Toggle navigation
Patchwork
Security modules development
Patches
Bundles
About this project
Login
Register
Mail settings
Show patches with
: State =
Action Required
| 12233 patches
Series
Submitter
State
any
Action Required
New
Under Review
Accepted
Rejected
RFC
Not Applicable
Changes Requested
Awaiting Upstream
Superseded
Deferred
Mainlined
Queued
Needs ACK
Handled Elsewhere
In Next
Search
Archived
No
Yes
Both
Delegate
------
Nobody
holtmann
holtmann
holtmann
agk
mchehab
mchehab
gregkh
gregkh
mtosatti
lethal
lethal
avi
asi123
andmike
cvaroqui
nomura
jbrassow
dtor
kueda
bmarzins
tmlind
jmberg
jmberg
mcgrof
lenb
lenb
kyle
felipebalbi
varenet
helge
helge
khilman
khilman
khilman
khilman
jwoithe
mlin
Zhang Rui
Zhang Rui
iksaif
cjackiewicz
hmh
jbarnes
jbarnes
jbarnes
willy
snitzer
iwamatsu
dougsland
mjg59
rafael
rafael
rafael
ericvh@gmail.com
ykzhao
venkip
sandeen
pwsan
lucho@ionkov.net
rminnich
anholt
aystarik
roland
shefty
mason
glikely
krh
djbw
djbw
djbw
cmarinas
doyu
jrn
sage
tomba
mmarek
cjb
trondmy
jikos
bcousson
jic23
olof
olof
olof
nsekhar
weiny2
horms
horms
bwidawsk
bwidawsk
shemminger
eulfhan
josef
josef
josef
dianders
jpan9
hal
kdave
bleung
evalenti
jlbec
bhelgaas
vkoul
vkoul
szlin
davejiang
markgross
tagr
tiwai
vireshk
mmind
dledford
geert
geert
herbert
herbert
kvalo
kvalo
kvalo
bentiss
arend
rzwisler
stellarhopper
stellarhopper
jejb
matthias_bgg
dvhart
axboe
axboe
pcmoore
pcmoore
pcmoore
mkp
mkp
stefan_schmidt
leon
lucvoo
jsakkine
jsakkine
jsakkine
bamse
bamse
demarchi
krzk
groeck
groeck
sboyd
sboyd
mturquette
mturquette
0andriy
carlocaione
luca
dgc
kbingham
derosier
narmstrong
narmstrong
atull
tytso
tytso
djwong
bvanassche
omos
jpirko
jpirko
GustavoARSilva
pkshih
patersonc
brauner
shuahkh
shuahkh
shuahkh
palmer
palmer
jgg
Kishon
idosch
labbott
jsimmons
broonie
broonie
broonie
mricon
mricon
mricon
kees
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
arnd
linusw
perfinion
bbrezillon
bachradsusi
rostedt
rostedt
kholk
nbd
ebiggers
ebiggers
pavelm
sds
m0reeze
ganis
jwcart2
matttbe
andmur01
lorpie01
chanwoochoi
dlezcano
jhedberg
vudentz
robertfoss
bgix
tedd_an
tsbogend
wens
wcrobert
robher
kstewart
kwilczynski
hansg
bpf
netdev
dsa
ethtool
netdrv
martineau
abelloni
trix
pabeni
mani_sadhasivam
liusong6
mjp
tohojo
pmalani
prestwoj
prestwoj
dhowells
tzungbi
conchuod
paulmck
jes
mtkaczyk
colyli
pateldipen1984
iweiny
iweiny
bjorn
mhiramat
JanKiszka
jaegeuk
mraynal
aring
konradybcio
ij
Hailan
jstitt007
denkenz
denkenz
mkorenbl
jjohnson
frank_li
geliang
mdraidci
Apply
«
1
2
...
