Show patches with: none      |   15567 patches
« 1 2 ... 76 77 78155 156 »
Patch Series A/R/T S/W/F Date Submitter Delegate State
[05/11] fs: remove __vfs_write [01/11] fs: call file_{start,end}_write from __kernel_write - - - --- 2020-05-08 Christoph Hellwig New
[04/11] fs: implement kernel_write using __kernel_write [01/11] fs: call file_{start,end}_write from __kernel_write - - - --- 2020-05-08 Christoph Hellwig New
[03/11] fs: remove the call_{read,write}_iter functions [01/11] fs: call file_{start,end}_write from __kernel_write - - - --- 2020-05-08 Christoph Hellwig New
[02/11] fs: check FMODE_WRITE in __kernel_write [01/11] fs: call file_{start,end}_write from __kernel_write - - - --- 2020-05-08 Christoph Hellwig New
[01/11] fs: call file_{start,end}_write from __kernel_write [01/11] fs: call file_{start,end}_write from __kernel_write - - - --- 2020-05-08 Christoph Hellwig New
[GIT,PULL] security: Fix the default value of fs_context_parse_param hook [GIT,PULL] security: Fix the default value of fs_context_parse_param hook - - - --- 2020-05-07 James Morris New
ima: Replace zero-length array with flexible-array ima: Replace zero-length array with flexible-array - - - --- 2020-05-07 Gustavo A. R. Silva New
platform/x86: Export LPC attributes for the system SPI chip platform/x86: Export LPC attributes for the system SPI chip - - - --- 2020-05-06 Richard Hughes New
[v4,4/4] MAINTAINERS: Add entry for TEE based Trusted Keys Introduce TEE based Trusted Keys support 1 - - --- 2020-05-06 Sumit Garg New
[v4,3/4] doc: trusted-encrypted: updates with TEE as a new trust source Introduce TEE based Trusted Keys support - 1 - --- 2020-05-06 Sumit Garg New
[v4,2/4] KEYS: trusted: Introduce TEE based Trusted Keys Introduce TEE based Trusted Keys support - - - --- 2020-05-06 Sumit Garg New
[v4,1/4] KEYS: trusted: Add generic trusted keys framework Introduce TEE based Trusted Keys support - - - --- 2020-05-06 Sumit Garg New
securityfs: Add missing d_delete() call on removal securityfs: Add missing d_delete() call on removal - - - --- 2020-05-05 Kees Cook New
[RFC,v1] ima: verify mprotect change is consistent with mmap policy [RFC,v1] ima: verify mprotect change is consistent with mmap policy - 1 - --- 2020-05-05 Mimi Zohar New
[v5,6/6] ima: add policy support for the new file open MAY_OPENEXEC flag Add support for O_MAYEXEC - 1 - --- 2020-05-05 Mickaël Salaün New
[v5,5/6] doc: Add documentation for the fs.open_mayexec_enforce sysctl Add support for O_MAYEXEC - 1 - --- 2020-05-05 Mickaël Salaün New
[v5,4/6] selftest/openat2: Add tests for O_MAYEXEC enforcing Add support for O_MAYEXEC - 1 - --- 2020-05-05 Mickaël Salaün New
[v5,3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC Add support for O_MAYEXEC - 1 - --- 2020-05-05 Mickaël Salaün New
[v5,2/6] fs: Add a MAY_EXECMOUNT flag to infer the noexec mount property Add support for O_MAYEXEC - 3 - --- 2020-05-05 Mickaël Salaün New
[v5,1/6] fs: Add support for an O_MAYEXEC flag on openat2(2) Add support for O_MAYEXEC - 2 - --- 2020-05-05 Mickaël Salaün New
[v2,6/6] security: apparmor: default KUNIT_* fragments to KUNIT_RUN_ALL Enable as many KUnit tests as possible - 1 - --- 2020-05-05 Anders Roxell New
