August 2024 Archives by author
Starting: Thu Aug 1 00:00:03 UTC 2024
Ending: Fri Aug 30 22:48:48 UTC 2024
Messages: 633
- [PATCH net-next 06/13] net: qualcomm: rmnet: Correct spelling in if_rmnet.h
Subash Abhinov Kasiviswanathan (KS)
- [PATCH 2/2] mm: drop PF_MEMALLOC_NORECLAIM
Vlastimil Babka
- [RFC PATCH] fs: obtain the inode generation number from vfs directly
Tavian Barnes
- [PATCH v20 15/20] fsverity: expose verified fsverity built-in signatures to LSMs
Eric Biggers
- [PATCH v5] proc: add config & param to block forcing mem writes
Christian Brauner
- f_modown and LSM inconsistency (was [PATCH v2 1/4] Landlock: Add signal control)
Christian Brauner
- [PATCH bpf-next 2/2] selftests/bpf: Add tests for bpf_get_dentry_xattr
Christian Brauner
- [RFC PATCH] fs: obtain the inode generation number from vfs directly
Christian Brauner
- [PATCH net-next 01/13] packet: Correct spelling in if_packet.h
Willem de Bruijn
- [PATCH] init/main.c: Do jump_label_init before early_security_init
Nathan Chancellor
- [PATCH] init/main.c: Do jump_label_init before early_security_init
Nathan Chancellor
- [PATCH] init/main.c: Initialize early LSMs after arch code
Nathan Chancellor
- [PATCH 1/2 v2] bcachefs: do not use PF_MEMALLOC_NORECLAIM
Dave Chinner
- [PATCH 2/2] mm: drop PF_MEMALLOC_NORECLAIM
Dave Chinner
- [RFC PATCH] fs: obtain the inode generation number from vfs directly
Dave Chinner
- [RFC PATCH] fs: obtain the inode generation number from vfs directly
Dave Chinner
- [PATCH 1/2 v2] bcachefs: do not use PF_MEMALLOC_NORECLAIM
Dave Chinner
- [RFC PATCH] fs: obtain the inode generation number from vfs directly
Dave Chinner
- [PATCH] drivers/perf: arm_spe: Use perf_allow_kernel() for permissions
James Clark
- [PATCH] drivers/perf: arm_spe: Use perf_allow_kernel() for permissions
James Clark
- [PATCH] apparmor: fix policy_unpack_test on big endian systems
Kees Cook
- [PATCH -next] lockdown: Make lockdown_lsmid static
Kees Cook
- [PATCH -next 12/15] fs: dcache: move the sysctl into its own file
Kees Cook
- [PATCH -next 00/15] sysctl: move sysctls from vm_table into its own files
Kees Cook
- [PATCH v8 1/8] Get rid of __get_task_comm()
Kees Cook
- [PATCH v8 1/8] Get rid of __get_task_comm()
Kees Cook
- [PATCH v8 1/8] Get rid of __get_task_comm()
Kees Cook
- [syzbot] [tomoyo?] INFO: rcu detected stall in security_file_ioctl (8)
Eric Dumazet
- [PATCH v8 0/4] Landlock: Add abstract unix socket connect
Tahera Fahimi
- [PATCH v8 1/4] Landlock: Add abstract unix socket connect restriction
Tahera Fahimi
- [PATCH v8 2/4] selftests/landlock: Abstract unix socket restriction tests
Tahera Fahimi
- [PATCH v8 3/4] sample/Landlock: Support abstract unix socket restriction
Tahera Fahimi
- [PATCH v8 4/4] Landlock: Document LANDLOCK_SCOPED_ABSTRACT_UNIX_SOCKET and ABI versioning
Tahera Fahimi
- [PATCH v2 0/4] Landlock: Signal Scoping Support
Tahera Fahimi
- [PATCH v2 1/4] Landlock: Add signal control
Tahera Fahimi
- [PATCH v2 2/4] selftest/Landlock: Signal restriction tests
Tahera Fahimi
- [PATCH v2 3/4] sample/Landlock: Support signal scoping restriction
Tahera Fahimi
- [PATCH v2 4/4] Landlock: Document LANDLOCK_SCOPED_SIGNAL
Tahera Fahimi
- [PATCH v2 1/4] Landlock: Add signal control
Tahera Fahimi
- [PATCH v8 1/4] Landlock: Add abstract unix socket connect restriction
Tahera Fahimi
- [PATCH v2 1/4] Landlock: Add signal control
Tahera Fahimi
- [PATCH v8 1/4] Landlock: Add abstract unix socket connect restriction
Tahera Fahimi
- [PATCH v8 1/4] Landlock: Add abstract unix socket connect restriction
Tahera Fahimi
- [PATCH v8 3/4] sample/Landlock: Support abstract unix socket restriction
Tahera Fahimi
- [PATCH v9 0/5] Landlock: Add abstract unix socket connect restriction
Tahera Fahimi
- [PATCH v9 1/5] Landlock: Add abstract unix socket connect restriction
Tahera Fahimi
- [PATCH v9 2/5] selftests/Landlock: Abstract unix socket restriction tests
Tahera Fahimi
- [PATCH v9 3/5] selftests/Landlock: Adding pathname Unix socket tests
Tahera Fahimi
- [PATCH v9 4/5] sample/Landlock: Support abstract unix socket restriction
Tahera Fahimi
- [PATCH v9 5/5] Landlock: Document LANDLOCK_SCOPED_ABSTRACT_UNIX_SOCKET and ABI versioning
Tahera Fahimi
- [PATCH v3 0/6] Landlock: Signal Scoping Support
Tahera Fahimi
- [PATCH v3 1/6] Landlock: Add signal control
Tahera Fahimi
- [PATCH v3 2/6] Landlock: Adding file_send_sigiotask signal scoping support
Tahera Fahimi
- [PATCH v3 3/6] selftest/Landlock: Signal restriction tests
Tahera Fahimi
- [PATCH v3 4/6] selftest/Landlock: pthread_kill(3) tests
Tahera Fahimi
- [PATCH v3 5/6] sample/Landlock: Support signal scoping restriction
Tahera Fahimi
- [PATCH v3 6/6] Landlock: Document LANDLOCK_SCOPED_SIGNAL
Tahera Fahimi
- [PATCH v3 6/6] Landlock: Document LANDLOCK_SCOPED_SIGNAL
Tahera Fahimi
- [PATCH v3 2/6] Landlock: Adding file_send_sigiotask signal scoping support
Tahera Fahimi
- [PATCH v3 2/6] Landlock: Adding file_send_sigiotask signal scoping support
Tahera Fahimi
- [PATCH v9 2/5] selftests/Landlock: Abstract unix socket restriction tests
Tahera Fahimi
- [PATCH v9 2/5] selftests/Landlock: Abstract unix socket restriction tests
Tahera Fahimi
- [PATCH v9 0/5] Landlock: Add abstract unix socket connect restriction
Tahera Fahimi
- [PATCH v9 1/5] Landlock: Add abstract unix socket connect restriction
Tahera Fahimi
- [PATCH v10 0/6] Landlock: Add abstract UNIX socket connect restriction
Tahera Fahimi
- [PATCH v10 1/6] Landlock: Add abstract UNIX socket connect restriction
Tahera Fahimi
- [PATCH v10 2/6] selftests/Landlock: general scoped restriction tests
Tahera Fahimi
- [PATCH v10 3/6] selftests/Landlock: Abstract UNIX socket restriction tests
Tahera Fahimi
- [PATCH v10 4/6] selftests/Landlock: Add pathname UNIX socket tests
Tahera Fahimi
- [PATCH v10 5/6] sample/Landlock: Support abstract unix socket restriction
Tahera Fahimi
- [PATCH v10 6/6] Landlock: Document LANDLOCK_SCOPED_ABSTRACT_UNIX_SOCKET and ABI versioning
Tahera Fahimi
- [PATCH 01/13] LSM: Add the lsmblob data structure.
Georgia Garcia
- [PATCH 03/13] LSM: Add lsmblob_to_secctx hook
Georgia Garcia
- [PATCH 03/13] LSM: Add lsmblob_to_secctx hook
Georgia Garcia
- [PATCH 04/13] Audit: maintain an lsmblob in audit_context
Georgia Garcia
- [PATCH 04/13] Audit: maintain an lsmblob in audit_context
Georgia Garcia
- [PATCH v4 04/14] Add primary TSEM implementation file.
