April 2025 Archives by date
Starting: Tue Apr 1 11:51:00 UTC 2025
Ending: Wed Apr 30 23:29:44 UTC 2025
Messages: 503
- [PATCH v1] landlock: Remove incorrect warning
Günther Noack
- [RFC PATCH security-next 0/4] Introducing Hornet LSM
Jarkko Sakkinen
- [RFC PATCH security-next 0/4] Introducing Hornet LSM
Blaise Boscaccy
- [RFC PATCH v3] KEYS: Add a list for unreferenced keys
Jarkko Sakkinen
- [PATCH v11 0/9] ima: kexec: measure events between kexec load and execute
steven chen
- [PATCH v11 1/9] ima: rename variable the set_file "file" to "ima_kexec_file"
steven chen
- [PATCH v11 2/9] ima: define and call ima_alloc_kexec_file_buf()
steven chen
- [PATCH v11 3/9] kexec: define functions to map and unmap segments
steven chen
- [PATCH v11 4/9] ima: kexec: skip IMA segment validation after kexec soft reboot
steven chen
- [PATCH v11 5/9] ima: kexec: define functions to copy IMA log at soft boot
steven chen
- [PATCH v11 6/9] ima: kexec: move IMA log copy from kexec load to execute
steven chen
- [PATCH v11 7/9] ima: verify if the segment size has changed
steven chen
- [PATCH v11 8/9] ima: make the kexec extra memory configurable
steven chen
- [PATCH v11 9/9] ima: measure kexec load and exec events as critical data
steven chen
- [RFC PATCH v3] KEYS: Add a list for unreferenced keys
David Howells
- [GIT PULL] selinux/selinux-pr-20250323
Paul Moore
- [RFC PATCH v3] KEYS: Add a list for unreferenced keys
Jarkko Sakkinen
- [RFC PATCH v4] KEYS: Add a list for unreferenced keys
Jarkko Sakkinen
- [RFC PATCH security-next 1/4] security: Hornet LSM
Paul Moore
- [RFC PATCH v4] KEYS: Add a list for unreferenced keys
Jarkko Sakkinen
- [PATCH] RDMA/uverbs: Consider capability of the process that opens the file
Parav Pandit
- [PATCH] RDMA/uverbs: Consider capability of the process that opens the file
Jason Gunthorpe
- [PATCH v2 security-next 0/4] Introducing Hornet LSM
Blaise Boscaccy
- [PATCH v2 security-next 1/4] security: Hornet LSM
Blaise Boscaccy
- [PATCH v2 security-next 2/4] hornet: Introduce sign-ebpf
Blaise Boscaccy
- [PATCH v2 security-next 3/4] hornet: Add a light skeleton data extractor script
Blaise Boscaccy
- [PATCH v2 security-next 4/4] selftests/hornet: Add a selftest for the Hornet LSM
Blaise Boscaccy
- [PATCH v2 security-next 1/4] security: Hornet LSM
kernel test robot
- [PATCH] RDMA/uverbs: Consider capability of the process that opens the file
Serge E. Hallyn
- [PATCH v2 security-next 1/4] security: Hornet LSM
kernel test robot
- [RFC PATCH 0/6] fs/9p: Reuse inode based on path (in addition to qid)
Tingmao Wang
- [RFC PATCH 1/6] fs/9p: Add ability to identify inode by path for .L
Tingmao Wang
- [RFC PATCH 2/6] fs/9p: add default option for path-based inodes
Tingmao Wang
- [RFC PATCH 3/6] fs/9p: Hide inodeident=path from show_options as it is the default
Tingmao Wang
- [RFC PATCH 4/6] fs/9p: Add ability to identify inode by path for non-.L
Tingmao Wang
- [RFC PATCH 5/6] fs/9p: .L: Refresh stale inodes on reuse
Tingmao Wang
- [RFC PATCH 6/6] fs/9p: non-.L: Refresh stale inodes on reuse
Tingmao Wang
- [PATCH v5] KEYS: Add a list for unreferenced keys
Jarkko Sakkinen
- [PATCH v6] KEYS: Add a list for unreferenced keys
Jarkko Sakkinen
- [PATCH v5] KEYS: Add a list for unreferenced keys
Jarkko Sakkinen
- [PATCH v7] KEYS: Add a list for unreferenced keys
Jarkko Sakkinen
- [PATCH v7] KEYS: Add a list for unreferenced keys
Marek Szyprowski
- [PATCH] RDMA/uverbs: Consider capability of the process that opens the file
Parav Pandit
- [PATCH v7] KEYS: Add a list for unreferenced keys
Jarkko Sakkinen
- [PATCH v7] KEYS: Add a list for unreferenced keys
Jarkko Sakkinen
- [PATCH v7] KEYS: Add a list for unreferenced keys
Marek Szyprowski
- [PATCH v7] KEYS: Add a list for unreferenced keys
Jarkko Sakkinen
- [PATCH v8] KEYS: Add a list for unreferenced keys
Jarkko Sakkinen
- [PATCH] RDMA/uverbs: Consider capability of the process that opens the file
sergeh at kernel.org
- [PATCH] RDMA/uverbs: Consider capability of the process that opens the file
Jason Gunthorpe
- [PATCH] gcc-plugins: Disable GCC plugins for compile test builds
Mark Brown
- [PATCH] gcc-plugins: Disable GCC plugins for compile test builds
Linus Torvalds
- [PATCH v1 net-next 2/4] net: Retire DCCP.
Paul Moore
- [PATCH v11 1/9] ima: rename variable the set_file "file" to "ima_kexec_file"
Baoquan He
- [PATCH v11 2/9] ima: define and call ima_alloc_kexec_file_buf()
Baoquan He
- [PATCH v11 3/9] kexec: define functions to map and unmap segments
Baoquan He
- [PATCH v11 4/9] ima: kexec: skip IMA segment validation after kexec soft reboot
Baoquan He
- [PATCH v11 7/9] ima: verify if the segment size has changed
Baoquan He
- [PATCH v11 2/9] ima: define and call ima_alloc_kexec_file_buf()
Mimi Zohar
- [PATCH v11 1/9] ima: rename variable the set_file "file" to "ima_kexec_file"
Mimi Zohar
- [PATCH v11 2/9] ima: define and call ima_alloc_kexec_file_buf()
Baoquan He
- [PATCH v11 2/9] ima: define and call ima_alloc_kexec_file_buf()
Mimi Zohar
- [PATCH v1 net-next 2/4] net: Retire DCCP.
