April 2023 Archives by subject
Starting: Sat Apr 1 21:41:51 UTC 2023
Ending: Sun Apr 30 21:46:56 UTC 2023
Messages: 376
- [ANNOUNCE] [CFP] Linux Security Summit Europe (LSS-EU)
Reshetova, Elena
- [GIT PULL] Landlock updates for v6.4
Mickaël Salaün
- [GIT PULL] Landlock updates for v6.4
pr-tracker-bot at kernel.org
- [GIT PULL] LSM fixes for v6.4 (#1)
Paul Moore
- [GIT PULL] LSM fixes for v6.4 (#1)
pr-tracker-bot at kernel.org
- [GIT PULL] LSM patches for v6.4
Paul Moore
- [GIT PULL] LSM patches for v6.4
Linus Torvalds
- [GIT PULL] LSM patches for v6.4
Paul Moore
- [GIT PULL] SELinux patches for v6.4
Paul Moore
- [GIT PULL] SELinux patches for v6.4
pr-tracker-bot at kernel.org
- [GIT PULL] Smack patches for v6.4
Casey Schaufler
- [GIT PULL] Smack patches for v6.4
pr-tracker-bot at kernel.org
- [PATCH -next] AppArmor: Fix some kernel-doc comments
John Johansen
- [PATCH -next v2 0/6] landlock: add chmod and chown support
xiujianfeng
- [PATCH -next v2 0/6] landlock: add chmod and chown support
Mickaël Salaün
- [PATCH -next v2 0/6] landlock: add chmod and chown support
xiujianfeng
- [PATCH -next v2 0/6] landlock: add chmod and chown support
Mickaël Salaün
- [PATCH 02/14] Add TSEM specific documentation.
Paul Moore
- [PATCH 02/14] Add TSEM specific documentation.
Dr. Greg
- [PATCH 3/7] mm/gup: remove vmas parameter from get_user_pages_remote()
Lorenzo Stoakes
- [PATCH 3/7] mm/gup: remove vmas parameter from get_user_pages_remote()
Tetsuo Handa
- [PATCH 3/7] mm/gup: remove vmas parameter from get_user_pages_remote()
Jason Gunthorpe
- [PATCH 3/7] mm/gup: remove vmas parameter from get_user_pages_remote()
Lorenzo Stoakes
- [PATCH 3/7] mm/gup: remove vmas parameter from get_user_pages_remote()
Jason Gunthorpe
- [PATCH 3/7] mm/gup: remove vmas parameter from get_user_pages_remote()
Lorenzo Stoakes
- [PATCH 3/7] mm/gup: remove vmas parameter from get_user_pages_remote()
Eric W. Biederman
- [PATCH 3/7] mm/gup: remove vmas parameter from get_user_pages_remote()
Lorenzo Stoakes
- [PATCH 4.19 v3 6/6] ima: Handle -ESTALE returned by ima_filter_rule_match()
Guozihua (Scott)
- [PATCH] apparmor: fix missing error check for rhashtable_insert_fast
Danila Chernetsov
- [PATCH] apparmor: fix missing error check for rhashtable_insert_fast
John Johansen
- [PATCH] apparmor: Return directly after a failed kzalloc() in two functions
John Johansen
- [PATCH] debugfs: allow access relay files in lockdown mode
Junxiao Bi
- [PATCH] debugfs: allow access relay files in lockdown mode
kernel test robot
- [PATCH] debugfs: allow access relay files in lockdown mode
kernel test robot
- [PATCH] IMA: use vfs_getattr_nosec to get the i_version
Jeff Layton
- [PATCH] IMA: use vfs_getattr_nosec to get the i_version
Christian Brauner
- [PATCH] lsm: move hook comments docs to security/security.c
Randy Dunlap
- [PATCH] lsm: move hook comments docs to security/security.c
Paul Moore
- [PATCH] lsm: move hook comments docs to security/security.c
Randy Dunlap
- [PATCH] lsm: move hook comments docs to security/security.c
Paul Moore
- [PATCH] mm/mmap: Map MAP_STACK to VM_STACK
Matthew Wilcox
- [PATCH] mm/mmap: Map MAP_STACK to VM_STACK
Paul Moore
- [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
Stefan Berger
- [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
Christian Brauner
- [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
Paul Moore
- [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
Stefan Berger
- [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
Paul Moore
- [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
Christian Brauner
- [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
Stefan Berger
- [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
