Show patches with: Archived = No       |   1023 patches
« 1 2 3 410 11 »
Patch Series A/R/T S/W/F Date Submitter Delegate State
[01/11] S.A.R.A. Documentation - - - --- 2017-06-12 Salvatore Mesoraca Superseded
[02/11] S.A.R.A. framework creation - - - --- 2017-06-12 Salvatore Mesoraca Superseded
[03/11] Creation of "usb_device_auth" LSM hook - - - --- 2017-06-12 Salvatore Mesoraca Superseded
[04/11] S.A.R.A. USB Filtering - - - --- 2017-06-12 Salvatore Mesoraca Superseded
[05/11] Creation of "check_vmflags" LSM hook - - - --- 2017-06-12 Salvatore Mesoraca Superseded
[06/11] S.A.R.A. cred blob management - - - --- 2017-06-12 Salvatore Mesoraca Superseded
[07/11] S.A.R.A. WX Protection - - - --- 2017-06-12 Salvatore Mesoraca Superseded
[08/11] Creation of "pagefault_handler_x86" LSM hook - - - --- 2017-06-12 Salvatore Mesoraca Superseded
[09/11] Trampoline emulation - - - --- 2017-06-12 Salvatore Mesoraca Superseded
[10/11] Allowing for stacking procattr support in S.A.R.A. - - - --- 2017-06-12 Salvatore Mesoraca Superseded
[11/11] S.A.R.A. WX Protection procattr interface - - - --- 2017-06-12 Salvatore Mesoraca Superseded
[RFC,v2,1/9] S.A.R.A. Documentation - - - --- 2017-06-15 Salvatore Mesoraca Superseded
[RFC,v2,2/9] S.A.R.A. framework creation - - - --- 2017-06-15 Salvatore Mesoraca Superseded
[RFC,v2,3/9] Creation of "check_vmflags" LSM hook - - - --- 2017-06-15 Salvatore Mesoraca Superseded
[RFC,v2,4/9] S.A.R.A. cred blob management - - - --- 2017-06-15 Salvatore Mesoraca Superseded
[RFC,v2,5/9] S.A.R.A. WX Protection - - - --- 2017-06-15 Salvatore Mesoraca Superseded
[RFC,v2,6/9] Creation of "pagefault_handler_x86" LSM hook - - - --- 2017-06-15 Salvatore Mesoraca Superseded
[RFC,v2,7/9] Trampoline emulation - - - --- 2017-06-15 Salvatore Mesoraca Superseded
[RFC,v2,8/9] Allowing for stacking procattr support in S.A.R.A. - - - --- 2017-06-15 Salvatore Mesoraca Superseded
[RFC,v2,9/9] S.A.R.A. WX Protection procattr interface - - - --- 2017-06-15 Salvatore Mesoraca Superseded
[RFC,v3,1/9] S.A.R.A. Documentation - - - --- 2017-09-11 Salvatore Mesoraca Superseded
[RFC,v3,2/9] S.A.R.A. framework creation - - - --- 2017-09-11 Salvatore Mesoraca Superseded
[RFC,v3,3/9] Creation of "check_vmflags" LSM hook - - - --- 2017-09-11 Salvatore Mesoraca Superseded
[RFC,v3,4/9] S.A.R.A. cred blob management - - - --- 2017-09-11 Salvatore Mesoraca Superseded
[RFC,v3,5/9] S.A.R.A. WX Protection - - - --- 2017-09-11 Salvatore Mesoraca Superseded
[RFC,v3,6/9] Creation of "pagefault_handler" LSM hook - - - --- 2017-09-11 Salvatore Mesoraca Superseded
[RFC,v3,7/9] Trampoline emulation - - - --- 2017-09-11 Salvatore Mesoraca Superseded
[RFC,v3,8/9] Allowing for stacking procattr support in S.A.R.A. - - - --- 2017-09-11 Salvatore Mesoraca Superseded
[RFC,v3,9/9] S.A.R.A. WX Protection procattr interface - - - --- 2017-09-11 Salvatore Mesoraca Superseded
[1/2] security/keys/secure_key: Adds the secure key support based on CAAM. - 1 - --- 2018-07-20 Udit Agarwal Superseded
[2/2] encrypted_keys: Adds support for secure key-type as master key. - 1 - --- 2018-07-20 Udit Agarwal Superseded
