September 2025 Archives by subject
Starting: Mon Sep 1 02:58:16 UTC 2025
Ending: Tue Sep 30 23:19:58 UTC 2025
Messages: 662
- [bug report] [regression?] bpf lsm breaks /proc/*/attr/current with security= on commandline
Filip Hejsek
- [bug report] [regression?] bpf lsm breaks /proc/*/attr/current with security= on commandline
Paul Moore
- [bug report] [regression?] bpf lsm breaks /proc/*/attr/current with security= on commandline
Filip Hejsek
- [bug report] [regression?] bpf lsm breaks /proc/*/attr/current with security= on commandline
Paul Moore
- [bug report] [regression?] bpf lsm breaks /proc/*/attr/current with security= on commandline
Filip Hejsek
- [bug report] [regression?] bpf lsm breaks /proc/*/attr/current with security= on commandline
Paul Moore
- [GIT PULL] lsm/lsm-pr-20250926
Paul Moore
- [GIT PULL] lsm/lsm-pr-20250926
pr-tracker-bot at kernel.org
- [GIT PULL] selinux/selinux-pr-20250926
Paul Moore
- [GIT PULL] selinux/selinux-pr-20250926
Linus Torvalds
- [GIT PULL] selinux/selinux-pr-20250926
Paul Moore
- [GIT PULL] selinux/selinux-pr-20250926
pr-tracker-bot at kernel.org
- [PATCH 0/4] tpm2-session: correct disperancies
Jarkko Sakkinen
- [PATCH 1/4] tpm: Use -EPERM as fallback error code in tpm_ret_to_err
Jarkko Sakkinen
- [PATCH 1/4] tpm: Use -EPERM as fallback error code in tpm_ret_to_err
Jonathan McDowell
- [PATCH 1/4] tpm: Use -EPERM as fallback error code in tpm_ret_to_err
Jarkko Sakkinen
- [PATCH 1/6] security_dentry_init_security(): constify qstr argument
Al Viro
- [PATCH 1/6] security_dentry_init_security(): constify qstr argument
Casey Schaufler
- [PATCH 1/6] security_dentry_init_security(): constify qstr argument
Paul Moore
- [PATCH 1/6] security_dentry_init_security(): constify qstr argument
Christian Brauner
- [PATCH 2/4] tpm2-sessions: Remove unused parameter from tpm_buf_append_auth
Jarkko Sakkinen
- [PATCH 2/4] tpm2-sessions: Remove unused parameter from tpm_buf_append_auth
Jonathan McDowell
- [PATCH 2/4] tpm2-sessions: Remove unused parameter from tpm_buf_append_auth
Jarkko Sakkinen
- [PATCH 2/6] exfat_find(): constify qstr argument
Al Viro
- [PATCH 2/6] exfat_find(): constify qstr argument
Namjae Jeon
- [PATCH 2/6] exfat_find(): constify qstr argument
Christian Brauner
- [PATCH 3/4] tpm2-sessions: Remove unnecessary wrapper
Jarkko Sakkinen
- [PATCH 3/4] tpm2-sessions: Remove unnecessary wrapper
Ben Boeckel
- [PATCH 3/4] tpm2-sessions: Remove unnecessary wrapper
Jarkko Sakkinen
- [PATCH 3/6] afs_edit_dir_{add,remove}(): constify qstr argument
Al Viro
- [PATCH 3/6] afs_edit_dir_{add,remove}(): constify qstr argument
Christian Brauner
- [PATCH 31/39] convert selinuxfs
Al Viro
- [PATCH 31/39] convert selinuxfs
Paul Moore
- [PATCH 31/39] convert selinuxfs
Stephen Smalley
- [PATCH 31/39] convert selinuxfs
Al Viro
- [PATCH 31/39] convert selinuxfs
John Johansen
- [PATCH 4/4] keys, trusted: Remove redundant helper
Jarkko Sakkinen
- [PATCH 4/4] keys, trusted: Remove redundant helper
Jonathan McDowell
- [PATCH 4/4] keys, trusted: Remove redundant helper
Jarkko Sakkinen
- [PATCH 4/6] afs_dir_search: constify qstr argument
Al Viro
- [PATCH 4/6] afs_dir_search: constify qstr argument
Christian Brauner
- [PATCH 5/6] generic_ci_validate_strict_name(): constify name argument
Al Viro
- [PATCH 5/6] generic_ci_validate_strict_name(): constify name argument
Christian Brauner
- [PATCH 6/6] make it easier to catch those who try to modify ->d_name
Al Viro
- [PATCH 6/6] make it easier to catch those who try to modify ->d_name
Christian Brauner
- [PATCH] Audit: Fix skb leak when audit rate limit is exceeded
Gerald Yang
- [PATCH] Audit: Fix skb leak when audit rate limit is exceeded
Paul Moore
- [PATCH] Documentation/landlock: Make docs in cred.h and domain.h visible.
Tingmao Wang
- [PATCH] ima,evm: move initcalls to the LSM framework
Roberto Sassu
- [PATCH] ima,evm: move initcalls to the LSM framework
Paul Moore
- [PATCH] ima,evm: move initcalls to the LSM framework
Mimi Zohar
- [PATCH] ima,evm: move initcalls to the LSM framework
Paul Moore
- [PATCH] ima,evm: move initcalls to the LSM framework
Mimi Zohar
- [PATCH] ima,evm: move initcalls to the LSM framework
Paul Moore
- [PATCH] ima,evm: move initcalls to the LSM framework
Roberto Sassu
- [PATCH] ima: don't clear IMA_DIGSIG flag when setting non-IMA xattr
Coiby Xu
- [PATCH] ima: don't clear IMA_DIGSIG flag when setting non-IMA xattr
Mimi Zohar
- [PATCH] ima: don't clear IMA_DIGSIG flag when setting non-IMA xattr
Coiby Xu
- [PATCH] ima: don't clear IMA_DIGSIG flag when setting non-IMA xattr
Mimi Zohar
- [PATCH] ima: don't clear IMA_DIGSIG flag when setting non-IMA xattr
Mimi Zohar
- [PATCH] ima: don't clear IMA_DIGSIG flag when setting non-IMA xattr
Coiby Xu
- [PATCH] ima: don't clear IMA_DIGSIG flag when setting non-IMA xattr
Mimi Zohar
- [PATCH] ima: don't clear IMA_DIGSIG flag when setting non-IMA xattr
Coiby Xu
- [PATCH] ima: don't clear IMA_DIGSIG flag when setting non-IMA xattr
Coiby Xu
- [PATCH] ima: Fall back to default kernel module signature verification
Coiby Xu
- [PATCH] ima: Fall back to default kernel module signature verification
Mimi Zohar
- [PATCH] ima: Fall back to default kernel module signature verification
Mimi Zohar
- [PATCH] ima: setting security.ima to fix security.evm for a file with IMA signature
Coiby Xu
- [PATCH] ima: setting security.ima to fix security.evm for a file with IMA signature
Mimi Zohar
- [PATCH] ima: setting security.ima to fix security.evm for a file with IMA signature
Coiby Xu
- [PATCH] ima: setting security.ima to fix security.evm for a file with IMA signature
Mimi Zohar
- [PATCH] ima: setting security.ima to fix security.evm for a file with IMA signature
Mimi Zohar
- [PATCH] ima: setting security.ima to fix security.evm for a file with IMA signature
Coiby Xu
- [PATCH] ima: setting security.ima to fix security.evm for a file with IMA signature
Mimi Zohar
- [PATCH] ima: setting security.ima to fix security.evm for a file with IMA signature
Coiby Xu
- [PATCH] ima: setting security.ima to fix security.evm for a file with IMA signature
Coiby Xu
- [PATCH] memfd,selinux: call security_inode_init_security_anon
Stephen Smalley
- [PATCH] memfd,selinux: call security_inode_init_security_anon
Paul Moore
- [PATCH] memfd,selinux: call security_inode_init_security_anon
Hugh Dickins
- [PATCH] memfd,selinux: call security_inode_init_security_anon
Paul Moore
- [PATCH] memfd,selinux: call security_inode_init_security_anon
Thiébaud Weksteen
- [PATCH] memfd,selinux: call security_inode_init_security_anon
Hugh Dickins
- [PATCH] pid: use ns_capable_noaudit() when determining net sysctl permissions
Christian Göttsche
- [PATCH] pid: use ns_capable_noaudit() when determining net sysctl permissions
Paul Moore
- [PATCH] pid: use ns_capable_noaudit() when determining net sysctl permissions
Serge E. Hallyn
- [PATCH] pid: use ns_capable_noaudit() when determining net sysctl permissions
Serge E. Hallyn
- [PATCH] pid: use ns_capable_noaudit() when determining net sysctl permissions