Jeff Layton
- [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
Stefan Berger
- [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
Jeff Layton
- [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
Stefan Berger
- [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
Jeff Layton
- [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
Stefan Berger
- [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
Jeff Layton
- [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
Jeff Layton
- [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
Stefan Berger
- [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
Amir Goldstein
- [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
Christian Brauner
- [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
Jeff Layton
- [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
Christian Brauner
- [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
Jeff Layton
- [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
Christian Brauner
- [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
Jeff Layton
- [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
Christian Brauner
- [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
Jeff Layton
- [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
Christian Brauner
- [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
Stefan Berger
- [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
Christian Brauner
- [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
Jeff Layton
- [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
Stefan Berger
- [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
Jeff Layton
- [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
Stefan Berger
- [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
Mimi Zohar
- [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
Mimi Zohar
- [PATCH] security, lsm: security_old_inode_init_security() Handle multi LSM registration
Valentin Vidic
- [PATCH] security, lsm: security_old_inode_init_security() Handle multi LSM registration
Paul Moore
- [PATCH] security, lsm: security_old_inode_init_security() Handle multi LSM registration
Valentin Vidić
- [PATCH] security, lsm: security_old_inode_init_security() Handle multi LSM registration
Paul Moore
- [PATCH] security, lsm: security_old_inode_init_security() Handle multi LSM registration
Valentin Vidić
- [PATCH] selftests/memfd: fix test_sysctl
jeffxu at chromium.org
- [PATCH] selftests/memfd: fix test_sysctl
Yujie Liu
- [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
Roberto Sassu
- [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
Casey Schaufler
- [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
Roberto Sassu
- [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
Casey Schaufler
- [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
Roberto Sassu
- [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
Casey Schaufler
- [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
Roberto Sassu
- [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
Casey Schaufler
- [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
Roberto Sassu
- [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
Mengchi Cheng
- [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
Casey Schaufler
- [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
Roberto Sassu
- [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
Roberto Sassu
- [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
Mimi Zohar
- [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
Roberto Sassu
- [PATCH bpf-next 0/8] New BPF map and BTF security LSM hooks
Andrii Nakryiko
