Show patches with: Submitter = Paul Moore       |   213 patches
« 1 2 3 »
Patch Series A/R/T S/W/F Date Submitter Delegate State
selinux: remove the runtime disable functionality selinux: remove the runtime disable functionality 1 1 - --- 2023-03-17 Paul Moore pcmoore Accepted
selinux: add AF_UNSPEC and INADDR_ANY checks to selinux_socket_bind() - - - --- 2018-05-08 Paul Moore New
selinux: add AF_UNSPEC and INADDR_ANY checks to selinux_socket_bind() - - - --- 2018-05-09 Paul Moore New
selinux: add AF_UNSPEC and INADDR_ANY checks to selinux_socket_bind() - - - --- 2018-05-10 Paul Moore New
selinux,smack: fix subjective/objective credential use mixups selinux,smack: fix subjective/objective credential use mixups 2 - - --- 2021-09-23 Paul Moore New
selftests: remove the LSM_ID_IMA check in lsm/lsm_list_modules_test selftests: remove the LSM_ID_IMA check in lsm/lsm_list_modules_test 1 - - --- 2023-11-22 Paul Moore pcmoore Accepted
proc: prevent changes to overridden credentials proc: prevent changes to overridden credentials 3 - - --- 2019-04-19 Paul Moore New
netlabel: handle sparse category maps in netlbl_catmap_getlong() - - - --- 2016-06-13 Paul Moore New
netlabel: fix out-of-bounds memory accesses netlabel: fix out-of-bounds memory accesses - - - --- 2019-02-26 Paul Moore New
netlabel: fix our progress tracking in netlbl_unlabel_staticlist() netlabel: fix our progress tracking in netlbl_unlabel_staticlist() - - - --- 2020-11-08 Paul Moore New
netlabel: fix an uninitialized warning in netlbl_unlabel_staticlist() netlabel: fix an uninitialized warning in netlbl_unlabel_staticlist() - 1 - --- 2020-11-13 Paul Moore New
netlabel: add address family checks to netlbl_{sock, req}_delattr() - - - --- 2016-06-06 Paul Moore New
net: don't unnecessarily load kernel modules in dev_ioctl() - - - --- 2018-03-06 Paul Moore New
net,lsm,selinux: revert the security_sctp_assoc_established() hook net,lsm,selinux: revert the security_sctp_assoc_established() hook - - - --- 2021-11-12 Paul Moore New
MAINTAINERS: update the NetLabel and Labeled Networking information 1 - - --- 2017-08-10 Paul Moore New
MAINTAINERS: update the LSM maintainer info MAINTAINERS: update the LSM maintainer info 3 - - --- 2022-07-08 Paul Moore pcmoore Accepted
MAINTAINERS: update the LSM file list MAINTAINERS: update the LSM file list - - - --- 2024-05-01 Paul Moore pcmoore Accepted
MAINTAINERS: update the LSM entry MAINTAINERS: update the LSM entry - - - --- 2023-11-15 Paul Moore pcmoore Accepted
MAINTAINERS: update SafeSetID entry MAINTAINERS: update SafeSetID entry - - - --- 2023-06-30 Paul Moore pcmoore Rejected
MAINTAINERS: remove the outdated "LINUX SECURITY MODULE (LSM) FRAMEWORK" entry - - - --- 2018-06-13 Paul Moore New
MAINTAINERS: move labeled networking to "supported" MAINTAINERS: move labeled networking to "supported" - - - --- 2023-06-08 Paul Moore pcmoore Accepted
MAINTAINERS: add an entry for the lockdown LSM MAINTAINERS: add an entry for the lockdown LSM - - - --- 2023-11-20 Paul Moore pcmoore Accepted
mailmap: update/replace my old email addresses mailmap: update/replace my old email addresses - - - --- 2023-11-10 Paul Moore pcmoore Accepted
mailmap: add entries for Serge Hallyn's dead accounts mailmap: add entries for Serge Hallyn's dead accounts - - - --- 2023-11-13 Paul Moore pcmoore Accepted
lsm: security_task_getsecid_subj() -> security_current_getsecid_subj() lsm: security_task_getsecid_subj() -> security_current_getsecid_subj() - 2 - --- 2021-09-29 Paul Moore New
lsm: remove current_security() lsm: remove current_security() 2 - - --- 2019-09-04 Paul Moore New
lsm: mark the lsm_id variables are marked as static lsm: mark the lsm_id variables are marked as static - 1 - --- 2023-11-10 Paul Moore pcmoore Accepted
