December 2023 Archives by subject
Starting: Fri Dec 1 00:00:48 UTC 2023
Ending: Fri Dec 29 22:31:08 UTC 2023
Messages: 516
- [PATCH 0/11] vfs: inode cache scalability improvements
Dave Chinner
- [PATCH 0/11] vfs: inode cache scalability improvements
Kent Overstreet
- [PATCH 0/3] arch/x86: Remove unnecessary dependencies on bootparam.h
Thomas Zimmermann
- [PATCH 01/11] lib/dlock-list: Distributed and lock-protected lists
Dave Chinner
- [PATCH 01/11] lib/dlock-list: Distributed and lock-protected lists
Al Viro
- [PATCH 02/11] vfs: Remove unnecessary list_for_each_entry_safe() variants
Dave Chinner
- [PATCH 02/11] vfs: Remove unnecessary list_for_each_entry_safe() variants
Al Viro
- [PATCH 02/11] vfs: Remove unnecessary list_for_each_entry_safe() variants
Kent Overstreet
- [PATCH 03/11] vfs: Use dlock list for superblock's inode list
Dave Chinner
- [PATCH 03/11] vfs: Use dlock list for superblock's inode list
Al Viro
- [PATCH 03/11] vfs: Use dlock list for superblock's inode list
Dave Chinner
- [PATCH 03/11] vfs: Use dlock list for superblock's inode list
Kent Overstreet
- [PATCH 03/16] capability: rename cpu_vfs_cap_data to vfs_caps
Christian Brauner
- [PATCH 04/11] lib/dlock-list: Make sibling CPUs share the same linked list
Dave Chinner
- [PATCH 04/11] lib/dlock-list: Make sibling CPUs share the same linked list
Kent Overstreet
- [PATCH 04/11] lib/dlock-list: Make sibling CPUs share the same linked list
Kent Overstreet
- [PATCH 04/11] lib/dlock-list: Make sibling CPUs share the same linked list
Dave Chinner
- [PATCH 04/11] lib/dlock-list: Make sibling CPUs share the same linked list
Al Viro
- [PATCH 05/11] selinux: use dlist for isec inode list
Dave Chinner
- [PATCH 05/11] selinux: use dlist for isec inode list
Paul Moore
- [PATCH 05/11] selinux: use dlist for isec inode list
Dave Chinner
- [PATCH 05/11] selinux: use dlist for isec inode list
Paul Moore
- [PATCH 05/16] capability: provide helpers for converting between xattrs and vfs_caps
Christian Brauner
- [PATCH 05/16] capability: provide helpers for converting between xattrs and vfs_caps
Seth Forshee (DigitalOcean)
- [PATCH 06/11] vfs: factor out inode hash head calculation
Dave Chinner
- [PATCH 06/11] vfs: factor out inode hash head calculation
Al Viro
- [PATCH 06/16] capability: provide a helper for converting vfs_caps to xattr for userspace
Christian Brauner
- [PATCH 06/16] capability: provide a helper for converting vfs_caps to xattr for userspace
Seth Forshee (DigitalOcean)
- [PATCH 07/11] hlist-bl: add hlist_bl_fake()
Dave Chinner
- [PATCH 07/11] hlist-bl: add hlist_bl_fake()
Al Viro
- [PATCH 07/16] fs: add inode operations to get/set/remove fscaps
Christian Brauner
- [PATCH 07/16] fs: add inode operations to get/set/remove fscaps
Seth Forshee (DigitalOcean)
- [PATCH 07/16] fs: add inode operations to get/set/remove fscaps
Christian Brauner
- [PATCH 08/11] vfs: inode cache conversion to hash-bl
Dave Chinner
- [PATCH 08/11] vfs: inode cache conversion to hash-bl
Kent Overstreet
- [PATCH 08/11] vfs: inode cache conversion to hash-bl
Dave Chinner
- [PATCH 08/11] vfs: inode cache conversion to hash-bl
Al Viro
- [PATCH 08/16] fs: add vfs_get_fscaps()
Christian Brauner
- [PATCH 08/16] fs: add vfs_get_fscaps()
Seth Forshee (DigitalOcean)
- [PATCH 09/11] hash-bl: explicitly initialise hash-bl heads
Dave Chinner
- [PATCH 09/11] hash-bl: explicitly initialise hash-bl heads
Al Viro
- [PATCH 09/16] fs: add vfs_set_fscaps()
Christian Brauner
- [PATCH 09/16] fs: add vfs_set_fscaps()
Seth Forshee (DigitalOcean)
- [PATCH 09/16] fs: add vfs_set_fscaps()
Seth Forshee (DigitalOcean)
- [PATCH 09/16] fs: add vfs_set_fscaps()
Amir Goldstein
- [PATCH 1/2] iouring: one capable call per iouring instance
Jeff Moyer
- [PATCH 1/2] iouring: one capable call per iouring instance
Keith Busch
- [PATCH 1/2] iouring: one capable call per iouring instance
Jens Axboe
- [PATCH 1/2] iouring: one capable call per iouring instance
Jeff Moyer
- [PATCH 1/2] iouring: one capable call per iouring instance
Jens Axboe
- [PATCH 1/2] iouring: one capable call per iouring instance
Keith Busch
- [PATCH 1/2] iouring: one capable call per iouring instance
Ming Lei
- [PATCH 1/2] iouring: one capable call per iouring instance
Keith Busch
- [PATCH 1/2] iouring: one capable call per iouring instance
Ming Lei
- [PATCH 1/2] iouring: one capable call per iouring instance
Keith Busch
- [PATCH 1/2] iouring: one capable call per iouring instance
Ming Lei
- [PATCH 1/2] iouring: one capable call per iouring instance
Keith Busch
- [PATCH 1/2] iouring: one capable call per iouring instance
Ming Lei
- [PATCH 1/2] iouring: one capable call per iouring instance
Christoph Hellwig
- [PATCH 1/3] arch/x86: Move struct pci_setup_rom into pci_setup.h
Thomas Zimmermann
- [PATCH 1/3] arch/x86: Move struct pci_setup_rom into pci_setup.h
Ard Biesheuvel
- [PATCH 10/11] list_bl: don't use bit locks for PREEMPT_RT or lockdep
Dave Chinner
- [PATCH 10/11] list_bl: don't use bit locks for PREEMPT_RT or lockdep
Kent Overstreet
- [PATCH 10/11] list_bl: don't use bit locks for PREEMPT_RT or lockdep
Dave Chinner
- [PATCH 11/11] hlist-bl: introduced nested locking for dm-snap
Dave Chinner
- [PATCH 14/16] commoncap: remove cap_inode_getsecurity()
Paul Moore
- [PATCH 15/16] commoncap: use vfs fscaps interfaces for killpriv checks
kernel test robot
- [PATCH 2/3] arch/x86: Add <asm/ima-efi.h> for arch_ima_efi_boot_mode