- [PATCH bpf-next 0/8] New BPF map and BTF security LSM hooks
Paul Moore
- [PATCH bpf-next 0/8] New BPF map and BTF security LSM hooks
Kees Cook
- [PATCH bpf-next 0/8] New BPF map and BTF security LSM hooks
Paul Moore
- [PATCH bpf-next 0/8] New BPF map and BTF security LSM hooks
Kees Cook
- [PATCH bpf-next 0/8] New BPF map and BTF security LSM hooks
Casey Schaufler
- [PATCH bpf-next 0/8] New BPF map and BTF security LSM hooks
Paul Moore
- [PATCH bpf-next 0/8] New BPF map and BTF security LSM hooks
Andrii Nakryiko
- [PATCH bpf-next 0/8] New BPF map and BTF security LSM hooks
Paul Moore
- [PATCH bpf-next 0/8] New BPF map and BTF security LSM hooks
Andrii Nakryiko
- [PATCH bpf-next 0/8] New BPF map and BTF security LSM hooks
Paul Moore
- [PATCH bpf-next 0/8] New BPF map and BTF security LSM hooks
Casey Schaufler
- [PATCH bpf-next 0/8] New BPF map and BTF security LSM hooks
Casey Schaufler
- [PATCH bpf-next 0/8] New BPF map and BTF security LSM hooks
Jonathan Corbet
- [PATCH bpf-next 0/8] New BPF map and BTF security LSM hooks
Dr. Greg
- [PATCH bpf-next 0/8] New BPF map and BTF security LSM hooks
Andrii Nakryiko
- [PATCH bpf-next 0/8] New BPF map and BTF security LSM hooks
Andrii Nakryiko
- [PATCH bpf-next 0/8] New BPF map and BTF security LSM hooks
Andrii Nakryiko
- [PATCH bpf-next 0/8] New BPF map and BTF security LSM hooks
Andrii Nakryiko
- [PATCH bpf-next 0/8] New BPF map and BTF security LSM hooks
Andrii Nakryiko
- [PATCH bpf-next 0/8] New BPF map and BTF security LSM hooks
Casey Schaufler
- [PATCH bpf-next 0/8] New BPF map and BTF security LSM hooks
Andrii Nakryiko
- [PATCH bpf-next 0/8] New BPF map and BTF security LSM hooks
Casey Schaufler
- [PATCH bpf-next 0/8] New BPF map and BTF security LSM hooks
Casey Schaufler
- [PATCH bpf-next 0/8] New BPF map and BTF security LSM hooks
Paul Moore
- [PATCH bpf-next 0/8] New BPF map and BTF security LSM hooks
Dr. Greg
- [PATCH bpf-next 0/8] New BPF map and BTF security LSM hooks
Andrii Nakryiko
- [PATCH bpf-next 0/8] New BPF map and BTF security LSM hooks
Andrii Nakryiko
- [PATCH bpf-next 0/8] New BPF map and BTF security LSM hooks
Kees Cook
- [PATCH bpf-next 1/8] bpf: move unprivileged checks into map_create() and bpf_prog_load()
Andrii Nakryiko
- [PATCH bpf-next 1/8] bpf: move unprivileged checks into map_create() and bpf_prog_load()
Kees Cook
- [PATCH bpf-next 1/8] bpf: move unprivileged checks into map_create() and bpf_prog_load()
Andrii Nakryiko
- [PATCH bpf-next 2/8] bpf: inline map creation logic in map_create() function
Andrii Nakryiko
- [PATCH bpf-next 2/8] bpf: inline map creation logic in map_create() function
Kees Cook
- [PATCH bpf-next 2/8] bpf: inline map creation logic in map_create() function
Andrii Nakryiko
- [PATCH bpf-next 3/8] bpf: centralize permissions checks for all BPF map types
Andrii Nakryiko
- [PATCH bpf-next 3/8] bpf: centralize permissions checks for all BPF map types
Kees Cook
- [PATCH bpf-next 3/8] bpf: centralize permissions checks for all BPF map types
Andrii Nakryiko
- [PATCH bpf-next 4/8] bpf, lsm: implement bpf_map_create_security LSM hook
Andrii Nakryiko
- [PATCH bpf-next 4/8] bpf, lsm: implement bpf_map_create_security LSM hook
Kees Cook
- [PATCH bpf-next 4/8] bpf, lsm: implement bpf_map_create_security LSM hook
Andrii Nakryiko
- [PATCH bpf-next 5/8] selftests/bpf: validate new bpf_map_create_security LSM hook
Andrii Nakryiko
- [PATCH bpf-next 5/8] selftests/bpf: validate new bpf_map_create_security LSM hook
Kees Cook
- [PATCH bpf-next 5/8] selftests/bpf: validate new bpf_map_create_security LSM hook
Andrii Nakryiko
- [PATCH bpf-next 6/8] bpf: drop unnecessary bpf_capable() check in BPF_MAP_FREEZE command
Andrii Nakryiko
