November 2020 Archives by author
Starting: Sun Nov 1 14:41:08 UTC 2020
Ending: Mon Nov 30 22:52:04 UTC 2020
Messages: 600
- [PATCH v2 07/39] mount: attach mappings to mounts
Tycho Andersen
- [PATCH v2 07/39] mount: attach mappings to mounts
Tycho Andersen
- [PATCH v2 07/39] mount: attach mappings to mounts
Tycho Andersen
- [PATCH v2 07/39] mount: attach mappings to mounts
Tycho Andersen
- [PATCH] xfrm: redact SA secret with lockdown confidentiality
Antony Antony
- [PATCH ipsec-next v5] xfrm: redact SA secret with lockdown confidentiality
Antony Antony
- [PATCH v22 16/23] LSM: security_secid_to_secctx in netlink netfilter
Pablo Neira Ayuso
- [PATCH v2 00/39] fs: idmapped mounts
Stephen Barber
- [PATCH v3 32/38] fat: handle idmapped mounts
Mauricio Vásquez Bernal
- [PATCH v3 33/38] ext4: support idmapped mounts
Mauricio Vásquez Bernal
- [PATCH] proc: Allow pid_revalidate() during LOOKUP_RCU
Eric W. Biederman
- [PATCH cryptodev] crypto: lib/chacha20poly1305 - allow users to specify 96bit nonce
Ard Biesheuvel
- [PATCH cryptodev] crypto: lib/chacha20poly1305 - allow users to specify 96bit nonce
Ard Biesheuvel
- [PATCH v10 0/3] SELinux support for anonymous inodes and UFFD
Eric Biggers
- [PATCH v10 1/3] Add a new LSM-supporting anonymous inode interface
Eric Biggers
- [PATCH v10 0/3] SELinux support for anonymous inodes and UFFD
Eric Biggers
- [PATCH v10 3/3] Use secure anon inodes for userfaultfd
Eric Biggers
- [PATCH v11 1/4] security: add inode_init_security_anon() LSM hook
Eric Biggers
- [PATCH v11 2/4] fs: add LSM-supporting anon-inode interface
Eric Biggers
- [PATCH v12 1/4] security: add inode_init_security_anon() LSM hook
Eric Biggers
- [PATCH v12 2/4] fs: add LSM-supporting anon-inode interface
Eric Biggers
- [PATCH bpf-next v3 1/3] ima: Implement ima_inode_hash
Daniel Borkmann
- [PATCH 07/34] capability: handle idmapped mounts
Christian Brauner
- [PATCH 06/34] fs: add id translation helpers
Christian Brauner
- [PATCH 05/34] fs: introduce MOUNT_ATTR_IDMAP
Christian Brauner
- [PATCH 01/34] namespace: take lock_mount_hash() directly when changing flags
Christian Brauner
- [PATCH 03/34] fs: add mount_setattr()
Christian Brauner
- [PATCH v2 00/39] fs: idmapped mounts
Christian Brauner
- [PATCH v2 01/39] namespace: take lock_mount_hash() directly when changing flags
Christian Brauner
- [PATCH v2 02/39] mount: make {lock,unlock}_mount_hash() static
Christian Brauner
- [PATCH v2 03/39] namespace: only take read lock in do_reconfigure_mnt()
Christian Brauner
- [PATCH v2 04/39] fs: add mount_setattr()
Christian Brauner
- [PATCH v2 05/39] tests: add mount_setattr() selftests
Christian Brauner
- [PATCH v2 06/39] fs: add id translation helpers
Christian Brauner
- [PATCH v2 07/39] mount: attach mappings to mounts
Christian Brauner
- [PATCH v2 08/39] capability: handle idmapped mounts
Christian Brauner
- [PATCH v2 09/39] namei: add idmapped mount aware permission helpers
Christian Brauner
- [PATCH v2 10/39] inode: add idmapped mount aware init and permission helpers
Christian Brauner
- [PATCH v2 11/39] attr: handle idmapped mounts
Christian Brauner
- [PATCH v2 12/39] acl: handle idmapped mounts
Christian Brauner
- [PATCH v2 13/39] xattr: handle idmapped mounts
Christian Brauner
- [PATCH v2 14/39] commoncap: handle idmapped mounts
Christian Brauner
- [PATCH v2 15/39] stat: handle idmapped mounts
Christian Brauner
- [PATCH v2 16/39] namei: handle idmapped mounts in may_*() helpers
Christian Brauner
- [PATCH v2 17/39] namei: introduce struct renamedata
Christian Brauner
- [PATCH v2 18/39] namei: prepare for idmapped mounts
Christian Brauner
- [PATCH v2 19/39] open: handle idmapped mounts in do_truncate()
Christian Brauner
- [PATCH v2 20/39] open: handle idmapped mounts
Christian Brauner
- [PATCH v2 21/39] af_unix: handle idmapped mounts
Christian Brauner
- [PATCH v2 22/39] utimes: handle idmapped mounts
Christian Brauner
- [PATCH v2 23/39] fcntl: handle idmapped mounts
Christian Brauner
- [PATCH v2 24/39] notify: handle idmapped mounts
Christian Brauner
- [PATCH v2 25/39] init: handle idmapped mounts
Christian Brauner
- [PATCH v2 26/39] ioctl: handle idmapped mounts
Christian Brauner
- [PATCH v2 27/39] would_dump: handle idmapped mounts
Christian Brauner
- [PATCH v2 28/39] exec: handle idmapped mounts
Christian Brauner
- [PATCH v2 30/39] apparmor: handle idmapped mounts
Christian Brauner
- [PATCH v2 31/39] audit: handle idmapped mounts
Christian Brauner
- [PATCH v2 32/39] ima: handle idmapped mounts
Christian Brauner
- [PATCH v2 33/39] fat: handle idmapped mounts
Christian Brauner
- [PATCH v2 34/39] ext4: support idmapped mounts
Christian Brauner
- [PATCH v2 35/39] ecryptfs: do not mount on top of idmapped mounts
Christian Brauner
- [PATCH v2 36/39] overlayfs: do not mount on top of idmapped mounts
Christian Brauner
- [PATCH v2 37/39] fs: introduce MOUNT_ATTR_IDMAP
Christian Brauner
- [PATCH v2 38/39] selftests: add idmapped mounts xattr selftest
Christian Brauner
- [PATCH v2 00/39] fs: idmapped mounts
Christian Brauner
- [PATCH v2 00/39] fs: idmapped mounts
Christian Brauner
- [PATCH v2 00/39] fs: idmapped mounts
Christian Brauner
- [PATCH v2 31/39] audit: handle idmapped mounts
Christian Brauner
- [PATCH v2 14/39] commoncap: handle idmapped mounts
Christian Brauner
- [PATCH v2 07/39] mount: attach mappings to mounts
Christian Brauner
- [PATCH v2 07/39] mount: attach mappings to mounts
Christian Brauner
