Show patches with: State = Action Required       |   12086 patches
« 1 2 ... 70 71 72120 121 »
Patch Series A/R/T S/W/F Date Submitter Delegate State
[25/59] Audit: Convert osid to an lsm_export structure LSM: Module stacking for AppArmor - - - --- 2019-04-09 Casey Schaufler New
[24/59] Audit: Convert target_sid to an lsm_export structure LSM: Module stacking for AppArmor - - - --- 2019-04-09 Casey Schaufler New
[23/59] Audit: Change audit_sig_sid to audit_sig_lsm LSM: Module stacking for AppArmor - - - --- 2019-04-09 Casey Schaufler New
[22/59] LSM: Use lsm_export in security_cred_getsecid LSM: Module stacking for AppArmor - - - --- 2019-04-09 Casey Schaufler New
[21/59] LSM: Use lsm_export in security_inode_getsecid LSM: Module stacking for AppArmor - - - --- 2019-04-09 Casey Schaufler New
[20/59] LSM: Use lsm_export in security_task_getsecid LSM: Module stacking for AppArmor - - - --- 2019-04-09 Casey Schaufler New
[19/59] LSM: Use lsm_export in security_ipc_getsecid LSM: Module stacking for AppArmor - - - --- 2019-04-09 Casey Schaufler New
[18/59] LSM: Use lsm_export in security_secid_to_secctx LSM: Module stacking for AppArmor - - - --- 2019-04-09 Casey Schaufler New
[17/59] LSM: Use lsm_export in security_secctx_to_secid LSM: Module stacking for AppArmor - - - --- 2019-04-09 Casey Schaufler New
[16/59] LSM: Use lsm_export in security_socket_getpeersec_dgram LSM: Module stacking for AppArmor - - - --- 2019-04-09 Casey Schaufler New
[15/59] LSM: Use lsm_export in security_kernel_act_as LSM: Module stacking for AppArmor - - - --- 2019-04-09 Casey Schaufler New
[14/59] LSM: Use lsm_export in security_audit_rule_match LSM: Module stacking for AppArmor - - - --- 2019-04-09 Casey Schaufler New
[13/59] LSM: Use lsm_export in the secctx_to_secid hooks LSM: Module stacking for AppArmor - - - --- 2019-04-09 Casey Schaufler New
[12/59] LSM: Use lsm_export in the secid_to_secctx hooks LSM: Module stacking for AppArmor - - - --- 2019-04-09 Casey Schaufler New
[11/59] LSM: Fix logical operation in lsm_export checks LSM: Module stacking for AppArmor - - - --- 2019-04-09 Casey Schaufler New
[10/59] LSM: Use lsm_export in the audit_rule_match hooks LSM: Module stacking for AppArmor - - - --- 2019-04-09 Casey Schaufler New
[09/59] LSM: Use lsm_export in the getpeersec_dgram hooks LSM: Module stacking for AppArmor - - - --- 2019-04-09 Casey Schaufler New
[08/59] LSM: Use lsm_export in the kernel_ask_as hooks LSM: Module stacking for AppArmor - - - --- 2019-04-09 Casey Schaufler New
[07/59] LSM: Use lsm_export in the ipc_getsecid and task_getsecid hooks LSM: Module stacking for AppArmor - - - --- 2019-04-09 Casey Schaufler New
[06/59] LSM: Use lsm_export in the cred_getsecid hooks LSM: Module stacking for AppArmor - - - --- 2019-04-09 Casey Schaufler New
[05/59] LSM: Use lsm_export in the inode_getsecid hooks LSM: Module stacking for AppArmor - - - --- 2019-04-09 Casey Schaufler New
[04/59] LSM: Create an lsm_export data structure. LSM: Module stacking for AppArmor - - - --- 2019-04-09 Casey Schaufler New
[03/59] LSM: Infrastructure management of the key security blob LSM: Module stacking for AppArmor - - - --- 2019-04-09 Casey Schaufler New
[02/59] LSM: Infrastructure management of the sock security LSM: Module stacking for AppArmor - - - --- 2019-04-09 Casey Schaufler New
[01/59] LSM: Infrastructure management of the superblock LSM: Module stacking for AppArmor - - - --- 2019-04-09 Casey Schaufler New
