October 2023 Archives by subject
Starting: Sun Oct 1 10:51:49 UTC 2023
Ending: Tue Oct 31 19:15:23 UTC 2023
Messages: 582
- [GIT PULL] lsm/lsm-pr-20231030
Paul Moore
- [GIT PULL] lsm/lsm-pr-20231030
pr-tracker-bot at kernel.org
- [GIT PULL] selinux/selinux-pr-20231030
Paul Moore
- [GIT PULL] selinux/selinux-pr-20231030
Linus Torvalds
- [GIT PULL] selinux/selinux-pr-20231030
pr-tracker-bot at kernel.org
- [linux-next:master] BUILD REGRESSION 4d5ab2376ec576af173e5eac3887ed0b51bd8566
kernel test robot
- [PATCH -next 1/2] apparmor: Fix one kernel-doc comment
Yang Li
- [PATCH -next 2/2] apparmor: Fix some kernel-doc comments
Yang Li
- [PATCH -next] apparmor: Fix some kernel-doc comments
Yang Li
- [PATCH 0/2] lsm: fix default return values for some hooks
Ondrej Mosnacek
- [PATCH 1/2] lsm: fix default return value for vm_enough_memory
Ondrej Mosnacek
- [PATCH 2/2] lsm: fix default return value for inode_getsecctx
Ondrej Mosnacek
- [PATCH 84/87] security: convert to new inode {a,m}time accessors
Paul Moore
- [PATCH] apparmor: Fix null pointer deref when receiving skb during sock creation
John Johansen
- [PATCH] apparmor: mark new functions static
Arnd Bergmann
- [PATCH] apparmor: mark new functions static
John Johansen
- [PATCH] apparmor: switch SECURITY_APPARMOR_HASH from sha1 to sha256
Dimitri John Ledkov
- [PATCH] capabilities: add a option PR_SET_CAPS for sys_prctl
Yunhui Cui
- [PATCH] capabilities: add a option PR_SET_CAPS for sys_prctl
Paul Moore
- [PATCH] ima: Add __counted_by for struct modsig and use struct_size()
Gustavo A. R. Silva
- [PATCH] ima: Add __counted_by for struct modsig and use struct_size()
Kees Cook
- [PATCH] ima: Add __counted_by for struct modsig and use struct_size()
Mimi Zohar
- [PATCH] ima: Add __counted_by for struct modsig and use struct_size()
Kees Cook
- [PATCH] KEYS: trusted: Rollback init_trusted() consistently
Jarkko Sakkinen
- [PATCH] KEYS: trusted: Rollback init_trusted() consistently
Sumit Garg
- [PATCH] KEYS: trusted: Rollback init_trusted() consistently
Jarkko Sakkinen
- [PATCH] KEYS: trusted: Rollback init_trusted() consistently
Jarkko Sakkinen
- [PATCH] KEYS: trusted: Rollback init_trusted() consistently
Sumit Garg
- [PATCH] KEYS: trusted: Rollback init_trusted() consistently
Jarkko Sakkinen
- [PATCH] KEYS: trusted: Rollback init_trusted() consistently
Sumit Garg
- [PATCH] KEYS: trusted: Rollback init_trusted() consistently
Jarkko Sakkinen
- [PATCH] KEYS: trusted: Rollback init_trusted() consistently
Jarkko Sakkinen
- [PATCH] KEYS: trusted: Rollback init_trusted() consistently
Sumit Garg
- [PATCH] KEYS: trusted: Rollback init_trusted() consistently
Jarkko Sakkinen
- [PATCH] KEYS: trusted: Rollback init_trusted() consistently
Jarkko Sakkinen
- [PATCH] KEYS: trusted: Rollback init_trusted() consistently
Sumit Garg
- [PATCH] landlock: fix typo in landlock_append_net_rule() stub function
Arnd Bergmann
- [PATCH] landlock: fix typo in landlock_append_net_rule() stub function
Mickaël Salaün
- [PATCH] lsm: drop LSM_ID_IMA
Paul Moore
- [PATCH] lsm: drop LSM_ID_IMA
Roberto Sassu
- [PATCH] lsm: drop LSM_ID_IMA
Casey Schaufler
- [PATCH] lsm: drop LSM_ID_IMA
Roberto Sassu
- [PATCH] lsm: drop LSM_ID_IMA
Casey Schaufler
- [PATCH] lsm: drop LSM_ID_IMA
Roberto Sassu
- [PATCH] lsm: drop LSM_ID_IMA
Roberto Sassu
- [PATCH] lsm: drop LSM_ID_IMA
Paul Moore
- [PATCH] lsm: drop LSM_ID_IMA
Paul Moore
- [PATCH] lsm: drop LSM_ID_IMA
Roberto Sassu
- [PATCH] lsm: drop LSM_ID_IMA
Paul Moore
- [PATCH] lsm: drop LSM_ID_IMA
Roberto Sassu
- [PATCH] lsm: drop LSM_ID_IMA
Roberto Sassu
- [PATCH] lsm: drop LSM_ID_IMA
Roberto Sassu
- [PATCH] lsm: drop LSM_ID_IMA
Paul Moore
- [PATCH] lsm: drop LSM_ID_IMA
Paul Moore
- [PATCH] lsm: drop LSM_ID_IMA
Roberto Sassu
- [PATCH] lsm: fix a spelling mistake
Paul Moore
- [PATCH] lsm: fix a spelling mistake
Paul Moore
- [PATCH] security: Don't yet account for IMA in LSM_CONFIG_COUNT calculation
Roberto Sassu
- [PATCH] security: Don't yet account for IMA in LSM_CONFIG_COUNT calculation
Paul Moore
- [PATCH] security: Don't yet account for IMA in LSM_CONFIG_COUNT calculation
Roberto Sassu
- [PATCH] security: Don't yet account for IMA in LSM_CONFIG_COUNT calculation
Paul Moore
- [PATCH] security: Don't yet account for IMA in LSM_CONFIG_COUNT calculation
Paul Moore
- [PATCH] selftests/landlock: Add tests for FS topology changes with network rules
Mickaël Salaün
- [PATCH RFC v11 11/19] dm verity: set DM_TARGET_SINGLETON feature flag
Paul Moore
- [PATCH RFC v11 12/19] dm: add finalize hook to target_type
Paul Moore
- [PATCH RFC v11 13/19] dm verity: consume root hash digest and signature data via LSM hook
Paul Moore
- [PATCH RFC v11 14/19] ipe: add support for dm-verity as a trust provider
Paul Moore
- [PATCH RFC v11 15/19] fsverity: consume builtin signature via LSM hook
Paul Moore
- [PATCH RFC v11 16/19] ipe: enable support for fs-verity as a trust provider
Paul Moore
- [PATCH RFC v11 17/19] scripts: add boot policy generation program
Paul Moore
- [PATCH RFC v11 18/19] ipe: kunit test for parser
Paul Moore
- [PATCH RFC v11 2/19] ipe: add policy parser
Paul Moore
- [PATCH RFC v11 2/19] ipe: add policy parser
Fan Wu
- [PATCH RFC v11 2/19] ipe: add policy parser
Paul Moore
- [PATCH RFC v11 3/19] ipe: add evaluation loop
Paul Moore
- [PATCH RFC v11 3/19] ipe: add evaluation loop
Fan Wu
- [PATCH RFC v11 4/19] ipe: add LSM hooks on execution and kernel read
Paul Moore
- [PATCH RFC v11 5/19] ipe: introduce 'boot_verified' as a trust provider
Paul Moore
- [PATCH RFC v11 5/19] ipe: introduce 'boot_verified' as a trust provider
Fan Wu
- [PATCH RFC v11 5/19] ipe: introduce 'boot_verified' as a trust provider
Paul Moore
- [PATCH RFC v11 8/19] uapi|audit|ipe: add ipe auditing support
Paul Moore
