Show patches with: Archived = No       |   4008 patches
« 1 2 3 440 41 »
Patch Series A/R/T S/W/F Date Submitter Delegate State
[v4] landlock: Add abstract unix socket connect restriction [v4] landlock: Add abstract unix socket connect restriction - - - --- 2024-06-19 Tahera Fahimi New
[v2,2/2] cipso: make cipso_v4_skbuff_delattr() fully remove the CIPSO options cipso: make cipso_v4_skbuff_delattr() fully remove the CIPSO options - - - --- 2024-06-07 Ondrej Mosnacek pcmoore New
[v2,1/2] cipso: fix total option length computation cipso: make cipso_v4_skbuff_delattr() fully remove the CIPSO options - - - --- 2024-06-07 Ondrej Mosnacek pcmoore New
[RFC,v2,8/8] clavis: Introduce new LSM called clavis Clavis LSM - - - --- 2024-05-31 Eric Snowberg pcmoore New
[RFC,v2,7/8] clavis: Introduce a new key type called clavis_key_acl Clavis LSM - - - --- 2024-05-31 Eric Snowberg pcmoore New
[RFC,v2,6/8] keys: Add ability to track intended usage of the public key Clavis LSM - - - --- 2024-05-31 Eric Snowberg pcmoore New
[RFC,v2,5/8] keys: Add new verification type (VERIFYING_CLAVIS_SIGNATURE) Clavis LSM - - - --- 2024-05-31 Eric Snowberg pcmoore New
[RFC,v2,4/8] clavis: Prevent clavis boot param from changing during kexec Clavis LSM - - - --- 2024-05-31 Eric Snowberg pcmoore New
[RFC,v2,3/8] efi: Make clavis boot param persist across kexec Clavis LSM - - - --- 2024-05-31 Eric Snowberg pcmoore New
[RFC,v2,2/8] clavis: Introduce a new system keyring called clavis Clavis LSM - - - --- 2024-05-31 Eric Snowberg pcmoore New
[RFC,v2,1/8] certs: Introduce ability to link to a system key Clavis LSM - - - --- 2024-05-31 Eric Snowberg pcmoore New
[v2] KEYS: trusted: add missing MODULE_DESCRIPTION() [v2] KEYS: trusted: add missing MODULE_DESCRIPTION() - - - --- 2024-05-30 Jeff Johnson pcmoore New
cred: plug a hole in struct cred cred: plug a hole in struct cred - - - --- 2024-05-30 Mateusz Guzik pcmoore New
[v1,1/2] landlock: Fix d_parent walk Fix warning in collect_domain_accesses() - - - --- 2024-05-16 Mickaël Salaün pcmoore New
[3/3] capabilities: add cap userns sysctl mask Introduce user namespace capabilities - 1 - --- 2024-05-16 Jonathan Calmels pcmoore New
[2/3] capabilities: add securebit for strict userns caps Introduce user namespace capabilities - 1 - --- 2024-05-16 Jonathan Calmels pcmoore New
[1/3] capabilities: user namespace capabilities Introduce user namespace capabilities - 1 - --- 2024-05-16 Jonathan Calmels pcmoore New
[RFC] LSM, net: Add SO_PEERCONTEXT for peer LSM data [RFC] LSM, net: Add SO_PEERCONTEXT for peer LSM data - - - --- 2024-05-13 Casey Schaufler pcmoore New
[RFC] ima: Use sequence number to wait for policy updates [RFC] ima: Use sequence number to wait for policy updates - - - --- 2024-05-07 Roberto Sassu pcmoore New
[2/2] selftests/landlock: Create 'listen_zero', 'deny_listen_zero' tests Forbid illegitimate binding via listen(2) - 1 - --- 2024-04-08 Mikhail Ivanov pcmoore New
[1/2] landlock: Add hook on socket_listen() Forbid illegitimate binding via listen(2) - 1 - --- 2024-04-08 Mikhail Ivanov pcmoore New
[v3,12/12] Activate the configuration and build of the TSEM LSM. Implement Trusted Security Event Modeling. - - - --- 2024-04-01 Dr. Greg pcmoore New
[v3,11/12] Implement the internal Trusted Modeling Agent. Implement Trusted Security Event Modeling. - - - --- 2024-04-01 Dr. Greg pcmoore New
[v3,10/12] Implement security event mapping. Implement Trusted Security Event Modeling. - - - --- 2024-04-01 Dr. Greg pcmoore New
[v3,09/12] Add event processing implementation. Implement Trusted Security Event Modeling. - - - --- 2024-04-01 Dr. Greg pcmoore New
[v3,08/12] Add security event description export facility. Implement Trusted Security Event Modeling. - - - --- 2024-04-01 Dr. Greg pcmoore New
