Show patches with: Submitter = Paul Moore       |    Archived = No       |   152 patches
« 1 2 »
Patch Series A/R/T S/W/F Date Submitter Delegate State
[RFC] audit: force seccomp event logging to honor the audit_enabled flag - - - --- 2015-11-23 Paul Moore Accepted
audit: always enable syscall auditing when supported and audit is enabled - - - --- 2015-12-08 Paul Moore Accepted
audit: we don't need to __set_current_state(TASK_RUNNING) - - - --- 2016-04-05 Paul Moore Accepted
audit: fix some horrible switch statement style crimes - - - --- 2016-06-16 Paul Moore Accepted
s390: ensure that syscall arguments are properly masked on s390 - - - --- 2016-06-22 Paul Moore Changes Requested
[v2] s390: ensure that syscall arguments are properly masked on s390 1 - - --- 2016-06-27 Paul Moore Accepted
audit: fix a double fetch in audit_log_single_execve_arg() - - - --- 2016-07-20 Paul Moore Accepted
[audit-testsuite] exec_execve: add some simple tests for the EXECVE record - - - --- 2016-07-20 Paul Moore Accepted
audit: consistently record PIDs with task_tgid_nr() - - - --- 2016-08-30 Paul Moore Accepted
audit-userspace: add GitHub issue template - - - --- 2016-10-04 Paul Moore Not Applicable
[RFC,1/9] audit: move kaudit thread start from auditd registration to kaudit init (#2) - - - --- 2016-11-24 Paul Moore Accepted
[RFC,2/9] audit: fixup audit_init() - - - --- 2016-11-24 Paul Moore Accepted
[RFC,3/9] audit: queue netlink multicast sends just like we do for unicast sends - - - --- 2016-11-24 Paul Moore Accepted
[RFC,4/9] audit: rename the queues and kauditd related functions - - - --- 2016-11-24 Paul Moore Accepted
[RFC,5/9] audit: rework the audit queue handling - - - --- 2016-11-24 Paul Moore Accepted
[RFC,6/9] audit: rework audit_log_start() - - - --- 2016-11-24 Paul Moore Accepted
[RFC,7/9] audit: wake up kauditd_thread after auditd registers - - - --- 2016-11-24 Paul Moore Accepted
[RFC,8/9] audit: handle a clean auditd shutdown with grace - - - --- 2016-11-24 Paul Moore Accepted
[RFC,9/9] audit: don't ever sleep on a command record/message - - - --- 2016-11-24 Paul Moore Accepted
netns: avoid disabling irq for netns id - - - --- 2016-11-29 Paul Moore Accepted
audit: remove unnecessary curly braces from switch/case statements - 1 - --- 2017-02-13 Paul Moore Accepted
[RFC] audit: fix auditd/kernel connection state tracking - 1 - --- 2017-03-21 Paul Moore Accepted
[RFC,1/4] audit: combine audit_receive() and audit_receive_skb() - 1 - --- 2017-03-21 Paul Moore Accepted
[RFC,2/4] audit: kernel generated netlink traffic should have a portid of 0 - 1 - --- 2017-03-21 Paul Moore Accepted
[RFC,3/4] audit: store the auditd PID as a pid struct instead of pid_t - 1 - --- 2017-03-21 Paul Moore Accepted
[RFC,4/4] audit: use kmem_cache to manage the audit_buffer cache - 1 - --- 2017-03-21 Paul Moore Accepted
[RFC] audit: move audit_signal_info() into kernel/audit.c - - - --- 2017-03-29 Paul Moore Superseded
[RFC,v2] audit: move audit_signal_info() into kernel/auditsc.c - 1 - --- 2017-04-04 Paul Moore Accepted
audit: make sure we don't let the retry queue grow without bounds - - - --- 2017-04-10 Paul Moore Accepted
[RFC] audit: the fix RCU locking for the auditd_connection structure - - - --- 2017-04-28 Paul Moore Accepted
audit: fix the RCU locking for the auditd_connection structure - - - --- 2017-05-30 Paul Moore Awaiting Upstream
[RFC] audit: fix a race condition with the auditd tracking code - 1 - --- 2017-06-15 Paul Moore Accepted
[RFC] audit: make sure we never skip the multicast broadcast - 1 - --- 2017-06-15 Paul Moore Accepted
audit-testsuite: look for both open(2) and openat(2) - 1 - --- 2017-06-15 Paul Moore Accepted
audit: update the audit info in MAINTAINERS - - - --- 2017-07-28 Paul Moore Accepted
[RFC,1/5] audit: ensure that 'audit=1' actually enables audit for PID 1 - 1 - --- 2017-09-01 Paul Moore Accepted
[RFC,2/5] audit: initialize the audit subsystem as early as possible - 1 - --- 2017-09-01 Paul Moore Accepted
[RFC,3/5] audit: don't use simple_strtol() anymore - 1 - --- 2017-09-01 Paul Moore Accepted
[RFC,4/5] audit: convert audit_ever_enabled to a boolean - 1 - --- 2017-09-01 Paul Moore Accepted
[RFC,5/5] audit: use audit_set_enabled() in audit_enable() - 1 - --- 2017-09-01 Paul Moore Accepted