Christian Brauner
- [PATCH] pid: use ns_capable_noaudit() when determining net sysctl permissions
Serge E. Hallyn
- [PATCH] pid: use ns_capable_noaudit() when determining net sysctl permissions
Serge E. Hallyn
- [PATCH] pid: use ns_capable_noaudit() when determining net sysctl permissions
Christian Brauner
- [PATCH] rcu: Remove redundant rcu_read_lock/unlock() in spin_lock critical sections
pengdonglin
- [PATCH] rcu: Remove redundant rcu_read_lock/unlock() in spin_lock critical sections
Waiman Long
- [PATCH] rcu: Remove redundant rcu_read_lock/unlock() in spin_lock critical sections
Sebastian Andrzej Siewior
- [PATCH] rcu: Remove redundant rcu_read_lock/unlock() in spin_lock critical sections
Waiman Long
- [PATCH] security: CONFIG_LSM: LSM can depend on SECURITY
Paul Moore
- [PATCH] security: keys: use menuconfig for KEYS symbol
Paul Moore
- [PATCH] security: keys: use menuconfig for KEYS symbol
Jarkko Sakkinen
- [PATCH] smack: /smack/doi: accept previously used values
Konstantin Andreev
- [PATCH] smack: /smack/doi must be > 0
Konstantin Andreev
- [PATCH] tpm2-sessions: Remove unnecessary wrapper
Jarkko Sakkinen
- [PATCH] tpm2-sessions: Remove unnecessary wrapper
Jonathan McDowell
- [PATCH] tpm2-sessions: Remove unnecessary wrapper
Jarkko Sakkinen
- [PATCH] tpm: Disable TPM2_TCG_HMAC by default
Jonathan McDowell
- [PATCH] tpm: Disable TPM2_TCG_HMAC by default
Jarkko Sakkinen
- [PATCH] tpm: Disable TPM2_TCG_HMAC by default
Chris Fenner
- [PATCH] tpm: Disable TPM2_TCG_HMAC by default
Jarkko Sakkinen
- [PATCH] tpm: Use -EPERM as fallback error code in tpm_ret_to_err
Jarkko Sakkinen
- [PATCH] tpm: Use -EPERM as fallback error code in tpm_ret_to_err
Stefano Garzarella
- [PATCH] tpm: Use -EPERM as fallback error code in tpm_ret_to_err
Jarkko Sakkinen
- [PATCH] tpm: use a map for tpm2_calc_ordinal_duration()
Jarkko Sakkinen
- [PATCH] tpm: use a map for tpm2_calc_ordinal_duration()
Jarkko Sakkinen
- [PATCH] x86/bpf: use bpf_capable() instead of capable(CAP_SYS_ADMIN)
Alexei Starovoitov
- [PATCH bpf-next 0/2] BPF signature hash chains
Blaise Boscaccy
- [PATCH bpf-next 1/2] bpf: Add hash chain signature support for arbitrary maps
Blaise Boscaccy
- [PATCH bpf-next 1/2] bpf: Add hash chain signature support for arbitrary maps
Quentin Monnet
- [PATCH bpf-next 1/2] bpf: Add hash chain signature support for arbitrary maps
Blaise Boscaccy
- [PATCH bpf-next 2/2] selftests/bpf: Enable map verification for some lskel tests
Blaise Boscaccy
- [PATCH bpf-next v2 0/3] BPF signature hash chains
Blaise Boscaccy
- [PATCH bpf-next v2 1/3] bpf: Add hash chain signature support for arbitrary maps
Blaise Boscaccy
- [PATCH bpf-next v2 2/3] selftests/bpf: Enable map verification for some lskel tests
Blaise Boscaccy
- [PATCH bpf-next v2 3/3] bpftool: Add support for signing program and map hash chains
Blaise Boscaccy
- [PATCH bpf-next v7 0/5] Signed BPF programs
KP Singh
- [PATCH bpf-next v7 0/5] Signed BPF programs
Paul Moore
- [PATCH bpf-next v7 0/5] Signed BPF programs
patchwork-bot+netdevbpf at kernel.org
- [PATCH bpf-next v7 1/5] bpf: Implement signature verification for BPF programs
KP Singh
- [PATCH bpf-next v7 2/5] libbpf: Update light skeleton for signing
KP Singh
- [PATCH bpf-next v7 3/5] libbpf: Embed and verify the metadata hash in the loader
KP Singh
- [PATCH bpf-next v7 4/5] bpftool: Add support for signing BPF programs
KP Singh
- [PATCH bpf-next v7 4/5] bpftool: Add support for signing BPF programs
Quentin Monnet
- [PATCH bpf-next v7 4/5] bpftool: Add support for signing BPF programs
Alexei Starovoitov
- [PATCH bpf-next v7 4/5] bpftool: Add support for signing BPF programs
Quentin Monnet
- [PATCH bpf-next v7 5/5] selftests/bpf: Enable signature verification for some lskel tests
KP Singh
- [PATCHES] simple part of ->d_name stuff
Al Viro
- [PATCHES] simple part of ->d_name stuff
David Howells
- [PATCHES] simple part of ->d_name stuff
Linus Torvalds
- [PATCH kvm-next V11 0/7] Add NUMA mempolicy support for KVM guest-memfd
David Hildenbrand
- [PATCH kvm-next V11 0/7] Add NUMA mempolicy support for KVM guest-memfd
Kalra, Ashish
- [PATCH kvm-next V11 4/7] KVM: guest_memfd: Use guest mem inodes instead of anonymous inodes
Sean Christopherson
- [PATCH kvm-next V11 4/7] KVM: guest_memfd: Use guest mem inodes instead of anonymous inodes
Garg, Shivank
- [PATCH kvm-next V11 4/7] KVM: guest_memfd: Use guest mem inodes instead of anonymous inodes
David Hildenbrand
- [PATCH kvm-next V11 4/7] KVM: guest_memfd: Use guest mem inodes instead of anonymous inodes
Sean Christopherson
- [PATCH kvm-next V11 4/7] KVM: guest_memfd: Use guest mem inodes instead of anonymous inodes
Fuad Tabba
- [PATCH kvm-next V11 4/7] KVM: guest_memfd: Use guest mem inodes instead of anonymous inodes
David Hildenbrand
- [PATCH kvm-next V11 4/7] KVM: guest_memfd: Use guest mem inodes instead of anonymous inodes
Sean Christopherson
- [PATCH kvm-next V11 5/7] KVM: guest_memfd: Add slab-allocated inode cache
Sean Christopherson
- [PATCH kvm-next V11 5/7] KVM: guest_memfd: Add slab-allocated inode cache
Sean Christopherson
- [PATCH kvm-next V11 6/7] KVM: guest_memfd: Enforce NUMA mempolicy using shared policy
Sean Christopherson
- [PATCH kvm-next V11 6/7] KVM: guest_memfd: Enforce NUMA mempolicy using shared policy
Sean Christopherson
- [PATCH kvm-next V11 7/7] KVM: guest_memfd: selftests: Add tests for mmap and NUMA policy support
Sean Christopherson
- [PATCH kvm-next V11 7/7] KVM: guest_memfd: selftests: Add tests for mmap and NUMA policy support
Sean Christopherson
- [PATCH kvm-next V11 7/7] KVM: guest_memfd: selftests: Add tests for mmap and NUMA policy support
Jason Gunthorpe
- [PATCH kvm-next V11 7/7] KVM: guest_memfd: selftests: Add tests for mmap and NUMA policy support
Sean Christopherson
- [PATCH kvm-next V11 7/7] KVM: guest_memfd: selftests: Add tests for mmap and NUMA policy support
David Hildenbrand
- [PATCH kvm-next V11 7/7] KVM: guest_memfd: selftests: Add tests for mmap and NUMA policy support
David Hildenbrand
- [PATCH kvm-next V11 7/7] KVM: guest_memfd: selftests: Add tests for mmap and NUMA policy support
Garg, Shivank
- [PATCH net-next 0/8] ipv4: icmp: Fix source IP derivation in presence of VRFs
Ido Schimmel
- [PATCH net-next 0/8] ipv4: icmp: Fix source IP derivation in presence of VRFs
Ido Schimmel
- [PATCH net-next 0/8] ipv4: icmp: Fix source IP derivation in presence of VRFs
Jakub Kicinski
- [PATCH net-next 1/8] ipv4: cipso: Simplify IP options handling in cipso_v4_error()
Ido Schimmel
- [PATCH net-next 1/8] ipv4: cipso: Simplify IP options handling in cipso_v4_error()
David Ahern
- [PATCH net-next 1/8] ipv4: cipso: Simplify IP options handling in cipso_v4_error()
Paul Moore
- [PATCH net-next 2/8] ipv4: icmp: Pass IPv4 control block structure as an argument to __icmp_send()
Ido Schimmel
- [PATCH net-next 2/8] ipv4: icmp: Pass IPv4 control block structure as an argument to __icmp_send()
David Ahern
- [PATCH net-next 3/8] ipv4: icmp: Fix source IP derivation in presence of VRFs