[v3,07/12] Add namespace implementation. Implement Trusted Security Event Modeling. - - - --- 2024-04-01 Dr. Greg pcmoore New
[v3,06/12] Implement TSEM control plane. Implement Trusted Security Event Modeling. - - - --- 2024-04-01 Dr. Greg pcmoore New
[v3,05/12] Add root domain trust implementation. Implement Trusted Security Event Modeling. - - - --- 2024-04-01 Dr. Greg pcmoore New
[v3,04/12] Add primary TSEM implementation file. Implement Trusted Security Event Modeling. - - - --- 2024-04-01 Dr. Greg pcmoore New
[v3,03/12] TSEM global declarations. Implement Trusted Security Event Modeling. - - - --- 2024-04-01 Dr. Greg pcmoore New
[v3,02/12] Add TSEM specific documentation. Implement Trusted Security Event Modeling. - - - --- 2024-04-01 Dr. Greg pcmoore New
[v3,01/12] Update MAINTAINERS file. Implement Trusted Security Event Modeling. - - - --- 2024-04-01 Dr. Greg pcmoore New
[v4,14/14] docs: Add documentation of the digest_cache LSM security: digest_cache LSM - - - --- 2024-04-15 Roberto Sassu pcmoore Under Review
[v4,13/14] selftests/digest_cache: Add selftests for digest_cache LSM security: digest_cache LSM - - - --- 2024-04-15 Roberto Sassu pcmoore Under Review
[v4,12/14] digest_cache: Notify digest cache events security: digest_cache LSM - - - --- 2024-04-15 Roberto Sassu pcmoore Under Review
[v4,11/14] digest_cache: Reset digest cache on file/directory change security: digest_cache LSM - - - --- 2024-04-15 Roberto Sassu pcmoore Under Review
[v4,10/14] digest cache: Prefetch digest lists if requested security: digest_cache LSM - - - --- 2024-04-15 Roberto Sassu pcmoore Under Review
[v4,09/14] digest_cache: Add support for directories security: digest_cache LSM - - - --- 2024-04-15 Roberto Sassu pcmoore Under Review
[v4,08/14] digest_cache: Add management of verification data security: digest_cache LSM - - - --- 2024-04-15 Roberto Sassu pcmoore Under Review
[v4,07/14] digest_cache: Parse rpm digest lists security: digest_cache LSM - - - --- 2024-04-15 Roberto Sassu pcmoore Under Review
[v4,06/14] digest_cache: Parse tlv digest lists security: digest_cache LSM - - - --- 2024-04-15 Roberto Sassu pcmoore Under Review
[v4,05/14] digest_cache: Populate the digest cache from a digest list security: digest_cache LSM - - - --- 2024-04-15 Roberto Sassu pcmoore Under Review
[v4,04/14] digest_cache: Add hash tables and operations security: digest_cache LSM - - - --- 2024-04-15 Roberto Sassu pcmoore Under Review
[v4,03/14] digest_cache: Add securityfs interface security: digest_cache LSM - - - --- 2024-04-15 Roberto Sassu pcmoore Under Review
[v4,02/14] security: Introduce the digest_cache LSM security: digest_cache LSM - - - --- 2024-04-15 Roberto Sassu pcmoore Under Review
[v4,01/14] lib: Add TLV parser security: digest_cache LSM - - - --- 2024-04-15 Roberto Sassu pcmoore Under Review
[2/2] ima: evm: Rename *_post_path_mknod() to *_path_post_mknod() [1/2] security: Handle dentries without inode in security_path_post_mknod() 1 1 - --- 2024-03-29 Roberto Sassu pcmoore Under Review
[1/2] security: Handle dentries without inode in security_path_post_mknod() [1/2] security: Handle dentries without inode in security_path_post_mknod() 2 - - --- 2024-03-29 Roberto Sassu pcmoore Under Review
[RFC,1/2] lsm: introduce new hook security_vm_execstack [RFC,1/2] lsm: introduce new hook security_vm_execstack - - - --- 2024-03-15 Christian Göttsche pcmoore Under Review
[RFC,2/2] selinux: wire up new execstack LSM hook [RFC,1/2] lsm: introduce new hook security_vm_execstack - - - --- 2024-03-15 Christian Göttsche pcmoore Under Review
[10/10] coccinelle: add script for capable_any() [01/10] capability: introduce new capable flag CAP_OPT_NOAUDIT_ONDENY - - - --- 2024-03-15 Christian Göttsche pcmoore Under Review
