Toggle navigation
Patchwork
Security modules development
Patches
Bundles
About this project
Login
Register
Mail settings
Show patches with
: State =
Action Required
| 12124 patches
Series
Submitter
State
any
Action Required
New
Under Review
Accepted
Rejected
RFC
Not Applicable
Changes Requested
Awaiting Upstream
Superseded
Deferred
Mainlined
Queued
Needs ACK
Handled Elsewhere
In Next
Search
Archived
No
Yes
Both
Delegate
------
Nobody
holtmann
holtmann
holtmann
agk
mchehab
mchehab
gregkh
gregkh
mtosatti
lethal
lethal
avi
cvaroqui
jbrassow
mikulas
dtor
bmarzins
tmlind
jmberg
jmberg
mcgrof
mcgrof
mcgrof
lenb
lenb
kyle
felipebalbi
varenet
helge
helge
khilman
khilman
khilman
khilman
jwoithe
mlin
Zhang Rui
Zhang Rui
iksaif
cjackiewicz
hmh
jbarnes
jbarnes
jbarnes
willy
snitzer
iwamatsu
dougsland
mjg59
rafael
rafael
rafael
ericvh@gmail.com
ykzhao
venkip
sandeen
pwsan
lucho@ionkov.net
rminnich
anholt
aystarik
roland
shefty
mason
glikely
krh
djbw
djbw
djbw
cmarinas
doyu
jrn
sage
tomba
mmarek
cjb
trondmy
jikos
bcousson
jic23
olof
olof
olof
nsekhar
weiny2
horms
horms
bwidawsk
bwidawsk
shemminger
eulfhan
josef
josef
josef
dianders
jpan9
hal
kdave
bleung
evalenti
jlbec
wsa
bhelgaas
vkoul
vkoul
szlin
davejiang
markgross
tagr
tiwai
vireshk
mmind
dledford
geert
geert
herbert
herbert
kvalo
kvalo
kvalo
bentiss
arend
rzwisler
stellarhopper
stellarhopper
jejb
matthias_bgg
dvhart
axboe
axboe
pcmoore
pcmoore
pcmoore
mkp
mkp
stefan_schmidt
leon
lucvoo
jsakkine
jsakkine
jsakkine
bamse
bamse
demarchi
krzk
groeck
groeck
sboyd
sboyd
mturquette
mturquette
0andriy
carlocaione
luca
dgc
kbingham
derosier
narmstrong
narmstrong
atull
tytso
tytso
djwong
bvanassche
omos
jpirko
jpirko
GustavoARSilva
pkshih
patersonc
brauner
shuahkh
shuahkh
shuahkh
palmer
palmer
jgg
Kishon
idosch
labbott
jsimmons
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
broonie
broonie
broonie
mricon
mricon
mricon
kees
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
arnd
linusw
perfinion
bbrezillon
bachradsusi
rostedt
rostedt
kholk
nbd
ebiggers
ebiggers
pavelm
sds
m0reeze
ganis
jwcart2
matttbe
andmur01
lorpie01
chanwoochoi
dlezcano
jhedberg
vudentz
robertfoss
bgix
tedd_an
tsbogend
wens
wcrobert
robher
kstewart
kwilczynski
hansg
bpf
netdev
dsa
ethtool
netdrv
martineau
abelloni
trix
pabeni
mani_sadhasivam
mlimonci
liusong6
mjp
tohojo
pmalani
prestwoj
prestwoj
dhowells
tzungbi
conchuod
paulmck
jes
mtkaczyk
colyli
cem
pateldipen1984
iweiny
iweiny
bjorn
mhiramat
JanKiszka
jaegeuk
mraynal
aring
konradybcio
ij
Hailan
jstitt007
denkenz
denkenz
mkorenbl
jjohnson
frank_li
geliang
mdraidci
mdraidci
peluse
joelgranados
Apply
«
1
2
...
