November 2022 Archives by date
Starting: Tue Nov 1 04:30:23 UTC 2022
Ending: Wed Nov 30 21:23:43 UTC 2022
Messages: 546
- [PATCH] capabilities: fix undefined behavior in bit shift for CAP_TO_MASK
Serge E. Hallyn
- [PATCH] efi: Add iMac Pro 2017 to uefi skip cert quirk
Mimi Zohar
- [PATCH] apparmor: Fix memleak in alloc_ns()
John Johansen
- [PATCH] apparmor: Add __init annotation to aa_{setup/teardown}_dfa_engine()
John Johansen
- [PATCH] efi: Add iMac Pro 2017 to uefi skip cert quirk
Aditya Garg
- [PATCH] efi: Add iMac Pro 2017 to uefi skip cert quirk
Mimi Zohar
- [PATCH 1/1] smack_lsm: remove unnecessary type casting
Casey Schaufler
- [PATCH v5 2/2] ima: Handle -ESTALE returned by ima_filter_rule_match()
Mimi Zohar
- [PATCH] LSM: Better reporting of actual LSMs at boot
Kees Cook
- [PATCH v2] LSM: Better reporting of actual LSMs at boot
Kees Cook
- [PATCH v2] LSM: Better reporting of actual LSMs at boot
Casey Schaufler
- [PATCH v2] LSM: Better reporting of actual LSMs at boot
Kees Cook
- [PATCH v5 2/2] ima: Handle -ESTALE returned by ima_filter_rule_match()
Guozihua (Scott)
- [PATCH] ima: Fix memory leak in __ima_inode_hash()
Roberto Sassu
- [PATCH 01/10] security: Export security_hook_heads
Tetsuo Handa
- [PATCH 02/10] mm: Export copy_to_kernel_nofault()
Tetsuo Handa
- [PATCH 03/10] fs, kernel: Export d_absolute_path()/find_task_by_pid_ns()/find_task_by_vpid()
Tetsuo Handa
- [PATCH 04/10] CaitSith: Add header file.
Tetsuo Handa
- [PATCH 05/10] CaitSith: Add LSM interface management file.
Tetsuo Handa
- [PATCH 07/10] CaitSith: Add permission checking functions.
Tetsuo Handa
- [PATCH 08/10] CaitSith: Add pathname calculation functions.
Tetsuo Handa
- [PATCH 09/10] CaitSith: Add garbage collector functions.
Tetsuo Handa
- [PATCH 10/10] CaitSith: Add Kconfig and Makefile files.
Tetsuo Handa
- [PATCH 6a/10] CaitSith: Add policy management functions.
Tetsuo Handa
- [PATCH 6b/10] CaitSith: Add policy management functions.
Tetsuo Handa
- [PATCH 04/10] CaitSith: Add header file.
Casey Schaufler
- [PATCH 0/2] fs: fix capable() call in simple_xattr_list()
Christian Brauner
- [PATCH 05/10] CaitSith: Add LSM interface management file.
Kees Cook
- [PATCH] ima: Fix memory leak in __ima_inode_hash()
Mimi Zohar
- [PATCH 0/2] fs: fix capable() call in simple_xattr_list()
Serge E. Hallyn
- [PATCH] ima: Fix memory leak in __ima_inode_hash()
Roberto Sassu
- [PATCH 0/2] fs: fix capable() call in simple_xattr_list()
Ondrej Mosnacek
- [PATCH 0/2] fs: fix capable() call in simple_xattr_list()
Christian Brauner
- [PATCH 0/2] fs: fix capable() call in simple_xattr_list()
Ondrej Mosnacek
- [PATCH] capabilities: fix undefined behavior in bit shift for CAP_TO_MASK
Paul Moore
- [PATCH v5 2/2] ima: Handle -ESTALE returned by ima_filter_rule_match()
Mimi Zohar
- [PATCH] capabilities: fix undefined behavior in bit shift for CAP_TO_MASK
Serge E. Hallyn
- [PATCH] samples/landlock: Document best-effort approach for LANDLOCK_ACCESS_FS_REFER
Mickaël Salaün
- [RESEND][RFC][PATCH 2/3] bpf-lsm: Limit values that can be returned by security modules
KP Singh
- [RESEND][RFC][PATCH 1/3] lsm: Clarify documentation of vm_enough_memory hook
KP Singh
- [PATCH v2] fs: don't audit the capability check in simple_xattr_list()
Ondrej Mosnacek
- [PATCH v4] evm: Correct inode_init_security hooks behaviors
Roberto Sassu
- [PATCH v2] fs: don't audit the capability check in simple_xattr_list()
Christian Brauner
- [PATCH v2] LSM: Better reporting of actual LSMs at boot
Mickaël Salaün
- [PATCH v4 00/11] Encrypted Hibernation
Evan Green
- [PATCH v4 04/11] security: keys: trusted: Include TPM2 creation data
Evan Green
- [PATCH v4 05/11] security: keys: trusted: Allow storage of PCR values in creation data
Evan Green
- [PATCH v4 06/11] security: keys: trusted: Verify creation data
Evan Green
- [PATCH] ima: Make a copy of sig and digest in asymmetric_verify()
Roberto Sassu
- [PATCH 0/7] Add CA enforcement keyring restrictions
Coiby Xu
- [PATCH v4] evm: Correct inode_init_security hooks behaviors
Roberto Sassu
- [RESEND][RFC][PATCH 2/3] bpf-lsm: Limit values that can be returned by security modules
Roberto Sassu
- [PATCH v3 1/1] security: Add CONFIG_LSM_AUTO to handle default LSM stack ordering
Mickaël Salaün
- [PATCH v2] samples/landlock: Document best-effort approach for LANDLOCK_ACCESS_FS_REFER
Günther Noack
- [PATCH] samples/landlock: Document best-effort approach for LANDLOCK_ACCESS_FS_REFER
Günther Noack
- [BUG] blacklist: Problem blacklisting hash (-13) during boot
Mickaël Salaün
- [PATCH v3 1/1] security: Add CONFIG_LSM_AUTO to handle default LSM stack ordering
Casey Schaufler
- [GIT PULL] Landlock fix for v6.1 #2
Mickaël Salaün
- [PATCH v4 04/11] security: keys: trusted: Include TPM2 creation data
Kees Cook
- [PATCH v4 05/11] security: keys: trusted: Allow storage of PCR values in creation data
Kees Cook
- [PATCH v4 06/11] security: keys: trusted: Verify creation data
Kees Cook
- [BUG] blacklist: Problem blacklisting hash (-13) during boot
Thomas Weißschuh
- [External] Re: [BUG] blacklist: Problem blacklisting hash (-13) during boot
Mark Pearson
- [PATCH 0/7] Add CA enforcement keyring restrictions
Eric Snowberg
- Closing the BPF map permission loophole
Andrii Nakryiko
- [GIT PULL] Landlock fix for v6.1 #2
pr-tracker-bot at kernel.org
- [RESEND][RFC][PATCH 2/3] bpf-lsm: Limit values that can be returned by security modules
Alexei Starovoitov
- [PATCH 04/10] CaitSith: Add header file.
