Show patches with: none      |   15521 patches
« 1 2 ... 83 84 85155 156 »
Patch Series A/R/T S/W/F Date Submitter Delegate State
[v2] keys: proc_keys_next should increase position index [v2] keys: proc_keys_next should increase position index - - - --- 2020-01-30 Vasily Averin New
security/integrity: Include __func__ in messages for easier debug security/integrity: Include __func__ in messages for easier debug - - - --- 2020-01-30 Shuah Khan New
security, keys: Optimize barrier usage for Rmw atomic bitops security, keys: Optimize barrier usage for Rmw atomic bitops - - - --- 2020-01-29 Davidlohr Bueso New
[GIT,PULL] Security subsystem changes for v5.6 [GIT,PULL] Security subsystem changes for v5.6 - - - --- 2020-01-28 James Morris New
[v6,10/10] drivers/oprofile: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability 1 - - --- 2020-01-28 Alexey Budankov New
[v6,09/10] drivers/perf: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability 1 - - --- 2020-01-28 Alexey Budankov New
[v6,08/10] parisc/perf: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability 1 - - --- 2020-01-28 Alexey Budankov New
[v6,07/10] powerpc/perf: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability 1 - - --- 2020-01-28 Alexey Budankov New
[v6,06/10] trace/bpf_trace: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability 1 - - --- 2020-01-28 Alexey Budankov New
[v6,05/10] drm/i915/perf: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability - - - --- 2020-01-28 Alexey Budankov New
[v6,04/10] perf tool: extend Perf tool with CAP_PERFMON capability support Introduce CAP_PERFMON to secure system performance monitoring and observability - - - --- 2020-01-28 Alexey Budankov New
[v6,03/10] perf/core: open access to probes for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability 1 - - --- 2020-01-28 Alexey Budankov New
[v6,02/10] perf/core: open access to the core for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability - - - --- 2020-01-28 Alexey Budankov New
[v6,01/10] capabilities: introduce CAP_PERFMON to kernel and user space Introduce CAP_PERFMON to secure system performance monitoring and observability 1 - - --- 2020-01-28 Alexey Budankov New
[GIT,PULL] TOMOYO patches for v5.6 [GIT,PULL] TOMOYO patches for v5.6 - - - --- 2020-01-28 Tetsuo Handa New
[GIT,PULL] SELinux patches for v5.6 [GIT,PULL] SELinux patches for v5.6 - - - --- 2020-01-27 Paul Moore New
[8/8] ima: switch to ima_hash_algo for boot aggregate ima: support stronger algorithms for attestation - - - --- 2020-01-27 Roberto Sassu New
[7/8] ima: use ima_hash_algo for collision detection in the measurement list ima: support stronger algorithms for attestation - - - --- 2020-01-27 Roberto Sassu New
[6/8] ima: calculate and extend PCR with digests in ima_template_entry ima: support stronger algorithms for attestation - - - --- 2020-01-27 Roberto Sassu New
[5/8] ima: allocate and initialize tfm for each PCR bank ima: support stronger algorithms for attestation - - - --- 2020-01-27 Roberto Sassu New
[4/8] ima: switch to dynamically allocated buffer for template digests ima: support stronger algorithms for attestation - - - --- 2020-01-27 Roberto Sassu New
[3/8] ima: store template digest directly in ima_template_entry ima: support stronger algorithms for attestation - - - --- 2020-01-27 Roberto Sassu New
[2/8] ima: evaluate error in init_ima() ima: support stronger algorithms for attestation - - - --- 2020-01-27 Roberto Sassu New
[1/8] tpm: initialize crypto_id of allocated_banks to HASH_ALGO__LAST ima: support stronger algorithms for attestation - 1 - --- 2020-01-27 Roberto Sassu New
