July 2024 Archives by author
Starting: Mon Jul 1 10:16:13 UTC 2024
Ending: Wed Jul 31 23:56:27 UTC 2024
Messages: 505
- [PATCH] apparmor: domain: clean up duplicated parts of handle_onexec()
Leesoo Ahn
- [PATCH] tpm: Check non-nullity of chip->auth
Stefan Berger
- [PATCH v2 3/3] tpm: Address !chip->auth in tpm_buf_append_hmac_session*()
Stefan Berger
- [PATCH v2 3/3] tpm: Address !chip->auth in tpm_buf_append_hmac_session*()
Stefan Berger
- [PATCH v12 02/10] crypto: Add support for ECDSA signature verification
Stefan Berger
- [PATCH] binfmt_elf: Fail execution of shared objects with ELIBEXEC
Eric W. Biederman
- [PATCH v3] proc: add config & param to block forcing mem writes
Ard Biesheuvel
- [PATCH] dm-verity: fix dm_is_verity_target() when dm-verity is builtin
Eric Biggers
- [PATCH] proc: add config to block FOLL_FORCE in mem writes
Eric Biggers
- [PATCH] dm verity: add support for signature verification with platform keyring
Luca Boccassi
- [PATCH v2 2/3] tpm: Address !chip->auth in tpm_buf_append_name()
James Bottomley
- [PATCH v2 2/3] tpm: Address !chip->auth in tpm_buf_append_name()
James Bottomley
- [RFC PATCH v19 0/5] Script execution control (was O_MAYEXEC)
James Bottomley
- [PATCH v3] tpm: Relocate buf->handles to appropriate place
James Bottomley
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
James Bottomley
- [syzbot] [lsm?] general protection fault in hook_inode_free_security
Christian Brauner
- [syzbot] [lsm?] general protection fault in hook_inode_free_security
Christian Brauner
- [syzbot] [lsm?] general protection fault in hook_inode_free_security
Christian Brauner
- [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
Christian Brauner
- [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
Christian Brauner
- [PATCH v4] proc: add config & param to block forcing mem writes
Christian Brauner
- [syzbot] [lsm?] WARNING in current_check_refer_path - bcachefs bug
Dave Chinner
- [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
Dave Chinner
- [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
Dave Chinner
- [PATCH] dm-verity: fix dm_is_verity_target() when dm-verity is builtin
Kees Cook
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
Kees Cook
- [RFC PATCH v19 2/5] security: Add new SHOULD_EXEC_CHECK and SHOULD_EXEC_RESTRICT securebits
Kees Cook
- [RFC PATCH v19 2/5] security: Add new SHOULD_EXEC_CHECK and SHOULD_EXEC_RESTRICT securebits
Kees Cook
- [PATCH v13 3/5] security: Replace indirect LSM hook calls with static calls
Kees Cook
- [syzbot] [lsm?] general protection fault in hook_inode_free_security
Kees Cook
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
Kees Cook
- [RFC PATCH v19 2/5] security: Add new SHOULD_EXEC_CHECK and SHOULD_EXEC_RESTRICT securebits
Kees Cook
- CVE-2024-40938: landlock: Fix d_parent walk
Kees Cook
- CVE-2024-40938: landlock: Fix d_parent walk
Kees Cook
- [PATCH] proc: add config to block FOLL_FORCE in mem writes
Kees Cook
- [PATCH] proc: add config to block FOLL_FORCE in mem writes
Kees Cook
- [PATCH] proc: add config to block FOLL_FORCE in mem writes
Kees Cook
- [RFC PATCH v19 0/5] Script execution control (was O_MAYEXEC)
Jonathan Corbet
- [RFC PATCH v19 2/5] security: Add new SHOULD_EXEC_CHECK and SHOULD_EXEC_RESTRICT securebits
Steve Dower
- [RFC PATCH v19 2/5] security: Add new SHOULD_EXEC_CHECK and SHOULD_EXEC_RESTRICT securebits
Steve Dower
- [RFC PATCH v19 2/5] security: Add new SHOULD_EXEC_CHECK and SHOULD_EXEC_RESTRICT securebits
Steve Dower
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
Steve Dower
- [PATCH 0/3] Address !chip->auth
Michael Ellerman
- [PATCH 0/2] Landlock: Add abstract unix socket connect reastriction
Tahera Fahimi
- [PATCH v1 1/2] Landlock: Add signal control
Tahera Fahimi
- [PATCH v1 2/2] Landlock: Signal scoping tests
Tahera Fahimi
- [PATCH v6] landlock: Add abstract unix socket connect restriction
Tahera Fahimi
- [PATCH v7 0/4] Landlock: Abstract Unix Socket Scoping Support
Tahera Fahimi
- [PATCH v7 1/4] Landlock: Add abstract unix socket connect restriction
Tahera Fahimi
- [PATCH v7 2/4] selftests/landlock: Abstract unix socket restriction tests
Tahera Fahimi
- [PATCH v7 3/4] samples/landlock: Support abstract unix socket restriction
Tahera Fahimi
- [PATCH v7 4/4] documentation/landlock: Adding scoping mechanism documentation
Tahera Fahimi
- [PATCH v7 1/4] Landlock: Add abstract unix socket connect restriction
Tahera Fahimi
- [PATCH v7 1/4] Landlock: Add abstract unix socket connect restriction
Tahera Fahimi
- [GIT PULL] sysctl constification changes for v6.11-rc1
Joel Granados
- [PATCH 1/2] KEYS: trusted: fix DCP blob payload length assignment
David Gstir
- [PATCH 2/2] KEYS: trusted: dcp: fix leak of blob encryption key
David Gstir
- [PATCH 1/2] KEYS: trusted: fix DCP blob payload length assignment
David Gstir
- [PATCH v2 1/2] KEYS: trusted: fix DCP blob payload length assignment
David Gstir
- [PATCH v2 2/2] KEYS: trusted: dcp: fix leak of blob encryption key
David Gstir
- [PATCH] cred: separate the refcount from frequently read fields
Mateusz Guzik
- [PATCH v2 1/4] net: Split a __sys_bind helper for io_uring
Tetsuo Handa
- [PATCH v14 3/3] security: Replace indirect LSM hook calls with static calls
Tetsuo Handa