Serge E. Hallyn
- [GIT PULL] SELinux fixes for v6.1 (#1)
Paul Moore
- [PATCH] lsm: make security_socket_getpeersec_stream() sockptr_t safe
Paul Moore
- [PATCH 04/10] CaitSith: Add header file.
Tetsuo Handa
- [PATCH v2] fs: don't audit the capability check in simple_xattr_list()
Paul Moore
- [GIT PULL] LSM fixes for v6.1 (#1)
Paul Moore
- [PATCH] capabilities: fix undefined behavior in bit shift for CAP_TO_MASK
Paul Moore
- [PATCH] capabilities: fix undefined behavior in bit shift for CAP_TO_MASK
Paul Moore
- [PATCH v4] evm: Correct inode_init_security hooks behaviors
Paul Moore
- [PATCH v2] fs: don't audit the capability check in simple_xattr_list()
Christian Brauner
- Geldspende
Stefano Pessina
- Geldspende
Stefano Pessina
- [PATCH 04/10] CaitSith: Add header file.
Serge E. Hallyn
- [PATCH 03/10] fs,kernel: Export d_absolute_path()/find_task_by_pid_ns()/find_task_by_vpid()
Serge E. Hallyn
- [PATCH 04/10] CaitSith: Add header file.
Tetsuo Handa
- [PATCH 0/4] powerpc/pseries: expose firmware security variables via filesystem
Nayna Jain
- [PATCH 1/4] powerpc/pseries: Add new functions to PLPKS driver
Nayna Jain
- [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
Nayna Jain
- [PATCH 3/4] powerpc/pseries: initialize fwsecurityfs with plpks arch-specific structure
Nayna Jain
- [PATCH 4/4] powerpc/pseries: expose authenticated variables stored in LPAR PKS
Nayna Jain
- [PATCH v2] fs: don't audit the capability check in simple_xattr_list()
Paul Moore
- [PATCH] integrity: iint: Remove unnecessary (void*) conversions
Li zeming
- No subject
Mrs. Monika Everenová
- Closing the BPF map permission loophole
Roberto Sassu
- [PATCH v4] evm: Correct inode_init_security hooks behaviors
Roberto Sassu
- [RESEND][RFC][PATCH 2/3] bpf-lsm: Limit values that can be returned by security modules
Roberto Sassu
- [PATCH v3 1/1] security: Add CONFIG_LSM_AUTO to handle default LSM stack ordering
Mickaël Salaün
- [PATCH] certs: Prevent spurious errors on repeated blacklisting
Mickaël Salaün
- [PATCH] certs: Prevent spurious errors on repeated blacklisting
Thomas Weißschuh
- [RESEND][RFC][PATCH 2/3] bpf-lsm: Limit values that can be returned by security modules
Alexei Starovoitov
- [RESEND][RFC][PATCH 2/3] bpf-lsm: Limit values that can be returned by security modules
Roberto Sassu
- [PATCH] certs: Prevent spurious errors on repeated blacklisting
Mickaël Salaün
- [PATCH] certs: Prevent spurious errors on repeated blacklisting
Thomas Weißschuh
- [PATCH v3 1/1] security: Add CONFIG_LSM_AUTO to handle default LSM stack ordering
Casey Schaufler
- [PATCH v3] samples/landlock: Document best-effort approach for LANDLOCK_ACCESS_FS_REFER
Günther Noack
- [PATCH] device_cgroup: Roll back to original exceptions after copy failure
Aristeu Rozanski
- [PATCH 04/10] CaitSith: Add header file.
Casey Schaufler
- [PATCH 04/10] CaitSith: Add header file.
Paul Moore
- [PATCH v3 1/1] security: Add CONFIG_LSM_AUTO to handle default LSM stack ordering
Mickaël Salaün
- [PATCH] certs: Prevent spurious errors on repeated blacklisting
Mickaël Salaün
- [PATCH v4 04/11] security: keys: trusted: Include TPM2 creation data
Evan Green
- [PATCH v3] samples/landlock: Document best-effort approach for LANDLOCK_ACCESS_FS_REFER
Mickaël Salaün
- [PATCH v1 0/2] Add LSM access controls for io_uring_setup
Gil Cukierman
- [PATCH v1 1/2] lsm,io_uring: add LSM hook for io_uring_setup
Gil Cukierman
- [PATCH v1 0/2] Add LSM access controls for io_uring_setup
Paul Moore
- [GIT PULL] LSM fixes for v6.1 (#2)
Paul Moore
- [PATCH 04/10] CaitSith: Add header file.
Tetsuo Handa
- My Response..
K. A. Mr. Kairi
- Greeting
Mr Abraham
- Greeting
Mr.Abraham
- [GIT PULL] LSM fixes for v6.1 (#2)
pr-tracker-bot at kernel.org
- [PATCH 0/7] Add CA enforcement keyring restrictions
Elaine Palmer
- [PATCH 04/10] CaitSith: Add header file.
Paul Moore
- [PATCH v2 0/3] certs: Prevent spurious errors on repeated blacklisting
Thomas Weißschuh
- [PATCH v2 1/3] certs: log more information on blacklist error
Thomas Weißschuh
- [PATCH v2 2/3] KEYS: Add key_create()
Thomas Weißschuh
- [PATCH v2 3/3] certs: don't try to update blacklist keys
Thomas Weißschuh
- [PATCH] integrity: Free key restriction when keyring allocation fails
GUO Zihua
- [PATCH 04/10] CaitSith: Add header file.
Tetsuo Handa
- [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
Greg Kroah-Hartman
- [PATCH 0/7] Add CA enforcement keyring restrictions
Eric Snowberg
- [GIT PULL] LSM fixes for v6.1 (#1)
Serge E. Hallyn
- [PATCH 04/10] CaitSith: Add header file.
Paul Moore
- [PATCH 0/7] Add CA enforcement keyring restrictions
Elaine Palmer
- [PATCH] certs: Prevent spurious errors on repeated blacklisting
Eric Snowberg
- [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
Nayna
- [GIT PULL] LSM fixes for v6.1 (#1)
Paul Moore
- [GIT PULL] LSM fixes for v6.1 (#1)
Paul Moore
- [PATCH v1 2/8] LSM: Add an LSM identifier for external use
Paul Moore
- [PATCH v1 2/8] LSM: Add an LSM identifier for external use
Paul Moore
- [PATCH v1 3/8] LSM: Identify the process attributes for each module
Paul Moore
- [PATCH v1 4/8] LSM: Maintain a table of LSM attribute data
Paul Moore
- [PATCH v1 6/8] LSM: lsm_self_attr syscall for LSM self attributes
Paul Moore
- [PATCH v1 7/8] LSM: Create lsm_module_list system call
Paul Moore
- [PATCH 04/10] CaitSith: Add header file.