[v2,5/6] fs: ext4: default KUNIT_* fragments to KUNIT_RUN_ALL Enable as many KUnit tests as possible - 1 - --- 2020-05-05 Anders Roxell New
[v2,4/6] drivers: base: default KUNIT_* fragments to KUNIT_RUN_ALL Enable as many KUnit tests as possible - 1 - --- 2020-05-05 Anders Roxell New
[v2,3/6] lib: Kconfig.debug: default KUNIT_* fragments to KUNIT_RUN_ALL Enable as many KUnit tests as possible - 1 - --- 2020-05-05 Anders Roxell New
[v2,2/6] kunit: default KUNIT_* fragments to KUNIT_RUN_ALL Enable as many KUnit tests as possible - 1 - --- 2020-05-05 Anders Roxell New
[v2,1/6] kunit: Kconfig: enable a KUNIT_RUN_ALL fragment Enable as many KUnit tests as possible - - - --- 2020-05-05 Anders Roxell New
[RFC] ima: verify mprotect change is consistent with mmap policy [RFC] ima: verify mprotect change is consistent with mmap policy - - - --- 2020-05-04 Mimi Zohar New
[RFC,2/2] Add support for ima buffer pass using reserved memory arm64 Add support for using reserved memory for ima buffer pass - - - --- 2020-05-04 Prakhar Srivastava New
[RFC,1/2] Add a layer of abstraction to use the memory reserved by device tree for ima buffer pass. Add support for using reserved memory for ima buffer pass - - - --- 2020-05-04 Prakhar Srivastava New
kunit: Kconfig: enable a KUNIT_RUN_ALL fragment kunit: Kconfig: enable a KUNIT_RUN_ALL fragment - - - --- 2020-05-01 Anders Roxell New
[GIT,PULL] SELinux fixes for v5.7 (#2) [GIT,PULL] SELinux fixes for v5.7 (#2) - - - --- 2020-04-30 Paul Moore New
integrity: evm: Fix RCU list related warnings. integrity: evm: Fix RCU list related warnings. 1 - - --- 2020-04-30 Madhuparna Bhowmik New
[bpf] security: Fix the default value of fs_context_parse_param hook [bpf] security: Fix the default value of fs_context_parse_param hook - - 1 --- 2020-04-30 KP Singh New
[v4,5/5] doc: Add documentation for the fs.open_mayexec_enforce sysctl Add support for O_MAYEXEC - 1 - --- 2020-04-30 Mickaël Salaün New
[v4,4/5] selftest/openat2: Add tests for O_MAYEXEC enforcing Add support for O_MAYEXEC - 1 - --- 2020-04-30 Mickaël Salaün New
[v4,3/5] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC Add support for O_MAYEXEC - 2 - --- 2020-04-30 Mickaël Salaün New
[v4,2/5] fs: Add a MAY_EXECMOUNT flag to infer the noexec mount property Add support for O_MAYEXEC - 2 - --- 2020-04-30 Mickaël Salaün New
[v4,1/5] fs: Add support for an O_MAYEXEC flag on openat2(2) Add support for O_MAYEXEC - 1 - --- 2020-04-30 Mickaël Salaün New
[v3,3/3] perf docs: introduce security.txt file to document related issues perf: make Perf tool aware of SELinux access control - - - --- 2020-04-30 Alexey Budankov New
[v3,2/3] perf tool: make Perf tool aware of SELinux access control perf: make Perf tool aware of SELinux access control - - - --- 2020-04-30 Alexey Budankov New
[v3,1/3] perf docs: extend CAP_SYS_ADMIN with CAP_PERFMON where needed perf: make Perf tool aware of SELinux access control - - - --- 2020-04-30 Alexey Budankov New
[2/2] ima: add policy support for the new file open MAY_OPENEXEC flag ima: extending IMA policy to support interpreters - - - --- 2020-04-29 Mimi Zohar New
[1/2] ima: add policy support for identifying file execute mode bit ima: extending IMA policy to support interpreters - - - --- 2020-04-29 Mimi Zohar New