- [PATCH] security/tomoyo: Prevent message flooding if no Tomoyo loader is present
Tetsuo Handa
- [PATCH RFC] security: tomoyo: Add default builtin-policy.h for default policy
Tetsuo Handa
- [PATCH v1 1/2] Landlock: Add signal control
Jann Horn
- [PATCH v1] keys: Restrict KEYCTL_SESSION_TO_PARENT according to ptrace_may_access()
Jann Horn
- [PATCH v1] keys: Restrict KEYCTL_SESSION_TO_PARENT according to ptrace_may_access()
Jann Horn
- [PATCH v1] keys: Restrict KEYCTL_SESSION_TO_PARENT according to ptrace_may_access()
Jann Horn
- [PATCH v1] keys: Restrict KEYCTL_SESSION_TO_PARENT according to ptrace_may_access()
Jann Horn
- [PATCH v1] keys: Restrict KEYCTL_SESSION_TO_PARENT according to ptrace_may_access()
Jann Horn
- [PATCH] keys: Add tracepoints for the keyrings facility
David Howells
- [PATCH v4 16/21] mm/mmap: Use vms accounted pages in mmap_region()
Liam R. Howlett
- [PATCH v5 16/21] mm/mmap: Use vms accounted pages in mmap_region()
Liam R. Howlett
- [RFC PATCH v1 0/9] Support TCP listen access-control
Mikhail Ivanov
- [RFC PATCH v1 1/9] landlock: Refactor current_check_access_socket() access right check
Mikhail Ivanov
- [RFC PATCH v1 2/9] landlock: Support TCP listen access-control
Mikhail Ivanov
- [RFC PATCH v1 3/9] selftests/landlock: Support LANDLOCK_ACCESS_NET_LISTEN_TCP
Mikhail Ivanov
- [RFC PATCH v1 4/9] selftests/landlock: Test listening restriction
Mikhail Ivanov
- [RFC PATCH v1 5/9] selftests/landlock: Test listen on connected socket
Mikhail Ivanov
- [RFC PATCH v1 6/9] selftests/landlock: Test listening without explicit bind restriction
Mikhail Ivanov
- [RFC PATCH v1 7/9] selftests/landlock: Test listen on ULP socket without clone method
Mikhail Ivanov
- [RFC PATCH v1 8/9] selftests/landlock: Test changing socket backlog with listen(2)
Mikhail Ivanov
- [RFC PATCH v1 9/9] samples/landlock: Support LANDLOCK_ACCESS_NET_LISTEN
Mikhail Ivanov
- [RFC PATCH v1 2/9] landlock: Support TCP listen access-control
Mikhail Ivanov
- [PATCH 1/6] LSM: Infrastructure management of the sock security
John Johansen
- [PATCH 2/6] LSM: Infrastructure management of the key security blob
John Johansen
- [PATCH 3/6] LSM: Add helper for blob allocations
John Johansen
- [PATCH 4/6] LSM: Infrastructure management of the dev_tun blob
John Johansen
- [PATCH 5/6] LSM: Infrastructure management of the infiniband blob
John Johansen
- [PATCH 6/6] LSM: Infrastructure management of the perf_event security blob
John Johansen
- [GIT PULL] AppArmor updates for 6.11-rc1
John Johansen
- [PATCH v2 1/4] net: Split a __sys_bind helper for io_uring
Matus Jokay
- [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
Matus Jokay
- [PATCH v2 1/4] net: Split a __sys_bind helper for io_uring
Matus Jokay
- [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
Matus Jokay
- [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
Matus Jokay
- [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
Matus Jokay
- CVE-2024-40938: landlock: Fix d_parent walk
Greg Kroah-Hartman
- CVE-2024-40938: landlock: Fix d_parent walk
Greg Kroah-Hartman
- CVE-2024-40938: landlock: Fix d_parent walk
Greg Kroah-Hartman
- [PATCH bpf-next v4 00/20] Add return value range check for BPF LSM
Xu Kuohai
- [PATCH -next v1 0/9] Add BPF LSM return value range check, BPF part
Xu Kuohai
- [PATCH bpf-next v1 1/9] bpf, lsm: Add disabled BPF LSM hook list
Xu Kuohai
- [PATCH bpf-next v1 2/9] bpf, lsm: Add check for BPF LSM return value
Xu Kuohai
- [PATCH bpf-next v1 3/9] bpf: Prevent tail call between progs attached to different hooks
Xu Kuohai
- [PATCH bpf-next v1 4/9] bpf: Fix compare error in function retval_range_within
Xu Kuohai
- [PATCH bpf-next v1 5/9] bpf, verifier: improve signed ranges inference for BPF_AND
Xu Kuohai
- [PATCH bpf-next v1 6/9] selftests/bpf: Avoid load failure for token_lsm.c
Xu Kuohai
- [PATCH bpf-next v1 7/9] selftests/bpf: Add return value checks for failed tests
Xu Kuohai
- [PATCH bpf-next v1 8/9] selftests/bpf: Add test for lsm tail call
Xu Kuohai
- [PATCH bpf-next v1 9/9] selftests/bpf: Add verifier tests for bpf lsm
Xu Kuohai
- [PATCH bpf-next v1 5/9] bpf, verifier: improve signed ranges inference for BPF_AND
Xu Kuohai
- [PATCH bpf-next v2 0/9] Add BPF LSM return value range check, BPF part
Xu Kuohai
- [PATCH bpf-next v2 1/9] bpf, lsm: Add disabled BPF LSM hook list
Xu Kuohai
- [PATCH bpf-next v2 2/9] bpf, lsm: Add check for BPF LSM return value
Xu Kuohai
- [PATCH bpf-next v2 3/9] bpf: Prevent tail call between progs attached to different hooks
Xu Kuohai
- [PATCH bpf-next v2 4/9] bpf: Fix compare error in function retval_range_within
Xu Kuohai
- [PATCH bpf-next v2 5/9] bpf, verifier: improve signed ranges inference for BPF_AND
Xu Kuohai
- [PATCH bpf-next v2 6/9] selftests/bpf: Avoid load failure for token_lsm.c
Xu Kuohai
- [PATCH bpf-next v2 7/9] selftests/bpf: Add return value checks for failed tests
Xu Kuohai
- [PATCH bpf-next v2 8/9] selftests/bpf: Add test for lsm tail call
Xu Kuohai
- [PATCH bpf-next v2 9/9] selftests/bpf: Add verifier tests for bpf lsm
Xu Kuohai
- [PATCH v4 2/20] lsm: Refactor return value of LSM hook inode_need_killpriv
Xu Kuohai
- [PATCH v4 3/20] lsm: Refactor return value of LSM hook inode_getsecurity
Xu Kuohai