45
46
47
…
122
123
»
Patch
Series
A/R/T
S/W/F
Date
Submitter
Delegate
State
[06/11] dm-verity: add bdev_setsecurity hook for dm-verity signature
Integrity Policy Enforcement LSM (IPE)
- - -
-
-
-
2020-04-06
Deven Bowers
New
[05/11] dm-verity: move signature check after tree validation
Integrity Policy Enforcement LSM (IPE)
- - -
-
-
-
2020-04-06
Deven Bowers
New
[05/11] dm|dm-verity: refactor root-hash signature option
Untitled series #267049
- - -
-
-
-
2020-04-06
Deven Bowers
New
[04/11] fs: add security blob and hooks for block_device
Integrity Policy Enforcement LSM (IPE)
- - -
-
-
-
2020-04-06
Deven Bowers
New
[03/11] ipe: add property for trust of boot volume
Integrity Policy Enforcement LSM (IPE)
- - -
-
-
-
2020-04-06
Deven Bowers
New
[01/11] scripts: add ipe tooling to generate boot policy
Integrity Policy Enforcement LSM (IPE)
- - -
-
-
-
2020-04-06
Deven Bowers
New
tpm2_load_command leaks memory
tpm2_load_command leaks memory
- - -
-
-
-
2021-06-10
Dhiraj Shah
New
security: tomoyo: Fix obsolete function
security: tomoyo: Fix obsolete function
1 - -
-
-
-
2018-09-04
Ding Xiang
New
[v2] evm: Fix memleak in init_desc
[v2] evm: Fix memleak in init_desc
- - -
-
-
-
2021-01-10
Dinghao Liu
New
evm: Fix memleak in init_desc
evm: Fix memleak in init_desc
- - -
-
-
-
2021-01-09
Dinghao Liu
New
[v5,next,5/5] net: modules: use request_module_cap() to load 'netdev-%s' modules
- - -
-
-
-
2017-11-27
Djalal Harouni
New
[v5,next,4/5] modules:capabilities: add a per-task modules auto-load mode
- - -
-
-
-
2017-11-27
Djalal Harouni
New
[v5,next,3/5] modules:capabilities: automatic module loading restriction
- - -
-
-
-
2017-11-27
Djalal Harouni
New
[v5,next,2/5] modules:capabilities: add cap_kernel_module_request() permission check
- - -
-
-
-
2017-11-27
Djalal Harouni
New
[v5,next,1/5] modules:capabilities: add request_module_cap()
- - -
-
-
-
2017-11-27
Djalal Harouni
New
[RFC,v3,7/7] proc: flush dcache entries from all procfs instances
- - -
-
-
-
2017-11-09
Djalal Harouni
New
[RFC,v3,6/7] proc: support new 'pids=all|ptraceable' mount option
- 1 -
-
-
-
2017-11-09
Djalal Harouni
New
[RFC,v3,5/7] proc: move hidepid definitions to proc files
- - -
-
-
-
2017-11-09
Djalal Harouni
New
[RFC,v3,4/7] proc: support mounting private procfs instances inside same pid namespace
- 1 -
-
-
-
2017-11-09
Djalal Harouni
New
[RFC,v3,3/7] proc: add helpers to set and get proc hidepid and gid mount options
- - -
-
-
-
2017-11-09
Djalal Harouni
New
[RFC,v3,2/7] proc: move /proc/{self|thread-self} dentries to proc_fs_info
- - -
-
-
-
2017-11-09
Djalal Harouni
New
[RFC,v3,1/7] proc: add proc_fs_info struct to store proc information
- - -
-
-
-
2017-11-09
Djalal Harouni
New
[v4,next,3/3] modules:capabilities: add a per-task modules auto-load mode
- - -
-
-
-
2017-05-22
Djalal Harouni
New
[v4,next,2/3] modules:capabilities: automatic module loading restriction
- - -
-
-
-
2017-05-22
Djalal Harouni
New
[v4,next,1/3] modules:capabilities: allow __request_module() to take a capability argument
- - -
-
-
-
2017-05-22
Djalal Harouni
New
[RFC,v2,6/6] proc: flush task dcache entries from all procfs instances
- - -
-
-
-
2017-04-25
Djalal Harouni
New
[RFC,v2,5/6] proc: instantiate only pids that we can ptrace on 'limit_pids=1' mount option
- - -
-
-
-
2017-04-25
Djalal Harouni
New
[RFC,v2,4/6] proc: support mounting private procfs instances inside same pid namespace
- - -
-
-
-
2017-04-25
Djalal Harouni
New
[RFC,v2,3/6] proc: add helpers to set and get proc hidepid and gid mount options
- - -
-
-
-
2017-04-25
Djalal Harouni
New
[RFC,v2,2/6] proc: move /proc/{self|thread-self} dentries to proc_fs_info
- - -
-
-
-
2017-04-25
Djalal Harouni
New
[RFC,v2,1/6] proc: add proc_fs_info struct to store proc information
- - -
-
-
-
2017-04-25
Djalal Harouni
New
[v3,2/2] modules:capabilities: add a per-task modules autoload restriction
- - -
-
-
-
2017-04-19
Djalal Harouni
New
[v3,1/2] modules:capabilities: automatic module loading restriction
- - -
-
-
-
2017-04-19
Djalal Harouni
New
[RFC,v2,3/3] Documentation: add ModAutoRestrict LSM documentation
- - -
-
-
-
2017-04-09
Djalal Harouni
New
[RFC,v2,2/3] security: add the ModAutoRestrict Linux Security Module
- - -
-
-
-
2017-04-09
Djalal Harouni
New
[RFC,v2,1/3] LSM: Allow per LSM module per "struct task_struct" blob.