- [PATCH RFC v11 9/19] ipe: add permissive toggle
Paul Moore
- [PATCH v12 02/12] landlock: Allow filesystem layout changes for domains without such rule type
Mickaël Salaün
- [PATCH v12 02/12] landlock: Allow filesystem layout changes for domains without such rule type
Konstantin Meskhidze (A)
- [PATCH v12 08/12] landlock: Add network rules and TCP hooks support
Mickaël Salaün
- [PATCH v12 08/12] landlock: Add network rules and TCP hooks support
Mickaël Salaün
- [PATCH v12 08/12] landlock: Add network rules and TCP hooks support
Mickaël Salaün
- [PATCH v12 08/12] landlock: Add network rules and TCP hooks support
Mickaël Salaün
- [PATCH v12 08/12] landlock: Add network rules and TCP hooks support
Konstantin Meskhidze (A)
- [PATCH v12 08/12] landlock: Add network rules and TCP hooks support
Konstantin Meskhidze (A)
- [PATCH v12 08/12] landlock: Add network rules and TCP hooks support
Konstantin Meskhidze (A)
- [PATCH v12 08/12] landlock: Add network rules and TCP hooks support
Konstantin Meskhidze (A)
- [PATCH v12 08/12] landlock: Add network rules and TCP hooks support
Mickaël Salaün
- [PATCH v12 08/12] landlock: Add network rules and TCP hooks support
Mickaël Salaün
- [PATCH v12 08/12] landlock: Add network rules and TCP hooks support
Konstantin Meskhidze (A)
- [PATCH v12 08/12] landlock: Add network rules and TCP hooks support
Konstantin Meskhidze (A)
- [PATCH v12 08/12] landlock: Add network rules and TCP hooks support
Konstantin Meskhidze (A)
- [PATCH v12 08/12] landlock: Add network rules and TCP hooks support
Mickaël Salaün
- [PATCH v12 08/12] landlock: Add network rules and TCP hooks support
Konstantin Meskhidze (A)
- [PATCH v12 09/12] selftests/landlock: Share enforce_ruleset()
Mickaël Salaün
- [PATCH v12 09/12] selftests/landlock: Share enforce_ruleset()
Konstantin Meskhidze (A)
- [PATCH v13 00/12] Network support for Landlock
Konstantin Meskhidze
- [PATCH v13 01/12] landlock: Make ruleset's access masks more generic
Konstantin Meskhidze
- [PATCH v13 01/12] landlock: Make ruleset's access masks more generic
Mickaël Salaün
- [PATCH v13 01/12] landlock: Make ruleset's access masks more generic
Konstantin Meskhidze (A)
- [PATCH v13 02/12] landlock: Allow FS topology changes for domains without such rule type
Konstantin Meskhidze
- [PATCH v13 03/12] landlock: Refactor landlock_find_rule/insert_rule
Konstantin Meskhidze
- [PATCH v13 04/12] landlock: Refactor merge/inherit_ruleset functions
Konstantin Meskhidze
- [PATCH v13 05/12] landlock: Move and rename layer helpers
Konstantin Meskhidze
- [PATCH v13 06/12] landlock: Refactor layer helpers
Konstantin Meskhidze
- [PATCH v13 07/12] landlock: Refactor landlock_add_rule() syscall
Konstantin Meskhidze
- [PATCH v13 07/12] landlock: Refactor landlock_add_rule() syscall
Mickaël Salaün
- [PATCH v13 07/12] landlock: Refactor landlock_add_rule() syscall
Mickaël Salaün
- [PATCH v13 07/12] landlock: Refactor landlock_add_rule() syscall
Konstantin Meskhidze (A)
- [PATCH v13 07/12] landlock: Refactor landlock_add_rule() syscall
Konstantin Meskhidze (A)
- [PATCH v13 08/12] landlock: Add network rules and TCP hooks support
Konstantin Meskhidze
- [PATCH v13 08/12] landlock: Add network rules and TCP hooks support
Mickaël Salaün
- [PATCH v13 08/12] landlock: Add network rules and TCP hooks support
Mickaël Salaün
- [PATCH v13 08/12] landlock: Add network rules and TCP hooks support
Konstantin Meskhidze (A)
- [PATCH v13 08/12] landlock: Add network rules and TCP hooks support
Konstantin Meskhidze (A)
- [PATCH v13 08/12] landlock: Add network rules and TCP hooks support
Mickaël Salaün
- [PATCH v13 08/12] landlock: Add network rules and TCP hooks support
Konstantin Meskhidze (A)
- [PATCH v13 08/12] landlock: Add network rules and TCP hooks support
Mickaël Salaün
- [PATCH v13 08/12] landlock: Add network rules and TCP hooks support
Konstantin Meskhidze (A)
- [PATCH v13 08/12] landlock: Add network rules and TCP hooks support
Mickaël Salaün
- [PATCH v13 08/12] landlock: Add network rules and TCP hooks support
Konstantin Meskhidze (A)
- [PATCH v13 08/12] landlock: Add network rules and TCP hooks support
Konstantin Meskhidze (A)
- [PATCH v13 08/12] landlock: Add network rules and TCP hooks support
Konstantin Meskhidze (A)
- [PATCH v13 08/12] landlock: Add network rules and TCP hooks support
Mickaël Salaün
- [PATCH v13 08/12] landlock: Add network rules and TCP hooks support
Konstantin Meskhidze (A)
- [PATCH v13 08/12] landlock: Add network rules and TCP hooks support
Mickaël Salaün
- [PATCH v13 08/12] landlock: Add network rules and TCP hooks support
Konstantin Meskhidze (A)
- [PATCH v13 09/12] selftests/landlock: Share enforce_ruleset()
Konstantin Meskhidze
- [PATCH v13 10/12] selftests/landlock: Add 7 new test variants dedicated to network
Konstantin Meskhidze
- [PATCH v13 10/12] selftests/landlock: Add 7 new test variants dedicated to network
Mickaël Salaün
- [PATCH v13 10/12] selftests/landlock: Add 7 new test variants dedicated to network
Konstantin Meskhidze (A)
- [PATCH v13 10/12] selftests/landlock: Add 7 new test variants dedicated to network
Mickaël Salaün
- [PATCH v13 10/12] selftests/landlock: Add 7 new test variants dedicated to network
Konstantin Meskhidze (A)
- [PATCH v13 10/12] selftests/landlock: Add 7 new test variants dedicated to network
Mickaël Salaün
- [PATCH v13 10/12] selftests/landlock: Add 7 new test variants dedicated to network
Konstantin Meskhidze (A)
- [PATCH v13 11/12] samples/landlock: Add network demo
Konstantin Meskhidze
- [PATCH v13 11/12] samples/landlock: Add network demo
Mickaël Salaün
- [PATCH v13 11/12] samples/landlock: Add network demo
Konstantin Meskhidze (A)
- [PATCH v13 12/12] landlock: Document Landlock's network support