lsm: make security_socket_getpeersec_stream() sockptr_t safe lsm: make security_socket_getpeersec_stream() sockptr_t safe 2 - - --- 2022-10-10 Paul Moore pcmoore Accepted
lsm: handle the NULL buffer case in lsm_fill_user_ctx() lsm: handle the NULL buffer case in lsm_fill_user_ctx() 1 - - --- 2024-03-14 Paul Moore pcmoore Accepted
lsm: fix doc warnings in the LSM hook comments lsm: fix doc warnings in the LSM hook comments - - - --- 2023-03-08 Paul Moore pcmoore Accepted
lsm: fix a spelling mistake lsm: fix a spelling mistake - - - --- 2023-10-04 Paul Moore pcmoore Accepted
lsm: fix a number of misspellings lsm: fix a number of misspellings - 1 - --- 2023-05-25 Paul Moore pcmoore Accepted
lsm: fix a badly named parameter in security_get_getsecurity() lsm: fix a badly named parameter in security_get_getsecurity() - - - --- 2023-03-08 Paul Moore pcmoore Accepted
lsm: drop LSM_ID_IMA lsm: drop LSM_ID_IMA - 1 - --- 2023-10-18 Paul Moore pcmoore Accepted
lsm: convert security_setselfattr() to use memdup_user() lsm: convert security_setselfattr() to use memdup_user() 1 - - --- 2023-11-02 Paul Moore pcmoore Accepted
lsm: align based on pointer length in lsm_fill_user_ctx() lsm: align based on pointer length in lsm_fill_user_ctx() 1 - - --- 2023-11-02 Paul Moore pcmoore Accepted
lsm,selinux: pass flowi_common instead of flowi to the LSM hooks lsm,selinux: pass flowi_common instead of flowi to the LSM hooks 1 - - --- 2020-11-19 Paul Moore New
iucv: properly clone LSM attributes to newly created child sockets - - - --- 2016-06-09 Paul Moore New
ipv6: avoid copy_from_user() via ipv6_renew_options_kern() - - - --- 2018-06-22 Paul Moore New
io_uring: enable audit and restrict cred override for IORING_OP_FIXED_FD_INSTALL io_uring: enable audit and restrict cred override for IORING_OP_FIXED_FD_INSTALL - - - --- 2024-01-23 Paul Moore pcmoore Handled Elsewhere
fs: edit a comment made in bad taste fs: edit a comment made in bad taste - - - --- 2022-10-17 Paul Moore Accepted
cipso,calipso: resolve a number of problems with the DOI refcounts cipso,calipso: resolve a number of problems with the DOI refcounts - - - --- 2021-03-04 Paul Moore New
audit: consistently record PIDs with task_tgid_nr() - - - --- 2016-08-30 Paul Moore New
[v5.19.y,3/3] Smack: Provide read control for io_uring_cmd Backport the io_uring/LSM CMD passthrough controls 1 - - --- 2022-09-06 Paul Moore pcmoore Handled Elsewhere
[v5.19.y,2/3] selinux: implement the security_uring_cmd() LSM hook Backport the io_uring/LSM CMD passthrough controls - - - --- 2022-09-06 Paul Moore pcmoore Handled Elsewhere
[v5.19.y,1/3] lsm,io_uring: add LSM hooks for the new uring_cmd file op Backport the io_uring/LSM CMD passthrough controls - - - --- 2022-09-06 Paul Moore pcmoore Handled Elsewhere
[v4,8/8] Smack: Brutalist io_uring support Add LSM access controls and auditing to io_uring - - - --- 2021-09-15 Paul Moore New
[v4,7/8] selinux: add support for the io_uring access controls Add LSM access controls and auditing to io_uring - - - --- 2021-09-15 Paul Moore New
[v4,6/8] lsm,io_uring: add LSM hooks to io_uring Add LSM access controls and auditing to io_uring - - - --- 2021-09-15 Paul Moore New
[v4,5/8] io_uring: convert io_uring to the secure anon inode interface Add LSM access controls and auditing to io_uring - - - --- 2021-09-15 Paul Moore New
[v4,4/8] fs: add anon_inode_getfile_secure() similar to anon_inode_getfd_secure() Add LSM access controls and auditing to io_uring 1 - - --- 2021-09-15 Paul Moore New
[v4,3/8] audit: add filtering for io_uring records Add LSM access controls and auditing to io_uring 1 - - --- 2021-09-15 Paul Moore New