Thomas Zimmermann
- [PATCH 2/3] arch/x86: Add <asm/ima-efi.h> for arch_ima_efi_boot_mode
Ard Biesheuvel
- [PATCH 3/16] capability: rename cpu_vfs_cap_data to vfs_caps
Paul Moore
- [PATCH 3/3] arch/x86: Do not include <asm/bootparam.h> in several header files
Thomas Zimmermann
- [PATCH 3/3] arch/x86: Do not include <asm/bootparam.h> in several header files
Ard Biesheuvel
- [PATCH 3/4] listmount: small changes in semantics
Serge E. Hallyn
- [PATCH 3/4] listmount: small changes in semantics
Miklos Szeredi
- [PATCH 3/4] listmount: small changes in semantics
Christian Brauner
- [PATCH 4/16] capability: use vfsuid_t for vfs_caps rootids
Paul Moore
- [PATCH] apparmor: avoid crash when parsed profile name is empty
Fedor Pchelkin
- [PATCH] apparmor: fix possible memory leak in unpack_trans_table
Fedor Pchelkin
- [PATCH] fixing userspace memory dereference in security.c
Serge E. Hallyn
- [PATCH] fixing userspace memory dereference in security.c
Paul Moore
- [PATCH] integrity: don't throw an error immediately when failed to add a cert to the .machine keyring
Coiby Xu
- [PATCH] kernel: capability: Remove unnecessary ‘0’ values from ret
Li zeming
- [PATCH] kernel: Introduce a write lock/unlock wrapper for tasklist_lock
Maria Yu
- [PATCH] kernel: Introduce a write lock/unlock wrapper for tasklist_lock
Matthew Wilcox
- [PATCH] kernel: Introduce a write lock/unlock wrapper for tasklist_lock
Eric W. Biederman
- [PATCH] kernel: Introduce a write lock/unlock wrapper for tasklist_lock
Aiqun Yu (Maria)
- [PATCH] kernel: Introduce a write lock/unlock wrapper for tasklist_lock
Maria Yu
- [PATCH] kernel: Introduce a write lock/unlock wrapper for tasklist_lock
Aiqun Yu (Maria)
- [PATCH] kernel: Introduce a write lock/unlock wrapper for tasklist_lock
Matthew Wilcox
- [PATCH] kernel: Introduce a write lock/unlock wrapper for tasklist_lock
kernel test robot
- [PATCH] lsm: Add a __counted_by() annotation to lsm_ctx.ctx
Mark Brown
- [PATCH] lsm: Add a __counted_by() annotation to lsm_ctx.ctx
Paul Moore
- [PATCH] MAINTAINERS: Add Eric Snowberg as a reviewer to IMA
Mimi Zohar
- [PATCH] MAINTAINERS: Add Eric Snowberg as a reviewer to IMA
Eric Snowberg
- [PATCH] MAINTAINERS: Add Roberto Sassu as co-maintainer to IMA and EVM
Mimi Zohar
- [PATCH] MAINTAINERS: Add Roberto Sassu as co-maintainer to IMA and EVM
Roberto Sassu
- [PATCH] mm: init_mlocked_on_free
York Jasper Niebuhr
- [PATCH] mm: init_mlocked_on_free
Andrew Morton
- [PATCH] mm: init_mlocked_on_free
kernel test robot
- [PATCH] security: new security_file_ioctl_compat() hook
Alfred Piccioni
- [PATCH] security: new security_file_ioctl_compat() hook
Alfred Piccioni
- [PATCH] security: new security_file_ioctl_compat() hook
Alfred Piccioni
- [PATCH] security: new security_file_ioctl_compat() hook
Stephen Smalley
- [PATCH] security: new security_file_ioctl_compat() hook
Stephen Smalley
- [PATCH] security: new security_file_ioctl_compat() hook
Eric Biggers
- [PATCH] security: new security_file_ioctl_compat() hook
Paul Moore
- [PATCH] security: new security_file_ioctl_compat() hook
Tetsuo Handa
- [PATCH] security: new security_file_ioctl_compat() hook
Tetsuo Handa
- [PATCH] security: new security_file_ioctl_compat() hook
Eric Biggers
- [PATCH] security: new security_file_ioctl_compat() hook
Casey Schaufler
- [PATCH] security: new security_file_ioctl_compat() hook
Paul Moore
- [PATCH] security: new security_file_ioctl_compat() hook
Paul Moore
- [PATCH] security: new security_file_ioctl_compat() hook
Paul Moore
- [PATCH] security: new security_file_ioctl_compat() hook
Paul Moore
- [PATCH] security: new security_file_ioctl_compat() hook
Eric Biggers
- [PATCH] selinux: Fix error priority for bind with AF_UNSPEC on AF_INET6 socket
Mickaël Salaün
- [PATCH] selinux: Fix error priority for bind with AF_UNSPEC on AF_INET6 socket
Paul Moore
- [PATCH] selinux: Fix error priority for bind with AF_UNSPEC on AF_INET6 socket
Mickaël Salaün
- [PATCH] selinux: Fix error priority for bind with AF_UNSPEC on AF_INET6 socket
Paul Moore
- [PATCH bpf-next 0/8] BPF token support in libbpf's BPF object
Andrii Nakryiko
- [PATCH bpf-next 0/8] BPF token support in libbpf's BPF object
Eduard Zingerman
- [PATCH bpf-next 0/8] BPF token support in libbpf's BPF object
Andrii Nakryiko
- [PATCH bpf-next 1/8] bpf: fail BPF_TOKEN_CREATE if no delegation option was set on BPF FS
Andrii Nakryiko
- [PATCH bpf-next 1/8] bpf: fail BPF_TOKEN_CREATE if no delegation option was set on BPF FS
Christian Brauner
- [PATCH bpf-next 1/8] bpf: fail BPF_TOKEN_CREATE if no delegation option was set on BPF FS
Andrii Nakryiko
- [PATCH bpf-next 1/8] bpf: fail BPF_TOKEN_CREATE if no delegation option was set on BPF FS
John Fastabend
- [PATCH bpf-next 2/8] libbpf: split feature detectors definitions from cached results
Andrii Nakryiko
- [PATCH bpf-next 2/8] libbpf: split feature detectors definitions from cached results
John Fastabend
- [PATCH bpf-next 3/8] libbpf: further decouple feature checking logic from bpf_object
Andrii Nakryiko
- [PATCH bpf-next 3/8] libbpf: further decouple feature checking logic from bpf_object
Eduard Zingerman
- [PATCH bpf-next 3/8] libbpf: further decouple feature checking logic from bpf_object
Andrii Nakryiko
- [PATCH bpf-next 3/8] libbpf: further decouple feature checking logic from bpf_object
John Fastabend
- [PATCH bpf-next 3/8] libbpf: further decouple feature checking logic from bpf_object