Konstantin Meskhidze
- [PATCH v13 12/12] landlock: Document Landlock's network support
Mickaël Salaün
- [PATCH v13 12/12] landlock: Document Landlock's network support
Konstantin Meskhidze (A)
- [PATCH v14 00/12] Network support for Landlock
Konstantin Meskhidze
- [PATCH v14 00/12] Network support for Landlock
Mickaël Salaün
- [PATCH v14 00/12] Network support for Landlock
Konstantin Meskhidze (A)
- [PATCH v14 01/12] landlock: Make ruleset's access masks more generic
Konstantin Meskhidze
- [PATCH v14 02/12] landlock: Allow FS topology changes for domains without such rule type
Konstantin Meskhidze
- [PATCH v14 03/12] landlock: Refactor landlock_find_rule/insert_rule
Konstantin Meskhidze
- [PATCH v14 04/12] landlock: Refactor merge/inherit_ruleset functions
Konstantin Meskhidze
- [PATCH v14 05/12] landlock: Move and rename layer helpers
Konstantin Meskhidze
- [PATCH v14 06/12] landlock: Refactor layer helpers
Konstantin Meskhidze
- [PATCH v14 07/12] landlock: Refactor landlock_add_rule() syscall
Konstantin Meskhidze
- [PATCH v14 08/12] landlock: Add network rules and TCP hooks support
Konstantin Meskhidze
- [PATCH v14 09/12] selftests/landlock: Share enforce_ruleset()
Konstantin Meskhidze
- [PATCH v14 10/12] selftests/landlock: Add network tests
Konstantin Meskhidze
- [PATCH v14 11/12] samples/landlock: Support TCP restrictions
Konstantin Meskhidze
- [PATCH v14 12/12] landlock: Document network support
Konstantin Meskhidze
- [PATCH v15 00/11] LSM: Three basic syscalls
Paul Moore
- [PATCH v15 00/11] LSM: Three basic syscalls
Paul Moore
- [PATCH v15 00/11] LSM: Three basic syscalls
Roberto Sassu
- [PATCH v15 00/11] LSM: Three basic syscalls
Paul Moore
- [PATCH v15 00/11] LSM: Three basic syscalls
Roberto Sassu
- [PATCH v15 00/11] LSM: Three basic syscalls
Paul Moore
- [PATCH v15 00/11] LSM: Three basic syscalls
Roberto Sassu
- [PATCH v15 00/11] LSM: Three basic syscalls
Roberto Sassu
- [PATCH v15 00/11] LSM: Three basic syscalls
Mimi Zohar
- [PATCH v15 00/11] LSM: Three basic syscalls
Roberto Sassu
- [PATCH v15 00/11] LSM: Three basic syscalls
Paul Moore
- [PATCH v15 00/11] LSM: Three basic syscalls
Mimi Zohar
- [PATCH v15 00/11] LSM: Three basic syscalls
Paul Moore
- [PATCH v15 00/11] LSM: Three basic syscalls
Roberto Sassu
- [PATCH v15 00/11] LSM: Three basic syscalls
Roberto Sassu
- [PATCH v15 00/11] LSM: Three basic syscalls
Casey Schaufler
- [PATCH v15 01/11] LSM: Identify modules by more than name
Tetsuo Handa
- [PATCH v15 01/11] LSM: Identify modules by more than name
Casey Schaufler
- [PATCH v15 01/11] LSM: Identify modules by more than name
Tetsuo Handa
- [PATCH v15 01/11] LSM: Identify modules by more than name
Casey Schaufler
- [PATCH v15 01/11] LSM: Identify modules by more than name
Tetsuo Handa
- [PATCH v15 01/11] LSM: Identify modules by more than name
Casey Schaufler
- [PATCH v15 04/11] LSM: syscalls for current process attributes
Mickaël Salaün
- [PATCH v15 04/11] LSM: syscalls for current process attributes
Paul Moore
- [PATCH v15 04/11] LSM: syscalls for current process attributes
Mickaël Salaün
- [PATCH v15 04/11] LSM: syscalls for current process attributes
Paul Moore
- [PATCH v15 04/11] LSM: syscalls for current process attributes
Mickaël Salaün
- [PATCH v15 04/11] LSM: syscalls for current process attributes
Paul Moore
- [PATCH v15 05/11] LSM: Create lsm_list_modules system call
Mickaël Salaün
- [PATCH v15 06/11] LSM: wireup Linux Security Module syscalls
Mickaël Salaün
- [PATCH v15 07/11] LSM: Helpers for attribute names and filling lsm_ctx
Mickaël Salaün
- [PATCH v15 08/11] Smack: implement setselfattr and getselfattr hooks
Mickaël Salaün
- [PATCH v15 08/11] Smack: implement setselfattr and getselfattr hooks
Casey Schaufler
- [PATCH v15 08/11] Smack: implement setselfattr and getselfattr hooks
Casey Schaufler
- [PATCH v15 11/11] LSM: selftests for Linux Security Module syscalls
Mickaël Salaün
- [PATCH v1 net 2/2] dccp/tcp: Call security_inet_conn_request() after setting IPv6 addresses.
Paul Moore
- [PATCH v1 net 2/2] dccp/tcp: Call security_inet_conn_request() after setting IPv6 addresses.
Kuniyuki Iwashima
- [PATCH v1 net 2/2] dccp/tcp: Call security_inet_conn_request() after setting IPv6 addresses.
Paul Moore
- [PATCH v2 0/3] Reduce impact of overlayfs backing files fake path
Amir Goldstein
- [PATCH v2 00/89] fs: new accessor methods for inode atime and mtime
Jeff Layton
- [PATCH v2 01/89] fs: new accessor methods for atime and mtime
Jeff Layton
- [PATCH v2 02/89] fs: convert core infrastructure to new timestamp accessors
Jeff Layton
- [PATCH v2 1/3] fs: get mnt_writers count for an open backing file's real path
Amir Goldstein
- [PATCH v2 1/3] fs: get mnt_writers count for an open backing file's real path
Al Viro
- [PATCH v2 1/3] fs: get mnt_writers count for an open backing file's real path
Amir Goldstein
- [PATCH v2 2/3] fs: create helper file_user_path() for user displayed mapped file path
Amir Goldstein
- [PATCH v2 2/3] fs: create helper file_user_path() for user displayed mapped file path
Al Viro
- [PATCH v2 2/3] fs: create helper file_user_path() for user displayed mapped file path
Amir Goldstein
- [PATCH v2 3/3] fs: store real path instead of fake path in backing file f_path
Amir Goldstein
- [PATCH v2 3/3] fs: store real path instead of fake path in backing file f_path
Al Viro
- [PATCH v2 3/3] fs: store real path instead of fake path in backing file f_path
Amir Goldstein
- [PATCH v2 3/3] fs: store real path instead of fake path in backing file f_path
Al Viro
- [PATCH v2 84/89] apparmor: convert to new timestamp accessors
Jeff Layton
- [PATCH v2 86/89] security: convert to new timestamp accessors
Jeff Layton
- [PATCH v2 87/89] fs: rename inode i_atime and i_mtime fields
Jeff Layton