- [PATCH v2 07/39] mount: attach mappings to mounts
Christian Brauner
- [PATCH v3 00/38] idmapped mounts
Christian Brauner
- [PATCH v3 01/38] namespace: take lock_mount_hash() directly when changing flags
Christian Brauner
- [PATCH v3 02/38] mount: make {lock,unlock}_mount_hash() static
Christian Brauner
- [PATCH v3 03/38] namespace: only take read lock in do_reconfigure_mnt()
Christian Brauner
- [PATCH v3 04/38] fs: add mount_setattr()
Christian Brauner
- [PATCH v3 05/38] tests: add mount_setattr() selftests
Christian Brauner
- [PATCH v3 06/38] fs: add id translation helpers
Christian Brauner
- [PATCH v3 07/38] mount: attach mappings to mounts
Christian Brauner
- [PATCH v3 08/38] capability: handle idmapped mounts
Christian Brauner
- [PATCH v3 09/38] namei: add idmapped mount aware permission helpers
Christian Brauner
- [PATCH v3 10/38] inode: add idmapped mount aware init and permission helpers
Christian Brauner
- [PATCH v3 11/38] attr: handle idmapped mounts
Christian Brauner
- [PATCH v3 12/38] acl: handle idmapped mounts
Christian Brauner
- [PATCH v3 13/38] xattr: handle idmapped mounts
Christian Brauner
- [PATCH v3 14/38] commoncap: handle idmapped mounts
Christian Brauner
- [PATCH v3 15/38] stat: handle idmapped mounts
Christian Brauner
- [PATCH v3 16/38] namei: handle idmapped mounts in may_*() helpers
Christian Brauner
- [PATCH v3 17/38] namei: introduce struct renamedata
Christian Brauner
- [PATCH v3 18/38] namei: prepare for idmapped mounts
Christian Brauner
- [PATCH v3 19/38] open: handle idmapped mounts in do_truncate()
Christian Brauner
- [PATCH v3 20/38] open: handle idmapped mounts
Christian Brauner
- [PATCH v3 21/38] af_unix: handle idmapped mounts
Christian Brauner
- [PATCH v3 22/38] utimes: handle idmapped mounts
Christian Brauner
- [PATCH v3 23/38] fcntl: handle idmapped mounts
Christian Brauner
- [PATCH v3 24/38] notify: handle idmapped mounts
Christian Brauner
- [PATCH v3 25/38] init: handle idmapped mounts
Christian Brauner
- [PATCH v3 26/38] ioctl: handle idmapped mounts
Christian Brauner
- [PATCH v3 27/38] would_dump: handle idmapped mounts
Christian Brauner
- [PATCH v3 28/38] exec: handle idmapped mounts
Christian Brauner
- [PATCH v3 30/38] apparmor: handle idmapped mounts
Christian Brauner
- [PATCH v3 31/38] ima: handle idmapped mounts
Christian Brauner
- [PATCH v3 32/38] fat: handle idmapped mounts
Christian Brauner
- [PATCH v3 33/38] ext4: support idmapped mounts
Christian Brauner
- [PATCH v3 34/38] ecryptfs: do not mount on top of idmapped mounts
Christian Brauner
- [PATCH v3 35/38] overlayfs: do not mount on top of idmapped mounts
Christian Brauner
- [PATCH v3 36/38] fs: introduce MOUNT_ATTR_IDMAP
Christian Brauner
- [PATCH v3 37/38] tests: extend mount_setattr tests
Christian Brauner
- [PATCH] proc: Allow pid_revalidate() during LOOKUP_RCU
Stephen Brennan
- [PATCH v2 0/8] Fork brute force attack mitigation
Kees Cook
- [PATCH v2 39/39] tests: add vfs/idmapped mounts test suite
Kees Cook
- [RFC PATCH] docs: ABI: ABI documentation for procfs attribute files used by multiple LSMs
Jonathan Corbet
- [PATCH v2 00/39] fs: idmapped mounts
Jonathan Corbet
- Corporate and Personal Loan/
Investment Corporate
- Corporate and Personal Loan *
Investment Corporate
- Corporate and Personal Loan::,
Investment Corporate
- Corporate and Personal Loan::,
Investment Corporate
- Corporate and Personal Loan *
Investment Corporate
- Corporate and Personal Loan *
Investment Corporate
- [PATCH 00/34] fs: idmapped mounts
Alban Crequy
- [PATCH] tomoyo: fix clang pointer arithmetic warning
Nick Desaulniers
- [PATCH cryptodev] crypto: lib/chacha20poly1305 - allow users to specify 96bit nonce
Jason A. Donenfeld
- [PATCH cryptodev] crypto: lib/chacha20poly1305 - allow users to specify 96bit nonce
Jason A. Donenfeld
- [PATCH v2 7/8] Documentation: Add documentation for the Brute LSM
Randy Dunlap
- [PATCH v2 7/8] Documentation: Add documentation for the Brute LSM
Randy Dunlap
- Spende
Maria Elisabeth
- [PATCH v3 1/2] security: add fault injection capability
Marco Elver
- [PATCH v8 0/4] Introduce TEE based Trusted Keys support
Sumit Garg
- [PATCH v8 1/4] KEYS: trusted: Add generic trusted keys framework
Sumit Garg
- [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
Sumit Garg
- [PATCH v8 3/4] doc: trusted-encrypted: updates with TEE as a new trust source
Sumit Garg
- [PATCH v8 4/4] MAINTAINERS: Add myself as Trusted Keys co-maintainer
Sumit Garg
- [PATCH v4 3/3,RESEND 2] KEYS: trusted: Reserve TPM for seal and unseal operations
Sumit Garg
- [PATCH v8 0/4] Introduce TEE based Trusted Keys support
Sumit Garg
- [PATCH v10 0/3] SELinux support for anonymous inodes and UFFD
Lokesh Gidra
- [PATCH v10 1/3] Add a new LSM-supporting anonymous inode interface
Lokesh Gidra
- [PATCH v10 2/3] Teach SELinux about anonymous inodes
Lokesh Gidra
- [PATCH v10 3/3] Use secure anon inodes for userfaultfd
Lokesh Gidra
- [PATCH v11 0/4] SELinux support for anonymous inodes and UFFD
Lokesh Gidra
- [PATCH v11 1/4] security: add inode_init_security_anon() LSM hook
Lokesh Gidra
- [PATCH v11 2/4] fs: add LSM-supporting anon-inode interface
Lokesh Gidra
- [PATCH v11 3/4] selinux: teach SELinux about anonymous inodes
Lokesh Gidra
- [PATCH v11 4/4] userfaultfd: use secure anon inodes for userfaultfd
Lokesh Gidra
- [PATCH v12 0/4] SELinux support for anonymous inodes and UFFD
Lokesh Gidra
- [PATCH v12 1/4] security: add inode_init_security_anon() LSM hook