Andrii Nakryiko
- [PATCH bpf-next 4/8] libbpf: move feature detection code into its own file
Andrii Nakryiko
- [PATCH bpf-next 4/8] libbpf: move feature detection code into its own file
John Fastabend
- [PATCH bpf-next 5/8] libbpf: wire up token_fd into feature probing logic
Andrii Nakryiko
- [PATCH bpf-next 5/8] libbpf: wire up token_fd into feature probing logic
John Fastabend
- [PATCH bpf-next 6/8] libbpf: wire up BPF token support at BPF object level
Andrii Nakryiko
- [PATCH bpf-next 6/8] libbpf: wire up BPF token support at BPF object level
John Fastabend
- [PATCH bpf-next 6/8] libbpf: wire up BPF token support at BPF object level
Andrii Nakryiko
- [PATCH bpf-next 6/8] libbpf: wire up BPF token support at BPF object level
John Fastabend
- [PATCH bpf-next 7/8] selftests/bpf: add BPF object loading tests with explicit token passing
Andrii Nakryiko
- [PATCH bpf-next 7/8] selftests/bpf: add BPF object loading tests with explicit token passing
John Fastabend
- [PATCH bpf-next 8/8] selftests/bpf: add tests for BPF object load with implicit token
Andrii Nakryiko
- [PATCH bpf-next 8/8] selftests/bpf: add tests for BPF object load with implicit token
John Fastabend
- [PATCH bpf-next] bpf: add small subset of SECURITY_PATH hooks to BPF sleepable_lsm_hooks list
Matt Bobrowski
- [PATCH bpf-next] bpf: add small subset of SECURITY_PATH hooks to BPF sleepable_lsm_hooks list
KP Singh
- [PATCH bpf-next] bpf: add small subset of SECURITY_PATH hooks to BPF sleepable_lsm_hooks list
patchwork-bot+netdevbpf at kernel.org
- [PATCH net v2] calipso: Fix memory leak in netlbl_calipso_add_pass()
Paul Moore
- [PATCH net v2] calipso: Fix memory leak in netlbl_calipso_add_pass()
Gavrilov Ilia
- [PATCH net v2] calipso: Fix memory leak in netlbl_calipso_add_pass()
Jakub Kicinski
- [PATCH net v2] calipso: Fix memory leak in netlbl_calipso_add_pass()
Paul Moore
- [PATCH next] keys/dns: datalen must greater than sizeof(*v1)
Edward Adam Davis
- [PATCH next] keys/dns: datalen must greater than sizeof(*v1)
Jarkko Sakkinen
- [PATCH RFC bpf-next 0/3] BPF FS mount options parsing follow ups
Andrii Nakryiko
- [PATCH RFC bpf-next 1/3] bpf: add mapper macro for bpf_cmd enum
Andrii Nakryiko
- [PATCH RFC bpf-next 1/3] bpf: add mapper macro for bpf_cmd enum
Alexei Starovoitov
- [PATCH RFC bpf-next 1/3] bpf: add mapper macro for bpf_cmd enum
Andrii Nakryiko
- [PATCH RFC bpf-next 1/3] bpf: add mapper macro for bpf_cmd enum
Alexei Starovoitov
- [PATCH RFC bpf-next 1/3] bpf: add mapper macro for bpf_cmd enum
Martin KaFai Lau
- [PATCH RFC bpf-next 1/3] bpf: add mapper macro for bpf_cmd enum
Andrii Nakryiko
- [PATCH RFC bpf-next 2/3] bpf: extend parsing logic for BPF FS delegate_cmds mount option
Andrii Nakryiko
- [PATCH RFC bpf-next 3/3] selftests/bpf: utilize string values for delegate_xxx mount options
Andrii Nakryiko
- [PATCH v11 bpf-next 02/17] bpf: add BPF token delegation mount options to BPF FS
Simon Horman
- [PATCH v12 bpf-next 00/17] BPF token and BPF FS-based delegation
patchwork-bot+netdevbpf at kernel.org
- [PATCH v12 bpf-next 03/17] bpf: introduce BPF token object
Alexei Starovoitov
- [PATCH v12 bpf-next 03/17] bpf: introduce BPF token object
Andrii Nakryiko
- [PATCH v12 bpf-next 03/17] bpf: introduce BPF token object
Christian Brauner
- [PATCH v12 bpf-next 03/17] bpf: introduce BPF token object
Andrii Nakryiko
- [PATCH v12 bpf-next 03/17] bpf: introduce BPF token object
Christian Brauner
- [PATCH v14 10/12] selftests/landlock: Add network tests
Muhammad Usama Anjum
- [PATCH v14 10/12] selftests/landlock: Add network tests
Mickaël Salaün
- [PATCH v14 10/12] selftests/landlock: Add network tests
Muhammad Usama Anjum
- [PATCH v15 bpf-next 0/6] bpf: File verification with LSM and fsverity
patchwork-bot+netdevbpf at kernel.org
- [PATCH v2 0/3] arch/x86: Remove unnecessary dependencies on bootparam.h
Thomas Zimmermann
- [PATCH v2 0/3] clean up io_uring cmd header structure
Pavel Begunkov
- [PATCH v2 0/3] clean up io_uring cmd header structure
Jens Axboe
- [PATCH v2 1/2] selftests/landlock: Add tests to check unknown rule's access rights
Mickaël Salaün
- [PATCH v2 1/2] selftests/landlock: Add tests to check unknown rule's access rights
Günther Noack
- [PATCH v2 1/3] arch/x86: Move UAPI setup structures into setup_data.h
Thomas Zimmermann
- [PATCH v2 1/3] arch/x86: Move UAPI setup structures into setup_data.h
Ard Biesheuvel
- [PATCH v2 1/3] io_uring: split out cmd api into a separate header
Pavel Begunkov
- [PATCH v2 1/3] io_uring: split out cmd api into a separate header
Ming Lei
- [PATCH v2 2/2] selftests/landlock: Add tests to check unhandled rule's access rights
Günther Noack
- [PATCH v2 2/3] arch/x86: Add <asm/ima-efi.h> for arch_ima_efi_boot_mode
Thomas Zimmermann
- [PATCH v2 2/3] arch/x86: Add <asm/ima-efi.h> for arch_ima_efi_boot_mode
Ard Biesheuvel
- [PATCH v2 2/3] io_uring/cmd: inline io_uring_cmd_do_in_task_lazy
Pavel Begunkov
- [PATCH v2 2/3] io_uring/cmd: inline io_uring_cmd_do_in_task_lazy
Ming Lei
- [PATCH v2 3/3] arch/x86: Do not include <asm/bootparam.h> in several header files
Thomas Zimmermann
- [PATCH v2 3/3] io_uring/cmd: inline io_uring_cmd_get_task
Pavel Begunkov
- [PATCH v2 3/3] io_uring/cmd: inline io_uring_cmd_get_task
Ming Lei
- [PATCH v2] lsm: Add a __counted_by() annotation to lsm_ctx.ctx
Mark Brown
- [PATCH v2] lsm: Add a __counted_by() annotation to lsm_ctx.ctx