- [PATCH bpf-next 6/8] bpf: drop unnecessary bpf_capable() check in BPF_MAP_FREEZE command
Kees Cook
- [PATCH bpf-next 6/8] bpf: drop unnecessary bpf_capable() check in BPF_MAP_FREEZE command
Andrii Nakryiko
- [PATCH bpf-next 7/8] bpf, lsm: implement bpf_btf_load_security LSM hook
Andrii Nakryiko
- [PATCH bpf-next 7/8] bpf, lsm: implement bpf_btf_load_security LSM hook
Paul Moore
- [PATCH bpf-next 7/8] bpf, lsm: implement bpf_btf_load_security LSM hook
Andrii Nakryiko
- [PATCH bpf-next 7/8] bpf, lsm: implement bpf_btf_load_security LSM hook
Paul Moore
- [PATCH bpf-next 8/8] selftests/bpf: enhance lsm_map_create test with BTF LSM control
Andrii Nakryiko
- [PATCH LSM 0/2] security: SELinux/LSM label with MPTCP and accept
Matthieu Baerts
- [PATCH LSM 0/2] security: SELinux/LSM label with MPTCP and accept
Paul Moore
- [PATCH LSM 0/2] security: SELinux/LSM label with MPTCP and accept
Matthieu Baerts
- [PATCH LSM 0/2] security: SELinux/LSM label with MPTCP and accept
Paul Moore
- [PATCH LSM 1/2] security, lsm: Introduce security_mptcp_add_subflow()
Matthieu Baerts
- [PATCH LSM 1/2] security, lsm: Introduce security_mptcp_add_subflow()
Paul Moore
- [PATCH LSM 2/2] selinux: Implement mptcp_add_subflow hook
Matthieu Baerts
- [PATCH LSM 2/2] selinux: Implement mptcp_add_subflow hook
Paul Moore
- [PATCH LSM v2 0/2] security: SELinux/LSM label with MPTCP and accept
Matthieu Baerts
- [PATCH LSM v2 1/2] security, lsm: Introduce security_mptcp_add_subflow()
Matthieu Baerts
- [PATCH LSM v2 2/2] selinux: Implement mptcp_add_subflow hook
Matthieu Baerts
- [PATCH RFC] Randomized slab caches for kmalloc()
Hyeonggon Yoo
- [PATCH RFC] Randomized slab caches for kmalloc()
Alexander Lobakin
- [PATCH RFC] Randomized slab caches for kmalloc()
Gong Ruiqi
- [PATCH RFC] Randomized slab caches for kmalloc()
Gong Ruiqi
- [PATCH RFC] Randomized slab caches for kmalloc()
Alexander Lobakin
- [PATCH RFC] Randomized slab caches for kmalloc()
Gong Ruiqi
- [PATCH v1 0/5] Landlock support for UML
Mickaël Salaün
- [PATCH v10 0/4] evm: Do HMAC of multiple per LSM xattrs for new inodes
Mimi Zohar
- [PATCH v10 00/11] LSM: Three basic syscalls
Casey Schaufler
- [PATCH v10 00/11] LSM: Three basic syscalls
Casey Schaufler
- [PATCH v10 01/11] LSM: Identify modules by more than name
Casey Schaufler
- [PATCH v10 01/11] LSM: Identify modules by more than name
Casey Schaufler
- [PATCH v10 02/11] LSM: Maintain a table of LSM attribute data
Casey Schaufler
- [PATCH v10 02/11] LSM: Maintain a table of LSM attribute data
Casey Schaufler
- [PATCH v10 02/13] landlock: Allow filesystem layout changes for domains without such rule type
Mickaël Salaün
- [PATCH v10 02/13] landlock: Allow filesystem layout changes for domains without such rule type
Konstantin Meskhidze (A)
- [PATCH v10 02/13] landlock: Allow filesystem layout changes for domains without such rule type
Mickaël Salaün
- [PATCH v10 02/13] landlock: Allow filesystem layout changes for domains without such rule type
Konstantin Meskhidze (A)
- [PATCH v10 03/11] proc: Use lsmids instead of lsm names for attrs
Casey Schaufler
- [PATCH v10 03/11] proc: Use lsmids instead of lsm names for attrs
Casey Schaufler
- [PATCH v10 03/13] landlock: Remove unnecessary inlining
Mickaël Salaün
- [PATCH v10 03/13] landlock: Remove unnecessary inlining
Konstantin Meskhidze (A)
- [PATCH v10 04/11] LSM: syscalls for current process attributes
Casey Schaufler
- [PATCH v10 04/11] LSM: syscalls for current process attributes
Casey Schaufler
- [PATCH v10 05/11] LSM: Create lsm_list_modules system call
Casey Schaufler
- [PATCH v10 05/11] LSM: Create lsm_list_modules system call
Casey Schaufler
- [PATCH v10 05/13] landlock: Refactor merge/inherit_ruleset functions
Mickaël Salaün
