_ima()
James Morris
- [PATCH v4 3/3] Wire UFFD up to SELinux
Daniel Colascione
- [PATCH v4 3/4] KEYS: Remove __user annotation from dns_resolver_read()
Waiman Long
- [PATCH v4 3/7] ima: Store template digest directly in ima_template_entry
Roberto Sassu
- [PATCH v4 4/4] KEYS: Avoid false positive ENOMEM error on key read
Waiman Long
- [PATCH v4 4/4] KEYS: Avoid false positive ENOMEM error on key read
David Howells
- [PATCH v4 4/4] KEYS: Avoid false positive ENOMEM error on key read
Waiman Long
- [PATCH v4 4/4] KEYS: Avoid false positive ENOMEM error on key read
David Howells
- [PATCH v4 4/7] ima: Switch to dynamically allocated buffer for template digests
Roberto Sassu
- [PATCH v4 5/7] ima: Allocate and initialize tfm for each PCR bank
Roberto Sassu
- [PATCH v4 6/7] ima: Calculate and extend PCR with digests in ima_template_entry
Roberto Sassu
- [PATCH v4 7/7] ima: Use ima_hash_algo for collision detection in the measurement list
Roberto Sassu
- [PATCH v5 0/2] KEYS: Read keys to internal buffer & then copy to userspace
Waiman Long
- [PATCH v5 1/2] KEYS: Don't write out to userspace while holding key semaphore
David Howells
- [PATCH v5 1/2] KEYS: Don't write out to userspace while holding key semaphore
Waiman Long
- [PATCH v5 1/2] KEYS: Don't write out to userspace while holding key semaphore
Waiman Long
- [PATCH v5 2/2] KEYS: Avoid false positive ENOMEM error on key read
Waiman Long
- [PATCH v5 2/2] KEYS: Avoid false positive ENOMEM error on key read
Jarkko Sakkinen
- [PATCH v5 2/2] KEYS: Avoid false positive ENOMEM error on key read
Waiman Long
- [PATCH v5 2/2] KEYS: Avoid false positive ENOMEM error on key read
Jarkko Sakkinen
- [PATCH v5 2/2] KEYS: Avoid false positive ENOMEM error on key read
Waiman Long
- [PATCH v5 2/2] KEYS: Avoid false positive ENOMEM error on key read
Jarkko Sakkinen
- [PATCH v5 2/2] KEYS: Avoid false positive ENOMEM error on key read
Waiman Long
- [PATCH v5 2/2] KEYS: Avoid false positive ENOMEM error on key read
David Howells
- [PATCH v5 2/2] KEYS: Avoid false positive ENOMEM error on key read
Jarkko Sakkinen
- [PATCH v6 0/2] KEYS: Read keys to internal buffer & then copy to userspace
Waiman Long
- [PATCH v6 1/2] KEYS: Don't write out to userspace while holding key semaphore
Waiman Long
- [PATCH v6 2/2] KEYS: Avoid false positive ENOMEM error on key read
Waiman Long
- [PATCH v6 2/2] KEYS: Avoid false positive ENOMEM error on key read
Jarkko Sakkinen
- [PATCH v6 2/2] KEYS: Avoid false positive ENOMEM error on key read
Jarkko Sakkinen
- [PATCH v6 2/2] KEYS: Avoid false positive ENOMEM error on key read
Waiman Long
- [PATCH v7 0/2] KEYS: Read keys to internal buffer & then copy to userspace
Waiman Long
- [PATCH v7 1/2] KEYS: Don't write out to userspace while holding key semaphore
Waiman Long
- [PATCH v7 2/2] KEYS: Avoid false positive ENOMEM error on key read
Waiman Long
- [PATCH v7 2/2] KEYS: Avoid false positive ENOMEM error on key read
Tetsuo Handa
- [PATCH v7 2/2] KEYS: Avoid false positive ENOMEM error on key read
Waiman Long
- [PATCH v8 0/2] KEYS: Read keys to internal buffer & then copy to userspace
David Miller
- [PATCH v8 0/2] KEYS: Read keys to internal buffer & then copy to userspace
Jarkko Sakkinen
- [PATCH v8 0/2] KEYS: Read keys to internal buffer & then copy to userspace