- [PATCH v4 4/20] lsm: Refactor return value of LSM hook inode_listsecurity
Xu Kuohai
- [PATCH v4 5/20] lsm: Refactor return value of LSM hook inode_copy_up_xattr
Xu Kuohai
- [PATCH v4 6/20] lsm: Refactor return value of LSM hook getselfattr
Xu Kuohai
- [PATCH v4 8/20] lsm: Refactor return value of LSM hook getprocattr
Xu Kuohai
- [PATCH v4 9/20] lsm: Refactor return value of LSM hook key_getsecurity
Xu Kuohai
- [PATCH v4 10/20] lsm: Refactor return value of LSM hook audit_rule_match
Xu Kuohai
- [PATCH v4 7/20] lsm: Refactor return value of LSM hook setprocattr
Xu Kuohai
- [PATCH v4 9/20] lsm: Refactor return value of LSM hook key_getsecurity
Xu Kuohai
- [PATCH v1 0/2] Refactor return value of two lsm hooks
Xu Kuohai
- [PATCH v1 1/2] lsm: Refactor return value of LSM hook vm_enough_memory
Xu Kuohai
- [PATCH v1 2/2] lsm: Refactor return value of LSM hook inode_copy_up_xattr
Xu Kuohai
- [PATCH AUTOSEL 6.10 1/2] apparmor: fix possible NULL pointer dereference
Sasha Levin
- [PATCH AUTOSEL 6.6 1/2] apparmor: fix possible NULL pointer dereference
Sasha Levin
- [PATCH AUTOSEL 6.1 1/2] apparmor: fix possible NULL pointer dereference
Sasha Levin
- [PATCH AUTOSEL 5.15 1/2] apparmor: fix possible NULL pointer dereference
Sasha Levin
- [PATCH AUTOSEL 5.10 1/2] apparmor: fix possible NULL pointer dereference
Sasha Levin
- [PATCH AUTOSEL 5.4 1/2] apparmor: fix possible NULL pointer dereference
Sasha Levin
- [PATCH AUTOSEL 4.19 1/2] apparmor: fix possible NULL pointer dereference
Sasha Levin
- [RFC PATCH v19 0/5] Script execution control (was O_MAYEXEC)
Boris Lukashev
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
Andy Lutomirski
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
Andy Lutomirski
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
Andy Lutomirski
- [RFC PATCH v19 2/5] security: Add new SHOULD_EXEC_CHECK and SHOULD_EXEC_RESTRICT securebits
Andy Lutomirski
- [PATCH v3] tpm: Relocate buf->handles to appropriate place
Jonathan McDowell
- [RFC] integrity: wait for completion of i2c initialization using late_initcall_sync()
Paul Menzel
- [PATCH 1/2] landlock: Add hook on socket_listen()
Ivanov Mikhail
- [PATCH 1/2] landlock: Add hook on socket_listen()
Ivanov Mikhail
- [PATCH v12 5/5] bpf: Only enable BPF LSM hooks when an LSM program is attached
Paul Moore
- [PATCH v13 3/5] security: Replace indirect LSM hook calls with static calls
Paul Moore
- [PATCH v13 4/5] security: Update non standard hooks to use static calls
Paul Moore
- [PATCH v13 5/5] bpf: Only enable BPF LSM hooks when an LSM program is attached
Paul Moore
- [PATCH v13 2/5] security: Count the LSMs enabled at compile time
Paul Moore
- [PATCH v13 3/5] security: Replace indirect LSM hook calls with static calls
Paul Moore
- [PATCH] selinux, smack: remove the capability checks in the removexattr hooks
Paul Moore
- [PATCH] selinux,smack: remove the capability checks in the removexattr hooks
Paul Moore
- [PATCH v13 3/5] security: Replace indirect LSM hook calls with static calls
Paul Moore
- [PATCH] selinux,smack: remove the capability checks in the removexattr hooks
Paul Moore
- [PATCH] selinux,smack: remove the capability checks in the removexattr hooks
Paul Moore
- [PATCH v13 3/5] security: Replace indirect LSM hook calls with static calls
Paul Moore
- [RFC PATCH] lsm: fixup the inode xattr capability handling
Paul Moore
- [PATCH v13 3/5] security: Replace indirect LSM hook calls with static calls
Paul Moore
- [PATCH v13 3/5] security: Replace indirect LSM hook calls with static calls
Paul Moore
- [PATCH v13 3/5] security: Replace indirect LSM hook calls with static calls
Paul Moore
- [PATCH v13 3/5] security: Replace indirect LSM hook calls with static calls
Paul Moore
- [syzbot] [lsm?] general protection fault in hook_inode_free_security
Paul Moore
- [PATCH v13 4/5] security: Update non standard hooks to use static calls
Paul Moore
- [PATCH v13 4/5] security: Update non standard hooks to use static calls
Paul Moore
- [PATCH 1/6] LSM: Infrastructure management of the sock security
Paul Moore
- [PATCH 1/6] LSM: Infrastructure management of the sock security
Paul Moore
- [PATCH 2/6] LSM: Infrastructure management of the key security blob
Paul Moore
- [PATCH 3/6] LSM: Add helper for blob allocations
Paul Moore
- [PATCH 4/6] LSM: Infrastructure management of the dev_tun blob
Paul Moore
- [PATCH 5/6] LSM: Infrastructure management of the infiniband blob
Paul Moore
- [PATCH 6/6] LSM: Infrastructure management of the perf_event security blob
Paul Moore
- [PATCH 2/6] LSM: Infrastructure management of the key security blob
Paul Moore
- [PATCH 1/6] LSM: Infrastructure management of the sock security
Paul Moore
- [syzbot] [lsm?] general protection fault in hook_inode_free_security
Paul Moore
- [PATCH 1/6] LSM: Infrastructure management of the sock security
Paul Moore
- [PATCH 3/6] LSM: Add helper for blob allocations
Paul Moore
- [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
Paul Moore
- [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
Paul Moore
- [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
Paul Moore
- [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
Paul Moore
- [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
Paul Moore