[GIT,PULL] SELinux fixes for v5.16 (#2) [GIT,PULL] SELinux fixes for v5.16 (#2) - - - --- 2021-11-23 Paul Moore New
[v30,01/28] integrity: disassociate ima_filter_rule from security_audit_rule LSM: Module stacking for AppArmor 1 - - --- 2021-11-24 Casey Schaufler New
[v30,02/28] LSM: Infrastructure management of the sock security LSM: Module stacking for AppArmor 2 2 - --- 2021-11-24 Casey Schaufler New
[v30,03/28] LSM: Add the lsmblob data structure. LSM: Module stacking for AppArmor - - - --- 2021-11-24 Casey Schaufler New
[v30,04/28] LSM: provide lsm name and id slot mappings LSM: Module stacking for AppArmor 1 1 - --- 2021-11-24 Casey Schaufler New
[v30,05/28] IMA: avoid label collisions with stacked LSMs LSM: Module stacking for AppArmor - - - --- 2021-11-24 Casey Schaufler New
[v30,06/28] LSM: Use lsmblob in security_audit_rule_match LSM: Module stacking for AppArmor 1 - - --- 2021-11-24 Casey Schaufler New
[v30,07/28] LSM: Use lsmblob in security_kernel_act_as LSM: Module stacking for AppArmor 2 2 - --- 2021-11-24 Casey Schaufler New
[v30,08/28] LSM: Use lsmblob in security_secctx_to_secid LSM: Module stacking for AppArmor 1 1 - --- 2021-11-24 Casey Schaufler New
[v30,09/28] LSM: Use lsmblob in security_secid_to_secctx LSM: Module stacking for AppArmor 1 1 - --- 2021-11-24 Casey Schaufler New
[v30,10/28] LSM: Use lsmblob in security_ipc_getsecid LSM: Module stacking for AppArmor 2 2 - --- 2021-11-24 Casey Schaufler New
[v30,11/28] LSM: Use lsmblob in security_task_getsecid LSM: Module stacking for AppArmor 2 2 - --- 2021-11-24 Casey Schaufler New
[v30,12/28] LSM: Use lsmblob in security_inode_getsecid LSM: Module stacking for AppArmor 2 2 - --- 2021-11-24 Casey Schaufler New
[v30,13/28] LSM: Use lsmblob in security_cred_getsecid LSM: Module stacking for AppArmor 2 2 - --- 2021-11-24 Casey Schaufler New
[v30,14/28] LSM: Specify which LSM to display LSM: Module stacking for AppArmor - - - --- 2021-11-24 Casey Schaufler New
[v30,15/28] LSM: Ensure the correct LSM context releaser LSM: Module stacking for AppArmor 3 2 - --- 2021-11-24 Casey Schaufler New
[v30,16/28] LSM: Use lsmcontext in security_secid_to_secctx LSM: Module stacking for AppArmor 2 1 - --- 2021-11-24 Casey Schaufler New
[v30,17/28] LSM: Use lsmcontext in security_inode_getsecctx LSM: Module stacking for AppArmor 3 2 - --- 2021-11-24 Casey Schaufler New
[v30,18/28] LSM: security_secid_to_secctx in netlink netfilter LSM: Module stacking for AppArmor 3 2 - --- 2021-11-24 Casey Schaufler New
[v30,19/28] NET: Store LSM netlabel data in a lsmblob LSM: Module stacking for AppArmor 2 2 - --- 2021-11-24 Casey Schaufler New
[v30,20/28] binder: Pass LSM identifier for confirmation LSM: Module stacking for AppArmor - - - --- 2021-11-24 Casey Schaufler New
[v30,21/28] LSM: Extend security_secid_to_secctx to include module selection LSM: Module stacking for AppArmor - - - --- 2021-11-24 Casey Schaufler New
[v30,22/28] Audit: Keep multiple LSM data in audit_names LSM: Module stacking for AppArmor 1 - - --- 2021-11-24 Casey Schaufler New
[v30,23/28] Audit: Create audit_stamp structure LSM: Module stacking for AppArmor 1 - - --- 2021-11-24 Casey Schaufler New