17
18
19
…
121
122
»
Patch
Series
A/R/T
S/W/F
Date
Submitter
Delegate
State
[RFC,12/12] integrity: Suppress error message for keys added to the mok keyring
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-07
Eric Snowberg
New
[RFC,11/12] integrity: move keys from the mok keyring into the secondary keyring
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-07
Eric Snowberg
New
[RFC,10/12] integrity: add new keyring handler
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-07
Eric Snowberg
New
[RFC,09/12] integrity: accessor function to get trust_moklist
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-07
Eric Snowberg
New
[RFC,08/12] integrity: restrict INTEGRITY_KEYRING_MOK to restrict_link_by_secondary_trusted_or_ca
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-07
Eric Snowberg
New
[RFC,07/12] integrity: add add_to_mok_keyring
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-07
Eric Snowberg
New
[RFC,06/12] integrity: Trust mok keys if MokListTrustedRT found
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-07
Eric Snowberg
New
[RFC,05/12] integrity: Introduce mok keyring
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-07
Eric Snowberg
New
[RFC,04/12] integrity: add integrity_destroy_keyring
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-07
Eric Snowberg
New
[RFC,03/12] KEYS: CA link restriction
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-07
Eric Snowberg
New
[RFC,02/12] KEYS: Allow unrestricted keys to be moved to the secondary keyring
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-07
Eric Snowberg
New
[RFC,01/12] KEYS: Add KEY_ALLOC_BYPASS_RESTRICTION option to key_move
Enroll kernel keys thru MOK
- - -
-
-
-
2021-07-07
Eric Snowberg
New
[1/1] NAX LSM: Add initial support support
NAX (No Anonymous Execution) LSM
- - -
-
-
-
2021-07-07
Igor Zhbanov
New
[v1,4/4] landlock_restrict_self.2: Document new syscall
Add Landlock man pages
- - -
-
-
-
2021-07-06
Mickaël Salaün
New
[v1,3/4] landlock_add_rule.2: Document new syscall
Add Landlock man pages
- - -
-
-
-
2021-07-06
Mickaël Salaün
New
[v1,2/4] landlock_create_ruleset.2: Document new syscall
Add Landlock man pages
- - -
-
-
-
2021-07-06
Mickaël Salaün
New
[v1,1/4] landlock.7: Add a new page to introduce Landlock
Add Landlock man pages
- - -
-
-
-
2021-07-06
Mickaël Salaün
New
ima: Support euid keyword for buffer measurement
ima: Support euid keyword for buffer measurement
- 1 -
-
-
-
2021-07-05
Roberto Sassu
New
[v3,3/3] ima: Add digest and digest_len params to the functions to measure a buffer
ima: Provide more info about buffer measurement
1 1 -
-
-
-
2021-07-05
Roberto Sassu
New
[v3,2/3] ima: Return int in the functions to measure a buffer
ima: Provide more info about buffer measurement
- 1 -
-
-
-
2021-07-05
Roberto Sassu
New
[v3,1/3] ima: Introduce ima_get_current_hash_algo()
ima: Provide more info about buffer measurement
- 1 -
-
-
-
2021-07-05
Roberto Sassu
New
[v3,2/2] perf: Refactor permissions check into perf_check_permission()
[v3,1/2] perf: Fix required permissions if sigtrap is requested
- 1 -
-
-
-
2021-07-05
Marco Elver
New
[v3,1/2] perf: Fix required permissions if sigtrap is requested
[v3,1/2] perf: Fix required permissions if sigtrap is requested
1 - -
-
-
-
2021-07-05
Marco Elver
New
[v2,3/3] ima: Add digest and digest_len params to the functions to measure a buffer
ima: Provide more info about buffer measurement
- - -
-
-
-
2021-07-01
Roberto Sassu
New
[v2,2/3] ima: Return int in the functions to measure a buffer
