September 2022 Archives by subject
Starting: Thu Sep 1 05:04:20 UTC 2022
Ending: Fri Sep 30 20:43:53 UTC 2022
Messages: 773
- [EXT] [RFC PATCH HBK: 0/8] HW BOUND KEY as TRUSTED KEY
David Gstir
- [EXT] [RFC PATCH HBK: 0/8] HW BOUND KEY as TRUSTED KEY
Michael Walle
- [EXT] [RFC PATCH HBK: 0/8] HW BOUND KEY as TRUSTED KEY
Pankaj Gupta
- [EXT] Re: [RFC PATCH HBK: 0/8] HW BOUND KEY as TRUSTED KEY
Pankaj Gupta
- [EXT] Re: [RFC PATCH HBK: 0/8] HW BOUND KEY as TRUSTED KEY
Pankaj Gupta
- [EXT] Re: [RFC PATCH HBK: 0/8] HW BOUND KEY as TRUSTED KEY
Michael Walle
- [EXT] Re: [RFC PATCH HBK: 0/8] HW BOUND KEY as TRUSTED KEY
Jan Lübbe
- [EXT] Re: [RFC PATCH HBK: 0/8] HW BOUND KEY as TRUSTED KEY
Pankaj Gupta
- [EXT] Re: [RFC PATCH HBK: 1/8] keys-trusted: new cmd line option added
Pankaj Gupta
- [EXT] Re: [RFC PATCH HBK: 2/8] hw-bound-key: flag-is_hbk added to the tfm
Pankaj Gupta
- [EXT] Re: [RFC PATCH HBK: 2/8] hw-bound-key: flag-is_hbk added to the tfm
Herbert Xu
- [EXT] Re: [RFC PATCH HBK: 2/8] hw-bound-key: flag-is_hbk added to the tfm
Pankaj Gupta
- [EXT] Re: [RFC PATCH HBK: 2/8] hw-bound-key: flag-is_hbk added to the tfm
Herbert Xu
- [EXT] Re: [RFC PATCH HBK: 2/8] hw-bound-key: flag-is_hbk added to the tfm
Varun Sethi
- [EXT] Re: [RFC PATCH HBK: 2/8] hw-bound-key: flag-is_hbk added to the tfm
Herbert Xu
- [EXT] Re: [RFC PATCH HBK: 2/8] hw-bound-key: flag-is_hbk added to the tfm
Varun Sethi
- [EXT] Re: [RFC PATCH HBK: 2/8] hw-bound-key: flag-is_hbk added to the tfm
Herbert Xu
- [EXT] Re: [RFC PATCH HBK: 2/8] hw-bound-key: flag-is_hbk added to the tfm
Varun Sethi
- [EXT] Re: [RFC PATCH HBK: 6/8] KEYS: trusted: caam based black key
Pankaj Gupta
- [GIT PULL] Landlock fix for v6.0
Mickaël Salaün
- [GIT PULL] Landlock fix for v6.0
pr-tracker-bot at kernel.org
- [GIT PULL] Landlock fix for v6.0 #2
Mickaël Salaün
- [GIT PULL] Landlock fix for v6.0 #2
Shuah Khan
- [GIT PULL] Landlock fix for v6.0 #2
pr-tracker-bot at kernel.org
- [GIT PULL] linux-tpmdd updates for v6.0-rc1
Jarkko Sakkinen
- [GIT PULL] linux-tpmdd updates for v6.0-rc1
Jarkko Sakkinen
- [mic:next 4/9] fs/open.c:191: undefined reference to `security_file_truncate'
Mickaël Salaün
- [mic:next 4/9] fs/open.c:191: undefined reference to `security_file_truncate'
Günther Noack
- [net-next v4 0/6] net: support QUIC crypto
Adel Abouchaev
- [net-next v4 1/6] net: Documentation on QUIC kernel Tx crypto.
Adel Abouchaev
- [net-next v4 1/6] net: Documentation on QUIC kernel Tx crypto.
Bagas Sanjaya
- [net-next v4 2/6] net: Define QUIC specific constants, control and data plane structures
Adel Abouchaev
- [net-next v4 3/6] net: Add UDP ULP operations, initialization and handling prototype functions.
Adel Abouchaev
- [net-next v4 4/6] net: Implement QUIC offload functions
Adel Abouchaev
- [net-next v4 5/6] net: Add flow counters and Tx processing error counter
Adel Abouchaev
- [net-next v4 6/6] net: Add self tests for ULP operations, flow setup and crypto tests
Adel Abouchaev
- [PATCH (urgent)] vfs: fix uninitialized uid/gid in chown_common()
Tetsuo Handa
- [PATCH (urgent)] vfs: fix uninitialized uid/gid in chown_common()
Christian Brauner
- [PATCH (urgent)] vfs: fix uninitialized uid/gid in chown_common()
Christian Brauner
- [PATCH (urgent)] vfs: fix uninitialized uid/gid in chown_common()
Serge E. Hallyn
- [PATCH (urgent)] vfs: fix uninitialized uid/gid in chown_common()
Seth Forshee
- [PATCH (urgent)] vfs: fix uninitialized uid/gid in chown_common()
Seth Forshee
- [PATCH (urgent)] vfs: fix uninitialized uid/gid in chown_common()
Tetsuo Handa
- [PATCH -next 0/4] Use DECLARE_FLEX_ARRAY() helper for ima
Gaosheng Cui
- [PATCH -next 1/4] ima: Use DECLARE_FLEX_ARRAY() helper in ima_modsig
Gaosheng Cui
- [PATCH -next 1/4] ima: Use DECLARE_FLEX_ARRAY() helper in ima_modsig
Mimi Zohar
- [PATCH -next 2/4] ima: Use DECLARE_FLEX_ARRAY() helper in ima_template_entry
Gaosheng Cui
- [PATCH -next 3/4] ima: Use DECLARE_FLEX_ARRAY() helper in ima_policy
Gaosheng Cui
- [PATCH -next 4/4] integrity: Use DECLARE_FLEX_ARRAY() helper in integrity.h
Gaosheng Cui
- [PATCH -next] security: Fix some kernel-doc comments
Yang Li
- [PATCH -next] smack: cleanup obsolete mount option flags
Xiu Jianfeng
- [PATCH -next] smack: cleanup obsolete mount option flags
Casey Schaufler
- [PATCH -next v2 3/6] landlock: add chmod and chown support
xiujianfeng
- [PATCH -next v2 3/6] landlock: add chmod and chown support
Mickaël Salaün
- [PATCH 0/1] Add CONFIG_SECURITY_SELINUX_PERMISSIVE_DONTAUDIT
jeffxu at chromium.org
- [PATCH 0/1] Add CONFIG_SECURITY_SELINUX_PERMISSIVE_DONTAUDIT
Casey Schaufler
- [PATCH 0/2] fs: fix capable() call in simple_xattr_list()
Ondrej Mosnacek
- [PATCH 0/2] fs: fix capable() call in simple_xattr_list()
Christian Brauner
- [PATCH 0/2] fs: fix capable() call in simple_xattr_list()
Ondrej Mosnacek
- [PATCH 0/2] fs: fix capable() call in simple_xattr_list()
Christian Brauner
- [PATCH 0/2] powerpc/pseries: restrict error injection and DT changes when locked down
Nathan Lynch
- [PATCH 09/29] security: add set acl hook
Christian Brauner
- [PATCH 1/1] Add CONFIG_SECURITY_SELINUX_PERMISSIVE_DONTAUDIT
jeffxu at chromium.org
- [PATCH 1/1] Add CONFIG_SECURITY_SELINUX_PERMISSIVE_DONTAUDIT
Paul Moore
- [PATCH 1/1] Add CONFIG_SECURITY_SELINUX_PERMISSIVE_DONTAUDIT
Jeff Xu
- [PATCH 1/1] Add CONFIG_SECURITY_SELINUX_PERMISSIVE_DONTAUDIT
Paul Moore
- [PATCH 1/1] Add CONFIG_SECURITY_SELINUX_PERMISSIVE_DONTAUDIT
Dominick Grift
- [PATCH 1/1] Add CONFIG_SECURITY_SELINUX_PERMISSIVE_DONTAUDIT
Jeff Xu
- [PATCH 1/1] Add CONFIG_SECURITY_SELINUX_PERMISSIVE_DONTAUDIT
Paul Moore
- [PATCH 1/1] Add CONFIG_SECURITY_SELINUX_PERMISSIVE_DONTAUDIT
Jeff Xu
- [PATCH 1/1] keys/request_key_auth.c: Use strscpy instead of strlcpy
Petr Vorel
- [PATCH 1/1] keys/request_key_auth.c: Use strscpy instead of strlcpy
Jarkko Sakkinen
- [PATCH 1/2] fs: convert simple_xattrs to RCU list
Ondrej Mosnacek
- [PATCH 1/2] powerpc/pseries: block untrusted device tree changes when locked down
Nathan Lynch
- [PATCH 1/2] powerpc/pseries: block untrusted device tree changes when locked down
Paul Moore
- [PATCH 1/2] powerpc/pseries: block untrusted device tree changes when locked down
Michael Ellerman
- [PATCH 1/2] powerpc/pseries: block untrusted device tree changes when locked down
Nathan Lynch
- [PATCH 1/7] bpf: Add missing fd modes check for map iterators
Roberto Sassu
- [PATCH 1/7] bpf: Add missing fd modes check for map iterators
Alexei Starovoitov
- [PATCH 1/7] bpf: Add missing fd modes check for map iterators
Roberto Sassu
- [PATCH 1/7] bpf: Add missing fd modes check for map iterators
Alexei Starovoitov
- [PATCH 11/29] smack: implement set acl hook
Christian Brauner
- [PATCH 2/2] fs: don't call capable() prematurely in simple_xattr_list()
Ondrej Mosnacek
- [PATCH 2/2] powerpc/rtas: block error injection when locked down
Nathan Lynch
- [PATCH 2/2] powerpc/rtas: block error injection when locked down
Paul Moore
- [PATCH 2/2] powerpc/rtas: block error injection when locked down
Michael Ellerman
- [PATCH 2/2] powerpc/rtas: block error injection when locked down
Nathan Lynch
- [PATCH 2/2] powerpc/rtas: block error injection when locked down
Paul Moore
- [PATCH 2/3] selinux: implement the security_uring_cmd() LSM hook
Paul Moore
- [PATCH 5.15 0/6] arm64: kexec_file: use more system keyrings to verify kernel image signature + dependencies
Michal Suchanek