[v30,24/28] Audit: Add framework for auxiliary records LSM: Module stacking for AppArmor - - - --- 2021-11-24 Casey Schaufler New
[v30,25/28] Audit: Add record for multiple task security contexts LSM: Module stacking for AppArmor - - - --- 2021-11-24 Casey Schaufler New
[v30,26/28] Audit: Add record for multiple object security contexts LSM: Module stacking for AppArmor - - - --- 2021-11-24 Casey Schaufler New
[v30,27/28] LSM: Add /proc attr entry for full LSM context LSM: Module stacking for AppArmor - 1 - --- 2021-11-24 Casey Schaufler New
[v30,28/28] AppArmor: Remove the exclusive flag LSM: Module stacking for AppArmor 2 1 - --- 2021-11-24 Casey Schaufler New
[v8,01/17] KEYS: Create static version of public_key_verify_signature Enroll kernel keys thru MOK - 1 - --- 2021-11-24 Eric Snowberg New
[v8,02/17] integrity: Fix warning about missing prototypes Enroll kernel keys thru MOK - 1 - --- 2021-11-24 Eric Snowberg New
[v8,03/17] integrity: Introduce a Linux keyring called machine Enroll kernel keys thru MOK - 2 - --- 2021-11-24 Eric Snowberg New
[v8,04/17] integrity: Do not allow machine keyring updates following init Enroll kernel keys thru MOK - 1 - --- 2021-11-24 Eric Snowberg New
[v8,05/17] X.509: Parse Basic Constraints for CA Enroll kernel keys thru MOK - - - --- 2021-11-24 Eric Snowberg New
[v8,06/17] KEYS: CA link restriction Enroll kernel keys thru MOK - - - --- 2021-11-24 Eric Snowberg New
[v8,07/17] integrity: restrict INTEGRITY_KEYRING_MACHINE to restrict_link_by_ca Enroll kernel keys thru MOK - 1 - --- 2021-11-24 Eric Snowberg New
[v8,08/17] integrity: add new keyring handler for mok keys Enroll kernel keys thru MOK - 1 - --- 2021-11-24 Eric Snowberg New
[v8,09/17] KEYS: Rename get_builtin_and_secondary_restriction Enroll kernel keys thru MOK - 1 - --- 2021-11-24 Eric Snowberg New
[v8,10/17] KEYS: add a reference to machine keyring Enroll kernel keys thru MOK - 1 - --- 2021-11-24 Eric Snowberg New
[v8,11/17] KEYS: Introduce link restriction for machine keys Enroll kernel keys thru MOK - 1 - --- 2021-11-24 Eric Snowberg New
[v8,12/17] KEYS: integrity: change link restriction to trust the machine keyring Enroll kernel keys thru MOK - 1 - --- 2021-11-24 Eric Snowberg New
[v8,13/17] integrity: store reference to machine keyring Enroll kernel keys thru MOK - 1 - --- 2021-11-24 Eric Snowberg New
[v8,14/17] KEYS: link machine trusted keys to secondary_trusted_keys Enroll kernel keys thru MOK - 1 - --- 2021-11-24 Eric Snowberg New
[v8,15/17] efi/mokvar: move up init order Enroll kernel keys thru MOK - 1 - --- 2021-11-24 Eric Snowberg New
[v8,16/17] integrity: Trust MOK keys if MokListTrustedRT found Enroll kernel keys thru MOK - 1 - --- 2021-11-24 Eric Snowberg New
[v8,17/17] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true Enroll kernel keys thru MOK - 1 - --- 2021-11-24 Eric Snowberg New
[5.15,222/279] block: Check ADMIN before NICE for IOPRIO_CLASS_RT Untitled series #585225 1 1 - --- 2021-11-24 Greg KH New
[5.10,130/154] block: Check ADMIN before NICE for IOPRIO_CLASS_RT Untitled series #585213 1 1 - --- 2021-11-24 Greg KH New