Lokesh Gidra
- [PATCH v12 2/4] fs: add LSM-supporting anon-inode interface
Lokesh Gidra
- [PATCH v12 3/4] selinux: teach SELinux about anonymous inodes
Lokesh Gidra
- [PATCH v12 4/4] userfaultfd: use secure anon inodes for userfaultfd
Lokesh Gidra
- [PATCH v12 3/4] selinux: teach SELinux about anonymous inodes
Lokesh Gidra
- [PATCH v12 3/4] selinux: teach SELinux about anonymous inodes
Lokesh Gidra
- [PATCH v13 0/4] SELinux support for anonymous inodes and UFFD
Lokesh Gidra
- [PATCH v13 1/4] security: add inode_init_security_anon() LSM hook
Lokesh Gidra
- [PATCH v13 2/4] fs: add LSM-supporting anon-inode interface
Lokesh Gidra
- [PATCH v13 3/4] selinux: teach SELinux about anonymous inodes
Lokesh Gidra
- [PATCH v13 4/4] userfaultfd: use secure anon inodes for userfaultfd
Lokesh Gidra
- [PATCH v12 3/4] selinux: teach SELinux about anonymous inodes
Lokesh Gidra
- [PATCH v12 3/4] selinux: teach SELinux about anonymous inodes
Lokesh Gidra
- [PATCH v12 3/4] selinux: teach SELinux about anonymous inodes
Lokesh Gidra
- [RFC PATCH 2/3] gtp: Add LSM hooks to GPRS Tunneling Protocol (GTP)
Richard Haines
- [RFC PATCH 0/1] selinux-testsuite: Add GTP tests
Richard Haines
- [PATCH] vfs: fix fsconfig(2) LSM mount option handling for btrfs
Richard Haines
- [PATCH v2 10/39] inode: add idmapped mount aware init and permission helpers
Serge E. Hallyn
- [PATCH v3 08/38] capability: handle idmapped mounts
Serge E. Hallyn
- [PATCH v3 09/38] namei: add idmapped mount aware permission helpers
Serge E. Hallyn
- [PATCH v3 00/38] idmapped mounts
Serge E. Hallyn
- [PATCH 1/2] tomoyo: Convert get_user_pages*() to pin_user_pages*()
Tetsuo Handa
- [PATCH 1/2] tomoyo: Convert get_user_pages*() to pin_user_pages*()
Tetsuo Handa
- [PATCH 2/2] tomoyo: Fixed typo in documentation
Tetsuo Handa
- [PATCH v3 1/2] security: add fault injection capability
Tetsuo Handa
- general protection fault in tomoyo_socket_sendmsg_permission
Tetsuo Handa
- [PATCH] tomoyo: Avoid potential null pointer access
Tetsuo Handa
- [PATCH] tomoyo: Avoid potential null pointer access
Tetsuo Handa
- [PATCH] tomoyo: Avoid potential null pointer access
Tetsuo Handa
- [PATCH 01/34] namespace: take lock_mount_hash() directly when changing flags
Christoph Hellwig
- [PATCH 03/34] fs: add mount_setattr()
Christoph Hellwig
- [PATCH 05/34] fs: introduce MOUNT_ATTR_IDMAP
Christoph Hellwig
- [PATCH 06/34] fs: add id translation helpers
Christoph Hellwig
- [PATCH 07/34] capability: handle idmapped mounts
Christoph Hellwig
- [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
Christoph Hellwig
- [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
Christoph Hellwig
- [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
Christoph Hellwig
- [PATCH v2 00/39] fs: idmapped mounts
Christoph Hellwig
- [PATCH] ima: Don't modify file descriptor mode on the fly
Christoph Hellwig
- [PATCH v24 01/12] landlock: Add object management
Jann Horn
- [PATCH v24 12/12] landlock: Add user and kernel documentation
Jann Horn
- [PATCH v24 08/12] landlock: Add syscall implementations
Jann Horn
- [PATCH v24 02/12] landlock: Add ruleset and domain management
Jann Horn
- [PATCH v24 07/12] landlock: Support filesystem access-control
Jann Horn
- [PATCH v24 07/12] landlock: Support filesystem access-control
Jann Horn
- [PATCH v24 07/12] landlock: Support filesystem access-control
Jann Horn
- [PATCH 0/9] keys: Miscellaneous fixes
David Howells
- [PATCH 6/9] security: keys: delete repeated words in comments
David Howells
- [PATCH 0/9] keys: Miscellaneous fixes
David Howells
- [PATCH 2/2] tomoyo: Fixed typo in documentation
John Hubbard
- [PATCH 1/2] tomoyo: Convert get_user_pages*() to pin_user_pages*()
John Hubbard
- [PATCH 1/2] tomoyo: Convert get_user_pages*() to pin_user_pages*()
John Hubbard
- [PATCH 1/2] tomoyo: Convert get_user_pages*() to pin_user_pages*()
John Hubbard
- [PATCH 1/2] tomoyo: Convert get_user_pages*() to pin_user_pages*()
John Hubbard
- [PATCH 2/2] tomoyo: Fixed typo in documentation
John Hubbard
- [PATCH 1/2] tomoyo: Convert get_user_pages*() to pin_user_pages*()
Souptick Joarder
- [PATCH 2/2] tomoyo: Fixed typo in documentation
Souptick Joarder
- [PATCH 1/2] tomoyo: Convert get_user_pages*() to pin_user_pages*()
Souptick Joarder
- [PATCH 1/2] tomoyo: Convert get_user_pages*() to pin_user_pages*()
Souptick Joarder
- [PATCH 2/2] tomoyo: Fixed typo in documentation
Souptick Joarder
- [PATCH v22 12/23] LSM: Specify which LSM to display
John Johansen
- [PATCH v22 12/23] LSM: Specify which LSM to display
John Johansen
- Buggy commit tracked to: "Re: [PATCH 2/9] iov_iter: move rw_copy_check_uvector() into lib/iov_iter.c"
'Greg KH'
- [PATCH v22 12/23] LSM: Specify which LSM to display
Greg KH
- [PATCH v22 12/23] LSM: Specify which LSM to display
Greg KH
- Question about security_file_open contract
Martin Kelly
- Question about security_file_open contract
Martin Kelly
- [PATCH 00/13] Introduce seqnum_ops
Shuah Khan
- [PATCH 13/13] security/integrity/ima: converts stats to seqnum_ops
Shuah Khan
- [PATCH 00/13] Introduce seqnum_ops
Shuah Khan
- [PATCH 00/13] Introduce seqnum_ops
Shuah Khan
- general protection fault in tomoyo_socket_sendmsg_permission
Shuah Khan
- [PATCH v2 00/13] Introduce seqnum_ops
Shuah Khan
- [PATCH v2 13/13] security/integrity/ima: converts stats to seqnum_ops
Shuah Khan
- [PATCH] netlabel: fix our progress tracking in netlbl_unlabel_staticlist()
Jakub Kicinski
