June 2024 Archives by author
Starting: Sat Jun 1 16:38:20 UTC 2024
Ending: Sat Jun 29 08:43:31 UTC 2024
Messages: 364
- [LSM/Landlock] Adding ability to sandbox TTYs
COHEN-SCALI Remi (AMPERE)
- [PATCH v3 09/11] tracing: Replace strncpy() with __get_task_comm()
Masami Hiramatsu (Google)
- [PATCH] smack: tcp: ipv4, fix incorrect labeling and unauthorized writes
Konstantin Andreev
- [PATCH] smack: unix sockets: fix accept()ed socket label
Konstantin Andreev
- [PATCH v2] smack: unix sockets: fix accept()ed socket label
Konstantin Andreev
- [PATCH v2 0/4] Introduce user namespace capabilities
Josef Bacik
- [PATCH v7 3/5] crypto: tpm2_key: Introduce a TPM2 key type
Stefan Berger
- [PATCH 1/6] fs/exec: Drop task_lock() inside __get_task_comm()
Eric W. Biederman
- [PATCH 1/6] fs/exec: Drop task_lock() inside __get_task_comm()
Eric W. Biederman
- [PATCH 1/6] fs/exec: Drop task_lock() inside __get_task_comm()
Eric W. Biederman
- [PATCH 1/6] fs/exec: Drop task_lock() inside __get_task_comm()
Eric W. Biederman
- [PATCH] bpf: add security_file_post_open() LSM hook to sleepable_lsm_hooks
Matt Bobrowski
- [PATCH] bpf: add security_file_post_open() LSM hook to sleepable_lsm_hooks
Daniel Borkmann
- [PATCH v6 1/2] proc: pass file instead of inode to proc_mem_open
Christian Brauner
- [PATCH v2 0/4] Introduce user namespace capabilities
Jonathan Calmels
- [PATCH v2 1/4] capabilities: Add user namespace capabilities
Jonathan Calmels
- [PATCH v2 2/4] capabilities: Add securebit to restrict userns caps
Jonathan Calmels
- [PATCH v2 3/4] capabilities: Add sysctl to mask off userns caps
Jonathan Calmels
- [PATCH v2 4/4] bpf,lsm: Allow editing capabilities in BPF-LSM hooks
Jonathan Calmels
- [PATCH v2 1/4] capabilities: Add user namespace capabilities
Jonathan Calmels
- [PATCH v2 2/4] capabilities: Add securebit to restrict userns caps
Jonathan Calmels
- [PATCH v2 4/4] bpf,lsm: Allow editing capabilities in BPF-LSM hooks
Jonathan Calmels
- [PATCH v2 1/4] capabilities: Add user namespace capabilities
Jonathan Calmels
- [PATCH v2 0/4] Introduce user namespace capabilities
Jonathan Calmels
- [PATCH v2 4/4] bpf,lsm: Allow editing capabilities in BPF-LSM hooks
Jonathan Calmels
- [PATCH v2 4/4] bpf,lsm: Allow editing capabilities in BPF-LSM hooks
Jonathan Calmels
- [PATCH v2 4/4] bpf,lsm: Allow editing capabilities in BPF-LSM hooks
Jonathan Calmels
- Yet another vision of Linux security | Endpoint Security Framework
Timur Chernykh
- Yet another vision of Linux security | Endpoint Security Framework
Timur Chernykh
- Yet another vision of Linux security | Endpoint Security Framework
Timur Chernykh
- [RFC PATCH v3 3/5] KVM: x86: Add notifications for Heki policy configuration and violation
Sean Christopherson
- [RFC PATCH v3 3/5] KVM: x86: Add notifications for Heki policy configuration and violation
Sean Christopherson
- [PATCH] perf trace: Fix syscall untraceable bug
Howard Chu
- [PATCH v1] perf trace: BTF-based enum pretty printing
Howard Chu
- [PATCH] perf trace: Fix syscall untraceable bug
Howard Chu
- [PATCH] perf trace: Fix syscall untraceable bug
Howard Chu
- [PATCH v1] perf trace: BTF-based enum pretty printing
Howard Chu
- [PATCH v2] perf trace: BTF-based enum pretty printing
Howard Chu
- [PATCH v3] perf trace: BTF-based enum pretty printing
Howard Chu
- [PATCH v4] perf trace: BTF-based enum pretty printing
Howard Chu
- [PATCH v4] perf trace: BTF-based enum pretty printing
Howard Chu
- [PATCH v1] perf trace: Augment enum syscall arguments with BTF
Howard Chu
- [PATCH v12 0/5] Reduce overhead of LSMs with static calls
Kees Cook
- [PATCH v5 2/2] proc: restrict /proc/pid/mem
Kees Cook