security:trusted_tpm2: Fix memory leak in tpm2_key_encode() security:trusted_tpm2: Fix memory leak in tpm2_key_encode() - - - --- 2021-11-24 Jianglei Nie New
[v5,1/2] certs: export load_certificate_list() to be used outside certs/ integrity: support including firmware ".platform" keys at build time - 1 - --- 2021-11-24 Nayna Jain New
[v5,2/2] integrity: support including firmware ".platform" keys at build time integrity: support including firmware ".platform" keys at build time - 1 - --- 2021-11-24 Nayna Jain New
ima: Fix trivial typos in the comments ima: Fix trivial typos in the comments - 1 - --- 2021-11-24 Austin Kim New
[v2,1/6] s390/kexec_file: Don't opencode appended signature check. KEXEC_SIG with appended signature - - - --- 2021-11-25 Michal Suchánek New
[v2,2/6] powerpc/kexec_file: Add KEXEC_SIG support. KEXEC_SIG with appended signature - - - --- 2021-11-25 Michal Suchánek New
[v2,3/6] kexec_file: Don't opencode appended signature verification. KEXEC_SIG with appended signature - - - --- 2021-11-25 Michal Suchánek New
[v2,4/6] module: strip the signature marker in the verification function. KEXEC_SIG with appended signature - - - --- 2021-11-25 Michal Suchánek New
[v2,5/6] module: Use key_being_used_for for log messages in verify_appended_signature KEXEC_SIG with appended signature - - - --- 2021-11-25 Michal Suchánek New
[v2,6/6] module: Move duplicate mod_check_sig users code to mod_parse_sig KEXEC_SIG with appended signature - - - --- 2021-11-25 Michal Suchánek New
[v6,1/5] efi: Save location of EFI confidential computing area Allow guest access to EFI confidential computing secret area - - - --- 2021-11-29 Dov Murik New
[v6,2/5] efi/libstub: Reserve confidential computing secret area Allow guest access to EFI confidential computing secret area - - - --- 2021-11-29 Dov Murik New
[v6,3/5] virt: Add efi_secret module to expose confidential computing secrets Allow guest access to EFI confidential computing secret area - - - --- 2021-11-29 Dov Murik New
[v6,4/5] efi: Load efi_secret module if EFI secret area is populated Allow guest access to EFI confidential computing secret area - - - --- 2021-11-29 Dov Murik New
[v6,5/5] docs: security: Add coco/efi_secret documentation Allow guest access to EFI confidential computing secret area - - - --- 2021-11-29 Dov Murik New
[RFC,01/20] ima: Add IMA namespace support ima: Namespace IMA with audit support in IMA-ns - - - --- 2021-11-30 Stefan Berger New
[RFC,02/20] ima: Define ns_status for storing namespaced iint data ima: Namespace IMA with audit support in IMA-ns - - - --- 2021-11-30 Stefan Berger New
[RFC,03/20] ima: Namespace audit status flags ima: Namespace IMA with audit support in IMA-ns - - - --- 2021-11-30 Stefan Berger New
[RFC,04/20] ima: Move delayed work queue and variables into ima_namespace ima: Namespace IMA with audit support in IMA-ns - - - --- 2021-11-30 Stefan Berger New
[RFC,05/20] ima: Move IMA's keys queue related variables into ima_namespace ima: Namespace IMA with audit support in IMA-ns - - - --- 2021-11-30 Stefan Berger New
[RFC,06/20] ima: Move policy related variables into ima_namespace ima: Namespace IMA with audit support in IMA-ns - - - --- 2021-11-30 Stefan Berger New
« 1 2 3 410 11 »