[GIT,PULL] TPM fixes for v5.1 [GIT,PULL] TPM fixes for v5.1 - - - --- 2019-04-08 James Morris New
[v3,2/2] initmem: introduce CONFIG_INIT_ALL_HEAP RFC: introduce CONFIG_INIT_ALL_MEMORY - - - --- 2019-04-08 Alexander Potapenko New
[v3,1/2] initmem: introduce CONFIG_INIT_ALL_MEMORY and CONFIG_INIT_ALL_STACK RFC: introduce CONFIG_INIT_ALL_MEMORY - - - --- 2019-04-08 Alexander Potapenko New
apparmor: Restore Y/N in /sys for apparmor's "enabled" apparmor: Restore Y/N in /sys for apparmor's "enabled" - 1 - --- 2019-04-08 Kees Cook New
[2/2] apparmor: Switch to GFP_KERNEL where possible [1/2] apparmor: Use a memory pool instead per-CPU caches - - - --- 2019-04-05 Sebastian Andrzej Siewior New
[1/2] apparmor: Use a memory pool instead per-CPU caches [1/2] apparmor: Use a memory pool instead per-CPU caches - - - --- 2019-04-05 Sebastian Andrzej Siewior New
[V32,27/27] tracefs: Restrict tracefs when the kernel is locked down Lockdown patches for 5.2 - 1 - --- 2019-04-04 Matthew Garrett New
[V32,26/27] debugfs: Restrict debugfs when the kernel is locked down Lockdown patches for 5.2 - - - --- 2019-04-04 Matthew Garrett New
[V32,25/27] lockdown: Print current->comm in restriction messages Lockdown patches for 5.2 - - - --- 2019-04-04 Matthew Garrett New
[V32,24/27] kexec: Allow kexec_file() with appropriate IMA policy when locked down Lockdown patches for 5.2 1 - - --- 2019-04-04 Matthew Garrett New
[V32,23/27] Lock down perf when in confidentiality mode Lockdown patches for 5.2 - - - --- 2019-04-04 Matthew Garrett New
[V32,22/27] bpf: Restrict bpf when kernel lockdown is in confidentiality mode Lockdown patches for 5.2 - - - --- 2019-04-04 Matthew Garrett New
[V32,21/27] Lock down tracing and perf kprobes when in confidentiality mode Lockdown patches for 5.2 - - - --- 2019-04-04 Matthew Garrett New
[V32,20/27] Lock down /proc/kcore Lockdown patches for 5.2 - - - --- 2019-04-04 Matthew Garrett New
[V32,19/27] x86/mmiotrace: Lock down the testmmiotrace module Lockdown patches for 5.2 1 1 - --- 2019-04-04 Matthew Garrett New
[V32,18/27] Lock down module params that specify hardware parameters (eg. ioport) Lockdown patches for 5.2 - - - --- 2019-04-04 Matthew Garrett New
[V32,17/27] Lock down TIOCSSERIAL Lockdown patches for 5.2 - - - --- 2019-04-04 Matthew Garrett New
[V32,16/27] Prohibit PCMCIA CIS storage when the kernel is locked down Lockdown patches for 5.2 - - - --- 2019-04-04 Matthew Garrett New
[V32,15/27] acpi: Disable ACPI table override if the kernel is locked down Lockdown patches for 5.2 - - - --- 2019-04-04 Matthew Garrett New
[V32,14/27] acpi: Ignore acpi_rsdp kernel param when the kernel has been locked down Lockdown patches for 5.2 - - - --- 2019-04-04 Matthew Garrett New
[V32,13/27] ACPI: Limit access to custom_method when the kernel is locked down Lockdown patches for 5.2 - - - --- 2019-04-04 Matthew Garrett New
[V32,12/27] x86/msr: Restrict MSR access when the kernel is locked down Lockdown patches for 5.2 1 1 - --- 2019-04-04 Matthew Garrett New
[V32,11/27] x86: Lock down IO port access when the kernel is locked down Lockdown patches for 5.2 - 1 - --- 2019-04-04 Matthew Garrett New
[V32,10/27] PCI: Lock down BAR access when the kernel is locked down Lockdown patches for 5.2 1 - - --- 2019-04-04 Matthew Garrett New
[V32,09/27] uswsusp: Disable when the kernel is locked down Lockdown patches for 5.2 - - - --- 2019-04-04 Matthew Garrett New
[V32,08/27] hibernate: Disable when the kernel is locked down Lockdown patches for 5.2 - - - --- 2019-04-04 Matthew Garrett New