Dr. Greg
- [PATCH] evm: stop avoidably reading i_writecount in evm_file_release
Mateusz Guzik
- [PATCH v2] fs,security: Fix file_set_fowner LSM hook inconsistencies
Mateusz Guzik
- [PATCH v2] fs, security: Fix file_set_fowner LSM hook inconsistencies
Mateusz Guzik
- [RESEND PATCH] cred: separate the refcount from frequently read fields
Mateusz Guzik
- [RESEND PATCH] cred: separate the refcount from frequently read fields
Mateusz Guzik
- [RESEND PATCH] cred: separate the refcount from frequently read fields
Mateusz Guzik
- [RESEND PATCH] cred: separate the refcount from frequently read fields
Mateusz Guzik
- [PATCH -next] lockdown: Make lockdown_lsmid static
Yue Haibing
- [PATCH v20 02/20] ipe: add policy parser
Serge E. Hallyn
- [PATCH v20 03/20] ipe: add evaluation loop
Serge E. Hallyn
- [PATCH v15 0/4] Reduce overhead of LSMs with static calls
Tetsuo Handa
- [RFC PATCH] lsm: make SECURITY_PATH always enabled
Tetsuo Handa
- [PATCH] lsm: remove LSM_COUNT and LSM_CONFIG_COUNT
Tetsuo Handa
- [PATCH 2/2] mm: drop PF_MEMALLOC_NORECLAIM
Christoph Hellwig
- [PATCH 1/2 v2] bcachefs: do not use PF_MEMALLOC_NORECLAIM
Christoph Hellwig
- [PATCH 0/2] get rid of PF_MEMALLOC_NORECLAIM
Michal Hocko
- [PATCH 1/2] bcachefs: do not use PF_MEMALLOC_NORECLAIM
Michal Hocko
- [PATCH 2/2] mm: drop PF_MEMALLOC_NORECLAIM
Michal Hocko
- [PATCH 1/2] bcachefs: do not use PF_MEMALLOC_NORECLAIM
Michal Hocko
- [PATCH 2/2] mm: drop PF_MEMALLOC_NORECLAIM
Michal Hocko
- [PATCH 2/2] mm: drop PF_MEMALLOC_NORECLAIM
Michal Hocko
- [PATCH 2/2] mm: drop PF_MEMALLOC_NORECLAIM
Michal Hocko
- [PATCH 1/2] bcachefs: do not use PF_MEMALLOC_NORECLAIM
Michal Hocko
- [PATCH 1/2] bcachefs: do not use PF_MEMALLOC_NORECLAIM
Michal Hocko
- [PATCH 1/2] bcachefs: do not use PF_MEMALLOC_NORECLAIM
Michal Hocko
- [PATCH 1/2 v2] bcachefs: do not use PF_MEMALLOC_NORECLAIM
Michal Hocko
- [PATCH 1/2] bcachefs: do not use PF_MEMALLOC_NORECLAIM
Michal Hocko
- [PATCH 1/2] bcachefs: do not use PF_MEMALLOC_NORECLAIM
Michal Hocko
- [PATCH v10 1/6] Landlock: Add abstract UNIX socket connect restriction
Simon Horman
- [PATCH net-next 00/13] net: header and core spelling corrections
Simon Horman
- [PATCH net-next 01/13] packet: Correct spelling in if_packet.h
Simon Horman
- [PATCH net-next 02/13] s390/iucv: Correct spelling in iucv.h
Simon Horman
- [PATCH net-next 03/13] ip_tunnel: Correct spelling in ip_tunnels.h
Simon Horman
- [PATCH net-next 04/13] ipv6: Correct spelling in ipv6.h
Simon Horman
- [PATCH net-next 05/13] bonding: Correct spelling in headers
Simon Horman
- [PATCH net-next 06/13] net: qualcomm: rmnet: Correct spelling in if_rmnet.h
Simon Horman
- [PATCH net-next 07/13] netlabel: Correct spelling in netlabel.h
Simon Horman
- [PATCH net-next 08/13] NFC: Correct spelling in headers
Simon Horman
- [PATCH net-next 09/13] net: sched: Correct spelling in headers
Simon Horman
- [PATCH net-next 10/13] sctp: Correct spelling in headers
Simon Horman
- [PATCH net-next 11/13] x25: Correct spelling in x25.h
Simon Horman
- [PATCH net-next 12/13] net: Correct spelling in headers
Simon Horman
- [PATCH net-next 13/13] net: Correct spelling in net/core
Simon Horman
- [PATCH net-next 00/13] net: header and core spelling corrections
Simon Horman
- [PATCH net-next 12/13] net: Correct spelling in headers
Simon Horman
- [PATCH RFC] security/KEYS: get rid of cred_alloc_blank and cred_transfer
Jann Horn
- [PATCH v1] keys: Restrict KEYCTL_SESSION_TO_PARENT according to ptrace_may_access()
Jann Horn
- [PATCH RFC] security/KEYS: get rid of cred_alloc_blank and cred_transfer
Jann Horn
- [PATCH v2 0/2] get rid of cred_transfer
Jann Horn
- [PATCH v2 1/2] KEYS: use synchronous task work for changing parent credentials
Jann Horn
- [PATCH v2 2/2] security: remove unused cred_alloc_blank/cred_transfer helpers
Jann Horn
- [PATCH v2 1/4] Landlock: Add signal control
Jann Horn
- [PATCH v8 1/4] Landlock: Add abstract unix socket connect restriction
Jann Horn
- [PATCH v8 1/4] Landlock: Add abstract unix socket connect restriction
Jann Horn
- [PATCH v2 1/4] Landlock: Add signal control
Jann Horn
- [PATCH v2 1/4] Landlock: Add signal control
Jann Horn
- [PATCH v8 1/4] Landlock: Add abstract unix socket connect restriction
Jann Horn
- [PATCH v2 1/4] Landlock: Add signal control
Jann Horn
- [PATCH v2 1/4] Landlock: Add signal control
Jann Horn
- [PATCH v2 1/4] Landlock: Add signal control
Jann Horn
- [PATCH v2 1/4] Landlock: Add signal control
Jann Horn
- f_modown and LSM inconsistency (was [PATCH v2 1/4] Landlock: Add signal control)
Jann Horn
- f_modown and LSM inconsistency (was [PATCH v2 1/4] Landlock: Add signal control)
Jann Horn
- f_modown and LSM inconsistency (was [PATCH v2 1/4] Landlock: Add signal control)
Jann Horn
- Can KEYCTL_SESSION_TO_PARENT be dropped entirely? -- was Re: [PATCH v2 1/2] KEYS: use synchronous task work for changing parent credentials
Jann Horn
- [PATCH v3 2/6] Landlock: Adding file_send_sigiotask signal scoping support
Jann Horn
- [PATCH v3 2/6] Landlock: Adding file_send_sigiotask signal scoping support
Jann Horn
- Can KEYCTL_SESSION_TO_PARENT be dropped entirely? -- was Re: [PATCH v2 1/2] KEYS: use synchronous task work for changing parent credentials
David Howells
- [PATCH 0/7] keys: Add tracepoints
David Howells
- [PATCH 1/7] keys: Out of line key_is_dead() so it can have tracepoints added in
David Howells
- [PATCH 2/7] keys: Extract struct key_user to its own header for tracing purposes
David Howells
- [PATCH 3/7] keys: Move key_get() out of line so a tracepoint can be added
David Howells
- [PATCH 4/7] keys: Add a key_ref_get() wrapper
David Howells
- [PATCH 5/7] keys: Use key_get() instead of __key_get()
David Howells
- [PATCH 6/7] keys: Provide a key_try_get() function and use it
David Howells
- [PATCH 7/7] keys: Add tracepoints for the keyrings facility
David Howells
- [PATCH v6 17/20] mm/mmap: Use vms accounted pages in mmap_region()
Liam R. Howlett
- [PATCH v6 17/20] mm/mmap: Use vms accounted pages in mmap_region()
Liam R. Howlett
- [PATCH v7 17/21] mm/mmap: Use vms accounted pages in mmap_region()
Liam R. Howlett
- [PATCH v8 17/21] mm/mmap: Use vms accounted pages in mmap_region()
Liam R. Howlett