- [PATCH v2 88/89] fs: switch timespec64 fields in inode to discrete integers
Jeff Layton
- [PATCH v2 89/89] fs: move i_generation into new hole created after timestamp conversion
Jeff Layton
- [PATCH v3 0/3] Reduce impact of overlayfs backing files fake path
Amir Goldstein
- [PATCH v3 0/3] Reduce impact of overlayfs backing files fake path
Christian Brauner
- [PATCH v3 0/5] Landlock: IOCTL support
Günther Noack
- [PATCH v3 0/5] Landlock: IOCTL support
Mickaël Salaün
- [PATCH v3 0/5] Landlock: IOCTL support
Günther Noack
- [PATCH v3 0/5] Landlock: IOCTL support
Mickaël Salaün
- [PATCH v3 00/25] security: Move IMA and EVM to the LSM infrastructure
Mimi Zohar
- [PATCH v3 01/25] ima: Align ima_inode_post_setattr() definition with LSM infrastructure
Mimi Zohar
- [PATCH v3 02/25] ima: Align ima_post_path_mknod() definition with LSM infrastructure
Mimi Zohar
- [PATCH v3 02/25] ima: Align ima_post_path_mknod() definition with LSM infrastructure
Roberto Sassu
- [PATCH v3 02/25] ima: Align ima_post_path_mknod() definition with LSM infrastructure
Mimi Zohar
- [PATCH v3 02/25] ima: Align ima_post_path_mknod() definition with LSM infrastructure
Roberto Sassu
- [PATCH v3 02/25] ima: Align ima_post_path_mknod() definition with LSM infrastructure
Mimi Zohar
- [PATCH v3 02/25] ima: Align ima_post_path_mknod() definition with LSM infrastructure
Roberto Sassu
- [PATCH v3 02/25] ima: Align ima_post_path_mknod() definition with LSM infrastructure
Mimi Zohar
- [PATCH v3 02/25] ima: Align ima_post_path_mknod() definition with LSM infrastructure
Roberto Sassu
- [PATCH v3 02/25] ima: Align ima_post_path_mknod() definition with LSM infrastructure
Mimi Zohar
- [PATCH v3 02/25] ima: Align ima_post_path_mknod() definition with LSM infrastructure
Roberto Sassu
- [PATCH v3 04/25] ima: Align ima_file_mprotect() definition with LSM infrastructure
Mimi Zohar
- [PATCH v3 04/25] ima: Align ima_file_mprotect() definition with LSM infrastructure
Roberto Sassu
- [PATCH v3 04/25] ima: Align ima_file_mprotect() definition with LSM infrastructure
Mimi Zohar
- [PATCH v3 05/25] ima: Align ima_inode_setxattr() definition with LSM infrastructure
Mimi Zohar
- [PATCH v3 07/25] ima: Align ima_post_read_file() definition with LSM infrastructure
Mimi Zohar
- [PATCH v3 08/25] evm: Align evm_inode_post_setattr() definition with LSM infrastructure
Mimi Zohar
- [PATCH v3 09/25] evm: Align evm_inode_setxattr() definition with LSM infrastructure
Mimi Zohar
- [PATCH v3 1/3] crypto: mxs-dcp: Add support for hardware provided keys
Jarkko Sakkinen
- [PATCH v3 1/3] fs: get mnt_writers count for an open backing file's real path
Amir Goldstein
- [PATCH v3 1/4] add unique mount ID
Miklos Szeredi
- [PATCH v3 1/4] add unique mount ID
Amir Goldstein
- [PATCH v3 1/4] add unique mount ID
Miklos Szeredi
- [PATCH v3 10/25] evm: Align evm_inode_post_setxattr() definition with LSM infrastructure
Mimi Zohar
- [PATCH v3 11/25] security: Align inode_setattr hook definition with EVM
Mimi Zohar
- [PATCH v3 12/25] security: Introduce inode_post_setattr hook
Mimi Zohar
- [PATCH v3 12/25] security: Introduce inode_post_setattr hook
Roberto Sassu
- [PATCH v3 12/25] security: Introduce inode_post_setattr hook
Mimi Zohar
- [PATCH v3 12/25] security: Introduce inode_post_setattr hook
Roberto Sassu
- [PATCH v3 13/25] security: Introduce inode_post_removexattr hook
Mimi Zohar
- [PATCH v3 14/25] security: Introduce file_post_open hook
Mimi Zohar
- [PATCH v3 14/25] security: Introduce file_post_open hook
Roberto Sassu
- [PATCH v3 14/25] security: Introduce file_post_open hook
Mimi Zohar
- [PATCH v3 14/25] security: Introduce file_post_open hook
Roberto Sassu
- [PATCH v3 15/25] security: Introduce file_pre_free_security hook
Mimi Zohar
- [PATCH v3 16/25] security: Introduce path_post_mknod hook
Mimi Zohar
- [PATCH v3 17/25] security: Introduce inode_post_create_tmpfile hook
Mimi Zohar
- [PATCH v3 18/25] security: Introduce inode_post_set_acl hook
Mimi Zohar
- [PATCH v3 2/3] fs: create helper file_user_path() for user displayed mapped file path
Amir Goldstein
- [PATCH v3 2/5] security: Count the LSMs enabled at compile time
Tetsuo Handa
- [PATCH v3 2/5] security: Count the LSMs enabled at compile time
KP Singh
- [PATCH v3 2/5] security: Count the LSMs enabled at compile time
Casey Schaufler
- [PATCH v3 2/5] security: Count the LSMs enabled at compile time
Tetsuo Handa
- [PATCH v3 2/5] security: Count the LSMs enabled at compile time
KP Singh
- [PATCH v3 2/5] security: Count the LSMs enabled at compile time
Tetsuo Handa
- [PATCH v3 2/6] tpm: Store TPM buffer length
Jarkko Sakkinen
- [PATCH v3 20/25] security: Introduce key_post_create_or_update hook
Mimi Zohar
- [PATCH v3 21/25] ima: Move to LSM infrastructure
Mimi Zohar
- [PATCH v3 25/25] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
Roberto Sassu
- [PATCH v3 3/3] fs: store real path instead of fake path in backing file f_path
Amir Goldstein
- [PATCH v3 3/3] fs: store real path instead of fake path in backing file f_path
Miklos Szeredi
- [PATCH v3 3/3] fs: store real path instead of fake path in backing file f_path
Amir Goldstein
- [PATCH v3 3/3] fs: store real path instead of fake path in backing file f_path
Amir Goldstein
- [PATCH v3 3/3] fs: store real path instead of fake path in backing file f_path
Miklos Szeredi
- [PATCH v3 3/3] fs: store real path instead of fake path in backing file f_path
Amir Goldstein
- [PATCH v3 3/3] fs: store real path instead of fake path in backing file f_path
Al Viro
- [PATCH v3 3/3] fs: store real path instead of fake path in backing file f_path
Al Viro
- [PATCH v3 3/3] fs: store real path instead of fake path in backing file f_path
Amir Goldstein
- [PATCH v3 3/3] fs: store real path instead of fake path in backing file f_path