- [GIT PULL] selinux/selinux-pr-20240715
Paul Moore
- [GIT PULL] lsm/lsm-pr-20240715
Paul Moore
- [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
Paul Moore
- [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
Paul Moore
- [PATCH v4 1/20] lsm: Refactor return value of LSM hook vm_enough_memory
Paul Moore
- [PATCH v4 2/20] lsm: Refactor return value of LSM hook inode_need_killpriv
Paul Moore
- [PATCH v4 3/20] lsm: Refactor return value of LSM hook inode_getsecurity
Paul Moore
- [PATCH v4 4/20] lsm: Refactor return value of LSM hook inode_listsecurity
Paul Moore
- [PATCH v4 5/20] lsm: Refactor return value of LSM hook inode_copy_up_xattr
Paul Moore
- [PATCH v4 6/20] lsm: Refactor return value of LSM hook getselfattr
Paul Moore
- [PATCH v4 7/20] lsm: Refactor return value of LSM hook setprocattr
Paul Moore
- [PATCH v4 8/20] lsm: Refactor return value of LSM hook getprocattr
Paul Moore
- [PATCH v4 9/20] lsm: Refactor return value of LSM hook key_getsecurity
Paul Moore
- [PATCH v4 10/20] lsm: Refactor return value of LSM hook audit_rule_match
Paul Moore
- [PATCH bpf-next v4 00/20] Add return value range check for BPF LSM
Paul Moore
- [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
Paul Moore
- [PATCH v4 9/20] lsm: Refactor return value of LSM hook key_getsecurity
Paul Moore
- [PATCH v4 9/20] lsm: Refactor return value of LSM hook key_getsecurity
Paul Moore
- [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
Paul Moore
- [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
Paul Moore
- [PATCH v5 16/21] mm/mmap: Use vms accounted pages in mmap_region()
Paul Moore
- [PATCH v1 0/2] Refactor return value of two lsm hooks
Paul Moore
- [PATCH v2 0/2] cipso: make cipso_v4_skbuff_delattr() fully remove the CIPSO options
Paul Moore
- [PATCH v14 3/3] security: Replace indirect LSM hook calls with static calls
Paul Moore
- [PATCH v1 0/2] Refactor return value of two lsm hooks
Paul Moore
- [PATCH v2 0/6] LSM: Infrastructure blob allocation
Paul Moore
- [PATCH] lsm: cleanup lsm_hooks.h
Paul Moore
- [PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
Paul Moore
- static_key_enable_cpuslocked(): static key 'security_hook_active_locked_down_0+0x0/0x10' used before call to jump_label_init()
Paul Moore
- static_key_enable_cpuslocked(): static key 'security_hook_active_locked_down_0+0x0/0x10' used before call to jump_label_init()
Paul Moore
- [PATCH v1] keys: Restrict KEYCTL_SESSION_TO_PARENT according to ptrace_may_access()
Paul Moore
- [PATCH v1] keys: Restrict KEYCTL_SESSION_TO_PARENT according to ptrace_may_access()
Paul Moore
- static_key_enable_cpuslocked(): static key 'security_hook_active_locked_down_0+0x0/0x10' used before call to jump_label_init()
Paul Moore
- [PATCH resend v4 00/11] Improve the copy of task comm
Andrew Morton
- [PATCH v2 0/2] cipso: make cipso_v4_skbuff_delattr() fully remove the CIPSO options
Ondrej Mosnacek
- [RFC] integrity: wait for completion of i2c initialization using late_initcall_sync()
Romain Naour
- [RFC] integrity: wait for completion of i2c initialization using late_initcall_sync()
Romain Naour
- [PATCH resend v4 00/11] Improve the copy of task comm
Jani Nikula
- [PATCH 1/2] landlock: Add hook on socket_listen()
Günther Noack
- [PATCH 1/2] landlock: Add hook on socket_listen()
Günther Noack
- [PATCH v1 2/2] Landlock: Signal scoping tests
Günther Noack
- [PATCH] landlock: Clarify documentation for struct landlock_ruleset_attr
Günther Noack
- [PATCH] landlock: Various documentation improvements
Günther Noack
- [RFC PATCH v1 0/3] Use socket's Landlock domain
Günther Noack
- [PATCH v7 1/4] Landlock: Add abstract unix socket connect restriction
Günther Noack
- [RFC PATCH v1 2/9] landlock: Support TCP listen access-control
Günther Noack
- [syzbot] [lsm?] WARNING in current_check_refer_path - bcachefs bug
Kent Overstreet
- static_key_enable_cpuslocked(): static key 'security_hook_active_locked_down_0+0x0/0x10' used before call to jump_label_init()
Borislav Petkov
- static_key_enable_cpuslocked(): static key 'security_hook_active_locked_down_0+0x0/0x10' used before call to jump_label_init()
Borislav Petkov
- [PATCH] proc: add config to block FOLL_FORCE in mem writes
Adrian Ratiu
- Re: [PATCH] proc: add config to block FOLL_FORCE in mem writes
Adrian Ratiu
- [PATCH] proc: add config & param to block forcing mem writes
Adrian Ratiu
- Re: [PATCH] proc: add config & param to block forcing mem writes
Adrian Ratiu
- [PATCH v3] proc: add config & param to block forcing mem writes
Adrian Ratiu
- Re: [PATCH v3] proc: add config & param to block forcing mem writes
Adrian Ratiu
- [PATCH v4] proc: add config & param to block forcing mem writes
Adrian Ratiu
- Re: [PATCH v4] proc: add config & param to block forcing mem writes
Adrian Ratiu
- Re: [PATCH v4] proc: add config & param to block forcing mem writes
Adrian Ratiu
- [PATCH v2] tpm: Add new device/vendor ID 0x50666666
Jett Rink
- [PATCH testsuite] tests/task_setscheduler: add cgroup v2 case for moving proc to root cgroup
Gong Ruiqi
- [PATCH v3 1/2] KEYS: trusted: add missing MODULE_DESCRIPTION()
Jarkko Sakkinen
- [PATCH] tpm: Check non-nullity of chip->auth
Jarkko Sakkinen
- [PATCH] tpm: Limit TCG_TPM2_HMAC to known good drivers
Jarkko Sakkinen