audit: track the owner of the command mutex ourselves - 1 - --- 2018-02-20 Paul Moore Accepted
[1/2] audit: move processing of "audit" boot param to audit_init() - - - --- 2018-02-27 Paul Moore Superseded
[1/2] audit: move processing of "audit" boot param to audit_init() - - - --- 2018-03-02 Paul Moore RFC
[RFC,ghak32,V2,11/13] audit: add support for containerid to network namespaces - - - --- 2018-04-21 Paul Moore Changes Requested
audit-testsuite: add nmap-ncat/netcat as a dependency - - - --- 2018-06-06 Paul Moore Accepted
audit: use ktime_get_coarse_real_ts64() for timestamps - 1 - --- 2018-07-17 Paul Moore Accepted
[RFC] audit: use current whenever possible - 1 - --- 2018-07-20 Paul Moore Superseded
[GIT,PULL] Audit fixes for v4.18 (#1) [GIT,PULL] Audit fixes for v4.18 (#1) - - - --- 2018-07-31 Paul Moore Accepted
[RFC] audit: minimize our use of audit_log_format() [RFC] audit: minimize our use of audit_log_format() - 2 - --- 2018-08-02 Paul Moore Superseded
[GIT,PULL] Audit patches for v4.19 [GIT,PULL] Audit patches for v4.19 - - - --- 2018-08-14 Paul Moore Accepted
audit: minimize our use of audit_log_format() audit: minimize our use of audit_log_format() - - - --- 2018-11-21 Paul Moore Accepted
audit: use current whenever possible audit: use current whenever possible - - - --- 2018-11-21 Paul Moore Accepted
[RFC] audit-testsuite: restrict the syscall_socketcall test to x86/x86_64 [RFC] audit-testsuite: restrict the syscall_socketcall test to x86/x86_64 - - - --- 2018-12-12 Paul Moore Accepted
[GIT,PULL] Audit patches for v4.21 [GIT,PULL] Audit patches for v4.21 - - - --- 2018-12-24 Paul Moore Accepted
[GIT,PULL] Audit patches for v5.1 [GIT,PULL] Audit patches for v5.1 - - - --- 2019-03-05 Paul Moore Accepted
[GIT,PULL] Audit patches for v5.2 [GIT,PULL] Audit patches for v5.2 - - - --- 2019-05-07 Paul Moore Accepted
audit: remove the BUG() calls in the audit rule comparison functions audit: remove the BUG() calls in the audit rule comparison functions 1 - - --- 2019-05-30 Paul Moore Accepted
[GIT,PULL] Audit patches for v5.3 [GIT,PULL] Audit patches for v5.3 - - - --- 2019-07-02 Paul Moore Accepted
audit-testsuite: update the docs for Debian SID/unstable audit-testsuite: update the docs for Debian SID/unstable - - - --- 2019-08-27 Paul Moore Accepted
[1/2] audit-testsuite: use our own version of perltidy in the Travis CI tests Fix perltidy on Travis CI - - - --- 2019-09-24 Paul Moore Accepted
[2/2] audit-testsuite: fix the style according to ./tools/check-syntax Fix perltidy on Travis CI - - - --- 2019-09-24 Paul Moore Accepted
[GIT,PULL] Audit patches for v5.5 [GIT,PULL] Audit patches for v5.5 - - - --- 2019-11-26 Paul Moore Accepted
[GIT,PULL] Audit patch for v5.6 [GIT,PULL] Audit patch for v5.6 - - - --- 2020-01-27 Paul Moore Accepted
audit: fix error handling in audit_data_to_entry() audit: fix error handling in audit_data_to_entry() - - - --- 2020-02-24 Paul Moore Accepted
audit: always check the netlink payload length in audit_receive_msg() audit: always check the netlink payload length in audit_receive_msg() - - - --- 2020-02-24 Paul Moore Superseded
[v2] audit: always check the netlink payload length in audit_receive_msg() [v2] audit: always check the netlink payload length in audit_receive_msg() - - - --- 2020-02-25 Paul Moore Accepted
[GIT,PULL] Audit fixes for v5.6 (#1) [GIT,PULL] Audit fixes for v5.6 (#1) - - - --- 2020-02-27 Paul Moore Accepted
[GIT,PULL] Audit patches for v5.7 [GIT,PULL] Audit patches for v5.7 - - - --- 2020-03-30 Paul Moore Accepted
audit: fix a net reference leak in audit_send_reply() audit: fix a net reference leak in audit_send_reply() - 1 - --- 2020-04-20 Paul Moore Accepted
audit: check the length of userspace generated audit records audit: check the length of userspace generated audit records - - - --- 2020-04-20 Paul Moore Accepted
audit: fix a net reference leak in audit_list_rules_send() audit: fix a net reference leak in audit_list_rules_send() - 1 - --- 2020-04-21 Paul Moore Accepted
[GIT,PULL] Audit fixes for v5.7 (#1) [GIT,PULL] Audit fixes for v5.7 (#1) - - - --- 2020-04-22 Paul Moore Accepted
[GIT,PULL] Audit patches for v5.8 [GIT,PULL] Audit patches for v5.8 - - - --- 2020-06-02 Paul Moore Accepted