Tetsuo Handa
- [PATCH v8 16/17] integrity: Trust MOK keys if MokListTrustedRT found
Morten Linderud
- [PATCH v4 04/11] security: keys: trusted: Include TPM2 creation data
Evan Green
- [PATCH v1 2/8] LSM: Add an LSM identifier for external use
Casey Schaufler
- [PATCH v8 16/17] integrity: Trust MOK keys if MokListTrustedRT found
Eric Snowberg
- [PATCH v1 2/8] LSM: Add an LSM identifier for external use
Casey Schaufler
- [PATCH v1 3/8] LSM: Identify the process attributes for each module
Casey Schaufler
- [PATCH v1 6/8] LSM: lsm_self_attr syscall for LSM self attributes
Casey Schaufler
- [PATCH v1 7/8] LSM: Create lsm_module_list system call
Casey Schaufler
- [PATCH 04/10] CaitSith: Add header file.
Kees Cook
- [PATCH v1 2/8] LSM: Add an LSM identifier for external use
Paul Moore
- [PATCH v1 3/8] LSM: Identify the process attributes for each module
Paul Moore
- [PATCH v1 6/8] LSM: lsm_self_attr syscall for LSM self attributes
Paul Moore
- [PATCH v1 7/8] LSM: Create lsm_module_list system call
Paul Moore
- [PATCH 04/10] CaitSith: Add header file.
Tetsuo Handa
- [RFC PATCH] lsm, fs: fix vfs_getxattr_alloc() return type and caller error paths
Paul Moore
- [PATCH 04/10] CaitSith: Add header file.
Paul Moore
- [RFC PATCH] lsm,fs: fix vfs_getxattr_alloc() return type and caller error paths
Paul Moore
- [PATCH v8 16/17] integrity: Trust MOK keys if MokListTrustedRT found
Ard Biesheuvel
- Słowa kluczowe do wypozycjonowania
Adam Charachuta
- [PATCH v4 0/5] evm: Prepare for moving to the LSM infrastructure
Roberto Sassu
- [PATCH v4 1/5] reiserfs: Add missing calls to reiserfs_security_free()
Roberto Sassu
- [PATCH v4 2/5] security: Rewrite security_old_inode_init_security()
Roberto Sassu
- [PATCH v4 3/5] security: Allow all LSMs to provide xattrs for inode_init_security hook
Roberto Sassu
- [PATCH v4 4/5] evm: Align evm_inode_init_security() definition with LSM infrastructure
Roberto Sassu
- [PATCH v4 5/5] evm: Support multiple LSMs providing an xattr
Roberto Sassu
- [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
Greg Kroah-Hartman
- [PATCH v5] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing
David Howells
- [PATCH] KEYS: trusted: tee: Make registered shm dependency explicit
Sumit Garg
- [PATCH] KEYS: trusted: tee: Make registered shm dependency explicit
Sumit Garg
- [PATCH v8 16/17] integrity: Trust MOK keys if MokListTrustedRT found
James Bottomley
- [PATCH v8 16/17] integrity: Trust MOK keys if MokListTrustedRT found
Morten Linderud
- [PATCH v8 16/17] integrity: Trust MOK keys if MokListTrustedRT found
Morten Linderud
- [PATCH v8 16/17] integrity: Trust MOK keys if MokListTrustedRT found
James Bottomley
- [PATCH v8 16/17] integrity: Trust MOK keys if MokListTrustedRT found
Ard Biesheuvel
- [PATCH v1 0/2] Add LSM access controls for io_uring_setup
Jeffrey Vander Stoep
- [PATCH v1 0/2] Add LSM access controls for io_uring_setup
Paul Moore
- [PATCH v1 6/8] LSM: lsm_self_attr syscall for LSM self attributes
Paul Moore
- [PATCH v1 6/8] LSM: lsm_self_attr syscall for LSM self attributes
Casey Schaufler
- [PATCH v1 6/8] LSM: lsm_self_attr syscall for LSM self attributes
Paul Moore
- [PATCH] net: fix memory leak in security_sk_alloc()
Wang Yufen
- [PATCH v2] integrity: Fix memory leakage in keyring allocation error path
GUO Zihua
- [PATCH] net: fix memory leak in security_sk_alloc()
wangyufen
- [PATCH] net: fix memory leak in security_sk_alloc()
Paul Moore
- [PATCH] net: fix memory leak in security_sk_alloc()
Eric Dumazet
- [PATCH v5] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing
Paul Moore
- [PATCH v5] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing
Paul Moore
- [PATCH] net: fix memory leak in security_sk_alloc()
Stanislav Fomichev
- [PATCH v5 00/11] Encrypted Hibernation
Evan Green
- [PATCH v5 04/11] security: keys: trusted: Include TPM2 creation data
Evan Green
- [PATCH v5 05/11] security: keys: trusted: Allow storage of PCR values in creation data
Evan Green
- [PATCH v5 06/11] security: keys: trusted: Verify creation data
Evan Green
- [PATCH] ima: Fix misuse of dereference of pointer in template_desc_init_fields()
Xiu Jianfeng
- [RESEND PATCH v2 0/2] watch_queue: Clean up some code
Siddh Raman Pant
- [RESEND PATCH v2 1/2] include/linux/watch_queue: Improve documentation
Siddh Raman Pant
- [RESEND PATCH v2 2/2] kernel/watch_queue: NULL the dangling *pipe, and use it for clear check
Siddh Raman Pant
- [PATCH v5 04/11] security: keys: trusted: Include TPM2 creation data
Eric Biggers
- [PATCH v5 05/11] security: keys: trusted: Allow storage of PCR values in creation data
Eric Biggers
- [PATCH v5 06/11] security: keys: trusted: Verify creation data
Eric Biggers
- [syzbot] BUG: unable to handle kernel NULL pointer dereference in smack_inode_permission
syzbot
- [PATCH v5 2/2] ima: Handle -ESTALE returned by ima_filter_rule_match()
Guozihua (Scott)
- [PATCH v5 04/11] security: keys: trusted: Include TPM2 creation data
James Bottomley
- [PATCH bpf] selftests/bpf: fix memory leak of lsm_cgroup
Wang Yufen
- [PATCH] ima: Fix misuse of dereference of pointer in template_desc_init_fields()
Roberto Sassu
- [RFC PATCH] getting misc stats/attributes via xattr API
Abel Wu
- [PATCH] [RFC] SELINUX: Remove obsolete deferred inode security init list.
Konstantin Meskhidze
- [RFC PATCH] getting misc stats/attributes via xattr API
Miklos Szeredi
- [PATCH -next v2 3/6] landlock: add chmod and chown support
Mickaël Salaün
- [PATCH v5 04/11] security: keys: trusted: Include TPM2 creation data
Evan Green
- [PATCH v5 04/11] security: keys: trusted: Include TPM2 creation data
James Bottomley
- [PATCH bpf] selftests/bpf: fix memory leak of lsm_cgroup
sdf at google.com
- [PATCH v5 04/11] security: keys: trusted: Include TPM2 creation data
Evan Green
- [PATCH] [RFC] SELINUX: Remove obsolete deferred inode security init list.