Christian Göttsche
- [PATCH v1 net-next 2/4] net: Retire DCCP.
Paul Moore
- [PATCH v11 2/9] ima: define and call ima_alloc_kexec_file_buf()
Baoquan He
- [PATCH] gcc-plugins: Disable GCC plugins for compile test builds
Arnd Bergmann
- [PATCH RFC v7 0/8] Add NUMA mempolicy support for KVM guest-memfd
Shivank Garg
- [PATCH RFC v7 1/8] mm/filemap: Add mempolicy support to the filemap layer
Shivank Garg
- [PATCH RFC v7 2/8] mm/mempolicy: Export memory policy symbols
Shivank Garg
- [PATCH RFC v7 3/8] security: Export security_inode_init_security_anon for KVM guest_memfd
Shivank Garg
- [PATCH RFC v7 4/8] KVM: Add kvm_gmem_exit() cleanup function
Shivank Garg
- [PATCH RFC v7 5/8] KVM: guest_memfd: Make guest mem use guest mem inodes instead of anonymous inodes
Shivank Garg
- [PATCH RFC v7 6/8] KVM: guest_memfd: Add slab-allocated inode cache
Shivank Garg
- [PATCH RFC v7 7/8] KVM: guest_memfd: Enforce NUMA mempolicy using shared policy
Shivank Garg
- [PATCH RFC v7 8/8] KVM: guest_memfd: selftests: Add tests for mmap and NUMA policy support
Shivank Garg
- [PATCH v11 2/9] ima: define and call ima_alloc_kexec_file_buf()
Mimi Zohar
- [PATCH v11 5/9] ima: kexec: define functions to copy IMA log at soft boot
Mimi Zohar
- [PATCH v11 7/9] ima: verify if the segment size has changed
Mimi Zohar
- [PATCH] RDMA/uverbs: Consider capability of the process that opens the file
Eric W. Biederman
- [PATCH v11 2/9] ima: define and call ima_alloc_kexec_file_buf()
Baoquan He
- [PATCH v8] KEYS: Add a list for unreferenced keys
Jarkko Sakkinen
- [PATCH v11 6/9] ima: kexec: move IMA log copy from kexec load to execute
Mimi Zohar
- [PATCH v1 net-next 2/4] net: Retire DCCP.
Casey Schaufler
- [PATCH v11 9/9] ima: measure kexec load and exec events as critical data
Mimi Zohar
- [PATCH] gcc-plugins: Disable GCC plugins for compile test builds
Kees Cook
- [PATCH] gcc-plugins: Disable GCC plugins for compile test builds
Kees Cook
- [PATCH v2 net-next 0/4] net: Retire DCCP socket.
Kuniyuki Iwashima
- [PATCH v2 net-next 1/4] selftest: net: Remove DCCP bits.
Kuniyuki Iwashima
- [PATCH v2 net-next 3/4] net: Unexport shared functions for DCCP.
Kuniyuki Iwashima
- [PATCH v2 net-next 4/4] tcp: Rename tcp_or_dccp_get_hashinfo().
Kuniyuki Iwashima
- [PATCH] gcc-plugins: Disable GCC plugins for compile test builds
Arnd Bergmann
- [PATCH v2 net-next 0/4] net: Retire DCCP socket.
Jakub Kicinski
- [PATCH] hardening: Disable GCC randstruct for COMPILE_TEST
Kees Cook
- [PATCH 1/2] lockdown: Switch implementation to using bitmap
Nikolay Borisov
- [PATCH] hardening: Disable GCC randstruct for COMPILE_TEST
Arnd Bergmann
- [PATCH] gcc-plugins: Disable GCC plugins for compile test builds
Linus Torvalds
- [PATCH 0/2] Allow individual features to be locked down
Dan Williams
- [PATCH 0/2] Allow individual features to be locked down
Nikolay Borisov
- [PATCH] gcc-plugins: Disable GCC plugins for compile test builds
Linus Torvalds
- [PATCH] gcc-plugins: Disable GCC plugins for compile test builds
Kees Cook
- [RFC PATCH 0/29] Rework the LSM initialization
Paul Moore
- [RFC PATCH 01/29] lsm: split the notifier code out into lsm_notifier.c
Paul Moore
- [RFC PATCH 02/29] lsm: split the init code out into lsm_init.c
Paul Moore
- [RFC PATCH 03/29] lsm: simplify prepare_lsm() and rename to lsm_prep_single()
Paul Moore
- [RFC PATCH 04/29] lsm: simplify ordered_lsm_init() and rename to lsm_init_ordered()
Paul Moore
- [RFC PATCH 05/29] lsm: replace the name field with a pointer to the lsm_id struct
Paul Moore
- [RFC PATCH 06/29] lsm: cleanup and normalize the LSM order symbols naming
Paul Moore
- [RFC PATCH 07/29] lsm: rework lsm_active_cnt and lsm_idlist[]
Paul Moore
- [RFC PATCH 08/29] lsm: get rid of the lsm_names list and do some cleanup
Paul Moore
- [RFC PATCH 09/29] lsm: cleanup and normalize the LSM enabled functions
Paul Moore
- [RFC PATCH 10/29] lsm: cleanup the LSM blob size code
Paul Moore
- [RFC PATCH 11/29] lsm: cleanup initialize_lsm() and rename to lsm_init_single()
Paul Moore
- [RFC PATCH 12/29] lsm: cleanup the LSM ordered parsing
Paul Moore
- [RFC PATCH 13/29] lsm: fold lsm_init_ordered() into security_init()
Paul Moore
- [RFC PATCH 14/29] lsm: add missing function header comment blocks in lsm_init.c
Paul Moore
- [RFC PATCH 15/29] lsm: cleanup the debug and console output in lsm_init.c
Paul Moore
- [RFC PATCH 16/29] lsm: output available LSMs when debugging
Paul Moore
- [RFC PATCH 17/29] lsm: introduce an initcall mechanism into the LSM framework
Paul Moore
- [RFC PATCH 18/29] loadpin: move initcalls to the LSM framework
Paul Moore
- [RFC PATCH 19/29] ipe: move initcalls to the LSM framework
Paul Moore
- [RFC PATCH 20/29] smack: move initcalls to the LSM framework
Paul Moore
- [RFC PATCH 21/29] tomoyo: move initcalls to the LSM framework
Paul Moore
- [RFC PATCH 22/29] safesetid: move initcalls to the LSM framework
Paul Moore
- [RFC PATCH 23/29] apparmor: move initcalls to the LSM framework
Paul Moore
- [RFC PATCH 24/29] lockdown: move initcalls to the LSM framework
Paul Moore
- [RFC PATCH 25/29] ima,evm: move initcalls to the LSM framework
Paul Moore
- [RFC PATCH 26/29] selinux: move initcalls to the LSM framework
Paul Moore
- [RFC PATCH 27/29] lsm: consolidate all of the LSM framework initcalls
Paul Moore
- [RFC PATCH 28/29] lsm: add a LSM_STARTED_ALL notification event
Paul Moore
- [RFC PATCH 29/29] lsm: add support for counting lsm_prop support among LSMs
Paul Moore
- [PATCH v2 net-next 0/4] net: Retire DCCP socket.