Paul Moore
- [PATCH v2] selinux: Fix error priority for bind with AF_UNSPEC on AF_INET6 socket
Mickaël Salaün
- [PATCH v2] selinux: Fix error priority for bind with AF_UNSPEC on AF_INET6 socket
Paul Moore
- [PATCH V2 next] keys/dns: fix slab-out-of-bounds in dns_resolver_preparse
Edward Adam Davis
- [PATCH V2 next] keys/dns: fix slab-out-of-bounds in dns_resolver_preparse
Simon Horman
- [PATCH v3 0/7] mm, security, bpf: Fine-grained control over memory policy adjustments with lsm bpf
Yafang Shao
- [PATCH v3 1/7] mm, doc: Add doc for MPOL_F_NUMA_BALANCING
Yafang Shao
- [PATCH v3 2/7] mm: mempolicy: Revise comment regarding mempolicy mode flags
Yafang Shao
- [PATCH v3 3/7] mm, security: Fix missed security_task_movememory()
Yafang Shao
- [PATCH v3 3/7] mm, security: Fix missed security_task_movememory()
Serge E. Hallyn
- [PATCH v3 3/7] mm, security: Fix missed security_task_movememory()
Yafang Shao
- [PATCH v3 4/7] mm, security: Add lsm hook for memory policy adjustment
Yafang Shao
- [PATCH v3 5/7] security: selinux: Implement set_mempolicy hook
Yafang Shao
- [PATCH v3 6/7] selftests/bpf: Add selftests for set_mempolicy with a lsm prog
Yafang Shao
- [PATCH v3 7/7] NOT kernel/man2/mbind.2: Add mode flag MPOL_F_NUMA_BALANCING
Yafang Shao
- [PATCH v39 00/42] LSM: General module stacking
Casey Schaufler
- [PATCH v39 01/42] integrity: disassociate ima_filter_rule from security_audit_rule
Casey Schaufler
- [PATCH v39 02/42] SM: Infrastructure management of the sock security
Casey Schaufler
- [PATCH v39 03/42] LSM: Add the lsmblob data structure.
Casey Schaufler
- [PATCH v39 04/42] IMA: avoid label collisions with stacked LSMs
Casey Schaufler
- [PATCH v39 05/42] LSM: Use lsmblob in security_audit_rule_match
Casey Schaufler
- [PATCH v39 06/42] LSM: Add lsmblob_to_secctx hook
Casey Schaufler
- [PATCH v39 07/42] Audit: maintain an lsmblob in audit_context
Casey Schaufler
- [PATCH v39 08/42] LSM: Use lsmblob in security_ipc_getsecid
Casey Schaufler
- [PATCH v39 09/42] Audit: Update shutdown LSM data
Casey Schaufler
- [PATCH v39 10/42] LSM: Use lsmblob in security_current_getsecid
Casey Schaufler
- [PATCH v39 11/42] LSM: Use lsmblob in security_inode_getsecid
Casey Schaufler
- [PATCH v39 12/42] Audit: use an lsmblob in audit_names
Casey Schaufler
- [PATCH v39 13/42] LSM: Create new security_cred_getlsmblob LSM hook
Casey Schaufler
- [PATCH v39 14/42] Audit: Change context data from secid to lsmblob
Casey Schaufler
- [PATCH v39 15/42] Netlabel: Use lsmblob for audit data
Casey Schaufler
- [PATCH v39 16/42] LSM: Ensure the correct LSM context releaser
Casey Schaufler
- [PATCH v39 17/42] LSM: Use lsmcontext in security_secid_to_secctx
Casey Schaufler
- [PATCH v39 18/42] LSM: Use lsmcontext in security_lsmblob_to_secctx
Casey Schaufler
- [PATCH v39 19/42] LSM: Use lsmcontext in security_inode_getsecctx
Casey Schaufler
- [PATCH v39 20/42] LSM: Use lsmcontext in security_dentry_init_security
Casey Schaufler
- [PATCH v39 20/42] LSM: Use lsmcontext in security_dentry_init_security
Xiubo Li
- [PATCH v39 20/42] LSM: Use lsmcontext in security_dentry_init_security
Casey Schaufler
- [PATCH v39 21/42] LSM: security_lsmblob_to_secctx module selection
Casey Schaufler
- [PATCH v39 22/42] Audit: Create audit_stamp structure
Casey Schaufler
- [PATCH v39 23/42] Audit: Allow multiple records in an audit_buffer
Casey Schaufler
- [PATCH v39 24/42] Audit: Add record for multiple task security contexts
Casey Schaufler
- [PATCH v39 25/42] audit: multiple subject lsm values for netlabel
Casey Schaufler
- [PATCH v39 26/42] Audit: Add record for multiple object contexts
Casey Schaufler
- [PATCH v39 27/42] LSM: Remove unused lsmcontext_init()
Casey Schaufler
- [PATCH v39 28/42] LSM: Improve logic in security_getprocattr
Casey Schaufler
- [PATCH v39 29/42] LSM: secctx provider check on release
Casey Schaufler
- [PATCH v39 30/42] LSM: Single calls in socket_getpeersec hooks
Casey Schaufler
- [PATCH v39 31/42] LSM: Exclusive secmark usage
Casey Schaufler
- [PATCH v39 32/42] LSM: Identify which LSM handles the context string
Casey Schaufler
- [PATCH v39 33/42] AppArmor: Remove the exclusive flag
Casey Schaufler
- [PATCH v39 34/42] LSM: Add mount opts blob size tracking
Casey Schaufler
- [PATCH v39 35/42] LSM: allocate mnt_opts blobs instead of module specific data
Casey Schaufler
- [PATCH v39 36/42] LSM: Infrastructure management of the key security blob
Casey Schaufler
- [PATCH v39 37/42] LSM: Infrastructure management of the mnt_opts security blob
Casey Schaufler
- [PATCH v39 38/42] LSM: Correct handling of ENOSYS in inode_setxattr
Casey Schaufler
- [PATCH v39 39/42] LSM: Remove lsmblob scaffolding
Casey Schaufler
- [PATCH v39 40/42] LSM: Allow reservation of netlabel
Casey Schaufler
- [PATCH v39 41/42] LSM: restrict security_cred_getsecid() to a single LSM
Casey Schaufler
- [PATCH v39 42/42] Smack: Remove LSM_FLAG_EXCLUSIVE
Casey Schaufler
- [PATCH v39 42/42] Smack: Remove LSM_FLAG_EXCLUSIVE
Leesoo Ahn
- [PATCH v4 0/5] mm, security, bpf: Fine-grained control over memory policy adjustments with lsm bpf
Yafang Shao
- [PATCH v4 0/7] Landlock: IOCTL support
Günther Noack
- [PATCH v4 1/5] mm, doc: Add doc for MPOL_F_NUMA_BALANCING
Yafang Shao
- [PATCH v4 2/5] mm: mempolicy: Revise comment regarding mempolicy mode flags
Yafang Shao
- [PATCH v4 3/5] mm, security: Add lsm hook for memory policy adjustment