- [PATCH v12 0/5] Reduce overhead of LSMs with static calls
Kees Cook
- (subset) [PATCH 1/2] yama: document function parameter
Kees Cook
- [PATCH v5 2/2] proc: restrict /proc/pid/mem
Kees Cook
- [PATCH v6 2/2] proc: restrict /proc/pid/mem
Kees Cook
- [PATCH v6 2/2] proc: restrict /proc/pid/mem
Kees Cook
- [PATCH v2 14/15] mm/mmap: Use vms accounted pages in mmap_region()
Kees Cook
- [PATCH v2 14/15] mm/mmap: Use vms accounted pages in mmap_region()
Kees Cook
- [syzbot] [lsm?] general protection fault in hook_inode_free_security
Kees Cook
- [PATCH v12 3/5] security: Replace indirect LSM hook calls with static calls
Jonathan Corbet
- [PATCH] linux++: delete some forward declarations
Alexey Dobriyan
- [PATCH] linux++: delete some forward declarations
Alexey Dobriyan
- [RFC PATCH v2 8/8] clavis: Introduce new LSM called clavis
Randy Dunlap
- [PATCH] perf trace: Fix syscall untraceable bug
Markus Elfring
- [PATCH v3] landlock: Add abstract unix socket connect restriction
Tahera Fahimi
- [PATCH v3] landlock: Add abstract unix socket connect restriction
Tahera Fahimi
- [PATCH v3] landlock: Add abstract unix socket connect restriction
Tahera Fahimi
- [PATCH v3] landlock: Add abstract unix socket connect restriction
Tahera Fahimi
- [PATCH v4] landlock: Add abstract unix socket connect restriction
Tahera Fahimi
- [PATCH v5] landlock: Add abstract unix socket connect restriction
Tahera Fahimi
- [PATCH v6] landlock: Add abstract unix socket connect restriction
Tahera Fahimi
- [PATCH v1] landlock: Abstract unix socket restriction tests
Tahera Fahimi
- [PATCH v1 1/1] treewide: Align match_string() with sysfs_match_string()
Hans de Goede
- [PATCH v2 4/4] bpf, lsm: Allow editing capabilities in BPF-LSM hooks
Dr. Greg
- [PATCH v4 00/14] security: digest_cache LSM
Dr. Greg
- Yet another vision of Linux security | Endpoint Security Framework
Dr. Greg
- Yet another vision of Linux security | Endpoint Security Framework
Dr. Greg
- Yet another vision of Linux security | Endpoint Security Framework
Dr. Greg
- [PATCH] apparmor: try to avoid refing the label in apparmor_file_open
Mateusz Guzik
- [PATCH] apparmor: try to avoid refing the label in apparmor_file_open
Mateusz Guzik
- [PATCH v2] apparmor: try to avoid refing the label in apparmor_file_open
Mateusz Guzik
- [PATCH v2] apparmor: try to avoid refing the label in apparmor_file_open
Mateusz Guzik
- [PATCH v2 1/4] capabilities: Add user namespace capabilities
Serge E. Hallyn
- [PATCH v2 2/4] capabilities: Add securebit to restrict userns caps
Serge E. Hallyn
- [PATCH v2 1/4] capabilities: Add user namespace capabilities
Serge E. Hallyn
- [PATCH v2 1/4] capabilities: Add user namespace capabilities
Serge E. Hallyn
- [PATCH v2 2/4] capabilities: Add securebit to restrict userns caps
Serge E. Hallyn
- [PATCH v2 1/4] capabilities: Add user namespace capabilities
Serge E. Hallyn
- [PATCH v2 4/4] bpf,lsm: Allow editing capabilities in BPF-LSM hooks
Serge E. Hallyn
- [PATCH v3 1/3] LSM: add security_execve_abort() hook
Tetsuo Handa
- Yet another vision of Linux security | Endpoint Security Framework
Tetsuo Handa
- Yet another vision of Linux security | Endpoint Security Framework
Tetsuo Handa
- [PATCH v3] landlock: Add abstract unix socket connect restriction
Simon Horman
- [PATCH v3 06/11] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
Simon Horman
- [PATCH v3] landlock: Add abstract unix socket connect restriction
Jann Horn
- [PATCH v3] landlock: Add abstract unix socket connect restriction
Jann Horn
- [PATCH v2 14/15] mm/mmap: Use vms accounted pages in mmap_region()
Liam R. Howlett
- [RFC PATCH v2 00/12] Socket type control for Landlock