- [PATCH] netlabel: fix an uninitialized warning in netlbl_unlabel_staticlist()
Jakub Kicinski
- [PATCH ipsec-next v5] xfrm: redact SA secret with lockdown confidentiality
Steffen Klassert
- [PATCH v3 1/2] security: add fault injection capability
Andrey Konovalov
- selinux: how to query if selinux is enabled
Olga Kornievskaia
- [PATCH 1/2] [lsm] introduce a new hook to query LSM for functionality
Olga Kornievskaia
- [PATCH 2/2] NFSv4.2: condition READDIR's mask for security label based on LSM state
Olga Kornievskaia
- [PATCH 2/2] NFSv4.2: condition READDIR's mask for security label based on LSM state
Olga Kornievskaia
- [PATCH 2/2] NFSv4.2: condition READDIR's mask for security label based on LSM state
Olga Kornievskaia
- Buggy commit tracked to: "Re: [PATCH 2/9] iov_iter: move rw_copy_check_uvector() into lib/iov_iter.c"
David Laight
- Buggy commit tracked to: "Re: [PATCH 2/9] iov_iter: move rw_copy_check_uvector() into lib/iov_iter.c"
David Laight
- [PATCH v3 1/3] efi: generalize efi_get_secureboot
Chester Lin
- [PATCH v3 3/3] arm64/ima: add ima_arch support
Chester Lin
- selinux: how to query if selinux is enabled
Paul Moore
- [PATCH] netlabel: fix our progress tracking in netlbl_unlabel_staticlist()
Paul Moore
- [PATCH v12 3/4] selinux: teach SELinux about anonymous inodes
Paul Moore
- [PATCH v12 3/4] selinux: teach SELinux about anonymous inodes
Paul Moore
- [PATCH v12 3/4] selinux: teach SELinux about anonymous inodes
Paul Moore
- [PATCH] netlabel: fix an uninitialized warning in netlbl_unlabel_staticlist()
Paul Moore
- [GIT PULL] SELinux fixes for v5.10 (#1)
Paul Moore
- [PATCH] lsm,selinux: pass flowi_common instead of flowi to the LSM hooks
Paul Moore
- [PATCH v2 14/39] commoncap: handle idmapped mounts
Paul Moore
- [PATCH v2 31/39] audit: handle idmapped mounts
Paul Moore
- [PATCH v12 3/4] selinux: teach SELinux about anonymous inodes
Paul Moore
- [PATCH v2 31/39] audit: handle idmapped mounts
Paul Moore
- [PATCH v12 3/4] selinux: teach SELinux about anonymous inodes
Paul Moore
- [PATCH] lsm,selinux: pass flowi_common instead of flowi to the LSM hooks
Paul Moore
- [PATCH v12 3/4] selinux: teach SELinux about anonymous inodes
Paul Moore
- [PATCH] fix namespaced fscaps when !CONFIG_SECURITY
Andrew G. Morgan
- [PATCH 1/2] [lsm] introduce a new hook to query LSM for functionality
James Morris
- [PATCH 2/2] tomoyo: Fixed typo in documentation
James Morris
- [PATCH v3 0/2] security: add fault injection to LSM hooks
James Morris
- [PATCH v23 00/12] Landlock LSM
James Morris
- [PATCH v22 05/23] LSM: Use lsmblob in security_secctx_to_secid
James Morris
- [PATCH v22 06/23] LSM: Use lsmblob in security_secid_to_secctx
James Morris
- [PATCH v22 16/23] LSM: security_secid_to_secctx in netlink netfilter
James Morris
- [PATCH v1 0/9] Landlock fixes
James Morris
- [PATCH] netlabel: fix an uninitialized warning in netlbl_unlabel_staticlist()
James Morris
- [PATCH v24 00/12] Landlock LSM
James Morris
- [PATCH v1 2/9] landlock: Cosmetic fixes for filesystem management
James Morris
- [PATCH v24 02/12] landlock: Add ruleset and domain management
James Morris
- [PATCH] lsm,selinux: pass flowi_common instead of flowi to the LSM hooks
James Morris
- [PATCH] fix namespaced fscaps when !CONFIG_SECURITY
James Morris
- [PATCH] fix namespaced fscaps when !CONFIG_SECURITY
James Morris
- [PATCH] fix namespaced fscaps when !CONFIG_SECURITY
James Morris
- [PATCH v6 8/8] selinux: measure state and hash of the policy using IMA
James Morris
- [PATCH v24 12/12] landlock: Add user and kernel documentation
James Morris
- [PATCH 2/2] NFSv4.2: condition READDIR's mask for security label based on LSM state
Ondrej Mosnacek
- [PATCH 2/2] NFSv4.2: condition READDIR's mask for security label based on LSM state
Ondrej Mosnacek
- [PATCH 2/2] NFSv4.2: condition READDIR's mask for security label based on LSM state
Ondrej Mosnacek
- [PATCH] vfs: fix fsconfig(2) LSM mount option handling for btrfs
Ondrej Mosnacek
- [PATCH 2/2] NFSv4.2: condition READDIR's mask for security label based on LSM state
Trond Myklebust
- [PATCH bpf-next v3 3/3] bpf: Add a selftest for bpf_ima_inode_hash
Andrii Nakryiko
- [PATCH v3 0/2] security: add fault injection to LSM hooks
Aleksandr Nogikh
- [PATCH v3 1/2] security: add fault injection capability
Aleksandr Nogikh
- [PATCH v4 0/2] security: add fault injection to LSM hooks
Aleksandr Nogikh
- [PATCH v4 1/2] security: add fault injection capability
Aleksandr Nogikh
- [PATCH v4 2/2] docs: add fail_lsm_hooks info to fault-injection.rst
Aleksandr Nogikh
- [PATCH v4 0/2] security: add fault injection to LSM hooks
Aleksandr Nogikh
- [PATCH v40 11/24] x86/sgx: Add SGX misc driver interface
Borislav Petkov
- [PATCH v40 11/24] x86/sgx: Add SGX misc driver interface
Borislav Petkov
- [PATCH v40 11/24] x86/sgx: Add SGX misc driver interface
Borislav Petkov
- [PATCH] mm, hugetlb: Avoid double clearing for hugetlb pages
Guilherme G. Piccoli
- [PATCH v4 1/2] security: add fault injection capability
Alexander Potapenko
- [PATCH cryptodev] crypto: lib/chacha20poly1305 - allow users to specify 96bit nonce
Antonio Quartulli
- [PATCH cryptodev] crypto: lib/chacha20poly1305 - allow users to specify 96bit nonce
Antonio Quartulli
- [PATCH cryptodev] crypto: lib/chacha20poly1305 - allow users to specify 96bit nonce
Antonio Quartulli
- [PATCH cryptodev] crypto: lib/chacha20poly1305 - allow users to specify 96bit nonce
Antonio Quartulli
- Please reply to me
Dailborh R.