[09/10] bpf: use new capable_any functionality [01/10] capability: introduce new capable flag CAP_OPT_NOAUDIT_ONDENY 1 - - --- 2024-03-15 Christian Göttsche pcmoore Under Review
[08/10] net: use new capable_any functionality [01/10] capability: introduce new capable flag CAP_OPT_NOAUDIT_ONDENY - 1 - --- 2024-03-15 Christian Göttsche pcmoore Under Review
[07/10] kernel: use new capable_any functionality [01/10] capability: introduce new capable flag CAP_OPT_NOAUDIT_ONDENY - 2 - --- 2024-03-15 Christian Göttsche pcmoore Under Review
[06/10] fs: use new capable_any functionality [01/10] capability: introduce new capable flag CAP_OPT_NOAUDIT_ONDENY 1 - - --- 2024-03-15 Christian Göttsche pcmoore Under Review
[05/10] drivers: use new capable_any functionality [01/10] capability: introduce new capable flag CAP_OPT_NOAUDIT_ONDENY 2 - - --- 2024-03-15 Christian Göttsche pcmoore Under Review
[04/10] block: use new capable_any functionality [01/10] capability: introduce new capable flag CAP_OPT_NOAUDIT_ONDENY - - - --- 2024-03-15 Christian Göttsche pcmoore Under Review
[03/10] capability: use new capable_any functionality [01/10] capability: introduce new capable flag CAP_OPT_NOAUDIT_ONDENY 1 - - --- 2024-03-15 Christian Göttsche pcmoore Under Review
[02/10] capability: add any wrappers to test for multiple caps with exactly one audit message [01/10] capability: introduce new capable flag CAP_OPT_NOAUDIT_ONDENY - 1 - --- 2024-03-15 Christian Göttsche pcmoore Under Review
[01/10] capability: introduce new capable flag CAP_OPT_NOAUDIT_ONDENY [01/10] capability: introduce new capable flag CAP_OPT_NOAUDIT_ONDENY 2 1 - --- 2024-03-15 Christian Göttsche pcmoore Under Review
[v3,3/3] fs/exec: remove current->in_execve flag fs/exec: remove current->in_execve flag 1 - - --- 2024-02-06 Tetsuo Handa pcmoore Under Review
[v3,2/3] tomoyo: replace current->in_execve flag with security_execve_abort() hook fs/exec: remove current->in_execve flag 1 - - --- 2024-02-06 Tetsuo Handa pcmoore Under Review
[v3,1/3] LSM: add security_execve_abort() hook fs/exec: remove current->in_execve flag 1 - - --- 2024-02-06 Tetsuo Handa pcmoore Under Review
[2/2] doc: Fix fs_context_parse_param description in mount_api.rst [1/2] lsm: Fix description of fs_context_parse_param - - - --- 2022-12-09 Roberto Sassu pcmoore Under Review
[GIT,PULL] lsm/lsm-pr-20240617 [GIT,PULL] lsm/lsm-pr-20240617 - - - --- 2024-06-17 Paul Moore pcmoore Accepted
[GIT,PULL] Landlock updates for v6.10 [GIT,PULL] Landlock updates for v6.10 - - - --- 2024-05-16 Mickaël Salaün Accepted
[GIT,PULL] selinux/selinux-pr-20240513 [GIT,PULL] selinux/selinux-pr-20240513 - - - --- 2024-05-13 Paul Moore pcmoore Accepted
[GIT,PULL] lsm/lsm-pr-20240513 [GIT,PULL] lsm/lsm-pr-20240513 - - - --- 2024-05-13 Paul Moore pcmoore Accepted
[net,v5] netlabel: fix RCU annotation for IPv4 options on socket creation [net,v5] netlabel: fix RCU annotation for IPv4 options on socket creation 3 - - --- 2024-05-10 Davide Caratti pcmoore Accepted
MAINTAINERS: repair file entry in SECURITY SUBSYSTEM MAINTAINERS: repair file entry in SECURITY SUBSYSTEM - - - --- 2024-05-07 Lukas Bulwahn pcmoore Accepted
[v3] ima: Avoid blocking in RCU read-side critical section [v3] ima: Avoid blocking in RCU read-side critical section 1 2 - --- 2024-05-07 Guozihua (Scott) pcmoore Accepted
[RFC] lsm: fixup the inode xattr capability handling [RFC] lsm: fixup the inode xattr capability handling - - - --- 2024-05-03 Paul Moore pcmoore Accepted
MAINTAINERS: update the LSM file list MAINTAINERS: update the LSM file list - - - --- 2024-05-01 Paul Moore pcmoore Accepted
[RESEND,v3] security: Place security_path_post_mknod() where the original IMA call was [RESEND,v3] security: Place security_path_post_mknod() where the original IMA call was - 1 - --- 2024-04-03 Roberto Sassu pcmoore Accepted