Mikhail Ivanov
- [RFC PATCH v2 01/12] landlock: Support socket access-control
Mikhail Ivanov
- [RFC PATCH v2 00/12] Socket type control for Landlock
Mikhail Ivanov
- [RFC PATCH v2 02/12] landlock: Add hook on socket creation
Mikhail Ivanov
- [RFC PATCH v2 00/12] Socket type control for Landlock
Mikhail Ivanov
- [PATCH v3] ima: Avoid blocking in RCU read-side critical section
John Johansen
- [PATCH 01/10] capability: introduce new capable flag CAP_OPT_NOAUDIT_ONDENY
John Johansen
- [PATCH v2 4/4] bpf,lsm: Allow editing capabilities in BPF-LSM hooks
John Johansen
- [PATCH v2 4/4] bpf,lsm: Allow editing capabilities in BPF-LSM hooks
John Johansen
- [PATCH] apparmor: try to avoid refing the label in apparmor_file_open
John Johansen
- [PATCH] apparmor: try to avoid refing the label in apparmor_file_open
John Johansen
- [PATCH v2] apparmor: try to avoid refing the label in apparmor_file_open
John Johansen
- [PATCH] apparmor: test: add MODULE_DESCRIPTION()
John Johansen
- [PATCH] apparmor: test: add MODULE_DESCRIPTION()
John Johansen
- [PATCH v2] KEYS: trusted: add missing MODULE_DESCRIPTION()
Jeff Johnson
- [PATCH v3 0/2] KEYS: add missing MODULE_DESCRIPTION() macros
Jeff Johnson
- [PATCH v3 1/2] KEYS: trusted: add missing MODULE_DESCRIPTION()
Jeff Johnson
- [PATCH v3 2/2] KEYS: encrypted: add missing MODULE_DESCRIPTION()
Jeff Johnson
- [PATCH] apparmor: test: add MODULE_DESCRIPTION()
Jeff Johnson
- [PATCH 1/6] fs/exec: Drop task_lock() inside __get_task_comm()
Matus Jokay
- [PATCH 1/6] fs/exec: Drop task_lock() inside __get_task_comm()
Matus Jokay
- [LSM/Landlock] Adding ability to sandbox TTYs
Greg KH
- [PATCH bpf-next v3 01/11] bpf, lsm: Annotate lsm hook return value range
Xu Kuohai
- [PATCH bpf-next v3 01/11] bpf, lsm: Annotate lsm hook return value range
Xu Kuohai
- [PATCH v2 06/10] mm/kmemleak: Replace strncpy() with __get_task_comm()
Catalin Marinas
- [PATCH v2 06/10] mm/kmemleak: Replace strncpy() with __get_task_comm()
Catalin Marinas
- [syzbot] [lsm?] general protection fault in hook_inode_free_security
Paul E. McKenney
- [PATCH] perf trace: Fix syscall untraceable bug
Arnaldo Carvalho de Melo
- [PATCH] perf trace: Fix syscall untraceable bug
Arnaldo Carvalho de Melo
- [PATCH v1] perf trace: BTF-based enum pretty printing
Arnaldo Carvalho de Melo
- [PATCH v4] perf trace: BTF-based enum pretty printing
Arnaldo Carvalho de Melo
- [PATCH v4] perf trace: BTF-based enum pretty printing
Arnaldo Carvalho de Melo
- [PATCH v4] perf trace: BTF-based enum pretty printing
Arnaldo Carvalho de Melo
- [PATCH v4] perf trace: BTF-based enum pretty printing
Arnaldo Carvalho de Melo
- [PATCH 1/2] landlock: Add hook on socket_listen()
Ivanov Mikhail
- [PATCH 5/6] bpftool: Make task comm always be NUL-terminated
Quentin Monnet
- [PATCH v19 15/20] fsverity: expose verified fsverity built-in signatures to LSMs
Paul Moore
- [PATCH 3/6] auditsc: Replace memcpy() with __get_task_comm()
Paul Moore
- [PATCH 4/6] security: Replace memcpy() with __get_task_comm()
Paul Moore
- [RFC PATCH] lsm: fixup the inode xattr capability handling
Paul Moore
- [PATCH 1/2] yama: document function parameter
Paul Moore
- [PATCH v12 0/5] Reduce overhead of LSMs with static calls
Paul Moore
- [PATCH v12 0/5] Reduce overhead of LSMs with static calls
Paul Moore
- [PATCH bpf-next v3 01/11] bpf, lsm: Annotate lsm hook return value range
Paul Moore
- [PATCH bpf-next v3 01/11] bpf, lsm: Annotate lsm hook return value range
Paul Moore
- [PATCH v2 4/4] bpf, lsm: Allow editing capabilities in BPF-LSM hooks
Paul Moore
- [PATCH v3 1/3] LSM: add security_execve_abort() hook
Paul Moore
