Toggle navigation
Patchwork
Security modules development
Patches
Bundles
About this project
Login
Register
Mail settings
Show patches with
: none
| 16818 patches
Series
Submitter
State
any
Action Required
New
Under Review
Accepted
Rejected
RFC
Not Applicable
Changes Requested
Awaiting Upstream
Superseded
Deferred
Mainlined
Queued
Needs ACK
Handled Elsewhere
In Next
Search
Archived
No
Yes
Both
Delegate
------
Nobody
holtmann
holtmann
holtmann
agk
mchehab
mchehab
gregkh
gregkh
mtosatti
lethal
lethal
avi
cvaroqui
jbrassow
mikulas
dtor
bmarzins
tmlind
jmberg
jmberg
mcgrof
mcgrof
mcgrof
lenb
lenb
kyle
felipebalbi
varenet
helge
helge
khilman
khilman
khilman
khilman
jwoithe
mlin
Zhang Rui
Zhang Rui
iksaif
cjackiewicz
hmh
jbarnes
jbarnes
jbarnes
willy
snitzer
iwamatsu
dougsland
mjg59
rafael
rafael
rafael
ericvh@gmail.com
ykzhao
venkip
sandeen
pwsan
lucho@ionkov.net
rminnich
anholt
aystarik
roland
shefty
mason
glikely
krh
djbw
djbw
djbw
cmarinas
doyu
jrn
sage
tomba
mmarek
cjb
trondmy
jikos
bcousson
jic23
olof
olof
olof
nsekhar
weiny2
horms
horms
bwidawsk
bwidawsk
shemminger
eulfhan
josef
josef
josef
dianders
jpan9
hal
kdave
bleung
evalenti
jlbec
wsa
bhelgaas
vkoul
vkoul
szlin
davejiang
markgross
tagr
tiwai
vireshk
mmind
dledford
geert
geert
herbert
herbert
kvalo
kvalo
kvalo
bentiss
arend
rzwisler
stellarhopper
stellarhopper
jejb
matthias_bgg
dvhart
axboe
axboe
pcmoore
pcmoore
pcmoore
mkp
mkp
stefan_schmidt
leon
lucvoo
jsakkine
jsakkine
jsakkine
bamse
bamse
demarchi
krzk
groeck
groeck
sboyd
sboyd
mturquette
mturquette
0andriy
carlocaione
luca
dgc
kbingham
derosier
narmstrong
narmstrong
atull
tytso
tytso
djwong
bvanassche
omos
jpirko
jpirko
GustavoARSilva
pkshih
patersonc
brauner
shuahkh
shuahkh
shuahkh
palmer
palmer
jgg
Kishon
idosch
labbott
jsimmons
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
broonie
broonie
broonie
mricon
mricon
mricon
kees
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
arnd
linusw
perfinion
bbrezillon
bachradsusi
rostedt
rostedt
kholk
nbd
ebiggers
ebiggers
pavelm
sds
m0reeze
ganis
jwcart2
matttbe
andmur01
lorpie01
chanwoochoi
dlezcano
jhedberg
vudentz
robertfoss
bgix
tedd_an
tsbogend
wens
wcrobert
robher
kstewart
kwilczynski
hansg
bpf
netdev
dsa
ethtool
netdrv
martineau
abelloni
trix
pabeni
mani_sadhasivam
mlimonci
liusong6
mjp
tohojo
pmalani
prestwoj
prestwoj
dhowells
tzungbi
conchuod
paulmck
jes
mtkaczyk
colyli
cem
pateldipen1984
iweiny
iweiny
bjorn
mhiramat
JanKiszka
jaegeuk
mraynal
aring
konradybcio
ij
Hailan
jstitt007
denkenz
denkenz
mkorenbl
jjohnson
frank_li
geliang
mdraidci
mdraidci
peluse
joelgranados
Apply
«
1
2
...