- [PATCH 5.15 0/6] arm64: kexec_file: use more system keyrings to verify kernel image signature + dependencies
Mimi Zohar
- [PATCH 5.15 0/6] arm64: kexec_file: use more system keyrings to verify kernel image signature + dependencies
Michal Suchánek
- [PATCH 5.15 0/6] arm64: kexec_file: use more system keyrings to verify kernel image signature + dependencies
Greg Kroah-Hartman
- [PATCH 5.15 0/6] arm64: kexec_file: use more system keyrings to verify kernel image signature + dependencies
Michal Suchánek
- [PATCH 5.15 0/6] arm64: kexec_file: use more system keyrings to verify kernel image signature + dependencies
Greg Kroah-Hartman
- [PATCH 5.15 0/6] arm64: kexec_file: use more system keyrings to verify kernel image signature + dependencies
Michal Suchánek
- [PATCH 5.15 0/6] arm64: kexec_file: use more system keyrings to verify kernel image signature + dependencies
Michal Suchánek
- [PATCH 5.15 0/6] arm64: kexec_file: use more system keyrings to verify kernel image signature + dependencies
Greg Kroah-Hartman
- [PATCH 5.15 0/6] arm64: kexec_file: use more system keyrings to verify kernel image signature + dependencies
Michal Suchánek
- [PATCH 5.15 0/6] arm64: kexec_file: use more system keyrings to verify kernel image signature + dependencies
AKASHI Takahiro
- [PATCH 5.15 0/6] arm64: kexec_file: use more system keyrings to verify kernel image signature + dependencies
Michal Suchánek
- [PATCH 5.15 00/45] 5.15.70-rc1 review
Naresh Kamboju
- [PATCH 5.15 02/45] arm64: kexec_file: use more system keyrings to verify kernel image signature
Greg Kroah-Hartman
- [PATCH 5.15 5/6] kexec, KEYS: make the code in bzImage64_verify_sig generic
Michal Suchanek
- [PATCH 5.15 6/6] arm64: kexec_file: use more system keyrings to verify kernel image signature
Michal Suchanek
- [PATCH] apparmor: fix obsoleted comments for aa_getprocattr() and audit_resource()
Gaosheng Cui
- [PATCH] apparmor: make __aa_path_perm() static
Xiu Jianfeng
- [PATCH] apparmor: make __aa_path_perm() static
John Johansen
- [PATCH] apparmor: remove useless static inline functions
Gaosheng Cui
- [PATCH] apparmor: Simply obtain the newest label on a cred
Gaosheng Cui
- [PATCH] apparmor: Simply obtain the newest label on a cred
Serge E. Hallyn
- [PATCH] apparmor: Simply obtain the newest label on a cred
cuigaosheng
- [PATCH] apparmor: Simply obtain the newest label on a cred
John Johansen
- [PATCH] dm: verity-loadpin: Only trust verity targets with enforcement
Matthias Kaehlcke
- [PATCH] dm: verity-loadpin: Only trust verity targets with enforcement
Sarthak Kukreti
- [PATCH] dm: verity-loadpin: Only trust verity targets with enforcement
Kees Cook
- [PATCH] KEYS: encrypted: fix key instantiation with user-provided data
Nikolaus Voss
- [PATCH] KEYS: encrypted: fix key instantiation with user-provided data
Jarkko Sakkinen
- [PATCH] KEYS: encrypted: fix key instantiation with user-provided data
Nikolaus Voss
- [PATCH] KEYS: encrypted: fix key instantiation with user-provided data
Mimi Zohar
- [PATCH] KEYS: encrypted: fix key instantiation with user-provided data
Nikolaus Voss
- [PATCH] KEYS: encrypted: fix key instantiation with user-provided data
Mimi Zohar
- [PATCH] KEYS: encrypted: fix key instantiation with user-provided data
Nikolaus Voss
- [PATCH] KEYS: encrypted: fix key instantiation with user-provided data
Mimi Zohar
- [PATCH] KEYS: encrypted: fix key instantiation with user-provided data
Jarkko Sakkinen
- [PATCH] KEYS: encrypted: fix key instantiation with user-provided data
Nikolaus Voss
- [PATCH] KEYS: encrypted: fix key instantiation with user-provided data
Nikolaus Voss
- [PATCH] KEYS: encrypted: fix key instantiation with user-provided data
Mimi Zohar
- [PATCH] landlock: Remove unnecessary conditionals
Jingyu Wang
- [PATCH] landlock: Remove unnecessary conditionals
Mickaël Salaün
- [PATCH] LoadPin: Require file with verity root digests to have a header
Matthias Kaehlcke
- [PATCH] LoadPin: Require file with verity root digests to have a header
Kees Cook
- [PATCH] lockdown: ratelimit denial messages
Nathan Lynch
- [PATCH] lockdown: ratelimit denial messages
Paul Moore
- [PATCH] lockdown: ratelimit denial messages
Paul Moore
- [PATCH] security/keys: Remove inconsistent __user annotation
Vincenzo Frascino
- [PATCH] security/keys: Remove inconsistent __user annotation
Randy Dunlap
- [PATCH] security/keys: Remove inconsistent __user annotation
Paul Moore
- [PATCH] security/keys: Remove inconsistent __user annotation
Jarkko Sakkinen
- [PATCH] security/keys: Remove inconsistent __user annotation
Jarkko Sakkinen
- [PATCH] security/keys: Remove inconsistent __user annotation
Jarkko Sakkinen
- [PATCH] security/keys: Remove inconsistent __user annotation
Paul Moore
- [PATCH] security/keys: remove request_key_conswq and keyring_search_instkey() declarations
Gaosheng Cui
- [PATCH] security/keys: remove request_key_conswq and keyring_search_instkey() declarations
Jarkko Sakkinen
- [PATCH] security/keys: remove request_key_conswq and keyring_search_instkey() declarations
cuigaosheng
- [PATCH bpf-next] bpf: use bpf_capable() instead of CAP_SYS_ADMIN for blinding decision
Yauheni Kaliuta
- [PATCH bpf-next] bpf: use bpf_capable() instead of CAP_SYS_ADMIN for blinding decision
patchwork-bot+netdevbpf at kernel.org
- [PATCH linux-next] smack: lsm: remove the unneeded result variable
cgel.zte at gmail.com
- [PATCH linux-next] smack: lsm: remove the unneeded result variable
Casey Schaufler
- [PATCH RFC] LSM: lsm_self_attr system call to get security module attributes
Casey Schaufler
- [PATCH RFC] LSM: lsm_self_attr system call to get security module attributes
Serge E. Hallyn
- [PATCH RFC] LSM: Specify which LSM to display
Casey Schaufler
- [PATCH v1 0/3] Improve Landlock help
Mickaël Salaün
- [PATCH v1 1/3] samples/landlock: Print hints about ABI versions
Mickaël Salaün
- [PATCH v1 1/3] samples/landlock: Print hints about ABI versions
Günther Noack
- [PATCH v1 1/3] samples/landlock: Print hints about ABI versions
Mickaël Salaün
- [PATCH v1 2/3] landlock: Slightly improve documentation and fix spelling
Mickaël Salaün
- [PATCH v1 2/3] landlock: Slightly improve documentation and fix spelling
Günther Noack
- [PATCH v1 2/3] landlock: Slightly improve documentation and fix spelling
Akira Yokosawa
- [PATCH v1 2/3] landlock: Slightly improve documentation and fix spelling
Bagas Sanjaya
- [PATCH v1 2/3] landlock: Slightly improve documentation and fix spelling
Akira Yokosawa
- [PATCH v1 2/3] landlock: Slightly improve documentation and fix spelling
Bagas Sanjaya
- [PATCH v1 2/3] landlock: Slightly improve documentation and fix spelling
Mickaël Salaün
- [PATCH v1 3/3] landlock: Fix documentation style
Mickaël Salaün
- [PATCH v1 3/3] landlock: Fix documentation style
Günther Noack
- [PATCH v1 3/3] landlock: Fix documentation style
Mickaël Salaün
- [PATCH v1 3/3] landlock: Fix documentation style
Mickaël Salaün
- [PATCH v14 00/26] ima: Namespace IMA with audit support in IMA-ns
Stefan Berger
- [PATCH v14 00/26] ima: Namespace IMA with audit support in IMA-ns
Casey Schaufler
- [PATCH v14 00/26] ima: Namespace IMA with audit support in IMA-ns
Stefan Berger
- [PATCH v14 00/26] ima: Namespace IMA with audit support in IMA-ns
Stefan Berger
- [PATCH v14 00/26] ima: Namespace IMA with audit support in IMA-ns
Casey Schaufler
- [PATCH v14 00/26] ima: Namespace IMA with audit support in IMA-ns