- - -
-
-
-
2017-04-09
Djalal Harouni
New
[RFC,4/4] proc: support flushing dcache entries of a task on multiple procfs mounts
- - -
-
-
-
2017-03-30
Djalal Harouni
New
[RFC,3/4] proc: support mounting new procfs instances inside same pid namespace
- - -
-
-
-
2017-03-30
Djalal Harouni
New
[RFC,2/4] proc: add helpers to set/get hidepid and gid mount options
- - -
-
-
-
2017-03-30
Djalal Harouni
New
[RFC,1/4] proc: add proc_fs_info struct to store proc options
- - -
-
-
-
2017-03-30
Djalal Harouni
New
[RFC/PATCH,3/3] doc: add Timgad LSM documentation
- - -
-
-
-
2017-02-02
Djalal Harouni
New
[RFC/PATCH,2/3] security: Add the Timgad module
- - -
-
-
-
2017-02-02
Djalal Harouni
New
[RFC/PATCH,1/3] security: add the security_task_copy() hook
- - -
-
-
-
2017-02-02
Djalal Harouni
New
[PATCHv6,1/1] ima: re-introduce own integrity cache lock
- - -
-
-
-
2017-12-05
Dmitry Kasatkin
New
[PATCHv5,1/1] ima: re-introduce own integrity cache lock
- - -
-
-
-
2017-12-01
Dmitry Kasatkin
New
[3/3] kernel/auditsc: use correct blob for files in security_audit_rule_match call
[1/3] security/security: remove extra address-of in hook.audit_rule_match call
- - -
-
-
-
2021-08-06
Dmitry Mastykin
New
[2/3] security/security: get rid of a duplicated condition
[1/3] security/security: remove extra address-of in hook.audit_rule_match call
- - -
-
-
-
2021-08-06
Dmitry Mastykin
New
[1/3] security/security: remove extra address-of in hook.audit_rule_match call
[1/3] security/security: remove extra address-of in hook.audit_rule_match call
- - -
-
-
-
2021-08-06
Dmitry Mastykin
New
commoncap: Make cap_inode_killpriv ignore other LSM xattr
commoncap: Make cap_inode_killpriv ignore other LSM xattr
- - -
-
-
-
2020-05-22
Dmitry Mastykin
New
tomoyo: Check exceeded quota early in tomoyo_domain_quota_is_ok().
tomoyo: Check exceeded quota early in tomoyo_domain_quota_is_ok().