Ido Schimmel
- [PATCH net-next 3/8] ipv4: icmp: Fix source IP derivation in presence of VRFs
David Ahern
- [PATCH net-next 4/8] selftests: traceroute: Return correct value on failure
Ido Schimmel
- [PATCH net-next 4/8] selftests: traceroute: Return correct value on failure
David Ahern
- [PATCH net-next 5/8] selftests: traceroute: Use require_command()
Ido Schimmel
- [PATCH net-next 5/8] selftests: traceroute: Use require_command()
David Ahern
- [PATCH net-next 6/8] selftests: traceroute: Reword comment
Ido Schimmel
- [PATCH net-next 7/8] selftests: traceroute: Test traceroute with different source IPs
Ido Schimmel
- [PATCH net-next 7/8] selftests: traceroute: Test traceroute with different source IPs
David Ahern
- [PATCH net-next 8/8] selftests: traceroute: Add VRF tests
Ido Schimmel
- [PATCH net-next 8/8] selftests: traceroute: Add VRF tests
David Ahern
- [PATCH net-next v2 0/8] ipv4: icmp: Fix source IP derivation in presence of VRFs
Ido Schimmel
- [PATCH net-next v2 0/8] ipv4: icmp: Fix source IP derivation in presence of VRFs
patchwork-bot+netdevbpf at kernel.org
- [PATCH net-next v2 1/8] ipv4: cipso: Simplify IP options handling in cipso_v4_error()
Ido Schimmel
- [PATCH net-next v2 1/8] ipv4: cipso: Simplify IP options handling in cipso_v4_error()
Eric Dumazet
- [PATCH net-next v2 2/8] ipv4: icmp: Pass IPv4 control block structure as an argument to __icmp_send()
Ido Schimmel
- [PATCH net-next v2 2/8] ipv4: icmp: Pass IPv4 control block structure as an argument to __icmp_send()
Eric Dumazet
- [PATCH net-next v2 3/8] ipv4: icmp: Fix source IP derivation in presence of VRFs
Ido Schimmel
- [PATCH net-next v2 4/8] selftests: traceroute: Return correct value on failure
Ido Schimmel
- [PATCH net-next v2 5/8] selftests: traceroute: Use require_command()
Ido Schimmel
- [PATCH net-next v2 6/8] selftests: traceroute: Reword comment
Ido Schimmel
- [PATCH net-next v2 7/8] selftests: traceroute: Test traceroute with different source IPs
Ido Schimmel
- [PATCH net-next v2 8/8] selftests: traceroute: Add VRF tests
Ido Schimmel
- [PATCH RFC 0/4] landlock: add LANDLOCK_SCOPE_MEMFD_EXEC execution
Mickaël Salaün
- [PATCH RFC 0/4] landlock: add LANDLOCK_SCOPE_MEMFD_EXEC execution
Abhinav Saxena
- [PATCH RFC 2/4] landlock: implement memfd detection
Mickaël Salaün
- [PATCH RFC 2/4] landlock: implement memfd detection
Mickaël Salaün
- [PATCH v10 0/4] tpm: robust stack allocations
Jarkko Sakkinen
- [PATCH v10 0/4] tpm: robust stack allocations
Jarkko Sakkinen
- [PATCH v10 1/4] tpm: Make TPM buffer allocations more robust
Jarkko Sakkinen
- [PATCH v10 1/4] tpm: Make TPM buffer allocations more robust
kernel test robot
- [PATCH v10 1/4] tpm: Make TPM buffer allocations more robust
Stefano Garzarella
- [PATCH v10 1/4] tpm: Make TPM buffer allocations more robust
Jarkko Sakkinen
- [PATCH v10 1/4] tpm: Make TPM buffer allocations more robust
Stefano Garzarella
- [PATCH v10 2/4] tpm, tpm1-cmd: Use stack for trivial cases
Jarkko Sakkinen
- [PATCH v10 3/4] tpm, tpm2-cmd: Use stack for trivial cases
Jarkko Sakkinen
- [PATCH v10 4/4] tpm_vpm_proxy: Use stack for TPM_CC_SET_LOCALITY
Jarkko Sakkinen
- [PATCH v10 4/4] tpm_vpm_proxy: Use stack for TPM_CC_SET_LOCALITY
Stefano Garzarella
- [PATCH v10 4/4] tpm_vpm_proxy: Use stack for TPM_CC_SET_LOCALITY
Jarkko Sakkinen
- [PATCH v11 0/3] tpm: robust stack allocations
Jarkko Sakkinen
- [PATCH v11 0/3] tpm: robust stack allocations
Jarkko Sakkinen
- [PATCH v11 0/3] tpm: robust stack allocations
Jarkko Sakkinen
- [PATCH v11 1/3] tpm: Make TPM buffer allocations more robust
Jarkko Sakkinen
- [PATCH v11 2/3] tpm: Use TPM_MIN_BUF_SIZE in driver commands
Jarkko Sakkinen
- [PATCH v11 3/3] tpm orchestrate tpm_get_random() in the function
Jarkko Sakkinen
- [PATCH v2 0/2] LSM: Multiple LSM mount options
Casey Schaufler
- [PATCH v2 0/4] nios2: Add architecture support for clone3
Simon Schuster via B4 Relay
- [PATCH v2 0/7] fs/9p: Reuse inode based on path (in addition to qid)
Tingmao Wang
- [PATCH v2 0/7] fs/9p: Reuse inode based on path (in addition to qid)
Tingmao Wang
- [PATCH v2 0/7] fs/9p: Reuse inode based on path (in addition to qid)
Dominique Martinet
- [PATCH v2 0/7] fs/9p: Reuse inode based on path (in addition to qid)
Tingmao Wang
- [PATCH v2 0/7] fs/9p: Reuse inode based on path (in addition to qid)
Christian Schoenebeck
- [PATCH v2 0/7] fs/9p: Reuse inode based on path (in addition to qid)
Dominique Martinet
- [PATCH v2 0/7] fs/9p: Reuse inode based on path (in addition to qid)
Tingmao Wang
- [PATCH v2 0/7] fs/9p: Reuse inode based on path (in addition to qid)
Dominique Martinet
- [PATCH v2 0/7] fs/9p: Reuse inode based on path (in addition to qid)
Christian Schoenebeck
- [PATCH v2 0/7] fs/9p: Reuse inode based on path (in addition to qid)
Tingmao Wang
- [PATCH v2 0/7] fs/9p: Reuse inode based on path (in addition to qid)
Christian Schoenebeck
- [PATCH v2 0/7] fs/9p: Reuse inode based on path (in addition to qid)
Tingmao Wang
- [PATCH v2 0/7] fs/9p: Reuse inode based on path (in addition to qid)
Christian Schoenebeck
- [PATCH v2 0/7] fs/9p: Reuse inode based on path (in addition to qid)
Mickaël Salaün
- [PATCH v2 0/7] fs/9p: Reuse inode based on path (in addition to qid)
Mickaël Salaün
- [PATCH v2 0/7] fs/9p: Reuse inode based on path (in addition to qid)
Tingmao Wang
- [PATCH v2 0/7] fs/9p: Reuse inode based on path (in addition to qid)
Mickaël Salaün
- [PATCH v2 0/7] fs/9p: Reuse inode based on path (in addition to qid)
Tingmao Wang
- [PATCH v2 0/7] fs/9p: Reuse inode based on path (in addition to qid)
Christian Schoenebeck
- [PATCH v2 0/9] tpm: Decouple PCR extend from driver
Jarkko Sakkinen
- [PATCH v2 1/2] evm: fix security.evm for a file with IMA signature
Coiby Xu
- [PATCH v2 1/2] LSM: Add mount opts blob size tracking
Casey Schaufler
- [PATCH v2 1/4] copy_sighand: Handle architectures where sizeof(unsigned long) < sizeof(u64)
Simon Schuster via B4 Relay
- [PATCH v2 1/4] copy_sighand: Handle architectures where sizeof(unsigned long) < sizeof(u64)
Arnd Bergmann
- [PATCH v2 1/4] copy_sighand: Handle architectures where sizeof(unsigned long) < sizeof(u64)
David Hildenbrand
- [PATCH v2 1/7] fs/9p: Add ability to identify inode by path for .L in uncached mode
Tingmao Wang
- [PATCH v2 1/9] tpm: cap PCR bank in tpm2_get_pcr_allocations()
Jarkko Sakkinen
- [PATCH v2 2/2] ima: Add code comments to explain IMA iint cache atomic_flags
Coiby Xu
- [PATCH v2 2/2] LSM: Infrastructure management of the mnt_opts security blob
Casey Schaufler
- [PATCH v2 2/2] selftests: Replace relative includes with non-relative for kselftest.h and kselftest_harness.h
Bala-Vignesh-Reddy
- [PATCH v2 2/4] copy_process: pass clone_flags as u64 across calltree
Simon Schuster via B4 Relay
- [PATCH v2 2/4] copy_process: pass clone_flags as u64 across calltree
Arnd Bergmann
- [PATCH v2 2/4] copy_process: pass clone_flags as u64 across calltree
David Hildenbrand
- [PATCH v2 2/7] fs/9p: add option for path-based inodes
Tingmao Wang