Stefan Berger
- [PATCH v14 01/26] securityfs: rework dentry creation
Stefan Berger
- [PATCH v14 02/26] securityfs: Extend securityfs with namespacing support
Stefan Berger
- [PATCH v14 03/26] ima: Define ima_namespace struct and start moving variables into it
Stefan Berger
- [PATCH v14 04/26] ima: Move arch_policy_entry into ima_namespace
Stefan Berger
- [PATCH v14 05/12] KEYS: Move KEY_LOOKUP_ to include/linux/key.h and set KEY_LOOKUP_FLAGS_ALL
Jarkko Sakkinen
- [PATCH v14 05/26] ima: Move ima_htable into ima_namespace
Stefan Berger
- [PATCH v14 06/26] ima: Move measurement list related variables into ima_namespace
Stefan Berger
- [PATCH v14 07/26] ima: Move some IMA policy and filesystem related variables into ima_namespace
Stefan Berger
- [PATCH v14 08/26] ima: Move IMA securityfs files into ima_namespace or onto stack
Stefan Berger
- [PATCH v14 09/26] ima: Move ima_lsm_policy_notifier into ima_namespace
Stefan Berger
- [PATCH v14 10/26] ima: Switch to lazy lsm policy updates for better performance
Stefan Berger
- [PATCH v14 11/26] ima: Define mac_admin_ns_capable() as a wrapper for ns_capable()
Stefan Berger
- [PATCH v14 12/26] ima: Only accept AUDIT rules for non-init_ima_ns namespaces for now
Stefan Berger
- [PATCH v14 13/26] userns: Add pointer to ima_namespace to user_namespace
Stefan Berger
- [PATCH v14 14/26] ima: Implement hierarchical processing of file accesses
Stefan Berger
- [PATCH v14 15/26] ima: Implement ima_free_policy_rules() for freeing of an ima_namespace
Stefan Berger
- [PATCH v14 16/26] ima: Add functions for creating and freeing of an ima_namespace
Stefan Berger
- [PATCH v14 17/26] integrity/ima: Define ns_status for storing namespaced iint data
Stefan Berger
- [PATCH v14 18/26] integrity: Add optional callback function to integrity_inode_free()
Stefan Berger
- [PATCH v14 19/26] ima: Namespace audit status flags
Stefan Berger
- [PATCH v14 20/26] ima: Remove unused iints from the integrity_iint_cache
Stefan Berger
- [PATCH v14 21/26] ima: Setup securityfs for IMA namespace
Stefan Berger
- [PATCH v14 22/26] ima: Introduce securityfs file to activate an IMA namespace
Stefan Berger
- [PATCH v14 23/26] ima: Show owning user namespace's uid and gid when displaying policy
Stefan Berger
- [PATCH v14 24/26] ima: Limit number of policy rules in non-init_ima_ns
Stefan Berger
- [PATCH v14 25/26] ima: Restrict informational audit messages to init_ima_ns
Stefan Berger
- [PATCH v14 26/26] ima: Enable IMA namespaces
Stefan Berger
- [PATCH v15 05/12] KEYS: Move KEY_LOOKUP_ to include/linux/key.h and define KEY_LOOKUP_ALL
Roberto Sassu
- [PATCH v15 12/12] selftests/bpf: Add tests for dynamic pointers parameters in kfuncs
Roberto Sassu
- [PATCH v16 00/12] bpf: Add kfuncs for PKCS#7 signature verification
Roberto Sassu
- [PATCH v16 00/12] bpf: Add kfuncs for PKCS#7 signature verification
Kumar Kartikeya Dwivedi
- [PATCH v16 00/12] bpf: Add kfuncs for PKCS#7 signature verification
Roberto Sassu
- [PATCH v16 00/12] bpf: Add kfuncs for PKCS#7 signature verification
Roberto Sassu
- [PATCH v16 00/12] bpf: Add kfuncs for PKCS#7 signature verification
Kumar Kartikeya Dwivedi
- [PATCH v16 00/12] bpf: Add kfuncs for PKCS#7 signature verification
Roberto Sassu
- [PATCH v16 01/12] bpf: Allow kfuncs to be used in LSM programs
Roberto Sassu
- [PATCH v16 01/12] bpf: Allow kfuncs to be used in LSM programs
Kumar Kartikeya Dwivedi
- [PATCH v16 02/12] bpf: Move dynptr type check to is_dynptr_type_expected()
Roberto Sassu
- [PATCH v16 02/12] bpf: Move dynptr type check to is_dynptr_type_expected()
Kumar Kartikeya Dwivedi
- [PATCH v16 03/12] btf: Allow dynamic pointer parameters in kfuncs
Roberto Sassu
- [PATCH v16 03/12] btf: Allow dynamic pointer parameters in kfuncs
Kumar Kartikeya Dwivedi
- [PATCH v16 04/12] bpf: Export bpf_dynptr_get_size()
Roberto Sassu
- [PATCH v16 04/12] bpf: Export bpf_dynptr_get_size()
Kumar Kartikeya Dwivedi
- [PATCH v16 04/12] bpf: Export bpf_dynptr_get_size()
Hou Tao
- [PATCH v16 05/12] KEYS: Move KEY_LOOKUP_ to include/linux/key.h and define KEY_LOOKUP_ALL
Roberto Sassu
- [PATCH v16 05/12] KEYS: Move KEY_LOOKUP_ to include/linux/key.h and define KEY_LOOKUP_ALL
Jarkko Sakkinen
- [PATCH v16 05/12] KEYS: Move KEY_LOOKUP_ to include/linux/key.h and define KEY_LOOKUP_ALL
Roberto Sassu
- [PATCH v16 05/12] KEYS: Move KEY_LOOKUP_ to include/linux/key.h and define KEY_LOOKUP_ALL
Jarkko Sakkinen
- [PATCH v16 05/12] KEYS: Move KEY_LOOKUP_ to include/linux/key.h and define KEY_LOOKUP_ALL
Roberto Sassu
- [PATCH v16 05/12] KEYS: Move KEY_LOOKUP_ to include/linux/key.h and define KEY_LOOKUP_ALL
Jarkko Sakkinen
- [PATCH v16 06/12] bpf: Add bpf_lookup_*_key() and bpf_key_put() kfuncs
Roberto Sassu
- [PATCH v16 06/12] bpf: Add bpf_lookup_*_key() and bpf_key_put() kfuncs
Kumar Kartikeya Dwivedi
- [PATCH v16 06/12] bpf: Add bpf_lookup_*_key() and bpf_key_put() kfuncs
Roberto Sassu
- [PATCH v16 06/12] bpf: Add bpf_lookup_*_key() and bpf_key_put() kfuncs
Alexei Starovoitov
- [PATCH v16 06/12] bpf: Add bpf_lookup_*_key() and bpf_key_put() kfuncs
Roberto Sassu
- [PATCH v16 07/12] bpf: Add bpf_verify_pkcs7_signature() kfunc
Roberto Sassu
- [PATCH v16 07/12] bpf: Add bpf_verify_pkcs7_signature() kfunc
Kumar Kartikeya Dwivedi
- [PATCH v16 07/12] bpf: Add bpf_verify_pkcs7_signature() kfunc
Roberto Sassu
- [PATCH v16 07/12] bpf: Add bpf_verify_pkcs7_signature() kfunc
Kumar Kartikeya Dwivedi
- [PATCH v16 07/12] bpf: Add bpf_verify_pkcs7_signature() kfunc
Roberto Sassu
- [PATCH v16 07/12] bpf: Add bpf_verify_pkcs7_signature() kfunc
Kumar Kartikeya Dwivedi
- [PATCH v16 08/12] selftests/bpf: Compile kernel with everything as built-in
Roberto Sassu
- [PATCH v16 08/12] selftests/bpf: Compile kernel with everything as built-in
Kumar Kartikeya Dwivedi
- [PATCH v16 09/12] selftests/bpf: Add verifier tests for bpf_lookup_*_key() and bpf_key_put()
Roberto Sassu
- [PATCH v16 09/12] selftests/bpf: Add verifier tests for bpf_lookup_*_key() and bpf_key_put()
Kumar Kartikeya Dwivedi
- [PATCH v16 10/12] selftests/bpf: Add additional tests for bpf_lookup_*_key()
Roberto Sassu
- [PATCH v16 11/12] selftests/bpf: Add test for bpf_verify_pkcs7_signature() kfunc
Roberto Sassu
- [PATCH v16 12/12] selftests/bpf: Add tests for dynamic pointers parameters in kfuncs
Roberto Sassu
- [PATCH v16 12/12] selftests/bpf: Add tests for dynamic pointers parameters in kfuncs
Kumar Kartikeya Dwivedi
- [PATCH v16 12/12] selftests/bpf: Add tests for dynamic pointers parameters in kfuncs
Roberto Sassu
- [PATCH v16 12/12] selftests/bpf: Add tests for dynamic pointers parameters in kfuncs
Kumar Kartikeya Dwivedi
- [PATCH v17 00/12] bpf: Add kfuncs for PKCS#7 signature verification
Roberto Sassu
- [PATCH v17 01/12] bpf: Allow kfuncs to be used in LSM programs
Roberto Sassu
- [PATCH v17 02/12] bpf: Move dynptr type check to is_dynptr_type_expected()
Roberto Sassu
- [PATCH v17 03/12] btf: Allow dynamic pointer parameters in kfuncs
Roberto Sassu
- [PATCH v17 04/12] bpf: Export bpf_dynptr_get_size()
Roberto Sassu
- [PATCH v17 05/12] KEYS: Move KEY_LOOKUP_ to include/linux/key.h and define KEY_LOOKUP_ALL
Roberto Sassu
- [PATCH v17 05/12] KEYS: Move KEY_LOOKUP_ to include/linux/key.h and define KEY_LOOKUP_ALL
Jarkko Sakkinen
- [PATCH v17 05/12] KEYS: Move KEY_LOOKUP_ to include/linux/key.h and define KEY_LOOKUP_ALL
Roberto Sassu