Kuniyuki Iwashima
- [PATCH] gcc-plugins: Disable GCC plugins for compile test builds
Arnd Bergmann
- [PATCH RFC v7 3/8] security: Export security_inode_init_security_anon for KVM guest_memfd
Paul Moore
- [RFC PATCH 17/29] lsm: introduce an initcall mechanism into the LSM framework
Kees Cook
- [RFC PATCH 01/29] lsm: split the notifier code out into lsm_notifier.c
Kees Cook
- [RFC PATCH 02/29] lsm: split the init code out into lsm_init.c
Kees Cook
- [RFC PATCH 03/29] lsm: simplify prepare_lsm() and rename to lsm_prep_single()
Kees Cook
- [RFC PATCH 07/29] lsm: rework lsm_active_cnt and lsm_idlist[]
Casey Schaufler
- [RFC PATCH 04/29] lsm: simplify ordered_lsm_init() and rename to lsm_init_ordered()
Kees Cook
- [RFC PATCH 05/29] lsm: replace the name field with a pointer to the lsm_id struct
Kees Cook
- [RFC PATCH 03/29] lsm: simplify prepare_lsm() and rename to lsm_prep_single()
Paul Moore
- [RFC PATCH 04/29] lsm: simplify ordered_lsm_init() and rename to lsm_init_ordered()
Paul Moore
- [RFC PATCH 06/29] lsm: cleanup and normalize the LSM order symbols naming
Kees Cook
- [RFC PATCH 07/29] lsm: rework lsm_active_cnt and lsm_idlist[]
Kees Cook
- [RFC PATCH 08/29] lsm: get rid of the lsm_names list and do some cleanup
Kees Cook
- [RFC PATCH 10/29] lsm: cleanup the LSM blob size code
Kees Cook
- [RFC PATCH 11/29] lsm: cleanup initialize_lsm() and rename to lsm_init_single()
Kees Cook
- [RFC PATCH 18/29] loadpin: move initcalls to the LSM framework
Kees Cook
- [RFC PATCH 19/29] ipe: move initcalls to the LSM framework
Kees Cook
- [RFC PATCH 20/29] smack: move initcalls to the LSM framework
Kees Cook
- [RFC PATCH 21/29] tomoyo: move initcalls to the LSM framework
Kees Cook
- [RFC PATCH 22/29] safesetid: move initcalls to the LSM framework
Kees Cook
- [RFC PATCH 23/29] apparmor: move initcalls to the LSM framework
Kees Cook
- [RFC PATCH 24/29] lockdown: move initcalls to the LSM framework
Kees Cook
- [RFC PATCH 27/29] lsm: consolidate all of the LSM framework initcalls
Kees Cook
- [RFC PATCH 28/29] lsm: add a LSM_STARTED_ALL notification event
Kees Cook
- [RFC PATCH 09/29] lsm: cleanup and normalize the LSM enabled functions
Kees Cook
- [PATCH v3 net-next 0/4] net: Retire DCCP socket.
Kuniyuki Iwashima
- [PATCH v3 net-next 1/4] selftest: net: Remove DCCP bits.
Kuniyuki Iwashima
- [PATCH v3 net-next 3/4] net: Unexport shared functions for DCCP.
Kuniyuki Iwashima
- [PATCH v3 net-next 4/4] tcp: Rename tcp_or_dccp_get_hashinfo().
Kuniyuki Iwashima
- [PATCH] gcc-plugins: Disable GCC plugins for compile test builds
Arnd Bergmann
- [PATCH RFC v7 3/8] security: Export security_inode_init_security_anon for KVM guest_memfd
Christoph Hellwig
- [PATCH RFC v7 5/8] KVM: guest_memfd: Make guest mem use guest mem inodes instead of anonymous inodes
Christoph Hellwig
- [PATCH v11 8/9] ima: make the kexec extra memory configurable
Baoquan He
- Credentials not fully initialized before bprm_check LSM hook
Roberto Sassu
- [PATCH v8] KEYS: Add a list for unreferenced keys
Jarkko Sakkinen
- [PATCH RFC v7 7/8] KVM: guest_memfd: Enforce NUMA mempolicy using shared policy
Ackerley Tng
- [PATCH RFC v7 5/8] KVM: guest_memfd: Make guest mem use guest mem inodes instead of anonymous inodes
Ackerley Tng
- [PATCH v11 3/9] kexec: define functions to map and unmap segments
steven chen
- [PATCH v11 4/9] ima: kexec: skip IMA segment validation after kexec soft reboot
steven chen
- [RFC PATCH 0/29] Rework the LSM initialization
Casey Schaufler
- [PATCH v11 5/9] ima: kexec: define functions to copy IMA log at soft boot
steven chen
- [PATCH v11 6/9] ima: kexec: move IMA log copy from kexec load to execute
steven chen
- [PATCH RFC v7 5/8] KVM: guest_memfd: Make guest mem use guest mem inodes instead of anonymous inodes
Christoph Hellwig
- [Bug Report] A compilation failure occurs when landlock and RANDSTRUCT are combined with GCC 14.2.0.
Günther Noack
- [RFC PATCH 0/29] Rework the LSM initialization
Kees Cook
- [RFC PATCH 26/29] selinux: move initcalls to the LSM framework
Stephen Smalley
- [PATCH v11 8/9] ima: make the kexec extra memory configurable
steven chen
- [Bug Report] A compilation failure occurs when landlock and RANDSTRUCT are combined with GCC 14.2.0.