Miklos Szeredi
- [PATCH v3 3/3] fs: store real path instead of fake path in backing file f_path
Al Viro
- [PATCH v3 3/3] fs: store real path instead of fake path in backing file f_path
Amir Goldstein
- [PATCH v3 3/3] fs: store real path instead of fake path in backing file f_path
Al Viro
- [PATCH v3 3/3] fs: store real path instead of fake path in backing file f_path
Al Viro
- [PATCH v3 3/4] add statmount(2) syscall
Paul Moore
- [PATCH v3 3/6] tpm: Detach tpm_buf_reset() from tpm_buf_init()
Jarkko Sakkinen
- [PATCH v3 4/4] add listmount(2) syscall
Paul Moore
- [PATCH v3 4/4] add listmount(2) syscall
Miklos Szeredi
- [PATCH v3 4/4] add listmount(2) syscall
Ian Kent
- [PATCH v3 4/4] add listmount(2) syscall
Miklos Szeredi
- [PATCH v3 4/4] add listmount(2) syscall
Ian Kent
- [PATCH v3 4/4] add listmount(2) syscall
Paul Moore
- [PATCH v3 4/4] add listmount(2) syscall
Miklos Szeredi
- [PATCH v3 4/4] add listmount(2) syscall
Paul Moore
- [PATCH v3 4/4] add listmount(2) syscall
Ian Kent
- [PATCH v3 4/4] add listmount(2) syscall
Miklos Szeredi
- [PATCH v3 4/6] tpm: Support TPM2 sized buffers (TPM2B)
Jarkko Sakkinen
- [PATCH v3 4/6] tpm: Support TPM2 sized buffers (TPM2B)
James Bottomley
- [PATCH v3 6/6] KEYS: trusted: tpm2: Use struct tpm_buf for sized buffers
Jarkko Sakkinen
- [PATCH v3] apparmor: global buffers spin lock may get contended
Sergey Senozhatsky
- [PATCH v4 0/4] vduse: add support for networking devices
Maxime Coquelin
- [PATCH v4 0/5] DCP as trusted keys backend
David Gstir
- [PATCH v4 0/6] querying mount attributes
Miklos Szeredi
- [PATCH v4 00/23] security: Move IMA and EVM to the LSM infrastructure
Roberto Sassu
- [PATCH v4 01/23] ima: Align ima_inode_post_setattr() definition with LSM infrastructure
Roberto Sassu
- [PATCH v4 02/23] ima: Align ima_file_mprotect() definition with LSM infrastructure
Roberto Sassu
- [PATCH v4 03/23] ima: Align ima_inode_setxattr() definition with LSM infrastructure
Roberto Sassu
- [PATCH v4 04/23] ima: Align ima_inode_removexattr() definition with LSM infrastructure
Roberto Sassu
- [PATCH v4 05/23] ima: Align ima_post_read_file() definition with LSM infrastructure
Roberto Sassu
- [PATCH v4 06/23] evm: Align evm_inode_post_setattr() definition with LSM infrastructure
Roberto Sassu
- [PATCH v4 07/23] evm: Align evm_inode_setxattr() definition with LSM infrastructure
Roberto Sassu
- [PATCH v4 08/23] evm: Align evm_inode_post_setxattr() definition with LSM infrastructure
Roberto Sassu
- [PATCH v4 09/23] security: Align inode_setattr hook definition with EVM
Roberto Sassu
- [PATCH v4 1/4] vduse: validate block features only with block devices
Maxime Coquelin
- [PATCH v4 1/4] vduse: validate block features only with block devices
Casey Schaufler
- [PATCH v4 1/4] vduse: validate block features only with block devices
Maxime Coquelin
- [PATCH v4 1/5] crypto: mxs-dcp: Add support for hardware-bound keys
David Gstir
- [PATCH v4 1/5] crypto: mxs-dcp: Add support for hardware-bound keys
Jarkko Sakkinen
- [PATCH v4 1/6] add unique mount ID
Miklos Szeredi
- [PATCH v4 10/23] security: Introduce inode_post_setattr hook
Roberto Sassu
- [PATCH v4 11/23] security: Introduce inode_post_removexattr hook
Roberto Sassu
- [PATCH v4 12/23] security: Introduce file_post_open hook
Roberto Sassu
- [PATCH v4 13/23] security: Introduce file_pre_free_security hook
Roberto Sassu
- [PATCH v4 14/23] security: Introduce path_post_mknod hook
Roberto Sassu
- [PATCH v4 15/23] security: Introduce inode_post_create_tmpfile hook
Roberto Sassu
- [PATCH v4 16/23] security: Introduce inode_post_set_acl hook
Roberto Sassu
- [PATCH v4 17/23] security: Introduce inode_post_remove_acl hook
Roberto Sassu
- [PATCH v4 18/23] security: Introduce key_post_create_or_update hook
Roberto Sassu
- [PATCH v4 19/23] ima: Move to LSM infrastructure
Roberto Sassu
- [PATCH v4 2/12] bpf: introduce BPF token object
Paul Moore
- [PATCH v4 2/12] bpf: introduce BPF token object
Andrii Nakryiko
- [PATCH v4 2/4] vduse: enable Virtio-net device type
Maxime Coquelin
- [PATCH v4 2/5] KEYS: trusted: Introduce NXP DCP-backed trusted keys
David Gstir
- [PATCH v4 2/5] KEYS: trusted: Introduce NXP DCP-backed trusted keys
Jarkko Sakkinen
- [PATCH v4 2/6] mounts: keep list of mounts in an rbtree
Miklos Szeredi
- [PATCH v4 2/6] mounts: keep list of mounts in an rbtree
Ian Kent
- [PATCH v4 2/6] mounts: keep list of mounts in an rbtree
Miklos Szeredi
- [PATCH v4 2/6] mounts: keep list of mounts in an rbtree
Ian Kent
- [PATCH v4 2/6] mounts: keep list of mounts in an rbtree
Ian Kent
- [PATCH v4 2/6] mounts: keep list of mounts in an rbtree
Ian Kent
- [PATCH v4 2/6] mounts: keep list of mounts in an rbtree
Miklos Szeredi
- [PATCH v4 2/6] mounts: keep list of mounts in an rbtree
Ian Kent
- [PATCH v4 20/23] ima: Move IMA-Appraisal to LSM infrastructure
Roberto Sassu
- [PATCH v4 21/23] evm: Move to LSM infrastructure
Roberto Sassu
- [PATCH v4 22/23] integrity: Move integrity functions to the LSM infrastructure
Roberto Sassu
- [PATCH v4 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
Roberto Sassu
- [PATCH v4 3/4] vduse: Temporarily disable control queue features
Maxime Coquelin
- [PATCH v4 3/4] vduse: Temporarily disable control queue features
Jason Wang
- [PATCH v4 3/4] vduse: Temporarily disable control queue features
Maxime Coquelin
- [PATCH v4 3/5] MAINTAINERS: add entry for DCP-based trusted keys
David Gstir
- [PATCH v4 3/6] namespace: extract show_path() helper
Miklos Szeredi
- [PATCH v4 4/4] vduse: Add LSM hooks to check Virtio device type
Maxime Coquelin
- [PATCH v4 4/4] vduse: Add LSM hooks to check Virtio device type
Casey Schaufler
- [PATCH v4 4/4] vduse: Add LSM hooks to check Virtio device type
Jason Wang