- [PATCH v5 6/7] IMA: add critical_data to the built-in policy rules
Lakshmi Ramasubramanian
- [PATCH v5 6/7] IMA: add critical_data to the built-in policy rules
Lakshmi Ramasubramanian
- [PATCH v5 6/7] IMA: add critical_data to the built-in policy rules
Lakshmi Ramasubramanian
- [PATCH v6 7/8] IMA: add a built-in policy rule for critical data measurement
Lakshmi Ramasubramanian
- [PATCH v6 8/8] selinux: measure state and hash of the policy using IMA
Lakshmi Ramasubramanian
- [PATCH v4 1/3,RESEND 2] KEYS: trusted: Fix incorrect handling of tpm_get_random()
Jarkko Sakkinen
- [PATCH v4 2/3,RESEND 2] KEYS: trusted: Fix migratable=1 failing
Jarkko Sakkinen
- [PATCH v4 3/3,RESEND 2] KEYS: trusted: Reserve TPM for seal and unseal operations
Jarkko Sakkinen
- [PATCH v4 3/3,RESEND 2] KEYS: trusted: Reserve TPM for seal and unseal operations
Jarkko Sakkinen
- [PATCH v40 11/24] x86/sgx: Add SGX misc driver interface
Jarkko Sakkinen
- [PATCH v40 15/24] x86/sgx: Add SGX_IOC_ENCLAVE_PROVISION
Jarkko Sakkinen
- [PATCH v40 11/24] x86/sgx: Add SGX misc driver interface
Jarkko Sakkinen
- [PATCH v40 11/24] x86/sgx: Add SGX misc driver interface
Jarkko Sakkinen
- [PATCH v8 0/4] Introduce TEE based Trusted Keys support
Jarkko Sakkinen
- [PATCH v40 11/24] x86/sgx: Add SGX misc driver interface
Jarkko Sakkinen
- [PATCH v8 0/4] Introduce TEE based Trusted Keys support
Jarkko Sakkinen
- [PATCH v40 11/24] x86/sgx: Add SGX misc driver interface
Jarkko Sakkinen
- [PATCH v40 11/24] x86/sgx: Add SGX misc driver interface
Jarkko Sakkinen
- [PATCH v41 11/24] x86/sgx: Add SGX misc driver interface
Jarkko Sakkinen
- [PATCH v41 15/24] x86/sgx: Add SGX_IOC_ENCLAVE_PROVISION
Jarkko Sakkinen
- [PATCH 052/141] security: keys: Fix fall-through warnings for Clang
Jarkko Sakkinen
- [PATCH v8 1/4] KEYS: trusted: Add generic trusted keys framework
Jarkko Sakkinen
- [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
Jarkko Sakkinen
- [PATCH v8 4/4] MAINTAINERS: Add myself as Trusted Keys co-maintainer
Jarkko Sakkinen
- [PATCH 0/9] keys: Miscellaneous fixes
Jarkko Sakkinen
- [PATCH v1 0/9] Enable root to update the blacklist keyring
Jarkko Sakkinen
- [tip: x86/sgx] x86/sgx: Add SGX_IOC_ENCLAVE_PROVISION
tip-bot2 for Jarkko Sakkinen
- [PATCH v22 07/12] landlock: Support filesystem access-control
Mickaël Salaün
- [PATCH v23 00/12] Landlock LSM
Mickaël Salaün
- [PATCH v23 01/12] landlock: Add object management
Mickaël Salaün
- [PATCH v23 02/12] landlock: Add ruleset and domain management
Mickaël Salaün
- [PATCH v23 03/12] landlock: Set up the security framework and manage credentials
Mickaël Salaün
- [PATCH v23 04/12] landlock: Add ptrace restrictions
Mickaël Salaün
- [PATCH v23 05/12] LSM: Infrastructure management of the superblock
Mickaël Salaün
- [PATCH v23 06/12] fs,security: Add sb_delete hook
Mickaël Salaün
- [PATCH v23 07/12] landlock: Support filesystem access-control
Mickaël Salaün
- [PATCH v23 08/12] landlock: Add syscall implementations
Mickaël Salaün
- [PATCH v23 09/12] arch: Wire up Landlock syscalls
Mickaël Salaün
- [PATCH v23 10/12] selftests/landlock: Add user space tests
Mickaël Salaün
- [PATCH v23 11/12] samples/landlock: Add a sandbox manager example
Mickaël Salaün
- [PATCH v23 12/12] landlock: Add user and kernel documentation
Mickaël Salaün
- [PATCH v23 00/12] Landlock LSM
Mickaël Salaün
- [PATCH v1 0/9] Landlock fixes
Mickaël Salaün
- [PATCH v1 1/9] landlock: Fix memory allocation error handling
Mickaël Salaün
- [PATCH v1 2/9] landlock: Cosmetic fixes for filesystem management
Mickaël Salaün
- [PATCH v1 3/9] landlock: Enforce deterministic interleaved path rules
Mickaël Salaün
- [PATCH v1 4/9] landlock: Always intersect access rights
Mickaël Salaün
- [PATCH v1 5/9] landlock: Add extra checks when inserting a rule
Mickaël Salaün
- [PATCH v1 6/9] selftests/landlock: Extend layout1.inherit_superset
Mickaël Salaün
- [PATCH v1 7/9] landlock: Clean up get_ruleset_from_fd()
Mickaël Salaün
- [PATCH v1 8/9] landlock: Add help to enable Landlock as a stacked LSM
Mickaël Salaün
- [PATCH v1 9/9] landlock: Extend documentation about limitations
Mickaël Salaün
- [PATCH v24 00/12] Landlock LSM
Mickaël Salaün
- [PATCH v24 01/12] landlock: Add object management
Mickaël Salaün
- [PATCH v24 02/12] landlock: Add ruleset and domain management
Mickaël Salaün
- [PATCH v24 03/12] landlock: Set up the security framework and manage credentials
Mickaël Salaün
- [PATCH v24 04/12] landlock: Add ptrace restrictions
Mickaël Salaün
- [PATCH v24 05/12] LSM: Infrastructure management of the superblock
Mickaël Salaün
- [PATCH v24 06/12] fs,security: Add sb_delete hook
Mickaël Salaün
- [PATCH v24 07/12] landlock: Support filesystem access-control
Mickaël Salaün
- [PATCH v24 08/12] landlock: Add syscall implementations
Mickaël Salaün
- [PATCH v24 09/12] arch: Wire up Landlock syscalls
Mickaël Salaün
- [PATCH v24 10/12] selftests/landlock: Add user space tests
Mickaël Salaün
- [PATCH v24 11/12] samples/landlock: Add a sandbox manager example
Mickaël Salaün
- [PATCH v24 12/12] landlock: Add user and kernel documentation
Mickaël Salaün
- [PATCH v22 01/12] landlock: Add object management
Mickaël Salaün
- [PATCH v1 0/9] Enable root to update the blacklist keyring
Mickaël Salaün
- [PATCH v1 1/9] certs: Fix blacklisted hexadecimal hash string check
Mickaël Salaün
- [PATCH v1 2/9] certs: Make blacklist_vet_description() more strict
Mickaël Salaün
- [PATCH v1 3/9] certs: Factor out the blacklist hash creation
Mickaël Salaün
- [PATCH v1 4/9] certs: Check that builtin blacklist hashes are valid
Mickaël Salaün
- [PATCH v1 5/9] PKCS#7: Fix missing include
Mickaël Salaün
- [PATCH v1 6/9] certs: Fix blacklist flag type confusion
Mickaël Salaün
- [PATCH v1 7/9] certs: Allow root user to append signed hashes to the blacklist keyring
Mickaël Salaün
- [PATCH v1 8/9] certs: Replace K{U, G}IDT_INIT() with GLOBAL_ROOT_{U, G}ID
Mickaël Salaün
- [PATCH v1 9/9] tools/certs: Add print-cert-tbs-hash.sh
Mickaël Salaün
- [PATCH v24 02/12] landlock: Add ruleset and domain management
Mickaël Salaün
- [PATCH v24 07/12] landlock: Support filesystem access-control
Mickaël Salaün
- [PATCH v24 01/12] landlock: Add object management
Mickaël Salaün
- [PATCH v24 07/12] landlock: Support filesystem access-control
Mickaël Salaün
- [PATCH v1 0/9] Enable root to update the blacklist keyring
Mickaël Salaün
- [PATCH v3 00/11] evm: Improve usability of portable signatures
Roberto Sassu
- [PATCH v3 01/11] evm: Execute evm_inode_init_security() only when an HMAC key is loaded
Roberto Sassu
- [PATCH v3 02/11] evm: Load EVM key in ima_load_x509() to avoid appraisal
Roberto Sassu
- [PATCH v3 03/11] evm: Refuse EVM_ALLOW_METADATA_WRITES only if an HMAC key is loaded
Roberto Sassu
- [PATCH v3 04/11] ima: Move ima_reset_appraise_flags() call to post hooks
Roberto Sassu
- [PATCH v3 05/11] evm: Introduce evm_status_revalidate()
Roberto Sassu
- [PATCH v3 06/11] evm: Ignore INTEGRITY_NOLABEL if no HMAC key is loaded
Roberto Sassu
- [PATCH v3 07/11] evm: Allow xattr/attr operations for portable signatures
Roberto Sassu
- [PATCH v3 08/11] evm: Allow setxattr() and setattr() for unmodified metadata
Roberto Sassu
- [PATCH v3 09/11] ima: Allow imasig requirement to be satisfied by EVM portable signatures
Roberto Sassu
- [PATCH v3 10/11] ima: Introduce template field evmsig and write to field sig as fallback
Roberto Sassu
- [PATCH v3 11/11] ima: Don't remove security.ima if file must not be appraised
Roberto Sassu
- [PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
Roberto Sassu
- [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
Roberto Sassu
- [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
Roberto Sassu
- [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
Roberto Sassu
- [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
Roberto Sassu
- [PATCH] ima: Don't modify file descriptor mode on the fly
Roberto Sassu
- [PATCH v22 00/23] LSM: Module stacking for AppArmor
Casey Schaufler
- [PATCH v22 01/23] LSM: Infrastructure management of the sock security
Casey Schaufler
- [PATCH v22 02/23] LSM: Create and manage the lsmblob data structure.