Paul Moore
- [PATCH v5 04/11] security: keys: trusted: Include TPM2 creation data
James Bottomley
- [PATCH] [RFC] SELINUX: Remove obsolete deferred inode security init list.
Paul Moore
- [syzbot] BUG: unable to handle kernel NULL pointer dereference in smack_inode_permission
Richard Cochran
- [syzbot] BUG: unable to handle kernel NULL pointer dereference in smack_inode_permission
Dmitry Vyukov
- [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
Nayna
- [PATCH bpf] selftests/bpf: fix memory leak of lsm_cgroup
wangyufen
- [PATCH bpf v2] selftests/bpf: fix memory leak of lsm_cgroup
Stanislav Fomichev
- [PATCH bpf v2] selftests/bpf: fix memory leak of lsm_cgroup
Wang Yufen
- [RFC PATCH] getting misc stats/attributes via xattr API
Abel Wu
- [PATCH] device_cgroup: Roll back to original exceptions after copy failure
wangweiyang
- [PATCH v1 0/2] Add LSM access controls for io_uring_setup
Jeffrey Vander Stoep
- [RFC][PATCH 0/4] security: Ensure LSMs return expected values
Roberto Sassu
- [RFC][PATCH 1/4] lsm: Clarify documentation of vm_enough_memory hook
Roberto Sassu
- [RFC][PATCH 2/4] lsm: Add missing return values doc in lsm_hooks.h and fix formatting
Roberto Sassu
- [RFC][PATCH 3/4] lsm: Redefine LSM_HOOK() macro to add return value flags as argument
Roberto Sassu
- [RFC][PATCH 4/4] security: Enforce limitations on return values from LSMs
Roberto Sassu
- [RFC][PATCH 0/4] security: Ensure LSMs return expected values
Casey Schaufler
- [PATCH] device_cgroup: Roll back to original exceptions after copy failure
Paul Moore
- [PATCH v2 1/3] certs: log more information on blacklist error
Jarkko Sakkinen
- [PATCH v2 3/3] certs: don't try to update blacklist keys
Jarkko Sakkinen
- [PATCH] certs: Prevent spurious errors on repeated blacklisting
Jarkko Sakkinen
- [PATCH v2 2/3] KEYS: Add key_create()
Jarkko Sakkinen
- [PATCH] KEYS: trusted: tee: Make registered shm dependency explicit
Jarkko Sakkinen
- [PATCH] KEYS: trusted: tee: Make registered shm dependency explicit
Jarkko Sakkinen
- [RFC][PATCH 1/4] lsm: Clarify documentation of vm_enough_memory hook
Paul Moore
- [RFC][PATCH 2/4] lsm: Add missing return values doc in lsm_hooks.h and fix formatting
Paul Moore
- [RFC][PATCH 3/4] lsm: Redefine LSM_HOOK() macro to add return value flags as argument
Paul Moore
- [RFC][PATCH 4/4] security: Enforce limitations on return values from LSMs
Paul Moore
- [RFC][PATCH 1/4] lsm: Clarify documentation of vm_enough_memory hook
Roberto Sassu
- [RFC][PATCH 2/4] lsm: Add missing return values doc in lsm_hooks.h and fix formatting
Roberto Sassu
- [RFC][PATCH 3/4] lsm: Redefine LSM_HOOK() macro to add return value flags as argument
Roberto Sassu
- [PATCH mm-unstable v1 00/20] mm/gup: remove FOLL_FORCE usage from drivers (reliable R/O long-term pinning)
David Hildenbrand
- [PATCH mm-unstable v1 01/20] selftests/vm: anon_cow: prepare for non-anonymous COW tests
David Hildenbrand
- [PATCH mm-unstable v1 02/20] selftests/vm: cow: basic COW tests for non-anonymous pages
David Hildenbrand
- [PATCH mm-unstable v1 03/20] selftests/vm: cow: R/O long-term pinning reliability tests for non-anon pages
David Hildenbrand
- [PATCH mm-unstable v1 04/20] mm: add early FAULT_FLAG_UNSHARE consistency checks
David Hildenbrand
- [PATCH mm-unstable v1 05/20] mm: add early FAULT_FLAG_WRITE consistency checks
David Hildenbrand
- [PATCH mm-unstable v1 06/20] mm: rework handling in do_wp_page() based on private vs. shared mappings
David Hildenbrand
- [PATCH mm-unstable v1 07/20] mm: don't call vm_ops->huge_fault() in wp_huge_pmd()/wp_huge_pud() for private mappings
David Hildenbrand
- [PATCH mm-unstable v1 08/20] mm: extend FAULT_FLAG_UNSHARE support to anything in a COW mapping
David Hildenbrand
- [PATCH mm-unstable v1 09/20] mm/gup: reliable R/O long-term pinning in COW mappings
David Hildenbrand
- [PATCH mm-unstable v1 10/20] RDMA/umem: remove FOLL_FORCE usage
David Hildenbrand
- [PATCH mm-unstable v1 11/20] RDMA/usnic: remove FOLL_FORCE usage
David Hildenbrand
- [PATCH mm-unstable v1 12/20] RDMA/siw: remove FOLL_FORCE usage
David Hildenbrand
- [PATCH mm-unstable v1 13/20] media: videobuf-dma-sg: remove FOLL_FORCE usage
David Hildenbrand
- [PATCH mm-unstable v1 14/20] drm/etnaviv: remove FOLL_FORCE usage
David Hildenbrand
- [PATCH mm-unstable v1 15/20] media: pci/ivtv: remove FOLL_FORCE usage
David Hildenbrand
- [PATCH mm-unstable v1 16/20] mm/frame-vector: remove FOLL_FORCE usage
David Hildenbrand
- [PATCH mm-unstable v1 17/20] drm/exynos: remove FOLL_FORCE usage
David Hildenbrand
- [PATCH mm-unstable v1 18/20] RDMA/hw/qib/qib_user_pages: remove FOLL_FORCE usage
David Hildenbrand
- [PATCH mm-unstable v1 19/20] habanalabs: remove FOLL_FORCE usage
David Hildenbrand
- [PATCH mm-unstable v1 20/20] mm: rename FOLL_FORCE to FOLL_PTRACE
David Hildenbrand
- [PATCH mm-unstable v1 09/20] mm/gup: reliable R/O long-term pinning in COW mappings
Daniel Vetter
- [PATCH mm-unstable v1 13/20] media: videobuf-dma-sg: remove FOLL_FORCE usage
Daniel Vetter
- [PATCH mm-unstable v1 14/20] drm/etnaviv: remove FOLL_FORCE usage
Daniel Vetter
- [PATCH mm-unstable v1 16/20] mm/frame-vector: remove FOLL_FORCE usage
Daniel Vetter
- [PATCH mm-unstable v1 17/20] drm/exynos: remove FOLL_FORCE usage
Daniel Vetter
- [RFC 0/1] RFC on how to include LSM hooks for io_uring commands
Joel Granados