[RFC,3/3] evm: Return -EAGAIN to ignore verification failures [RFC,1/3] evm: Move hooks outside LSM infrastructure - - - --- 2020-04-29 Roberto Sassu New
[RFC,2/3] evm: Extend API of post hooks to pass the result of pre hooks [RFC,1/3] evm: Move hooks outside LSM infrastructure - - - --- 2020-04-29 Roberto Sassu New
[RFC,1/3] evm: Move hooks outside LSM infrastructure [RFC,1/3] evm: Move hooks outside LSM infrastructure - - - --- 2020-04-29 Roberto Sassu New
[v3,5/5] doc: Add documentation for the fs.open_mayexec_enforce sysctl Add support for RESOLVE_MAYEXEC - 1 - --- 2020-04-28 Mickaël Salaün New
[v3,4/5] selftest/openat2: Add tests for RESOLVE_MAYEXEC enforcing Add support for RESOLVE_MAYEXEC - 1 - --- 2020-04-28 Mickaël Salaün New
[v3,3/5] fs: Enable to enforce noexec mounts or file exec through RESOLVE_MAYEXEC Add support for RESOLVE_MAYEXEC - 2 - --- 2020-04-28 Mickaël Salaün New
[v3,2/5] fs: Add a MAY_EXECMOUNT flag to infer the noexec mount property Add support for RESOLVE_MAYEXEC - 2 - --- 2020-04-28 Mickaël Salaün New
[v3,1/5] fs: Add support for a RESOLVE_MAYEXEC flag on openat2(2) Add support for RESOLVE_MAYEXEC - 1 - --- 2020-04-28 Mickaël Salaün New
selinux: Fix use of KEY_NEED_* instead of KEY__* perms [v2] selinux: Fix use of KEY_NEED_* instead of KEY__* perms [v2] - - - --- 2020-04-28 David Howells New
[-next] apparmor: Use true and false for bool variable [-next] apparmor: Use true and false for bool variable - - - --- 2020-04-28 Zou Wei New
[RESEND,v2,3/6] ima: Fix ima digest hash table key calculation Untitled series #278443 1 - - --- 2020-04-28 Roberto Sassu New
selinux: Fix use of KEY_NEED_* instead of KEY__* perms selinux: Fix use of KEY_NEED_* instead of KEY__* perms - - - --- 2020-04-27 David Howells New
[v2,6/6] ima: Fix return value of ima_write_policy() [v2,1/6] ima: Set file->f_mode instead of file->f_flags in ima_calc_file_hash() - 1 - --- 2020-04-27 Roberto Sassu New
[v2,5/6] ima: Set again build_ima_appraise variable [v2,1/6] ima: Set file->f_mode instead of file->f_flags in ima_calc_file_hash() - - - --- 2020-04-27 Roberto Sassu New
[v2,4/6] ima: Remove redundant policy rule set in add_rules() [v2,1/6] ima: Set file->f_mode instead of file->f_flags in ima_calc_file_hash() - - - --- 2020-04-27 Roberto Sassu New
[v2,3/6] ima: Fix ima digest hash table key calculation [v2,1/6] ima: Set file->f_mode instead of file->f_flags in ima_calc_file_hash() - - - --- 2020-04-27 Roberto Sassu New
[v2,2/6] evm: Check also if *tfm is an error pointer in init_desc() [v2,1/6] ima: Set file->f_mode instead of file->f_flags in ima_calc_file_hash() - - - --- 2020-04-27 Roberto Sassu New
[v2,1/6] ima: Set file->f_mode instead of file->f_flags in ima_calc_file_hash() [v2,1/6] ima: Set file->f_mode instead of file->f_flags in ima_calc_file_hash() - 1 - --- 2020-04-27 Roberto Sassu New
[1/1] Smack:- Remove mutex lock "smk_lock" from inode_smack structure. [1/1] Smack:- Remove mutex lock "smk_lock" from inode_smack structure. - - - --- 2020-04-24 Vishal Goel New
integrity: remove redundant assignment to variable ret integrity: remove redundant assignment to variable ret - - - --- 2020-04-24 Colin King New