Mickaël Salaün
- [PATCH v1 1/3] landlock: Log the TGID of the domain creator
Mickaël Salaün
- [PATCH v1 2/3] selftests/landlock: Factor out audit fixture in audit_test
Mickaël Salaün
- [PATCH v1 3/3] selftests/landlock: Add PID tests for audit records
Mickaël Salaün
- Credentials not fully initialized before bprm_check LSM hook
sergeh at kernel.org
- [RFC PATCH 20/29] smack: move initcalls to the LSM framework
Casey Schaufler
- [RFC PATCH 20/29] smack: move initcalls to the LSM framework
Casey Schaufler
- [PATCH v11 8/9] ima: make the kexec extra memory configurable
Mimi Zohar
- [PATCH v11 8/9] ima: make the kexec extra memory configurable
steven chen
- [PATCH v11 8/9] ima: make the kexec extra memory configurable
Mimi Zohar
- [RFC PATCH 17/29] lsm: introduce an initcall mechanism into the LSM framework
Paul Moore
- [RFC PATCH 07/29] lsm: rework lsm_active_cnt and lsm_idlist[]
Paul Moore
- [RFC PATCH 07/29] lsm: rework lsm_active_cnt and lsm_idlist[]
Paul Moore
- [RFC PATCH 07/29] lsm: rework lsm_active_cnt and lsm_idlist[]
Kees Cook
- [RFC PATCH 08/29] lsm: get rid of the lsm_names list and do some cleanup
Paul Moore
- [RFC PATCH 07/29] lsm: rework lsm_active_cnt and lsm_idlist[]
Casey Schaufler
- [RFC PATCH 18/29] loadpin: move initcalls to the LSM framework
Paul Moore
- [RFC PATCH 27/29] lsm: consolidate all of the LSM framework initcalls
Paul Moore
- [RFC PATCH 09/29] lsm: cleanup and normalize the LSM enabled functions
Paul Moore
- [RFC PATCH 09/29] lsm: cleanup and normalize the LSM enabled functions
Paul Moore
- [RFC PATCH 09/29] lsm: cleanup and normalize the LSM enabled functions
Paul Moore
- [RFC PATCH 08/29] lsm: get rid of the lsm_names list and do some cleanup
Kees Cook
- [RFC PATCH 18/29] loadpin: move initcalls to the LSM framework
Kees Cook
- [RFC PATCH 27/29] lsm: consolidate all of the LSM framework initcalls
Kees Cook
- [RFC PATCH 09/29] lsm: cleanup and normalize the LSM enabled functions
Kees Cook
- [RFC PATCH 0/29] Rework the LSM initialization
Paul Moore
- [RFC PATCH 20/29] smack: move initcalls to the LSM framework
Paul Moore
- [RFC PATCH 18/29] loadpin: move initcalls to the LSM framework
Paul Moore
- [RFC PATCH 08/29] lsm: get rid of the lsm_names list and do some cleanup
Paul Moore
- [RFC PATCH 26/29] selinux: move initcalls to the LSM framework
Paul Moore
- [PATCH RFC v7 3/8] security: Export security_inode_init_security_anon for KVM guest_memfd
Shivank Garg
- [PATCH RFC v7 7/8] KVM: guest_memfd: Enforce NUMA mempolicy using shared policy
Shivank Garg
- [PATCH RFC v7 3/8] security: Export security_inode_init_security_anon for KVM guest_memfd
Shivank Garg
- [PATCH v1 1/3] landlock: Log the TGID of the domain creator
Günther Noack
- Credentials not fully initialized before bprm_check LSM hook
Roberto Sassu
- [RFC PATCH 4/9] User-space API for creating a supervisor-fd
Mickaël Salaün
- [PATCH v8] KEYS: Add a list for unreferenced keys
David Howells
- [PATCH v2 security-next 1/4] security: Hornet LSM
Tyler Hicks
- [RFC PATCH 22/29] safesetid: move initcalls to the LSM framework
Micah Morton
- [RFC PATCH 20/29] smack: move initcalls to the LSM framework
Paul Moore
- [PATCH v8] KEYS: Add a list for unreferenced keys
Jarkko Sakkinen
- [PATCH v8] KEYS: Add a list for unreferenced keys
Jarkko Sakkinen
- [RFC PATCH 22/29] safesetid: move initcalls to the LSM framework
Paul Moore
- Credentials not fully initialized before bprm_check LSM hook
Paul Moore
- [PATCH v2 1/4] security: Hornet LSM
Paul Moore
- [PATCH v2 security-next 1/4] security: Hornet LSM
Alexei Starovoitov
- [PATCH v2 security-next 1/4] security: Hornet LSM
Matteo Croce
- [PATCH v2 security-next 1/4] security: Hornet LSM
Alexei Starovoitov
- [PATCH v8] KEYS: Add a list for unreferenced keys
Jarkko Sakkinen
- [PATCH v3 net-next 0/4] net: Retire DCCP socket.
patchwork-bot+netdevbpf at kernel.org
- [PATCH v8] KEYS: Add a list for unreferenced keys
Jarkko Sakkinen
- [PATCH v2 security-next 1/4] security: Hornet LSM
Blaise Boscaccy
- [PATCH v2 security-next 1/4] security: Hornet LSM
Blaise Boscaccy
- [PATCH 0/2] Allow individual features to be locked down
Paul Moore
- [PATCH v2 security-next 1/4] security: Hornet LSM
Paul Moore
- [PATCH v2 security-next 1/4] security: Hornet LSM
Blaise Boscaccy
- [PATCH v2 1/4] security: Hornet LSM
Blaise Boscaccy
- [PATCH v2 security-next 1/4] security: Hornet LSM
Alexei Starovoitov
- [RFC PATCH 20/29] smack: move initcalls to the LSM framework
Fan Wu
- [RFC PATCH 19/29] ipe: move initcalls to the LSM framework
Fan Wu
- [PATCH v2 security-next 1/4] security: Hornet LSM
Blaise Boscaccy
- [PATCH v2 1/4] security: Hornet LSM
Paul Moore
- [PATCH v2 security-next 1/4] security: Hornet LSM
Alexei Starovoitov
- [RFC PATCH 20/29] smack: move initcalls to the LSM framework
Paul Moore
- [RFC PATCH 19/29] ipe: move initcalls to the LSM framework
Paul Moore
- [RFC PATCH 01/29] lsm: split the notifier code out into lsm_notifier.c
John Johansen
- [PATCH v2 security-next 1/4] security: Hornet LSM
Blaise Boscaccy
- [PATCH v2 security-next 1/4] security: Hornet LSM
Blaise Boscaccy
- [PATCH] gcc-plugins: Disable GCC plugins for compile test builds
Palmer Dabbelt
- [PATCH] gcc-plugins: Disable GCC plugins for compile test builds
Kees Cook
- [PATCH] gcc-plugins: Disable GCC plugins for compile test builds
Kees Cook
- [PATCH v2 security-next 1/4] security: Hornet LSM
Alexei Starovoitov
- [RFC PATCH 02/29] lsm: split the init code out into lsm_init.c
John Johansen
- [RFC PATCH 03/29] lsm: simplify prepare_lsm() and rename to lsm_prep_single()
John Johansen
- [RFC PATCH 05/29] lsm: replace the name field with a pointer to the lsm_id struct
John Johansen
- [RFC PATCH 06/29] lsm: cleanup and normalize the LSM order symbols naming
John Johansen