ima: Provide more info about buffer measurement
- - -
-
-
-
2021-07-01
Roberto Sassu
New
[v2,1/3] ima: Introduce ima_get_current_hash_algo()
ima: Provide more info about buffer measurement
- 1 -
-
-
-
2021-07-01
Roberto Sassu
New
[v2] perf: Require CAP_KILL if sigtrap is requested
[v2] perf: Require CAP_KILL if sigtrap is requested
- - -
-
-
-
2021-07-01
Marco Elver
New
[v1,4/4] selftests/landlock: Check all possible intermediate directories
Landlock filesystem caching
- - -
-
-
-
2021-06-30
Mickaël Salaün
New
[v1,3/4] selftests/landlock: Work in a temporary directory
Landlock filesystem caching
- - -
-
-
-
2021-06-30
Mickaël Salaün
New
[v1,2/4] landlock: Add filesystem rule caching
Landlock filesystem caching
- - -
-
-
-
2021-06-30
Mickaël Salaün
New
[v1,1/4] fs,security: Add resolve_path_at() hook
Landlock filesystem caching
- - -
-
-
-
2021-06-30
Mickaël Salaün
New
[GIT,PULL] SafeSetID changes for v5.14
[GIT,PULL] SafeSetID changes for v5.14
- - -
-
-
-
2021-06-30
Micah Morton
New
[3/3] ima: Add digest parameter to the functions to measure a buffer
ima: Provide more info about buffer measurement
- - -
-
-
-
2021-06-30
Roberto Sassu
New
[2/3] ima: Return int in the functions to measure a buffer
ima: Provide more info about buffer measurement
- - -
-
-
-
2021-06-30
Roberto Sassu
New
[1/3] ima: Introduce ima_get_current_hash_algo()
ima: Provide more info about buffer measurement
- - -
-
-
-
2021-06-30
Roberto Sassu
New
perf: Require CAP_KILL if sigtrap is requested
perf: Require CAP_KILL if sigtrap is requested
- - -
-
-
-
2021-06-30
Marco Elver
New
[GIT,PULL] Smack patches for v5.14
[GIT,PULL] Smack patches for v5.14
- - -
-
-
-
2021-06-29
Casey Schaufler
New
[GIT,PULL] SELinux patches for v5.14
[GIT,PULL] SELinux patches for v5.14
- - -
-
-
-
2021-06-29
Paul Moore
New
[v8,2/2] certs: Add support for using elliptic curve keys for signing modules
Add support for ECDSA-signed kernel modules
- - -
-
-
-
2021-06-29
Stefan Berger
New
[v8,1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
Add support for ECDSA-signed kernel modules
- - -
-
-
-
2021-06-29
Stefan Berger
New
IMA: remove -Wmissing-prototypes warning
IMA: remove -Wmissing-prototypes warning
- - -
-
-
-
2021-06-29
Austin Kim
New
smack: mark 'smack_enabled' global variable as __initdata
smack: mark 'smack_enabled' global variable as __initdata
- - -
-
-
-
2021-06-29
Austin Kim
New
[v7,2/2] certs: Add support for using elliptic curve keys for signing modules
Add support for ECDSA-signed kernel modules
- 1 -
-
-
-
2021-06-28
Stefan Berger
New
[v7,1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
Add support for ECDSA-signed kernel modules
- 1 -
-
-
-
2021-06-28
Stefan Berger
New
[RFC,v2,3/3] virt: Add sev_secret module to expose confidential computing secrets
Allow access to confidential computing secret area
- - -
-
-
-
2021-06-28
Dov Murik
New
[RFC,v2,2/3] efi: Reserve confidential computing secret area
Allow access to confidential computing secret area
- - -
-
-
-
2021-06-28
Dov Murik
New
[RFC,v2,1/3] efi/libstub: Copy confidential computing secret area
Allow access to confidential computing secret area
- - -
-
-
-
2021-06-28
Dov Murik
New
[RFC,12/12] digest_lists: Tests
Huawei Digest Lists
- - -
-
-
-
2021-06-25
Roberto Sassu
New
[RFC,11/12] digest_lists: Interfaces - digests_count
Huawei Digest Lists
- - -
-
-
-
2021-06-25
Roberto Sassu
New
[RFC,10/12] digest_lists: Interfaces - digest_query
Huawei Digest Lists
- - -
-
-
-
2021-06-25