audit: use the proper gfp flags in the audit_log_nfcfg() calls audit: use the proper gfp flags in the audit_log_nfcfg() calls - 1 - --- 2020-07-03 Paul Moore Accepted
revert: 1320a4052ea1 ("audit: trigger accompanying records when no rules present") revert: 1320a4052ea1 ("audit: trigger accompanying records when no rules present") - - - --- 2020-07-28 Paul Moore Accepted
[GIT,PULL] Audit fixes for v5.8 (#1) [GIT,PULL] Audit fixes for v5.8 (#1) - - - --- 2020-07-29 Paul Moore Accepted
[GIT,PULL] Audit patches for v5.9 [GIT,PULL] Audit patches for v5.9 - - - --- 2020-08-04 Paul Moore Accepted
[GIT,PULL] Audit patches for v5.10 [GIT,PULL] Audit patches for v5.10 - - - --- 2020-10-13 Paul Moore Accepted
[GIT,PULL] Audit patches for v5.11 [GIT,PULL] Audit patches for v5.11 - - - --- 2020-12-15 Paul Moore Accepted
[GIT,PULL] Audit patches for v5.12 [GIT,PULL] Audit patches for v5.12 - - - --- 2021-02-15 Paul Moore Accepted
[RFC,1/4] lsm: separate security_task_getsecid() into subjective and objective variants Split security_task_getsecid() into subj and obj variants 1 2 - --- 2021-02-19 Paul Moore Superseded
[RFC,2/4] selinux: clarify task subjective and objective credentials Split security_task_getsecid() into subj and obj variants - - - --- 2021-02-19 Paul Moore Superseded
[RFC,3/4] smack: differentiate between subjective and objective task credentials Split security_task_getsecid() into subj and obj variants - 1 - --- 2021-02-19 Paul Moore Superseded
[RFC,4/4] apparmor: differentiate between subjective and objective task credentials Split security_task_getsecid() into subj and obj variants - - - --- 2021-02-19 Paul Moore Superseded
[v2,1/3] lsm: separate security_task_getsecid() into subjective and objective variants Split security_task_getsecid() into subj and obj variants 2 1 - --- 2021-03-18 Paul Moore Accepted
[v2,2/3] selinux: clarify task subjective and objective credentials Split security_task_getsecid() into subj and obj variants - 1 - --- 2021-03-18 Paul Moore Accepted
[v2,3/3] smack: differentiate between subjective and objective task credentials Split security_task_getsecid() into subj and obj variants 1 2 - --- 2021-03-18 Paul Moore Accepted
[GIT,PULL] Audit patches for v5.13 [GIT,PULL] Audit patches for v5.13 - - - --- 2021-04-26 Paul Moore Accepted
[RFC,1/9] audit: prepare audit_context for use in calling contexts beyond syscalls Add LSM access controls and auditing to io_uring 1 - - --- 2021-05-21 Paul Moore Superseded
[RFC,2/9] audit, io_uring, io-wq: add some basic audit support to io_uring Add LSM access controls and auditing to io_uring - - - --- 2021-05-21 Paul Moore Superseded
[RFC,3/9] audit: dev/test patch to force io_uring auditing Add LSM access controls and auditing to io_uring - - - --- 2021-05-21 Paul Moore Superseded
[RFC,4/9] audit: add filtering for io_uring records Add LSM access controls and auditing to io_uring - - - --- 2021-05-21 Paul Moore Superseded
[RFC,5/9] fs: add anon_inode_getfile_secure() similar to anon_inode_getfd_secure() Add LSM access controls and auditing to io_uring - - - --- 2021-05-21 Paul Moore Superseded
[RFC,6/9] io_uring: convert io_uring to the secure anon inode interface Add LSM access controls and auditing to io_uring - - - --- 2021-05-21 Paul Moore Superseded
[RFC,7/9] lsm,io_uring: add LSM hooks to io_uring Add LSM access controls and auditing to io_uring - - - --- 2021-05-21 Paul Moore Superseded
[RFC,8/9] selinux: add support for the io_uring access controls Add LSM access controls and auditing to io_uring - - - --- 2021-05-21 Paul Moore Superseded
[RFC,9/9] Smack: Brutalist io_uring support with debug Add LSM access controls and auditing to io_uring - - - --- 2021-05-21 Paul Moore Superseded
[GIT,PULL] Audit patches for v5.14 [GIT,PULL] Audit patches for v5.14 - - - --- 2021-06-29 Paul Moore Accepted
[RFC,v2,1/9] audit: prepare audit_context for use in calling contexts beyond syscalls Add LSM access controls and auditing to io_uring 1 - - --- 2021-08-11 Paul Moore Superseded
[RFC,v2,2/9] audit, io_uring, io-wq: add some basic audit support to io_uring Add LSM access controls and auditing to io_uring - - - --- 2021-08-11 Paul Moore Superseded
« 1 2 »