- [PATCH 1/1] selinux,smack: don't bypass permissions check in inode_setsecctx hook
Chuck Lever III
- [RFC PATCH v1 2/9] landlock: Support TCP listen access-control
Mikhail Ivanov
- [RFC PATCH v1 2/9] landlock: Support TCP listen access-control
Mikhail Ivanov
- [RFC PATCH v1 2/9] landlock: Support TCP listen access-control
Mikhail Ivanov
- [RFC PATCH v1 5/9] selftests/landlock: Test listen on connected socket
Mikhail Ivanov
- [RFC PATCH v1 2/9] landlock: Support TCP listen access-control
Mikhail Ivanov
- [RFC PATCH v1 2/9] landlock: Support TCP listen access-control
Mikhail Ivanov
- [RFC PATCH v1 7/9] selftests/landlock: Test listen on ULP socket without clone method
Mikhail Ivanov
- [RFC PATCH v2 0/9] Support TCP listen access-control
Mikhail Ivanov
- [RFC PATCH v2 1/9] landlock: Refactor current_check_access_socket() access right check
Mikhail Ivanov
- [RFC PATCH v2 2/9] landlock: Support TCP listen access-control
Mikhail Ivanov
- [RFC PATCH v2 3/9] selftests/landlock: Support LANDLOCK_ACCESS_NET_LISTEN_TCP
Mikhail Ivanov
- [RFC PATCH v2 4/9] selftests/landlock: Test listening restriction
Mikhail Ivanov
- [RFC PATCH v2 5/9] selftests/landlock: Test listen on connected socket
Mikhail Ivanov
- [RFC PATCH v2 6/9] selftests/landlock: Test listening without explicit bind restriction
Mikhail Ivanov
- [RFC PATCH v2 7/9] selftests/landlock: Test listen on ULP socket without clone method
Mikhail Ivanov
- [RFC PATCH v2 8/9] selftests/landlock: Test changing socket backlog with listen(2)
Mikhail Ivanov
- [RFC PATCH v2 9/9] samples/landlock: Support LANDLOCK_ACCESS_NET_LISTEN
Mikhail Ivanov
- [RFC PATCH v1 0/4] Implement performance impact measurement tool
Mikhail Ivanov
- [RFC PATCH v1 1/4] selftests/landlock: Implement performance impact measurement tool
Mikhail Ivanov
- [RFC PATCH v1 2/4] selftests/landlock: Implement per-syscall microbenchmarks
Mikhail Ivanov
- [RFC PATCH v1 3/4] selftests/landlock: Implement custom libbpf-based tracer
Mikhail Ivanov
- [RFC PATCH v1 4/4] selftests/landlock: Add realworld workload based on find tool
Mikhail Ivanov
- [RFC PATCH v2 1/9] landlock: Refactor current_check_access_socket() access right check
Mikhail Ivanov
- [RFC PATCH v2 3/9] selftests/landlock: Support LANDLOCK_ACCESS_NET_LISTEN_TCP
Mikhail Ivanov
- [RFC PATCH v2 3/9] selftests/landlock: Support LANDLOCK_ACCESS_NET_LISTEN_TCP
Mikhail Ivanov
- [RFC PATCH v2 5/9] selftests/landlock: Test listen on connected socket
Mikhail Ivanov
- [RFC PATCH v2 6/9] selftests/landlock: Test listening without explicit bind restriction
Mikhail Ivanov
- [RFC PATCH v2 0/9] Support TCP listen access-control
Mikhail Ivanov
- [RFC PATCH v2 3/9] selftests/landlock: Support LANDLOCK_ACCESS_NET_LISTEN_TCP
Mikhail Ivanov
- [RFC PATCH v2 4/9] selftests/landlock: Test listening restriction
Mikhail Ivanov
- [RFC PATCH v2 6/9] selftests/landlock: Test listening without explicit bind restriction
Mikhail Ivanov
- [PATCH] security: smack: Fix indentation in smack_netfilter.c
GiSeong Ji
- [PATCH] apparmor: fix policy_unpack_test on big endian systems
John Johansen
- [RFC PATCH] fs: obtain the inode generation number from vfs directly
Jan Kara
- [PATCH 1/2] bcachefs: do not use PF_MEMALLOC_NORECLAIM
Jan Kara
- [PATCH v5.1 16/19] mm/mmap: Use vms accounted pages in mmap_region()
Bert Karwatzki
- [PATCH net-next 12/13] net: Correct spelling in headers
Jakub Kicinski
- [PATCH net-next 08/13] NFC: Correct spelling in headers
Krzysztof Kozlowski
- [PATCH net-next 00/13] net: header and core spelling corrections
Krzysztof Kozlowski
- [PATCH 1/1] selinux,smack: don't bypass permissions check in inode_setsecctx hook
Jeff Layton
- [PATCH 1/1] selinux,smack: don't bypass permissions check in inode_setsecctx hook
Jeff Layton
- [PATCH 1/1] selinux,smack: don't bypass permissions check in inode_setsecctx hook
Chuck Lever
- [PATCH AUTOSEL 6.10 065/121] smack: tcp: ipv4, fix incorrect labeling
Sasha Levin
- [PATCH AUTOSEL 6.6 45/83] smack: tcp: ipv4, fix incorrect labeling
Sasha Levin
- [PATCH AUTOSEL 6.1 34/61] smack: tcp: ipv4, fix incorrect labeling
Sasha Levin
- [PATCH AUTOSEL 5.15 28/47] smack: tcp: ipv4, fix incorrect labeling
Sasha Levin
- [PATCH AUTOSEL 5.10 22/38] smack: tcp: ipv4, fix incorrect labeling
Sasha Levin
- [PATCH AUTOSEL 5.4 09/22] smack: tcp: ipv4, fix incorrect labeling
Sasha Levin
- [PATCH AUTOSEL 4.19 05/14] smack: tcp: ipv4, fix incorrect labeling
Sasha Levin
- [RFC PATCH] fs: obtain the inode generation number from vfs directly
Hongbo Li
- [RFC PATCH] fs: obtain the inode generation number from vfs directly
Hongbo Li
- [RFC PATCH] fs: obtain the inode generation number from vfs directly
Hongbo Li
- [RFC PATCH] fs: obtain the inode generation number from vfs directly
Hongbo Li
- [PATCH -next] lsm: Use IS_ERR_OR_NULL() helper function
Hongbo Li
- [PATCH -next] apparmor: Use IS_ERR_OR_NULL() helper function
Hongbo Li
- WARNING in process_measurement
Xingyu Li
- BUG: general protection fault in tomoyo_check_acl
Xingyu Li
- WARNING in process_measurement
Xingyu Li
- WARNING in process_measurement
Xingyu Li
- [PATCH -next] ipe: Remove duplicated include in ipe.c
Yang Li
- [PATCH v1] security/apparmor: remove duplicate unpacking in unpack_perm function
Shen Lichuan
- [PATCH bpf-next 2/2] selftests/bpf: Add tests for bpf_get_dentry_xattr
Song Liu
- [PATCH bpf-next 2/2] selftests/bpf: Add tests for bpf_get_dentry_xattr
Song Liu
- [PATCH bpf-next 2/2] selftests/bpf: Add tests for bpf_get_dentry_xattr
Song Liu
- [PATCH bpf-next 2/2] selftests/bpf: Add tests for bpf_get_dentry_xattr
Song Liu
- [PATCH bpf-next 2/2] selftests/bpf: Add tests for bpf_get_dentry_xattr
Song Liu
- [PATCH bpf-next 2/2] selftests/bpf: Add tests for bpf_get_dentry_xattr
Song Liu
- [PATCH bpf-next 2/2] selftests/bpf: Add tests for bpf_get_dentry_xattr
Song Liu
- [PATCH net-next 10/13] sctp: Correct spelling in headers
Xin Long
- [PATCH net] sctp: fix association labeling in the duplicate COOKIE-ECHO case
Xin Long
- [PATCH 0/1] selinux, smack: don't bypass permissions check in inode_setsecctx hook
Scott Mayhew
- [PATCH 1/1] selinux, smack: don't bypass permissions check in inode_setsecctx hook
Scott Mayhew
- [PATCH v20 20/20] MAINTAINERS: ipe: add ipe maintainer information