- [PATCH v4 4/4] vduse: Add LSM hooks to check Virtio device type
Maxime Coquelin
- [PATCH v4 4/4] vduse: Add LSM hooks to check Virtio device type
Casey Schaufler
- [PATCH v4 4/4] vduse: Add LSM hooks to check Virtio device type
Maxime Coquelin
- [PATCH v4 4/4] vduse: Add LSM hooks to check Virtio device type
Casey Schaufler
- [PATCH v4 4/5] docs: document DCP-backed trusted keys kernel params
David Gstir
- [PATCH v4 4/6] add statmount(2) syscall
Miklos Szeredi
- [PATCH v4 5/5] docs: trusted-encrypted: add DCP as new trust source
David Gstir
- [PATCH v4 5/6] add listmount(2) syscall
Miklos Szeredi
- [PATCH v4 6/6] wire up syscalls for statmount/listmount
Miklos Szeredi
- [PATCH v5 0/4] apparmor: cache buffers on percpu list if there is lock, contention
John Johansen
- [PATCH v5 0/4] apparmor: cache buffers on percpu list if there is lock, contention
Sergey Senozhatsky
- [PATCH v5 0/5] Reduce overhead of LSMs with static calls
Paolo Abeni
- [PATCH v5 0/5] Reduce overhead of LSMs with static calls
KP Singh
- [PATCH v5 0/5] Reduce overhead of LSMs with static calls
Paolo Abeni
- [PATCH v5 1/4] apparmor: cache buffers on percpu list if there is lock, contention
John Johansen
- [PATCH v5 2/4] apparmor: exponential backoff on cache buffer contention
John Johansen
- [PATCH v5 3/4] apparmor: experiment with faster backoff on global buffer
John Johansen
- [PATCH v5 3/5] security: Replace indirect LSM hook calls with static calls
KP Singh
- [PATCH v5 4/4] apparmor: limit the number of buffers in percpu cache
John Johansen
- [PATCH v5 4/5] bpf: Only enable BPF LSM hooks when an LSM program is attached
Jiri Olsa
- [PATCH v5 4/5] bpf: Only enable BPF LSM hooks when an LSM program is attached
KP Singh
- [PATCH v5 4/5] bpf: Only enable BPF LSM hooks when an LSM program is attached
KP Singh
- [PATCH v5 4/5] bpf: Only enable BPF LSM hooks when an LSM program is attached
Jiri Olsa
- [PATCH v5 4/5] bpf: Only enable BPF LSM hooks when an LSM program is attached
KP Singh
- [PATCH v5 4/5] bpf: Only enable BPF LSM hooks when an LSM program is attached
Jiri Olsa
- [PATCH v5 4/5] bpf: Only enable BPF LSM hooks when an LSM program is attached
Jiri Olsa
- [PATCH v5 4/5] bpf: Only enable BPF LSM hooks when an LSM program is attached
KP Singh
- [PATCH v5 4/5] bpf: Only enable BPF LSM hooks when an LSM program is attached
KP Singh
- [PATCH v5 bpf-next 03/13] bpf: introduce BPF token object
Paul Moore
- [PATCH v5 bpf-next 03/13] bpf: introduce BPF token object
Andrii Nakryiko
- [PATCH v6 0/5] Reduce overhead of LSMs with static calls
KP Singh
- [PATCH v6 1/5] kernel: Add helper macros for loop unrolling
KP Singh
- [PATCH v6 2/5] security: Count the LSMs enabled at compile time
KP Singh
- [PATCH v6 2/5] security: Count the LSMs enabled at compile time
Kees Cook
- [PATCH v6 3/13] bpf: introduce BPF token object
Paul Moore
- [PATCH v6 3/13] bpf: introduce BPF token object
Andrii Nakryiko
- [PATCH v6 3/13] bpf: introduce BPF token object
Andrii Nakryiko
- [PATCH v6 3/13] bpf: introduce BPF token object
Paul Moore
- [PATCH v6 3/13] bpf: introduce BPF token object
Paul Moore
- [PATCH v6 3/13] bpf: introduce BPF token object
Andrii Nakryiko
- [PATCH v6 3/13] bpf: introduce BPF token object
Andrii Nakryiko
- [PATCH v6 3/5] security: Replace indirect LSM hook calls with static calls
KP Singh
- [PATCH v6 3/5] security: Replace indirect LSM hook calls with static calls
kernel test robot
- [PATCH v6 4/5] bpf: Only enable BPF LSM hooks when an LSM program is attached
KP Singh
- [PATCH v6 4/5] bpf: Only enable BPF LSM hooks when an LSM program is attached
Jiri Olsa
- [PATCH v6 5/5] security: Add CONFIG_SECURITY_HOOK_LIKELY
KP Singh
- [PATCH v6 5/5] security: Add CONFIG_SECURITY_HOOK_LIKELY
Kees Cook
- [PATCH v6 6/13] bpf: add BPF token support to BPF_PROG_LOAD command
Paul Moore
- [PATCH v6 6/13] bpf: add BPF token support to BPF_PROG_LOAD command
Andrii Nakryiko
- [PATCH v6 bpf-next 02/13] bpf: add BPF token delegation mount options to BPF FS
Hou Tao
- [PATCH v6 bpf-next 02/13] bpf: add BPF token delegation mount options to BPF FS
Andrii Nakryiko
- [PATCH v6 bpf-next 03/13] bpf: introduce BPF token object
Hou Tao
- [PATCH v6 bpf-next 03/13] bpf: introduce BPF token object
Andrii Nakryiko
- [PATCH v6 bpf-next 04/13] bpf: add BPF token support to BPF_MAP_CREATE command
Jiri Olsa
- [PATCH v6 bpf-next 04/13] bpf: add BPF token support to BPF_MAP_CREATE command
Andrii Nakryiko
- [PATCH v7 11/18] bpf, lsm: add bpf_token_create and bpf_token_free LSM hooks
Paul Moore
- [PATCH v7 11/18] bpf, lsm: add bpf_token_create and bpf_token_free LSM hooks
Andrii Nakryiko
- [PATCH v7 6/18] bpf: add BPF token support to BPF_PROG_LOAD command
Paul Moore
- [PATCH v7 6/18] bpf: add BPF token support to BPF_PROG_LOAD command
Andrii Nakryiko
- [PATCH v7 bpf-next 00/18] BPF token and BPF FS-based delegation
Andrii Nakryiko
- [PATCH v7 bpf-next 01/18] bpf: align CAP_NET_ADMIN checks with bpf_capable() approach
Andrii Nakryiko
- [PATCH v7 bpf-next 02/18] bpf: add BPF token delegation mount options to BPF FS
Andrii Nakryiko
- [PATCH v7 bpf-next 03/18] bpf: introduce BPF token object
Andrii Nakryiko
- [PATCH v7 bpf-next 04/18] bpf: add BPF token support to BPF_MAP_CREATE command
Andrii Nakryiko
- [PATCH v7 bpf-next 05/18] bpf: add BPF token support to BPF_BTF_LOAD command
Andrii Nakryiko
- [PATCH v7 bpf-next 06/18] bpf: add BPF token support to BPF_PROG_LOAD command
Andrii Nakryiko
- [PATCH v7 bpf-next 07/18] bpf: take into account BPF token when fetching helper protos
Andrii Nakryiko
- [PATCH v7 bpf-next 08/18] bpf: consistenly use BPF token throughout BPF verifier logic
Andrii Nakryiko
- [PATCH v7 bpf-next 09/18] bpf, lsm: refactor bpf_prog_alloc/bpf_prog_free LSM hooks