[v3,3/3] perf docs: introduce security.txt file to document related issues perf: make Perf tool aware of SELinux access control - - - --- 2020-04-24 Alexey Budankov New
[v3,2/3] perf tool: make Perf tool aware of SELinux access control perf: make Perf tool aware of SELinux access control - - - --- 2020-04-24 Alexey Budankov New
[v3,1/3] perf docs: extend CAP_SYS_ADMIN with CAP_PERFMON where needed perf: make Perf tool aware of SELinux access control - - - --- 2020-04-24 Alexey Budankov New
[v13,8/8] proc: use named enums for better readability proc: modernize proc to support multiple private instances - 2 - --- 2020-04-23 Alexey Gladkov New
[v13,7/8] proc: use human-readable values for hidepid proc: modernize proc to support multiple private instances - 2 - --- 2020-04-23 Alexey Gladkov New
[v13,6/8] docs: proc: add documentation for "hidepid=4" and "subset=pid" options and new mount beha… proc: modernize proc to support multiple private instances - 2 - --- 2020-04-23 Alexey Gladkov New
[v13,5/8] proc: add option to mount only a pids subset proc: modernize proc to support multiple private instances - 2 - --- 2020-04-23 Alexey Gladkov New
[v13,4/8] proc: instantiate only pids that we can ptrace on 'hidepid=4' mount option proc: modernize proc to support multiple private instances - 2 - --- 2020-04-23 Alexey Gladkov New
[v13,3/8] proc: allow to mount many instances of proc in one pid namespace proc: modernize proc to support multiple private instances - 2 - --- 2020-04-23 Alexey Gladkov New
[v13,2/8] Use proc_pid_ns() to get pid_namespace from the proc superblock proc: modernize proc to support multiple private instances - - - --- 2020-04-23 Alexey Gladkov New
[v13,1/8] proc: rename struct proc_fs_info to proc_fs_opts proc: modernize proc to support multiple private instances - 2 - --- 2020-04-23 Alexey Gladkov New
[v13,2/7] proc: allow to mount many instances of proc in one pid namespace Untitled series #276049 - 2 - --- 2020-04-23 Alexey Gladkov New
netlabel: Kconfig: Update reference for NetLabel Tools project netlabel: Kconfig: Update reference for NetLabel Tools project 1 - - --- 2020-04-22 Salvatore Bonaccorso New
[v2,4/4] perf docs: introduce security.txt file to document related issues perf: make Perf tool aware of SELinux access control - - - --- 2020-04-22 Alexey Budankov New
[v2,3/4] perf tool: make Perf tool aware of SELinux access control perf: make Perf tool aware of SELinux access control - - - --- 2020-04-22 Alexey Budankov New
[v2,2/4] perf docs: substitute CAP_SYS_ADMIN with CAP_PERFMON where needed perf: make Perf tool aware of SELinux access control - - - --- 2020-04-22 Alexey Budankov New
[v2,1/4] perf trace: substitute CAP_SYS_ADMIN with CAP_PERFMON in error message perf: make Perf tool aware of SELinux access control - - - --- 2020-04-22 Alexey Budankov New
[tip:,perf/core] capabilities: Introduce CAP_PERFMON to kernel and user space [tip:,perf/core] capabilities: Introduce CAP_PERFMON to kernel and user space 4 - 1 --- 2020-04-22 tip-bot2 for Nam Cao New
[tip:,perf/core] perf/core: Open access to the core for CAP_PERFMON privileged process [tip:,perf/core] perf/core: Open access to the core for CAP_PERFMON privileged process - 1 1 --- 2020-04-22 tip-bot2 for Nam Cao New