- [PATCH v10 05/13] landlock: Refactor merge/inherit_ruleset functions
Konstantin Meskhidze (A)
- [PATCH v10 06/11] LSM: wireup Linux Security Module syscalls
Casey Schaufler
- [PATCH v10 06/11] LSM: wireup Linux Security Module syscalls
Casey Schaufler
- [PATCH v10 07/11] LSM: Helpers for attribute names and filling lsm_ctx
Casey Schaufler
- [PATCH v10 07/11] LSM: Helpers for attribute names and filling lsm_ctx
Casey Schaufler
- [PATCH v10 07/11] LSM: Helpers for attribute names and filling lsm_ctx
kernel test robot
- [PATCH v10 07/11] LSM: Helpers for attribute names and filling lsm_ctx
kernel test robot
- [PATCH v10 07/13] landlock: Refactor layer helpers
Mickaël Salaün
- [PATCH v10 07/13] landlock: Refactor layer helpers
Konstantin Meskhidze (A)
- [PATCH v10 08/11] Smack: implement setselfattr and getselfattr hooks
Casey Schaufler
- [PATCH v10 08/11] Smack: implement setselfattr and getselfattr hooks
Casey Schaufler
- [PATCH v10 09/11] AppArmor: Add selfattr hooks
Casey Schaufler
- [PATCH v10 09/11] AppArmor: Add selfattr hooks
Casey Schaufler
- [PATCH v10 09/13] landlock: Add network rules and TCP hooks support
Konstantin Meskhidze (A)
- [PATCH v10 09/13] landlock: Add network rules and TCP hooks support
Konstantin Meskhidze (A)
- [PATCH v10 09/13] landlock: Add network rules and TCP hooks support
Mickaël Salaün
- [PATCH v10 09/13] landlock: Add network rules and TCP hooks support
Mickaël Salaün
- [PATCH v10 09/13] landlock: Add network rules and TCP hooks support
Konstantin Meskhidze (A)
- [PATCH v10 09/13] landlock: Add network rules and TCP hooks support
Konstantin Meskhidze (A)
- [PATCH v10 09/13] landlock: Add network rules and TCP hooks support
Mickaël Salaün
- [PATCH v10 09/13] landlock: Add network rules and TCP hooks support
Konstantin Meskhidze (A)
- [PATCH v10 09/13] landlock: Add network rules and TCP hooks support
Mickaël Salaün
- [PATCH v10 09/13] landlock: Add network rules and TCP hooks support
Konstantin Meskhidze (A)
- [PATCH v10 09/13] landlock: Add network rules and TCP hooks support
Mickaël Salaün
- [PATCH v10 09/13] landlock: Add network rules and TCP hooks support
Konstantin Meskhidze (A)
- [PATCH v10 09/13] landlock: Add network rules and TCP hooks support
Mickaël Salaün
- [PATCH v10 1/4] reiserfs: Add security prefix to xattr name in reiserfs_security_write()
Paul Moore
- [PATCH v10 10/11] SELinux: Add selfattr hooks
Casey Schaufler
- [PATCH v10 10/11] SELinux: Add selfattr hooks
Casey Schaufler
- [PATCH v10 10/13] selftests/landlock: Share enforce_ruleset()
Mickaël Salaün
- [PATCH v10 10/13] selftests/landlock: Share enforce_ruleset()
Konstantin Meskhidze (A)
- [PATCH v10 11/11] LSM: selftests for Linux Security Module syscalls
Casey Schaufler
- [PATCH v10 11/13] selftests/landlock: Add 10 new test suites dedicated to network
Mickaël Salaün
- [PATCH v10 11/13] selftests/landlock: Add 10 new test suites dedicated to network
Konstantin Meskhidze (A)
- [PATCH v10 11/13] selftests/landlock: Add 10 new test suites dedicated to network
Mickaël Salaün
- [PATCH v10 12/13] samples/landlock: Add network demo
Mickaël Salaün
- [PATCH v10 12/13] samples/landlock: Add network demo
Konstantin Meskhidze (A)
- [PATCH v10 13/13] landlock: Document Landlock's network support
Mickaël Salaün
- [PATCH v10 13/13] landlock: Document Landlock's network support
Konstantin Meskhidze (A)
- [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
Paul Moore
- [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
Casey Schaufler
- [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
Roberto Sassu
- [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
Paul Moore
- [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