- [PATCH] tpm: Limit TCG_TPM2_HMAC to known good drivers
Jarkko Sakkinen
- [PATCH 0/3] Address !chip->auth
Jarkko Sakkinen
- [PATCH 1/3] tpm: Address !chip->auth in tpm2_*_auth_session()
Jarkko Sakkinen
- [PATCH 2/3] tpm: Address !chip->auth in tpm_buf_append_name()
Jarkko Sakkinen
- [PATCH 3/3] tpm: Address !chip->auth in tpm_buf_append_hmac_session*()
Jarkko Sakkinen
- [PATCH 0/3] Address !chip->auth
Jarkko Sakkinen
- [PATCH] tpm: Limit TCG_TPM2_HMAC to known good drivers
Jarkko Sakkinen
- [PATCH v2 0/3] Address !chip->auth
Jarkko Sakkinen
- [PATCH v2 1/3] tpm: Address !chip->auth in tpm2_*_auth_session()
Jarkko Sakkinen
- [PATCH v2 2/3] tpm: Address !chip->auth in tpm_buf_append_name()
Jarkko Sakkinen
- [PATCH v2 3/3] tpm: Address !chip->auth in tpm_buf_append_hmac_session*()
Jarkko Sakkinen
- [PATCH v2 3/3] tpm: Address !chip->auth in tpm_buf_append_hmac_session*()
Jarkko Sakkinen
- [PATCH v2 3/3] tpm: Address !chip->auth in tpm_buf_append_hmac_session*()
Jarkko Sakkinen
- [PATCH v2 2/3] tpm: Address !chip->auth in tpm_buf_append_name()
Jarkko Sakkinen
- [PATCH v3 0/3] Address !chip->auth
Jarkko Sakkinen
- [PATCH v3 1/3] tpm: Address !chip->auth in tpm2_*_auth_session()
Jarkko Sakkinen
- [PATCH v3 2/3] tpm: Address !chip->auth in tpm_buf_append_name()
Jarkko Sakkinen
- [PATCH v3 3/3] tpm: Address !chip->auth in tpm_buf_append_hmac_session*()
Jarkko Sakkinen
- [PATCH 0/3] Address !chip->auth
Jarkko Sakkinen
- [PATCH v2 2/3] tpm: Address !chip->auth in tpm_buf_append_name()
Jarkko Sakkinen
- [PATCH v4 0/3] Address !chip->auth
Jarkko Sakkinen
- [PATCH v4 1/3] tpm: Address !chip->auth in tpm2_*_auth_session()
Jarkko Sakkinen
- [PATCH v4 2/3] tpm: Address !chip->auth in tpm_buf_append_name()
Jarkko Sakkinen
- [PATCH v4 3/3] tpm: Address !chip->auth in tpm_buf_append_hmac_session*()
Jarkko Sakkinen
- [PATCH v2 3/3] tpm: Address !chip->auth in tpm_buf_append_hmac_session*()
Jarkko Sakkinen
- [PATCH v2 3/3] tpm: Address !chip->auth in tpm_buf_append_hmac_session*()
Jarkko Sakkinen
- [RFC PATCH v19 2/5] security: Add new SHOULD_EXEC_CHECK and SHOULD_EXEC_RESTRICT securebits
Jarkko Sakkinen
- [RFC PATCH v19 2/5] security: Add new SHOULD_EXEC_CHECK and SHOULD_EXEC_RESTRICT securebits
Jarkko Sakkinen
- [PATCH] tpm: validate object type in tpm2_handle_mso()
Jarkko Sakkinen
- [PATCH] tpm: validate object type in tpm2_handle_mso()
Jarkko Sakkinen
- [PATCH] tpm: Fix alignment of buf->handles
Jarkko Sakkinen
- [PATCH v2] tpm: Relocate buf->handles to appropriate place
Jarkko Sakkinen
- [PATCH v3] tpm: Relocate buf->handles to appropriate place
Jarkko Sakkinen
- [PATCH v3] tpm: Relocate buf->handles to appropriate place
Jarkko Sakkinen
- [PATCH v3] tpm: Relocate buf->handles to appropriate place
Jarkko Sakkinen
- [PATCH v3] tpm: Relocate buf->handles to appropriate place
Jarkko Sakkinen
- [PATCH v3] tpm: Relocate buf->handles to appropriate place
Jarkko Sakkinen
- [PATCH 1/2] KEYS: trusted: fix DCP blob payload length assignment
Jarkko Sakkinen
- [PATCH 2/2] KEYS: trusted: dcp: fix leak of blob encryption key
Jarkko Sakkinen
- [PATCH v3] tpm: Relocate buf->handles to appropriate place
Jarkko Sakkinen
- [PATCH 1/2] KEYS: trusted: fix DCP blob payload length assignment
Jarkko Sakkinen
- [PATCH 1/2] KEYS: trusted: fix DCP blob payload length assignment
Jarkko Sakkinen
- [PATCH v2 1/2] KEYS: trusted: fix DCP blob payload length assignment
Jarkko Sakkinen
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
Jarkko Sakkinen
- [PATCH] keys: Add tracepoints for the keyrings facility
Jarkko Sakkinen
- [PATCH v1] keys: Restrict KEYCTL_SESSION_TO_PARENT according to ptrace_may_access()
Jarkko Sakkinen
- [RFC PATCH v19 0/5] Script execution control (was O_MAYEXEC)
Mickaël Salaün
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
Mickaël Salaün
- [RFC PATCH v19 2/5] security: Add new SHOULD_EXEC_CHECK and SHOULD_EXEC_RESTRICT securebits
Mickaël Salaün
- [RFC PATCH v19 3/5] selftests/exec: Add tests for AT_CHECK and related securebits
Mickaël Salaün
- [RFC PATCH v19 4/5] selftests/landlock: Add tests for execveat + AT_CHECK
Mickaël Salaün
- [RFC PATCH v19 5/5] samples/should-exec: Add set-should-exec
Mickaël Salaün
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
Mickaël Salaün
- [RFC PATCH v19 2/5] security: Add new SHOULD_EXEC_CHECK and SHOULD_EXEC_RESTRICT securebits
Mickaël Salaün
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
Mickaël Salaün
- [RFC PATCH v19 2/5] security: Add new SHOULD_EXEC_CHECK and SHOULD_EXEC_RESTRICT securebits
Mickaël Salaün
- [RFC PATCH v19 2/5] security: Add new SHOULD_EXEC_CHECK and SHOULD_EXEC_RESTRICT securebits
Mickaël Salaün
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
Mickaël Salaün
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
Mickaël Salaün
- [syzbot] [lsm?] general protection fault in hook_inode_free_security
Mickaël Salaün
- [syzbot] [lsm?] general protection fault in hook_inode_free_security
Mickaël Salaün
- [PATCH v6] landlock: Add abstract unix socket connect restriction
Mickaël Salaün
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
Mickaël Salaün
- [PATCH 0/2] Landlock: Add abstract unix socket connect reastriction
Mickaël Salaün