Paul Menzel
- [PATCH v20 20/20] MAINTAINERS: ipe: add ipe maintainer information
Paul Menzel
- static_key_enable_cpuslocked(): static key 'security_hook_active_locked_down_0+0x0/0x10' used before call to jump_label_init()
Paul Moore
- [PATCH] init/main.c: Do jump_label_init before early_security_init
Paul Moore
- [PATCH] init/main.c: Initialize early LSMs after arch code
Paul Moore
- [PATCH v20 20/20] MAINTAINERS: ipe: add ipe maintainer information
Paul Moore
- [PATCH v20 00/20] Integrity Policy Enforcement LSM (IPE)
Paul Moore
- [PATCH] init/main.c: Initialize early LSMs after arch code
Paul Moore
- [PATCH v20 20/20] MAINTAINERS: ipe: add ipe maintainer information
Paul Moore
- [PATCH] init/main.c: Initialize early LSMs after arch code
Paul Moore
- [PATCH] init/main.c: Initialize early LSMs after arch code
Paul Moore
- [PATCH] init/main.c: Initialize early LSMs after arch code
Paul Moore
- [PATCH] init/main.c: Initialize early LSMs after arch code
Paul Moore
- [PATCH] init/main.c: Initialize early LSMs after arch code
Paul Moore
- [PATCH] init/main.c: Initialize early LSMs after arch code
Paul Moore
- f_modown and LSM inconsistency (was [PATCH v2 1/4] Landlock: Add signal control)
Paul Moore
- f_modown and LSM inconsistency (was [PATCH v2 1/4] Landlock: Add signal control)
Paul Moore
- [PATCH] fs, security: Fix file_set_fowner LSM hook inconsistencies
Paul Moore
- f_modown and LSM inconsistency (was [PATCH v2 1/4] Landlock: Add signal control)
Paul Moore
- f_modown and LSM inconsistency (was [PATCH v2 1/4] Landlock: Add signal control)
Paul Moore
- [PATCH] init/main.c: Initialize early LSMs after arch code
Paul Moore
- [PATCH] lsm: cleanup lsm_hooks.h
Paul Moore
- [PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
Paul Moore
- [PATCH] init/main.c: Initialize early LSMs after arch code
Paul Moore
- [PATCH v2] fs, security: Fix file_set_fowner LSM hook inconsistencies
Paul Moore
- [PATCH v2] fs, security: Fix file_set_fowner LSM hook inconsistencies
Paul Moore
- [PATCH] init/main.c: Initialize early LSMs after arch code
Paul Moore
- [PATCH v2] fs, security: Fix file_set_fowner LSM hook inconsistencies
Paul Moore
- [PATCH v20 02/20] ipe: add policy parser
Paul Moore
- [PATCH v2] fs, security: Fix file_set_fowner LSM hook inconsistencies
Paul Moore
- [GIT PULL] selinux/selinux-pr-20240814
Paul Moore
- [PATCH] lockdown: Make lockdown_lsmid static
Paul Moore
- [PATCH v20 02/20] ipe: add policy parser
Paul Moore
- [PATCH v20 12/20] dm verity: expose root hash digest and signature data to LSMs
Paul Moore
- [PATCH v20 12/20] dm verity: expose root hash digest and signature data to LSMs
Paul Moore
- [PATCH v20 12/20] dm verity: expose root hash digest and signature data to LSMs
Paul Moore
- [PATCH v20 00/20] Integrity Policy Enforcement LSM (IPE)
Paul Moore
- [PATCH v15 0/4] Reduce overhead of LSMs with static calls
Paul Moore
- [PATCH v15 3/4] lsm: count the LSMs enabled at compile time
Paul Moore
- [PATCH v15 0/4] Reduce overhead of LSMs with static calls
Paul Moore
- [PATCH bpf-next 2/2] selftests/bpf: Add tests for bpf_get_dentry_xattr
Paul Moore
- [PATCH v3 1/2] fs: Fix file_set_fowner LSM hook inconsistencies
Paul Moore
- [PATCH v6 17/20] mm/mmap: Use vms accounted pages in mmap_region()
Paul Moore
- [PATCH] ipe: Remove duplicated include in ipe.c
Paul Moore
- [PATCH v15 3/4] lsm: count the LSMs enabled at compile time
Paul Moore
- [RESEND PATCH] cred: separate the refcount from frequently read fields
Paul Moore
- [PATCH 1/2] selinux: do not include <linux/*.h> headers from host programs
Paul Moore
- [PATCH 2/2] selinux: move genheaders to security/selinux/
Paul Moore
- [PATCH] sctp: fix association labeling in the duplicate COOKIE-ECHO case
Paul Moore
- [PATCH -next 07/15] security: min_addr: move sysctl into its own file
Paul Moore
- [RFC PATCH] lsm: make SECURITY_PATH always enabled
Paul Moore
- [PATCH] lsm: remove LSM_COUNT and LSM_CONFIG_COUNT
Paul Moore
- [PATCH -next 07/15] security: min_addr: move sysctl into its own file
Paul Moore
- [PATCH bpf-next 7/8] security,bpf: constify struct path in bpf_token_create() LSM hook
Paul Moore
- [PATCH 1/1] selinux,smack: don't bypass permissions check in inode_setsecctx hook
Paul Moore
- [PATCH 1/1] selinux,smack: don't bypass permissions check in inode_setsecctx hook
Paul Moore
- [PATCH 1/1] selinux,smack: don't bypass permissions check in inode_setsecctx hook
Paul Moore
- [PATCH 1/1] selinux,smack: don't bypass permissions check in inode_setsecctx hook
Paul Moore
- [PATCH] lsm: Use IS_ERR_OR_NULL() helper function
Paul Moore
- [GIT PULL] lsm/lsm-pr-20240830
Paul Moore
- [PATCH v7 0/8] Improve the copy of task comm
Andrew Morton
- [PATCH net] sctp: fix association labeling in the duplicate COOKIE-ECHO case
Ondrej Mosnacek
- [PATCH bpf-next 7/8] security,bpf: constify struct path in bpf_token_create() LSM hook
Andrii Nakryiko
- [PATCH bpf-next 7/8] security,bpf: constify struct path in bpf_token_create() LSM hook
Andrii Nakryiko
- [RFC] integrity: wait for completion of i2c initialization using late_initcall_sync()
Romain Naour
- [RFC PATCH v1 2/9] landlock: Support TCP listen access-control
Günther Noack
- [RFC PATCH v2 1/9] landlock: Refactor current_check_access_socket() access right check
Günther Noack
- [RFC PATCH v2 3/9] selftests/landlock: Support LANDLOCK_ACCESS_NET_LISTEN_TCP
Günther Noack
- [RFC PATCH v2 3/9] selftests/landlock: Support LANDLOCK_ACCESS_NET_LISTEN_TCP
Günther Noack
- [RFC PATCH v2 4/9] selftests/landlock: Test listening restriction
Günther Noack
- [RFC PATCH v2 5/9] selftests/landlock: Test listen on connected socket
Günther Noack
- [RFC PATCH v2 6/9] selftests/landlock: Test listening without explicit bind restriction
Günther Noack
- [RFC PATCH v2 0/9] Support TCP listen access-control
Günther Noack
- [RFC PATCH v2 3/9] selftests/landlock: Support LANDLOCK_ACCESS_NET_LISTEN_TCP
Günther Noack
- [RFC PATCH v2 0/9] Support TCP listen access-control
Günther Noack
- [PATCH 2/2] mm: drop PF_MEMALLOC_NORECLAIM
Kent Overstreet
- [PATCH 1/2] bcachefs: do not use PF_MEMALLOC_NORECLAIM
Kent Overstreet
- [PATCH 1/2] bcachefs: do not use PF_MEMALLOC_NORECLAIM
Kent Overstreet