- [PATCH 01/10] capability: introduce new capable flag CAP_OPT_NOAUDIT_ONDENY
Paul Moore
- [PATCH 02/10] capability: add any wrappers to test for multiple caps with exactly one audit message
Paul Moore
- [PATCH v12 5/5] bpf: Only enable BPF LSM hooks when an LSM program is attached
Paul Moore
- [PATCH v3 1/3] LSM: add security_execve_abort() hook
Paul Moore
- [PATCH v2 4/4] bpf, lsm: Allow editing capabilities in BPF-LSM hooks
Paul Moore
- [PATCH bpf-next v3 01/11] bpf, lsm: Annotate lsm hook return value range
Paul Moore
- [PATCH 2/2] cipso: make cipso_v4_skbuff_delattr() fully remove the CIPSO options
Paul Moore
- [PATCH v2 4/4] bpf, lsm: Allow editing capabilities in BPF-LSM hooks
Paul Moore
- [PATCH v2 4/4] bpf, lsm: Allow editing capabilities in BPF-LSM hooks
Paul Moore
- [PATCH v3] ima: Avoid blocking in RCU read-side critical section
Paul Moore
- security: ima_policy.c:427:17: error: too many arguments to function 'ima_filter_rule_init'
Paul Moore
- security: ima_policy.c:427:17: error: too many arguments to function 'ima_filter_rule_init'
Paul Moore
- [PATCH v3] ima: Avoid blocking in RCU read-side critical section
Paul Moore
- [PATCH v2 4/4] bpf, lsm: Allow editing capabilities in BPF-LSM hooks
Paul Moore
- [PATCH v2 4/4] bpf, lsm: Allow editing capabilities in BPF-LSM hooks
Paul Moore
- [PATCH v2 0/2] cipso: make cipso_v4_skbuff_delattr() fully remove the CIPSO options
Paul Moore
- [PATCH v3] ima: Avoid blocking in RCU read-side critical section
Paul Moore
- [GIT PULL] lsm/lsm-pr-20240617
Paul Moore
- [PATCH] bpf: add security_file_post_open() LSM hook to sleepable_lsm_hooks
Paul Moore
- [PATCH v4 00/14] security: digest_cache LSM
Paul Moore
- [PATCH v2 0/2] cipso: make cipso_v4_skbuff_delattr() fully remove the CIPSO options
Paul Moore
- [PATCH v4 00/14] security: digest_cache LSM
Paul Moore
- [PATCH v4 00/14] security: digest_cache LSM
Paul Moore
- [PATCH v4 00/14] security: digest_cache LSM
Paul Moore
- [PATCH v2 0/2] cipso: make cipso_v4_skbuff_delattr() fully remove the CIPSO options
Paul Moore
- [PATCH v4 00/14] security: digest_cache LSM
Paul Moore
- [PATCH v4 00/14] security: digest_cache LSM
Paul Moore
- [PATCH v4 00/14] security: digest_cache LSM
Paul Moore
- [PATCH v3 1/2] KEYS: trusted: add missing MODULE_DESCRIPTION()
Paul Moore
- [PATCH v4 00/14] security: digest_cache LSM
Paul Moore
- [PATCH RFC] LSM, net: Add SO_PEERCONTEXT for peer LSM data
Paul Moore
- [PATCH v39 01/42] integrity: disassociate ima_filter_rule from security_audit_rule
Paul Moore
- [PATCH v39 01/42] integrity: disassociate ima_filter_rule from security_audit_rule
Paul Moore
- [PATCH RFC] LSM, net: Add SO_PEERCONTEXT for peer LSM data
Paul Moore
- [PATCH v39 02/42] SM: Infrastructure management of the sock security
Paul Moore
- [PATCH v39 01/42] integrity: disassociate ima_filter_rule from security_audit_rule
Paul Moore
- [PATCH v39 01/42] integrity: disassociate ima_filter_rule from security_audit_rule
Paul Moore
- [PATCH v39 02/42] SM: Infrastructure management of the sock security
Paul Moore
- [PATCH RFC] LSM, net: Add SO_PEERCONTEXT for peer LSM data
Paul Moore
- [PATCH v39 01/42] integrity: disassociate ima_filter_rule from security_audit_rule
Paul Moore
- [PATCH v39 02/42] SM: Infrastructure management of the sock security
Paul Moore
- [PATCH v39 01/42] integrity: disassociate ima_filter_rule from security_audit_rule
Paul Moore
- [syzbot] [lsm?] general protection fault in hook_inode_free_security
Paul Moore
- [syzbot] [lsm?] general protection fault in hook_inode_free_security
Paul Moore
- [PATCH] linux++: delete some forward declarations
Andrew Morton