Waiman Long
- [PATCH v8 0/2] KEYS: Read keys to internal buffer & then copy to userspace
David Howells
- [PATCH v8 1/2] KEYS: Don't write out to userspace while holding key semaphore
Waiman Long
- [PATCH v8 2/2] KEYS: Avoid false positive ENOMEM error on key read
Waiman Long
- [PATCH v9 0/8] proc: modernize proc to support multiple private instances
Alexey Gladkov
- [PATCH v9 1/8] proc: rename struct proc_fs_info to proc_fs_opts
Alexey Gladkov
- [PATCH v9 2/8] proc: allow to mount many instances of proc in one pid namespace
Alexey Gladkov
- [PATCH v9 3/8] proc: move hide_pid, pid_gid from pid_namespace to proc_fs_info
Alexey Gladkov
- [PATCH v9 4/8] proc: instantiate only pids that we can ptrace on 'hidepid=4' mount option
Alexey Gladkov
- [PATCH v9 5/8] proc: add option to mount only a pids subset
Alexey Gladkov
- [PATCH v9 6/8] docs: proc: add documentation for "hidepid=4" and "subset=pidfs" options and new mount behavior
Alexey Gladkov
- [PATCH v9 7/8] proc: move hidepid values to uapi as they are user interface to mount
Alexey Gladkov
- [PATCH v9 8/8] proc: use human-readable values for hidehid
Alexey Gladkov
- [PATCH v9 9/8] proc: use named enums for better readability
Alexey Gladkov
- [PATCH v9 9/8] proc: use named enums for better readability
Kees Cook
- [PATCH] apparmor: fix potential label refcnt leak in aa_change_profile
Xiyu Yang
- [PATCH] KEYS: Don't write out to userspace while holding key semaphore
Eric Biggers
- [PATCH] KEYS: Don't write out to userspace while holding key semaphore
Waiman Long
- [PATCH] KEYS: Don't write out to userspace while holding key semaphore
Jarkko Sakkinen
- [PATCH] KEYS: Don't write out to userspace while holding key semaphore
Waiman Long
- [PATCH] security, keys: Optimize barrier usage for Rmw atomic bitops
Davidlohr Bueso
- [PATCH] security/apparmor/label.c: Clean code by removing redundant instructions
John Johansen
- [PATCH] security/apparmor/label.c: Clean code by removing redundant instructions
mateusznosek0 at gmail.com
- [PATCH] tomoyo: Use scnprintf() for avoiding potential buffer overflow
Tetsuo Handa
- [PATCH] tomoyo: Use scnprintf() for avoiding potential buffer overflow
Takashi Iwai
- [PATCH] tomoyo: Use scnprintf() for avoiding potential buffer overflow
Takashi Iwai
- [PATCHv2] exec: Fix a deadlock in ptrace
Jann Horn
- [PATCHv2] exec: Fix a deadlock in ptrace
Bernd Edlinger
- [PATCHv2] exec: Fix a deadlock in ptrace
Jann Horn
- [PATCHv2] exec: Fix a deadlock in ptrace
christian at brauner.io
- [PATCHv2] exec: Fix a deadlock in ptrace
Jann Horn
- [PATCHv3] exec: Fix a deadlock in ptrace
Bernd Edlinger
- [PATCHv3] exec: Fix a deadlock in ptrace
Bernd Edlinger
- [RFC PATCH 00/17] pipe: Keyrings, mount and superblock notifications [ver #4]
David Howells
- [RFC PATCH 01/17] uapi: General notification queue definitions [ver #4]
David Howells
- [RFC PATCH 02/17] security: Add hooks to rule on setting a watch [ver #4]
David Howells
- [RFC PATCH 03/17] security: Add a hook for the point of notification insertion [ver #4]
David Howells
- [RFC PATCH 04/17] pipe: Add O_NOTIFICATION_PIPE [ver #4]
David Howells
- [RFC PATCH 05/17] pipe: Add general notification queue support [ver #4]
David Howells
- [RFC PATCH 06/17] watch_queue: Add a key/keyring notification facility [ver #4]