- [PATCH 1/2] bcachefs: do not use PF_MEMALLOC_NORECLAIM
Kent Overstreet
- [PATCH 1/2] bcachefs: do not use PF_MEMALLOC_NORECLAIM
Kent Overstreet
- [PATCH 1/2] bcachefs: do not use PF_MEMALLOC_NORECLAIM
Kent Overstreet
- [PATCH 1/2] bcachefs: do not use PF_MEMALLOC_NORECLAIM
Kent Overstreet
- [PATCH 1/2] bcachefs: do not use PF_MEMALLOC_NORECLAIM
Kent Overstreet
- [PATCH 1/2] bcachefs: do not use PF_MEMALLOC_NORECLAIM
Kent Overstreet
- [PATCH 1/2] bcachefs: do not use PF_MEMALLOC_NORECLAIM
Kent Overstreet
- [PATCH 1/2 v2] bcachefs: do not use PF_MEMALLOC_NORECLAIM
Kent Overstreet
- [PATCH 1/2 v2] bcachefs: do not use PF_MEMALLOC_NORECLAIM
Kent Overstreet
- [PATCH 1/2 v2] bcachefs: do not use PF_MEMALLOC_NORECLAIM
Kent Overstreet
- [PATCH v20 12/20] dm verity: expose root hash digest and signature data to LSMs
Mikulas Patocka
- [PATCH] init/main.c: Do jump_label_init before early_security_init
Borislav Petkov
- [PATCH v5] proc: add config & param to block forcing mem writes
Adrian Ratiu
- [PATCH v2] tpm: Add new device/vendor ID 0x50666666
Jett Rink
- [PATCH v3] tpm: Add new device/vendor ID 0x50666666
Jett Rink
- [PATCH v4] tpm: Add new device/vendor ID 0x50666666
Jett Rink
- [PATCH v5] tpm: Add new device/vendor ID 0x50666666
Jett Rink
- [PATCH v5] tpm: Add new device/vendor ID 0x50666666
Jett Rink
- [PATCH] init/main.c: Initialize early LSMs after arch code
Guenter Roeck
- [PATCH] init/main.c: Initialize early LSMs after arch code
Guenter Roeck
- [PATCH] init/main.c: Initialize early LSMs after arch code
Guenter Roeck
- [PATCH] init/main.c: Initialize early LSMs after arch code
Guenter Roeck
- [PATCH] init/main.c: Initialize early LSMs after arch code
Guenter Roeck
- [PATCH] init/main.c: Initialize early LSMs after arch code
Guenter Roeck
- [PATCH] apparmor: fix policy_unpack_test on big endian systems
Guenter Roeck
- [PATCH] init/main.c: Initialize early LSMs after arch code
Guenter Roeck
- [PATCH] init/main.c: Initialize early LSMs after arch code
Guenter Roeck
- [PATCH] apparmor: fix policy_unpack_test on big endian systems
Guenter Roeck
- [PATCH] init/main.c: Initialize early LSMs after arch code
Guenter Roeck
- [PATCH] init/main.c: Initialize early LSMs after arch code
Guenter Roeck
- [PATCH v15 0/4] Reduce overhead of LSMs with static calls
Guenter Roeck
- [PATCH RFC] security/KEYS: get rid of cred_alloc_blank and cred_transfer
Jarkko Sakkinen
- [PATCH v2] tpm: Add new device/vendor ID 0x50666666
Jarkko Sakkinen
- [PATCH RFC] security/KEYS: get rid of cred_alloc_blank and cred_transfer
Jarkko Sakkinen
- [PATCH v4] tpm: Add new device/vendor ID 0x50666666
Jarkko Sakkinen
- [PATCH v2 1/2] KEYS: use synchronous task work for changing parent credentials
Jarkko Sakkinen
- [PATCH v2 2/2] security: remove unused cred_alloc_blank/cred_transfer helpers
Jarkko Sakkinen
- Can KEYCTL_SESSION_TO_PARENT be dropped entirely? -- was Re: [PATCH v2 1/2] KEYS: use synchronous task work for changing parent credentials
Jarkko Sakkinen
- [PATCH 1/7] keys: Out of line key_is_dead() so it can have tracepoints added in
Jarkko Sakkinen
- [PATCH 2/7] keys: Extract struct key_user to its own header for tracing purposes
Jarkko Sakkinen
- [PATCH 3/7] keys: Move key_get() out of line so a tracepoint can be added
Jarkko Sakkinen
- [PATCH 4/7] keys: Add a key_ref_get() wrapper
Jarkko Sakkinen
- [PATCH 5/7] keys: Use key_get() instead of __key_get()
Jarkko Sakkinen
- [PATCH 6/7] keys: Provide a key_try_get() function and use it
Jarkko Sakkinen
- [PATCH 7/7] keys: Add tracepoints for the keyrings facility
Jarkko Sakkinen
- [RFC PATCH v1 2/9] landlock: Support TCP listen access-control
Mickaël Salaün
- [RFC PATCH v1 2/9] landlock: Support TCP listen access-control
Mickaël Salaün
- [RFC PATCH v1 5/9] selftests/landlock: Test listen on connected socket
Mickaël Salaün
- [RFC PATCH v1 7/9] selftests/landlock: Test listen on ULP socket without clone method
Mickaël Salaün
- [PATCH v1] keys: Restrict KEYCTL_SESSION_TO_PARENT according to ptrace_may_access()
Mickaël Salaün
- [RFC PATCH v1 2/9] landlock: Support TCP listen access-control
Mickaël Salaün
- [PATCH v8 1/4] Landlock: Add abstract unix socket connect restriction
Mickaël Salaün
- [PATCH v8 1/4] Landlock: Add abstract unix socket connect restriction
Mickaël Salaün
- [PATCH v8 1/4] Landlock: Add abstract unix socket connect restriction
Mickaël Salaün
- [PATCH v8 1/4] Landlock: Add abstract unix socket connect restriction
Mickaël Salaün
- [PATCH v8 1/4] Landlock: Add abstract unix socket connect restriction
Mickaël Salaün
- [PATCH v8 2/4] selftests/landlock: Abstract unix socket restriction tests
Mickaël Salaün
- [PATCH v8 4/4] Landlock: Document LANDLOCK_SCOPED_ABSTRACT_UNIX_SOCKET and ABI versioning
Mickaël Salaün
- [PATCH v2 1/4] Landlock: Add signal control
Mickaël Salaün
- [PATCH v2 1/4] Landlock: Add signal control
Mickaël Salaün
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
Mickaël Salaün
- [PATCH v8 1/4] Landlock: Add abstract unix socket connect restriction
Mickaël Salaün
- [PATCH v2 1/4] Landlock: Add signal control
Mickaël Salaün
- [PATCH v2 1/4] Landlock: Add signal control
Mickaël Salaün
- [PATCH v2 1/4] Landlock: Add signal control
Mickaël Salaün
- f_modown and LSM inconsistency (was [PATCH v2 1/4] Landlock: Add signal control)
Mickaël Salaün
- [PATCH v2 1/4] Landlock: Add signal control
Mickaël Salaün
- [PATCH v8 3/4] sample/Landlock: Support abstract unix socket restriction
Mickaël Salaün
- [PATCH v8 1/4] Landlock: Add abstract unix socket connect restriction
Mickaël Salaün
- [PATCH] fs,security: Fix file_set_fowner LSM hook inconsistencies
Mickaël Salaün
- f_modown and LSM inconsistency (was [PATCH v2 1/4] Landlock: Add signal control)
Mickaël Salaün
- [PATCH v8 3/4] sample/Landlock: Support abstract unix socket restriction
Mickaël Salaün
- f_modown and LSM inconsistency (was [PATCH v2 1/4] Landlock: Add signal control)
Mickaël Salaün
- [PATCH v2] fs,security: Fix file_set_fowner LSM hook inconsistencies
Mickaël Salaün
- [PATCH v2] fs,security: Fix file_set_fowner LSM hook inconsistencies
Mickaël Salaün
- [PATCH v2] fs,security: Fix file_set_fowner LSM hook inconsistencies
Mickaël Salaün
- [PATCH v2] fs,security: Fix file_set_fowner LSM hook inconsistencies
