Show patches with: Series = security: Add kernel lockdown functionality       |    State = Action Required       |   29 patches
Patch Series A/R/T S/W/F Date Submitter Delegate State
[V36,29/29] lockdown: Print current->comm in restriction messages security: Add kernel lockdown functionality - 1 - 0 0 0 2019-07-18 Matthew Garrett New
[V36,28/29] efi: Restrict efivar_ssdt_load when the kernel is locked down security: Add kernel lockdown functionality 1 1 - 0 0 0 2019-07-18 Matthew Garrett New
[V36,27/29] tracefs: Restrict tracefs when the kernel is locked down security: Add kernel lockdown functionality - - - 0 0 0 2019-07-18 Matthew Garrett New
[V36,26/29] debugfs: Restrict debugfs when the kernel is locked down security: Add kernel lockdown functionality - - - 0 0 0 2019-07-18 Matthew Garrett New
[V36,25/29] kexec: Allow kexec_file() with appropriate IMA policy when locked down security: Add kernel lockdown functionality 1 - - 0 0 0 2019-07-18 Matthew Garrett New
[V36,24/29] Lock down perf when in confidentiality mode security: Add kernel lockdown functionality - 1 - 0 0 0 2019-07-18 Matthew Garrett New
[V36,23/29] bpf: Restrict bpf when kernel lockdown is in confidentiality mode security: Add kernel lockdown functionality - 1 - 0 0 0 2019-07-18 Matthew Garrett New
[V36,22/29] Lock down tracing and perf kprobes when in confidentiality mode security: Add kernel lockdown functionality 1 1 - 0 0 0 2019-07-18 Matthew Garrett New
[V36,21/29] Lock down /proc/kcore security: Add kernel lockdown functionality - 1 - 0 0 0 2019-07-18 Matthew Garrett New
[V36,20/29] x86/mmiotrace: Lock down the testmmiotrace module security: Add kernel lockdown functionality 1 1 - 0 0 0 2019-07-18 Matthew Garrett New
[V36,19/29] Lock down module params that specify hardware parameters (eg. ioport) security: Add kernel lockdown functionality - 1 - 0 0 0 2019-07-18 Matthew Garrett New
[V36,18/29] Lock down TIOCSSERIAL security: Add kernel lockdown functionality - 1 - 0 0 0 2019-07-18 Matthew Garrett New
[V36,17/29] Prohibit PCMCIA CIS storage when the kernel is locked down security: Add kernel lockdown functionality - 1 - 0 0 0 2019-07-18 Matthew Garrett New
[V36,16/29] acpi: Disable ACPI table override if the kernel is locked down security: Add kernel lockdown functionality - 1 - 0 0 0 2019-07-18 Matthew Garrett New
[V36,15/29] acpi: Ignore acpi_rsdp kernel param when the kernel has been locked down security: Add kernel lockdown functionality - 1 - 0 0 0 2019-07-18 Matthew Garrett New
[V36,14/29] ACPI: Limit access to custom_method when the kernel is locked down security: Add kernel lockdown functionality - 1 - 0 0 0 2019-07-18 Matthew Garrett New
[V36,13/29] x86/msr: Restrict MSR access when the kernel is locked down security: Add kernel lockdown functionality 1 1 - 0 0 0 2019-07-18 Matthew Garrett New
[V36,12/29] x86: Lock down IO port access when the kernel is locked down security: Add kernel lockdown functionality - 1 - 0 0 0 2019-07-18 Matthew Garrett New
[V36,11/29] PCI: Lock down BAR access when the kernel is locked down security: Add kernel lockdown functionality 1 1 - 0 0 0 2019-07-18 Matthew Garrett New
[V36,10/29] hibernate: Disable when the kernel is locked down security: Add kernel lockdown functionality - 1 - 0 0 0 2019-07-18 Matthew Garrett New
[V36,09/29] kexec_file: Restrict at runtime if the kernel is locked down security: Add kernel lockdown functionality - 2 - 0 0 0 2019-07-18 Matthew Garrett New
[V36,08/29] kexec_file: split KEXEC_VERIFY_SIG into KEXEC_SIG and KEXEC_SIG_FORCE security: Add kernel lockdown functionality - 2 - 0 0 0 2019-07-18 Matthew Garrett New
[V36,07/29] Copy secure_boot flag in boot params across kexec reboot security: Add kernel lockdown functionality - 1 - 0 0 0 2019-07-18 Matthew Garrett New
[V36,06/29] kexec_load: Disable at runtime if the kernel is locked down security: Add kernel lockdown functionality 1 1 - 0 0 0 2019-07-18 Matthew Garrett New
[V36,05/29] Restrict /dev/{mem,kmem,port} when the kernel is locked down security: Add kernel lockdown functionality - 1 - 0 0 0 2019-07-18 Matthew Garrett New
[V36,04/29] Enforce module signatures if the kernel is locked down security: Add kernel lockdown functionality - 1 - 0 0 0 2019-07-18 Matthew Garrett New
[V36,03/29] security: Add a static lockdown policy LSM security: Add kernel lockdown functionality - 1 - 0 0 0 2019-07-18 Matthew Garrett New
[V36,02/29] security: Add a "locked down" LSM hook security: Add kernel lockdown functionality 2 - - 0 0 0 2019-07-18 Matthew Garrett New
[V36,01/29] security: Support early LSMs security: Add kernel lockdown functionality 2 - - 0 0 0 2019-07-18 Matthew Garrett New