- [RFC PATCH 08/29] lsm: get rid of the lsm_names list and do some cleanup
John Johansen
- [RFC PATCH 10/29] lsm: cleanup the LSM blob size code
John Johansen
- [RFC PATCH 11/29] lsm: cleanup initialize_lsm() and rename to lsm_init_single()
John Johansen
- [PATCH v12 0/9] ima: kexec: measure events between kexec load and execute
steven chen
- [PATCH v12 1/9] ima: rename variable the seq_file "file" to "ima_kexec_file"
steven chen
- [PATCH v12 2/9] ima: define and call ima_alloc_kexec_file_buf()
steven chen
- [PATCH v12 3/9] kexec: define functions to map and unmap segments
steven chen
- [PATCH v12 4/9] ima: kexec: skip IMA segment validation after kexec soft reboot
steven chen
- [PATCH v12 5/9] ima: kexec: define functions to copy IMA log at soft boot
steven chen
- [PATCH v12 6/9] ima: kexec: move IMA log copy from kexec load to execute
steven chen
- [PATCH v12 7/9] ima: verify if the segment size has changed
steven chen
- [PATCH v12 8/9] ima: make the kexec extra memory configurable
steven chen
- [PATCH v12 9/9] ima: measure kexec load and exec events as critical data
steven chen
- [PATCH v1 1/3] landlock: Fix documentation for landlock_create_ruleset(2)
Mickaël Salaün
- [PATCH v1 2/3] landlock: Fix documentation for landlock_restrict_self(2)
Mickaël Salaün
- [PATCH v1 3/3] landlock: Update log documentation
Mickaël Salaün
- [PATCH v2 security-next 1/4] security: Hornet LSM
Blaise Boscaccy
- [RFC PATCH] lsm: Add Rust bindings with example LSM
Lukas Fischer
- [PATCH 1/2] apparmor: shift ouid when mediating hard links in userns
Gabriel Totev
- [PATCH 2/2] apparmor: shift uid when mediating af_unix in userns
Gabriel Totev
- [PATCH RESEND v17 0/3] binder: report txn errors via generic netlink
Li Li
- [PATCH RESEND v17 1/3] lsm, selinux: Add setup_report permission to binder
Li Li
- [PATCH RESEND v17 2/3] binder: report txn errors via generic netlink
Li Li
- [PATCH RESEND v17 3/3] binder: transaction report binder_features flag
Li Li
- [PATCH v12 0/9] ima: kexec: measure events between kexec load and execute
Stefan Berger
- [PATCH v12 1/9] ima: rename variable the seq_file "file" to "ima_kexec_file"
Baoquan He
- [PATCH v12 2/9] ima: define and call ima_alloc_kexec_file_buf()
Baoquan He
- [PATCH v12 3/9] kexec: define functions to map and unmap segments
Baoquan He
- [RFC PATCH] security/apparmor: use kfree_sensitive() in unpack_secmark()
Zilin Guan
- [PATCH v12 4/9] ima: kexec: skip IMA segment validation after kexec soft reboot
Baoquan He
- [PATCH v12 5/9] ima: kexec: define functions to copy IMA log at soft boot
Baoquan He
- [PATCH v12 8/9] ima: make the kexec extra memory configurable
Baoquan He
- [PATCH v12 9/9] ima: measure kexec load and exec events as critical data
Baoquan He
- [RFC PATCH 10/29] lsm: cleanup the LSM blob size code
Fan Wu
- [RFC PATCH 10/29] lsm: cleanup the LSM blob size code
Kees Cook
- [RFC PATCH 10/29] lsm: cleanup the LSM blob size code
Fan Wu
- [PATCH v2 security-next 1/4] security: Hornet LSM
Paul Moore
- [PATCH v2 security-next 1/4] security: Hornet LSM
James Bottomley
- [PATCH v12 0/9] ima: kexec: measure events between kexec load and execute
steven chen
- [PATCH v12 2/9] ima: define and call ima_alloc_kexec_file_buf()
steven chen
- [PATCH v12 3/9] kexec: define functions to map and unmap segments
steven chen
- [PATCH] RDMA/uverbs: Consider capability of the process that opens the file
Parav Pandit
- [PATCH v12 4/9] ima: kexec: skip IMA segment validation after kexec soft reboot
steven chen
- [PATCH v12 5/9] ima: kexec: define functions to copy IMA log at soft boot
steven chen
- [PATCH v12 8/9] ima: make the kexec extra memory configurable
steven chen
- [PATCH v12 9/9] ima: measure kexec load and exec events as critical data
steven chen
- [PATCH] RDMA/uverbs: Consider capability of the process that opens the file
Serge E. Hallyn
- [PATCH] RDMA/uverbs: Consider capability of the process that opens the file
Parav Pandit
- [PATCH] landlock: Work around randstruct unnamed static initializer support
Kees Cook
- [PATCH v12 3/9] kexec: define functions to map and unmap segments
Baoquan He
- [PATCH] RDMA/uverbs: Consider capability of the process that opens the file
Serge E. Hallyn
- [PATCH] RDMA/uverbs: Consider capability of the process that opens the file
Parav Pandit
- [PATCH] RDMA/uverbs: Consider capability of the process that opens the file
Serge E. Hallyn
- [PATCH] RDMA/uverbs: Consider capability of the process that opens the file
Parav Pandit
- [PATCH v12 3/9] kexec: define functions to map and unmap segments
Mimi Zohar
- [PATCH v12 3/9] kexec: define functions to map and unmap segments
Mimi Zohar
- [PATCH RESEND v17 2/3] binder: report txn errors via generic netlink
Simon Horman
- [PATCH RESEND v17 1/3] lsm, selinux: Add setup_report permission to binder
Simon Horman
- [PATCH] RDMA/uverbs: Consider capability of the process that opens the file
Serge E. Hallyn
- [PATCH v2 security-next 1/4] security: Hornet LSM
Paul Moore
- [PATCH v2 security-next 1/4] security: Hornet LSM
James Bottomley
- [RFC PATCH] lsm: Add Rust bindings with example LSM
Paul Moore
- [PATCH v2 security-next 1/4] security: Hornet LSM
Alexei Starovoitov
- [PATCH v12 3/9] kexec: define functions to map and unmap segments
steven chen
- [PATCH v12 3/9] kexec: define functions to map and unmap segments
Mimi Zohar
- [PATCH v12 3/9] kexec: define functions to map and unmap segments
steven chen
- [PATCH v2 security-next 1/4] security: Hornet LSM
Paul Moore
- [PATCH v13 0/9] ima: kexec: measure events between kexec load and execute
steven chen
- [PATCH v13 1/9] ima: rename variable the seq_file "file" to "ima_kexec_file"
steven chen
- [PATCH v13 2/9] ima: define and call ima_alloc_kexec_file_buf()
steven chen
- [PATCH v13 3/9] kexec: define functions to map and unmap segments