Andrii Nakryiko
- [PATCH v7 bpf-next 10/18] bpf, lsm: refactor bpf_map_alloc/bpf_map_free LSM hooks
Andrii Nakryiko
- [PATCH v7 bpf-next 11/18] bpf, lsm: add bpf_token_create and bpf_token_free LSM hooks
Andrii Nakryiko
- [PATCH v7 bpf-next 12/18] libbpf: add bpf_token_create() API
Andrii Nakryiko
- [PATCH v7 bpf-next 13/18] selftests/bpf: fix test_maps' use of bpf_map_create_opts
Andrii Nakryiko
- [PATCH v7 bpf-next 14/18] libbpf: add BPF token support to bpf_map_create() API
Andrii Nakryiko
- [PATCH v7 bpf-next 15/18] libbpf: add BPF token support to bpf_btf_load() API
Andrii Nakryiko
- [PATCH v7 bpf-next 16/18] libbpf: add BPF token support to bpf_prog_load() API
Andrii Nakryiko
- [PATCH v7 bpf-next 17/18] selftests/bpf: add BPF token-enabled tests
Andrii Nakryiko
- [PATCH v7 bpf-next 18/18] bpf, selinux: allocate bpf_security_struct per BPF token
Andrii Nakryiko
- [PATCH v8 bpf-next 00/18] BPF token and BPF FS-based delegation
Andrii Nakryiko
- [PATCH v8 bpf-next 00/18] BPF token and BPF FS-based delegation
Lorenz Bauer
- [PATCH v8 bpf-next 00/18] BPF token and BPF FS-based delegation
Andrii Nakryiko
- [PATCH v8 bpf-next 00/18] BPF token and BPF FS-based delegation
Andrii Nakryiko
- [PATCH v8 bpf-next 00/18] BPF token and BPF FS-based delegation
Paul Moore
- [PATCH v8 bpf-next 00/18] BPF token and BPF FS-based delegation
Andrii Nakryiko
- [PATCH v8 bpf-next 01/18] bpf: align CAP_NET_ADMIN checks with bpf_capable() approach
Andrii Nakryiko
- [PATCH v8 bpf-next 02/18] bpf: add BPF token delegation mount options to BPF FS
Andrii Nakryiko
- [PATCH v8 bpf-next 03/18] bpf: introduce BPF token object
Andrii Nakryiko
- [PATCH v8 bpf-next 04/18] bpf: add BPF token support to BPF_MAP_CREATE command
Andrii Nakryiko
- [PATCH v8 bpf-next 05/18] bpf: add BPF token support to BPF_BTF_LOAD command
Andrii Nakryiko
- [PATCH v8 bpf-next 06/18] bpf: add BPF token support to BPF_PROG_LOAD command
Andrii Nakryiko
- [PATCH v8 bpf-next 07/18] bpf: take into account BPF token when fetching helper protos
Andrii Nakryiko
- [PATCH v8 bpf-next 08/18] bpf: consistenly use BPF token throughout BPF verifier logic
Andrii Nakryiko
- [PATCH v8 bpf-next 09/18] bpf, lsm: refactor bpf_prog_alloc/bpf_prog_free LSM hooks
Andrii Nakryiko
- [PATCH v8 bpf-next 09/18] bpf,lsm: refactor bpf_prog_alloc/bpf_prog_free LSM hooks
kernel test robot
- [PATCH v8 bpf-next 09/18] bpf, lsm: refactor bpf_prog_alloc/bpf_prog_free LSM hooks
Andrii Nakryiko
- [PATCH v8 bpf-next 10/18] bpf, lsm: refactor bpf_map_alloc/bpf_map_free LSM hooks
Andrii Nakryiko
- [PATCH v8 bpf-next 10/18] bpf,lsm: refactor bpf_map_alloc/bpf_map_free LSM hooks
kernel test robot
- [PATCH v8 bpf-next 11/18] bpf,lsm: add BPF token LSM hooks
Andrii Nakryiko
- [PATCH v8 bpf-next 11/18] bpf,lsm: add BPF token LSM hooks
kernel test robot
- [PATCH v8 bpf-next 12/18] libbpf: add bpf_token_create() API
Andrii Nakryiko
- [PATCH v8 bpf-next 13/18] selftests/bpf: fix test_maps' use of bpf_map_create_opts
Andrii Nakryiko
- [PATCH v8 bpf-next 14/18] libbpf: add BPF token support to bpf_map_create() API
Andrii Nakryiko
- [PATCH v8 bpf-next 15/18] libbpf: add BPF token support to bpf_btf_load() API
Andrii Nakryiko
- [PATCH v8 bpf-next 16/18] libbpf: add BPF token support to bpf_prog_load() API
Andrii Nakryiko
- [PATCH v8 bpf-next 17/18] selftests/bpf: add BPF token-enabled tests
Andrii Nakryiko
- [PATCH v8 bpf-next 17/18] selftests/bpf: add BPF token-enabled tests
Jiri Olsa
- [PATCH v8 bpf-next 17/18] selftests/bpf: add BPF token-enabled tests
Andrii Nakryiko
- [PATCH v8 bpf-next 17/18] selftests/bpf: add BPF token-enabled tests
Andrii Nakryiko
- [PATCH v8 bpf-next 18/18] bpf, selinux: allocate bpf_security_struct per BPF token
Andrii Nakryiko
- [RESEND RFC PATCH v2 00/14] device_cgroup: guard mknod for non-initial user namespace
Paul Moore
- [RESEND RFC PATCH v2 00/14] device_cgroup: guard mknod for non-initial user namespace
Michael Weiß
- [RFC PATCH 0/3] LSM syscall tweaks
Paul Moore
- [RFC PATCH 1/2] LSM: Allow dynamically appendable LSM modules.
Tetsuo Handa
- [RFC PATCH 1/2] LSM: Allow dynamically appendable LSM modules.
Tetsuo Handa
- [RFC PATCH 1/2] LSM: Allow dynamically appendable LSM modules.
KP Singh
- [RFC PATCH 1/2] LSM: Allow dynamically appendable LSM modules.
Casey Schaufler
- [RFC PATCH 1/2] LSM: Allow dynamically appendable LSM modules.
Kees Cook
- [RFC PATCH 1/2] LSM: Allow dynamically appendable LSM modules.
Tetsuo Handa
- [RFC PATCH 1/2] LSM: Allow dynamically appendable LSM modules.
Kees Cook
- [RFC PATCH 1/2] LSM: Allow dynamically appendable LSM modules.
Tetsuo Handa
- [RFC PATCH 1/2] LSM: Allow dynamically appendable LSM modules.
KP Singh
- [RFC PATCH 1/2] LSM: Allow dynamically appendable LSM modules.
Paul Moore
- [RFC PATCH 1/2] LSM: Allow dynamically appendable LSM modules.
Paul Moore
- [RFC PATCH 1/2] LSM: Allow dynamically appendable LSM modules.
KP Singh
- [RFC PATCH 1/2] LSM: Allow dynamically appendable LSM modules.
Tetsuo Handa
- [RFC PATCH 1/2] LSM: Allow dynamically appendable LSM modules.
Tetsuo Handa
- [RFC PATCH 1/2] LSM: Allow dynamically appendable LSM modules.
José Bollo
- [RFC PATCH 1/2] LSM: Allow dynamically appendable LSM modules.
Tetsuo Handa
- [RFC PATCH 1/2] LSM: Allow dynamically appendable LSM modules.
Tetsuo Handa
- [RFC PATCH 1/2] LSM: Allow dynamically appendable LSM modules.
KP Singh
- [RFC PATCH 1/2] LSM: Allow dynamically appendable LSM modules.
Casey Schaufler
- [RFC PATCH 1/2] LSM: Allow dynamically appendable LSM modules.
Tetsuo Handa
- [RFC PATCH 1/2] LSM: Allow dynamically appendable LSM modules.
Tetsuo Handa
- [RFC PATCH 1/2] LSM: Allow dynamically appendable LSM modules.
KP Singh
- [RFC PATCH 1/2] LSM: Allow dynamically appendable LSM modules.