Casey Schaufler
- [PATCH v22 03/23] LSM: Use lsmblob in security_audit_rule_match
Casey Schaufler
- [PATCH v22 04/23] LSM: Use lsmblob in security_kernel_act_as
Casey Schaufler
- [PATCH v22 05/23] LSM: Use lsmblob in security_secctx_to_secid
Casey Schaufler
- [PATCH v22 06/23] LSM: Use lsmblob in security_secid_to_secctx
Casey Schaufler
- [PATCH v22 07/23] LSM: Use lsmblob in security_ipc_getsecid
Casey Schaufler
- [PATCH v22 08/23] LSM: Use lsmblob in security_task_getsecid
Casey Schaufler
- [PATCH v22 09/23] LSM: Use lsmblob in security_inode_getsecid
Casey Schaufler
- [PATCH v22 10/23] LSM: Use lsmblob in security_cred_getsecid
Casey Schaufler
- [PATCH v22 11/23] IMA: Change internal interfaces to use lsmblobs
Casey Schaufler
- [PATCH v22 12/23] LSM: Specify which LSM to display
Casey Schaufler
- [PATCH v22 13/23] LSM: Ensure the correct LSM context releaser
Casey Schaufler
- [PATCH v22 14/23] LSM: Use lsmcontext in security_secid_to_secctx
Casey Schaufler
- [PATCH v22 00/23] LSM: Module stacking for AppArmor
Casey Schaufler
- [PATCH v22 01/23] LSM: Infrastructure management of the sock security
Casey Schaufler
- [PATCH v22 02/23] LSM: Create and manage the lsmblob data structure.
Casey Schaufler
- [PATCH v22 03/23] LSM: Use lsmblob in security_audit_rule_match
Casey Schaufler
- [PATCH v22 04/23] LSM: Use lsmblob in security_kernel_act_as
Casey Schaufler
- [PATCH v22 05/23] LSM: Use lsmblob in security_secctx_to_secid
Casey Schaufler
- [PATCH v22 06/23] LSM: Use lsmblob in security_secid_to_secctx
Casey Schaufler
- [PATCH v22 07/23] LSM: Use lsmblob in security_ipc_getsecid
Casey Schaufler
- [PATCH v22 08/23] LSM: Use lsmblob in security_task_getsecid
Casey Schaufler
- [PATCH v22 09/23] LSM: Use lsmblob in security_inode_getsecid
Casey Schaufler
- [PATCH v22 10/23] LSM: Use lsmblob in security_cred_getsecid
Casey Schaufler
- [PATCH v22 11/23] IMA: Change internal interfaces to use lsmblobs
Casey Schaufler
- [PATCH v22 12/23] LSM: Specify which LSM to display
Casey Schaufler
- [PATCH v22 13/23] LSM: Ensure the correct LSM context releaser
Casey Schaufler
- [PATCH v22 14/23] LSM: Use lsmcontext in security_secid_to_secctx
Casey Schaufler
- [PATCH v22 15/23] LSM: Use lsmcontext in security_inode_getsecctx
Casey Schaufler
- [PATCH v22 16/23] LSM: security_secid_to_secctx in netlink netfilter
Casey Schaufler
- [PATCH v22 17/23] NET: Store LSM netlabel data in a lsmblob
Casey Schaufler
- [PATCH v22 18/23] LSM: Verify LSM display sanity in binder
Casey Schaufler
- [PATCH v22 19/23] audit: add support for non-syscall auxiliary records
Casey Schaufler
- [PATCH v22 20/23] Audit: Add new record for multiple process LSM attributes
Casey Schaufler
- [PATCH v22 21/23] Audit: Add a new record for multiple object LSM attributes
Casey Schaufler
- [PATCH v22 22/23] LSM: Add /proc attr entry for full LSM context
Casey Schaufler
- [PATCH v22 23/23] AppArmor: Remove the exclusive flag
Casey Schaufler
- [PATCH 1/2] [lsm] introduce a new hook to query LSM for functionality
Casey Schaufler
- [PATCH v22 12/23] LSM: Specify which LSM to display
Casey Schaufler
- [PATCH v22 12/23] LSM: Specify which LSM to display
Casey Schaufler
- [RFC PATCH] docs: ABI: ABI documentation for procfs attribute files used by multiple LSMs
Casey Schaufler
- Smack kernel test suite
Casey Schaufler
- [PATCH] Smack: fix kernel-doc interface on functions
Casey Schaufler
- [PATCH] security/smack: remove unused varible 'rc'
Casey Schaufler
- [PATCH] vfs: fix fsconfig(2) LSM mount option handling for btrfs
Casey Schaufler
- Question about security_file_open contract
Casey Schaufler
- [PATCH v22 00/23] LSM: Module stacking for AppArmor
Casey Schaufler
- [PATCH v23 01/23] LSM: Infrastructure management of the sock security
Casey Schaufler
- [PATCH v23 02/23] LSM: Create and manage the lsmblob data structure.