[GIT,PULL] selinux/selinux-pr-20240402 [GIT,PULL] selinux/selinux-pr-20240402 - - - --- 2024-04-03 Paul Moore Accepted
[2/7] security: Remove the now superfluous sentinel element from ctl_table array [1/7] memory: Remove the now superfluous sentinel element from ctl_table array 1 - - --- 2024-03-28 Joel Granados via B4 Relay pcmoore Accepted
[GIT,PULL] lsm/lsm-pr-20240314 [GIT,PULL] lsm/lsm-pr-20240314 - - - --- 2024-03-14 Paul Moore pcmoore Accepted
lsm: handle the NULL buffer case in lsm_fill_user_ctx() lsm: handle the NULL buffer case in lsm_fill_user_ctx() 1 - - --- 2024-03-14 Paul Moore pcmoore Accepted
[v3] LSM: use 32 bit compatible data types in LSM syscalls. [v3] LSM: use 32 bit compatible data types in LSM syscalls. - - - --- 2024-03-13 Casey Schaufler pcmoore Accepted
[GIT,PULL] lsm/lsm-pr-20240312 [GIT,PULL] lsm/lsm-pr-20240312 - - - --- 2024-03-12 Paul Moore pcmoore Accepted
[GIT,PULL] lsm/lsm-pr-20240227 [GIT,PULL] lsm/lsm-pr-20240227 - - - --- 2024-02-27 Paul Moore pcmoore Accepted
[2/2] AppArmor: Fix lsm_get_self_attr() [1/2] SELinux: Fix lsm_get_self_attr() - 1 - --- 2024-02-23 Mickaël Salaün pcmoore Accepted
[1/2] SELinux: Fix lsm_get_self_attr() [1/2] SELinux: Fix lsm_get_self_attr() - - - --- 2024-02-23 Mickaël Salaün pcmoore Accepted
LSM: Fix typos in security/security.c comment headers LSM: Fix typos in security/security.c comment headers - - - --- 2024-02-17 Pairman Guo pcmoore Accepted
[GIT,PULL] lsm/lsm-pr-20240215 [GIT,PULL] lsm/lsm-pr-20240215 - - - --- 2024-02-15 Paul Moore pcmoore Accepted
[v10,25/25] integrity: Remove LSM security: Move IMA and EVM to the LSM infrastructure 2 3 - --- 2024-02-15 Roberto Sassu pcmoore Accepted
[v10,24/25] ima: Make it independent from 'integrity' LSM security: Move IMA and EVM to the LSM infrastructure 1 3 - --- 2024-02-15 Roberto Sassu pcmoore Accepted
[v10,23/25] evm: Make it independent from 'integrity' LSM security: Move IMA and EVM to the LSM infrastructure 2 3 - --- 2024-02-15 Roberto Sassu pcmoore Accepted
[v10,22/25] evm: Move to LSM infrastructure security: Move IMA and EVM to the LSM infrastructure 3 3 - --- 2024-02-15 Roberto Sassu pcmoore Accepted
[v10,21/25] ima: Move IMA-Appraisal to LSM infrastructure security: Move IMA and EVM to the LSM infrastructure 3 3 - --- 2024-02-15 Roberto Sassu pcmoore Accepted
[v10,20/25] ima: Move to LSM infrastructure security: Move IMA and EVM to the LSM infrastructure 5 2 - --- 2024-02-15 Roberto Sassu pcmoore Accepted
[v10,19/25] integrity: Move integrity_kernel_module_request() to IMA security: Move IMA and EVM to the LSM infrastructure 2 2 - --- 2024-02-15 Roberto Sassu pcmoore Accepted
[v10,18/25] security: Introduce key_post_create_or_update hook security: Move IMA and EVM to the LSM infrastructure 2 2 - --- 2024-02-15 Roberto Sassu pcmoore Accepted
[v10,17/25] security: Introduce inode_post_remove_acl hook security: Move IMA and EVM to the LSM infrastructure 3 2 - --- 2024-02-15 Roberto Sassu pcmoore Accepted
[v10,16/25] security: Introduce inode_post_set_acl hook security: Move IMA and EVM to the LSM infrastructure 3 2 - --- 2024-02-15 Roberto Sassu pcmoore Accepted
[v10,15/25] security: Introduce inode_post_create_tmpfile hook security: Move IMA and EVM to the LSM infrastructure 3 2 - --- 2024-02-15 Roberto Sassu pcmoore Accepted
[v10,14/25] security: Introduce path_post_mknod hook security: Move IMA and EVM to the LSM infrastructure 3 2 - --- 2024-02-15 Roberto Sassu pcmoore Accepted
[v10,13/25] security: Introduce file_release hook security: Move IMA and EVM to the LSM infrastructure 2 2 - --- 2024-02-15 Roberto Sassu pcmoore Accepted
[v10,12/25] security: Introduce file_post_open hook security: Move IMA and EVM to the LSM infrastructure 3 2 - --- 2024-02-15 Roberto Sassu pcmoore Accepted
« 1 2 3 440 41 »