- [PATCH v17 05/12] KEYS: Move KEY_LOOKUP_ to include/linux/key.h and define KEY_LOOKUP_ALL
Roberto Sassu
- [PATCH v17 06/12] bpf: Add bpf_lookup_*_key() and bpf_key_put() kfuncs
Roberto Sassu
- [PATCH v17 06/12] bpf: Add bpf_lookup_*_key() and bpf_key_put() kfuncs
Song Liu
- [PATCH v17 07/12] bpf: Add bpf_verify_pkcs7_signature() kfunc
Roberto Sassu
- [PATCH v17 07/12] bpf: Add bpf_verify_pkcs7_signature() kfunc
Song Liu
- [PATCH v17 07/12] bpf: Add bpf_verify_pkcs7_signature() kfunc
KP Singh
- [PATCH v17 07/12] bpf: Add bpf_verify_pkcs7_signature() kfunc
Kumar Kartikeya Dwivedi
- [PATCH v17 08/12] selftests/bpf: Compile kernel with everything as built-in
Roberto Sassu
- [PATCH v17 09/12] selftests/bpf: Add verifier tests for bpf_lookup_*_key() and bpf_key_put()
Roberto Sassu
- [PATCH v17 10/12] selftests/bpf: Add additional tests for bpf_lookup_*_key()
Roberto Sassu
- [PATCH v17 11/12] selftests/bpf: Add test for bpf_verify_pkcs7_signature() kfunc
Roberto Sassu
- [PATCH v17 11/12] selftests/bpf: Add test for bpf_verify_pkcs7_signature() kfunc
KP Singh
- [PATCH v17 11/12] selftests/bpf: Add test for bpf_verify_pkcs7_signature() kfunc
Roberto Sassu
- [PATCH v17 11/12] selftests/bpf: Add test for bpf_verify_pkcs7_signature() kfunc
Roberto Sassu
- [PATCH v17 11/12] selftests/bpf: Add test for bpf_verify_pkcs7_signature() kfunc
Yonghong Song
- [PATCH v17 11/12] selftests/bpf: Add test for bpf_verify_pkcs7_signature() kfunc
Yonghong Song
- [PATCH v17 12/12] selftests/bpf: Add tests for dynamic pointers parameters in kfuncs
Roberto Sassu
- [PATCH v17 12/12] selftests/bpf: Add tests for dynamic pointers parameters in kfuncs
Kumar Kartikeya Dwivedi
- [PATCH v17 12/12] selftests/bpf: Add tests for dynamic pointers parameters in kfuncs
Roberto Sassu
- [PATCH v18 00/13] bpf: Add kfuncs for PKCS#7 signature verification
Roberto Sassu
- [PATCH v18 00/13] bpf: Add kfuncs for PKCS#7 signature verification
patchwork-bot+netdevbpf at kernel.org
- [PATCH v18 01/13] bpf: Allow kfuncs to be used in LSM programs
Roberto Sassu
- [PATCH v18 02/13] btf: Export bpf_dynptr definition
Roberto Sassu
- [PATCH v18 02/13] btf: Export bpf_dynptr definition
Yonghong Song
- [PATCH v18 02/13] btf: Export bpf_dynptr definition
Roberto Sassu
- [PATCH v18 02/13] btf: Export bpf_dynptr definition
KP Singh
- [PATCH v18 02/13] btf: Export bpf_dynptr definition
patchwork-bot+netdevbpf at kernel.org
- [PATCH v18 03/13] bpf: Move dynptr type check to is_dynptr_type_expected()
Roberto Sassu
- [PATCH v18 04/13] btf: Allow dynamic pointer parameters in kfuncs
Roberto Sassu
- [PATCH v18 05/13] bpf: Export bpf_dynptr_get_size()
Roberto Sassu
- [PATCH v18 06/13] KEYS: Move KEY_LOOKUP_ to include/linux/key.h and define KEY_LOOKUP_ALL
Roberto Sassu
- [PATCH v18 07/13] bpf: Add bpf_lookup_*_key() and bpf_key_put() kfuncs
Roberto Sassu
- [PATCH v18 08/13] bpf: Add bpf_verify_pkcs7_signature() kfunc
Roberto Sassu
- [PATCH v18 09/13] selftests/bpf: Compile kernel with everything as built-in
Roberto Sassu
- [PATCH v18 10/13] selftests/bpf: Add verifier tests for bpf_lookup_*_key() and bpf_key_put()
Roberto Sassu
- [PATCH v18 11/13] selftests/bpf: Add additional tests for bpf_lookup_*_key()
Roberto Sassu
- [PATCH v18 12/13] selftests/bpf: Add test for bpf_verify_pkcs7_signature() kfunc
Roberto Sassu
- [PATCH v18 13/13] selftests/bpf: Add tests for dynamic pointers parameters in kfuncs
Roberto Sassu
- [PATCH v1] ksmbd: Fix user namespace mapping
Mickaël Salaün
- [PATCH v1] ksmbd: Fix user namespace mapping
Christian Brauner
- [PATCH v1] ksmbd: Fix user namespace mapping
Mickaël Salaün
- [PATCH v1] ksmbd: Fix user namespace mapping
Namjae Jeon
- [PATCH v1] ksmbd: Fix user namespace mapping
Christian Brauner
- [PATCH v1] selftests/landlock: Fix out-of-tree builds
Mickaël Salaün
- [PATCH v1] selftests/landlock: Fix out-of-tree builds
Mickaël Salaün
- [PATCH v1] selftests/landlock: Fix out-of-tree builds
Mickaël Salaün
- [PATCH v1] selftests/landlock: Fix out-of-tree builds
Mickaël Salaün
- [PATCH v1] selftests/landlock: Fix out-of-tree builds
Shuah Khan
- [PATCH v1] selftests: Use optional USERCFLAGS and USERLDFLAGS
Mickaël Salaün
- [PATCH v2 0/2] powerpc/pseries: restrict error injection and DT changes when locked down
Nathan Lynch
- [PATCH v2 00/10] Encrypted Hibernation
Evan Green
- [PATCH v2 00/10] Encrypted Hibernation
Evan Green
- [PATCH v2 00/10] Encrypted Hibernation
Kees Cook
- [PATCH v2 00/10] Encrypted Hibernation
Jason Gunthorpe
- [PATCH v2 00/30] acl: add vfs posix acl api
Christian Brauner
- [PATCH v2 00/30] acl: add vfs posix acl api
Casey Schaufler
- [PATCH v2 00/30] acl: add vfs posix acl api
Christoph Hellwig
- [PATCH v2 00/30] acl: add vfs posix acl api
Christian Brauner
- [PATCH v2 00/30] acl: add vfs posix acl api
Casey Schaufler
- [PATCH v2 00/30] acl: add vfs posix acl api
Seth Forshee
- [PATCH v2 00/30] acl: add vfs posix acl api
Casey Schaufler
- [PATCH v2 00/30] acl: add vfs posix acl api
Paul Moore
- [PATCH v2 00/30] acl: add vfs posix acl api
Casey Schaufler
- [PATCH v2 01/30] orangefs: rework posix acl handling when creating new filesystem objects
Christian Brauner
- [PATCH v2 02/30] fs: pass dentry to set acl method
Christian Brauner
- [PATCH v2 03/10] security: keys: trusted: Include TPM2 creation data
Kees Cook
- [PATCH v2 03/10] security: keys: trusted: Include TPM2 creation data
Evan Green
- [PATCH v2 03/30] fs: rename current get acl method
Christian Brauner
- [PATCH v2 04/30] fs: add new get acl method
Christian Brauner
- [PATCH v2 05/10] security: keys: trusted: Verify creation data
Kees Cook
- [PATCH v2 05/10] security: keys: trusted: Verify creation data
Evan Green
- [PATCH v2 05/30] cifs: implement get acl method
Christian Brauner
- [PATCH v2 06/30] cifs: implement set acl method
Christian Brauner
- [PATCH v2 07/30] 9p: implement get acl method
Christian Brauner
- [PATCH v2 08/30] 9p: implement set acl method
Christian Brauner
- [PATCH v2 09/30] acl: add vfs_set_acl()
Christian Brauner
- [PATCHv2 1/1] efi: Correct Macmini DMI match in uefi cert quirk
Orlando Chamberlain
- [PATCH v2 1/2] powerpc/pseries: block untrusted device tree changes when locked down
Nathan Lynch
- [PATCH v2 1/2] powerpc/pseries: block untrusted device tree changes when locked down
Paul Moore
- [PATCH v2 1/2] powerpc/pseries: block untrusted device tree changes when locked down
Andrew Donnellan
- [PATCH v2 10/30] security: add set acl hook
Christian Brauner
- [PATCH v2 10/30] security: add set acl hook
Paul Moore
- [PATCH v2 11/30] selinux: implement set acl hook
Christian Brauner
- [PATCH v2 11/30] selinux: implement set acl hook
Paul Moore
- [PATCH v2 12/30] smack: implement set acl hook
Christian Brauner
- [PATCH v2 12/30] smack: implement set acl hook
Paul Moore
- [PATCH v2 12/30] smack: implement set acl hook
Casey Schaufler
- [PATCH v2 13/30] evm: implement set acl hook
Christian Brauner
- [PATCH v2 13/30] evm: implement set acl hook
Paul Moore
- [PATCH v2 14/30] acl: use set acl hook
Christian Brauner
- [PATCH v2 14/30] acl: use set acl hook
Paul Moore
- [PATCH v2 15/30] evm: add post set acl hook
Christian Brauner
- [PATCH v2 15/30] evm: add post set acl hook
Paul Moore
- [PATCH v2 16/30] acl: add vfs_get_acl()
Christian Brauner
- [PATCH v2 16/30] acl: add vfs_get_acl()
Paul Moore
- [PATCH v2 16/30] acl: add vfs_get_acl()
Christian Brauner
- [PATCH v2 16/30] acl: add vfs_get_acl()
Paul Moore