Casey Schaufler
- [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
Paul Moore
- [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
Casey Schaufler
- [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
Roberto Sassu
- [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
Roberto Sassu
- [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
Casey Schaufler
- [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
Mimi Zohar
- [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
Roberto Sassu
- [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
Casey Schaufler
- [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
Roberto Sassu
- [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
Casey Schaufler
- [PATCH v10 3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure
Paul Moore
- [PATCH v10 3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure
Mimi Zohar
- [PATCH v10 3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure
Roberto Sassu
- [PATCH v10 4/4] evm: Support multiple LSMs providing an xattr
Mimi Zohar
- [PATCH v2 3/7] mm/gup: remove vmas parameter from get_user_pages_remote()
Lorenzo Stoakes
- [PATCH v2 3/7] mm/gup: remove vmas parameter from get_user_pages_remote()
Tetsuo Handa
- [PATCH V2] debugfs: allow access relay files in lockdown mode
Junxiao Bi
- [PATCH V2] debugfs: allow access relay files in lockdown mode
Nathan Lynch
- [PATCH V2] debugfs: allow access relay files in lockdown mode
Paul Moore
- [PATCH V2] debugfs: allow access relay files in lockdown mode
Junxiao Bi
- [PATCH v3 3/7] mm/gup: remove vmas parameter from get_user_pages_remote()
Lorenzo Stoakes
- [PATCH v3 3/7] mm/gup: remove vmas parameter from get_user_pages_remote()
Catalin Marinas
- [PATCH v3 3/7] mm/gup: remove vmas parameter from get_user_pages_remote()
David Hildenbrand
- [PATCH V3] debugfs: allow access blktrace trace files in lockdown mode
Junxiao Bi
- [PATCH V3] debugfs: allow access blktrace trace files in lockdown mode
Paul Moore
- [PATCH V3] debugfs: allow access blktrace trace files in lockdown mode
Junxiao Bi
- [PATCH V4 1/2] debugfs: provide a way for relay user bypass lockdown
Junxiao Bi
- [PATCH V4 2/2] blktrace: allow access trace file in lockdown mode
Junxiao Bi
- [PATCH V4 2/2] blktrace: allow access trace file in lockdown mode
Junxiao Bi
- [PATCH V4 2/2] blktrace: allow access trace file in lockdown mode
Jens Axboe
- [PATCH V4 2/2] blktrace: allow access trace file in lockdown mode
Junxiao Bi
- [PATCH V4 2/2] blktrace: allow access trace file in lockdown mode
Paul Moore
- [PATCH V4 2/2] blktrace: allow access trace file in lockdown mode
Junxiao Bi
- [PATCH V4 2/2] blktrace: allow access trace file in lockdown mode
Paul Moore
- [PATCH v4 3/6] mm/gup: remove vmas parameter from get_user_pages_remote()
Lorenzo Stoakes
- [PATCH v4 3/6] mm/gup: remove vmas parameter from get_user_pages_remote()
Janosch Frank
- [PATCH v4] kernel/watch_queue: NULL the dangling *pipe, and use it for clear check
Siddh Raman Pant
- [PATCH v5 5/6] KEYS: CA link restriction
Jarkko Sakkinen
- [PATCH v6 05/11] LSM: Create lsm_module_list system call
Casey Schaufler
- [PATCH v7 04/11] LSM: syscalls for current process attributes
Mickaël Salaün
- [PATCH v7 04/11] LSM: syscalls for current process attributes
Casey Schaufler
- [PATCH v7 04/11] LSM: syscalls for current process attributes
Mickaël Salaün
- [PATCH v7 04/11] LSM: syscalls for current process attributes
Casey Schaufler
- [PATCH v7 04/11] LSM: syscalls for current process attributes
Paul Moore
- [PATCH v7 05/11] LSM: Create lsm_list_modules system call
Mickaël Salaün
- [PATCH v7 05/11] LSM: Create lsm_list_modules system call
Paul Moore