[v4,2/8] audit,io_uring,io-wq: add some basic audit support to io_uring Add LSM access controls and auditing to io_uring - - - --- 2021-09-15 Paul Moore New
[v4,1/8] audit: prepare audit_context for use in calling contexts beyond syscalls Add LSM access controls and auditing to io_uring 1 - - --- 2021-09-15 Paul Moore New
[v3,8/8] Smack: Brutalist io_uring support with debug Add LSM access controls and auditing to io_uring - - - --- 2021-09-14 Paul Moore New
[v3,7/8] selinux: add support for the io_uring access controls Add LSM access controls and auditing to io_uring - - - --- 2021-09-14 Paul Moore New
[v3,6/8] lsm,io_uring: add LSM hooks to io_uring Add LSM access controls and auditing to io_uring - - - --- 2021-09-14 Paul Moore New
[v3,5/8] io_uring: convert io_uring to the secure anon inode interface Add LSM access controls and auditing to io_uring - - - --- 2021-09-14 Paul Moore New
[v3,4/8] fs: add anon_inode_getfile_secure() similar to anon_inode_getfd_secure() Add LSM access controls and auditing to io_uring 1 - - --- 2021-09-14 Paul Moore New
[v3,3/8] audit: add filtering for io_uring records Add LSM access controls and auditing to io_uring - - - --- 2021-09-14 Paul Moore New
[v3,2/8] audit,io_uring,io-wq: add some basic audit support to io_uring Add LSM access controls and auditing to io_uring - - - --- 2021-09-14 Paul Moore New
[v3,1/8] audit: prepare audit_context for use in calling contexts beyond syscalls Add LSM access controls and auditing to io_uring 1 - - --- 2021-09-14 Paul Moore New
[v2] selinux: deprecate disabling SELinux and runtime [v2] selinux: deprecate disabling SELinux and runtime 3 - - --- 2020-01-07 Paul Moore New
[v2,3/3] smack: differentiate between subjective and objective task credentials Split security_task_getsecid() into subj and obj variants 1 2 - --- 2021-03-18 Paul Moore New
[v2,2/3] selinux: clarify task subjective and objective credentials Split security_task_getsecid() into subj and obj variants - 1 - --- 2021-03-18 Paul Moore New
[v2,1/3] lsm: separate security_task_getsecid() into subjective and objective variants Split security_task_getsecid() into subj and obj variants 2 1 - --- 2021-03-18 Paul Moore New
[RFC] selinux: ensure we cleanup the internal AVC counters on error in avc_insert() [RFC] selinux: ensure we cleanup the internal AVC counters on error in avc_insert() 1 - - --- 2019-12-10 Paul Moore New
[RFC] selinux: deprecate disabling SELinux and runtime [RFC] selinux: deprecate disabling SELinux and runtime 3 - - --- 2019-12-19 Paul Moore New
[RFC] security: add an interface to lookup the lockdown reason [RFC] security: add an interface to lookup the lockdown reason 1 - - --- 2019-12-10 Paul Moore New
[RFC] lsm: fixup the inode xattr capability handling [RFC] lsm: fixup the inode xattr capability handling - - - --- 2024-05-03 Paul Moore pcmoore New
[RFC] lsm,selinux: pass the family information along with xfrm flow [RFC] lsm,selinux: pass the family information along with xfrm flow 1 - - --- 2020-09-29 Paul Moore New
[RFC] lsm,fs: fix vfs_getxattr_alloc() return type and caller error paths [RFC] lsm,fs: fix vfs_getxattr_alloc() return type and caller error paths - 2 - --- 2022-11-10 Paul Moore pcmoore Accepted
[RFC] ipv6: make ipv6_renew_options() interrupt/kernel safe - - - --- 2018-07-02 Paul Moore New
[RFC,v3] ipv6: make ipv6_renew_options() interrupt/kernel safe - - - --- 2018-07-04 Paul Moore New
[RFC,v2] ipv6: make ipv6_renew_options() interrupt/kernel safe - - - --- 2018-07-02 Paul Moore New
[RFC,v2,9/9] Smack: Brutalist io_uring support with debug Add LSM access controls and auditing to io_uring - - - --- 2021-08-11 Paul Moore New