- [RFC 1/1] Use ioctl selinux callback io_uring commands that implement the ioctl op convention
Joel Granados
- [PATCH v8 11/12] samples/landlock: Add network demo
Mickaël Salaün
- [RFC][PATCH 4/4] security: Enforce limitations on return values from LSMs
Roberto Sassu
- [PoC][PATCH] bpf: Call return value check function in the JITed code
Roberto Sassu
- [PoC][PATCH] bpf: Call return value check function in the JITed code
Alexei Starovoitov
- [PoC][PATCH] bpf: Call return value check function in the JITed code
Roberto Sassu
- [PATCH v2] integrity: Fix memory leakage in keyring allocation error path
Mimi Zohar
- [PATCH] ima: Fix misuse of dereference of pointer in template_desc_init_fields()
Mimi Zohar
- [PoC][PATCH] bpf: Call return value check function in the JITed code
Casey Schaufler
- [RFC 1/1] Use ioctl selinux callback io_uring commands that implement the ioctl op convention
Kanchan Joshi
- [PoC][PATCH] bpf: Call return value check function in the JITed code
Alexei Starovoitov
- [PATCH mm-unstable v1 20/20] mm: rename FOLL_FORCE to FOLL_PTRACE
Linus Torvalds
- [PoC][PATCH] bpf: Call return value check function in the JITed code
Casey Schaufler
- [PATCH mm-unstable v1 20/20] mm: rename FOLL_FORCE to FOLL_PTRACE
David Hildenbrand
- [PoC][PATCH] bpf: Call return value check function in the JITed code
KP Singh
- [PoC][PATCH] bpf: Call return value check function in the JITed code
KP Singh
- [RFC][PATCH 1/4] lsm: Clarify documentation of vm_enough_memory hook
KP Singh
- [RFC 1/1] Use ioctl selinux callback io_uring commands that implement the ioctl op convention
Paul Moore
- [RFC][PATCH 2/4] lsm: Add missing return values doc in lsm_hooks.h and fix formatting
Paul Moore
- [RFC][PATCH 1/4] lsm: Clarify documentation of vm_enough_memory hook
Paul Moore
- [PATCH v4 1/5] reiserfs: Add missing calls to reiserfs_security_free()
Mimi Zohar
- [RFC][PATCH 3/4] lsm: Redefine LSM_HOOK() macro to add return value flags as argument
Paul Moore
- [RFC][PATCH 4/4] security: Enforce limitations on return values from LSMs
Paul Moore
- [PoC][PATCH] bpf: Call return value check function in the JITed code
Paul Moore
- [PATCH v2] LSM: Better reporting of actual LSMs at boot
Paul Moore
- [PATCH] device_cgroup: Roll back to original exceptions after copy failure
Paul Moore
- [PATCH mm-unstable v1 10/20] RDMA/umem: remove FOLL_FORCE usage
Jason Gunthorpe
- [PATCH mm-unstable v1 11/20] RDMA/usnic: remove FOLL_FORCE usage
Jason Gunthorpe
- [PATCH mm-unstable v1 12/20] RDMA/siw: remove FOLL_FORCE usage
Jason Gunthorpe
- [RFC][PATCH 3/4] lsm: Redefine LSM_HOOK() macro to add return value flags as argument
Greg KH
- [PATCH] device_cgroup: Roll back to original exceptions after copy failure
wangweiyang
- [PATCH bpf v2] selftests/bpf: fix memory leak of lsm_cgroup
patchwork-bot+netdevbpf at kernel.org
- [PATCH v4 2/5] security: Rewrite security_old_inode_init_security()
Mimi Zohar
- [RFC][PATCH 3/4] lsm: Redefine LSM_HOOK() macro to add return value flags as argument
Paul Moore
- [PATCH v4 3/5] security: Allow all LSMs to provide xattrs for inode_init_security hook
Mimi Zohar
- [PATCH v4 4/5] evm: Align evm_inode_init_security() definition with LSM infrastructure
Mimi Zohar
- [PATCH v4 5/5] evm: Support multiple LSMs providing an xattr
Mimi Zohar
- [PATCH v4 3/5] security: Allow all LSMs to provide xattrs for inode_init_security hook
Casey Schaufler
- [PATCH v4 3/5] security: Allow all LSMs to provide xattrs for inode_init_security hook
Mimi Zohar
- [PATCH v4 3/5] security: Allow all LSMs to provide xattrs for inode_init_security hook
Casey Schaufler
- [PATCH v4 3/5] security: Allow all LSMs to provide xattrs for inode_init_security hook
Mimi Zohar
- [PATCH v8 01/12] landlock: Make ruleset's access masks more generic
Mickaël Salaün
- [PATCH v8 02/12] landlock: Refactor landlock_find_rule/insert_rule
Mickaël Salaün
- [PATCH v8 03/12] landlock: Refactor merge/inherit_ruleset functions
Mickaël Salaün
- [PATCH v8 04/12] landlock: Move unmask_layers() and init_layer_masks()
Mickaël Salaün
- [PATCH v8 05/12] landlock: Refactor unmask_layers() and init_layer_masks()
Mickaël Salaün
- [PATCH v8 06/12] landlock: Refactor landlock_add_rule() syscall
Mickaël Salaün
- [PATCH v8 07/12] landlock: Add network rules support
Mickaël Salaün
- [PATCH v8 08/12] landlock: Implement TCP network hooks
Mickaël Salaün
- [PATCH v8 09/12] selftests/landlock: Share enforce_ruleset()
Mickaël Salaün
- [PATCH v8 12/12] landlock: Document Landlock's network support
Mickaël Salaün
- [PATCH] landlock: Allow filesystem layout changes for domains without such rule type
Mickaël Salaün
- [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
Greg Kroah-Hartman
- [RFC 1/1] Use ioctl selinux callback io_uring commands that implement the ioctl op convention
Paul Moore
- [PATCH mm-unstable v1 20/20] mm: rename FOLL_FORCE to FOLL_PTRACE
Kees Cook
- [PATCH mm-unstable v1 20/20] mm: rename FOLL_FORCE to FOLL_PTRACE
Linus Torvalds
- [PATCH mm-unstable v1 20/20] mm: rename FOLL_FORCE to FOLL_PTRACE
Kees Cook
- [RFC PATCH] lsm,fs: fix vfs_getxattr_alloc() return type and caller error paths
Serge E. Hallyn
- [PATCH v3 0/3] certs: Prevent spurious errors on repeated blacklisting
Thomas Weißschuh
- [PATCH v3 1/3] certs: log hash value on blacklist error
Thomas Weißschuh
- [PATCH v3 2/3] KEYS: Add key_create()