David Howells
- [RFC PATCH 07/17] Add sample notification program [ver #4]
David Howells
- [RFC PATCH 08/17] pipe: Allow buffers to be marked read-whole-or-error for notifications [ver #4]
David Howells
- [RFC PATCH 09/17] pipe: Add notification lossage handling [ver #4]
David Howells
- [RFC PATCH 10/17] selinux: Implement the watch_key security hook [ver #4]
David Howells
- [RFC PATCH 11/17] smack: Implement the watch_key and post_notification hooks [ver #4]
David Howells
- [RFC PATCH 12/17] watch_queue: Add security hooks to rule on setting mount and sb watches [ver #4]
David Howells
- [RFC PATCH 13/17] watch_queue: Implement mount topology and attribute change notifications [ver #4]
David Howells
- [RFC PATCH 14/17] watch_queue: sample: Display mount tree change notifications [ver #4]
David Howells
- [RFC PATCH 15/17] watch_queue: Introduce a non-repeating system-unique superblock ID [ver #4]
David Howells
- [RFC PATCH 16/17] watch_queue: Add superblock notifications [ver #4]
David Howells
- [RFC PATCH 17/17] watch_queue: sample: Display superblock notifications [ver #4]
David Howells
- [RFC PATCH v14 00/10] Landlock LSM
Jann Horn
- [RFC PATCH v14 00/10] Landlock LSM
Mickaël Salaün
- [RFC PATCH v14 00/10] Landlock LSM
Jann Horn
- [RFC PATCH v14 00/10] Landlock LSM
Mickaël Salaün
- [RFC PATCH v14 00/10] Landlock LSM
Jann Horn
- [RFC PATCH v14 00/10] Landlock LSM
Mickaël Salaün
- [RFC PATCH v14 00/10] Landlock LSM
Jann Horn
- [RFC PATCH v14 00/10] Landlock LSM
Mickaël Salaün
- [RFC PATCH v14 00/10] Landlock LSM
Jann Horn
- [RFC PATCH v14 00/10] Landlock LSM
Mickaël Salaün
- [RFC PATCH v14 06/10] landlock: Add syscall implementation
Al Viro
- [RFC PATCH v14 06/10] landlock: Add syscall implementation
Mickaël Salaün
- [RFC PATCH v14 10/10] landlock: Add user and kernel documentation
Mickaël Salaün
- [RFC PATCH] security, anon_inodes, kvm: enable security support for anon inodes
Daniel Colascione
- [RFC PATCH] security, anon_inodes, kvm: enable security support for anon inodes
Stephen Smalley
- [RFC PATCH] security, anon_inodes, kvm: enable security support for anon inodes
Daniel Colascione
- [RFC PATCH] security, anon_inodes, kvm: enable security support for anon inodes
Stephen Smalley
- BUSINESS PROPOSAL
postmaster at hokusetubad.sakura.ne.jp
- HAPPY SURVIVAL OF CORONAVIRUS
ECOWAS COMMITEE
- Hello
Peter Wong
- Hello
Peter Wong
- Hello Dear
DR CHALLY NOAH
- KASAN: slab-out-of-bounds Read in vsscanf
syzbot
- KASAN: slab-out-of-bounds Read in vsscanf
Casey Schaufler
- kernel BUG at lib/assoc_array.c:LINE!
David Howells
- kernel BUG at lib/assoc_array.c:LINE!
David Howells
- kernel panic: smack: Failed to initialize cipso DOI.
syzbot
- kernel panic: smack: Failed to initialize cipso DOI.
Tetsuo Handa
- Looking for help testing patch attestation
Konstantin Ryabitsev
- No subject
Juanito S. Galang
- No subject
Cy.Eden
- No subject
David Ibe
- REF
Stephen Li
- Reply For More Details.
Maryalice Williams
- Request for catalog and price list
Julian Smith
- spende von 2.000.000,00 Euro
Manuel Franco
- VERY URGENT
Mr.Sébastien Toni
- You received my last mail,,,,
Omar Ousman
Last message date:
Tue Mar 31 23:00:14 UTC 2020
Archived on: Tue Mar 31 23:00:17 UTC 2020
This archive was generated by
Pipermail 0.09 (Mailman edition).