- - -
-
-
-
2021-12-14
Dmitry Vyukov
New
[RFC,v5,2/2] fuse: introduce new fs_type flag FS_IMA_NO_CACHE
3 - 1
-
-
-
2018-02-07
Dongsu Park
New
[RFC,v5,1/2] ima: force re-appraisal on filesystems with FS_IMA_NO_CACHE
2 - 1
-
-
-
2018-02-07
Dongsu Park
New
[RFC,v4,2/2] ima: force re-appraisal on filesystems with FS_IMA_NO_CACHE
2 - 1
-
-
-
2018-01-30
Dongsu Park
New
[RFC,v4,1/2] fuse: introduce new fs_type flag FS_IMA_NO_CACHE
3 - 1
-
-
-
2018-01-30
Dongsu Park
New
[2/2] ima: turn on force option for FUSE in builtin policies
- - -
-
-
-
2018-01-11
Dongsu Park
New
[11/11] evm: Don't update hmacs in user ns mounts
- - -
-
-
-
2017-12-22
Dongsu Park
New
[06/11] capabilities: Allow privileged user in s_user_ns to set security.* xattrs
- 1 -
-
-
-
2017-12-22
Dongsu Park
New
[v10,4/4] docs: security: Add secrets/coco documentation
Allow guest access to EFI confidential computing secret area
- 1 -
-
-
-
2022-04-12
Dov Murik
New
[v10,3/4] efi: Register efi_secret platform device if EFI secret area is declared
Allow guest access to EFI confidential computing secret area
- 1 -
-
-
-
2022-04-12
Dov Murik
New
[v10,2/4] virt: Add efi_secret module to expose confidential computing secrets
Allow guest access to EFI confidential computing secret area
- 1 -
-
-
-
2022-04-12
Dov Murik
New
[v10,1/4] efi: Save location of EFI confidential computing area
Allow guest access to EFI confidential computing secret area
- 1 -
-
-
-
2022-04-12
Dov Murik
New
[v9,4/4] docs: security: Add secrets/coco documentation
Allow guest access to EFI confidential computing secret area
- 1 -
-
-
-
2022-03-31
Dov Murik
New
[v9,3/4] efi: Register efi_secret platform device if EFI secret area is declared
Allow guest access to EFI confidential computing secret area
- 1 -
-
-
-
2022-03-31
Dov Murik
New
[v9,2/4] virt: Add efi_secret module to expose confidential computing secrets
Allow guest access to EFI confidential computing secret area
- 1 -
-
-
-
2022-03-31
Dov Murik
New
[v9,1/4] efi: Save location of EFI confidential computing area
Allow guest access to EFI confidential computing secret area
- 1 -
-
-
-
2022-03-31
Dov Murik
New
[v8,4/4] docs: security: Add secrets/coco documentation
Allow guest access to EFI confidential computing secret area
- 1 -
-
-
-
2022-02-28
Dov Murik
New
[v8,3/4] efi: Load efi_secret module if EFI secret area is populated
Allow guest access to EFI confidential computing secret area
- 1 -
-
-
-
2022-02-28
Dov Murik
New
[v8,2/4] virt: Add efi_secret module to expose confidential computing secrets
Allow guest access to EFI confidential computing secret area
- 1 -
-
-
-
2022-02-28
Dov Murik
New
[v8,1/4] efi: Save location of EFI confidential computing area
Allow guest access to EFI confidential computing secret area
- 1 -
-
-
-
2022-02-28
Dov Murik
New
[v7,5/5] docs: security: Add coco/efi_secret documentation
Allow guest access to EFI confidential computing secret area
- 1 -
-
-
-
2022-02-01
Dov Murik
New
[v7,4/5] efi: Load efi_secret module if EFI secret area is populated
Allow guest access to EFI confidential computing secret area
- 1 -
-
-
-
2022-02-01
Dov Murik
New
[v7,3/5] virt: Add efi_secret module to expose confidential computing secrets
Allow guest access to EFI confidential computing secret area
- - -
-
-
-
2022-02-01
Dov Murik
New
[v7,2/5] efi/libstub: Reserve confidential computing secret area
Allow guest access to EFI confidential computing secret area
- - -
-
-
-
2022-02-01
Dov Murik
New
[v7,1/5] efi: Save location of EFI confidential computing area
Allow guest access to EFI confidential computing secret area
- 1 -
-
-
-
2022-02-01
Dov Murik
New
[v6,5/5] docs: security: Add coco/efi_secret documentation
Allow guest access to EFI confidential computing secret area
- - -
-
-
-
2021-11-29
Dov Murik
New
[v6,4/5] efi: Load efi_secret module if EFI secret area is populated
Allow guest access to EFI confidential computing secret area
- - -
-
-
-
2021-11-29
Dov Murik
New
