Show patches with: State = Action Required       |    Archived = No       |   943 patches
« 1 2 3 49 10 »
Patch Series A/R/T S/W/F Date Submitter Delegate State
[v35,15/29] LSM: Ensure the correct LSM context releaser [v35,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 3 2 - --- 2022-04-18 Casey Schaufler New
[v35,14/29] LSM: Specify which LSM to display [v35,01/29] integrity: disassociate ima_filter_rule from security_audit_rule - - - --- 2022-04-18 Casey Schaufler New
[v35,13/29] LSM: Use lsmblob in security_cred_getsecid [v35,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 2 2 - --- 2022-04-18 Casey Schaufler New
[v35,12/29] LSM: Use lsmblob in security_inode_getsecid [v35,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 2 2 - --- 2022-04-18 Casey Schaufler New
[v35,11/29] LSM: Use lsmblob in security_current_getsecid [v35,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 2 2 - --- 2022-04-18 Casey Schaufler New
[v35,10/29] LSM: Use lsmblob in security_ipc_getsecid [v35,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 2 2 - --- 2022-04-18 Casey Schaufler New
[v35,09/29] LSM: Use lsmblob in security_secid_to_secctx [v35,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 1 1 - --- 2022-04-18 Casey Schaufler New
[v35,08/29] LSM: Use lsmblob in security_secctx_to_secid [v35,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 1 2 - --- 2022-04-18 Casey Schaufler New
[v35,07/29] LSM: Use lsmblob in security_kernel_act_as [v35,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 2 2 - --- 2022-04-18 Casey Schaufler New
[v35,06/29] LSM: Use lsmblob in security_audit_rule_match [v35,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 1 1 - --- 2022-04-18 Casey Schaufler New
[v35,05/29] IMA: avoid label collisions with stacked LSMs [v35,01/29] integrity: disassociate ima_filter_rule from security_audit_rule - 1 - --- 2022-04-18 Casey Schaufler New
[v35,04/29] LSM: provide lsm name and id slot mappings [v35,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 1 2 - --- 2022-04-18 Casey Schaufler New
[v35,03/29] LSM: Add the lsmblob data structure. [v35,01/29] integrity: disassociate ima_filter_rule from security_audit_rule - 1 - --- 2022-04-18 Casey Schaufler New
[v35,02/29] LSM: Infrastructure management of the sock security [v35,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 2 2 - --- 2022-04-18 Casey Schaufler New
[v35,01/29] integrity: disassociate ima_filter_rule from security_audit_rule [v35,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 1 1 - --- 2022-04-18 Casey Schaufler New
[RFC,7/7] SELINUXNS: Fixing concurrency issues SELinux-namespace - - - --- 2022-04-18 Alexander Kozhevnikov New
[RFC,6/7] SELINUXNS: Fixing superblock security structure memory leakage SELinux-namespace - - - --- 2022-04-18 Alexander Kozhevnikov New
[RFC,5/7] SELINUXNS: Migrate all open files and all vma to new namespace SELinux-namespace - - - --- 2022-04-18 Alexander Kozhevnikov New
[RFC,4/7] SELINUXNS: Namespacing for xattrs SELinux-namespace - - - --- 2022-04-18 Alexander Kozhevnikov New
[RFC,3/7] SELINUXNS: Fix initilization of the superblock security under spinlock SELinux-namespace - - - --- 2022-04-18 Alexander Kozhevnikov New
[RFC,2/7] selinux: support per-namespace superblock security structures SELinux-namespace - - - --- 2022-04-18 Alexander Kozhevnikov New
[RFC,1/7] LSM: Infrastructure management of the superblock SELinux-namespace 1 2 - --- 2022-04-18 Alexander Kozhevnikov New
[v34,29/29] AppArmor: Remove the exclusive flag [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 2 1 - --- 2022-04-15 Casey Schaufler New
[v34,28/29] LSM: Add /proc attr entry for full LSM context [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule - 1 - --- 2022-04-15 Casey Schaufler New