[V32,07/27] kexec_file: Restrict at runtime if the kernel is locked down Lockdown patches for 5.2 - 1 - --- 2019-04-04 Matthew Garrett New
[V32,06/27] kexec_file: split KEXEC_VERIFY_SIG into KEXEC_SIG and KEXEC_SIG_FORCE Lockdown patches for 5.2 - 1 - --- 2019-04-04 Matthew Garrett New
[V32,05/27] Copy secure_boot flag in boot params across kexec reboot Lockdown patches for 5.2 - - - --- 2019-04-04 Matthew Garrett New
[V32,04/27] kexec_load: Disable at runtime if the kernel is locked down Lockdown patches for 5.2 1 - - --- 2019-04-04 Matthew Garrett New
[V32,03/27] Restrict /dev/{mem,kmem,port} when the kernel is locked down Lockdown patches for 5.2 - - - --- 2019-04-04 Matthew Garrett New
[V32,02/27] Enforce module signatures if the kernel is locked down Lockdown patches for 5.2 - - - --- 2019-04-04 Matthew Garrett New
[V32,01/27] Add the ability to lock down access to the running kernel image Lockdown patches for 5.2 - - - --- 2019-04-04 Matthew Garrett New
Smack: Fix IPv6 handling of 0 secmark Smack: Fix IPv6 handling of 0 secmark - - - --- 2019-04-03 Casey Schaufler New
[2/2] tpm: Fix builds on platforms that lack early_memremap() [1/2] efi: Fix cast to pointer from integer of different size in TPM log code - 1 - --- 2019-04-02 Matthew Garrett New
[1/2] efi: Fix cast to pointer from integer of different size in TPM log code [1/2] efi: Fix cast to pointer from integer of different size in TPM log code 1 1 - --- 2019-04-02 Matthew Garrett New
[GIT,PULL,UPDATED] security: yama and LSM config fixes [GIT,PULL,UPDATED] security: yama and LSM config fixes - - - --- 2019-03-29 James Morris New
LSM: Revive CONFIG_DEFAULT_SECURITY_* for "make oldconfig" LSM: Revive CONFIG_DEFAULT_SECURITY_* for "make oldconfig" 1 - - --- 2019-03-29 Kees Cook New
[GIT,PULL] security: yama fix for v5.1 [GIT,PULL] security: yama fix for v5.1 - - - --- 2019-03-29 James Morris New
[GIT,PULL] tpmdd fixes for Linux v5.1 [GIT,PULL] tpmdd fixes for Linux v5.1 - - - --- 2019-03-29 Jarkko Sakkinen New
[RFC,40/68] vfs: Convert smackfs to use the new mount API Untitled series #97843 - - - --- 2019-03-27 David Howells New
[RFC,39/68] vfs: Convert selinuxfs to use the new mount API Untitled series #97843 - - - --- 2019-03-27 David Howells New
[RFC,38/68] vfs: Convert securityfs to use the new mount API Untitled series #97843 - - - --- 2019-03-27 David Howells New
[RFC,37/68] vfs: Convert apparmorfs to use the new mount API Untitled series #97843 - - - --- 2019-03-27 David Howells New
keys: safe concurrent user->{session,uid}_keyring access keys: safe concurrent user->{session,uid}_keyring access - - - --- 2019-03-27 Jann Horn New
security: don't use RCU accessors for cred->session_keyring security: don't use RCU accessors for cred->session_keyring - - - --- 2019-03-27 Jann Horn New
Yama: mark function as static Yama: mark function as static - - - --- 2019-03-27 Mukesh Ojha New
Yama: mark local symbols as static Yama: mark local symbols as static - 1 - --- 2019-03-26 Jann Horn New
[ghak109,V2] audit: link integrity evm_write_xattrs record to syscall event [ghak109,V2] audit: link integrity evm_write_xattrs record to syscall event 2 - - --- 2019-03-26 Richard Guy Briggs New
[V31,25/25] debugfs: Disable open() when kernel is locked down Add support for kernel lockdown - - - --- 2019-03-26 Matthew Garrett New
[V31,24/25] lockdown: Print current->comm in restriction messages Add support for kernel lockdown - - - --- 2019-03-26 Matthew Garrett New