Tetsuo Handa
- [RFC PATCH 1/3] lsm: cleanup the size counters in security_getselfattr()
Paul Moore
- [RFC PATCH 1/3] lsm: cleanup the size counters in security_getselfattr()
Casey Schaufler
- [RFC PATCH 1/3] lsm: cleanup the size counters in security_getselfattr()
Paul Moore
- [RFC PATCH 1/3] lsm: cleanup the size counters in security_getselfattr()
Casey Schaufler
- [RFC PATCH 1/3] lsm: cleanup the size counters in security_getselfattr()
Paul Moore
- [RFC PATCH 1/3] lsm: cleanup the size counters in security_getselfattr()
Mickaël Salaün
- [RFC PATCH 2/3] lsm: correct error codes in security_getselfattr()
Paul Moore
- [RFC PATCH 2/3] lsm: correct error codes in security_getselfattr()
Casey Schaufler
- [RFC PATCH 2/3] lsm: correct error codes in security_getselfattr()
Mickaël Salaün
- [RFC PATCH 3/3] add listmnt(2) syscall
Paul Moore
- [RFC PATCH 3/3] lsm: consolidate buffer size handling into lsm_fill_user_ctx()
Paul Moore
- [RFC PATCH 3/3] lsm: consolidate buffer size handling into lsm_fill_user_ctx()
Mickaël Salaün
- [RFC PATCH 3/3] lsm: consolidate buffer size handling into lsm_fill_user_ctx()
Paul Moore
- [RFC PATCH v11 00/19] Integrity Policy Enforcement LSM (IPE)
Fan Wu
- [RFC PATCH v11 01/19] security: add ipe lsm
Fan Wu
- [RFC PATCH v11 02/19] ipe: add policy parser
Fan Wu
- [RFC PATCH v11 03/19] ipe: add evaluation loop
Fan Wu
- [RFC PATCH v11 04/19] ipe: add LSM hooks on execution and kernel read
Fan Wu
- [RFC PATCH v11 05/19] ipe: introduce 'boot_verified' as a trust provider
Fan Wu
- [RFC PATCH v11 06/19] security: add new securityfs delete function
Fan Wu
- [RFC PATCH v11 07/19] ipe: add userspace interface
Fan Wu
- [RFC PATCH v11 08/19] uapi|audit|ipe: add ipe auditing support
Fan Wu
- [RFC PATCH v11 09/19] ipe: add permissive toggle
Fan Wu
- [RFC PATCH v11 10/19] block|security: add LSM blob to block_device
Fan Wu
- [RFC PATCH v11 11/19] dm verity: set DM_TARGET_SINGLETON feature flag
Fan Wu
- [RFC PATCH v11 12/19] dm: add finalize hook to target_type
Fan Wu
- [RFC PATCH v11 13/19] dm verity: consume root hash digest and signature data via LSM hook
Fan Wu
- [RFC PATCH v11 14/19] ipe: add support for dm-verity as a trust provider
Fan Wu
- [RFC PATCH v11 15/19] fsverity: consume builtin signature via LSM hook
Fan Wu
- [RFC PATCH v11 15/19] fsverity: consume builtin signature via LSM hook
Eric Biggers
- [RFC PATCH v11 15/19] fsverity: consume builtin signature via LSM hook
Fan Wu
- [RFC PATCH v11 16/19] ipe: enable support for fs-verity as a trust provider
Fan Wu
- [RFC PATCH v11 16/19] ipe: enable support for fs-verity as a trust provider
Randy Dunlap
- [RFC PATCH v11 16/19] ipe: enable support for fs-verity as a trust provider
Fan Wu
- [RFC PATCH v11 17/19] scripts: add boot policy generation program
Fan Wu
- [RFC PATCH v11 18/19] ipe: kunit test for parser
Fan Wu
- [RFC PATCH v11 19/19] documentation: add ipe documentation
Fan Wu
- [RFC PATCH v12 05/33] KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER
Anup Patel
- [RFC PATCH v12 11/33] KVM: Introduce per-page memory attributes
Fuad Tabba
- [RFC PATCH v12 11/33] KVM: Introduce per-page memory attributes
Sean Christopherson
- [RFC PATCH v12 11/33] KVM: Introduce per-page memory attributes
Fuad Tabba
- [RFC PATCH v12 11/33] KVM: Introduce per-page memory attributes
Sean Christopherson
- [RFC PATCH v12 11/33] KVM: Introduce per-page memory attributes
Fuad Tabba
- [RFC PATCH v12 11/33] KVM: Introduce per-page memory attributes
Sean Christopherson
- [RFC PATCH v12 11/33] KVM: Introduce per-page memory attributes
Fuad Tabba
- [RFC V2] IMA Log Snapshotting Design Proposal
Tushar Sugandhi
- [RFC V2] IMA Log Snapshotting Design Proposal
Ken Goldman
- [RFC V2] IMA Log Snapshotting Design Proposal
Mimi Zohar
- [robertosassu:ima-evm-lsms-v4-devel-v7] [evm] ea31d8b249: Kernel_panic-not_syncing:security_add_hooks_Too_many_LSMs_registered
kernel test robot
- ANN: kernel git branches and process changes
Paul Moore
- ANN: kernel git branches and process changes
Paul Moore
- ANN: kernel git branches and process changes
Bagas Sanjaya
- Brauchen Sie einen Kredit?
Georg Johannes Proksch
- business loan and investment are you interested?
Mr. mohd
- Efektivní sledování a optimalizace výroby pro vaši společnost
Michal Rmoutil
- Isolating abstract sockets
Mickaël Salaün
- linux-next: build warning after merge of the landlock tree
Mickaël Salaün
- linux-next: build warning after merge of the landlock tree
Geert Uytterhoeven
- linux-next: build warning after merge of the landlock tree
Arnd Bergmann
- linux-next: build warning after merge of the landlock tree
Mickaël Salaün
- linux-next: build warning after merge of the landlock tree
Mickaël Salaün
- linux-next: manual merge of the apparmor tree with the security tree
Paul Moore
- linux-next: manual merge of the apparmor tree with the security tree
John Johansen
- linux-next: manual merge of the apparmor tree with the security tree
Paul Moore
- linux-next: manual merge of the apparmor tree with the security tree
Paul Moore
- LOAN SCHEME
jc at 35686686.com
- Oldingi xatlarimni oldingizmi? yangilanish uchun javob bering
moneygram
- REMINDER
Mr. mohd
- RFC: New LSM to control usage of x509 certificates
Mickaël Salaün
- RFC: New LSM to control usage of x509 certificates
Paul Moore
- RFC: New LSM to control usage of x509 certificates
Mimi Zohar
- RFC: New LSM to control usage of x509 certificates
Paul Moore
- RFC: New LSM to control usage of x509 certificates
Mimi Zohar
- RFC: New LSM to control usage of x509 certificates
Paul Moore
- RFC: New LSM to control usage of x509 certificates
Mimi Zohar
- RFC: New LSM to control usage of x509 certificates
Paul Moore
- RFC: New LSM to control usage of x509 certificates
Eric Snowberg
- RFC: New LSM to control usage of x509 certificates
Mickaël Salaün
- RFC: New LSM to control usage of x509 certificates
Eric Snowberg
- RFC: New LSM to control usage of x509 certificates
Mickaël Salaün
- RFC: New LSM to control usage of x509 certificates
Eric Snowberg
- RFC: New LSM to control usage of x509 certificates
Mickaël Salaün
- RFC: New LSM to control usage of x509 certificates
Roberto Sassu
- RFC: New LSM to control usage of x509 certificates
Eric Snowberg
- Rozszerzenie Programu Mój Prąd 5.0
Kamil Lasek
- Sandbox escape through missing restrictions for unix socket abstract namespace
Mickaël Salaün
- Słowa kluczowe do wypozycjonowania
Adam Charachuta
- Wycena paneli fotowoltaicznych
Kamil Lasek
- Zapytanie ofertowe
Andrzej Polański
Last message date:
Tue Oct 31 19:15:23 UTC 2023
Archived on: Sat Nov 4 04:57:20 UTC 2023
This archive was generated by
Pipermail 0.09 (Mailman edition).