Casey Schaufler
- [PATCH v23 03/23] LSM: Use lsmblob in security_audit_rule_match
Casey Schaufler
- [PATCH v23 04/23] LSM: Use lsmblob in security_kernel_act_as
Casey Schaufler
- [PATCH v23 05/23] LSM: Use lsmblob in security_secctx_to_secid
Casey Schaufler
- [PATCH v23 06/23] LSM: Use lsmblob in security_secid_to_secctx
Casey Schaufler
- [PATCH v23 07/23] LSM: Use lsmblob in security_ipc_getsecid
Casey Schaufler
- [PATCH v23 08/23] LSM: Use lsmblob in security_task_getsecid
Casey Schaufler
- [PATCH v23 09/23] LSM: Use lsmblob in security_inode_getsecid
Casey Schaufler
- [PATCH v23 10/23] LSM: Use lsmblob in security_cred_getsecid
Casey Schaufler
- [PATCH v23 11/23] IMA: Change internal interfaces to use lsmblobs
Casey Schaufler
- [PATCH v23 12/23] LSM: Specify which LSM to display
Casey Schaufler
- [PATCH v23 13/23] LSM: Ensure the correct LSM context releaser
Casey Schaufler
- [PATCH v23 14/23] LSM: Use lsmcontext in security_secid_to_secctx
Casey Schaufler
- [PATCH v23 15/23] LSM: Use lsmcontext in security_inode_getsecctx
Casey Schaufler
- [PATCH v23 16/23] LSM: security_secid_to_secctx in netlink netfilter
Casey Schaufler
- [PATCH v23 17/23] NET: Store LSM netlabel data in a lsmblob
Casey Schaufler
- [PATCH v23 18/23] LSM: Verify LSM display sanity in binder
Casey Schaufler
- [PATCH v23 19/23] audit: add support for non-syscall auxiliary records
Casey Schaufler
- [PATCH v23 20/23] Audit: Add new record for multiple process LSM attributes
Casey Schaufler
- [PATCH v23 21/23] Audit: Add a new record for multiple object LSM attributes
Casey Schaufler
- [PATCH v23 22/23] LSM: Add /proc attr entry for full LSM context
Casey Schaufler
- [PATCH v23 23/23] AppArmor: Remove the exclusive flag
Casey Schaufler
- [PATCH] security/smack: remove unused varible 'rc'
Alex Shi
- [PATCH] Smack: fix kernel-doc interface on functions
Alex Shi
- [PATCH 010/141] ima: Fix fall-through warnings for Clang
Gustavo A. R. Silva
- [PATCH 052/141] security: keys: Fix fall-through warnings for Clang
Gustavo A. R. Silva
- [PATCH 052/141] security: keys: Fix fall-through warnings for Clang
Gustavo A. R. Silva
- [PATCH bpf-next 1/3] ima: Implement ima_inode_hash
KP Singh
- [PATCH bpf-next 2/3] bpf: Add a BPF helper for getting the IMA hash of an inode
KP Singh
- [PATCH bpf-next 3/3] bpf: Update LSM selftests for bpf_ima_inode_hash
KP Singh
- [PATCH bpf-next 1/3] ima: Implement ima_inode_hash
KP Singh
- [PATCH bpf-next 2/3] bpf: Add a BPF helper for getting the IMA hash of an inode
KP Singh
- [PATCH bpf-next 3/3] bpf: Update LSM selftests for bpf_ima_inode_hash
KP Singh
- [PATCH bpf-next v2 1/3] ima: Implement ima_inode_hash
KP Singh
- [PATCH bpf-next v2 2/3] bpf: Add a BPF helper for getting the IMA hash of an inode
KP Singh
- [PATCH bpf-next v2 3/3] bpf: Update LSM selftests for bpf_ima_inode_hash
KP Singh
- [PATCH bpf-next v2 3/3] bpf: Update LSM selftests for bpf_ima_inode_hash
KP Singh
- [PATCH bpf-next v2 3/3] bpf: Update LSM selftests for bpf_ima_inode_hash
KP Singh
- [PATCH bpf-next v2 3/3] bpf: Update LSM selftests for bpf_ima_inode_hash
KP Singh
- [PATCH bpf-next 2/3] bpf: Add a BPF helper for getting the IMA hash of an inode
KP Singh
- [PATCH bpf-next 2/3] bpf: Add a BPF helper for getting the IMA hash of an inode
KP Singh
- [PATCH bpf-next v3 0/3] Implement bpf_ima_inode_hash
KP Singh
- [PATCH bpf-next v3 1/3] ima: Implement ima_inode_hash
KP Singh
- [PATCH bpf-next v3 2/3] bpf: Add a BPF helper for getting the IMA hash of an inode
KP Singh
- [PATCH bpf-next v3 3/3] bpf: Add a selftest for bpf_ima_inode_hash
KP Singh
- [PATCH bpf-next v3 3/3] bpf: Add a selftest for bpf_ima_inode_hash
KP Singh
- [PATCH bpf-next v3 1/3] ima: Implement ima_inode_hash
KP Singh
- [PATCH bpf-next v3 3/3] bpf: Add a selftest for bpf_ima_inode_hash
KP Singh
- [PATCH bpf-next v3 3/3] bpf: Add a selftest for bpf_ima_inode_hash
KP Singh
- [PATCH bpf-next 1/3] ima: Implement ima_inode_hash
Yonghong Song
- [PATCH bpf-next 2/3] bpf: Add a BPF helper for getting the IMA hash of an inode
Yonghong Song
- [PATCH bpf-next 3/3] bpf: Update LSM selftests for bpf_ima_inode_hash
Yonghong Song
- [PATCH bpf-next v2 1/3] ima: Implement ima_inode_hash
Yonghong Song
- [PATCH bpf-next v2 2/3] bpf: Add a BPF helper for getting the IMA hash of an inode
Yonghong Song
- [PATCH bpf-next v2 3/3] bpf: Update LSM selftests for bpf_ima_inode_hash
Yonghong Song
- [PATCH bpf-next v2 3/3] bpf: Update LSM selftests for bpf_ima_inode_hash
Yonghong Song
- [PATCH bpf-next v2 3/3] bpf: Update LSM selftests for bpf_ima_inode_hash
Yonghong Song
- [PATCH bpf-next v3 1/3] ima: Implement ima_inode_hash
Yonghong Song
- [PATCH bpf-next v3 2/3] bpf: Add a BPF helper for getting the IMA hash of an inode
Yonghong Song
- [PATCH bpf-next v3 3/3] bpf: Add a selftest for bpf_ima_inode_hash
Yonghong Song
- [PATCH bpf-next v3 3/3] bpf: Add a selftest for bpf_ima_inode_hash
Yonghong Song
- [PATCH bpf-next 2/3] bpf: Add a BPF helper for getting the IMA hash of an inode
Alexei Starovoitov
- [PATCH] vfs: fix fsconfig(2) LSM mount option handling for btrfs
David Sterba
- [PATCH 00/13] Introduce seqnum_ops
Alan Stern
- [PATCH v5 0/7] IMA: Infrastructure for measurement of critical kernel data
Tushar Sugandhi
- [PATCH v5 1/7] IMA: generalize keyring specific measurement constructs
Tushar Sugandhi
- [PATCH v5 2/7] IMA: update process_buffer_measurement to measure buffer hash
Tushar Sugandhi
- [PATCH v5 3/7] IMA: add hook to measure critical data
Tushar Sugandhi
- [PATCH v5 4/7] IMA: add policy to measure critical data
Tushar Sugandhi
- [PATCH v5 5/7] IMA: validate supported kernel data sources before measurement
Tushar Sugandhi
- [PATCH v5 6/7] IMA: add critical_data to the built-in policy rules
Tushar Sugandhi
- [PATCH v5 7/7] selinux: measure state and hash of the policy using IMA
Tushar Sugandhi
- [PATCH v5 2/7] IMA: update process_buffer_measurement to measure buffer hash
Tushar Sugandhi
- [PATCH v5 2/7] IMA: update process_buffer_measurement to measure buffer hash
Tushar Sugandhi
- [PATCH v5 3/7] IMA: add hook to measure critical data
Tushar Sugandhi
- [PATCH v5 4/7] IMA: add policy to measure critical data
Tushar Sugandhi
- [PATCH v5 5/7] IMA: validate supported kernel data sources before measurement
Tushar Sugandhi
- [PATCH v5 0/7] IMA: Infrastructure for measurement of critical kernel data
Tushar Sugandhi
- [PATCH v5 2/7] IMA: update process_buffer_measurement to measure buffer hash
Tushar Sugandhi
- [PATCH v5 3/7] IMA: add hook to measure critical data
Tushar Sugandhi
- [PATCH v6 0/8] IMA: support for measuring kernel integrity critical data
Tushar Sugandhi
- [PATCH v6 1/8] IMA: generalize keyring specific measurement constructs