- [PATCH v2 2/9] tpm: Use -EPERM as fallback error code in tpm_ret_to_err
Jarkko Sakkinen
- [PATCH v2 3/4] arch: copy_thread: pass clone_flags as u64
Simon Schuster via B4 Relay
- [PATCH v2 3/4] arch: copy_thread: pass clone_flags as u64
Arnd Bergmann
- [PATCH v2 3/4] arch: copy_thread: pass clone_flags as u64
David Hildenbrand
- [PATCH v2 3/4] arch: copy_thread: pass clone_flags as u64
Andreas Larsson
- [PATCH v2 3/4] arch: copy_thread: pass clone_flags as u64
John Paul Adrian Glaubitz
- [PATCH v2 3/4] arch: copy_thread: pass clone_flags as u64
Andreas Larsson
- [PATCH v2 3/7] fs/9p: Add ability to identify inode by path for non-.L in uncached mode
Tingmao Wang
- [PATCH v2 3/9] KEYS: trusted: Use tpm_ret_to_err() in trusted_tpm2
Jarkko Sakkinen
- [PATCH v2 4/4] nios2: implement architecture-specific portion of sys_clone3
Simon Schuster via B4 Relay
- [PATCH v2 4/4] nios2: implement architecture-specific portion of sys_clone3
Arnd Bergmann
- [PATCH v2 4/7] fs/9p: .L: Refresh stale inodes on reuse
Tingmao Wang
- [PATCH v2 4/9] tpm2-sessions: Remove 'attributes' from tpm_buf_append_auth
Jarkko Sakkinen
- [PATCH v2 5/7] fs/9p: non-.L: Refresh stale inodes on reuse
Tingmao Wang
- [PATCH v2 5/9] tpm2-sessions: Umask tpm_buf_append_hmac_session()
Jarkko Sakkinen
- [PATCH v2 6/7] fs/9p: update the target's ino_path on rename
Tingmao Wang
- [PATCH v2 6/9] KEYS: trusted: Open code tpm2_buf_append()
Jarkko Sakkinen
- [PATCH v2 7/7] docs: fs/9p: Document the "inodeident" option
Tingmao Wang
- [PATCH v2 7/9] tpm-buf: check for corruption in tpm_buf_append_handle()
Jarkko Sakkinen
- [PATCH v2 8/9] tpm-buf: Remove chip parameeter from tpm_buf_append_handle
Jarkko Sakkinen
- [PATCH v2 9/9] tpm-buf: Build PCR extend commands
Jarkko Sakkinen
- [PATCH v2] ima: don't clear IMA_DIGSIG flag when setting non-IMA xattr
Coiby Xu
- [PATCH v2] ima: don't clear IMA_DIGSIG flag when setting non-IMA xattr
Mimi Zohar
- [PATCH v2] ima: don't clear IMA_DIGSIG flag when setting non-IMA xattr
Coiby Xu
- [PATCH v2] memfd,selinux: call security_inode_init_security_anon
Thiébaud Weksteen
- [PATCH v2] memfd,selinux: call security_inode_init_security_anon
Stephen Smalley
- [PATCH v2] memfd,selinux: call security_inode_init_security_anon
Stephen Smalley
- [PATCH v2] memfd,selinux: call security_inode_init_security_anon
Thiébaud Weksteen
- [PATCH v2] memfd,selinux: call security_inode_init_security_anon
Paul Moore
- [PATCH v2] memfd,selinux: call security_inode_init_security_anon
Paul Moore
- [PATCH v2] rcu: Remove redundant rcu_read_lock/unlock() in spin_lock critical sections
pengdonglin
- [PATCH v2] rcu: Remove redundant rcu_read_lock/unlock() in spin_lock critical sections
Waiman Long
- [PATCH v2] rcu: Remove redundant rcu_read_lock/unlock() in spin_lock critical sections
Sebastian Andrzej Siewior
- [PATCH v2] rcu: Remove redundant rcu_read_lock/unlock() in spin_lock critical sections
Donglin Peng
- [PATCH v2] tpm: use a map for tpm2_calc_ordinal_duration()
Jarkko Sakkinen
- [PATCH v2] tpm: use a map for tpm2_calc_ordinal_duration()
Jarkko Sakkinen
- [PATCH v2] tpm: use a map for tpm2_calc_ordinal_duration()
Serge E. Hallyn
- [PATCH v2] tpm: use a map for tpm2_calc_ordinal_duration()
Jarkko Sakkinen
- [PATCH v2] tpm: use a map for tpm2_calc_ordinal_duration()
Serge E. Hallyn
- [PATCH v3 00/10] tpm: Decouple Trenchboot dependencies
Jarkko Sakkinen
- [PATCH v3 00/10] tpm: Decouple Trenchboot dependencies
Jarkko Sakkinen
- [PATCH v3 00/14] Remove redundant rcu_read_lock/unlock() in spin_lock
pengdonglin
- [PATCH v3 00/35] Compiler-Based Capability- and Locking-Analysis
Marco Elver
- [PATCH v3 00/35] Compiler-Based Capability- and Locking-Analysis
Christoph Hellwig
- [PATCH v3 00/35] Compiler-Based Capability- and Locking-Analysis
Marco Elver
- [PATCH v3 00/35] Compiler-Based Capability- and Locking-Analysis
Christoph Hellwig
- [PATCH v3 00/35] Compiler-Based Capability- and Locking-Analysis
Linus Torvalds
- [PATCH v3 00/35] Compiler-Based Capability- and Locking-Analysis
Ian Rogers
- [PATCH v3 00/35] Compiler-Based Capability- and Locking-Analysis
Nathan Chancellor
- [PATCH v3 00/35] Compiler-Based Capability- and Locking-Analysis
Nathan Chancellor
- [PATCH v3 00/35] Compiler-Based Capability- and Locking-Analysis
Marco Elver
- [PATCH v3 00/35] Compiler-Based Capability- and Locking-Analysis
Linus Torvalds
- [PATCH v3 00/35] Compiler-Based Capability- and Locking-Analysis
Marco Elver
- [PATCH v3 00/35] Compiler-Based Capability- and Locking-Analysis
Christoph Hellwig
- [PATCH v3 00/35] Compiler-Based Capability- and Locking-Analysis
Christoph Hellwig
- [PATCH v3 00/35] Compiler-Based Capability- and Locking-Analysis
Bart Van Assche
- [PATCH v3 00/35] Compiler-Based Capability- and Locking-Analysis
Marco Elver
- [PATCH v3 00/35] Compiler-Based Capability- and Locking-Analysis
Marco Elver
- [PATCH v3 00/35] Compiler-Based Capability- and Locking-Analysis
Marco Elver
- [PATCH v3 00/35] Compiler-Based Capability- and Locking-Analysis
Christoph Hellwig
- [PATCH v3 00/35] Compiler-Based Capability- and Locking-Analysis
Christoph Hellwig
- [PATCH v3 00/35] Compiler-Based Capability- and Locking-Analysis
Nathan Chancellor
- [PATCH v3 01/10] tpm: Cap the number of PCR banks
Jarkko Sakkinen
- [PATCH v3 01/10] tpm: Cap the number of PCR banks
Jonathan McDowell
- [PATCH v3 01/10] tpm: Cap the number of PCR banks
Jarkko Sakkinen
- [PATCH v3 01/10] tpm: Cap the number of PCR banks
James Bottomley
- [PATCH v3 01/14] ACPI: APEI: Remove redundant rcu_read_lock/unlock() in spin_lock
pengdonglin
- [PATCH v3 01/14] ACPI: APEI: Remove redundant rcu_read_lock/unlock() in spin_lock
Hanjun Guo
- [PATCH v3 01/14] ACPI: APEI: Remove redundant rcu_read_lock/unlock() in spin_lock
Rafael J. Wysocki
- [PATCH v3 01/35] compiler_types: Move lock checking attributes to compiler-capability-analysis.h
Marco Elver
- [PATCH v3 02/10] tpm: Use -EPERM as fallback error code in tpm_ret_to_err
Jarkko Sakkinen
- [PATCH v3 02/10] tpm: Use -EPERM as fallback error code in tpm_ret_to_err
Stefano Garzarella
- [PATCH v3 02/10] tpm: Use -EPERM as fallback error code in tpm_ret_to_err
Jarkko Sakkinen
- [PATCH v3 02/14] drm/i915/gt: Remove redundant rcu_read_lock/unlock() in spin_lock
pengdonglin
- [PATCH v3 02/35] compiler-capability-analysis: Add infrastructure for Clang's capability analysis
Marco Elver
- [PATCH v3 02/35] compiler-capability-analysis: Add infrastructure for Clang's capability analysis
Ian Rogers
- [PATCH v3 02/35] compiler-capability-analysis: Add infrastructure for Clang's capability analysis
Bart Van Assche
- [PATCH v3 02/35] compiler-capability-analysis: Add infrastructure for Clang's capability analysis
Steven Rostedt
- [PATCH v3 03/10] KEYS: trusted: Use tpm_ret_to_err() in trusted_tpm2
Jarkko Sakkinen
- [PATCH v3 03/10] KEYS: trusted: Use tpm_ret_to_err() in trusted_tpm2
Stefano Garzarella
- [PATCH v3 03/10] KEYS: trusted: Use tpm_ret_to_err() in trusted_tpm2
Jarkko Sakkinen