[v7,11/11] proc: Move hidepid values to uapi as they are user interface to mount proc: modernize proc to support multiple private instances - - - --- 2020-01-25 Alexey Gladkov New
[v7,10/11] docs: proc: add documentation for "hidepid=4" and "subset=pidfs" options and new mount b… proc: modernize proc to support multiple private instances - - - --- 2020-01-25 Alexey Gladkov New
[v7,09/11] proc: add option to mount only a pids subset proc: modernize proc to support multiple private instances - - - --- 2020-01-25 Alexey Gladkov New
[v7,08/11] proc: instantiate only pids that we can ptrace on 'hidepid=4' mount option proc: modernize proc to support multiple private instances - - - --- 2020-01-25 Alexey Gladkov New
[v7,07/11] proc: flush task dcache entries from all procfs instances proc: modernize proc to support multiple private instances - - - --- 2020-01-25 Alexey Gladkov New
[v7,06/11] proc: support mounting procfs instances inside same pid namespace proc: modernize proc to support multiple private instances - - - --- 2020-01-25 Alexey Gladkov New
[v7,05/11] proc: add helpers to set and get proc hidepid and gid mount options proc: modernize proc to support multiple private instances - - - --- 2020-01-25 Alexey Gladkov New
[v7,04/11] proc: move hide_pid, pid_gid from pid_namespace to proc_fs_info proc: modernize proc to support multiple private instances - - - --- 2020-01-25 Alexey Gladkov New
[v7,03/11] proc: move /proc/{self|thread-self} dentries to proc_fs_info proc: modernize proc to support multiple private instances - - - --- 2020-01-25 Alexey Gladkov New
[v7,02/11] proc: add proc_fs_info struct to store proc information proc: modernize proc to support multiple private instances - - - --- 2020-01-25 Alexey Gladkov New
[v7,01/11] proc: Rename struct proc_fs_info to proc_fs_opts proc: modernize proc to support multiple private instances - - - --- 2020-01-25 Alexey Gladkov New
[1/1] proc_keys_next should increase position index keys: seq_file .next functions should increase position index - - - --- 2020-01-24 Vasily Averin New
[v14,23/23] AppArmor: Remove the exclusive flag LSM: Module stacking for AppArmor - 2 - --- 2020-01-24 Casey Schaufler New
[v14,22/23] LSM: Add /proc attr entry for full LSM context LSM: Module stacking for AppArmor - - - --- 2020-01-24 Casey Schaufler New
[v14,21/23] Audit: Include object data for all security modules LSM: Module stacking for AppArmor 1 - - --- 2020-01-24 Casey Schaufler New
[v14,20/23] Audit: Add subj_LSM fields when necessary LSM: Module stacking for AppArmor 1 - - --- 2020-01-24 Casey Schaufler New
[v14,19/23] LSM: Verify LSM display sanity in binder LSM: Module stacking for AppArmor 1 - - --- 2020-01-24 Casey Schaufler New
[v14,18/23] NET: Store LSM netlabel data in a lsmblob LSM: Module stacking for AppArmor 1 2 - --- 2020-01-24 Casey Schaufler New
[v14,17/23] LSM: security_secid_to_secctx in netlink netfilter LSM: Module stacking for AppArmor 1 2 - --- 2020-01-24 Casey Schaufler New
[v14,16/23] LSM: Use lsmcontext in security_inode_getsecctx LSM: Module stacking for AppArmor 1 - - --- 2020-01-24 Casey Schaufler New
[v14,15/23] LSM: Use lsmcontext in security_secid_to_secctx LSM: Module stacking for AppArmor 1 - - --- 2020-01-24 Casey Schaufler New
[v14,14/23] LSM: Ensure the correct LSM context releaser LSM: Module stacking for AppArmor 1 2 - --- 2020-01-24 Casey Schaufler New
[v14,13/23] LSM: Specify which LSM to display LSM: Module stacking for AppArmor 1 - - --- 2020-01-24 Casey Schaufler New
[v14,12/23] IMA: Change internal interfaces to use lsmblobs LSM: Module stacking for AppArmor 1 2 - --- 2020-01-24 Casey Schaufler New
[v14,11/23] LSM: Use lsmblob in security_cred_getsecid LSM: Module stacking for AppArmor 1 2 - --- 2020-01-24 Casey Schaufler New