steven chen
- [PATCH v13 4/9] ima: kexec: skip IMA segment validation after kexec soft reboot
steven chen
- [PATCH v13 5/9] ima: kexec: define functions to copy IMA log at soft boot
steven chen
- [PATCH v13 6/9] ima: kexec: move IMA log copy from kexec load to execute
steven chen
- [PATCH v13 7/9] ima: verify if the segment size has changed
steven chen
- [PATCH v13 8/9] ima: make the kexec extra memory configurable
steven chen
- [PATCH v13 9/9] ima: measure kexec load and exec events as critical data
steven chen
- [PATCH] lsm: Move security_netlink_send to under CONFIG_SECURITY_NETWORK
Song Liu
- [PATCH v2 security-next 1/4] security: Hornet LSM
Alexei Starovoitov
- [PATCH AUTOSEL 6.14 19/30] hardening: Disable GCC randstruct for COMPILE_TEST
Sasha Levin
- [PATCH AUTOSEL 6.12 16/23] hardening: Disable GCC randstruct for COMPILE_TEST
Sasha Levin
- [PATCH AUTOSEL 6.6 10/15] hardening: Disable GCC randstruct for COMPILE_TEST
Sasha Levin
- [PATCH AUTOSEL 6.1 08/12] hardening: Disable GCC randstruct for COMPILE_TEST
Sasha Levin
- [PATCH v2 security-next 1/4] security: Hornet LSM
Paul Moore
- [PATCH RESEND v17 2/3] binder: report txn errors via generic netlink
Li Li
- [PATCH RESEND v17 1/3] lsm, selinux: Add setup_report permission to binder
Li Li
- [PATCH v5] hwmon: (pmbus/tps53679) Add support for TPS53685
Chiang Brian
- [RFC PATCH] lsm: Add Rust bindings with example LSM
Lukas Fischer
- [PATCH] landlock: Work around randstruct unnamed static initializer support
Mickaël Salaün
- [PATCH] RDMA/uverbs: Consider capability of the process that opens the file
Jason Gunthorpe
- [PATCH] landlock: Work around randstruct unnamed static initializer support
Arnd Bergmann
- [PATCH] RDMA/uverbs: Consider capability of the process that opens the file
Serge E. Hallyn
- [PATCH v5] hwmon: (pmbus/tps53679) Add support for TPS53685
Guenter Roeck
- [PATCH v4 3/3] fs: introduce getfsxattrat and setfsxattrat syscalls
Christian Brauner
- [PATCH v4 3/3] fs: introduce getfsxattrat and setfsxattrat syscalls
Christian Brauner
- [PATCH] landlock: Work around randstruct unnamed static initializer support
Kees Cook
- [PATCH v4 3/3] fs: introduce getfsxattrat and setfsxattrat syscalls
Christian Brauner
- [PATCH] RDMA/uverbs: Consider capability of the process that opens the file
Jason Gunthorpe
- [RFC PATCH] lsm: Add Rust bindings with example LSM
Paul Moore
- [PATCH] RDMA/uverbs: Consider capability of the process that opens the file
Serge E. Hallyn
- [PATCH RFC v7 3/8] security: Export security_inode_init_security_anon for KVM guest_memfd
David Hildenbrand
- [RFC PATCH v3 00/19] Support socket access-control
Mickaël Salaün
- [PATCH RFC v7 3/8] security: Export security_inode_init_security_anon for KVM guest_memfd
David Hildenbrand
- [PATCH] lsm: make SECURITY_PATH always enabled
Song Liu
- [PATCH] lsm: Move security_netlink_send to under CONFIG_SECURITY_NETWORK
Paul Moore
- [PATCH] lsm: make SECURITY_PATH always enabled
Paul Moore
- [PATCH] lsm: make SECURITY_PATH always enabled
Song Liu
- [PATCH] lsm: make SECURITY_PATH always enabled
Paul Moore
- [PATCH v13 3/9] kexec: define functions to map and unmap segments
Mimi Zohar
- [PATCH] lsm: make SECURITY_PATH always enabled
Song Liu
- [PATCH v4 3/3] fs: introduce getfsxattrat and setfsxattrat syscalls
Jan Kara
- listxattr() should return ENOTSUP for sysfs / tmpfs entries, not 0
Pádraig Brady
- [PATCH] RDMA/uverbs: Consider capability of the process that opens the file
Parav Pandit
- [PATCH v2 security-next 1/4] security: Hornet LSM
James Bottomley
- [PATCH] RDMA/uverbs: Consider capability of the process that opens the file
Jason Gunthorpe
- [PATCH] lsm: make SECURITY_PATH always enabled
Paul Moore
- [PATCH v2 security-next 1/4] security: Hornet LSM
Paul Moore
- [PATCH v13 3/9] kexec: define functions to map and unmap segments
steven chen
- [PATCH] RDMA/uverbs: Consider capability of the process that opens the file
Eric W. Biederman
- [PATCH] RDMA/uverbs: Consider capability of the process that opens the file
Parav Pandit
- [PATCH] RDMA/uverbs: Consider capability of the process that opens the file
Jason Gunthorpe
- [PATCH v13 3/9] kexec: define functions to map and unmap segments
Mimi Zohar
- [PATCH] landlock: Work around randstruct unnamed static initializer support
Mickaël Salaün
- [PATCH] lsm: make SECURITY_PATH always enabled
Song Liu
- [PATCH] lsm: make SECURITY_PATH always enabled
Paul Moore
- [PATCH v4 3/3] fs: introduce getfsxattrat and setfsxattrat syscalls
Christian Brauner
- [PATCH] RDMA/uverbs: Consider capability of the process that opens the file
Parav Pandit
- [PATCH] vfs,shmem,kernfs: fix listxattr to include security.* xattrs
Stephen Smalley
- [PATCH] vfs,shmem,kernfs: fix listxattr to include security.* xattrs
Greg Kroah-Hartman
- [PATCH] vfs, shmem, kernfs: fix listxattr to include security.* xattrs
Stephen Smalley
- [PATCH] RDMA/uverbs: Consider capability of the process that opens the file
Jason Gunthorpe
- [PATCH v13 0/9] ima: kexec: measure events between kexec load and execute
Baoquan He
- [PATCH] vfs, shmem, kernfs: fix listxattr to include security.* xattrs
Stephen Smalley
- [PATCH] fs/xattr.c: fix simple_xattr_list to always include security.* xattrs
Stephen Smalley
- [PATCH] fs/xattr.c: fix simple_xattr_list to always include security.* xattrs
Stephen Smalley
- [PATCH] vfs, shmem, kernfs: fix listxattr to include security.* xattrs
Stephen Smalley
- [PATCH v4 3/3] fs: introduce getfsxattrat and setfsxattrat syscalls
Andrey Albershteyn
- [GIT PULL] Landlock fix for v6.15-rc4
Mickaël Salaün
- [PATCH v13 0/9] ima: kexec: measure events between kexec load and execute
steven chen
- [GIT PULL] Landlock fix for v6.15-rc4
pr-tracker-bot at kernel.org
- [WTF][landlock] d_is_negative(fd_file(f)->f_path.dentry) ???
