Show patches with: Submitter = Casey Schaufler       |    Archived = No       |   1765 patches
« 1 2 3 417 18 »
Patch Series A/R/T S/W/F Date Submitter Delegate State
[v2] LSM: general protection fault in legacy_parse_param [v2] LSM: general protection fault in legacy_parse_param 2 - - --- 2022-01-27 Casey Schaufler pcmoore Accepted
[RFC] docs: ABI: ABI documentation for procfs attribute files used by multiple LSMs [RFC] docs: ABI: ABI documentation for procfs attribute files used by multiple LSMs - - - --- 2020-11-10 Casey Schaufler Accepted
Bad file pattern in 'SELINUX SECURITY MODULE' Bad file pattern in 'SELINUX SECURITY MODULE' - - - --- 2019-03-25 Casey Schaufler Rejected
LSM: Reorder security_capset to do access checks properly - - - --- 2016-06-01 Casey Schaufler Rejected
[v34,29/29] AppArmor: Remove the exclusive flag [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 2 1 - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,28/29] LSM: Add /proc attr entry for full LSM context [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule - 1 - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,27/29] Audit: Add record for multiple object contexts [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule - - - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,26/29] Audit: Add record for multiple task security contexts [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule - - - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,25/29] Audit: Allow multiple records in an audit_buffer [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule - - - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,24/29] LSM: Add a function to report multiple LSMs [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule - - - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,23/29] Audit: Create audit_stamp structure [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 1 - - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,22/29] Audit: Keep multiple LSM data in audit_names [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 1 - - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,21/29] LSM: Extend security_secid_to_secctx to include module selection [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule - - - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,20/29] binder: Pass LSM identifier for confirmation [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule - - - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,19/29] NET: Store LSM netlabel data in a lsmblob [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 2 2 - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,18/29] LSM: security_secid_to_secctx in netlink netfilter [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 3 2 - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,17/29] LSM: Use lsmcontext in security_inode_getsecctx [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 3 2 - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,16/29] LSM: Use lsmcontext in security_secid_to_secctx [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule - - - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,15/29] LSM: Ensure the correct LSM context releaser [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 3 2 - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,14/29] LSM: Specify which LSM to display [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule - - - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,13/29] LSM: Use lsmblob in security_cred_getsecid [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 2 2 - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,12/29] LSM: Use lsmblob in security_inode_getsecid [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 2 2 - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,11/29] LSM: Use lsmblob in security_current_getsecid [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 2 2 - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,10/29] LSM: Use lsmblob in security_ipc_getsecid [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 2 2 - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,09/29] LSM: Use lsmblob in security_secid_to_secctx [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 1 1 - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,08/29] LSM: Use lsmblob in security_secctx_to_secid [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 1 1 - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,07/29] LSM: Use lsmblob in security_kernel_act_as [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 2 2 - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,06/29] LSM: Use lsmblob in security_audit_rule_match [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 1 - - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,05/29] IMA: avoid label collisions with stacked LSMs [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule - - - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,04/29] LSM: provide lsm name and id slot mappings [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 1 1 - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,03/29] LSM: Add the lsmblob data structure. [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule - 1 - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,02/29] LSM: Infrastructure management of the sock security [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 2 2 - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 1 - - --- 2022-04-15 Casey Schaufler Not Applicable