- [PATCH v7 05/11] LSM: Create lsm_list_modules system call
Paul Moore
- [PATCH v7 05/11] LSM: Create lsm_list_modules system call
Mickaël Salaün
- [PATCH v7 07/11] LSM: Helpers for attribute names and filling an lsm_ctx
Mickaël Salaün
- [PATCH v7 07/11] LSM: Helpers for attribute names and filling an lsm_ctx
Mickaël Salaün
- [PATCH v7 07/11] LSM: Helpers for attribute names and filling an lsm_ctx
Mickaël Salaün
- [PATCH v7 07/11] LSM: Helpers for attribute names and filling an lsm_ctx
Casey Schaufler
- [PATCH v7 07/11] LSM: Helpers for attribute names and filling an lsm_ctx
Casey Schaufler
- [PATCH v7 07/11] LSM: Helpers for attribute names and filling an lsm_ctx
Mickaël Salaün
- [PATCH v7 07/11] LSM: Helpers for attribute names and filling an lsm_ctx
Casey Schaufler
- [PATCH v8 00/11] LSM: Three basic syscalls
Casey Schaufler
- [PATCH v8 01/11] LSM: Identify modules by more than name
Casey Schaufler
- [PATCH v8 02/11] LSM: Maintain a table of LSM attribute data
Casey Schaufler
- [PATCH v8 03/11] proc: Use lsmids instead of lsm names for attrs
Casey Schaufler
- [PATCH v8 04/11] LSM: syscalls for current process attributes
Casey Schaufler
- [PATCH v8 04/11] LSM: syscalls for current process attributes
kernel test robot
- [PATCH v8 04/11] LSM: syscalls for current process attributes
Paul Moore
- [PATCH v8 04/11] LSM: syscalls for current process attributes
Casey Schaufler
- [PATCH v8 04/11] LSM: syscalls for current process attributes
Paul Moore
- [PATCH v8 05/11] LSM: Create lsm_list_modules system call
Casey Schaufler
- [PATCH v8 06/11] LSM: wireup Linux Security Module syscalls
Casey Schaufler
- [PATCH v8 07/11] LSM: Helpers for attribute names and filling an lsm_ctx
Casey Schaufler
- [PATCH v8 07/11] LSM: Helpers for attribute names and filling an lsm_ctx
Paul Moore
- [PATCH v8 07/11] LSM: Helpers for attribute names and filling an lsm_ctx
Casey Schaufler
- [PATCH v8 07/11] LSM: Helpers for attribute names and filling an lsm_ctx
Casey Schaufler
- [PATCH v8 08/11] Smack: implement setselfattr and getselfattr hooks
Casey Schaufler
- [PATCH v8 09/11] AppArmor: Add selfattr hooks
Casey Schaufler
- [PATCH v8 10/11] SELinux: Add selfattr hooks
Casey Schaufler
- [PATCH v8 11/11] LSM: selftests for Linux Security Module syscalls
Casey Schaufler
- [PATCH v9 00/11] LSM: Three basic syscalls
Casey Schaufler
- [PATCH v9 01/11] LSM: Identify modules by more than name
Casey Schaufler
- [PATCH v9 01/11] LSM: Identify modules by more than name
Kees Cook
- [PATCH v9 02/11] LSM: Maintain a table of LSM attribute data
Casey Schaufler
- [PATCH v9 02/11] LSM: Maintain a table of LSM attribute data
Kees Cook
- [PATCH v9 02/11] LSM: Maintain a table of LSM attribute data
Casey Schaufler
- [PATCH v9 03/11] proc: Use lsmids instead of lsm names for attrs
Casey Schaufler
- [PATCH v9 03/11] proc: Use lsmids instead of lsm names for attrs
Kees Cook
- [PATCH v9 04/11] LSM: syscalls for current process attributes
Casey Schaufler
- [PATCH v9 04/11] LSM: syscalls for current process attributes
Kees Cook
- [PATCH v9 04/11] LSM: syscalls for current process attributes
kernel test robot
- [PATCH v9 04/11] LSM: syscalls for current process attributes
kernel test robot
- [PATCH v9 04/11] LSM: syscalls for current process attributes
Casey Schaufler
- [PATCH v9 05/11] LSM: Create lsm_list_modules system call
Casey Schaufler
- [PATCH v9 05/11] LSM: Create lsm_list_modules system call
Kees Cook
- [PATCH v9 06/11] LSM: wireup Linux Security Module syscalls
Casey Schaufler
- [PATCH v9 06/11] LSM: wireup Linux Security Module syscalls
Kees Cook
- [PATCH v9 07/11] LSM: Helpers for attribute names and filling an lsm_ctx
Casey Schaufler
- [PATCH v9 07/11] LSM: Helpers for attribute names and filling an lsm_ctx