Thomas Weißschuh
- [PATCH v3 3/3] certs: don't try to update blacklist keys
Thomas Weißschuh
- [PoC][PATCH] bpf: Call return value check function in the JITed code
Roberto Sassu
- [PATCH -next v2 3/6] landlock: add chmod and chown support
xiujianfeng
- [PATCH v4 2/5] security: Rewrite security_old_inode_init_security()
Roberto Sassu
- [PATCH v4 3/5] security: Allow all LSMs to provide xattrs for inode_init_security hook
Roberto Sassu
- [PATCH] landlock: Allow filesystem layout changes for domains without such rule type
Mickaël Salaün
- [PATCH v4 4/5] evm: Align evm_inode_init_security() definition with LSM infrastructure
Roberto Sassu
- [PATCH v4 3/5] security: Allow all LSMs to provide xattrs for inode_init_security hook
Roberto Sassu
- [PATCH v5 02/30] fs: pass dentry to set acl method
Mickaël Salaün
- [PATCH v5 02/30] fs: pass dentry to set acl method
Christian Brauner
- [PATCH mm-unstable v1 20/20] mm: rename FOLL_FORCE to FOLL_PTRACE
Peter Zijlstra
- [PATCH -next v2 3/6] landlock: add chmod and chown support
Mickaël Salaün
- [PATCH v5 02/30] fs: pass dentry to set acl method
Mickaël Salaün
- [RFC PATCH] lsm,fs: fix vfs_getxattr_alloc() return type and caller error paths
Paul Moore
- [PATCH v4] evm: Correct inode_init_security hooks behaviors
Nicolas Bouchinet
- [PATCH v4] evm: Correct inode_init_security hooks behaviors
Nicolas Bouchinet
- [PATCH v4 4/5] evm: Align evm_inode_init_security() definition with LSM infrastructure
Mimi Zohar
- [PATCH v4 3/5] security: Allow all LSMs to provide xattrs for inode_init_security hook
Mimi Zohar
- [PATCH v4 4/5] evm: Align evm_inode_init_security() definition with LSM infrastructure
Mimi Zohar
- [PATCH v4 3/5] security: Allow all LSMs to provide xattrs for inode_init_security hook
Mimi Zohar
- [PATCH mm-unstable v1 01/20] selftests/vm: anon_cow: prepare for non-anonymous COW tests
Vlastimil Babka
- [PATCH mm-unstable v1 04/20] mm: add early FAULT_FLAG_UNSHARE consistency checks
Vlastimil Babka
- [PATCH mm-unstable v1 05/20] mm: add early FAULT_FLAG_WRITE consistency checks
Vlastimil Babka
- [PATCH v4 3/5] security: Allow all LSMs to provide xattrs for inode_init_security hook
Casey Schaufler
- [PATCH v4 3/5] security: Allow all LSMs to provide xattrs for inode_init_security hook
Casey Schaufler
- [RFC PATCH] lsm,fs: fix vfs_getxattr_alloc() return type and caller error paths
Mimi Zohar
- [RFC PATCH] lsm,fs: fix vfs_getxattr_alloc() return type and caller error paths
Paul Moore
- [RFC PATCH] lsm,fs: fix vfs_getxattr_alloc() return type and caller error paths
Mimi Zohar
- [RFC PATCH] lsm,fs: fix vfs_getxattr_alloc() return type and caller error paths
Paul Moore
- [PATCH mm-unstable v1 20/20] mm: rename FOLL_FORCE to FOLL_PTRACE
Kees Cook
- [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
Nayna
- [PATCH v5] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing
Al Viro
- [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
Ritesh Harjani (IBM)
- [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
Greg Kroah-Hartman
- [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
James Bottomley
- [PATCH v4] evm: Correct inode_init_security hooks behaviors
Roberto Sassu
- [PATCH v4 2/5] security: Rewrite security_old_inode_init_security()
Roberto Sassu
- [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
Greg Kroah-Hartman
- sgid clearing rules?
Miklos Szeredi
- [PATCH v4 3/5] security: Allow all LSMs to provide xattrs for inode_init_security hook
Roberto Sassu
- [PATCH] ima: Make a copy of sig and digest in asymmetric_verify()
Roberto Sassu
- [PATCH -next v2 3/6] landlock: add chmod and chown support
xiujianfeng
- [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
James Bottomley
- [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
Greg Kroah-Hartman
- [PoC][PATCH] bpf: Call return value check function in the JITed code
Roberto Sassu
- [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
David Laight
- [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
James Bottomley
- [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
Greg Kroah-Hartman
- [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
Nayna
- [RFC 1/1] Use ioctl selinux callback io_uring commands that implement the ioctl op convention
Luis Chamberlain
- [PATCH v4 2/5] security: Rewrite security_old_inode_init_security()
Mimi Zohar
- [PATCH v4 3/5] security: Allow all LSMs to provide xattrs for inode_init_security hook
Mimi Zohar
- [RFC 1/1] Use ioctl selinux callback io_uring commands that implement the ioctl op convention
Paul Moore
- [PATCH v4 1/5] reiserfs: Add missing calls to reiserfs_security_free()
Paul Moore
- [PATCH v4 2/5] security: Rewrite security_old_inode_init_security()
Paul Moore
- Norah Colly
Felipe Bedetti
- [PATCH v4 1/5] reiserfs: Add missing calls to reiserfs_security_free()
Roberto Sassu
- [PATCH v4 2/5] security: Rewrite security_old_inode_init_security()
Roberto Sassu
- Silikonmischungen
Zbynek Spacek
- [RFC v2 0/1] RFC on how to include LSM hooks for io_uring commands
Joel Granados
- [RFC v2 1/1] Use a fs callback to set security specific data
Joel Granados
- sgid clearing rules?
Christian Brauner
- sgid clearing rules?
Miklos Szeredi
- [RFC 1/1] Use ioctl selinux callback io_uring commands that implement the ioctl op convention
Ming Lei
- sgid clearing rules?