- [PATCH v2 16/30] acl: add vfs_get_acl()
Christian Brauner
- [PATCH v2 16/30] acl: add vfs_get_acl()
Paul Moore
- [PATCH v2 17/30] acl: add vfs_remove_acl()
Christian Brauner
- [PATCH v2 17/30] acl: add vfs_remove_acl()
Paul Moore
- [PATCH v2 17/30] acl: add vfs_remove_acl()
Christian Brauner
- [PATCH v2 18/30] evm: simplify evm_xattr_acl_change()
Christian Brauner
- [PATCH v2 18/30] evm: simplify evm_xattr_acl_change()
Paul Moore
- [PATCH v2 18/30] evm: simplify evm_xattr_acl_change()
Christian Brauner
- [PATCH v2 19/30] ksmbd: use vfs_remove_acl()
Christian Brauner
- [PATCH v2 2/2] powerpc/rtas: block error injection when locked down
Nathan Lynch
- [PATCH v2 2/2] powerpc/rtas: block error injection when locked down
Paul Moore
- [PATCH v2 2/2] powerpc/rtas: block error injection when locked down
Andrew Donnellan
- [PATCH v2 2/2] powerpc/rtas: block error injection when locked down
Nathan Lynch
- [PATCH v2 20/30] ecryptfs: implement get acl method
Christian Brauner
- [PATCH v2 21/30] ecryptfs: implement set acl method
Christian Brauner
- [PATCH v2 22/30] ovl: implement get acl method
Christian Brauner
- [PATCH v2 23/30] ovl: implement set acl method
Christian Brauner
- [PATCH v2 24/30] ovl: use posix acl api
Christian Brauner
- [PATCH v2 25/30] xattr: use posix acl api
Christian Brauner
- [PATCH v2 26/30] ecryptfs: use stub posix acl handlers
Christian Brauner
- [PATCH v2 27/30] ovl: use stub posix acl handlers
Christian Brauner
- [PATCH v2 28/30] cifs: use stub posix acl handlers
Christian Brauner
- [PATCH v2 29/30] 9p: use stub posix acl handlers
Christian Brauner
- [PATCH v2 30/30] acl: remove a slew of now unused helpers
Christian Brauner
- [PATCH v2] apparmor: Simplify obtain the newest label on a cred
Gaosheng Cui
- [PATCH v2] KEYS: Remove orphan declarations from security/keys/internal.h
Gaosheng Cui
- [PATCH v2] KEYS: Remove orphan declarations from security/keys/internal.h
Jarkko Sakkinen
- [PATCHv2 RESEND] efi: Correct Macmini DMI match in uefi cert quirk
Orlando Chamberlain
- [PATCHv2 RESEND] efi: Correct Macmini DMI match in uefi cert quirk
Mimi Zohar
- [PATCH v2 RFC] LSM: lsm_self_attr syscall for LSM self attributes
Casey Schaufler
- [PATCH v3 00/11] Encrypted Hibernation
Evan Green
- [PATCH v3 00/29] acl: add vfs posix acl api
Christian Brauner
- [PATCH v3 01/29] orangefs: rework posix acl handling when creating new filesystem objects
Christian Brauner
- [PATCH v3 01/29] orangefs: rework posix acl handling when creating new filesystem objects
Christoph Hellwig
- [PATCH v3 02/29] fs: pass dentry to set acl method
Christian Brauner
- [PATCH v3 02/29] fs: pass dentry to set acl method
Christoph Hellwig
- [PATCH v3 02/29] fs: pass dentry to set acl method
Christian Brauner
- [PATCH v3 03/29] fs: rename current get acl method
Christian Brauner
- [PATCH v3 03/29] fs: rename current get acl method
Christoph Hellwig
- [PATCH v3 03/29] fs: rename current get acl method
Christian Brauner
- [PATCH v3 04/11] security: keys: trusted: Include TPM2 creation data
Evan Green
- [PATCH v3 04/29] fs: add new get acl method
Christian Brauner
- [PATCH v3 05/11] security: keys: trusted: Allow storage of PCR values in creation data
Evan Green
- [PATCH v3 05/11] security: keys: trusted: Allow storage of PCR values in creation data
Ben Boeckel
- [PATCH v3 05/29] cifs: implement get acl method
Christian Brauner
- [PATCH v3 06/11] security: keys: trusted: Verify creation data
Evan Green
- [PATCH v3 06/29] cifs: implement set acl method
Christian Brauner
- [PATCH v3 07/29] 9p: implement get acl method
Christian Brauner
- [PATCH v3 08/29] 9p: implement set acl method
Christian Brauner
- [PATCH v3 09/29] security: add get, remove and set acl hook
Christian Brauner
- [PATCH v3 1/8] capability: add any wrapper to test for multiple caps with exactly one audit message
Paul Moore
- [PATCH v3 1/8] capability: add any wrapper to test for multiple caps with exactly one audit message
Paul Moore
- [PATCH v3 10/29] selinux: implement get, set and remove acl hook
Christian Brauner
- [PATCH v3 11/29] smack: implement get, set and remove acl hook
Christian Brauner
- [PATCH v3 11/29] smack: implement get, set and remove acl hook
Casey Schaufler
- [PATCH v3 12/29] integrity: implement get and set acl hook
Christian Brauner
- [PATCH v3 12/29] integrity: implement get and set acl hook
Mimi Zohar
- [PATCH v3 12/29] integrity: implement get and set acl hook
Christian Brauner
- [PATCH v3 13/29] evm: add post set acl hook
Christian Brauner
- [PATCH v3 14/29] acl: add vfs_set_acl()
Christian Brauner
- [PATCH v3 14/29] acl: add vfs_set_acl()
Christoph Hellwig
- [PATCH v3 14/29] acl: add vfs_set_acl()
Christian Brauner
- [PATCH v3 14/29] acl: add vfs_set_acl()
Christian Brauner
- [PATCH v3 15/29] acl: add vfs_get_acl()
Christian Brauner
- [PATCH v3 16/29] acl: add vfs_remove_acl()
Christian Brauner
- [PATCH v3 17/29] ksmbd: use vfs_remove_acl()
Christian Brauner
- [PATCH v3 18/29] ecryptfs: implement get acl method
Christian Brauner
- [PATCH v3 19/29] ecryptfs: implement set acl method
Christian Brauner
- [PATCH v3 20/29] ovl: implement get acl method
Christian Brauner
- [PATCH v3 21/29] ovl: implement set acl method
Christian Brauner
- [PATCH v3 22/29] ovl: use posix acl api
Christian Brauner
- [PATCH v3 23/29] xattr: use posix acl api
Christian Brauner
- [PATCH v3 23/29] xattr: use posix acl api
Christoph Hellwig
- [PATCH v3 23/29] xattr: use posix acl api
Christian Brauner
- [PATCH v3 23/29] xattr: use posix acl api
Christian Brauner
- [PATCH v3 23/29] xattr: use posix acl api
Christoph Hellwig
- [PATCH v3 23/29] xattr: use posix acl api
Christian Brauner
- [PATCH v3 24/29] evm: remove evm_xattr_acl_change()
Christian Brauner
- [PATCH v3 25/29] ecryptfs: use stub posix acl handlers
Christian Brauner
- [PATCH v3 26/29] ovl: use stub posix acl handlers
Christian Brauner
- [PATCH v3 27/29] cifs: use stub posix acl handlers
Christian Brauner
- [PATCH v3 27/29] cifs: use stub posix acl handlers
Christian Brauner
- [PATCH v3 28/29] 9p: use stub posix acl handlers
Christian Brauner
- [PATCH v3 29/29] acl: remove a slew of now unused helpers
Christian Brauner
- [PATCH v3 29/29] acl: remove a slew of now unused helpers
Christoph Hellwig
- [PATCH v3 29/29] acl: remove a slew of now unused helpers
Christian Brauner
- [PATCH v3 29/29] acl: remove a slew of now unused helpers
Christoph Hellwig
- [PATCH v3 29/29] acl: remove a slew of now unused helpers
Christian Brauner
- [PATCH v38 00/39] LSM: Module stacking for AppArmor
Casey Schaufler
- [PATCH v38 01/39] LSM: Identify modules by more than name
Casey Schaufler
- [PATCH v38 02/39] LSM: Add an LSM identifier for external use
Casey Schaufler
- [PATCH v38 03/39] LSM: Identify the process attributes for each module
Casey Schaufler
- [PATCH v38 04/39] LSM: Maintain a table of LSM attribute data
Casey Schaufler
- [PATCH v38 05/39] proc: Use lsmids instead of lsm names for attrs
Casey Schaufler
- [PATCH v38 06/39] LSM: lsm_self_attr syscall for LSM self attributes
Casey Schaufler
- [PATCH v38 06/39] LSM: lsm_self_attr syscall for LSM self attributes
kernel test robot
- [PATCH v38 07/39] integrity: disassociate ima_filter_rule from security_audit_rule
Casey Schaufler
- [PATCH v38 08/39] LSM: Infrastructure management of the sock security
Casey Schaufler
- [PATCH v38 09/39] LSM: Add the lsmblob data structure.