119
120
121
…
168
169
»
Patch
Series
A/R/T
S/W/F
Date
Submitter
Delegate
State
[RFC,1/2] drivers: crypto: caam: key: Add caam_tk key type
Create CAAM HW key in linux keyring and use in dmcrypt
- - -
-
-
-
2019-03-01
Franck Lenormand
New
keys: fix missing __user in KEYCTL_PKEY_QUERY
keys: fix missing __user in KEYCTL_PKEY_QUERY
2 - -
-
-
-
2019-03-01
Ben Dooks
New
[v4,1/2] LSM: SafeSetID: gate setgid transitions
[v4,1/2] LSM: SafeSetID: gate setgid transitions
- - -
-
-
-
2019-02-28
Micah Morton
New
LSM: Update list of SECURITYFS users in Kconfig
LSM: Update list of SECURITYFS users in Kconfig
- - -
-
-
-
2019-02-28
Petr Vorel
New
[27/27] lockdown: Print current->comm in restriction messages
[PULL,REQUEST] Lock down patches
- - -
-
-
-
2019-02-28
Matthew Garrett
New
[26/27] debugfs: Restrict debugfs when the kernel is locked down
[PULL,REQUEST] Lock down patches
- - -
-
-
-
2019-02-28
Matthew Garrett
New
[25/27] Lock down perf
[PULL,REQUEST] Lock down patches
- - -
-
-
-
2019-02-28
Matthew Garrett
New
[24/27] bpf: Restrict kernel image access functions when the kernel is locked down
[PULL,REQUEST] Lock down patches
- - -
-
-
-
2019-02-28
Matthew Garrett
New
[23/27] Lock down kprobes
[PULL,REQUEST] Lock down patches
- - -
-
-
-
2019-02-28
Matthew Garrett
New
[22/27] Lock down /proc/kcore
[PULL,REQUEST] Lock down patches
- 1 -
-
-
-
2019-02-28
Matthew Garrett
New
[21/27] x86/mmiotrace: Lock down the testmmiotrace module
[PULL,REQUEST] Lock down patches
- - -
-
-
-
2019-02-28
Matthew Garrett
New
[20/27] Lock down module params that specify hardware parameters (eg. ioport)
[PULL,REQUEST] Lock down patches
- - -
-
-
-
2019-02-28
Matthew Garrett
New
[19/27] Lock down TIOCSSERIAL
[PULL,REQUEST] Lock down patches
- - -
-
-
-
2019-02-28
Matthew Garrett
New
[18/27] Prohibit PCMCIA CIS storage when the kernel is locked down
[PULL,REQUEST] Lock down patches
- - -
-
-
-
2019-02-28
Matthew Garrett
New
[17/27] acpi: Disable APEI error injection if the kernel is locked down
[PULL,REQUEST] Lock down patches
- 1 -
-
-
-
2019-02-28
Matthew Garrett
New
[16/27] acpi: Disable ACPI table override if the kernel is locked down
[PULL,REQUEST] Lock down patches
- 1 -
-
-
-
2019-02-28
Matthew Garrett
New
[15/27] acpi: Ignore acpi_rsdp kernel param when the kernel has been locked down
[PULL,REQUEST] Lock down patches
- 1 -
-
-
-
2019-02-28
Matthew Garrett
New
[14/27] ACPI: Limit access to custom_method when the kernel is locked down
[PULL,REQUEST] Lock down patches
- 1 -
-
-
-
2019-02-28
Matthew Garrett
New
[13/27] x86/msr: Restrict MSR access when the kernel is locked down
[PULL,REQUEST] Lock down patches
1 2 -
-
-
-
2019-02-28
Matthew Garrett
New
[12/27] x86: Lock down IO port access when the kernel is locked down
[PULL,REQUEST] Lock down patches
- 2 -
-
-
-
2019-02-28
Matthew Garrett
New
[11/27] PCI: Lock down BAR access when the kernel is locked down
[PULL,REQUEST] Lock down patches
1 1 -
-
-
-
2019-02-28
Matthew Garrett
New
[10/27] uswsusp: Disable when the kernel is locked down
[PULL,REQUEST] Lock down patches
- 2 -
-
-
-
2019-02-28
Matthew Garrett
New
[09/27] hibernate: Disable when the kernel is locked down
[PULL,REQUEST] Lock down patches
- 1 -
-
-
-
2019-02-28
Matthew Garrett
New
[08/27] kexec_file: Restrict at runtime if the kernel is locked down
[PULL,REQUEST] Lock down patches
- 1 -
-
-
-
2019-02-28
Matthew Garrett
New
[07/27] kexec_file: split KEXEC_VERIFY_SIG into KEXEC_SIG and KEXEC_SIG_FORCE
[PULL,REQUEST] Lock down patches
- 1 -
-
-
-
2019-02-28
Matthew Garrett
New
[06/27] Copy secure_boot flag in boot params across kexec reboot
[PULL,REQUEST] Lock down patches
- 1 -
-
-
-
2019-02-28
Matthew Garrett
New
[05/27] kexec_load: Disable at runtime if the kernel is locked down
[PULL,REQUEST] Lock down patches
1 2 -
-
-
-
2019-02-28
Matthew Garrett
New
[04/27] Restrict /dev/{mem,kmem,port} when the kernel is locked down
[PULL,REQUEST] Lock down patches
- 1 -
-
-
-
2019-02-28
Matthew Garrett
New
[03/27] Enforce module signatures if the kernel is locked down
[PULL,REQUEST] Lock down patches
- 1 -
-
-
-
2019-02-28
Matthew Garrett
New
[02/27] Add a SysRq option to lift kernel lockdown
[PULL,REQUEST] Lock down patches
- - -
-
-
-
2019-02-28
Matthew Garrett
New
[01/27] Add the ability to lock down access to the running kernel image
[01/27] Add the ability to lock down access to the running kernel image
1 - -
-
-
-
2019-02-28
Matthew Garrett
New
[02/27] Add a SysRq option to lift kernel lockdown
[01/27] Add the ability to lock down access to the running kernel image
- - -
-
-
-
2019-02-28
Matthew Garrett
New
[01/27] Add the ability to lock down access to the running kernel image
[01/27] Add the ability to lock down access to the running kernel image
1 - -
-
-
-
2019-02-28
Matthew Garrett
New
[02/27] Add a SysRq option to lift kernel lockdown
[01/27] Add the ability to lock down access to the running kernel image
- - -
-
-
-
2019-02-28
Matthew Garrett
New
[01/27] Add the ability to lock down access to the running kernel image
[01/27] Add the ability to lock down access to the running kernel image
1 - -
-
-
-
2019-02-28
Matthew Garrett
New
[02/27] Add a SysRq option to lift kernel lockdown
[01/27] Add the ability to lock down access to the running kernel image
- - -
-
-
-
2019-02-28
Matthew Garrett
New
[01/27] Add the ability to lock down access to the running kernel image
[01/27] Add the ability to lock down access to the running kernel image
1 - -
-
-
-
2019-02-28
Matthew Garrett
New
[97/97] Smack: Remove the exclusive bit
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[96/97] LSM: Apply Netlabel consitancy checks on send and connect
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[95/97] LSM: Avoid network conflicts in SELinux and Smack
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[94/97] LSM: Hook for netlabel reconciliation
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[93/97] Smack: Use the NLTYPE on output
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[92/97] LSM: Remember the NLTYPE of netlabel sockets
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[91/97] Netlabel: Return the labeling type on socket