[v6,3/5] virt: Add efi_secret module to expose confidential computing secrets
Allow guest access to EFI confidential computing secret area
- - -
-
-
-
2021-11-29
Dov Murik
New
[v6,2/5] efi/libstub: Reserve confidential computing secret area
Allow guest access to EFI confidential computing secret area
- - -
-
-
-
2021-11-29
Dov Murik
New
[v6,1/5] efi: Save location of EFI confidential computing area
Allow guest access to EFI confidential computing secret area
- - -
-
-
-
2021-11-29
Dov Murik
New
[v5,4/4] docs: security: Add coco/efi_secret documentation
Allow guest access to EFI confidential computing secret area
- - -
-
-
-
2021-11-18
Dov Murik
New
[v5,3/4] virt: Add efi_secret module to expose confidential computing secrets
Allow guest access to EFI confidential computing secret area
- - -
-
-
-
2021-11-18
Dov Murik
New
[v5,2/4] efi/libstub: Reserve confidential computing secret area
Allow guest access to EFI confidential computing secret area
- - -
-
-
-
2021-11-18
Dov Murik
New
[v5,1/4] efi: Save location of EFI confidential computing area
Allow guest access to EFI confidential computing secret area
- - -
-
-
-
2021-11-18
Dov Murik
New
[v4,3/3] virt: Add efi_secret module to expose confidential computing secrets
Allow guest access to EFI confidential computing secret area
- - -
-
-
-
2021-10-20
Dov Murik
New
[v4,2/3] efi: Reserve confidential computing secret area
Allow guest access to EFI confidential computing secret area
- - -
-
-
-
2021-10-20
Dov Murik
New
[v4,1/3] efi/libstub: Copy confidential computing secret area
Allow guest access to EFI confidential computing secret area
- - -
-
-
-
2021-10-20
Dov Murik
New
[v3,3/3] virt: Add efi_secret module to expose confidential computing secrets
Allow guest access to EFI confidential computing secret area
- - -
-
-
-
2021-10-14
Dov Murik
New
[v3,2/3] efi: Reserve confidential computing secret area
Allow guest access to EFI confidential computing secret area
- - -
-
-
-
2021-10-14
Dov Murik
New
[v3,1/3] efi/libstub: Copy confidential computing secret area
Allow guest access to EFI confidential computing secret area
- - -
-
-
-
2021-10-14
Dov Murik
New
[v2,4/4] virt: Add sev_secret module to expose confidential computing secrets
Allow access to confidential computing secret area in SEV guests
- - -
-
-
-
2021-10-07
Dov Murik
New
[v2,3/4] efi: Reserve confidential computing secret area
Allow access to confidential computing secret area in SEV guests
- - -
-
-
-
2021-10-07
Dov Murik
New
[v2,2/4] efi/libstub: Copy confidential computing secret area
Allow access to confidential computing secret area in SEV guests
- - -
-
-
-
2021-10-07
Dov Murik
New
[v2,1/4] x86: Export clean_cache_range()
Allow access to confidential computing secret area in SEV guests
- - -
-
-
-
2021-10-07
Dov Murik
New
[3/3] virt: Add sev_secret module to expose confidential computing secrets
Allow access to confidential computing secret area in SEV guests
- - -
-
-
-
2021-08-09
Dov Murik
New
[2/3] efi: Reserve confidential computing secret area
Allow access to confidential computing secret area in SEV guests
- - -
-
-
-
2021-08-09
Dov Murik
New
[1/3] efi/libstub: Copy confidential computing secret area
Allow access to confidential computing secret area in SEV guests
- - -
-
-
-
2021-08-09
Dov Murik
New
[RFC,v2,3/3] virt: Add sev_secret module to expose confidential computing secrets
Allow access to confidential computing secret area
- - -
-
-
-
2021-06-28
Dov Murik
New
[RFC,v2,2/3] efi: Reserve confidential computing secret area
Allow access to confidential computing secret area
- - -
-
-
-
2021-06-28
Dov Murik
New
[RFC,v2,1/3] efi/libstub: Copy confidential computing secret area
Allow access to confidential computing secret area
- - -
-
-
-
2021-06-28
Dov Murik
New
[RFC,3/3] virt: Add sev_secret module to expose confidential computing secrets
Allow access to confidential computing secret area
- - -
-
-
-
2021-05-13
Dov Murik
New
«
1
2
...
45
46
47
…
122
123
»