Yafang Shao
- [PATCH v4 3/5] mm, security: Add lsm hook for memory policy adjustment
Casey Schaufler
- [PATCH v4 3/5] mm, security: Add lsm hook for memory policy adjustment
Yafang Shao
- [PATCH v4 4/4] vduse: Add LSM hooks to check Virtio device type
Maxime Coquelin
- [PATCH v4 4/4] vduse: Add LSM hooks to check Virtio device type
Michael S. Tsirkin
- [PATCH v4 4/4] vduse: Add LSM hooks to check Virtio device type
Maxime Coquelin
- [PATCH v4 4/4] vduse: Add LSM hooks to check Virtio device type
Michael S. Tsirkin
- [PATCH v4 4/4] vduse: Add LSM hooks to check Virtio device type
Maxime Coquelin
- [PATCH v4 4/5] security: selinux: Implement set_mempolicy hook
Yafang Shao
- [PATCH v4 5/5] selftests/bpf: Add selftests for set_mempolicy with a lsm prog
Yafang Shao
- [PATCH v4 5/5] selftests/bpf: Add selftests for set_mempolicy with a lsm prog
KP Singh
- [PATCH v4 5/5] selftests/bpf: Add selftests for set_mempolicy with a lsm prog
Yafang Shao
- [PATCH v5 0/4] vduse: add support for networking devices
Maxime Coquelin
- [PATCH v5 0/6] DCP as trusted keys backend
David Gstir
- [PATCH v5 0/6] DCP as trusted keys backend
Paul Moore
- [PATCH v5 1/4] vduse: validate block features only with block devices
Maxime Coquelin
- [PATCH v5 1/6] crypto: mxs-dcp: Add support for hardware-bound keys
David Gstir
- [PATCH v5 2/4] vduse: Temporarily disable control queue features
Maxime Coquelin
- [PATCH v5 2/4] vduse: Temporarily disable control queue features
Jason Wang
- [PATCH v5 2/4] vduse: Temporarily disable control queue features
Maxime Coquelin
- [PATCH v5 2/4] vduse: Temporarily disable control queue features
Jason Wang
- [PATCH v5 2/4] vduse: Temporarily disable control queue features
Maxime Coquelin
- [PATCH v5 2/4] vduse: Temporarily disable control queue features
Jason Wang
- [PATCH v5 2/6] KEYS: trusted: improve scalability of trust source config
David Gstir
- [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
Casey Schaufler
- [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
Dr. Greg
- [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
Casey Schaufler
- [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
Dr. Greg
- [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
Casey Schaufler
- [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
Roberto Sassu
- [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
Mimi Zohar
- [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
Roberto Sassu
- [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
Mimi Zohar
- [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
Roberto Sassu
- [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
Roberto Sassu
- [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
Casey Schaufler
- [PATCH v5 3/4] vduse: enable Virtio-net device type
Maxime Coquelin
- [PATCH v5 3/6] KEYS: trusted: Introduce NXP DCP-backed trusted keys
David Gstir
- [PATCH v5 4/4] vduse: Add LSM hook to check Virtio device type
Maxime Coquelin
- [PATCH v5 4/4] vduse: Add LSM hook to check Virtio device type
Casey Schaufler
- [PATCH v5 4/4] vduse: Add LSM hook to check Virtio device type
Michael S. Tsirkin
- [PATCH v5 4/4] vduse: Add LSM hook to check Virtio device type
Casey Schaufler
- [PATCH v5 4/4] vduse: Add LSM hook to check Virtio device type
Serge E. Hallyn
- [PATCH v5 4/4] vduse: Add LSM hook to check Virtio device type
Stephen Smalley
- [PATCH v5 4/4] vduse: Add LSM hook to check Virtio device type
Stephen Smalley
- [PATCH v5 4/4] vduse: Add LSM hook to check Virtio device type
Paul Moore
- [PATCH v5 4/6] MAINTAINERS: add entry for DCP-based trusted keys
David Gstir
- [PATCH v5 5/6] docs: document DCP-backed trusted keys kernel params
David Gstir
- [PATCH v5 6/6] docs: trusted-encrypted: add DCP as new trust source
David Gstir
- [PATCH v5 bpf-next 0/5] mm, security, bpf: Fine-grained control over memory policy adjustments with lsm bpf
Yafang Shao
- [PATCH v5 bpf-next 0/5] mm, security, bpf: Fine-grained control over memory policy adjustments with lsm bpf
Paul Moore
- [PATCH v5 bpf-next 0/5] mm, security, bpf: Fine-grained control over memory policy adjustments with lsm bpf
Yafang Shao
- [PATCH v5 bpf-next 0/5] mm, security, bpf: Fine-grained control over memory policy adjustments with lsm bpf
Paul Moore
- [PATCH v5 bpf-next 0/5] mm, security, bpf: Fine-grained control over memory policy adjustments with lsm bpf
Yafang Shao
- [PATCH v5 bpf-next 1/5] mm, doc: Add doc for MPOL_F_NUMA_BALANCING
Yafang Shao
- [PATCH v5 bpf-next 2/5] mm: mempolicy: Revise comment regarding mempolicy mode flags
Yafang Shao
- [PATCH v5 bpf-next 3/5] mm, security: Add lsm hook for memory policy adjustment
Yafang Shao
- [PATCH v5 bpf-next 4/5] security: selinux: Implement set_mempolicy hook
Yafang Shao
- [PATCH v5 bpf-next 5/5] selftests/bpf: Add selftests for set_mempolicy with a lsm prog
Yafang Shao
- [PATCH v6 1/9] landlock: Remove remaining "inline" modifiers in .c files
Günther Noack
- [PATCH v6 4/9] landlock: Add IOCTL access right
Günther Noack
- [PATCH v7 0/9] Landlock: IOCTL support
Günther Noack
- [PATCH v7 1/9] landlock: Remove remaining "inline" modifiers in .c files
Günther Noack
- [PATCH v7 2/9] selftests/landlock: Rename "permitted" to "allowed" in ftruncate tests
Günther Noack
- [PATCH v7 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
Roberto Sassu