Mickaël Salaün
- [PATCH v2] fs,security: Fix file_set_fowner LSM hook inconsistencies
Mickaël Salaün
- [PATCH v9 1/5] Landlock: Add abstract unix socket connect restriction
Mickaël Salaün
- [PATCH v9 2/5] selftests/Landlock: Abstract unix socket restriction tests
Mickaël Salaün
- Landlock Houdini fix: CVE-2024-42318
Mickaël Salaün
- [PATCH bpf-next 2/2] selftests/bpf: Add tests for bpf_get_dentry_xattr
Mickaël Salaün
- [PATCH v9 1/5] Landlock: Add abstract unix socket connect restriction
Mickaël Salaün
- [PATCH v9 2/5] selftests/Landlock: Abstract unix socket restriction tests
Mickaël Salaün
- [PATCH v9 2/5] selftests/Landlock: Abstract unix socket restriction tests
Mickaël Salaün
- [PATCH v3 2/6] Landlock: Adding file_send_sigiotask signal scoping support
Mickaël Salaün
- [PATCH v9 1/5] Landlock: Add abstract unix socket connect restriction
Mickaël Salaün
- [PATCH v9 3/5] selftests/Landlock: Adding pathname Unix socket tests
Mickaël Salaün
- [PATCH v9 4/5] sample/Landlock: Support abstract unix socket restriction
Mickaël Salaün
- [PATCH v9 5/5] Landlock: Document LANDLOCK_SCOPED_ABSTRACT_UNIX_SOCKET and ABI versioning
Mickaël Salaün
- [PATCH v9 0/5] Landlock: Add abstract unix socket connect restriction
Mickaël Salaün
- [PATCH bpf-next 2/2] selftests/bpf: Add tests for bpf_get_dentry_xattr
Mickaël Salaün
- [PATCH v9 1/5] Landlock: Add abstract unix socket connect restriction
Mickaël Salaün
- [PATCH v3 4/6] selftest/Landlock: pthread_kill(3) tests
Mickaël Salaün
- [PATCH v3 3/6] selftest/Landlock: Signal restriction tests
Mickaël Salaün
- [PATCH v10 2/6] selftests/Landlock: general scoped restriction tests
Mickaël Salaün
- [PATCH v10 3/6] selftests/Landlock: Abstract UNIX socket restriction tests
Mickaël Salaün
- [PATCH v3 1/2] fs: Fix file_set_fowner LSM hook inconsistencies
Mickaël Salaün
- [PATCH v3 2/2] security: Update file_set_fowner documentation
Mickaël Salaün
- [PATCH v3 2/6] Landlock: Adding file_send_sigiotask signal scoping support
Mickaël Salaün
- [PATCH v10 5/6] sample/Landlock: Support abstract unix socket restriction
Mickaël Salaün
- [PATCH bpf-next 2/2] selftests/bpf: Add tests for bpf_get_dentry_xattr
Mickaël Salaün
- [PATCH v3 3/6] selftest/Landlock: Signal restriction tests
Mickaël Salaün
- [PATCH v3 4/6] selftest/Landlock: pthread_kill(3) tests
Mickaël Salaün
- [PATCH] evm: stop avoidably reading i_writecount in evm_file_release
Roberto Sassu
- [PATCH][next] integrity: Use static_assert() to check struct sizes
Roberto Sassu
- [RFC] integrity: wait for completion of i2c initialization using late_initcall_sync()
Roberto Sassu
- WARNING in process_measurement
Roberto Sassu
- [PATCH] security: smack: Fix indentation in smack_netfilter.c
Casey Schaufler
- [PATCH] security: smack: Fix indentation in smack_netfilter.c
Casey Schaufler
- [PATCH 00/13] LSM: Move away from secids
Casey Schaufler
- [PATCH 01/13] LSM: Add the lsmblob data structure.
Casey Schaufler
- [PATCH 02/13] LSM: Use lsmblob in security_audit_rule_match
Casey Schaufler
- [PATCH 03/13] LSM: Add lsmblob_to_secctx hook
Casey Schaufler
- [PATCH 04/13] Audit: maintain an lsmblob in audit_context
Casey Schaufler
- [PATCH 05/13] LSM: Use lsmblob in security_ipc_getsecid
Casey Schaufler
- [PATCH 06/13] Audit: Update shutdown LSM data
Casey Schaufler
- [PATCH 07/13] LSM: Use lsmblob in security_current_getsecid
Casey Schaufler
- [PATCH 08/13] LSM: Use lsmblob in security_inode_getsecid
Casey Schaufler
- [PATCH 09/13] Audit: use an lsmblob in audit_names
Casey Schaufler
- [PATCH 10/13] LSM: Create new security_cred_getlsmblob LSM hook
Casey Schaufler
- [PATCH 11/13] Audit: Change context data from secid to lsmblob
Casey Schaufler
- [PATCH 12/13] Netlabel: Use lsmblob for audit data
Casey Schaufler
- [PATCH 13/13] LSM: Remove lsmblob scaffolding
Casey Schaufler
- [PATCH v4 04/14] Add primary TSEM implementation file.
Casey Schaufler
- [PATCH 03/13] LSM: Add lsmblob_to_secctx hook
Casey Schaufler
- [PATCH v4 04/14] Add primary TSEM implementation file.
Casey Schaufler
- [PATCH 1/1] selinux,smack: don't bypass permissions check in inode_setsecctx hook
Casey Schaufler
- [PATCH v2 00/13] LSM: Move away from secids
Casey Schaufler
- [PATCH v2 01/13] LSM: Add the lsmblob data structure.
Casey Schaufler
- [PATCH v2 02/13] LSM: Use lsmblob in security_audit_rule_match
Casey Schaufler
- [PATCH v2 03/13] LSM: Add lsmblob_to_secctx hook
Casey Schaufler
- [PATCH v2 04/13] Audit: maintain an lsmblob in audit_context
Casey Schaufler
- [PATCH v2 05/13] LSM: Use lsmblob in security_ipc_getsecid
Casey Schaufler
- [PATCH v2 06/13] Audit: Update shutdown LSM data
Casey Schaufler
- [PATCH v2 07/13] LSM: Use lsmblob in security_current_getsecid
Casey Schaufler
- [PATCH v2 08/13] LSM: Use lsmblob in security_inode_getsecid
Casey Schaufler
- [PATCH v2 09/13] Audit: use an lsmblob in audit_names
Casey Schaufler
- [PATCH v2 10/13] LSM: Create new security_cred_getlsmblob LSM hook
Casey Schaufler
- [PATCH v2 11/13] Audit: Change context data from secid to lsmblob
Casey Schaufler
- [PATCH v2 12/13] Netlabel: Use lsmblob for audit data
Casey Schaufler
- [PATCH v2 13/13] LSM: Remove lsmblob scaffolding
Casey Schaufler
- [PATCH net-next 11/13] x25: Correct spelling in x25.h
Martin Schiller
- [PATCH v5 0/9] Improve the copy of task comm
Yafang Shao
- [PATCH v5 1/9] fs/exec: Drop task_lock() inside __get_task_comm()
Yafang Shao
- [PATCH v5 2/9] auditsc: Replace memcpy() with __get_task_comm()
Yafang Shao
- [PATCH v5 3/9] security: Replace memcpy() with __get_task_comm()
Yafang Shao
- [PATCH v5 4/9] bpftool: Ensure task comm is always NUL-terminated
Yafang Shao
- [PATCH v5 5/9] mm/util: Fix possible race condition in kstrdup()
Yafang Shao
- [PATCH v5 6/9] mm/util: Deduplicate code in {kstrdup, kstrndup, kmemdup_nul}
Yafang Shao
- [PATCH v5 7/9] tracing: Replace strncpy() with __get_task_comm()
Yafang Shao
- [PATCH v5 8/9] net: Replace strcpy() with __get_task_comm()
Yafang Shao
- [PATCH v5 9/9] drm: Replace strcpy() with __get_task_comm()
Yafang Shao
- [PATCH v5 0/9] Improve the copy of task comm
Yafang Shao
- [PATCH v5 0/9] Improve the copy of task comm
Yafang Shao
- [PATCH v5 0/9] Improve the copy of task comm