Tushar Sugandhi
- [PATCH v6 2/8] IMA: add support to measure buffer data hash
Tushar Sugandhi
- [PATCH v6 3/8] IMA: define a hook to measure kernel integrity critical data
Tushar Sugandhi
- [PATCH v6 4/8] IMA: add policy rule to measure critical data
Tushar Sugandhi
- [PATCH v6 5/8] IMA: extend policy to add data sources as a critical data measurement constraint
Tushar Sugandhi
- [PATCH v6 6/8] IMA: add support to critical data hook to limit data sources for measurement
Tushar Sugandhi
- [PATCH v6 7/8] IMA: add a built-in policy rule for critical data measurement
Tushar Sugandhi
- [PATCH v6 8/8] selinux: measure state and hash of the policy using IMA
Tushar Sugandhi
- [PATCH v6 0/8] IMA: support for measuring kernel integrity critical data
Tushar Sugandhi
- [PATCH v6 8/8] selinux: measure state and hash of the policy using IMA
Tushar Sugandhi
- [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
Linus Torvalds
- [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
Linus Torvalds
- [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
Linus Torvalds
- [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
Linus Torvalds
- [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
Linus Torvalds
- [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
Theodore Y. Ts'o
- [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
Al Viro
- [PATCH net-next 0/3] mptcp: reject invalid mp_join requests right away
Florian Westphal
- [PATCH net-next 1/3] security: add const qualifier to struct sock in various places
Florian Westphal
- [PATCH net-next 2/3] tcp: merge 'init_req' and 'route_req' functions
Florian Westphal
- [PATCH net-next 3/3] mptcp: emit tcp reset when a join request fails
Florian Westphal
- [PATCH 00/13] Introduce seqnum_ops
Matthew Wilcox
- [PATCH 00/13] Introduce seqnum_ops
Matthew Wilcox
- [PATCH v2 00/39] fs: idmapped mounts
Darrick J. Wong
- [PATCH v2 0/8] Fork brute force attack mitigation
John Wood
- [PATCH v2 7/8] Documentation: Add documentation for the Brute LSM
John Wood
- [PATCH v2 0/8] Fork brute force attack mitigation
John Wood
- [PATCH] tomoyo: Avoid potential null pointer access
Zheng Zengkai
- [PATCH] tomoyo: Avoid potential null pointer access
Zheng Zengkai
- [PATCH] tomoyo: Fix null pointer check
Zheng Zengkai
- [PATCH] tomoyo: Avoid potential null pointer access
Zheng Zengkai
- Hello !!
Adelina Zeuki
- [PATCH v3 3/3] arm64/ima: add ima_arch support
Mimi Zohar
- [PATCH v5 0/7] IMA: Infrastructure for measurement of critical kernel data
Mimi Zohar
- [PATCH v5 2/7] IMA: update process_buffer_measurement to measure buffer hash
Mimi Zohar
- [PATCH v5 2/7] IMA: update process_buffer_measurement to measure buffer hash
Mimi Zohar
- [PATCH v5 3/7] IMA: add hook to measure critical data
Mimi Zohar
- [PATCH v5 4/7] IMA: add policy to measure critical data
Mimi Zohar
- [PATCH v5 5/7] IMA: validate supported kernel data sources before measurement
Mimi Zohar
- [PATCH v5 6/7] IMA: add critical_data to the built-in policy rules
Mimi Zohar
- [PATCH v5 7/7] selinux: measure state and hash of the policy using IMA
Mimi Zohar
- [PATCH v5 6/7] IMA: add critical_data to the built-in policy rules
Mimi Zohar
- [PATCH v5 2/7] IMA: update process_buffer_measurement to measure buffer hash
Mimi Zohar
- [PATCH v5 3/7] IMA: add hook to measure critical data
Mimi Zohar
- [PATCH v5 5/7] IMA: validate supported kernel data sources before measurement
Mimi Zohar
- [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
Mimi Zohar
- [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
Mimi Zohar
- [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
Mimi Zohar
- [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
Mimi Zohar
- [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
Mimi Zohar
- [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
Mimi Zohar
- [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
Mimi Zohar
- [PATCH v6 7/8] IMA: add a built-in policy rule for critical data measurement
Mimi Zohar
- [PATCH v6 8/8] selinux: measure state and hash of the policy using IMA
Mimi Zohar
- [PATCH bpf-next v2 3/3] bpf: Update LSM selftests for bpf_ima_inode_hash
Mimi Zohar
- [PATCH v6 0/8] IMA: support for measuring kernel integrity critical data
Mimi Zohar
- [PATCH bpf-next v2 3/3] bpf: Update LSM selftests for bpf_ima_inode_hash
Mimi Zohar
- [PATCH v6 0/8] IMA: support for measuring kernel integrity critical data
Mimi Zohar
- [PATCH bpf-next v3 3/3] bpf: Add a selftest for bpf_ima_inode_hash
Mimi Zohar
- [PATCH bpf-next v3 3/3] bpf: Add a selftest for bpf_ima_inode_hash
Mimi Zohar
- [PATCH bpf-next v3 3/3] bpf: Add a selftest for bpf_ima_inode_hash
Mimi Zohar
- [PATCH bpf-next v3 1/3] ima: Implement ima_inode_hash
Mimi Zohar
- [PATCH AUTOSEL 5.7 03/30] ima: extend boot_aggregate with kernel measurements
Mimi Zohar
- [PATCH] ima: Don't modify file descriptor mode on the fly
Mimi Zohar
- [PATCH bpf-next v3 0/3] Implement bpf_ima_inode_hash
patchwork-bot+netdevbpf at kernel.org
- [GIT PULL] SELinux fixes for v5.10 (#1)
pr-tracker-bot at kernel.org
- [PATCH v22 20/23] Audit: Add new record for multiple process LSM attributes
kernel test robot
- [PATCH 2/2] NFSv4.2: condition READDIR's mask for security label based on LSM state
kernel test robot
- [security:landlock_lsm 8/12] security/landlock/syscall.c:216:13: warning: Uninitialized variable: ruleset
kernel test robot
- [PATCH v22 20/23] Audit: Add new record for multiple process LSM attributes
kernel test robot
- [PATCH v22 20/23] Audit: Add new record for multiple process LSM attributes
kernel test robot
- [PATCH 13/13] security/integrity/ima: converts stats to seqnum_ops
kernel test robot
- [PATCH v2 13/13] security/integrity/ima: converts stats to seqnum_ops
kernel test robot
- [PATCH v22 19/23] audit: add support for non-syscall auxiliary records
kernel test robot
- [PATCH v3 08/11] evm: Allow setxattr() and setattr() for unmodified metadata
kernel test robot
- [PATCH v23 20/23] Audit: Add new record for multiple process LSM attributes
kernel test robot
- [PATCH v23 19/23] audit: add support for non-syscall auxiliary records
kernel test robot
- [PATCH v23 20/23] Audit: Add new record for multiple process LSM attributes
kernel test robot
- [PATCH v23 19/23] audit: add support for non-syscall auxiliary records
kernel test robot
- general protection fault in tomoyo_socket_sendmsg_permission
syzbot
- Rabotu i Rabotnikov ishhite na BIRZhAH FRILANSA
qcsp_educ_ph at yahoo.com.ph
Last message date:
Mon Nov 30 22:52:04 UTC 2020
Archived on: Mon Nov 30 22:54:24 UTC 2020
This archive was generated by
Pipermail 0.09 (Mailman edition).