[v14,10/23] LSM: Use lsmblob in security_inode_getsecid LSM: Module stacking for AppArmor 1 2 - --- 2020-01-24 Casey Schaufler New
[v14,09/23] LSM: Use lsmblob in security_task_getsecid LSM: Module stacking for AppArmor 1 2 - --- 2020-01-24 Casey Schaufler New
[v14,08/23] LSM: Use lsmblob in security_ipc_getsecid LSM: Module stacking for AppArmor 1 2 - --- 2020-01-24 Casey Schaufler New
[v14,07/23] LSM: Use lsmblob in security_secid_to_secctx LSM: Module stacking for AppArmor 1 2 - --- 2020-01-24 Casey Schaufler New
[v14,06/23] Use lsmblob in security_secctx_to_secid LSM: Module stacking for AppArmor 1 2 - --- 2020-01-24 Casey Schaufler New
[v14,05/23] net: Prepare UDS for security module stacking LSM: Module stacking for AppArmor 1 2 - --- 2020-01-24 Casey Schaufler New
[v14,04/23] LSM: Use lsmblob in security_kernel_act_as LSM: Module stacking for AppArmor 1 2 - --- 2020-01-24 Casey Schaufler New
[v14,03/23] LSM: Use lsmblob in security_audit_rule_match LSM: Module stacking for AppArmor 1 2 - --- 2020-01-24 Casey Schaufler New
[v14,02/23] LSM: Create and manage the lsmblob data structure. LSM: Module stacking for AppArmor - - - --- 2020-01-24 Casey Schaufler New
[v14,01/23] LSM: Infrastructure management of the sock security LSM: Module stacking for AppArmor 1 2 - --- 2020-01-24 Casey Schaufler New
[bpf-next,v3,10/10] bpf: lsm: Add Documentation MAC and Audit policy using eBPF (KRSI) - 3 - --- 2020-01-23 KP Singh New
[bpf-next,v3,09/10] bpf: lsm: Add selftests for BPF_PROG_TYPE_LSM MAC and Audit policy using eBPF (KRSI) - 3 - --- 2020-01-23 KP Singh New
[bpf-next,v3,08/10] tools/libbpf: Add support for BPF_PROG_TYPE_LSM MAC and Audit policy using eBPF (KRSI) 1 3 - --- 2020-01-23 KP Singh New
[bpf-next,v3,07/10] bpf: lsm: Make the allocated callback RO+X MAC and Audit policy using eBPF (KRSI) - 3 - --- 2020-01-23 KP Singh New
[bpf-next,v3,06/10] bpf: lsm: Implement attach, detach and execution MAC and Audit policy using eBPF (KRSI) - 4 - --- 2020-01-23 KP Singh New
[bpf-next,v3,05/10] bpf: lsm: BTF API for LSM hooks MAC and Audit policy using eBPF (KRSI) - 3 - --- 2020-01-23 KP Singh New
[bpf-next,v3,04/10] bpf: lsm: Add mutable hooks list for the BPF LSM MAC and Audit policy using eBPF (KRSI) - 3 - --- 2020-01-23 KP Singh New
[bpf-next,v3,03/10] bpf: lsm: Introduce types for eBPF based LSM MAC and Audit policy using eBPF (KRSI) - 3 - --- 2020-01-23 KP Singh New
[bpf-next,v3,02/10] bpf: lsm: Add a skeleton and config options MAC and Audit policy using eBPF (KRSI) - 3 - --- 2020-01-23 KP Singh New
[bpf-next,v3,01/10] bpf: btf: Add btf_type_by_name_kind MAC and Audit policy using eBPF (KRSI) - 3 - --- 2020-01-23 KP Singh New
SELinux: How to split permissions for keys? SELinux: How to split permissions for keys? - - - --- 2020-01-23 David Howells New
security: remove EARLY_LSM_COUNT which never used security: remove EARLY_LSM_COUNT which never used 1 - - --- 2020-01-21 Alex Shi New
[v5,10/10] drivers/oprofile: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability - - - --- 2020-01-20 Alexey Budankov New
[v5,09/10] drivers/perf: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability - - - --- 2020-01-20 Alexey Budankov New
[v5,08/10] parisc/perf: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability - - - --- 2020-01-20 Alexey Budankov New
[v5,07/10] powerpc/perf: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability 1 - - --- 2020-01-20 Alexey Budankov New
[v5,06/10] trace/bpf_trace: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability - - - --- 2020-01-20 Alexey Budankov New