[RFC,v2,8/9] selinux: add support for the io_uring access controls Add LSM access controls and auditing to io_uring - - - --- 2021-08-11 Paul Moore New
[RFC,v2,7/9] lsm,io_uring: add LSM hooks to io_uring Add LSM access controls and auditing to io_uring - - - --- 2021-08-11 Paul Moore New
[RFC,v2,6/9] io_uring: convert io_uring to the secure anon inode interface Add LSM access controls and auditing to io_uring - - - --- 2021-08-11 Paul Moore New
[RFC,v2,5/9] fs: add anon_inode_getfile_secure() similar to anon_inode_getfd_secure() Add LSM access controls and auditing to io_uring 1 - - --- 2021-08-11 Paul Moore New
[RFC,v2,4/9] audit: add filtering for io_uring records Add LSM access controls and auditing to io_uring - - - --- 2021-08-11 Paul Moore New
[RFC,v2,3/9] audit: dev/test patch to force io_uring auditing Add LSM access controls and auditing to io_uring - - - --- 2021-08-11 Paul Moore New
[RFC,v2,2/9] audit,io_uring,io-wq: add some basic audit support to io_uring Add LSM access controls and auditing to io_uring - - - --- 2021-08-11 Paul Moore New
[RFC,v2,1/9] audit: prepare audit_context for use in calling contexts beyond syscalls Add LSM access controls and auditing to io_uring 1 - - --- 2021-08-11 Paul Moore New
[RFC,9/9] Smack: Brutalist io_uring support with debug Add LSM access controls and auditing to io_uring - - - --- 2021-05-21 Paul Moore New
[RFC,8/9] selinux: add support for the io_uring access controls Add LSM access controls and auditing to io_uring - - - --- 2021-05-21 Paul Moore New
[RFC,7/9] lsm,io_uring: add LSM hooks to io_uring Add LSM access controls and auditing to io_uring - - - --- 2021-05-21 Paul Moore New
[RFC,6/9] io_uring: convert io_uring to the secure anon inode interface Add LSM access controls and auditing to io_uring - - - --- 2021-05-21 Paul Moore New
[RFC,5/9] fs: add anon_inode_getfile_secure() similar to anon_inode_getfd_secure() Add LSM access controls and auditing to io_uring - - - --- 2021-05-21 Paul Moore New
[RFC,4/9] audit: add filtering for io_uring records Add LSM access controls and auditing to io_uring - - - --- 2021-05-21 Paul Moore New
[RFC,4/4] apparmor: differentiate between subjective and objective task credentials Split security_task_getsecid() into subj and obj variants - - - --- 2021-02-19 Paul Moore New
[RFC,3/9] audit: dev/test patch to force io_uring auditing Add LSM access controls and auditing to io_uring - - - --- 2021-05-21 Paul Moore New
[RFC,3/4] smack: differentiate between subjective and objective task credentials Split security_task_getsecid() into subj and obj variants - 1 - --- 2021-02-19 Paul Moore New
[RFC,3/3] lsm: consolidate buffer size handling into lsm_fill_user_ctx() LSM syscall tweaks - - - --- 2023-10-24 Paul Moore pcmoore Accepted
[RFC,2/9] audit,io_uring,io-wq: add some basic audit support to io_uring Add LSM access controls and auditing to io_uring - - - --- 2021-05-21 Paul Moore New
[RFC,2/4] selinux: clarify task subjective and objective credentials Split security_task_getsecid() into subj and obj variants - - - --- 2021-02-19 Paul Moore New
[RFC,2/3] lsm: correct error codes in security_getselfattr() LSM syscall tweaks 1 1 - --- 2023-10-24 Paul Moore pcmoore Accepted
[RFC,1/9] audit: prepare audit_context for use in calling contexts beyond syscalls Add LSM access controls and auditing to io_uring 1 - - --- 2021-05-21 Paul Moore New
[RFC,1/4] lsm: separate security_task_getsecid() into subjective and objective variants Split security_task_getsecid() into subj and obj variants 1 2 - --- 2021-02-19 Paul Moore New
[RFC,1/3] lsm: cleanup the size counters in security_getselfattr() LSM syscall tweaks 1 1 - --- 2023-10-24 Paul Moore pcmoore Accepted
« 1 2 3 »