Christian Brauner
- [PATCH mm-unstable v1 06/20] mm: rework handling in do_wp_page() based on private vs. shared mappings
Vlastimil Babka
- [PATCH mm-unstable v1 07/20] mm: don't call vm_ops->huge_fault() in wp_huge_pmd()/wp_huge_pud() for private mappings
Vlastimil Babka
- [RFC v2 1/1] Use a fs callback to set security specific data
Casey Schaufler
- [PATCH mm-unstable v1 08/20] mm: extend FAULT_FLAG_UNSHARE support to anything in a COW mapping
Vlastimil Babka
- [PATCH mm-unstable v1 09/20] mm/gup: reliable R/O long-term pinning in COW mappings
Vlastimil Babka
- [PATCH v8 02/12] landlock: Refactor landlock_find_rule/insert_rule
Mickaël Salaün
- [PATCH] ima: Make a copy of sig and digest in asymmetric_verify()
Mimi Zohar
- [PATCH v4 1/5] reiserfs: Add missing calls to reiserfs_security_free()
Paul Moore
- [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
Nayna
- [PATCH v5 0/6] evm: Prepare for moving to the LSM infrastructure
Roberto Sassu
- [PATCH v5 1/6] reiserfs: Switch to security_inode_init_security()
Roberto Sassu
- [PATCH v5 2/6] ocfs2: Switch to security_inode_init_security()
Roberto Sassu
- [PATCH v5 3/6] security: Remove security_old_inode_init_security()
Roberto Sassu
- [PATCH v5 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
Roberto Sassu
- [PATCH v5 5/6] evm: Align evm_inode_init_security() definition with LSM infrastructure
Roberto Sassu
- [PATCH v5 6/6] evm: Support multiple LSMs providing an xattr
Roberto Sassu
- [PATCH v5 0/6] evm: Prepare for moving to the LSM infrastructure
Mimi Zohar
- [PATCH v5 0/6] evm: Prepare for moving to the LSM infrastructure
Roberto Sassu
- [PATCH] ima: Make a copy of sig and digest in asymmetric_verify()
Roberto Sassu
- [PATCH v5 0/6] evm: Prepare for moving to the LSM infrastructure
Mimi Zohar
- [PATCH v5 1/6] reiserfs: Switch to security_inode_init_security()
Mimi Zohar
- [PATCH mm-unstable v1 13/20] media: videobuf-dma-sg: remove FOLL_FORCE usage
Hans Verkuil
- [PATCH mm-unstable v1 15/20] media: pci/ivtv: remove FOLL_FORCE usage
Hans Verkuil
- [PATCH mm-unstable v1 16/20] mm/frame-vector: remove FOLL_FORCE usage
Hans Verkuil
- [PATCH] ima: Make a copy of sig and digest in asymmetric_verify()
Mimi Zohar
- [PATCH] ima: Make a copy of sig and digest in asymmetric_verify()
Roberto Sassu
- [PATCH mm-unstable v1 16/20] mm/frame-vector: remove FOLL_FORCE usage
Hans Verkuil
- [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
Nayna
- [PATCH v6 0/6] evm: Do HMAC of multiple per LSM xattrs for new inodes
Roberto Sassu
- [PATCH v6 1/6] reiserfs: Switch to security_inode_init_security()
Roberto Sassu
- [PATCH v6 2/6] ocfs2: Switch to security_inode_init_security()
Roberto Sassu
- [PATCH v6 3/6] security: Remove security_old_inode_init_security()
Roberto Sassu
- [PATCH v6 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
Roberto Sassu
- [PATCH v6 5/6] evm: Align evm_inode_init_security() definition with LSM infrastructure
Roberto Sassu
- [PATCH v6 6/6] evm: Support multiple LSMs providing an xattr
Roberto Sassu
- [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
Greg Kroah-Hartman
- [PATCH v6 0/6] evm: Do HMAC of multiple per LSM xattrs for new inodes
Mimi Zohar
- [PATCH v6 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
Casey Schaufler
- [PATCH v6 0/6] evm: Do HMAC of multiple per LSM xattrs for new inodes
Casey Schaufler
- [PATCH v5 2/6] ocfs2: Switch to security_inode_init_security()
Mimi Zohar
- [PATCH 2/4] fs: define a firmware security filesystem named fwsecurityfs
Nayna
- [PATCH v1 0/8] LSM: Two basic syscalls
Casey Schaufler
- [PATCH v1 1/8] LSM: Identify modules by more than name
Casey Schaufler
- [PATCH v1 2/8] LSM: Add an LSM identifier for external use
Casey Schaufler
- [PATCH v1 3/8] LSM: Identify the process attributes for each module
Casey Schaufler
- [PATCH v1 4/8] LSM: Maintain a table of LSM attribute data
Casey Schaufler
- [PATCH v1 5/8] proc: Use lsmids instead of lsm names for attrs
Casey Schaufler
- [PATCH v1 6/8] LSM: lsm_self_attr syscall for LSM self attributes
Casey Schaufler
- [PATCH v1 7/8] LSM: Create lsm_module_list system call
Casey Schaufler
- [PATCH v1 8/8] lsm: wireup syscalls lsm_self_attr and lsm_module_list
Casey Schaufler
- [PATCH v1 0/8] LSM: Two basic syscalls
Casey Schaufler
- [PATCH v3 0/9] LSM: Three basic syscalls
Casey Schaufler
- [PATCH v3 1/9] LSM: Identify modules by more than name
Casey Schaufler
- [PATCH v3 2/9] LSM: Identify the process attributes for each module
Casey Schaufler
- [PATCH v3 3/9] LSM: Maintain a table of LSM attribute data
Casey Schaufler
- [PATCH v3 4/9] proc: Use lsmids instead of lsm names for attrs
Casey Schaufler
- [PATCH v3 5/9] LSM: lsm_get_self_attr syscall for LSM self attributes
Casey Schaufler
- [PATCH v3 6/9] LSM: Create lsm_module_list system call
Casey Schaufler
- [PATCH v3 7/9] LSM: lsm_set_self_attr syscall for LSM self attributes
Casey Schaufler
- [PATCH v3 8/9] LSM: wireup Linux Security Module syscalls
Casey Schaufler
- [PATCH v3 9/9] LSM: selftests for Linux Security Module infrastructure syscalls
Casey Schaufler
- [RFC v2 1/1] Use a fs callback to set security specific data
Paul Moore
- [PATCH v6 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
Mimi Zohar
- [PATCH mm-unstable v1 09/20] mm/gup: reliable R/O long-term pinning in COW mappings
John Hubbard
- [PATCH v3 1/9] LSM: Identify modules by more than name
Greg KH
- [PATCH v6 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
Roberto Sassu
- [PATCH v5 2/6] ocfs2: Switch to security_inode_init_security()
Roberto Sassu
- [PATCH v6 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
Roberto Sassu
- [PATCH] ima: Fix hash dependency to correct algorithm
Tianjia Zhang
- [PATCH v5] evm: Correct inode_init_security hooks behaviors
Nicolas Bouchinet
- [PATCH v3 1/9] LSM: Identify modules by more than name
Mickaël Salaün
- [PATCH v3 1/9] LSM: Identify modules by more than name
Mickaël Salaün
- [PATCH v3 2/9] LSM: Identify the process attributes for each module
Mickaël Salaün
- [PATCH v3 2/9] LSM: Identify the process attributes for each module
Casey Schaufler
- INVITATION TO THE GREAT ILLUMINATI SOCIETY.