- [PATCH v2 05/10] mm/util: Fix possible race condition in kstrdup()
Andrew Morton
- [PATCH] linux++: delete some forward declarations
Andrew Morton
- [PATCH 2/2] cipso: make cipso_v4_skbuff_delattr() fully remove the CIPSO options
Ondrej Mosnacek
- [PATCH v2 0/2] cipso: make cipso_v4_skbuff_delattr() fully remove the CIPSO options
Ondrej Mosnacek
- [PATCH v2 1/2] cipso: fix total option length computation
Ondrej Mosnacek
- [PATCH v2 2/2] cipso: make cipso_v4_skbuff_delattr() fully remove the CIPSO options
Ondrej Mosnacek
- [PATCH v2 0/2] cipso: make cipso_v4_skbuff_delattr() fully remove the CIPSO options
Ondrej Mosnacek
- [PATCH v2 0/2] cipso: make cipso_v4_skbuff_delattr() fully remove the CIPSO options
Ondrej Mosnacek
- [PATCH v2 0/2] cipso: make cipso_v4_skbuff_delattr() fully remove the CIPSO options
Ondrej Mosnacek
- [RFC PATCH v2 00/12] Socket type control for Landlock
Günther Noack
- [RFC PATCH v2 01/12] landlock: Support socket access-control
Günther Noack
- [RFC PATCH v2 02/12] landlock: Add hook on socket creation
Günther Noack
- [RFC PATCH v2 00/12] Socket type control for Landlock
Günther Noack
- [RFC PATCH v2 00/12] Socket type control for Landlock
Günther Noack
- [PATCH v3] landlock: Add abstract unix socket connect restriction
Günther Noack
- [RFC PATCH v2 00/12] Socket type control for Landlock
Günther Noack
- [PATCH] landlock: Use bit-fields for storing handled layer access masks
Günther Noack
- [PATCH] landlock: Use bit-fields for storing handled layer access masks
Günther Noack
- [PATCH v3] landlock: Add abstract unix socket connect restriction
Günther Noack
- [LSM/Landlock] Adding ability to sandbox TTYs
Günther Noack
- [PATCH 1/2] landlock: Add hook on socket_listen()
Günther Noack
- [PATCH v5 1/2] proc: pass file instead of inode to proc_mem_open
Adrian Ratiu
- [PATCH v5 2/2] proc: restrict /proc/pid/mem
Adrian Ratiu
- Re: [PATCH v5 2/2] proc: restrict /proc/pid/mem
Adrian Ratiu
- Re: [PATCH v5 2/2] proc: restrict /proc/pid/mem
Adrian Ratiu
- [PATCH v6 1/2] proc: pass file instead of inode to proc_mem_open
Adrian Ratiu
- [PATCH v6 2/2] proc: restrict /proc/pid/mem
Adrian Ratiu
- Re: [PATCH v6 1/2] proc: pass file instead of inode to proc_mem_open
Adrian Ratiu
- Re: [PATCH v6 2/2] proc: restrict /proc/pid/mem
Adrian Ratiu
- [PATCH] perf trace: Fix syscall untraceable bug
Ian Rogers
- [PATCH 2/6] tracing: Replace memcpy() with __get_task_comm()
Steven Rostedt
- [PATCH 2/6] tracing: Replace memcpy() with __get_task_comm()
Steven Rostedt
- [PATCH 2/6] tracing: Replace memcpy() with __get_task_comm()
Steven Rostedt
- [PATCH 2/6] tracing: Replace memcpy() with __get_task_comm()
Steven Rostedt
- [PATCH] linux++: delete some forward declarations
Steven Rostedt
- [PATCH] linux++: delete some forward declarations
Steven Rostedt
- [PATCH] linux++: delete some forward declarations
Steven Rostedt
- [PATCH v2] KEYS: trusted: add missing MODULE_DESCRIPTION()
Jarkko Sakkinen
- [PATCH v7 3/5] crypto: tpm2_key: Introduce a TPM2 key type
Jarkko Sakkinen
- [RFC PATCH v2 0/8] Clavis LSM
Jarkko Sakkinen
- [RFC PATCH v2 1/8] certs: Introduce ability to link to a system key
Jarkko Sakkinen
- [PATCH v7 3/5] crypto: tpm2_key: Introduce a TPM2 key type
Jarkko Sakkinen
- [PATCH v3 1/2] KEYS: trusted: add missing MODULE_DESCRIPTION()
Jarkko Sakkinen
- [PATCH v3 2/2] KEYS: encrypted: add missing MODULE_DESCRIPTION()
Jarkko Sakkinen
- [PATCH v2 2/4] capabilities: Add securebit to restrict userns caps
Jarkko Sakkinen
- [PATCH v2 2/4] capabilities: Add securebit to restrict userns caps
Jarkko Sakkinen
- [PATCH v2] landlock: Add abstract unix socket connect restrictions
Mickaël Salaün