- [PATCH v3 03/14] fs: aio: Remove redundant rcu_read_lock/unlock() in spin_lock
pengdonglin
- [PATCH v3 03/34] lsm: consolidate lsm_allowed() and prepare_lsm() into lsm_prepare()
John Johansen
- [PATCH v3 03/35] compiler-capability-analysis: Add test stub
Marco Elver
- [PATCH v3 04/10] tpm2-sessions: Remove 'attributes' from tpm_buf_append_auth
Jarkko Sakkinen
- [PATCH v3 04/10] tpm2-sessions: Remove 'attributes' from tpm_buf_append_auth
Jonathan McDowell
- [PATCH v3 04/10] tpm2-sessions: Remove 'attributes' from tpm_buf_append_auth
Jarkko Sakkinen
- [PATCH v3 04/12] libbpf: Support exclusive map creation
KP Singh
- [PATCH v3 04/14] nfs: Remove redundant rcu_read_lock/unlock() in spin_lock
pengdonglin
- [PATCH v3 04/34] lsm: introduce looping macros for the initialization code
John Johansen
- [PATCH v3 04/34] lsm: introduce looping macros for the initialization code
Paul Moore
- [PATCH v3 04/35] Documentation: Add documentation for Compiler-Based Capability Analysis
Marco Elver
- [PATCH v3 05/10] tpm2-sessions: Umask tpm_buf_append_hmac_session()
Jarkko Sakkinen
- [PATCH v3 05/10] tpm2-sessions: Umask tpm_buf_append_hmac_session()
Jonathan McDowell
- [PATCH v3 05/10] tpm2-sessions: Umask tpm_buf_append_hmac_session()
Jarkko Sakkinen
- [PATCH v3 05/14] s390/pkey: Remove redundant rcu_read_lock/unlock() in spin_lock
pengdonglin
- [PATCH v3 05/14] s390/pkey: Remove redundant rcu_read_lock/unlock() in spin_lock
Harald Freudenberger
- [PATCH v3 05/34] lsm: integrate report_lsm_order() code into caller
John Johansen
- [PATCH v3 05/35] checkpatch: Warn about capability_unsafe() without comment
Marco Elver
- [PATCH v3 05/35] checkpatch: Warn about capability_unsafe() without comment
Joe Perches
- [PATCH v3 06/10] KEYS: trusted: Open code tpm2_buf_append()
Jarkko Sakkinen
- [PATCH v3 06/12] bpf: Return hashes of maps in BPF_OBJ_GET_INFO_BY_FD
KP Singh
- [PATCH v3 06/14] ipc: Remove redundant rcu_read_lock/unlock() in spin_lock
pengdonglin
- [PATCH v3 06/34] lsm: integrate lsm_early_cred() and lsm_early_task() into caller
John Johansen
- [PATCH v3 06/35] cleanup: Basic compatibility with capability analysis
Marco Elver
- [PATCH v3 07/10] tpm-buf: check for corruption in tpm_buf_append_handle()
Jarkko Sakkinen
- [PATCH v3 07/10] tpm-buf: check for corruption in tpm_buf_append_handle()
Jonathan McDowell
- [PATCH v3 07/10] tpm-buf: check for corruption in tpm_buf_append_handle()
Jarkko Sakkinen
- [PATCH v3 07/14] yama: Remove redundant rcu_read_lock/unlock() in spin_lock
pengdonglin
- [PATCH v3 07/34] lsm: rename ordered_lsm_init() to lsm_init_ordered()
John Johansen
- [PATCH v3 07/35] lockdep: Annotate lockdep assertions for capability analysis
Marco Elver
- [PATCH v3 08/10] tpm-buf: Remove chip parameter from tpm_buf_append_handle
Jarkko Sakkinen
- [PATCH v3 08/10] tpm-buf: Remove chip parameter from tpm_buf_append_handle
Jonathan McDowell
- [PATCH v3 08/12] bpf: Implement signature verification for BPF programs
Paul Moore
- [PATCH v3 08/14] cgroup: Remove redundant rcu_read_lock/unlock() in spin_lock
pengdonglin
- [PATCH v3 08/14] cgroup: Remove redundant rcu_read_lock/unlock() in spin_lock
Tejun Heo
- [PATCH v3 08/35] locking/rwlock, spinlock: Support Clang's capability analysis
Marco Elver
- [PATCH v3 09/10] tpm-buf: Build PCR extend commands
Jarkko Sakkinen
- [PATCH v3 09/12] libbpf: Update light skeleton for signing
KP Singh
- [PATCH v3 09/14] cgroup/cpuset: Remove redundant rcu_read_lock/unlock() in spin_lock
pengdonglin
- [PATCH v3 09/14] cgroup/cpuset: Remove redundant rcu_read_lock/unlock() in spin_lock
Tejun Heo
- [PATCH v3 09/35] compiler-capability-analysis: Change __cond_acquires to take return value
Marco Elver
- [PATCH v3 10/10] tpm-buf: Enable managed and stack allocations.
Jarkko Sakkinen
- [PATCH v3 10/10] tpm-buf: Enable managed and stack allocations.
Stefano Garzarella
- [PATCH v3 10/10] tpm-buf: Enable managed and stack allocations.
Jarkko Sakkinen
- [PATCH v3 10/10] tpm-buf: Enable managed and stack allocations.
Stefano Garzarella
- [PATCH v3 10/14] wifi: mac80211: Remove redundant rcu_read_lock/unlock() in spin_lock
pengdonglin
- [PATCH v3 10/34] lsm: rework lsm_active_cnt and lsm_idlist[]
John Johansen
- [PATCH v3 10/35] locking/mutex: Support Clang's capability analysis
Marco Elver
- [PATCH v3 11/14] net: ncsi: Remove redundant rcu_read_lock/unlock() in spin_lock
pengdonglin
- [PATCH v3 11/14] net: ncsi: Remove redundant rcu_read_lock/unlock() in spin_lock
Paul Fertser
- [PATCH v3 11/34] lsm: get rid of the lsm_names list and do some cleanup
John Johansen
- [PATCH v3 11/34] lsm: get rid of the lsm_names list and do some cleanup
Paul Moore
- [PATCH v3 11/34] lsm: get rid of the lsm_names list and do some cleanup
John Johansen
- [PATCH v3 11/34] lsm: get rid of the lsm_names list and do some cleanup
Roberto Sassu
- [PATCH v3 11/34] lsm: get rid of the lsm_names list and do some cleanup
John Johansen
- [PATCH v3 11/34] lsm: get rid of the lsm_names list and do some cleanup
Paul Moore
- [PATCH v3 11/34] lsm: get rid of the lsm_names list and do some cleanup
Paul Moore
- [PATCH v3 11/34] lsm: get rid of the lsm_names list and do some cleanup
Tetsuo Handa
- [PATCH v3 11/34] lsm: get rid of the lsm_names list and do some cleanup
Tetsuo Handa
- [PATCH v3 11/34] lsm: get rid of the lsm_names list and do some cleanup
Paul Moore
- [PATCH v3 11/35] locking/seqlock: Support Clang's capability analysis
Marco Elver
- [PATCH v3 12/14] net: amt: Remove redundant rcu_read_lock/unlock() in spin_lock
pengdonglin
- [PATCH v3 12/34] lsm: rework the LSM enable/disable setter/getter functions
John Johansen
- [PATCH v3 12/35] bit_spinlock: Include missing <asm/processor.h>
Marco Elver
- [PATCH v3 13/14] net: bonding: Remove redundant rcu_read_lock/unlock() in spin_lock
pengdonglin
- [PATCH v3 13/34] lsm: rename exists_ordered_lsm() to lsm_order_exists()
John Johansen
- [PATCH v3 13/35] bit_spinlock: Support Clang's capability analysis
Marco Elver
- [PATCH v3 14/14] wifi: ath9k: Remove redundant rcu_read_lock/unlock() in spin_lock
pengdonglin
- [PATCH v3 14/34] lsm: rename/rework append_ordered_lsm() into lsm_order_append()
John Johansen
- [PATCH v3 14/35] rcu: Support Clang's capability analysis
Marco Elver
- [PATCH v3 15/34] lsm: rename/rework ordered_lsm_parse() to lsm_order_parse()
John Johansen
- [PATCH v3 15/35] srcu: Support Clang's capability analysis
Marco Elver
- [PATCH v3 16/35] kref: Add capability-analysis annotations
Marco Elver
- [PATCH v3 17/35] locking/rwsem: Support Clang's capability analysis
Marco Elver
- [PATCH v3 18/34] lsm: fold lsm_init_ordered() into security_init()
John Johansen
- [PATCH v3 18/35] locking/local_lock: Include missing headers
Marco Elver
- [PATCH v3 19/34] lsm: add/tweak function header comment blocks in lsm_init.c
John Johansen
- [PATCH v3 19/35] locking/local_lock: Support Clang's capability analysis
Marco Elver
- [PATCH v3 20/34] lsm: cleanup the debug and console output in lsm_init.c
John Johansen