Casey Schaufler
- [PATCH v38 10/39] LSM: provide lsm name and id slot mappings
Casey Schaufler
- [PATCH v38 11/39] IMA: avoid label collisions with stacked LSMs
Casey Schaufler
- [PATCH v38 12/39] LSM: Use lsmblob in security_audit_rule_match
Casey Schaufler
- [PATCH v38 13/39] LSM: Use lsmblob in security_kernel_act_as
Casey Schaufler
- [PATCH v38 14/39] LSM: Use lsmblob in security_secctx_to_secid
Casey Schaufler
- [PATCH v38 15/39] LSM: Use lsmblob in security_secid_to_secctx
Casey Schaufler
- [PATCH v38 16/39] LSM: Use lsmblob in security_ipc_getsecid
Casey Schaufler
- [PATCH v38 17/39] LSM: Use lsmblob in security_current_getsecid
Casey Schaufler
- [PATCH v38 18/39] LSM: Use lsmblob in security_inode_getsecid
Casey Schaufler
- [PATCH v38 19/39] LSM: Use lsmblob in security_cred_getsecid
Casey Schaufler
- [PATCH v38 20/39] LSM: Specify which LSM to display
Casey Schaufler
- [PATCH v38 21/39] LSM: Ensure the correct LSM context releaser
Casey Schaufler
- [PATCH v38 22/39] LSM: Use lsmcontext in security_secid_to_secctx
Casey Schaufler
- [PATCH v38 23/39] LSM: Use lsmcontext in security_inode_getsecctx
Casey Schaufler
- [PATCH v38 24/39] Use lsmcontext in security_dentry_init_security
Casey Schaufler
- [PATCH v38 25/39] LSM: security_secid_to_secctx in netlink netfilter
Casey Schaufler
- [PATCH v38 26/39] NET: Store LSM netlabel data in a lsmblob
Casey Schaufler
- [PATCH v38 27/39] binder: Pass LSM identifier for confirmation
Casey Schaufler
- [PATCH v38 28/39] LSM: security_secid_to_secctx module selection
Casey Schaufler
- [PATCH v38 29/39] Audit: Keep multiple LSM data in audit_names
Casey Schaufler
- [PATCH v38 30/39] Audit: Create audit_stamp structure
Casey Schaufler
- [PATCH v38 31/39] LSM: Add a function to report multiple LSMs
Casey Schaufler
- [PATCH v38 32/39] Audit: Allow multiple records in an audit_buffer
Casey Schaufler
- [PATCH v38 33/39] Audit: Add record for multiple task security contexts
Casey Schaufler
- [PATCH v38 34/39] audit: multiple subject lsm values for netlabel
Casey Schaufler
- [PATCH v38 35/39] Audit: Add record for multiple object contexts
Casey Schaufler
- [PATCH v38 36/39] netlabel: Use a struct lsmblob in audit data
Casey Schaufler
- [PATCH v38 37/39] LSM: Removed scaffolding function lsmcontext_init
Casey Schaufler
- [PATCH v38 38/39] AppArmor: Remove the exclusive flag
Casey Schaufler
- [PATCH v38 39/39] LSM: Create lsm_module_list system call
Casey Schaufler
- [PATCH v38 39/39] LSM: Create lsm_module_list system call
kernel test robot
- [PATCH v4 0/2] ima: Handle -ESTALE returned by ima_filter_rule_match()
GUO Zihua
- [PATCH v4 00/30] acl: add vfs posix acl api
Christian Brauner
- [PATCH v4 01/30] orangefs: rework posix acl handling when creating new filesystem objects
Christian Brauner
- [PATCH v4 02/30] fs: pass dentry to set acl method
Christian Brauner
- [PATCH v4 03/30] fs: rename current get acl method
Christian Brauner
- [PATCH v4 04/30] fs: add new get acl method
Christian Brauner
- [PATCH v4 04/30] fs: add new get acl method
Miklos Szeredi
- [PATCH v4 04/30] fs: add new get acl method
Christian Brauner
- [PATCH v4 04/30] fs: add new get acl method
Miklos Szeredi
- [PATCH v4 04/30] fs: add new get acl method
Christian Brauner
- [PATCH v4 04/30] fs: add new get acl method
Miklos Szeredi
- [PATCH v4 04/30] fs: add new get acl method
Christian Brauner
- [PATCH v4 04/30] fs: add new get acl method
Miklos Szeredi
- [PATCH v4 04/30] fs: add new get acl method
Christian Brauner
- [PATCH v4 05/30] cifs: implement get acl method
Christian Brauner
- [PATCH v4 06/30] cifs: implement set acl method
Christian Brauner
- [PATCH v4 07/30] 9p: implement get acl method
Christian Brauner
- [PATCH v4 08/30] 9p: implement set acl method
Christian Brauner
- [PATCH v4 09/30] security: add get, remove and set acl hook
Christian Brauner
- [PATCH v4 09/30] security: add get, remove and set acl hook
Paul Moore
- [PATCH v4 1/2] ima: Simplify ima_lsm_copy_rule
GUO Zihua
- [PATCH v4 1/2] ima: Simplify ima_lsm_copy_rule
Mimi Zohar
- [PATCH v4 10/30] selinux: implement get, set and remove acl hook
Christian Brauner
- [PATCH v4 10/30] selinux: implement get, set and remove acl hook
Paul Moore
- [PATCH v4 10/30] selinux: implement get, set and remove acl hook
Christian Brauner
- [PATCH v4 11/30] smack: implement get, set and remove acl hook
Christian Brauner
- [PATCH v4 11/30] smack: implement get, set and remove acl hook
Paul Moore
- [PATCH v4 11/30] smack: implement get, set and remove acl hook
Christian Brauner
- [PATCH v4 12/30] integrity: implement get and set acl hook
Christian Brauner
- [PATCH v4 12/30] integrity: implement get and set acl hook
Paul Moore
- [PATCH v4 12/30] integrity: implement get and set acl hook
Mimi Zohar
- [PATCH v4 12/30] integrity: implement get and set acl hook
Christian Brauner
- [PATCH v4 12/30] integrity: implement get and set acl hook
Paul Moore
- [PATCH v4 13/30] evm: add post set acl hook
Christian Brauner
- [PATCH v4 13/30] evm: add post set acl hook
Mimi Zohar
- [PATCH v4 13/30] evm: add post set acl hook
Mimi Zohar
- [PATCH v4 13/30] evm: add post set acl hook
Christian Brauner
- [PATCH v4 13/30] evm: add post set acl hook
Mimi Zohar
- [PATCH v4 14/30] internal: add may_write_xattr()
Christian Brauner
- [PATCH v4 15/30] acl: add vfs_set_acl()
Christian Brauner
- [PATCH v4 16/30] acl: add vfs_get_acl()
Christian Brauner
- [PATCH v4 17/30] acl: add vfs_remove_acl()
Christian Brauner
- [PATCH v4 18/30] ksmbd: use vfs_remove_acl()
Christian Brauner
- [PATCH v4 19/30] ecryptfs: implement get acl method
Christian Brauner
- [PATCH v4 2/2] ima: Handle -ESTALE returned by ima_filter_rule_match()
GUO Zihua
- [PATCH v4 2/2] ima: Handle -ESTALE returned by ima_filter_rule_match()
Mimi Zohar
- [PATCH v4 2/2] ima: Handle -ESTALE returned by ima_filter_rule_match()
Guozihua (Scott)
- [PATCH v4 20/30] ecryptfs: implement set acl method
Christian Brauner
- [PATCH v4 21/30] ovl: implement get acl method
Christian Brauner
- [PATCH v4 22/30] ovl: implement set acl method
Christian Brauner
- [PATCH v4 23/30] ovl: use posix acl api
Christian Brauner
- [PATCH v4 24/30] xattr: use posix acl api
Christian Brauner
- [PATCH v4 25/30] evm: remove evm_xattr_acl_change()
Christian Brauner
- [PATCH v4 26/30] ecryptfs: use stub posix acl handlers
Christian Brauner
- [PATCH v4 27/30] ovl: use stub posix acl handlers
Christian Brauner
- [PATCH v4 28/30] cifs: use stub posix acl handlers
Christian Brauner
- [PATCH v4 29/30] 9p: use stub posix acl handlers
Christian Brauner
- [PATCH v4 30/30] acl: remove a slew of now unused helpers
Christian Brauner
- [PATCH v4] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing
Al Viro
- [PATCH v4] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing
David Howells
- [PATCH v4] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing
Anna Schumaker
- [PATCH v4] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing
David Howells
- [PATCH v5 0/2] ima: Handle -ESTALE returned by ima_filter_rule_match()
GUO Zihua
- [PATCH v5 0/4] Introduce security_create_user_ns()
Serge E. Hallyn
- [PATCH v5 0/4] landlock: truncate support
Mickaël Salaün
- [PATCH v5 0/4] landlock: truncate support
Günther Noack
- [PATCH v5 0/4] landlock: truncate support
Günther Noack
- [PATCH v5 0/4] landlock: truncate support
Mickaël Salaün
- [PATCH v5 0/4] landlock: truncate support
xiujianfeng
- [PATCH v5 0/4] landlock: truncate support
Mickaël Salaün
- [PATCH v5 0/4] landlock: truncate support
Günther Noack
- [PATCH v5 0/4] landlock: truncate support
Mickaël Salaün
- [PATCH v5 1/2] ima: Simplify ima_lsm_copy_rule
GUO Zihua