- [PATCH v7 3/9] landlock: Optimize the number of calls to get_access_mask slightly
Günther Noack
- [PATCH v7 4/9] landlock: Add IOCTL access right
Günther Noack
- [PATCH v7 4/9] landlock: Add IOCTL access right
Jeff Xu
- [PATCH v7 4/9] landlock: Add IOCTL access right
Günther Noack
- [PATCH v7 4/9] landlock: Add IOCTL access right
Jeff Xu
- [PATCH v7 5/9] selftests/landlock: Test IOCTL support
Günther Noack
- [PATCH v7 6/9] selftests/landlock: Test IOCTL with memfds
Günther Noack
- [PATCH v7 7/9] selftests/landlock: Test ioctl(2) and ftruncate(2) with open(O_PATH)
Günther Noack
- [PATCH v7 8/9] samples/landlock: Add support for LANDLOCK_ACCESS_FS_IOCTL
Günther Noack
- [PATCH v7 9/9] landlock: Document IOCTL support
Günther Noack
- [PATCH v7 9/9] landlock: Document IOCTL support
Jeff Xu
- [PATCH v7 9/9] landlock: Document IOCTL support
Günther Noack
- [PATCH v7 9/9] landlock: Document IOCTL support
Jeff Xu
- [PATCH v8 0/9] Landlock: IOCTL support
Günther Noack
- [PATCH v8 00/24] security: Move IMA and EVM to the LSM infrastructure
Roberto Sassu
- [PATCH v8 01/24] ima: Align ima_inode_post_setattr() definition with LSM infrastructure
Roberto Sassu
- [PATCH v8 02/24] ima: Align ima_file_mprotect() definition with LSM infrastructure
Roberto Sassu
- [PATCH v8 03/24] ima: Align ima_inode_setxattr() definition with LSM infrastructure
Roberto Sassu
- [PATCH v8 04/24] ima: Align ima_inode_removexattr() definition with LSM infrastructure
Roberto Sassu
- [PATCH v8 05/24] ima: Align ima_post_read_file() definition with LSM infrastructure
Roberto Sassu
- [PATCH v8 06/24] evm: Align evm_inode_post_setattr() definition with LSM infrastructure
Roberto Sassu
- [PATCH v8 07/24] evm: Align evm_inode_setxattr() definition with LSM infrastructure
Roberto Sassu
- [PATCH v8 08/24] evm: Align evm_inode_post_setxattr() definition with LSM infrastructure
Roberto Sassu
- [PATCH v8 09/24] security: Align inode_setattr hook definition with EVM
Roberto Sassu
- [PATCH v8 1/9] landlock: Remove remaining "inline" modifiers in .c files
Günther Noack
- [PATCH v8 10/24] security: Introduce inode_post_setattr hook
Roberto Sassu
- [PATCH v8 11/24] security: Introduce inode_post_removexattr hook
Roberto Sassu
- [PATCH v8 11/24] security: Introduce inode_post_removexattr hook
Casey Schaufler
- [PATCH v8 12/24] security: Introduce file_post_open hook
Roberto Sassu
- [PATCH v8 13/24] security: Introduce file_release hook
Roberto Sassu
- [PATCH v8 13/24] security: Introduce file_release hook
Casey Schaufler
- [PATCH v8 14/24] security: Introduce path_post_mknod hook
Roberto Sassu
- [PATCH v8 15/24] security: Introduce inode_post_create_tmpfile hook
Roberto Sassu
- [PATCH v8 16/24] security: Introduce inode_post_set_acl hook
Roberto Sassu
- [PATCH v8 17/24] security: Introduce inode_post_remove_acl hook
Roberto Sassu
- [PATCH v8 18/24] security: Introduce key_post_create_or_update hook
Roberto Sassu
- [PATCH v8 19/24] ima: Move to LSM infrastructure
Roberto Sassu
- [PATCH v8 19/24] ima: Move to LSM infrastructure
Mimi Zohar
- [PATCH v8 19/24] ima: Move to LSM infrastructure
Casey Schaufler
- [PATCH v8 19/24] ima: Move to LSM infrastructure
Mimi Zohar
- [PATCH v8 19/24] ima: Move to LSM infrastructure
Casey Schaufler
- [PATCH v8 2/9] selftests/landlock: Rename "permitted" to "allowed" in ftruncate tests
Günther Noack
- [PATCH v8 20/24] ima: Move IMA-Appraisal to LSM infrastructure
Roberto Sassu
- [PATCH v8 20/24] ima: Move IMA-Appraisal to LSM infrastructure
Mimi Zohar
- [PATCH v8 21/24] evm: Move to LSM infrastructure
Roberto Sassu
- [PATCH v8 21/24] evm: Move to LSM infrastructure
Casey Schaufler
- [PATCH v8 21/24] evm: Move to LSM infrastructure
Mimi Zohar
- [PATCH v8 22/24] evm: Make it independent from 'integrity' LSM
Roberto Sassu
- [PATCH v8 22/24] evm: Make it independent from 'integrity' LSM
Mimi Zohar
- [PATCH v8 23/24] ima: Make it independent from 'integrity' LSM
Roberto Sassu
- [PATCH v8 23/24] ima: Make it independent from 'integrity' LSM
Roberto Sassu
- [PATCH v8 23/24] ima: Make it independent from 'integrity' LSM
Mimi Zohar
- [PATCH v8 23/24] ima: Make it independent from 'integrity' LSM
Roberto Sassu
- [PATCH v8 23/24] ima: Make it independent from 'integrity' LSM
Mimi Zohar
- [PATCH v8 24/24] integrity: Remove LSM
Roberto Sassu
- [PATCH v8 3/9] landlock: Optimize the number of calls to get_access_mask slightly
Günther Noack
- [PATCH v8 4/9] landlock: Add IOCTL access right
Günther Noack
- [PATCH v8 4/9] landlock: Add IOCTL access right
Mickaël Salaün
- [PATCH v8 4/9] landlock: Add IOCTL access right
Mickaël Salaün
- [PATCH v8 4/9] landlock: Add IOCTL access right
Mickaël Salaün
- [PATCH v8 5/5] security: Add CONFIG_SECURITY_HOOK_LIKELY
Kees Cook
- [PATCH v8 5/5] security: Add CONFIG_SECURITY_HOOK_LIKELY
Paul Moore
- [PATCH v8 5/5] security: Add CONFIG_SECURITY_HOOK_LIKELY
Paul Moore
- [PATCH v8 5/5] security: Add CONFIG_SECURITY_HOOK_LIKELY
Kees Cook
- [PATCH v8 5/5] security: Add CONFIG_SECURITY_HOOK_LIKELY
Paul Moore
- [PATCH v8 5/5] security: Add CONFIG_SECURITY_HOOK_LIKELY
Kees Cook
- [PATCH v8 5/5] security: Add CONFIG_SECURITY_HOOK_LIKELY
Paul Moore
- [PATCH v8 5/5] security: Add CONFIG_SECURITY_HOOK_LIKELY
Kees Cook
- [PATCH v8 5/5] security: Add CONFIG_SECURITY_HOOK_LIKELY
KP Singh
- [PATCH v8 5/5] security: Add CONFIG_SECURITY_HOOK_LIKELY
Tetsuo Handa
- [PATCH v8 5/5] security: Add CONFIG_SECURITY_HOOK_LIKELY
Paul Moore