- [RFC PATCH v19 2/5] security: Add new SHOULD_EXEC_CHECK and SHOULD_EXEC_RESTRICT securebits
Mickaël Salaün
- [PATCH v1] landlock: Abstract unix socket restriction tests
Mickaël Salaün
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
Mickaël Salaün
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
Mickaël Salaün
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
Mickaël Salaün
- [RFC PATCH v19 2/5] security: Add new SHOULD_EXEC_CHECK and SHOULD_EXEC_RESTRICT securebits
Mickaël Salaün
- [RFC PATCH v19 5/5] samples/should-exec: Add set-should-exec
Mickaël Salaün
- [RFC PATCH v19 0/5] Script execution control (was O_MAYEXEC)
Mickaël Salaün
- [RFC PATCH v19 2/5] security: Add new SHOULD_EXEC_CHECK and SHOULD_EXEC_RESTRICT securebits
Mickaël Salaün
- [PATCH] binfmt_elf: Fail execution of shared objects with ELIBEXEC (was: Re: [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2))
Mickaël Salaün
- [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
Mickaël Salaün
- [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
Mickaël Salaün
- [syzbot] [lsm?] general protection fault in hook_inode_free_security
Mickaël Salaün
- [syzbot] [lsm?] general protection fault in hook_inode_free_security
Mickaël Salaün
- [PATCH] landlock: Clarify documentation for struct landlock_ruleset_attr
Mickaël Salaün
- [syzbot] [lsm?] WARNING in current_check_refer_path - bcachefs bug
Mickaël Salaün
- CVE-2024-40938: landlock: Fix d_parent walk
Mickaël Salaün
- CVE-2024-40938: landlock: Fix d_parent walk
Mickaël Salaün
- [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
Mickaël Salaün
- [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
Mickaël Salaün
- CVE-2024-40938: landlock: Fix d_parent walk
Mickaël Salaün
- [RFC PATCH v19 0/5] Script execution control (was O_MAYEXEC)
Mickaël Salaün
- [PATCH v2] landlock: Clarify documentation for struct landlock_ruleset_attr
Mickaël Salaün
- [PATCH] landlock: Various documentation improvements
Mickaël Salaün
- [RFC PATCH v19 2/5] security: Add new SHOULD_EXEC_CHECK and SHOULD_EXEC_RESTRICT securebits
Mickaël Salaün
- Landlock news #4
Mickaël Salaün
- [RFC PATCH v19 0/5] Script execution control (was O_MAYEXEC)
Mickaël Salaün
- [RFC PATCH v19 0/5] Script execution control (was O_MAYEXEC)
Mickaël Salaün
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
Mickaël Salaün
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
Mickaël Salaün
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
Mickaël Salaün
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
Mickaël Salaün
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
Mickaël Salaün
- [RFC PATCH v19 0/5] Script execution control (was O_MAYEXEC)
Mickaël Salaün
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
Mickaël Salaün
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
Mickaël Salaün
- [RFC PATCH v19 2/5] security: Add new SHOULD_EXEC_CHECK and SHOULD_EXEC_RESTRICT securebits
Mickaël Salaün
- [RFC PATCH v19 0/5] Script execution control (was O_MAYEXEC)
Mickaël Salaün
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
Mickaël Salaün
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
Mickaël Salaün
- [RFC PATCH v1 0/3] Use socket's Landlock domain
Mickaël Salaün
- [RFC PATCH v1 1/3] landlock: Use socket's domain instead of current's domain
Mickaël Salaün
- [RFC PATCH v1 2/3] selftests/landlock: Add test for socket's domain
Mickaël Salaün
- [RFC PATCH v1 3/3] landlock: Document network restrictions tied to sockets
Mickaël Salaün
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
Mickaël Salaün
- [PATCH v7 1/4] Landlock: Add abstract unix socket connect restriction
Mickaël Salaün
- [GIT PULL] Landlock fix for v6.11
Mickaël Salaün
- [RFC PATCH v19 2/5] security: Add new SHOULD_EXEC_CHECK and SHOULD_EXEC_RESTRICT securebits
Mickaël Salaün
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
Mickaël Salaün
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
Mickaël Salaün
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
Mickaël Salaün
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
Mickaël Salaün
- [RFC PATCH v1 0/3] Use socket's Landlock domain
Mickaël Salaün
- [PATCH v7 1/4] Landlock: Add abstract unix socket connect restriction
Mickaël Salaün
- [PATCH v7 3/4] samples/landlock: Support abstract unix socket restriction
Mickaël Salaün
- [PATCH v7 4/4] documentation/landlock: Adding scoping mechanism documentation
Mickaël Salaün
- [PATCH v7 2/4] selftests/landlock: Abstract unix socket restriction tests
Mickaël Salaün
- [PATCH v7 4/4] documentation/landlock: Adding scoping mechanism documentation
Mickaël Salaün
- [PATCH v7 1/4] Landlock: Add abstract unix socket connect restriction
Mickaël Salaün
- [PATCH v1] keys: Restrict KEYCTL_SESSION_TO_PARENT according to ptrace_may_access()
Mickaël Salaün
- [PATCH v1] keys: Restrict KEYCTL_SESSION_TO_PARENT according to ptrace_may_access()
Mickaël Salaün
- [PATCH v1] keys: Restrict KEYCTL_SESSION_TO_PARENT according to ptrace_may_access()
Mickaël Salaün
- [PATCH v1] keys: Restrict KEYCTL_SESSION_TO_PARENT according to ptrace_may_access()
Mickaël Salaün
- [PATCH v7 1/4] Landlock: Add abstract unix socket connect restriction
Mickaël Salaün
- [RFC PATCH v1 2/9] landlock: Support TCP listen access-control