Al Viro
- [PATCH v3 1/5] Audit: Create audit_stamp structure
Paul Moore
- [PATCH v3 2/5] LSM: security_lsmblob_to_secctx module selection
Paul Moore
- [PATCH v3 3/5] Audit: Add record for multiple task security contexts
Paul Moore
- [PATCH v3 4/5] Audit: multiple subject lsm values for netlabel
Paul Moore
- [PATCH v3 5/5] Audit: Add record for multiple object contexts
Paul Moore
- [PATCH v2 security-next 1/4] security: Hornet LSM
Alexei Starovoitov
- [RFC PATCH] security/apparmor: use kfree_sensitive() in unpack_secmark()
Zilin Guan
- [PATCH] fs/xattr.c: fix simple_xattr_list to always include security.* xattrs
Christian Brauner
- [PATCH] securityfs: fix missing of d_delete() in securityfs_remove()
alexjlzheng at gmail.com
- [WTF][landlock] d_is_negative(fd_file(f)->f_path.dentry) ???
Mickaël Salaün
- [PATCH] landlock: Work around randstruct unnamed static initializer support
Günther Noack
- [PATCH] RDMA/uverbs: Consider capability of the process that opens the file
Parav Pandit
- [PATCH] RDMA/uverbs: Consider capability of the process that opens the file
Jason Gunthorpe
- [PATCH] RDMA/uverbs: Consider capability of the process that opens the file
Parav Pandit
- [RFC PATCH v3 00/19] Support socket access-control
Günther Noack
- [PATCH] RDMA/uverbs: Consider capability of the process that opens the file
Serge E. Hallyn
- [PATCH] RDMA/uverbs: Consider capability of the process that opens the file
Serge E. Hallyn
- [PATCH v2 security-next 1/4] security: Hornet LSM
James Bottomley
- [PATCH] RDMA/uverbs: Consider capability of the process that opens the file
Serge E. Hallyn
- [PATCH] RDMA/uverbs: Consider capability of the process that opens the file
Jason Gunthorpe
- [PATCH] RDMA/uverbs: Consider capability of the process that opens the file
Parav Pandit
- [PATCH] RDMA/uverbs: Consider capability of the process that opens the file
Serge E. Hallyn
- [PATCH] fs/xattr.c: fix simple_xattr_list to always include security.* xattrs
Stephen Smalley
- [PATCH] RDMA/uverbs: Consider capability of the process that opens the file
Parav Pandit
- [PATCH] RDMA/uverbs: Consider capability of the process that opens the file
Serge E. Hallyn
- [PATCH] RDMA/uverbs: Consider capability of the process that opens the file
Eric W. Biederman
- [PATCH] RDMA/uverbs: Consider capability of the process that opens the file
Eric W. Biederman
- [PATCH] RDMA/uverbs: Consider capability of the process that opens the file
Parav Pandit
- [PATCH] RDMA/uverbs: Consider capability of the process that opens the file
Jason Gunthorpe
- [PATCH] fs/xattr.c: fix simple_xattr_list to always include security.* xattrs
Casey Schaufler
- [PATCH] RDMA/uverbs: Consider capability of the process that opens the file
Eric W. Biederman
- [PATCH v4 3/3] fs: introduce getfsxattrat and setfsxattrat syscalls
Andrey Albershteyn
- [PATCH] RDMA/uverbs: Consider capability of the process that opens the file
Parav Pandit
- [PATCH] RDMA/uverbs: Consider capability of the process that opens the file
Jason Gunthorpe
- [PATCH v2 security-next 1/4] security: Hornet LSM
Blaise Boscaccy
- [PATCH] securityfs: fix missing of d_delete() in securityfs_remove()
Paul Moore
- [PATCH] fs/xattr.c: fix simple_xattr_list to always include security.* xattrs
Casey Schaufler
- [PATCH] securityfs: fix missing of d_delete() in securityfs_remove()
Jinliang Zheng
- [PATCH] securityfs: fix missing of d_delete() in securityfs_remove()
Fan Wu
- [PATCH] securityfs: fix missing of d_delete() in securityfs_remove()
Jinliang Zheng
- [PATCH] fs/xattr.c: fix simple_xattr_list to always include security.* xattrs
Paul Moore
- [PATCH 0/3] randstruct: gcc-plugin: Remove bogus void member
Kees Cook
- [PATCH 1/3] randstruct: gcc-plugin: Remove bogus void member
Kees Cook
- [PATCH 2/3] lib/tests: Add randstruct KUnit test
Kees Cook
- [PATCH 3/3] Revert "hardening: Disable GCC randstruct for COMPILE_TEST"
Kees Cook
- [PATCH 2/3] lib/tests: Add randstruct KUnit test
kernel test robot
- [PATCH 2/3] lib/tests: Add randstruct KUnit test
kernel test robot
- [PATCH 2/3] lib/tests: Add randstruct KUnit test
kernel test robot
- [PATCH] net:ipv4: Use shift left 2 to calculate the length of the IPv4 header.