[v5,05/10] drm/i915/perf: open access for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability - - - --- 2020-01-20 Alexey Budankov New
[v5,04/10] perf tool: extend Perf tool with CAP_PERFMON capability support Introduce CAP_PERFMON to secure system performance monitoring and observability - - - --- 2020-01-20 Alexey Budankov New
[v5,03/10] perf/core: open access to anon probes for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability - - - --- 2020-01-20 Alexey Budankov New
[v5,02/10] perf/core: open access to the core for CAP_PERFMON privileged process Introduce CAP_PERFMON to secure system performance monitoring and observability - - - --- 2020-01-20 Alexey Budankov New
[v5,01/10] capabilities: introduce CAP_PERFMON to kernel and user space Introduce CAP_PERFMON to secure system performance monitoring and observability - - - --- 2020-01-20 Alexey Budankov New
[RESEND] MAINTAINERS: fix style in SAFESETID SECURITY MODULE [RESEND] MAINTAINERS: fix style in SAFESETID SECURITY MODULE - - - --- 2020-01-16 Lukas Bulwahn New
[bpf-next,v2,10/10] bpf: lsm: Add Documentation MAC and Audit policy using eBPF (KRSI) - - - --- 2020-01-15 KP Singh New
[bpf-next,v2,09/10] bpf: lsm: Add selftests for BPF_PROG_TYPE_LSM MAC and Audit policy using eBPF (KRSI) - - - --- 2020-01-15 KP Singh New
[bpf-next,v2,08/10] tools/libbpf: Add support for BPF_PROG_TYPE_LSM MAC and Audit policy using eBPF (KRSI) - - - --- 2020-01-15 KP Singh New
[bpf-next,v2,07/10] bpf: lsm: Make the allocated callback RO+X MAC and Audit policy using eBPF (KRSI) - - - --- 2020-01-15 KP Singh New
[bpf-next,v2,06/10] bpf: lsm: Implement attach, detach and execution MAC and Audit policy using eBPF (KRSI) - 1 - --- 2020-01-15 KP Singh New
[bpf-next,v2,05/10] bpf: lsm: BTF API for LSM hooks MAC and Audit policy using eBPF (KRSI) - - - --- 2020-01-15 KP Singh New
[bpf-next,v2,04/10] bpf: lsm: Add mutable hooks list for the BPF LSM MAC and Audit policy using eBPF (KRSI) - - - --- 2020-01-15 KP Singh New
[bpf-next,v2,03/10] bpf: lsm: Introduce types for eBPF based LSM MAC and Audit policy using eBPF (KRSI) - - - --- 2020-01-15 KP Singh New
[bpf-next,v2,02/10] bpf: lsm: Add a skeleton and config options MAC and Audit policy using eBPF (KRSI) - - - --- 2020-01-15 KP Singh New
[bpf-next,v2,01/10] bpf: btf: Make some of the API visible outside BTF MAC and Audit policy using eBPF (KRSI) - - - --- 2020-01-15 KP Singh New
[v4] ima: ima/lsm policy rule loading logic bug fixes [v4] ima: ima/lsm policy rule loading logic bug fixes - 1 - --- 2020-01-15 Janne Karhunen New
[RFC,14/14] smack: Implement the watch_key and post_notification hooks [ver #3] pipe: Keyrings, Block and USB notifications [ver #3] 1 - - --- 2020-01-15 David Howells New
[RFC,13/14] selinux: Implement the watch_key security hook [ver #3] pipe: Keyrings, Block and USB notifications [ver #3] 1 - - --- 2020-01-15 David Howells New
[RFC,12/14] usb: Add USB subsystem notifications [ver #3] pipe: Keyrings, Block and USB notifications [ver #3] - - - --- 2020-01-15 David Howells New
[RFC,11/14] block: Add block layer notifications [ver #3] pipe: Keyrings, Block and USB notifications [ver #3] - - - --- 2020-01-15 David Howells New
[RFC,10/14] Add a general, global device notification watch list [ver #3] pipe: Keyrings, Block and USB notifications [ver #3] - - - --- 2020-01-15 David Howells New
[RFC,09/14] pipe: Add notification lossage handling [ver #3] pipe: Keyrings, Block and USB notifications [ver #3] - - - --- 2020-01-15 David Howells New
[RFC,08/14] pipe: Allow buffers to be marked read-whole-or-error for notifications [ver #3] pipe: Keyrings, Block and USB notifications [ver #3] - - - --- 2020-01-15 David Howells New
« 1 2 ... 83 84 85155 156 »