- [PATCH v5 2/2] ima: Handle -ESTALE returned by ima_filter_rule_match()
GUO Zihua
- [PATCH v5 2/2] ima: Handle -ESTALE returned by ima_filter_rule_match()
Mimi Zohar
- [PATCH v5 2/2] ima: Handle -ESTALE returned by ima_filter_rule_match()
Guozihua (Scott)
- [PATCH v5 2/2] ima: Handle -ESTALE returned by ima_filter_rule_match()
Mimi Zohar
- [PATCH v5 2/2] ima: Handle -ESTALE returned by ima_filter_rule_match()
Guozihua (Scott)
- [PATCH v5 2/2] ima: Handle -ESTALE returned by ima_filter_rule_match()
Mimi Zohar
- [PATCH v5] selftests/landlock: Skip overlayfs tests not supported
Jeff Xu
- [PATCH v5] selftests/landlock: Skip overlayfs tests not supported
Mickaël Salaün
- [PATCH v5] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing
David Howells
- [PATCH v5] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing
Christian Brauner
- [PATCH v5] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing
Jeff Layton
- [PATCH v5] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing
David Howells
- [PATCH v5] vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing
Jeff Layton
- [PATCH v6 0/5] landlock: truncate support
Günther Noack
- [PATCH v6 1/5] security: create file_truncate hook from path_truncate hook
Günther Noack
- [PATCH v6 1/5] security: create file_truncate hook from path_truncate hook
Paul Moore
- [PATCH v6 1/5] security: create file_truncate hook from path_truncate hook
Günther Noack
- [PATCH v6 1/5] security: create file_truncate hook from path_truncate hook
Günther Noack
- [PATCH v6 1/5] security: create file_truncate hook from path_truncate hook
Tetsuo Handa
- [PATCH v6 1/5] security: create file_truncate hook from path_truncate hook
John Johansen
- [PATCH v6 1/5] security: create file_truncate hook from path_truncate hook
Mickaël Salaün
- [PATCH v6 1/5] security: create file_truncate hook from path_truncate hook
Mickaël Salaün
- [PATCH v6 1/5] security: create file_truncate hook from path_truncate hook
Günther Noack
- [PATCH v6 1/5] security: create file_truncate hook from path_truncate hook
Mickaël Salaün
- [PATCH v6 1/5] security: create file_truncate hook from path_truncate hook
Namjae Jeon
- [PATCH v6 2/5] landlock: Support file truncation
Günther Noack
- [PATCH v6 2/5] landlock: Support file truncation
Mickaël Salaün
- [PATCH v6 2/5] landlock: Support file truncation
Günther Noack
- [PATCH v6 2/5] landlock: Support file truncation
Mickaël Salaün
- [PATCH v6 2/5] landlock: Support file truncation
Günther Noack
- [PATCH v6 2/5] landlock: Support file truncation
Mickaël Salaün
- [PATCH v6 2/5] landlock: Support file truncation
Günther Noack
- [PATCH v6 2/5] landlock: Support file truncation
Mickaël Salaün
- [PATCH v6 2/5] landlock: Support file truncation
Günther Noack
- [PATCH v6 2/5] landlock: Support file truncation
Mickaël Salaün
- [PATCH v6 2/5] landlock: Support file truncation
Günther Noack
- [PATCH v6 2/5] landlock: Support file truncation
Mickaël Salaün
- [PATCH v6 3/5] selftests/landlock: Selftests for file truncation support
Günther Noack
- [PATCH v6 3/5] selftests/landlock: Selftests for file truncation support
Mickaël Salaün
- [PATCH v6 3/5] selftests/landlock: Selftests for file truncation support
Günther Noack
- [PATCH v6 3/5] selftests/landlock: Selftests for file truncation support
Mickaël Salaün
- [PATCH v6 3/5] selftests/landlock: Selftests for file truncation support
Günther Noack
- [PATCH v6 4/5] samples/landlock: Extend sample tool to support LANDLOCK_ACCESS_FS_TRUNCATE
Günther Noack
- [PATCH v6 4/5] samples/landlock: Extend sample tool to support LANDLOCK_ACCESS_FS_TRUNCATE
Mickaël Salaün
- [PATCH v6 4/5] samples/landlock: Extend sample tool to support LANDLOCK_ACCESS_FS_TRUNCATE
Günther Noack
- [PATCH v6 5/5] landlock: Document Landlock's file truncation support
Günther Noack
- [PATCH v6 5/5] landlock: Document Landlock's file truncation support
Mickaël Salaün
- [PATCH v6 5/5] landlock: Document Landlock's file truncation support
Günther Noack
- [PATCH v6 5/5] landlock: Document Landlock's file truncation support
Mickaël Salaün
- [PATCH v6 5/5] landlock: Document Landlock's file truncation support
Günther Noack
- [PATCH v6 5/5] landlock: Document Landlock's file truncation support
Mickaël Salaün
- [PATCH v6 5/5] landlock: Document Landlock's file truncation support
Günther Noack
- [PATCH v7 0/7] landlock: truncate support
Günther Noack
- [PATCH v7 01/18] landlock: rename access mask
Mickaël Salaün
- [PATCH v7 01/18] landlock: rename access mask
Konstantin Meskhidze (A)
- [PATCH v7 01/18] landlock: rename access mask
Mickaël Salaün
- [PATCH v7 02/18] landlock: refactor landlock_find_rule/insert_rule
Mickaël Salaün
- [PATCH v7 02/18] landlock: refactor landlock_find_rule/insert_rule
Konstantin Meskhidze (A)
- [PATCH v7 02/18] landlock: refactor landlock_find_rule/insert_rule
Mickaël Salaün
- [PATCH v7 03/18] landlock: refactor merge/inherit_ruleset functions
Mickaël Salaün
- [PATCH v7 03/18] landlock: refactor merge/inherit_ruleset functions
Konstantin Meskhidze (A)
- [PATCH v7 03/18] landlock: refactor merge/inherit_ruleset functions
Mickaël Salaün
- [PATCH v7 04/18] landlock: move helper functions
Mickaël Salaün
- [PATCH v7 04/18] landlock: move helper functions
Konstantin Meskhidze (A)
- [PATCH v7 05/18] landlock: refactor helper functions
Mickaël Salaün
- [PATCH v7 05/18] landlock: refactor helper functions
Konstantin Meskhidze (A)
- [PATCH v7 05/18] landlock: refactor helper functions
Mickaël Salaün
- [PATCH v7 07/18] landlock: user space API network support
Mickaël Salaün
- [PATCH v7 07/18] landlock: user space API network support
Konstantin Meskhidze (A)
- [PATCH v7 08/18] landlock: add network rules support
Mickaël Salaün
- [PATCH v7 08/18] landlock: add network rules support
Konstantin Meskhidze (A)
- [PATCH v7 08/18] landlock: add network rules support
Mickaël Salaün
- [PATCH v7 09/18] landlock: implement TCP network hooks
Mickaël Salaün
- [PATCH v7 09/18] landlock: implement TCP network hooks
Konstantin Meskhidze (A)
- [PATCH v7 09/18] landlock: implement TCP network hooks
Mickaël Salaün
- [PATCH v7 1/7] security: Create file_truncate hook from path_truncate hook
Günther Noack
- [PATCH v7 10/18] seltests/landlock: move helper function
Mickaël Salaün
- [PATCH v7 10/18] seltests/landlock: move helper function
Konstantin Meskhidze (A)
- [PATCH v7 11/18] seltests/landlock: add tests for bind() hooks
Mickaël Salaün
- [PATCH v7 11/18] seltests/landlock: add tests for bind() hooks
Konstantin Meskhidze (A)
- [PATCH v7 13/18] seltests/landlock: add AF_UNSPEC family test
Mickaël Salaün
- [PATCH v7 13/18] seltests/landlock: add AF_UNSPEC family test
Konstantin Meskhidze (A)
- [PATCH v7 14/18] seltests/landlock: add rules overlapping test
Mickaël Salaün
- [PATCH v7 14/18] seltests/landlock: add rules overlapping test
Konstantin Meskhidze (A)
- [PATCH v7 16/18] seltests/landlock: add invalid input data test
Mickaël Salaün
- [PATCH v7 16/18] seltests/landlock: add invalid input data test
Konstantin Meskhidze (A)
- [PATCH v7 16/18] seltests/landlock: add invalid input data test
Mickaël Salaün
- [PATCH v7 17/18] samples/landlock: add network demo
Mickaël Salaün
- [PATCH v7 17/18] samples/landlock: add network demo
Konstantin Meskhidze (A)
- [PATCH v7 17/18] samples/landlock: add network demo
Mickaël Salaün
- [PATCH v7 18/18] landlock: Document Landlock's network support
Mickaël Salaün
- [PATCH v7 18/18] landlock: Document Landlock's network support
Konstantin Meskhidze (A)
- [PATCH v7 18/18] landlock: Document Landlock's network support
Mickaël Salaün
- [PATCH v7 2/7] landlock: Support file truncation
Günther Noack
- [PATCH v7 3/7] selftests/landlock: Selftests for file truncation support