[v34,27/29] Audit: Add record for multiple object contexts [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule - - - --- 2022-04-15 Casey Schaufler New
[v34,26/29] Audit: Add record for multiple task security contexts [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule - - - --- 2022-04-15 Casey Schaufler New
[v34,25/29] Audit: Allow multiple records in an audit_buffer [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule - - - --- 2022-04-15 Casey Schaufler New
[v34,24/29] LSM: Add a function to report multiple LSMs [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule - - - --- 2022-04-15 Casey Schaufler New
[v34,23/29] Audit: Create audit_stamp structure [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 1 - - --- 2022-04-15 Casey Schaufler New
[v34,22/29] Audit: Keep multiple LSM data in audit_names [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 1 - - --- 2022-04-15 Casey Schaufler New
[v34,21/29] LSM: Extend security_secid_to_secctx to include module selection [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule - - - --- 2022-04-15 Casey Schaufler New
[v34,20/29] binder: Pass LSM identifier for confirmation [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule - - - --- 2022-04-15 Casey Schaufler New
[v34,19/29] NET: Store LSM netlabel data in a lsmblob [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 2 2 - --- 2022-04-15 Casey Schaufler New
[v34,18/29] LSM: security_secid_to_secctx in netlink netfilter [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 3 2 - --- 2022-04-15 Casey Schaufler New
[v34,17/29] LSM: Use lsmcontext in security_inode_getsecctx [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 3 2 - --- 2022-04-15 Casey Schaufler New
[v34,16/29] LSM: Use lsmcontext in security_secid_to_secctx [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule - - - --- 2022-04-15 Casey Schaufler New
[v34,15/29] LSM: Ensure the correct LSM context releaser [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 3 2 - --- 2022-04-15 Casey Schaufler New
[v34,14/29] LSM: Specify which LSM to display [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule - - - --- 2022-04-15 Casey Schaufler New
[v34,13/29] LSM: Use lsmblob in security_cred_getsecid [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 2 2 - --- 2022-04-15 Casey Schaufler New
[v34,12/29] LSM: Use lsmblob in security_inode_getsecid [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 2 2 - --- 2022-04-15 Casey Schaufler New
[v34,11/29] LSM: Use lsmblob in security_current_getsecid [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 2 2 - --- 2022-04-15 Casey Schaufler New
[v34,10/29] LSM: Use lsmblob in security_ipc_getsecid [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 2 2 - --- 2022-04-15 Casey Schaufler New
[v34,09/29] LSM: Use lsmblob in security_secid_to_secctx [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 1 1 - --- 2022-04-15 Casey Schaufler New
[v34,08/29] LSM: Use lsmblob in security_secctx_to_secid [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 1 1 - --- 2022-04-15 Casey Schaufler New
[v34,07/29] LSM: Use lsmblob in security_kernel_act_as [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 2 2 - --- 2022-04-15 Casey Schaufler New
[v34,06/29] LSM: Use lsmblob in security_audit_rule_match [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 1 - - --- 2022-04-15 Casey Schaufler New
[v34,05/29] IMA: avoid label collisions with stacked LSMs [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule - - - --- 2022-04-15 Casey Schaufler New
[v34,04/29] LSM: provide lsm name and id slot mappings [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 1 1 - --- 2022-04-15 Casey Schaufler New