- [PATCH v3 20/35] locking/ww_mutex: Support Clang's capability analysis
Marco Elver
- [PATCH v3 21/34] lsm: output available LSMs when debugging
John Johansen
- [PATCH v3 21/35] debugfs: Make debugfs_cancellation a capability struct
Marco Elver
- [PATCH v3 22/34] lsm: group lsm_order_parse() with the other lsm_order_*() functions
John Johansen
- [PATCH v3 22/35] compiler-capability-analysis: Remove Sparse support
Marco Elver
- [PATCH v3 23/34] lsm: introduce an initcall mechanism into the LSM framework
John Johansen
- [PATCH v3 23/35] compiler-capability-analysis: Remove __cond_lock() function-like helper
Marco Elver
- [PATCH v3 24/34] loadpin: move initcalls to the LSM framework
John Johansen
- [PATCH v3 24/35] compiler-capability-analysis: Introduce header suppressions
Marco Elver
- [PATCH v3 25/34] ipe: move initcalls to the LSM framework
John Johansen
- [PATCH v3 25/35] compiler: Let data_race() imply disabled capability analysis
Marco Elver
- [PATCH v3 26/34] smack: move initcalls to the LSM framework
John Johansen
- [PATCH v3 26/35] MAINTAINERS: Add entry for Capability Analysis
Marco Elver
- [PATCH v3 27/34] tomoyo: move initcalls to the LSM framework
John Johansen
- [PATCH v3 27/34] tomoyo: move initcalls to the LSM framework
Paul Moore
- [PATCH v3 27/34] tomoyo: move initcalls to the LSM framework
Tetsuo Handa
- [PATCH v3 27/34] tomoyo: move initcalls to the LSM framework
Paul Moore
- [PATCH v3 27/34] tomoyo: move initcalls to the LSM framework
Tetsuo Handa
- [PATCH v3 27/34] tomoyo: move initcalls to the LSM framework
Paul Moore
- [PATCH v3 27/35] kfence: Enable capability analysis
Marco Elver
- [PATCH v3 28/34] safesetid: move initcalls to the LSM framework
John Johansen
- [PATCH v3 28/35] kcov: Enable capability analysis
Marco Elver
- [PATCH v3 29/34] apparmor: move initcalls to the LSM framework
Paul Moore
- [PATCH v3 29/34] apparmor: move initcalls to the LSM framework
John Johansen
- [PATCH v3 29/34] apparmor: move initcalls to the LSM framework
Paul Moore
- [PATCH v3 29/34] apparmor: move initcalls to the LSM framework
John Johansen
- [PATCH v3 29/34] apparmor: move initcalls to the LSM framework
Paul Moore
- [PATCH v3 29/35] kcsan: Enable capability analysis
Marco Elver
- [PATCH v3 30/34] lockdown: move initcalls to the LSM framework
John Johansen
- [PATCH v3 30/35] stackdepot: Enable capability analysis
Marco Elver
- [PATCH v3 31/34] ima,evm: move initcalls to the LSM framework
Roberto Sassu
- [PATCH v3 31/34] ima,evm: move initcalls to the LSM framework
Mimi Zohar
- [PATCH v3 31/34] ima,evm: move initcalls to the LSM framework
Paul Moore
- [PATCH v3 31/34] ima,evm: move initcalls to the LSM framework
Mimi Zohar
- [PATCH v3 31/34] ima,evm: move initcalls to the LSM framework
Paul Moore
- [PATCH v3 31/34] ima,evm: move initcalls to the LSM framework
Mimi Zohar
- [PATCH v3 31/34] ima,evm: move initcalls to the LSM framework
Paul Moore
- [PATCH v3 31/35] rhashtable: Enable capability analysis
Marco Elver
- [PATCH v3 32/35] printk: Move locking annotation to printk.c
Marco Elver
- [PATCH v3 33/34] lsm: consolidate all of the LSM framework initcalls
John Johansen
- [PATCH v3 33/35] security/tomoyo: Enable capability analysis
Marco Elver
- [PATCH v3 34/34] lsm: add a LSM_STARTED_ALL notification event
John Johansen
- [PATCH v3 34/35] crypto: Enable capability analysis
Marco Elver
- [PATCH v3 35/35] sched: Enable capability analysis for core.c and fair.c
Marco Elver
- [PATCH v3] ima: don't clear IMA_DIGSIG flag when setting or removing non-IMA xattr
Coiby Xu
- [PATCH v3] ima: don't clear IMA_DIGSIG flag when setting or removing non-IMA xattr
Mimi Zohar
- [PATCH v3] memfd,selinux: call security_inode_init_security_anon
Thiébaud Weksteen
- [PATCH v3] memfd,selinux: call security_inode_init_security_anon
Stephen Smalley
- [PATCH v3] memfd,selinux: call security_inode_init_security_anon
Paul Moore
- [PATCH v3] memfd,selinux: call security_inode_init_security_anon
Hugh Dickins
- [PATCH v3] memfd,selinux: call security_inode_init_security_anon
Stephen Smalley
- [PATCH v3] memfd,selinux: call security_inode_init_security_anon
Paul Moore
- [PATCH v4 0/34] Rework the LSM initialization
Paul Moore
- [PATCH v4 0/9] tpm: Decouple Trenchboot dependencies
Jarkko Sakkinen
- [PATCH v4 0/9] tpm: Decouple Trenchboot dependencies
Jarkko Sakkinen
- [PATCH v4 00/12] Signed BPF programs
KP Singh
- [PATCH v4 00/12] Signed BPF programs
patchwork-bot+netdevbpf at kernel.org
- [PATCH v4 01/12] bpf: Update the bpf_prog_calc_tag to use SHA256
KP Singh
- [PATCH v4 01/12] bpf: Update the bpf_prog_calc_tag to use SHA256
Alexei Starovoitov
- [PATCH v4 01/12] bpf: Update the bpf_prog_calc_tag to use SHA256
KP Singh
- [PATCH v4 01/34] lsm: split the notifier code out into lsm_notifier.c
Paul Moore
- [PATCH v4 01/34] lsm: split the notifier code out into lsm_notifier.c
Mimi Zohar
- [PATCH v4 02/12] bpf: Implement exclusive map creation
KP Singh
- [PATCH v4 02/34] lsm: split the init code out into lsm_init.c
Paul Moore
- [PATCH v4 02/34] lsm: split the init code out into lsm_init.c
Mimi Zohar
- [PATCH v4 03/12] libbpf: Implement SHA256 internal helper
KP Singh
- [PATCH v4 03/34] lsm: consolidate lsm_allowed() and prepare_lsm() into lsm_prepare()
Paul Moore
- [PATCH v4 03/34] lsm: consolidate lsm_allowed() and prepare_lsm() into lsm_prepare()
Mimi Zohar
- [PATCH v4 04/12] libbpf: Support exclusive map creation
KP Singh
- [PATCH v4 04/12] libbpf: Support exclusive map creation
Andrii Nakryiko
- [PATCH v4 04/34] lsm: introduce looping macros for the initialization code
Paul Moore
- [PATCH v4 04/34] lsm: introduce looping macros for the initialization code
Mimi Zohar
- [PATCH v4 05/12] selftests/bpf: Add tests for exclusive maps
KP Singh
- [PATCH v4 05/34] lsm: integrate report_lsm_order() code into caller
Paul Moore
- [PATCH v4 05/34] lsm: integrate report_lsm_order() code into caller
Mimi Zohar
- [PATCH v4 06/12] bpf: Return hashes of maps in BPF_OBJ_GET_INFO_BY_FD
KP Singh
- [PATCH v4 06/34] lsm: integrate lsm_early_cred() and lsm_early_task() into caller
Paul Moore
- [PATCH v4 06/34] lsm: integrate lsm_early_cred() and lsm_early_task() into caller
Mimi Zohar
- [PATCH v4 07/12] bpf: Move the signature kfuncs to helpers.c
KP Singh
- [PATCH v4 07/34] lsm: rename ordered_lsm_init() to lsm_init_ordered()
Paul Moore
- [PATCH v4 07/34] lsm: rename ordered_lsm_init() to lsm_init_ordered()
Mimi Zohar
- [PATCH v4 08/12] bpf: Implement signature verification for BPF programs
KP Singh
- [PATCH v4 08/34] lsm: replace the name field with a pointer to the lsm_id struct
Paul Moore
- [PATCH v4 08/34] lsm: replace the name field with a pointer to the lsm_id struct
Mimi Zohar
- [PATCH v4 09/12] libbpf: Update light skeleton for signing
KP Singh
- [PATCH v4 09/34] lsm: rename the lsm order variables for consistency
Paul Moore
- [PATCH v4 09/34] lsm: rename the lsm order variables for consistency
Mimi Zohar
- [PATCH v4 1/9] tpm: Cap the number of PCR banks
Jarkko Sakkinen