Yafang Shao
- [PATCH v6 0/9] Improve the copy of task comm
Yafang Shao
- [PATCH v6 1/9] Get rid of __get_task_comm()
Yafang Shao
- [PATCH v6 2/9] auditsc: Replace memcpy() with strscpy()
Yafang Shao
- [PATCH v6 3/9] security: Replace memcpy() with get_task_comm()
Yafang Shao
- [PATCH v6 4/9] bpftool: Ensure task comm is always NUL-terminated
Yafang Shao
- [PATCH v6 5/9] mm/util: Fix possible race condition in kstrdup()
Yafang Shao
- [PATCH v6 6/9] mm/util: Deduplicate code in {kstrdup, kstrndup, kmemdup_nul}
Yafang Shao
- [PATCH v6 7/9] tracing: Replace strncpy() with strscpy()
Yafang Shao
- [PATCH v6 8/9] net: Replace strcpy() with strscpy()
Yafang Shao
- [PATCH v6 9/9] drm: Replace strcpy() with strscpy()
Yafang Shao
- [PATCH v6 1/9] Get rid of __get_task_comm()
Yafang Shao
- [PATCH v6 7/9] tracing: Replace strncpy() with strscpy()
Yafang Shao
- [PATCH v7 0/8] Improve the copy of task comm
Yafang Shao
- [PATCH v7 1/8] Get rid of __get_task_comm()
Yafang Shao
- [PATCH v7 2/8] auditsc: Replace memcpy() with strscpy()
Yafang Shao
- [PATCH v7 3/8] security: Replace memcpy() with get_task_comm()
Yafang Shao
- [PATCH v7 4/8] bpftool: Ensure task comm is always NUL-terminated
Yafang Shao
- [PATCH v7 5/8] mm/util: Fix possible race condition in kstrdup()
Yafang Shao
- [PATCH v7 6/8] mm/util: Deduplicate code in {kstrdup, kstrndup, kmemdup_nul}
Yafang Shao
- [PATCH v7 7/8] net: Replace strcpy() with strscpy()
Yafang Shao
- [PATCH v7 8/8] drm: Replace strcpy() with strscpy()
Yafang Shao
- [PATCH v7 4/8] bpftool: Ensure task comm is always NUL-terminated
Yafang Shao
- [PATCH v7 0/8] Improve the copy of task comm
Yafang Shao
- [PATCH v7 6/8] mm/util: Deduplicate code in {kstrdup, kstrndup, kmemdup_nul}
Yafang Shao
- [PATCH 2/2] mm: drop PF_MEMALLOC_NORECLAIM
Yafang Shao
- [PATCH v8 0/8] Improve the copy of task comm
Yafang Shao
- [PATCH v8 1/8] Get rid of __get_task_comm()
Yafang Shao
- [PATCH v8 2/8] auditsc: Replace memcpy() with strscpy()
Yafang Shao
- [PATCH v8 3/8] security: Replace memcpy() with get_task_comm()
Yafang Shao
- [PATCH v8 4/8] bpftool: Ensure task comm is always NUL-terminated
Yafang Shao
- [PATCH v8 5/8] mm/util: Fix possible race condition in kstrdup()
Yafang Shao
- [PATCH v8 6/8] mm/util: Deduplicate code in {kstrdup, kstrndup, kmemdup_nul}
Yafang Shao
- [PATCH v8 7/8] net: Replace strcpy() with strscpy()
Yafang Shao
- [PATCH v8 8/8] drm: Replace strcpy() with strscpy()
Yafang Shao
- [PATCH v8 1/8] Get rid of __get_task_comm()
Yafang Shao
- [PATCH v8 6/8] mm/util: Deduplicate code in {kstrdup, kstrndup, kmemdup_nul}
Yafang Shao
- [PATCH v8 1/8] Get rid of __get_task_comm()
Yafang Shao
- [PATCH v8 1/8] Get rid of __get_task_comm()
Yafang Shao
- [PATCH 1/2 v2] bcachefs: do not use PF_MEMALLOC_NORECLAIM
Yafang Shao
- [PATCH][next] integrity: Use static_assert() to check struct sizes
Gustavo A. R. Silva
- [PATCH] init/main.c: Do jump_label_init before early_security_init
KP Singh
- [PATCH] init/main.c: Do jump_label_init before early_security_init
KP Singh
- [PATCH] init/main.c: Initialize early LSMs after arch code
KP Singh
- [PATCH] init/main.c: Initialize early LSMs after arch code
KP Singh
- [PATCH] init/main.c: Initialize early LSMs after arch code
KP Singh
- [PATCH] init/main.c: Initialize early LSMs after arch code
KP Singh
- [PATCH] init/main.c: Initialize early LSMs after arch code
KP Singh
- [PATCH] init/main.c: Initialize early LSMs after arch code
KP Singh
- [PATCH] init/main.c: Initialize early LSMs after arch code
KP Singh
- [PATCH] init/main.c: Initialize early LSMs after arch code
KP Singh
- [PATCH] init/main.c: Initialize early LSMs after arch code
KP Singh
- [PATCH] init/main.c: Initialize early LSMs after arch code
KP Singh
- [PATCH] init/main.c: Initialize early LSMs after arch code
KP Singh
- [PATCH v15 0/4] Reduce overhead of LSMs with static calls
KP Singh
- [PATCH v15 1/4] init/main.c: Initialize early LSMs after arch code, static keys and calls.
KP Singh
- [PATCH v15 2/4] kernel: Add helper macros for loop unrolling
KP Singh
- [PATCH v15 3/4] lsm: count the LSMs enabled at compile time
KP Singh
- [PATCH v15 4/4] lsm: replace indirect LSM hook calls with static calls
KP Singh
- [PATCH 05/13] LSM: Use lsmblob in security_ipc_getsecid
Stephen Smalley
- [PATCH 1/1] selinux,smack: don't bypass permissions check in inode_setsecctx hook
Stephen Smalley
- [PATCH net-next 00/13] net: header and core spelling corrections
Philipp Stanner
- [PATCH v6 7/9] tracing: Replace strncpy() with strscpy()
Justin Stitt
- [PATCH v6 7/9] tracing: Replace strncpy() with strscpy()
Justin Stitt
- [PATCH v5 0/9] Improve the copy of task comm
Linus Torvalds
- [PATCH v5 0/9] Improve the copy of task comm
Linus Torvalds
- [PATCH v7 5/8] mm/util: Fix possible race condition in kstrdup()
Linus Torvalds
- [RESEND PATCH] cred: separate the refcount from frequently read fields
Linus Torvalds
- [RESEND PATCH] cred: separate the refcount from frequently read fields
Linus Torvalds
- [RFC PATCH] fs: obtain the inode generation number from vfs directly
Theodore Ts'o
- [PATCH bpf-next 2/2] selftests/bpf: Add tests for bpf_get_dentry_xattr
Al Viro
- [PATCH v4 00/14] Implement Trusted Security Event Modeling.
Greg Wettstein
- [PATCH v4 01/14] Update MAINTAINERS file.
Greg Wettstein
- [PATCH v4 03/14] TSEM global declarations.
Greg Wettstein
- [PATCH v4 04/14] Add primary TSEM implementation file.
Greg Wettstein
- [PATCH v4 05/14] Add root domain trust implementation.
Greg Wettstein
- [PATCH v4 06/14] Implement TSEM control plane.
Greg Wettstein
- [PATCH v4 07/14] Add namespace implementation.
Greg Wettstein
- [PATCH v4 08/14] Add security event description export facility.
Greg Wettstein
- [PATCH v4 09/14] Add event processing implementation.
Greg Wettstein
- [PATCH v4 10/14] Implement security event mapping.
Greg Wettstein
- [PATCH v4 11/14] Implement the internal Trusted Modeling Agent.
Greg Wettstein
- [PATCH v4 12/14] Implement configuration and methods for default model.
Greg Wettstein
- [PATCH v4 13/14] Implement infrastructure for loadable security models.
Greg Wettstein
- [PATCH v4 14/14] Activate the configuration and build of the TSEM LSM.