[v34,03/29] LSM: Add the lsmblob data structure. [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule - 1 - --- 2022-04-15 Casey Schaufler New
[v34,02/29] LSM: Infrastructure management of the sock security [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 2 2 - --- 2022-04-15 Casey Schaufler New
[v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 1 - - --- 2022-04-15 Casey Schaufler New
[v7,6/6] MAINTAINERS: add myself as CAAM trusted key maintainer KEYS: trusted: Introduce support for NXP CAAM-based trusted keys - - - --- 2022-04-15 Ahmad Fatoum New
[v7,5/6] doc: trusted-encrypted: describe new CAAM trust source KEYS: trusted: Introduce support for NXP CAAM-based trusted keys - - - --- 2022-04-15 Ahmad Fatoum New
[v7,4/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys KEYS: trusted: Introduce support for NXP CAAM-based trusted keys - 3 3 --- 2022-04-15 Ahmad Fatoum New
[v7,3/6] crypto: caam - add in-kernel interface for blob generator KEYS: trusted: Introduce support for NXP CAAM-based trusted keys - 2 2 --- 2022-04-15 Ahmad Fatoum New
[v7,2/6] KEYS: trusted: allow use of kernel RNG for key material KEYS: trusted: Introduce support for NXP CAAM-based trusted keys 2 3 - --- 2022-04-15 Ahmad Fatoum New
[v7,1/6] KEYS: trusted: allow use of TEE as backend without TCG_TPM support KEYS: trusted: Introduce support for NXP CAAM-based trusted keys - 2 2 --- 2022-04-15 Ahmad Fatoum New
[v7] efi: Do not import certificates from UEFI Secure Boot for T2 Macs [v7] efi: Do not import certificates from UEFI Secure Boot for T2 Macs - 1 - --- 2022-04-15 Aditya Garg New
[v6] efi: Do not import certificates from UEFI Secure Boot for T2 Macs [v6] efi: Do not import certificates from UEFI Secure Boot for T2 Macs - - - --- 2022-04-15 Aditya Garg New
ima: simplify if-if to if-else ima: simplify if-if to if-else - - - --- 2022-04-14 Yihao Han New
[v6,3/4] arm64: kexec_file: use more system keyrings to verify kernel image signature Untitled series #632067 2 - - --- 2022-04-14 Coiby Xu New
[v6,2/4] kexec, KEYS: make the code in bzImage64_verify_sig generic Untitled series #632067 - 1 - --- 2022-04-14 Coiby Xu New
[v5] efi: Do not import certificates from UEFI Secure Boot for T2 Macs [v5] efi: Do not import certificates from UEFI Secure Boot for T2 Macs - - - --- 2022-04-13 Aditya Garg New
[v10,4/4] docs: security: Add secrets/coco documentation Allow guest access to EFI confidential computing secret area - 1 - --- 2022-04-12 Dov Murik New
[v10,3/4] efi: Register efi_secret platform device if EFI secret area is declared Allow guest access to EFI confidential computing secret area - 1 - --- 2022-04-12 Dov Murik New
[v10,2/4] virt: Add efi_secret module to expose confidential computing secrets Allow guest access to EFI confidential computing secret area - 1 - --- 2022-04-12 Dov Murik New
[v10,1/4] efi: Save location of EFI confidential computing area Allow guest access to EFI confidential computing secret area - 1 - --- 2022-04-12 Dov Murik New
[v4,RESEND] efi: Do not import certificates from UEFI Secure Boot for T2 Macs [v4,RESEND] efi: Do not import certificates from UEFI Secure Boot for T2 Macs - - - --- 2022-04-12 Aditya Garg New
[v4] efi: Do not import certificates from UEFI Secure Boot for T2 Macs [v4] efi: Do not import certificates from UEFI Secure Boot for T2 Macs - - - --- 2022-04-12 Aditya Garg New
[v3,RESEND] efi: Do not import certificates from UEFI Secure Boot for T2 Macs [v3,RESEND] efi: Do not import certificates from UEFI Secure Boot for T2 Macs - - - --- 2022-04-10 Aditya Garg New
[v34,29/29] AppArmor: Remove the exclusive flag LSM: Module stacking for AppArmor 2 1 - --- 2022-04-07 Casey Schaufler New
[v34,28/29] LSM: Add /proc attr entry for full LSM context LSM: Module stacking for AppArmor - 1 - --- 2022-04-07 Casey Schaufler New