- [RFC PATCH v3 3/5] KVM: x86: Add notifications for Heki policy configuration and violation
Mickaël Salaün
- [PATCH v3] landlock: Add abstract unix socket connect restriction
Mickaël Salaün
- [PATCH v3] landlock: Add abstract unix socket connect restriction
Mickaël Salaün
- [PATCH v3] landlock: Add abstract unix socket connect restriction
Mickaël Salaün
- [PATCH v3] landlock: Add abstract unix socket connect restriction
Mickaël Salaün
- [PATCH] landlock: Use bit-fields for storing handled layer access masks
Mickaël Salaün
- [PATCH] landlock: Use bit-fields for storing handled layer access masks
Mickaël Salaün
- [PATCH 0/2] Forbid illegitimate binding via listen(2)
Mickaël Salaün
- [PATCH 1/2] landlock: Add hook on socket_listen()
Mickaël Salaün
- [PATCH v5] landlock: Add abstract unix socket connect restriction
Mickaël Salaün
- [syzbot] [lsm?] general protection fault in hook_inode_free_security
Mickaël Salaün
- [syzbot] [lsm?] general protection fault in hook_inode_free_security
Mickaël Salaün
- [PATCH v3] ima: Avoid blocking in RCU read-side critical section
Roberto Sassu
- IMA Reports No TPM Device
Roberto Sassu
- [PATCH v4 00/14] security: digest_cache LSM
Roberto Sassu
- [PATCH v4 00/14] security: digest_cache LSM
Roberto Sassu
- [PATCH v4 00/14] security: digest_cache LSM
Roberto Sassu
- [PATCH v4 00/14] security: digest_cache LSM
Roberto Sassu
- [PATCH v4 00/14] security: digest_cache LSM
Roberto Sassu
- [PATCH v4 00/14] security: digest_cache LSM
Roberto Sassu
- [PATCH v4 00/14] security: digest_cache LSM
Roberto Sassu
- [PATCH v4 00/14] security: digest_cache LSM
Roberto Sassu
- [PATCH v4 00/14] security: digest_cache LSM
Roberto Sassu
- [PATCH v4 00/14] security: digest_cache LSM
Roberto Sassu
- [PATCH v39 01/42] integrity: disassociate ima_filter_rule from security_audit_rule
Roberto Sassu
- [PATCH v39 01/42] integrity: disassociate ima_filter_rule from security_audit_rule
Roberto Sassu
- [PATCH] smack: tcp: ipv4, fix incorrect labeling and unauthorized writes
Casey Schaufler
- [PATCH v2 0/2] cipso: make cipso_v4_skbuff_delattr() fully remove the CIPSO options
Casey Schaufler
- [PATCH bpf-next v3 01/11] bpf, lsm: Annotate lsm hook return value range
Casey Schaufler
- [PATCH v2 0/2] cipso: make cipso_v4_skbuff_delattr() fully remove the CIPSO options
Casey Schaufler
- [PATCH] smack: unix sockets: fix accept()ed socket label
Casey Schaufler
- Yet another vision of Linux security | Endpoint Security Framework
Casey Schaufler
- [PATCH v2] smack: unix sockets: fix accept()ed socket label
Casey Schaufler
- [PATCH RFC] LSM, net: Add SO_PEERCONTEXT for peer LSM data
Casey Schaufler
- [PATCH RFC] LSM, net: Add SO_PEERCONTEXT for peer LSM data
Casey Schaufler
- [PATCH v39 02/42] SM: Infrastructure management of the sock security
Casey Schaufler
- [PATCH v39 01/42] integrity: disassociate ima_filter_rule from security_audit_rule
Casey Schaufler
- [PATCH v39 01/42] integrity: disassociate ima_filter_rule from security_audit_rule
Casey Schaufler
- [PATCH 0/6] kernel: Avoid memcpy of task comm
Yafang Shao
- [PATCH 1/6] fs/exec: Drop task_lock() inside __get_task_comm()
Yafang Shao
- [PATCH 2/6] tracing: Replace memcpy() with __get_task_comm()
Yafang Shao
- [PATCH 3/6] auditsc: Replace memcpy() with __get_task_comm()
Yafang Shao
- [PATCH 4/6] security: Replace memcpy() with __get_task_comm()
Yafang Shao
- [PATCH 5/6] bpftool: Make task comm always be NUL-terminated
Yafang Shao
- [PATCH 6/6] selftests/bpf: Replace memcpy() with __get_task_comm()
Yafang Shao
- [PATCH 1/6] fs/exec: Drop task_lock() inside __get_task_comm()
Yafang Shao
- [PATCH 1/6] fs/exec: Drop task_lock() inside __get_task_comm()