- [PATCH v8 5/5] security: Add CONFIG_SECURITY_HOOK_LIKELY
KP Singh
- [PATCH v8 5/5] security: Add CONFIG_SECURITY_HOOK_LIKELY
Paul Moore
- [PATCH v8 5/9] selftests/landlock: Test IOCTL support
Günther Noack
- [PATCH v8 5/9] selftests/landlock: Test IOCTL support
Aishwarya TCV
- [PATCH v8 6/9] selftests/landlock: Test IOCTL with memfds
Günther Noack
- [PATCH v8 7/9] selftests/landlock: Test ioctl(2) and ftruncate(2) with open(O_PATH)
Günther Noack
- [PATCH v8 8/9] samples/landlock: Add support for LANDLOCK_ACCESS_FS_IOCTL
Günther Noack
- [PATCH v8 9/9] landlock: Document IOCTL support
Günther Noack
- [PATCH v8 9/9] landlock: Document IOCTL support
Mickaël Salaün
- [PATCH v8 9/9] landlock: Document IOCTL support
Günther Noack
- [PATCH v8 9/9] landlock: Document IOCTL support
Mickaël Salaün
- [PATCH v8 9/9] landlock: Document IOCTL support
Mickaël Salaün
- [RFC][PATCH] overlayfs: Redirect xattr ops on security.evm to security.evm_overlayfs
Roberto Sassu
- [RFC][PATCH] overlayfs: Redirect xattr ops on security.evm to security.evm_overlayfs
Amir Goldstein
- [RFC][PATCH] overlayfs: Redirect xattr ops on security.evm to security.evm_overlayfs
Christian Brauner
- [RFC][PATCH] overlayfs: Redirect xattr ops on security.evm to security.evm_overlayfs
Roberto Sassu
- [RFC][PATCH] overlayfs: Redirect xattr ops on security.evm to security.evm_overlayfs
Seth Forshee
- [RFC][PATCH] overlayfs: Redirect xattr ops on security.evm to security.evm_overlayfs
Roberto Sassu
- [RFC][PATCH] overlayfs: Redirect xattr ops on security.evm to security.evm_overlayfs
Seth Forshee
- [RFC][PATCH] overlayfs: Redirect xattr ops on security.evm to security.evm_overlayfs
Christian Brauner
- [RFC][PATCH] overlayfs: Redirect xattr ops on security.evm to security.evm_overlayfs
Amir Goldstein
- [RFC][PATCH] overlayfs: Redirect xattr ops on security.evm to security.evm_overlayfs
Amir Goldstein
- [RFC][PATCH] overlayfs: Redirect xattr ops on security.evm to security.evm_overlayfs
Roberto Sassu
- [RFC][PATCH] overlayfs: Redirect xattr ops on security.evm to security.evm_overlayfs
Amir Goldstein
- [RFC][PATCH] overlayfs: Redirect xattr ops on security.evm to security.evm_overlayfs
Roberto Sassu
- [RFC][PATCH] overlayfs: Redirect xattr ops on security.evm to security.evm_overlayfs
Roberto Sassu
- [RFC][PATCH] overlayfs: Redirect xattr ops on security.evm to security.evm_overlayfs
Mimi Zohar
- [RFC][PATCH] overlayfs: Redirect xattr ops on security.evm to security.evm_overlayfs
Roberto Sassu
- [RFC][PATCH] overlayfs: Redirect xattr ops on security.evm to security.evm_overlayfs
Roberto Sassu
- [RFC][PATCH] overlayfs: Redirect xattr ops on security.evm to security.evm_overlayfs
Amir Goldstein
- [RFC][PATCH] overlayfs: Redirect xattr ops on security.evm to security.evm_overlayfs
Mimi Zohar
- [RFC][PATCH] overlayfs: Redirect xattr ops on security.evm to security.evm_overlayfs
Amir Goldstein
- [RFC][PATCH] overlayfs: Redirect xattr ops on security.evm to security.evm_overlayfs
Mimi Zohar
- [RFC PATCH 3/3] lsm: consolidate buffer size handling into lsm_fill_user_ctx()
Aishwarya TCV
- [RFC PATCH 3/3] lsm: consolidate buffer size handling into lsm_fill_user_ctx()
Paul Moore
- [RFC PATCH 3/3] lsm: consolidate buffer size handling into lsm_fill_user_ctx()
Paul Moore
- [RFC PATCH v1 1/7] lsm: Add audit_log_lsm_data() helper
Paul Moore
- [RFC PATCH v1 3/7] landlock: Log ruleset creation and release
Paul Moore
- [RFC PATCH v1 3/7] landlock: Log ruleset creation and release
Mickaël Salaün
- [RFC PATCH v1 3/7] landlock: Log ruleset creation and release
Paul Moore
- [RFC PATCH v1 3/7] landlock: Log ruleset creation and release
Mickaël Salaün
- [RFC PATCH v1 4/7] landlock: Log domain creation and enforcement
Paul Moore
- [RFC PATCH v1 4/7] landlock: Log domain creation and enforcement
Mickaël Salaün
- [RFC PATCH v1 5/7] landlock: Log file-related requests
Paul Moore
- [RFC PATCH v1 5/7] landlock: Log file-related requests
Mickaël Salaün
- [RFC PATCH v2 17/19] heki: x86: Update permissions counters during text patching
Edgecombe, Rick P
- [RFC PATCH v2 17/19] heki: x86: Update permissions counters during text patching
Madhavan T. Venkataraman
- [RFC PATCH v2 17/19] heki: x86: Update permissions counters during text patching
Madhavan T. Venkataraman
- [RFC PATCH v2 17/19] heki: x86: Update permissions counters during text patching
Peter Zijlstra
- [RFC PATCH v2 17/19] heki: x86: Update permissions counters during text patching
Madhavan T. Venkataraman
- [RFC PATCH v3 0/3] devguard: guard mknod for non-initial user namespace
Michael Weiß
- [RFC PATCH v3 1/3] bpf: cgroup: Introduce helper cgroup_bpf_current_enabled()
Michael Weiß
- [RFC PATCH v3 1/3] bpf: cgroup: Introduce helper cgroup_bpf_current_enabled()
Yonghong Song
- [RFC PATCH v3 1/3] bpf: cgroup: Introduce helper cgroup_bpf_current_enabled()
Michael Weiß
- [RFC PATCH v3 1/3] bpf: cgroup: Introduce helper cgroup_bpf_current_enabled()
Yonghong Song
- [RFC PATCH v3 2/3] fs: Make vfs_mknod() to check CAP_MKNOD in user namespace of sb
Michael Weiß
- [RFC PATCH v3 3/3] devguard: added device guard for mknod in non-initial userns
Michael Weiß
- [RFC PATCH v3 3/3] devguard: added device guard for mknod in non-initial userns
Casey Schaufler
- [RFC PATCH v3 3/3] devguard: added device guard for mknod in non-initial userns
Christian Brauner
- [RFC PATCH v3 3/3] devguard: added device guard for mknod in non-initial userns