Mickaël Salaün
- [RFC PATCH v19 0/5] Script execution control (was O_MAYEXEC)
Roberto Sassu
- [RFC PATCH v19 2/5] security: Add new SHOULD_EXEC_CHECK and SHOULD_EXEC_RESTRICT securebits
Roberto Sassu
- [PATCH] selinux,smack: remove the capability checks in the removexattr hooks
Casey Schaufler
- [PATCH] selinux,smack: remove the capability checks in the removexattr hooks
Casey Schaufler
- [PATCH v13 3/5] security: Replace indirect LSM hook calls with static calls
Casey Schaufler
- [PATCH 0/6] LSM: Infrastructure blob allocation
Casey Schaufler
- [PATCH 1/6] LSM: Infrastructure management of the sock security
Casey Schaufler
- [PATCH 2/6] LSM: Infrastructure management of the key security blob
Casey Schaufler
- [PATCH 3/6] LSM: Add helper for blob allocations
Casey Schaufler
- [PATCH 4/6] LSM: Infrastructure management of the dev_tun blob
Casey Schaufler
- [PATCH 5/6] LSM: Infrastructure management of the infiniband blob
Casey Schaufler
- [PATCH 6/6] LSM: Infrastructure management of the perf_event security blob
Casey Schaufler
- [PATCH v13 4/5] security: Update non standard hooks to use static calls
Casey Schaufler
- [PATCH 1/6] LSM: Infrastructure management of the sock security
Casey Schaufler
- [PATCH 3/6] LSM: Add helper for blob allocations
Casey Schaufler
- [PATCH 4/6] LSM: Infrastructure management of the dev_tun blob
Casey Schaufler
- [PATCH 1/6] LSM: Infrastructure management of the sock security
Casey Schaufler
- [RFC PATCH] lsm: add the inode_free_security_rcu() LSM implementation hook
Casey Schaufler
- [GIT PULL] Smack patches for 6.11
Casey Schaufler
- [PATCH v1 0/2] Refactor return value of two lsm hooks
Casey Schaufler
- [PATCH] lsm: cleanup lsm_hooks.h
Casey Schaufler
- [PATCH] security/tomoyo: Prevent message flooding if no Tomoyo loader is present
Yafang Shao
- [PATCH] security/tomoyo: Prevent message flooding if no Tomoyo loader is present
Yafang Shao
- [PATCH resend v4 00/11] Improve the copy of task comm
Yafang Shao
- [PATCH v4 01/11] fs/exec: Drop task_lock() inside __get_task_comm()
Yafang Shao
- [PATCH v4 02/11] auditsc: Replace memcpy() with __get_task_comm()
Yafang Shao
- [PATCH v4 03/11] security: Replace memcpy() with __get_task_comm()
Yafang Shao
- [PATCH v4 04/11] bpftool: Ensure task comm is always NUL-terminated
Yafang Shao
- [PATCH v4 05/11] mm/util: Fix possible race condition in kstrdup()
Yafang Shao
- [PATCH v4 06/11] mm/util: Deduplicate code in {kstrdup, kstrndup, kmemdup_nul}
Yafang Shao
- [PATCH v4 07/11] mm/kmemleak: Replace strncpy() with __get_task_comm()
Yafang Shao
- [PATCH v4 08/11] tsacct: Replace strncpy() with __get_task_comm()
Yafang Shao
- [PATCH v4 09/11] tracing: Replace strncpy() with __get_task_comm()
Yafang Shao
- [PATCH v4 10/11] net: Replace strcpy() with __get_task_comm()
Yafang Shao
- [PATCH v4 11/11] drm: Replace strcpy() with __get_task_comm()
Yafang Shao
- [PATCH resend v4 00/11] Improve the copy of task comm
Yafang Shao
- [PATCH resend v4 00/11] Improve the copy of task comm
Yafang Shao
- [PATCH v13 2/5] security: Count the LSMs enabled at compile time
KP Singh
- [PATCH v13 3/5] security: Replace indirect LSM hook calls with static calls
KP Singh
- [PATCH v13 5/5] bpf: Only enable BPF LSM hooks when an LSM program is attached
KP Singh
- [PATCH v13 3/5] security: Replace indirect LSM hook calls with static calls
KP Singh
- [PATCH v13 3/5] security: Replace indirect LSM hook calls with static calls
KP Singh
- [PATCH v13 3/5] security: Replace indirect LSM hook calls with static calls
KP Singh
- [PATCH v13 3/5] security: Replace indirect LSM hook calls with static calls
KP Singh
- [PATCH v13 3/5] security: Replace indirect LSM hook calls with static calls
KP Singh
- [RFC PATCH] lsm: fixup the inode xattr capability handling
KP Singh
- [PATCH v13 3/5] security: Replace indirect LSM hook calls with static calls
KP Singh
- [PATCH v13 3/5] security: Replace indirect LSM hook calls with static calls
KP Singh
- [PATCH v13 4/5] security: Update non standard hooks to use static calls
KP Singh
- [PATCH v14 0/3] Reduce overhead of LSMs with static calls
KP Singh
- [PATCH v14 1/3] kernel: Add helper macros for loop unrolling
KP Singh
- [PATCH v14 2/3] security: Count the LSMs enabled at compile time
KP Singh
- [PATCH v14 3/3] security: Replace indirect LSM hook calls with static calls
KP Singh
- static_key_enable_cpuslocked(): static key 'security_hook_active_locked_down_0+0x0/0x10' used before call to jump_label_init()
KP Singh
- [PATCH] init/main.c: Do jump_label_init before early_security_init
KP Singh
- static_key_enable_cpuslocked(): static key 'security_hook_active_locked_down_0+0x0/0x10' used before call to jump_label_init()
KP Singh
- [PATCH RFC] security: tomoyo: Add default builtin-policy.h for default policy
Marcos Paulo de Souza
- [PATCH bpf-next v2 5/9] bpf, verifier: improve signed ranges inference for BPF_AND
Alexei Starovoitov
- [PATCH bpf-next v2 5/9] bpf, verifier: improve signed ranges inference for BPF_AND
Alexei Starovoitov
- IMA Reports No TPM Device
Thangavel, Karthik
- [PATCH v2 2/3] tpm: Address !chip->auth in tpm_buf_append_name()
Linus Torvalds
- [PATCH] proc: add config to block FOLL_FORCE in mem writes
Linus Torvalds