[v34,27/29] Audit: Add record for multiple object contexts LSM: Module stacking for AppArmor - - - --- 2022-04-07 Casey Schaufler New
[v34,26/29] Audit: Add record for multiple task security contexts LSM: Module stacking for AppArmor - - - --- 2022-04-07 Casey Schaufler New
[v34,25/29] Audit: Allow multiple records in an audit_buffer LSM: Module stacking for AppArmor - - - --- 2022-04-07 Casey Schaufler New
[v34,24/29] LSM: Add a function to report multiple LSMs LSM: Module stacking for AppArmor - - - --- 2022-04-07 Casey Schaufler New
[v34,23/29] Audit: Create audit_stamp structure LSM: Module stacking for AppArmor 1 - - --- 2022-04-07 Casey Schaufler New
[v34,22/29] Audit: Keep multiple LSM data in audit_names LSM: Module stacking for AppArmor 1 - - --- 2022-04-07 Casey Schaufler New
[v34,21/29] LSM: Extend security_secid_to_secctx to include module selection LSM: Module stacking for AppArmor - - - --- 2022-04-07 Casey Schaufler New
[v34,20/29] binder: Pass LSM identifier for confirmation LSM: Module stacking for AppArmor - - - --- 2022-04-07 Casey Schaufler New
[v34,19/29] NET: Store LSM netlabel data in a lsmblob LSM: Module stacking for AppArmor 2 2 - --- 2022-04-07 Casey Schaufler New
[v34,18/29] LSM: security_secid_to_secctx in netlink netfilter LSM: Module stacking for AppArmor 3 2 - --- 2022-04-07 Casey Schaufler New
[v34,17/29] LSM: Use lsmcontext in security_inode_getsecctx LSM: Module stacking for AppArmor 3 2 - --- 2022-04-07 Casey Schaufler New
[v34,16/29] LSM: Use lsmcontext in security_secid_to_secctx LSM: Module stacking for AppArmor - - - --- 2022-04-07 Casey Schaufler New
[v34,15/29] LSM: Ensure the correct LSM context releaser LSM: Module stacking for AppArmor 3 2 - --- 2022-04-07 Casey Schaufler New
[v34,14/29] LSM: Specify which LSM to display LSM: Module stacking for AppArmor - - - --- 2022-04-07 Casey Schaufler New
[v34,13/29] LSM: Use lsmblob in security_cred_getsecid LSM: Module stacking for AppArmor 2 2 - --- 2022-04-07 Casey Schaufler New
[v34,12/29] LSM: Use lsmblob in security_inode_getsecid LSM: Module stacking for AppArmor 2 2 - --- 2022-04-07 Casey Schaufler New
[v34,11/29] LSM: Use lsmblob in security_current_getsecid LSM: Module stacking for AppArmor 2 2 - --- 2022-04-07 Casey Schaufler New
[v34,10/29] LSM: Use lsmblob in security_ipc_getsecid LSM: Module stacking for AppArmor 2 2 - --- 2022-04-07 Casey Schaufler New
[v34,09/29] LSM: Use lsmblob in security_secid_to_secctx LSM: Module stacking for AppArmor 1 1 - --- 2022-04-07 Casey Schaufler New
[v34,08/29] LSM: Use lsmblob in security_secctx_to_secid LSM: Module stacking for AppArmor 1 1 - --- 2022-04-07 Casey Schaufler New
[v34,07/29] LSM: Use lsmblob in security_kernel_act_as LSM: Module stacking for AppArmor 2 2 - --- 2022-04-07 Casey Schaufler New
[v34,06/29] LSM: Use lsmblob in security_audit_rule_match LSM: Module stacking for AppArmor 1 - - --- 2022-04-07 Casey Schaufler New
[v34,05/29] IMA: avoid label collisions with stacked LSMs LSM: Module stacking for AppArmor - - - --- 2022-04-07 Casey Schaufler New
[v34,04/29] LSM: provide lsm name and id slot mappings LSM: Module stacking for AppArmor 1 1 - --- 2022-04-07 Casey Schaufler New
[v34,03/29] LSM: Add the lsmblob data structure. LSM: Module stacking for AppArmor - 1 - --- 2022-04-07 Casey Schaufler New
[v34,02/29] LSM: Infrastructure management of the sock security LSM: Module stacking for AppArmor 2 2 - --- 2022-04-07 Casey Schaufler New
[v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule LSM: Module stacking for AppArmor 1 - - --- 2022-04-07 Casey Schaufler New
security: don't treat structure as an array of struct hlist_head security: don't treat structure as an array of struct hlist_head - - - --- 2022-04-07 Bill Wendling New
« 1 2 3 49 10 »