[V31,23/25] Lock down perf when in confidentiality mode Add support for kernel lockdown - - - --- 2019-03-26 Matthew Garrett New
[V31,22/25] bpf: Restrict bpf when kernel lockdown is in confidentiality mode Add support for kernel lockdown - - - --- 2019-03-26 Matthew Garrett New
[V31,21/25] Lock down kprobes when in confidentiality mode Add support for kernel lockdown - - - --- 2019-03-26 Matthew Garrett New
[V31,20/25] Lock down /proc/kcore Add support for kernel lockdown - - - --- 2019-03-26 Matthew Garrett New
[V31,19/25] x86/mmiotrace: Lock down the testmmiotrace module Add support for kernel lockdown 1 - - --- 2019-03-26 Matthew Garrett New
[V31,18/25] Lock down module params that specify hardware parameters (eg. ioport) Add support for kernel lockdown - - - --- 2019-03-26 Matthew Garrett New
[V31,17/25] Lock down TIOCSSERIAL Add support for kernel lockdown - - - --- 2019-03-26 Matthew Garrett New
[V31,16/25] Prohibit PCMCIA CIS storage when the kernel is locked down Add support for kernel lockdown - - - --- 2019-03-26 Matthew Garrett New
[V31,15/25] acpi: Disable ACPI table override if the kernel is locked down Add support for kernel lockdown - - - --- 2019-03-26 Matthew Garrett New
[V31,14/25] acpi: Ignore acpi_rsdp kernel param when the kernel has been locked down Add support for kernel lockdown - - - --- 2019-03-26 Matthew Garrett New
[V31,13/25] ACPI: Limit access to custom_method when the kernel is locked down Add support for kernel lockdown - - - --- 2019-03-26 Matthew Garrett New
[V31,12/25] x86/msr: Restrict MSR access when the kernel is locked down Add support for kernel lockdown 1 1 - --- 2019-03-26 Matthew Garrett New
[V31,11/25] x86: Lock down IO port access when the kernel is locked down Add support for kernel lockdown - 1 - --- 2019-03-26 Matthew Garrett New
[V31,10/25] PCI: Lock down BAR access when the kernel is locked down Add support for kernel lockdown 1 - - --- 2019-03-26 Matthew Garrett New
[V31,09/25] uswsusp: Disable when the kernel is locked down Add support for kernel lockdown - - - --- 2019-03-26 Matthew Garrett New
[V31,08/25] hibernate: Disable when the kernel is locked down Add support for kernel lockdown - - - --- 2019-03-26 Matthew Garrett New
[V31,07/25] kexec_file: Restrict at runtime if the kernel is locked down Add support for kernel lockdown - 1 - --- 2019-03-26 Matthew Garrett New
[V31,06/25] kexec_file: split KEXEC_VERIFY_SIG into KEXEC_SIG and KEXEC_SIG_FORCE Add support for kernel lockdown - 1 - --- 2019-03-26 Matthew Garrett New
[V31,05/25] Copy secure_boot flag in boot params across kexec reboot Add support for kernel lockdown - - - --- 2019-03-26 Matthew Garrett New
[V31,04/25] kexec_load: Disable at runtime if the kernel is locked down Add support for kernel lockdown 1 - - --- 2019-03-26 Matthew Garrett New
[V31,03/25] Restrict /dev/{mem,kmem,port} when the kernel is locked down Add support for kernel lockdown - - - --- 2019-03-26 Matthew Garrett New
[V31,02/25] Enforce module signatures if the kernel is locked down Add support for kernel lockdown - - - --- 2019-03-26 Matthew Garrett New
[V31,01/25] Add the ability to lock down access to the running kernel image Add support for kernel lockdown - - - --- 2019-03-26 Matthew Garrett New
[v3] KEYS: trusted: allow trusted.ko to initialize w/o a TPM [v3] KEYS: trusted: allow trusted.ko to initialize w/o a TPM - - 1 --- 2019-03-26 Jarkko Sakkinen New
« 1 2 ... 70 71 72120 121 »