Roberto Sassu
New
[RFC,09/12] digest_lists: Interfaces - digest_label
Huawei Digest Lists
- - -
-
-
-
2021-06-25
Roberto Sassu
New
[RFC,08/12] digest_lists: Interfaces - digest_lists_loaded
Huawei Digest Lists
- - -
-
-
-
2021-06-25
Roberto Sassu
New
[RFC,07/12] digest_lists: Interfaces - digest_list_add, digest_list_del
Huawei Digest Lists
- - -
-
-
-
2021-06-25
Roberto Sassu
New
[RFC,06/12] digest_lists: Parser
Huawei Digest Lists
- - -
-
-
-
2021-06-25
Roberto Sassu
New
[RFC,05/12] digest_lists: Methods
Huawei Digest Lists
- - -
-
-
-
2021-06-25
Roberto Sassu
New
[RFC,04/12] digest_lists: Objects
Huawei Digest Lists
- - -
-
-
-
2021-06-25
Roberto Sassu
New
[RFC,03/12] digest_lists: Basic definitions
Huawei Digest Lists
- - -
-
-
-
2021-06-25
Roberto Sassu
New
[RFC,02/12] digest_lists: Overview
Huawei Digest Lists
- - -
-
-
-
2021-06-25
Roberto Sassu
New
[RFC,01/12] ima: Add digest, algo, measured parameters to ima_measure_critical_data()
Huawei Digest Lists
- - -
-
-
-
2021-06-25
Roberto Sassu
New
certs: Redirect openssl error message to null device
certs: Redirect openssl error message to null device
- - -
-
-
-
2021-06-25
Stefan Berger
New
[RFC] userfaultfd: open userfaultfds with O_RDONLY
[RFC] userfaultfd: open userfaultfds with O_RDONLY
- - -
-
-
-
2021-06-24
Ondrej Mosnacek
New
[v2,2/6] KEYS: trusted: Allow import from existing key material for development
KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- - -
-
-
-
2021-06-22
Ahmad Fatoum
New
[v2,6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- - -
-
-
-
2021-06-22
Ahmad Fatoum
New
[v2,5/6] crypto: caam - add in-kernel interface for blob generator
KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- - -
-
-
-
2021-06-22
Ahmad Fatoum
New
[v2,4/6] KEYS: trusted: allow trust sources to use kernel RNG for key material
KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- - -
-
-
-
2021-06-22
Ahmad Fatoum
New
[v2,3/6] KEYS: trusted: allow users to use kernel RNG for key material
KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- - -
-
-
-
2021-06-22
Ahmad Fatoum
New
[v2,1/6] KEYS: trusted: allow use of TEE as backend without TCG_TPM support
KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- - -
-
-
-
2021-06-22
Ahmad Fatoum
New
[v2] evm: Check xattr size discrepancy between kernel and user
[v2] evm: Check xattr size discrepancy between kernel and user
- - -
-
-
-
2021-06-21
Roberto Sassu
New
evm: Check xattr size misalignment between kernel and user
evm: Check xattr size misalignment between kernel and user
- - -
-
-
-
2021-06-21
Roberto Sassu
New
fs: Return raw xattr for security.* if there is size disagreement with LSMs
fs: Return raw xattr for security.* if there is size disagreement with LSMs
- - 1
-
-
-
2021-06-16
Roberto Sassu
New
[v3] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
[v3] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
2 - -
-
-
-
2021-06-16
Ondrej Mosnacek
New
[v2,27/29] docs: userspace-api: landlock.rst: avoid using ReST :doc:`foo` markup
docs: avoid using ReST :doc:`foo` tag
1 - -
-
-
-
2021-06-16
Mauro Carvalho Chehab
New
[v2,24/29] docs: security: landlock.rst: avoid using ReST :doc:`foo` markup
docs: avoid using ReST :doc:`foo` tag
- - -
-
-
-
2021-06-16
Mauro Carvalho Chehab
New
[-next,v3] netlabel: Fix memory leak in netlbl_mgmt_add_common
[-next,v3] netlabel: Fix memory leak in netlbl_mgmt_add_common
1 - -
-
-
-
2021-06-15
Liu Shixin
New
[3/3] doc: trusted-encrypted: add DCP as new trust source