- [PATCH] proc: add config to block FOLL_FORCE in mem writes
Linus Torvalds
- [PATCH] proc: add config & param to block forcing mem writes
Linus Torvalds
- [PATCH] proc: add config & param to block forcing mem writes
Linus Torvalds
- [GIT PULL] sysctl constification changes for v6.11-rc1
Linus Torvalds
- [PATCH v4] proc: add config & param to block forcing mem writes
Linus Torvalds
- [PATCH v13 2/5] security: Count the LSMs enabled at compile time
Rasmus Villemoes
- [syzbot] [lsm?] [keyrings?] KCSAN: data-race in __se_sys_keyctl / key_task_permission (3)
Dmitry Vyukov
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
Florian Weimer
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
Florian Weimer
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
Florian Weimer
- [PATCH] binfmt_elf: Fail execution of shared objects with ELIBEXEC (was: Re: [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2))
Florian Weimer
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
Florian Weimer
- [PATCH] binfmt_elf: Fail execution of shared objects with ELIBEXEC
Florian Weimer
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
Florian Weimer
- [PATCH 1/2] KEYS: trusted: fix DCP blob payload length assignment
Richard Weinberger
- [PATCH v12 02/10] crypto: Add support for ECDSA signature verification
Lukas Wunner
- [PATCH v12 02/10] crypto: Add support for ECDSA signature verification
Lukas Wunner
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
Jeff Xu
- [RFC PATCH v19 2/5] security: Add new SHOULD_EXEC_CHECK and SHOULD_EXEC_RESTRICT securebits
Jeff Xu
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
Jeff Xu
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
Jeff Xu
- [RFC PATCH v19 2/5] security: Add new SHOULD_EXEC_CHECK and SHOULD_EXEC_RESTRICT securebits
Jeff Xu
- [RFC PATCH v19 2/5] security: Add new SHOULD_EXEC_CHECK and SHOULD_EXEC_RESTRICT securebits
Jeff Xu
- [RFC PATCH v19 2/5] security: Add new SHOULD_EXEC_CHECK and SHOULD_EXEC_RESTRICT securebits
Jeff Xu
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
Jeff Xu
- [RFC PATCH v19 2/5] security: Add new SHOULD_EXEC_CHECK and SHOULD_EXEC_RESTRICT securebits
Jeff Xu
- [RFC PATCH v19 2/5] security: Add new SHOULD_EXEC_CHECK and SHOULD_EXEC_RESTRICT securebits
Jeff Xu
- [RFC PATCH v19 2/5] security: Add new SHOULD_EXEC_CHECK and SHOULD_EXEC_RESTRICT securebits
Jeff Xu
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
Jeff Xu
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
Jeff Xu
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
Jeff Xu
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
Jeff Xu
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
Jeff Xu
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
Jeff Xu
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
Jeff Xu
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
Jeff Xu
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
Jeff Xu
- [PATCH v4] proc: add config & param to block forcing mem writes
Jeff Xu
- [PATCH bpf-next v1 5/9] bpf, verifier: improve signed ranges inference for BPF_AND
Shung-Hsi Yu
- [PATCH bpf-next v2 5/9] bpf, verifier: improve signed ranges inference for BPF_AND
Shung-Hsi Yu
- [PATCH bpf-next v2 5/9] bpf, verifier: improve signed ranges inference for BPF_AND
Shung-Hsi Yu
- [PATCH bpf-next v2 5/9] bpf, verifier: improve signed ranges inference for BPF_AND
Shung-Hsi Yu
- [PATCH bpf-next v2 5/9] bpf, verifier: improve signed ranges inference for BPF_AND
Eduard Zingerman
- [PATCH bpf-next v2 5/9] bpf, verifier: improve signed ranges inference for BPF_AND
Eduard Zingerman
- [RFC] integrity: wait for completion of i2c initialization using late_initcall_sync()
Mimi Zohar
- [RFC PATCH v19 5/5] samples/should-exec: Add set-should-exec
Mimi Zohar
- [RFC PATCH v19 0/5] Script execution control (was O_MAYEXEC)
Mimi Zohar
- 街の財産になる喫茶店事業 FCパートナー募集
info at c-united-coffee.jp
- [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
enh
- [PATCH v2] dm verity: add support for signature verification with platform keyring
luca.boccassi at gmail.com
- [GIT PULL] sysctl constification changes for v6.11-rc1
patchwork-bot+linux-riscv at kernel.org
- [GIT PULL] sysctl constification changes for v6.11-rc1
patchwork-bot+linux-riscv at kernel.org
- [PATCH bpf-next v2 0/9] Add BPF LSM return value range check, BPF part
patchwork-bot+netdevbpf at kernel.org
- [GIT PULL] selinux/selinux-pr-20240715
pr-tracker-bot at kernel.org
- [GIT PULL] lsm/lsm-pr-20240715
pr-tracker-bot at kernel.org
- [GIT PULL] Smack patches for 6.11
pr-tracker-bot at kernel.org
- [GIT PULL] Landlock fix for v6.11
pr-tracker-bot at kernel.org
- [GIT PULL] sysctl constification changes for v6.11-rc1
pr-tracker-bot at kernel.org
- [GIT PULL] AppArmor updates for 6.11-rc1
pr-tracker-bot at kernel.org
- [PATCH v2] apparmor: try to avoid refing the label in apparmor_file_open
kernel test robot
- [syzbot] [lsm?] KASAN: slab-use-after-free Read in smack_socket_sock_rcv_skb
syzbot
- [syzbot] [lsm?] [keyrings?] KCSAN: data-race in __se_sys_keyctl / key_task_permission (3)
syzbot
Last message date:
Wed Jul 31 23:56:27 UTC 2024
Archived on: Wed Jul 31 23:59:49 UTC 2024
This archive was generated by
Pipermail 0.09 (Mailman edition).