Yafang Shao
- [PATCH 2/6] tracing: Replace memcpy() with __get_task_comm()
Yafang Shao
- [PATCH 1/6] fs/exec: Drop task_lock() inside __get_task_comm()
Yafang Shao
- [PATCH v2 00/10] Improve the copy of task comm
Yafang Shao
- [PATCH v2 01/10] fs/exec: Drop task_lock() inside __get_task_comm()
Yafang Shao
- [PATCH v2 02/10] auditsc: Replace memcpy() with __get_task_comm()
Yafang Shao
- [PATCH v2 03/10] security: Replace memcpy() with __get_task_comm()
Yafang Shao
- [PATCH v2 04/10] bpftool: Ensure task comm is always NUL-terminated
Yafang Shao
- [PATCH v2 05/10] mm/util: Fix possible race condition in kstrdup()
Yafang Shao
- [PATCH v2 06/10] mm/kmemleak: Replace strncpy() with __get_task_comm()
Yafang Shao
- [PATCH v2 07/10] tsacct: Replace strncpy() with __get_task_comm()
Yafang Shao
- [PATCH v2 08/10] tracing: Replace strncpy() with __get_task_comm()
Yafang Shao
- [PATCH v2 09/10] net: Replace strcpy() with __get_task_comm()
Yafang Shao
- [PATCH v2 10/10] drm: Replace strcpy() with __get_task_comm()
Yafang Shao
- [PATCH v2 06/10] mm/kmemleak: Replace strncpy() with __get_task_comm()
Yafang Shao
- [PATCH v2 05/10] mm/util: Fix possible race condition in kstrdup()
Yafang Shao
- [PATCH v2 05/10] mm/util: Fix possible race condition in kstrdup()
Yafang Shao
- [PATCH v2 06/10] mm/kmemleak: Replace strncpy() with __get_task_comm()
Yafang Shao
- [PATCH v3 00/11] Improve the copy of task comm
Yafang Shao
- [PATCH v3 01/11] fs/exec: Drop task_lock() inside __get_task_comm()
Yafang Shao
- [PATCH v3 02/11] auditsc: Replace memcpy() with __get_task_comm()
Yafang Shao
- [PATCH v3 03/11] security: Replace memcpy() with __get_task_comm()
Yafang Shao
- [PATCH v3 04/11] bpftool: Ensure task comm is always NUL-terminated
Yafang Shao
- [PATCH v3 05/11] mm/util: Fix possible race condition in kstrdup()
Yafang Shao
- [PATCH v3 06/11] mm/util: Deduplicate code in {kstrdup, kstrndup, kmemdup_nul}
Yafang Shao
- [PATCH v3 07/11] mm/kmemleak: Replace strncpy() with __get_task_comm()
Yafang Shao
- [PATCH v3 08/11] tsacct: Replace strncpy() with __get_task_comm()
Yafang Shao
- [PATCH v3 09/11] tracing: Replace strncpy() with __get_task_comm()
Yafang Shao
- [PATCH v3 10/11] net: Replace strcpy() with __get_task_comm()
Yafang Shao
- [PATCH v3 11/11] drm: Replace strcpy() with __get_task_comm()
Yafang Shao
- [PATCH v3 06/11] mm/util: Deduplicate code in {kstrdup, kstrndup, kmemdup_nul}
Yafang Shao
- [PATCH v3 06/11] mm/util: Deduplicate code in {kstrdup, kstrndup, kmemdup_nul}
Yafang Shao
- [PATCH v3 06/11] mm/util: Deduplicate code in {kstrdup, kstrndup, kmemdup_nul}
Yafang Shao
- [PATCH v4 00/11] Improve the copy of task comm
Yafang Shao
- [PATCH v4 01/11] fs/exec: Drop task_lock() inside __get_task_comm()
Yafang Shao
- [PATCH v4 02/11] auditsc: Replace memcpy() with __get_task_comm()
Yafang Shao
- [PATCH v4 03/11] security: Replace memcpy() with __get_task_comm()
Yafang Shao
- [PATCH v4 04/11] bpftool: Ensure task comm is always NUL-terminated
Yafang Shao
- [PATCH v4 05/11] mm/util: Fix possible race condition in kstrdup()
Yafang Shao
- [PATCH v4 06/11] mm/util: Deduplicate code in {kstrdup, kstrndup, kmemdup_nul}
Yafang Shao
- [PATCH v4 07/11] mm/kmemleak: Replace strncpy() with __get_task_comm()
Yafang Shao
- [PATCH v4 08/11] tsacct: Replace strncpy() with __get_task_comm()
Yafang Shao
- [PATCH v4 09/11] tracing: Replace strncpy() with __get_task_comm()
Yafang Shao
- [PATCH v4 10/11] net: Replace strcpy() with __get_task_comm()
Yafang Shao
- [PATCH v4 11/11] drm: Replace strcpy() with __get_task_comm()
Yafang Shao
- [PATCH v12 5/5] bpf: Only enable BPF LSM hooks when an LSM program is attached