DCP as trusted keys backend
- - -
-
-
-
2021-06-14
Richard Weinberger
New
[2/3] KEYS: trusted: Introduce support for NXP DCP-based trusted keys
DCP as trusted keys backend
- - -
-
-
-
2021-06-14
Richard Weinberger
New
[1/3] crypto: mxs-dcp: Add support for hardware provided keys
DCP as trusted keys backend
- - -
-
-
-
2021-06-14
Richard Weinberger
New
security: add LSM hook at the memfd_create point
security: add LSM hook at the memfd_create point
- - -
-
-
-
2021-06-13
Li Qiang
New
[-next,v2] netlabel: Fix memory leak in netlbl_mgmt_add_common
[-next,v2] netlabel: Fix memory leak in netlbl_mgmt_add_common
- - -
-
-
-
2021-06-11
Liu Shixin
New
audit: remove unnecessary 'ret' initialization
audit: remove unnecessary 'ret' initialization
- - -
-
-
-
2021-06-11
Austin Kim
New
[v27,25/25] AppArmor: Remove the exclusive flag
LSM: Module stacking for AppArmor
2 1 -
-
-
-
2021-06-11
Casey Schaufler
New
[v27,24/25] LSM: Add /proc attr entry for full LSM context
LSM: Module stacking for AppArmor
- 1 -
-
-
-
2021-06-11
Casey Schaufler
New
[v27,23/25] Audit: Add record for multiple object LSM attributes
LSM: Module stacking for AppArmor
- - -
-
-
-
2021-06-11
Casey Schaufler
New
[v27,22/25] Audit: Add record for multiple process LSM attributes
LSM: Module stacking for AppArmor
- - -
-
-
-
2021-06-11
Casey Schaufler
New
[v27,21/25] audit: add support for non-syscall auxiliary records
LSM: Module stacking for AppArmor
- - -
-
-
-
2021-06-11
Casey Schaufler
New
[v27,20/25] LSM: Verify LSM display sanity in binder
LSM: Module stacking for AppArmor
2 2 -
-
-
-
2021-06-11
Casey Schaufler
New
[v27,19/25] NET: Store LSM netlabel data in a lsmblob
LSM: Module stacking for AppArmor
2 2 -
-
-
-
2021-06-11
Casey Schaufler
New
[v27,18/25] LSM: security_secid_to_secctx in netlink netfilter
LSM: Module stacking for AppArmor
2 2 -
-
-
-
2021-06-11
Casey Schaufler
New
[v27,17/25] LSM: Use lsmcontext in security_inode_getsecctx
LSM: Module stacking for AppArmor
3 1 -
-
-
-
2021-06-11
Casey Schaufler
New
[v27,16/25] LSM: Use lsmcontext in security_secid_to_secctx
LSM: Module stacking for AppArmor
2 1 -
-
-
-
2021-06-11
Casey Schaufler
New
[v27,15/25] LSM: Ensure the correct LSM context releaser
LSM: Module stacking for AppArmor
2 2 -
-
-
-
2021-06-11
Casey Schaufler
New
[v27,14/25] LSM: Specify which LSM to display
LSM: Module stacking for AppArmor
- - -
-
-
-
2021-06-11
Casey Schaufler
New
[v27,13/25] IMA: Change internal interfaces to use lsmblobs
LSM: Module stacking for AppArmor
1 2 -
-
-
-
2021-06-11
Casey Schaufler
New
[v27,12/25] LSM: Use lsmblob in security_cred_getsecid
LSM: Module stacking for AppArmor
2 2 -
-
-
-
2021-06-11
Casey Schaufler
New
[v27,11/25] LSM: Use lsmblob in security_inode_getsecid
LSM: Module stacking for AppArmor
2 2 -
-
-
-
2021-06-11
Casey Schaufler
New
[v27,10/25] LSM: Use lsmblob in security_task_getsecid
LSM: Module stacking for AppArmor
2 2 -
-
-
-
2021-06-11
Casey Schaufler
New
[v27,09/25] LSM: Use lsmblob in security_ipc_getsecid
LSM: Module stacking for AppArmor
2 2 -
-
-
-
2021-06-11
Casey Schaufler
New
[v27,08/25] LSM: Use lsmblob in security_secid_to_secctx
LSM: Module stacking for AppArmor
- - -
-
-
-
2021-06-11
Casey Schaufler
New
[v27,07/25] LSM: Use lsmblob in security_secctx_to_secid
LSM: Module stacking for AppArmor
- - -
-
-
-
2021-06-11
Casey Schaufler
New
[v27,06/25] LSM: Use lsmblob in security_kernel_act_as
LSM: Module stacking for AppArmor
2 2 -
-
-
-
2021-06-11
Casey Schaufler
New
«
1
2
...
17
18
19
…
121
122
»