Chaohai Chen
- [PATCH] RDMA/uverbs: Consider capability of the process that opens the file
Serge E. Hallyn
- [PATCH] fs/xattr.c: fix simple_xattr_list to always include security.* xattrs
Christian Brauner
- [PATCH] fs/xattr.c: fix simple_xattr_list to always include security.* xattrs
Christian Brauner
- [PATCH v4 3/3] fs: introduce getfsxattrat and setfsxattrat syscalls
Christian Brauner
- [PATCH] security/commoncap: don't assume "setid" if all ids are identical
Max Kellermann
- [PATCH] security, fs, nfs, net: update security_inode_listsecurity() interface
Stephen Smalley
- [PATCH] security, fs, nfs, net: update security_inode_listsecurity() interface
Stephen Smalley
- [PATCH] security, fs, nfs, net: update security_inode_listsecurity() interface
Casey Schaufler
- [PATCH] security, fs, nfs, net: update security_inode_listsecurity() interface
Stephen Smalley
- [PATCH] security, fs, nfs, net: update security_inode_listsecurity() interface
Casey Schaufler
- [PATCH] RDMA/uverbs: Consider capability of the process that opens the file
Eric W. Biederman
- [PATCH] apparmor: use SHA-256 library API instead of crypto_shash API
Eric Biggers
- [RFC PATCH] security/apparmor: use kfree_sensitive() in unpack_secmark()
John Johansen
- [PATCH v2] security, fs, nfs, net: update security_inode_listsecurity() interface
Stephen Smalley
- [PATCH] net:ipv4: Use shift left 2 to calculate the length of the IPv4 header.
Jakub Kicinski
- how are new CAP_* added? CAP_{DISPLAY,DRM,GPU}?
Luigi Semenzato
- how are new CAP_* added? CAP_{DISPLAY,DRM,GPU}?
Casey Schaufler
- how are new CAP_* added? CAP_{DISPLAY,DRM,GPU}?
Luigi Semenzato
- [PATCH] RDMA/uverbs: Consider capability of the process that opens the file
Eric W. Biederman
- [PATCH v2] security,fs,nfs,net: update security_inode_listsecurity() interface
Christian Brauner
- [PATCH] RDMA/uverbs: Consider capability of the process that opens the file
Parav Pandit
- [RFC PATCH v3 00/19] Support socket access-control
Mikhail Ivanov
- [PATCH v2] security, fs, nfs, net: update security_inode_listsecurity() interface
Stephen Smalley
- [PATCH v3 0/9] module: Introduce hash-based integrity checking
Thomas Weißschuh
- [PATCH v3 1/9] powerpc/ima: Drop unnecessary check for CONFIG_MODULE_SIG
Thomas Weißschuh
- [PATCH v3 2/9] ima: efi: Drop unnecessary check for CONFIG_MODULE_SIG/CONFIG_KEXEC_SIG
Thomas Weißschuh
- [PATCH v3 3/9] kbuild: add stamp file for vmlinux BTF data
Thomas Weißschuh
- [PATCH v3 4/9] kbuild: generate module BTF based on vmlinux.unstripped
Thomas Weißschuh
- [PATCH v3 5/9] module: Make module loading policy usable without MODULE_SIG
Thomas Weißschuh
- [PATCH v3 6/9] module: Move integrity checks into dedicated function
Thomas Weißschuh
- [PATCH v3 7/9] module: Move lockdown check into generic module loader
Thomas Weißschuh
- [PATCH v3 8/9] lockdown: Make the relationship to MODULE_SIG a dependency
Thomas Weißschuh
- [PATCH v3 9/9] module: Introduce hash-based integrity checking
Thomas Weißschuh
- [PATCH v3 0/9] module: Introduce hash-based integrity checking
James Bottomley
- how are new CAP_* added? CAP_{DISPLAY,DRM,GPU}?
Serge Hallyn
- [PATCH v13 5/9] ima: kexec: define functions to copy IMA log at soft boot
Stefan Berger
- [PATCH v13 9/9] ima: measure kexec load and exec events as critical data
Stefan Berger
- [PATCH v13 7/9] ima: verify if the segment size has changed
Stefan Berger
- [PATCH v13 2/9] ima: define and call ima_alloc_kexec_file_buf()
Stefan Berger
- [PATCH v13 8/9] ima: make the kexec extra memory configurable
Stefan Berger
- [RFC PATCH v1 0/1] ipe: added script enforcement with BPRM check
Jasjiv Singh
- [RFC PATCH v1 1/1] ipe: add script enforcement with BPRM check
Jasjiv Singh
- [PATCH v13 8/9] ima: make the kexec extra memory configurable
steven chen
- [PATCH v3 8/9] lockdown: Make the relationship to MODULE_SIG a dependency
Paul Moore
- [PATCH v2] security, fs, nfs, net: update security_inode_listsecurity() interface
Paul Moore
- [PATCH AUTOSEL 6.14 25/39] ima: process_measurement() needlessly takes inode_lock() on MAY_READ
Sasha Levin
- [PATCH AUTOSEL 6.12 24/37] ima: process_measurement() needlessly takes inode_lock() on MAY_READ
Sasha Levin
- [PATCH AUTOSEL 6.6 17/21] ima: process_measurement() needlessly takes inode_lock() on MAY_READ
Sasha Levin
- [PATCH] RDMA/uverbs: Consider capability of the process that opens the file
Eric W. Biederman
- [PATCH] RDMA/uverbs: Consider capability of the process that opens the file
Parav Pandit
- [PATCH] KEYS: Reduce smp_mb() calls in key_put()
Jarkko Sakkinen
- [PATCH v3 4/5] Audit: multiple subject lsm values for netlabel
Casey Schaufler
- [PATCH v3 4/5] Audit: multiple subject lsm values for netlabel
Paul Moore
- [PATCH 2/3] lib/tests: Add randstruct KUnit test
Kees Cook
- [PATCH 2/3] lib/tests: Add randstruct KUnit test
Kees Cook
- [PATCH v3 4/5] Audit: multiple subject lsm values for netlabel
Casey Schaufler
- [RFC PATCH v1 0/1] ipe: added script enforcement with BPRM check
Fan Wu
- [RFC PATCH v1 1/1] ipe: add script enforcement with BPRM check
Fan Wu
Last message date:
Wed Apr 30 23:29:44 UTC 2025
Archived on: Wed Apr 30 23:30:04 UTC 2025
This archive was generated by
Pipermail 0.09 (Mailman edition).