Michael Weiß
- [RFC PATCH v3 3/3] devguard: added device guard for mknod in non-initial userns
Christian Brauner
- [RFC PATCH v3 3/3] devguard: added device guard for mknod in non-initial userns
Christian Brauner
- [RFC PATCH v3 3/3] devguard: added device guard for mknod in non-initial userns
Alexei Starovoitov
- [RFC PATCH v3 3/3] devguard: added device guard for mknod in non-initial userns
Christian Brauner
- [RFC PATCH v3 3/3] devguard: added device guard for mknod in non-initial userns
Alexei Starovoitov
- [RFC PATCH v3 3/3] devguard: added device guard for mknod in non-initial userns
Christian Brauner
- [RFC PATCH v3 3/3] devguard: added device guard for mknod in non-initial userns
Alexander Mikhalitsyn
- [RFC PATCH v3 3/3] devguard: added device guard for mknod in non-initial userns
Alexander Mikhalitsyn
- [RFC PATCH v3 3/3] devguard: added device guard for mknod in non-initial userns
Christian Brauner
- [RFC PATCH v3 3/3] devguard: added device guard for mknod in non-initial userns
Michael Weiß
- [RFC PATCH v3 3/3] devguard: added device guard for mknod in non-initial userns
Paul Moore
- [RFC PATCH v3 3/3] devguard: added device guard for mknod in non-initial userns
Michael Weiß
- [RFC PATCH v3 3/3] devguard: added device guard for mknod in non-initial userns
Paul Moore
- [RFC PATCH v3] LSM: Officially support appending LSM hooks after boot.
Tetsuo Handa
- [RFC PATCH v3] LSM: Officially support appending LSM hooks after boot.
Paul Moore
- [RFC PATCH v3] LSM: Officially support appending LSM hooks after boot.
Tetsuo Handa
- [RFC PATCH v3] LSM: Officially support appending LSM hooks after boot.
Paul Moore
- [RFC V2] IMA Log Snapshotting Design Proposal
Ken Goldman
- [syzbot] [net?] KASAN: slab-out-of-bounds Read in dns_resolver_preparse
syzbot
- [syzbot] [net?] KASAN: slab-out-of-bounds Read in dns_resolver_preparse
David Howells
- [syzbot] [net?] KASAN: slab-out-of-bounds Read in dns_resolver_preparse
syzbot
- [syzbot] [net?] KASAN: slab-out-of-bounds Read in dns_resolver_preparse
David Howells
- [syzbot] [net?] KASAN: slab-out-of-bounds Read in dns_resolver_preparse
syzbot
- Apparmor move_mount mediation breaks mount tool in containers
Stéphane Graber
- Apparmor move_mount mediation breaks mount tool in containers
Linux regression tracking (Thorsten Leemhuis)
- Apparmor move_mount mediation breaks mount tool in containers
Christian Brauner
- Apparmor move_mount mediation breaks mount tool in containers
John Johansen
- Apparmor move_mount mediation breaks mount tool in containers
John Johansen
- Apparmor move_mount mediation breaks mount tool in containers
Stéphane Graber
- Apparmor move_mount mediation breaks mount tool in containers
John Johansen
- Apparmor move_mount mediation breaks mount tool in containers
Christian Brauner
- Apparmor move_mount mediation breaks mount tool in containers
John Johansen
- BPF LSM prevent program unload
Yafang Shao
- BPF LSM prevent program unload
Tetsuo Handa
- BPF LSM prevent program unload
Paul Moore
- BPF LSM prevent program unload
Casey Schaufler
- BPF LSM prevent program unload
Frederick Lawler
- BPF LSM prevent program unload
Song Liu
- BPF LSM prevent program unload
Frederick Lawler
- BPF LSM prevent program unload
Song Liu
- Fw: [PATCH] proc: Update inode upon changing task security attribute
Alexey Dobriyan
- Fw: [PATCH] proc: Update inode upon changing task security attribute
Munehisa Kamata
- Fw: [PATCH] proc: Update inode upon changing task security attribute
Casey Schaufler
- Fw: [PATCH] proc: Update inode upon changing task security attribute
Paul Moore
- Fw: [PATCH] proc: Update inode upon changing task security attribute
Casey Schaufler
- Fw: [PATCH] proc: Update inode upon changing task security attribute
Munehisa Kamata
- Fw: [PATCH] proc: Update inode upon changing task security attribute
Paul Moore
- Fw: [PATCH] proc: Update inode upon changing task security attribute
Casey Schaufler
- Fw: [PATCH] proc: Update inode upon changing task security attribute
Paul Moore
- Fw: [PATCH] proc: Update inode upon changing task security attribute
Casey Schaufler
- Fw: [PATCH] proc: Update inode upon changing task security attribute
Munehisa Kamata
- Fw: [PATCH] proc: Update inode upon changing task security attribute
Paul Moore
- Fw: [PATCH] proc: Update inode upon changing task security attribute
Paul Moore
- Fw: [PATCH] proc: Update inode upon changing task security attribute
Casey Schaufler
- Fw: [PATCH] proc: Update inode upon changing task security attribute
Munehisa Kamata
- Fw: [PATCH] proc: Update inode upon changing task security attribute
Munehisa Kamata
- Fw: [PATCH] proc: Update inode upon changing task security attribute
Serge E. Hallyn
- Fw: [PATCH] proc: Update inode upon changing task security attribute
Paul Moore
- Fw: [PATCH] proc: Update inode upon changing task security attribute
Paul Moore
- Fw: [PATCH] proc: Update inode upon changing task security attribute
Munehisa Kamata
- Fw: [PATCH] proc: Update inode upon changing task security attribute
Serge E. Hallyn
- Post Compile-Time RandStruct
Jasper Niebuhr
- Sunrise Trade Link Pvt. Ltd. "The Disappearing Act in Our Relationship"
Sunrise Trade Link Pvt. Ltd.
Last message date:
Fri Dec 29 22:31:08 UTC 2023
Archived on: Tue Dec 17 21:00:48 UTC 2024
This archive was generated by
Pipermail 0.09 (Mailman edition).