- [PATCH v4 10/12] libbpf: Embed and verify the metadata hash in the loader
KP Singh
- [PATCH v4 10/34] lsm: rework lsm_active_cnt and lsm_idlist[]
Paul Moore
- [PATCH v4 10/34] lsm: rework lsm_active_cnt and lsm_idlist[]
Mimi Zohar
- [PATCH v4 11/12] bpftool: Add support for signing BPF programs
KP Singh
- [PATCH v4 11/12] bpftool: Add support for signing BPF programs
Quentin Monnet
- [PATCH v4 11/12] bpftool: Add support for signing BPF programs
KP Singh
- [PATCH v4 11/12] bpftool: Add support for signing BPF programs
KP Singh
- [PATCH v4 11/12] bpftool: Add support for signing BPF programs
KP Singh
- [PATCH v4 11/34] lsm: get rid of the lsm_names list and do some cleanup
Paul Moore
- [PATCH v4 11/34] lsm: get rid of the lsm_names list and do some cleanup
Mimi Zohar
- [PATCH v4 11/34] lsm: get rid of the lsm_names list and do some cleanup
Paul Moore
- [PATCH v4 11/34] lsm: get rid of the lsm_names list and do some cleanup
Mimi Zohar
- [PATCH v4 11/34] lsm: get rid of the lsm_names list and do some cleanup
Paul Moore
- [PATCH v4 12/12] selftests/bpf: Enable signature verification for some lskel tests
KP Singh
- [PATCH v4 12/34] lsm: rework the LSM enable/disable setter/getter functions
Paul Moore
- [PATCH v4 12/34] lsm: rework the LSM enable/disable setter/getter functions
Mimi Zohar
- [PATCH v4 13/34] lsm: rename exists_ordered_lsm() to lsm_order_exists()
Paul Moore
- [PATCH v4 13/34] lsm: rename exists_ordered_lsm() to lsm_order_exists()
Mimi Zohar
- [PATCH v4 14/34] lsm: rename/rework append_ordered_lsm() into lsm_order_append()
Paul Moore
- [PATCH v4 15/34] lsm: rename/rework ordered_lsm_parse() to lsm_order_parse()
Paul Moore
- [PATCH v4 15/34] lsm: rename/rework ordered_lsm_parse() to lsm_order_parse()
Mimi Zohar
- [PATCH v4 15/34] lsm: rename/rework ordered_lsm_parse() to lsm_order_parse()
Paul Moore
- [PATCH v4 15/34] lsm: rename/rework ordered_lsm_parse() to lsm_order_parse()
Mimi Zohar
- [PATCH v4 16/34] lsm: cleanup the LSM blob size code
Paul Moore
- [PATCH v4 16/34] lsm: cleanup the LSM blob size code
Mimi Zohar
- [PATCH v4 17/34] lsm: cleanup initialize_lsm() and rename to lsm_init_single()
Paul Moore
- [PATCH v4 17/34] lsm: cleanup initialize_lsm() and rename to lsm_init_single()
Mimi Zohar
- [PATCH v4 18/34] lsm: fold lsm_init_ordered() into security_init()
Paul Moore
- [PATCH v4 19/34] lsm: add/tweak function header comment blocks in lsm_init.c
Paul Moore
- [PATCH v4 2/9] tpm: Use -EPERM as fallback error code in tpm_ret_to_err
Jarkko Sakkinen
- [PATCH v4 20/34] lsm: cleanup the debug and console output in lsm_init.c
Paul Moore
- [PATCH v4 20/34] lsm: cleanup the debug and console output in lsm_init.c
Mimi Zohar
- [PATCH v4 20/34] lsm: cleanup the debug and console output in lsm_init.c
Paul Moore
- [PATCH v4 21/34] lsm: output available LSMs when debugging
Paul Moore
- [PATCH v4 21/34] lsm: output available LSMs when debugging
Mimi Zohar
- [PATCH v4 22/34] lsm: group lsm_order_parse() with the other lsm_order_*() functions
Paul Moore
- [PATCH v4 22/34] lsm: group lsm_order_parse() with the other lsm_order_*() functions
Mimi Zohar
- [PATCH v4 23/34] lsm: introduce an initcall mechanism into the LSM framework
Paul Moore
- [PATCH v4 23/34] lsm: introduce an initcall mechanism into the LSM framework
Mimi Zohar
- [PATCH v4 24/34] loadpin: move initcalls to the LSM framework
Paul Moore
- [PATCH v4 24/34] loadpin: move initcalls to the LSM framework
Mimi Zohar
- [PATCH v4 24/34] loadpin: move initcalls to the LSM framework
Paul Moore
- [PATCH v4 25/34] ipe: move initcalls to the LSM framework
Paul Moore
- [PATCH v4 26/34] smack: move initcalls to the LSM framework
Paul Moore
- [PATCH v4 27/34] tomoyo: move initcalls to the LSM framework
Paul Moore
- [PATCH v4 28/34] safesetid: move initcalls to the LSM framework
Paul Moore
- [PATCH v4 29/34] apparmor: move initcalls to the LSM framework
Paul Moore
- [PATCH v4 3/9] KEYS: trusted: Use tpm_ret_to_err() in trusted_tpm2
Jarkko Sakkinen
- [PATCH v4 30/34] lockdown: move initcalls to the LSM framework
Paul Moore
- [PATCH v4 31/34] ima,evm: move initcalls to the LSM framework
Paul Moore
- [PATCH v4 31/34] ima,evm: move initcalls to the LSM framework
Paul Moore
- [PATCH v4 32/34] selinux: move initcalls to the LSM framework
Paul Moore
- [PATCH v4 33/34] lsm: consolidate all of the LSM framework initcalls
Paul Moore
- [PATCH v4 34/34] lsm: add a LSM_STARTED_ALL notification event
Paul Moore
- [PATCH v4 4/9] tpm2-sessions: Remove 'attributes' from tpm_buf_append_auth
Jarkko Sakkinen
- [PATCH v4 5/9] tpm2-sessions: Unmask tpm_buf_append_hmac_session()
Jarkko Sakkinen
- [PATCH v4 6/9] KEYS: trusted: Open code tpm2_buf_append()
Jarkko Sakkinen
- [PATCH v4 7/9] tpm-buf: check for corruption in tpm_buf_append_handle()
Jarkko Sakkinen
- [PATCH v4 8/9] tpm-buf: Remove chip parameter from tpm_buf_append_handle
Jarkko Sakkinen
- [PATCH v4 9/9] tpm-buf: Enable managed and stack allocations.
Jarkko Sakkinen
- [PATCH v5 0/9] Prepare TPM driver for Trenchboot
Jarkko Sakkinen
- [PATCH v5 00/12] Signed BPF programs
KP Singh
- [PATCH v5 00/12] Signed BPF programs
Alexei Starovoitov
- [PATCH v5 01/12] bpf: Update the bpf_prog_calc_tag to use SHA256
KP Singh
- [PATCH v5 02/12] bpf: Implement exclusive map creation
KP Singh
- [PATCH v5 03/12] libbpf: Implement SHA256 internal helper
KP Singh
- [PATCH v5 03/12] libbpf: Implement SHA256 internal helper
Eric Biggers
- [PATCH v5 03/12] libbpf: Implement SHA256 internal helper
Alexei Starovoitov
- [PATCH v5 03/12] libbpf: Implement SHA256 internal helper
Eric Biggers
- [PATCH v5 04/12] libbpf: Support exclusive map creation
KP Singh
- [PATCH v5 05/12] selftests/bpf: Add tests for exclusive maps
KP Singh
- [PATCH v5 06/12] bpf: Return hashes of maps in BPF_OBJ_GET_INFO_BY_FD
KP Singh
- [PATCH v5 07/12] bpf: Move the signature kfuncs to helpers.c
KP Singh
- [PATCH v5 08/12] bpf: Implement signature verification for BPF programs
KP Singh
- [PATCH v5 09/12] libbpf: Update light skeleton for signing
KP Singh
- [PATCH v5 1/9] tpm: Cap the number of PCR banks
Jarkko Sakkinen
- [PATCH v5 10/12] libbpf: Embed and verify the metadata hash in the loader
KP Singh
- [PATCH v5 11/12] bpftool: Add support for signing BPF programs
KP Singh
- [PATCH v5 12/12] selftests/bpf: Enable signature verification for some lskel tests
KP Singh
- [PATCH v5 2/9] tpm: Use -EPERM as fallback error code in tpm_ret_to_err
Jarkko Sakkinen
- [PATCH v5 3/9] KEYS: trusted: Use tpm_ret_to_err() in trusted_tpm2
Jarkko Sakkinen
- [PATCH v5 4/9] tpm2-sessions: Remove 'attributes' from tpm_buf_append_auth
Jarkko Sakkinen
- [PATCH v5 5/9] tpm2-sessions: Unmask tpm_buf_append_hmac_session()
Jarkko Sakkinen
- [PATCH v5 6/9] KEYS: trusted: Open code tpm2_buf_append()
Jarkko Sakkinen
- [PATCH v5 7/9] tpm-buf: check for corruption in tpm_buf_append_handle()
Jarkko Sakkinen
- [PATCH v5 8/9] tpm-buf: Remove chip parameter from tpm_buf_append_handle
Jarkko Sakkinen
- [PATCH v5 9/9] tpm-buf: Enable managed and stack allocations.