[tip:,perf/core] perf/core: open access to probes for CAP_PERFMON privileged process [tip:,perf/core] perf/core: open access to probes for CAP_PERFMON privileged process - 1 1 --- 2020-04-22 tip-bot2 for Nam Cao New
[tip:,perf/core] drm/i915/perf: Open access for CAP_PERFMON privileged process [tip:,perf/core] drm/i915/perf: Open access for CAP_PERFMON privileged process 1 1 - --- 2020-04-22 tip-bot2 for Nam Cao New
[tip:,perf/core] perf tools: Support CAP_PERFMON capability [tip:,perf/core] perf tools: Support CAP_PERFMON capability 2 1 1 --- 2020-04-22 tip-bot2 for Nam Cao New
[tip:,perf/core] powerpc/perf: open access for CAP_PERFMON privileged process [tip:,perf/core] powerpc/perf: open access for CAP_PERFMON privileged process 1 1 - --- 2020-04-22 tip-bot2 for Nam Cao New
[tip:,perf/core] trace/bpf_trace: Open access for CAP_PERFMON privileged process [tip:,perf/core] trace/bpf_trace: Open access for CAP_PERFMON privileged process 1 1 - --- 2020-04-22 tip-bot2 for Nam Cao New
[tip:,perf/core] parisc/perf: open access for CAP_PERFMON privileged process [tip:,perf/core] parisc/perf: open access for CAP_PERFMON privileged process 1 1 - --- 2020-04-22 tip-bot2 for Nam Cao New
[tip:,perf/core] drivers/perf: Open access for CAP_PERFMON privileged process [tip:,perf/core] drivers/perf: Open access for CAP_PERFMON privileged process 1 1 - --- 2020-04-22 tip-bot2 for Nam Cao New
[tip:,perf/core] doc/admin-guide: Update perf-security.rst with CAP_PERFMON information [tip:,perf/core] doc/admin-guide: Update perf-security.rst with CAP_PERFMON information - - 1 --- 2020-04-22 tip-bot2 for Nam Cao New
[tip:,perf/core] drivers/oprofile: Open access for CAP_PERFMON privileged process [tip:,perf/core] drivers/oprofile: Open access for CAP_PERFMON privileged process 1 - - --- 2020-04-22 tip-bot2 for Nam Cao New
[tip:,perf/core] doc/admin-guide: update kernel.rst with CAP_PERFMON information [tip:,perf/core] doc/admin-guide: update kernel.rst with CAP_PERFMON information - - - --- 2020-04-22 tip-bot2 for Nam Cao New
[v29,12/20] x86/sgx: Add provisioning Untitled series #275001 - - - --- 2020-04-21 Jarkko Sakkinen New
[v29,11/20] x86/sgx: Linux Enclave Driver Untitled series #275001 - - 4 --- 2020-04-21 Jarkko Sakkinen New
[v2,7/7] tracefs: switch to simplefs inode creation API libfs: group and simplify linux fs code - - - --- 2020-04-21 Emanuele Giuseppe Esposito New
[v2,6/7] debugfs: switch to simplefs inode creation API libfs: group and simplify linux fs code - - - --- 2020-04-21 Emanuele Giuseppe Esposito New
[v2,5/7] libfs: add file creation functions libfs: group and simplify linux fs code - - - --- 2020-04-21 Emanuele Giuseppe Esposito New
[v2,4/7] libfs: add alloc_anon_inode wrapper libfs: group and simplify linux fs code - - - --- 2020-04-21 Emanuele Giuseppe Esposito New
[v2,3/7] libfs: introduce new_inode_current_time libfs: group and simplify linux fs code - - - --- 2020-04-21 Emanuele Giuseppe Esposito New
[v2,2/7] libfs: wrap simple_pin_fs/simple_release_fs arguments in a struct libfs: group and simplify linux fs code - 1 - --- 2020-04-21 Emanuele Giuseppe Esposito New
« 1 2 ... 76 77 78155 156 »