[81/90] Netlabel: Return the labeling type on socket LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[80/90] Smack: Let netlabel do the work on connections LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[79/90] Smack: Don't set the socket label on each send LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[78/90] Smack: Let netlabel do the work on the ambient domain LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[77/90] Netlabel: Add a secattr comparison API function LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[76/90] Smack: Set netlabel flags properly on new label import LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[75/90] Smack: Fix setting of the CIPSO MLS_CAT flags LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[74/90] LSM: Change error detection for UDP peer security LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[73/90] Smack: Advertise the secid to netlabel LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[72/90] LSM: Fix for security_init_inode_security LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[71/90] LSM: Infrastructure security blobs for mount options LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[70/90] LSM: Correct handling of ENOSYS in inode_setxattr LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[69/90] LSM: Use full security context in security_inode_setsecctx LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[68/90] LSM: Support multiple LSMs using inode_init_security LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[67/90] Smack: Detect if secmarks can be safely used LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[66/90] LSM: refactor security_setprocattr LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[65/90] LSM: Add secmark refcounting to call_one list LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[64/90] netfilter: Remove unnecessary NULL check in lsm_context LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[63/90] Smack: Consolidate secmark conversions LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[62/90] netfilter: Fix memory leak introduced with lsm_context LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[61/90] LSM: Make getting the secmark right cleaner LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[60/90] LSM: Add secmark_relabel_packet to the set of one call hooks LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[59/90] AppArmor: Remove the exclusive flag LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[58/90] LSM: Specify which LSM to display LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[57/90] SELinux: Use blob offset in current_sid LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[56/90] LSM: Special handling for secctx lsm hooks LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[55/90] LSM: Remove unused macro LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[54/90] kernfs: remove lsm_context scaffolding LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[53/90] LSM: Use lsm_context in security_inode_setsecctx LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[52/90] LSM: Use lsm_context in inode_setsecctx hooks LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[51/90] LSM: Add the release function to the lsm_context LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[50/90] fs: remove lsm_context scaffolding LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[49/90] LSM: Use lsm_context in security_secid_to_secctx LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[48/90] LSM: Use lsm_context in security_release_secctx LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[47/90] LSM: Use lsm_context in release_secctx hooks LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[46/90] LSM: Use lsm_context in security_secctx_to_secid LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[45/90] LSM: Use lsm_context in security_inode_getsecctx LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[44/90] LSM: Use lsm_context in security_inode_notifysecctx LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[43/90] LSM: Use lsm_context in security_dentry_init_security LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[42/90] LSM: Use lsm_context in dentry_init_security hooks LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[41/90] LSM: Use lsm_context in inode_notifysecctx hooks LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[40/90] LSM: Use lsm_context in inode_getsecctx hooks LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[39/90] LSM: Use lsm_context in secctx_to_secid hooks LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[38/90] LSM: Use lsm_context in secid_to_secctx hooks LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[37/90] LSM: Create a data structure for a security context LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[36/90] LSM: Limit calls to certain module hooks LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[35/90] AppArmor: Remove unnecessary hook stub LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[34/90] Smack: Restore the release_secctx hook LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[33/90] IMA: FIXUP prototype using lsm_export LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[32/90] LSM: Remove lsm_export scaffolding functions LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[31/90] Netlabel: Replace secids with lsm_export LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[30/90] NET: Remove netfilter scaffolding for lsm_export LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[29/90] NET: Remove scaffolding on new secmarks LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[28/90] NET: Remove scaffolding on secmarks LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[27/90] NET: Change the UNIXCB from a secid to an lsm_export LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[26/90] IMA: Clean out lsm_export scaffolding LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[25/90] Audit: Convert osid to an lsm_export structure LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[24/90] Audit: Convert target_sid to an lsm_export structure LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[23/90] Audit: Change audit_sig_sid to audit_sig_lsm LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[22/90] LSM: Use lsm_export in security_cred_getsecid LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[21/90] LSM: Use lsm_export in security_inode_getsecid LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[20/90] LSM: Use lsm_export in security_task_getsecid LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[19/90] LSM: Use lsm_export in security_ipc_getsecid LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[18/90] LSM: Use lsm_export in security_secid_to_secctx LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[17/90] LSM: Use lsm_export in security_secctx_to_secid LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[16/90] LSM: Use lsm_export in security_socket_getpeersec_dgram LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
[15/90] LSM: Use lsm_export in security_kernel_act_as LSM: Module stacking for all - - - --- 2019-04-19 Casey Schaufler Not Applicable
« 1 2 3 417 18 »