KP Singh
- [PATCH v12 3/5] security: Replace indirect LSM hook calls with static calls
KP Singh
- [PATCH v13 0/5] Reduce overhead of LSMs with static calls
KP Singh
- [PATCH v13 1/5] kernel: Add helper macros for loop unrolling
KP Singh
- [PATCH v13 2/5] security: Count the LSMs enabled at compile time
KP Singh
- [PATCH v13 3/5] security: Replace indirect LSM hook calls with static calls
KP Singh
- [PATCH v13 4/5] security: Update non standard hooks to use static calls
KP Singh
- [PATCH v13 5/5] bpf: Only enable BPF LSM hooks when an LSM program is attached
KP Singh
- Yet another vision of Linux security | Endpoint Security Framework
Stephen Smalley
- Yet another vision of Linux security | Endpoint Security Framework
Stephen Smalley
- [RFC PATCH v2 1/8] certs: Introduce ability to link to a system key
Eric Snowberg
- [RFC PATCH v2 0/8] Clavis LSM
Eric Snowberg
- [RFC PATCH v2 8/8] clavis: Introduce new LSM called clavis
Eric Snowberg
- [RFC PATCH v2 0/8] Clavis LSM
Eric Snowberg
- [PATCH 1/6] fs/exec: Drop task_lock() inside __get_task_comm()
Alexei Starovoitov
- [PATCH 1/6] fs/exec: Drop task_lock() inside __get_task_comm()
Alexei Starovoitov
- [PATCH bpf-next v3 01/11] bpf, lsm: Annotate lsm hook return value range
Alexei Starovoitov
- [PATCH 1/6] fs/exec: Drop task_lock() inside __get_task_comm()
Alexei Starovoitov
- IMA Reports No TPM Device
Thangavel, Karthik
- IMA Reports No TPM Device
Thangavel, Karthik
- [PATCH 1/6] fs/exec: Drop task_lock() inside __get_task_comm()
Linus Torvalds
- [PATCH 2/6] tracing: Replace memcpy() with __get_task_comm()
Linus Torvalds
- [PATCH 2/6] tracing: Replace memcpy() with __get_task_comm()
Linus Torvalds
- [PATCH 2/6] tracing: Replace memcpy() with __get_task_comm()
Linus Torvalds
- [PATCH v2 05/10] mm/util: Fix possible race condition in kstrdup()
Linus Torvalds
- Maintainers Summit 2024 Call for Topics
Theodore Ts'o
- [PATCH v2] apparmor: try to avoid refing the label in apparmor_file_open
Neeraj Upadhyay
- [PATCH v2] apparmor: try to avoid refing the label in apparmor_file_open
Neeraj Upadhyay
- [PATCH v3 11/11] drm: Replace strcpy() with __get_task_comm()
Daniel Vetter
- [PATCH v3 06/11] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
Matthew Wilcox
- [PATCH v3 06/11] mm/util: Deduplicate code in {kstrdup,kstrndup,kmemdup_nul}
Matthew Wilcox
- [PATCH v6 2/2] proc: restrict /proc/pid/mem
Jeff Xu
- [PATCH v6 2/2] proc: restrict /proc/pid/mem
Jeff Xu
- [PATCH v3] ima: Avoid blocking in RCU read-side critical section
Mimi Zohar
- [RFC PATCH v2 0/8] Clavis LSM
Mimi Zohar
- [PATCH v39 01/42] integrity: disassociate ima_filter_rule from security_audit_rule
Mimi Zohar
- [PATCH v39 01/42] integrity: disassociate ima_filter_rule from security_audit_rule
Mimi Zohar
- [PATCH v39 01/42] integrity: disassociate ima_filter_rule from security_audit_rule
Mimi Zohar
- [PATCH v39 01/42] integrity: disassociate ima_filter_rule from security_audit_rule
Mimi Zohar
- [PATCH v2 0/2] cipso: make cipso_v4_skbuff_delattr() fully remove the CIPSO options
patchwork-bot+netdevbpf at kernel.org
- [PATCH v2 0/2] cipso: make cipso_v4_skbuff_delattr() fully remove the CIPSO options
patchwork-bot+netdevbpf at kernel.org
- [PATCH] bpf: add security_file_post_open() LSM hook to sleepable_lsm_hooks
patchwork-bot+netdevbpf at kernel.org
- [GIT PULL] Landlock fix for v6.10-rc2
pr-tracker-bot at kernel.org
- [GIT PULL] lsm/lsm-pr-20240617
pr-tracker-bot at kernel.org
Last message date:
Sat Jun 29 08:43:31 UTC 2024
Archived on: Sat Jun 29 08:44:07 UTC 2024
This archive was generated by
Pipermail 0.09 (Mailman edition).