Aminu Bello
- [PATCH mm-unstable v1 16/20] mm/frame-vector: remove FOLL_FORCE usage
David Hildenbrand
- [PATCH v3 1/3] certs: log hash value on blacklist error
Jarkko Sakkinen
- [PATCH v3 2/3] KEYS: Add key_create()
Jarkko Sakkinen
- [PATCH v3 1/3] certs: log hash value on blacklist error
Thomas Weißschuh
- [PATCH -next] selftests/landlock: Fix selftest ptrace_test run fail
limin
- [PATCH v8 11/12] samples/landlock: Add network demo
Konstantin Meskhidze (A)
- [PATCH v8 01/12] landlock: Make ruleset's access masks more generic
Konstantin Meskhidze (A)
- [PATCH v8 02/12] landlock: Refactor landlock_find_rule/insert_rule
Konstantin Meskhidze (A)
- [PATCH] landlock: Allow filesystem layout changes for domains without such rule type
Konstantin Meskhidze (A)
- [PATCH] landlock: Allow filesystem layout changes for domains without such rule type
Konstantin Meskhidze (A)
- [PATCH v8 02/12] landlock: Refactor landlock_find_rule/insert_rule
Konstantin Meskhidze (A)
- [PATCH v8 03/12] landlock: Refactor merge/inherit_ruleset functions
Konstantin Meskhidze (A)
- [PATCH v8 04/12] landlock: Move unmask_layers() and init_layer_masks()
Konstantin Meskhidze (A)
- [PATCH v8 05/12] landlock: Refactor unmask_layers() and init_layer_masks()
Konstantin Meskhidze (A)
- [PATCH v8 06/12] landlock: Refactor landlock_add_rule() syscall
Konstantin Meskhidze (A)
- [PATCH v3 1/9] LSM: Identify modules by more than name
Paul Moore
- [PATCH v3 1/9] LSM: Identify modules by more than name
Paul Moore
- [PATCH v8 07/12] landlock: Add network rules support
Konstantin Meskhidze (A)
- [PATCH v8 09/12] selftests/landlock: Share enforce_ruleset()
Konstantin Meskhidze (A)
- [PATCH v8 12/12] landlock: Document Landlock's network support
Konstantin Meskhidze (A)
- [PATCH v3 1/9] LSM: Identify modules by more than name
Greg KH
- [PATCH mm-unstable v1 16/20] mm/frame-vector: remove FOLL_FORCE usage
Hans Verkuil
- [PATCH mm-unstable v1 16/20] mm/frame-vector: remove FOLL_FORCE usage
David Hildenbrand
- [PATCH v8 08/12] landlock: Implement TCP network hooks
Konstantin Meskhidze (A)
- [PATCH mm-unstable v1 16/20] mm/frame-vector: remove FOLL_FORCE usage
Hans Verkuil
- [PATCH mm-unstable v1 16/20] mm/frame-vector: remove FOLL_FORCE usage
Tomasz Figa
- [RESEND PATCH v2 0/2] watch_queue: Clean up some code
Siddh Raman Pant
- [RFC 1/1] Use ioctl selinux callback io_uring commands that implement the ioctl op convention
Ming Lei
- [PATCH v3 1/9] LSM: Identify modules by more than name
Paul Moore
- [PATCH v2 0/2] lsm: Improve LSM hooks documentation
Roberto Sassu
- [PATCH v2 1/2] lsm: Clarify documentation of vm_enough_memory hook
Roberto Sassu
- [PATCH v2 2/2] lsm: Add/fix return values in lsm_hooks.h and fix formatting
Roberto Sassu
- [PATCH 1/2] fs/exec: Explicitly unshare fs_struct on exec
Eric W. Biederman
- [PATCH v3 1/9] LSM: Identify modules by more than name
Casey Schaufler
- [PATCH -next] selftests/landlock: Fix selftest ptrace_test run fail
Mickaël Salaün
- [PATCH v8 01/12] landlock: Make ruleset's access masks more generic
Mickaël Salaün
- [PATCH] landlock: Allow filesystem layout changes for domains without such rule type
Mickaël Salaün
- [PATCH] landlock: Allow filesystem layout changes for domains without such rule type
Mickaël Salaün
- [PATCH v8 04/12] landlock: Move unmask_layers() and init_layer_masks()
Mickaël Salaün
- [PATCH v8 07/12] landlock: Add network rules support
Mickaël Salaün
- [PATCH v8 11/12] samples/landlock: Add network demo
Mickaël Salaün
- [PATCH v8 12/12] landlock: Document Landlock's network support
Mickaël Salaün
- [PATCH v8 08/12] landlock: Implement TCP network hooks
Mickaël Salaün
- [syzbot] BUG: unable to handle kernel paging request in tomoyo_encode
syzbot
- [PATCH mm-unstable v1 16/20] mm/frame-vector: remove FOLL_FORCE usage
Andrew Morton
- [PATCH -next] selftests/landlock: Fix selftest ptrace_test run fail
limin
- [PATCH mm-unstable v1 16/20] mm/frame-vector: remove FOLL_FORCE usage
David Hildenbrand
- [PATCH mm-unstable v1 16/20] mm/frame-vector: remove FOLL_FORCE usage
Hans Verkuil
- [PATCH mm-unstable v1 16/20] mm/frame-vector: remove FOLL_FORCE usage
David Hildenbrand
- [PATCH -next] selftests/landlock: Fix selftest ptrace_test run fail
Mickaël Salaün
- [PATCH v6 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
Mimi Zohar
- [PATCH v5] evm: Correct inode_init_security hooks behaviors
Mimi Zohar
- [PATCH -next] selftests/landlock: Fix selftest ptrace_test run fail
limin
- [PATCH v5] evm: Correct inode_init_security hooks behaviors
Roberto Sassu
- [PATCH v5] evm: Correct inode_init_security hooks behaviors
Nicolas Bouchinet
- [PATCH v5] evm: Correct inode_init_security hooks behaviors
Roberto Sassu
- [PATCH v5 2/6] ocfs2: Switch to security_inode_init_security()
Mimi Zohar
- [PATCH] ima: Fix hash dependency to correct algorithm
Mimi Zohar
- [RFC v2 1/1] Use a fs callback to set security specific data
Christoph Hellwig
- [PATCH v5] evm: Correct inode_init_security hooks behaviors
Nicolas Bouchinet
- [PATCH v5] evm: Correct inode_init_security hooks behaviors
Roberto Sassu
- [PATCH v6 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
Casey Schaufler
- [PATCH v2 0/2] lsm: Improve LSM hooks documentation
Casey Schaufler
- Strategic plan on(ROI)
Mr.IgorS. Lvovich
- [PATCH -next] selftests/landlock: Fix selftest ptrace_test run fail
limin
- Wycena paneli fotowoltaicznych
Norbert Karecki
- [PoC][PATCH] bpf: Call return value check function in the JITed code
Roberto Sassu
- [PATCH] ima: Make a copy of sig and digest in asymmetric_verify()
Roberto Sassu
- [PATCH] ima: Make a copy of sig and digest in asymmetric_verify()
Mimi Zohar
- [PATCH] ima: Make a copy of sig and digest in asymmetric_verify()
Roberto Sassu
- [PATCH -next] selftests/landlock: Fix selftest ptrace_test run fail
Mickaël Salaün
- [PATCH -next] selftests/landlock: Fix selftest ptrace_test run fail
Jeff Xu
- [PATCH v6 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
Mimi Zohar
Last message date:
Wed Nov 30 21:23:43 UTC 2022
Archived on: Wed Nov 30 21:01:03 UTC 2022
This archive was generated by
Pipermail 0.09 (Mailman edition).