Kees Cook
- [PATCH v9 08/11] Smack: implement setselfattr and getselfattr hooks
Casey Schaufler
- [PATCH v9 08/11] Smack: implement setselfattr and getselfattr hooks
Kees Cook
- [PATCH v9 09/11] AppArmor: Add selfattr hooks
Casey Schaufler
- [PATCH v9 09/11] AppArmor: Add selfattr hooks
Kees Cook
- [PATCH v9 09/11] AppArmor: Add selfattr hooks
kernel test robot
- [PATCH v9 09/11] AppArmor: Add selfattr hooks
kernel test robot
- [PATCH v9 10/11] SELinux: Add selfattr hooks
Casey Schaufler
- [PATCH v9 10/11] SELinux: Add selfattr hooks
Kees Cook
- [PATCH v9 11/11] LSM: selftests for Linux Security Module syscalls
Casey Schaufler
- [PATCH v9 11/11] LSM: selftests for Linux Security Module syscalls
Kees Cook
- [PATCH v9 11/11] LSM: selftests for Linux Security Module syscalls
Casey Schaufler
- [PATCH v9 3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure
Mimi Zohar
- [RFC PATCH] Set SMK_INODE_CHANGED inside smack_dentry_create_files_as
Mengchi Cheng
- [RFC PATCH v9 01/16] security: add ipe lsm
Fan Wu
- [RFC PATCH v9 02/16] ipe: add policy parser
Fan Wu
- [RFC PATCH v9 02/16] ipe: add policy parser
Paul Moore
- [RFC PATCH v9 03/16] ipe: add evaluation loop and introduce 'boot_verified' as a trust provider
Fan Wu
- [RFC PATCH v9 03/16] ipe: add evaluation loop and introduce 'boot_verified' as a trust provider
Paul Moore
- [RFC PATCH v9 05/16] ipe: add userspace interface
Fan Wu
- [RFC PATCH v9 05/16] ipe: add userspace interface
Paul Moore
- [RFC PATCH v9 05/16] ipe: add userspace interface
Fan Wu
- [RFC PATCH v9 05/16] ipe: add userspace interface
Paul Moore
- [RFC PATCH v9 05/16] ipe: add userspace interface
Fan Wu
- [RFC PATCH v9 05/16] ipe: add userspace interface
Paul Moore
- [RFC PATCH v9 05/16] ipe: add userspace interface
Fan Wu
- [RFC PATCH v9 05/16] ipe: add userspace interface
Paul Moore
- [RFC PATCH v9 06/16] ipe: add LSM hooks on execution and kernel read
Fan Wu
- [RFC PATCH v9 07/16] uapi|audit|ipe: add ipe auditing support
Paul Moore
- [RFC PATCH v9 07/16] uapi|audit|ipe: add ipe auditing support
Paul Moore
- biznesowy angielski
Krzysztof Maj
- from mariam kouame
Mariam Kouame
- Re
Maria-Elisabeth Schaeffler
- Reply
Hinda Itno Deby
- Semantics of blktrace with lockdown (integrity) enabled kernel.
Konrad Rzeszutek Wilk
- Semantics of blktrace with lockdown (integrity) enabled kernel.
Paul Moore
- Semantics of blktrace with lockdown (integrity) enabled kernel.
Junxiao Bi
- Semantics of blktrace with lockdown (integrity) enabled kernel.
Konrad Rzeszutek Wilk
- Semantics of blktrace with lockdown (integrity) enabled kernel.
Paul Moore
- Semantics of blktrace with lockdown (integrity) enabled kernel.
Paul Moore
- Semantics of blktrace with lockdown (integrity) enabled kernel.
Junxiao Bi
- Semantics of blktrace with lockdown (integrity) enabled kernel.
Paul Moore
- Semantics of blktrace with lockdown (integrity) enabled kernel.
Junxiao Bi
- Semantics of blktrace with lockdown (integrity) enabled kernel.
Paul Moore
- Semantics of blktrace with lockdown (integrity) enabled kernel.
Junxiao Bi
- Semantics of blktrace with lockdown (integrity) enabled kernel.
Paul Moore
- Semantics of blktrace with lockdown (integrity) enabled kernel.
Junxiao Bi
- Słowa kluczowe do wypozycjonowania
Adam Charachuta
- Transmute flag is not inheritted on overlay fs
Mengchi Cheng
- Transmute flag is not inheritted on overlay fs
Casey Schaufler
- Transmute flag is not inheritted on overlay fs
Mengchi Cheng
- W sprawie samochodu
Krystian Wieczorek
Last message date:
Sun Apr 30 21:46:56 UTC 2023
Archived on: Sun Apr 30 21:18:39 UTC 2023
This archive was generated by
Pipermail 0.09 (Mailman edition).