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[90/97] Netlabel: Return the labeling type on socket
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[89/97] Netlabel: Return the labeling type on socket
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[88/97] Netlabel: Return the labeling type on socket
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[87/97] Smack: Let netlabel do the work on connections
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[86/97] Smack: Don't set the socket label on each send
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[85/97] Smack: Let netlabel do the work on the ambient domain
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[84/97] Netlabel: Add a secattr comparison API function
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[83/97] Smack: Set netlabel flags properly on new label import
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[82/97] Smack: Fix setting of the CIPSO MLS_CAT flags
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[81/97] LSM: Change error detection for UDP peer security
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[80/97] Smack: Advertise the secid to netlabel
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[79/97] LSM: Fix for security_init_inode_security
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[78/97] LSM: Infrastructure security blobs for mount options
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[77/97] LSM: Correct handling of ENOSYS in inode_setxattr
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[76/97] LSM: Use full security context in security_inode_setsecctx
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[75/97] LSM: Support multiple LSMs using inode_init_security
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[74/97] Smack: Detect if secmarks can be safely used
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[73/97] LSM: refactor security_setprocattr
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[72/97] LSM: Add secmark refcounting to call_one list - part 2
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[71/97] LSM: Add secmark refcounting to call_one list
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[70/97] netfilter: Remove unnecessary NULL check in lsm_context
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[69/97] Smack: Consolidate secmark conversions
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[68/97] netfilter: Fix memory leak introduced with lsm_context
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[67/97] LSM: Make getting the secmark right cleaner with lsm_export_one_secid
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[66/97] LSM: Add secmark_relabel_packet to the set of one call hooks
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[65/97] AppArmor: Remove the exclusive flag
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[64/97] LSM: Specify which LSM to display with /proc/self/attr/display
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[63/97] SELinux: Use blob offset in current_sid
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[62/97] LSM: Special handling for secctx lsm hooks
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[61/97] LSM: Remove unused macro
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[60/97] kernfs: remove lsm_context scaffolding
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[59/97] LSM: Use lsm_context in security_inode_setsecctx
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[58/97] LSM: Use lsm_context in inode_setsecctx hooks
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[57/97] LSM: Add the release function to the lsm_context
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[56/97] fs: remove lsm_context scaffolding
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[55/97] LSM: Use lsm_context in security_secid_to_secctx
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[54/97] LSM: Use lsm_context in security_release_secctx
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[53/97] LSM: Use lsm_context in release_secctx hooks
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[52/97] LSM: Use lsm_context in security_secctx_to_secid
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[51/97] LSM: Use lsm_context in security_inode_getsecctx
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[50/97] LSM: Use lsm_context in security_inode_notifysecctx
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[49/97] LSM: Use lsm_context in security_dentry_init_security
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[48/97] LSM: Use lsm_context in dentry_init_security hooks
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[47/97] LSM: Use lsm_context in inode_notifysecctx hooks
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[46/97] LSM: Use lsm_context in inode_getsecctx hooks
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[45/97] LSM: Use lsm_context in secctx_to_secid hooks
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[44/97] LSM: Use lsm_context in secid_to_secctx hooks
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[43/97] LSM: Create a data structure for a security context
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[42/97] LSM: Limit calls to certain module hooks
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[41/97] AppArmor: Remove unnecessary hook stub
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[40/97] Smack: Restore the release_secctx hook
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[39/97] IMA: FIXUP prototype using lsm_export
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[38/97] LSM: Remove lsm_export scaffolding functions
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[37/97] Netlabel: Replace secids with lsm_export
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[36/97] NET: Remove netfilter scaffolding for lsm_export
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
[35/97] NET: Remove scaffolding on new secmarks
LSM: Complete module stacking
- - -
-
-
-
2019-02-28
Casey Schaufler
New
«
1
2
...
119
120
121
…
168
169
»