Jarkko Sakkinen
- [PATCH v6 0/5] Signed BPF programs
KP Singh
- [PATCH v6 1/5] bpf: Implement signature verification for BPF programs
KP Singh
- [PATCH v6 2/5] libbpf: Update light skeleton for signing
KP Singh
- [PATCH v6 3/5] libbpf: Embed and verify the metadata hash in the loader
KP Singh
- [PATCH v6 4/5] bpftool: Add support for signing BPF programs
KP Singh
- [PATCH v6 5/5] selftests/bpf: Enable signature verification for some lskel tests
KP Singh
- [PATCH v6] tpm: Make TPM buffer allocations more robust
Jarkko Sakkinen
- [PATCH v7 6/6] mm/memfd: security hook for memfd_create
Abhinav Saxena
- [PATCH v7 6/6] mm/memfd: security hook for memfd_create
Jeff Xu
- [PATCH v7] tpm: Make TPM buffer allocations more robust
Jarkko Sakkinen
- [PATCH v7] tpm: Make TPM buffer allocations more robust
Jarkko Sakkinen
- [PATCH v7] tpm: Make TPM buffer allocations more robust
Stefano Garzarella
- [PATCH v7] tpm: Make TPM buffer allocations more robust
Jarkko Sakkinen
- [PATCH v7] tpm: Make TPM buffer allocations more robust
Stefano Garzarella
- [PATCH v8] tpm: Make TPM buffer allocations more robust
Jarkko Sakkinen
- [PATCH v9] tpm: Make TPM buffer allocations more robust
Jarkko Sakkinen
- [pcmoore-lsm:working-lsm_init_rework 40/41] security/lsm_init.c:516:undefined reference to `securityfs_init'
Paul Moore
- [pcmoore-lsm:working-lsm_init_rework 9/41] security/lsm_init.c:400:25: sparse: sparse: cast removes address space '__rcu' of expression
Paul Moore
- [RFC 0/2] BPF signature hash chains
Blaise Boscaccy
- [RFC 1/2] bpf: Add hash chain signature support for arbitrary maps
Blaise Boscaccy
- [RFC 2/2] libbpf: Add hash chain signing support to light skeletons.
Blaise Boscaccy
- [RFC PATCH 0/6] Implement LANDLOCK_ADD_RULE_QUIET
Tingmao Wang
- [RFC PATCH 0/6] Implement LANDLOCK_ADD_RULE_QUIET
Mickaël Salaün
- [RFC PATCH 1/6] landlock: Add a place for flags to layer rules
Tingmao Wang
- [RFC PATCH 1/6] landlock: Add a place for flags to layer rules
Mickaël Salaün
- [RFC PATCH 1/6] landlock: Add a place for flags to layer rules
Tingmao Wang
- [RFC PATCH 1/6] landlock: Add a place for flags to layer rules
Mickaël Salaün
- [RFC PATCH 1/6] landlock: Add a place for flags to layer rules
Tingmao Wang
- [RFC PATCH 1/6] landlock: Add a place for flags to layer rules
Mickaël Salaün
- [RFC PATCH 1/6] landlock: Add a place for flags to layer rules
Tingmao Wang
- [RFC PATCH 2/6] landlock: Add API support for the quiet flag
Tingmao Wang
- [RFC PATCH 2/6] landlock: Add API support for the quiet flag
Mickaël Salaün
- [RFC PATCH 3/6] landlock/audit: Check for quiet flag in landlock_log_denial
Tingmao Wang
- [RFC PATCH 3/6] landlock/audit: Check for quiet flag in landlock_log_denial
Mickaël Salaün
- [RFC PATCH 4/6] landlock/audit: Fix wrong type usage
Tingmao Wang
- [RFC PATCH 4/6] landlock/audit: Fix wrong type usage
Mickaël Salaün
- [RFC PATCH 5/6] landlock/access: Improve explanation on the deny_masks_t
Tingmao Wang
- [RFC PATCH 5/6] landlock/access: Improve explanation on the deny_masks_t
Mickaël Salaün
- [RFC PATCH 5/6] landlock/access: Improve explanation on the deny_masks_t
Tingmao Wang
- [RFC PATCH 6/6] samples/landlock: Add FS quiet flag support to sandboxer
Tingmao Wang
- [RFC PATCH] lsm, selinux: introduce LSM_ATTR_UNSHARE and wire it up for SELinux
Stephen Smalley
- [RFC PATCH] lsm,selinux: introduce LSM_ATTR_UNSHARE and wire it up for SELinux
Stephen Smalley
- [RFC PATCH] lsm,selinux: introduce LSM_ATTR_UNSHARE and wire it up for SELinux
Stephen Smalley
- [RFC PATCH] lsm,selinux: introduce LSM_ATTR_UNSHARE and wire it up for SELinux
Paul Moore
- [RFC PATCH] lsm,selinux: introduce LSM_ATTR_UNSHARE and wire it up for SELinux
Serge E. Hallyn
- [RFC PATCH] lsm,selinux: introduce LSM_ATTR_UNSHARE and wire it up for SELinux
Paul Moore
- [RFC PATCH] lsm,selinux: introduce LSM_ATTR_UNSHARE and wire it up for SELinux
Stephen Smalley
- [RFC PATCH] selftests/landlock: Support running the full fs test suite on another FS
Mickaël Salaün
- [RFC PATCH v1 0/2] Add O_DENY_WRITE (complement AT_EXECVE_CHECK)
Roberto Sassu
- [RFC PATCH v1 0/2] Add O_DENY_WRITE (complement AT_EXECVE_CHECK)
Jann Horn
- [RFC PATCH v1 0/2] Add O_DENY_WRITE (complement AT_EXECVE_CHECK)
Serge E. Hallyn
- [RFC PATCH v1 0/2] Add O_DENY_WRITE (complement AT_EXECVE_CHECK)
Andy Lutomirski
- [RFC PATCH v1 0/2] Add O_DENY_WRITE (complement AT_EXECVE_CHECK)
Andy Lutomirski
- [RFC PATCH v1 0/2] Add O_DENY_WRITE (complement AT_EXECVE_CHECK)
Roberto Sassu
- [RFC PATCH v1 0/2] Add O_DENY_WRITE (complement AT_EXECVE_CHECK)
Roberto Sassu
- [RFC PATCH v2] lsm, selinux: introduce LSM_ATTR_UNSHARE and wire it up for SELinux
Stephen Smalley
- [RFC PATCH v2] lsm,selinux: introduce LSM_ATTR_UNSHARE and wire it up for SELinux
Casey Schaufler
- [RFC PATCH v2] lsm, selinux: introduce LSM_ATTR_UNSHARE and wire it up for SELinux
Dr. Greg
- [RFC PATCH v2] lsm,selinux: introduce LSM_ATTR_UNSHARE and wire it up for SELinux
Casey Schaufler
- [RFC PATCH v2] lsm,selinux: introduce LSM_ATTR_UNSHARE and wire it up for SELinux
Serge E. Hallyn
- [RFC PATCH v2] lsm,selinux: introduce LSM_ATTR_UNSHARE and wire it up for SELinux
Stephen Smalley
- [syzbot] [fs?] BUG: sleeping function called from invalid context in hook_sb_delete
Jan Kara
- [syzbot] [fs?] BUG: sleeping function called from invalid context in hook_sb_delete
Christian Brauner
- [syzbot] [kernel?] INFO: trying to register non-static key in skb_dequeue (4)
syzbot
- [syzbot] [kernel?] INFO: trying to register non-static key in skb_dequeue (4)
Paul Moore
- [syzbot] Monthly lsm report (Sep 2025)
syzbot
- [syzbot ci] Re: BPF signature hash chains
syzbot ci
- [syzbot ci] Re: Compiler-Based Capability- and Locking-Analysis
syzbot ci
- [syzbot ci] Re: Compiler-Based Capability- and Locking-Analysis
Marco Elver
- [syzbot ci] Re: Signed BPF programs
KP Singh
- linux-6.17/tools/testing/selftests/landlock/fs_test.c:5631: Test for pointer < 0 ?
David Binderman
- LSM namespacing API
Dr. Greg
- LSM namespacing API
Casey Schaufler
- LSM namespacing API
John Johansen
- LSM namespacing API
Dr. Greg
- LSM namespacing API
Casey Schaufler
- LSM namespacing API
Dr. Greg
- LSM namespacing API
John Johansen
- Missing signoff in the capabilities-next tree
Serge E. Hallyn
- Smack: Memory leak in smack_fs_context_submount()
Casey Schaufler
- what's going on with aa_destroy_aafs() call in apparmor_init()?
Al Viro
- what's going on with aa_destroy_aafs() call in apparmor_init()?
John Johansen
- あたま専門のもみほぐし店
ヘッドミント
Last message date:
Tue Sep 30 23:19:58 UTC 2025
Archived on: Tue Sep 30 23:22:04 UTC 2025
This archive was generated by
Pipermail 0.09 (Mailman edition).