Greg Wettstein
- [PATCH 1/2] bcachefs: do not use PF_MEMALLOC_NORECLAIM
Matthew Wilcox
- [PATCH 2/2] mm: drop PF_MEMALLOC_NORECLAIM
Matthew Wilcox
- [PATCH 2/2] mm: drop PF_MEMALLOC_NORECLAIM
Matthew Wilcox
- [PATCH 2/2] mm: drop PF_MEMALLOC_NORECLAIM
Matthew Wilcox
- [PATCH 1/2] bcachefs: do not use PF_MEMALLOC_NORECLAIM
Matthew Wilcox
- [PATCH 1/2] bcachefs: do not use PF_MEMALLOC_NORECLAIM
Matthew Wilcox
- [RFC PATCH] fs: obtain the inode generation number from vfs directly
Matthew Wilcox
- [RFC PATCH] fs: obtain the inode generation number from vfs directly
Darrick J. Wong
- [RFC PATCH] fs: obtain the inode generation number from vfs directly
Darrick J. Wong
- [RFC PATCH] fs: obtain the inode generation number from vfs directly
Darrick J. Wong
- [RFC PATCH] fs: obtain the inode generation number from vfs directly
Darrick J. Wong
- [PATCH v20 00/20] Integrity Policy Enforcement LSM (IPE)
Fan Wu
- [PATCH v20 01/20] security: add ipe lsm
Fan Wu
- [PATCH v20 02/20] ipe: add policy parser
Fan Wu
- [PATCH v20 03/20] ipe: add evaluation loop
Fan Wu
- [PATCH v20 04/20] ipe: add LSM hooks on execution and kernel read
Fan Wu
- [PATCH v20 05/20] initramfs|security: Add a security hook to do_populate_rootfs()
Fan Wu
- [PATCH v20 06/20] ipe: introduce 'boot_verified' as a trust provider
Fan Wu
- [PATCH v20 07/20] security: add new securityfs delete function
Fan Wu
- [PATCH v20 08/20] ipe: add userspace interface
Fan Wu
- [PATCH v20 09/20] uapi|audit|ipe: add ipe auditing support
Fan Wu
- [PATCH v20 10/20] ipe: add permissive toggle
Fan Wu
- [PATCH v20 11/20] block|lsm: Add LSM blob and new LSM hooks for block devices
Fan Wu
- [PATCH v20 12/20] dm verity: expose root hash digest and signature data to LSMs
Fan Wu
- [PATCH v20 13/20] ipe: add support for dm-verity as a trust provider
Fan Wu
- [PATCH v20 14/20] security: add security_inode_setintegrity() hook
Fan Wu
- [PATCH v20 15/20] fsverity: expose verified fsverity built-in signatures to LSMs
Fan Wu
- [PATCH v20 16/20] ipe: enable support for fs-verity as a trust provider
Fan Wu
- [PATCH v20 17/20] scripts: add boot policy generation program
Fan Wu
- [PATCH v20 18/20] ipe: kunit test for parser
Fan Wu
- [PATCH v20 19/20] Documentation: add ipe documentation
Fan Wu
- [PATCH v20 20/20] MAINTAINERS: ipe: add ipe maintainer information
Fan Wu
- [PATCH v20 20/20] MAINTAINERS: ipe: add ipe maintainer information
Fan Wu
- [PATCH v20 12/20] dm verity: expose root hash digest and signature data to LSMs
Fan Wu
- [PATCH v20 02/20] ipe: add policy parser
Fan Wu
- [PATCH v20 02/20] ipe: add policy parser
Fan Wu
- [PATCH v20 12/20] dm verity: expose root hash digest and signature data to LSMs
Fan Wu
- [PATCH v20 12/20] dm verity: expose root hash digest and signature data to LSMs
Fan Wu
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
Jeff Xu
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
Jeff Xu
- [PATCH 0/2] selinux: Do not include <linux/*.h> from host programs (+ extra clean-up)
Masahiro Yamada
- [PATCH 1/2] selinux: do not include <linux/*.h> headers from host programs
Masahiro Yamada
- [PATCH 2/2] selinux: move genheaders to security/selinux/
Masahiro Yamada
- [PATCH -next 00/15] sysctl: move sysctls from vm_table into its own files
Kaixiong Yu
- [PATCH -next 01/15] mm: vmstat: move sysctls to its own files
Kaixiong Yu
- [PATCH -next 02/15] mm: filemap: move sysctl to its own file
Kaixiong Yu
- [PATCH -next 03/15] mm: swap: move sysctl to its own file
Kaixiong Yu
- [PATCH -next 04/15] mm: vmscan: move vmscan sysctls to its own file
Kaixiong Yu
- [PATCH -next 05/15] mm: util: move sysctls into it own files
Kaixiong Yu
- [PATCH -next 06/15] mm: mmap: move sysctl into its own file
Kaixiong Yu
- [PATCH -next 07/15] security: min_addr: move sysctl into its own file
Kaixiong Yu
- [PATCH -next 08/15] mm: nommu: move sysctl to its own file
Kaixiong Yu
- [PATCH -next 09/15] fs: fs-writeback: move sysctl to its own file
Kaixiong Yu
- [PATCH -next 10/15] fs: drop_caches: move sysctl to its own file
Kaixiong Yu
- [PATCH -next 11/15] sunrpc: use vfs_pressure_ratio() helper
Kaixiong Yu
- [PATCH -next 12/15] fs: dcache: move the sysctl into its own file
Kaixiong Yu
- [PATCH -next 13/15] x86: vdso: move the sysctl into its own file
Kaixiong Yu
- [PATCH -next 14/15] sh: vdso: move the sysctl into its own file
Kaixiong Yu
- [PATCH -next 15/15] sysctl: remove unneeded include
Kaixiong Yu
- [PATCH] init/main.c: Do jump_label_init before early_security_init
Peter Zijlstra
- [PATCH] init/main.c: Do jump_label_init before early_security_init
Peter Zijlstra
- [PATCH] drivers/perf: arm_spe: Use perf_allow_kernel() for permissions
Peter Zijlstra
- [PATCH] drivers/perf: arm_spe: Use perf_allow_kernel() for permissions
Peter Zijlstra
- [RFC] integrity: wait for completion of i2c initialization using late_initcall_sync()
Mimi Zohar
- [PATCH net-next 00/13] net: header and core spelling corrections
patchwork-bot+netdevbpf at kernel.org
- [PATCH net] sctp: fix association labeling in the duplicate COOKIE-ECHO case
patchwork-bot+netdevbpf at kernel.org
- [GIT PULL] selinux/selinux-pr-20240814
pr-tracker-bot at kernel.org
- [GIT PULL] lsm/lsm-pr-20240830
pr-tracker-bot at kernel.org
- [PATCH] fs, security: Fix file_set_fowner LSM hook inconsistencies
kernel test robot
- [PATCH] fs, security: Fix file_set_fowner LSM hook inconsistencies
kernel test robot
- [PATCH] fs, security: Fix file_set_fowner LSM hook inconsistencies
kernel test robot
- [PATCH] fs, security: Fix file_set_fowner LSM hook inconsistencies
kernel test robot
- [PATCH 02/13] LSM: Use lsmblob in security_audit_rule_match
kernel test robot
- [PATCH 1/2] bcachefs: do not use PF_MEMALLOC_NORECLAIM
kernel test robot
- [PATCH 1/2] bcachefs: do not use PF_MEMALLOC_NORECLAIM
kernel test robot
- [PATCH 07/13] LSM: Use lsmblob in security_current_getsecid
kernel test robot
- [PATCH 1/2] bcachefs: do not use PF_MEMALLOC_NORECLAIM
kernel test robot
- [PATCH 10/13] LSM: Create new security_cred_getlsmblob LSM hook
kernel test robot
- [PATCH v2 10/13] LSM: Create new security_cred_getlsmblob LSM hook
kernel test robot
- [PATCH v2 10/13] LSM: Create new security_cred_getlsmblob LSM hook
kernel test robot
- [PATCH v2 02/13] LSM: Use lsmblob in security_audit_rule_match
kernel test robot
- [syzbot] [tomoyo?] INFO: rcu detected stall in security_file_ioctl (8)
syzbot
- [PATCH -next 07/15] security: min_addr: move sysctl into its own file
yukaixiong
- [PATCH -next 00/15] sysctl: move sysctls from vm_table into its own files
yukaixiong
- [PATCH -next 07/15] security: min_addr: move sysctl into its own file
yukaixiong
Last message date:
Fri Aug 30 22:48:48 UTC 2024
Archived on: Fri Aug 30 22:49:53 UTC 2024
This archive was generated by
Pipermail 0.09 (Mailman edition).