Günther Noack
- [PATCH v7 4/7] selftests/landlock: Test open() and ftruncate() in multiple scenarios
Günther Noack
- [PATCH v7 5/7] selftests/landlock: Test FD passing from a Landlock-restricted to an unrestricted process
Günther Noack
- [PATCH v7 5/7] selftests/landlock: Test FD passing from a Landlock-restricted to an unrestricted process
Günther Noack
- [PATCH v7 6/7] samples/landlock: Extend sample tool to support LANDLOCK_ACCESS_FS_TRUNCATE
Günther Noack
- [PATCH v7 7/7] landlock: Document Landlock's file truncation support
Günther Noack
- [RESEND PATCH v2 0/2] watch_queue: Clean up some code
Siddh Raman Pant
- [RESEND PATCH v2 1/2] include/linux/watch_queue: Improve documentation
Siddh Raman Pant
- [RESEND PATCH v2 2/2] kernel/watch_queue: NULL the dangling *pipe, and use it for clear check
Siddh Raman Pant
- [RFC PATCH 00/29] acl: add vfs posix acl api
Christian Brauner
- [RFC PATCH 00/29] acl: add vfs posix acl api
Casey Schaufler
- [RFC PATCH 00/29] acl: add vfs posix acl api
Paul Moore
- [RFC PATCH 00/29] acl: add vfs posix acl api
Linus Torvalds
- [RFC PATCH 00/29] acl: add vfs posix acl api
Casey Schaufler
- [RFC PATCH 00/29] acl: add vfs posix acl api
Paul Moore
- [RFC PATCH 00/29] acl: add vfs posix acl api
Serge E. Hallyn
- [RFC PATCH 00/29] acl: add vfs posix acl api
Paul Moore
- [RFC PATCH 00/29] acl: add vfs posix acl api
Christoph Hellwig
- [RFC PATCH 00/29] acl: add vfs posix acl api
Christian Brauner
- [RFC PATCH 00/29] acl: add vfs posix acl api
Christian Brauner
- [RFC PATCH 00/29] acl: add vfs posix acl api
Paul Moore
- [RFC PATCH 00/29] acl: add vfs posix acl api
Casey Schaufler
- [RFC PATCH 1/2] fs/xattr: add *at family syscalls
Casey Schaufler
- [RFC PATCH] generic_entry: Add stackleak support
guoren at kernel.org
- [RFC PATCH] generic_entry: Add stackleak support
Mark Rutland
- [RFC PATCH] generic_entry: Add stackleak support
Guo Ren
- [RFC PATCH HBK: 0/8] HW BOUND KEY as TRUSTED KEY
Pankaj Gupta
- [RFC PATCH HBK: 0/8] HW BOUND KEY as TRUSTED KEY
Michael Walle
- [RFC PATCH HBK: 0/8] HW BOUND KEY as TRUSTED KEY
Jarkko Sakkinen
- [RFC PATCH HBK: 1/8] keys-trusted: new cmd line option added
Pankaj Gupta
- [RFC PATCH HBK: 1/8] keys-trusted: new cmd line option added
Ben Boeckel
- [RFC PATCH HBK: 2/8] hw-bound-key: flag-is_hbk added to the tfm
Herbert Xu
- [RFC PATCH HBK: 2/8] hw-bound-key: flag-is_hbk added to the tfm
Pankaj Gupta
- [RFC PATCH HBK: 3/8] sk_cipher: checking for hw bound operation
Pankaj Gupta
- [RFC PATCH HBK: 4/8] keys-trusted: re-factored caam based trusted key
Pankaj Gupta
- [RFC PATCH HBK: 5/8] caam blob-gen: moving blob_priv to caam_drv_private
Pankaj Gupta
- [RFC PATCH HBK: 6/8] KEYS: trusted: caam based black key
Pankaj Gupta
- [RFC PATCH HBK: 6/8] KEYS: trusted: caam based black key
Ben Boeckel
- [RFC PATCH HBK: 7/8] caam alg: symmetric key ciphers are updated
Pankaj Gupta
- [RFC PATCH HBK: 8/8] dm-crypt: consumer-app setting the flag-is_hbk
Pankaj Gupta
- [syzbot] KMSAN: uninit-value in tomoyo_path_chown
syzbot
- [v5.19.y PATCH 0/3] Backport the io_uring/LSM CMD passthrough controls
Paul Moore
- [v5.19.y PATCH 0/3] Backport the io_uring/LSM CMD passthrough controls
Greg KH
- [v5.19.y PATCH 1/3] lsm, io_uring: add LSM hooks for the new uring_cmd file op
Paul Moore
- [v5.19.y PATCH 2/3] selinux: implement the security_uring_cmd() LSM hook
Paul Moore
- [v5.19.y PATCH 3/3] Smack: Provide read control for io_uring_cmd
Paul Moore
- [v5.19.y PATCH 3/3] Smack: Provide read control for io_uring_cmd
Casey Schaufler
- Apply for Loan
Tracy Vornan
- ATTENTION/PROPOSAL
LUMAR CASEY
- Bussines offer Geschäftsangebot.
Abdulkareem Ademola
- Closing the BPF map permission loophole
Roberto Sassu
- Closing the BPF map permission loophole
Toke Høiland-Jørgensen
- Closing the BPF map permission loophole
Roberto Sassu
- Closing the BPF map permission loophole
Paul Moore
- Closing the BPF map permission loophole
Roberto Sassu
- Closing the BPF map permission loophole
Casey Schaufler
- Closing the BPF map permission loophole
Paul Moore
- Closing the BPF map permission loophole
Roberto Sassu
- Closing the BPF map permission loophole
Roberto Sassu
- Closing the BPF map permission loophole
Paul Moore
- Deposit
George Levi
- dm: verity-loadpin: Only trust verity targets with enforcement
Mike Snitzer
- dm: verity-loadpin: Only trust verity targets with enforcement
Kees Cook
- dm: verity-loadpin: Only trust verity targets with enforcement
Mike Snitzer
- Does NFS support Linux Capabilities
Chuck Lever III
- Does NFS support Linux Capabilities
Jeff Layton
- Does NFS support Linux Capabilities
Chuck Lever III
- Does NFS support Linux Capabilities
Jeff Layton
- Does NFS support Linux Capabilities
Jeff Layton
- Does NFS support Linux Capabilities
Theodore Ts'o
- Does NFS support Linux Capabilities
J. Bruce Fields
- Does NFS support Linux Capabilities
Chuck Lever III
- Does NFS support Linux Capabilities
Casey Schaufler
- Does NFS support Linux Capabilities
battery dude
- Does NFS support Linux Capabilities
Theodore Ts'o
- Does NFS support Linux Capabilities
Casey Schaufler
- hi
Mrs. Cristalina Georgieva
- LSM stacking in next for 6.1?
Paul Moore
- LSM stacking in next for 6.1?
Casey Schaufler
- LSM stacking in next for 6.1?
Casey Schaufler
- LSM stacking in next for 6.1?
Paul Moore
- LSM stacking in next for 6.1?
John Johansen
- LSM stacking in next for 6.1?
Casey Schaufler
- LSM stacking in next for 6.1?
Casey Schaufler
- LSM stacking in next for 6.1?
John Johansen
- LSM stacking in next for 6.1?
Paul Moore
- LSM stacking in next for 6.1?
Paul Moore
- LSM stacking in next for 6.1?
Casey Schaufler
- LSM stacking in next for 6.1?
Casey Schaufler
- LSM stacking in next for 6.1?
John Johansen
- LSM stacking in next for 6.1?
Paul Moore
- LSM stacking in next for 6.1?
Paul Moore
- LSM stacking in next for 6.1?
Casey Schaufler
- LSM stacking in next for 6.1?
Paul Moore
- LSM stacking in next for 6.1?
Casey Schaufler
- LSM stacking in next for 6.1?
John Johansen
- LSM stacking in next for 6.1?
Paul Moore
- LSM stacking in next for 6.1?
Tetsuo Handa
- LSM stacking in next for 6.1?
Casey Schaufler
- LSM stacking in next for 6.1?
Casey Schaufler
- LSM stacking in next for 6.1?
John Johansen
- LSM stacking in next for 6.1?
Paul Moore
- LSM stacking in next for 6.1?
Paul Moore
- LSM stacking in next for 6.1?
Casey Schaufler
- LSM stacking in next for 6.1?
Tetsuo Handa
- LSM stacking in next for 6.1?
Tetsuo Handa
- LSM stacking in next for 6.1?
Casey Schaufler
- LSM stacking in next for 6.1?
Tetsuo Handa
- LSM stacking in next for 6.1?
Casey Schaufler
- LSM stacking in next for 6.1?
Paul Moore
- LSM stacking in next for 6.1?
Paul Moore
- LSM stacking in next for 6.1?
Tetsuo Handa
- LSM stacking in next for 6.1?
Casey Schaufler
- LSM stacking in next for 6.1?
John Johansen
- LSM stacking in next for 6.1?
Tetsuo Handa
- LSM stacking in next for 6.1?
Tetsuo Handa
- LSM stacking in next for 6.1?
Tetsuo Handa
- LSM stacking in next for 6.1?
John Johansen
- LSM stacking in next for 6.1?
Casey Schaufler
- LSM stacking in next for 6.1?
Tetsuo Handa
- LSM stacking in next for 6.1?
Casey Schaufler
- LSM stacking in next for 6.1?
Paul Moore
- SMACK LSM checks wrong object label during ingress network traffic
Lontke, Michael
- SMACK LSM checks wrong object label during ingress network traffic
Casey Schaufler
- Thanks
Ibrahim I . Hassan
- Wycena paneli fotowoltaicznych
Norbert Karecki
- Zwiększenie płynności finansowej
Jakub Olejniczak
Last message date:
Fri Sep 30 20:43:53 UTC 2022
Archived on: Fri Sep 30 20:22:46 UTC 2022
This archive was generated by
Pipermail 0.09 (Mailman edition).