Toggle navigation
Patchwork
Security modules development
Patches
Bundles
About this project
Login
Register
Mail settings
Show patches with
: State =
Action Required
| 12163 patches
Series
Submitter
State
any
Action Required
New
Under Review
Accepted
Rejected
RFC
Not Applicable
Changes Requested
Awaiting Upstream
Superseded
Deferred
Mainlined
Queued
Needs ACK
Handled Elsewhere
In Next
Search
Archived
No
Yes
Both
Delegate
------
Nobody
holtmann
holtmann
holtmann
agk
mchehab
mchehab
gregkh
gregkh
mtosatti
lethal
lethal
avi
cvaroqui
jbrassow
mikulas
dtor
bmarzins
tmlind
jmberg
jmberg
mcgrof
mcgrof
mcgrof
lenb
lenb
kyle
felipebalbi
varenet
helge
helge
khilman
khilman
khilman
khilman
jwoithe
mlin
Zhang Rui
Zhang Rui
iksaif
cjackiewicz
hmh
jbarnes
jbarnes
jbarnes
willy
snitzer
iwamatsu
dougsland
mjg59
rafael
rafael
rafael
ericvh@gmail.com
ykzhao
venkip
sandeen
pwsan
lucho@ionkov.net
rminnich
anholt
aystarik
roland
shefty
mason
glikely
krh
djbw
djbw
djbw
cmarinas
doyu
jrn
sage
tomba
mmarek
cjb
trondmy
jikos
bcousson
jic23
olof
olof
olof
nsekhar
weiny2
horms
horms
bwidawsk
bwidawsk
shemminger
eulfhan
josef
josef
josef
dianders
jpan9
hal
kdave
bleung
evalenti
jlbec
wsa
bhelgaas
vkoul
vkoul
szlin
davejiang
markgross
tagr
tiwai
vireshk
mmind
dledford
geert
geert
herbert
herbert
kvalo
kvalo
kvalo
bentiss
arend
rzwisler
stellarhopper
stellarhopper
jejb
matthias_bgg
dvhart
axboe
axboe
pcmoore
pcmoore
pcmoore
mkp
mkp
stefan_schmidt
leon
lucvoo
jsakkine
jsakkine
jsakkine
bamse
bamse
demarchi
krzk
groeck
groeck
sboyd
sboyd
mturquette
mturquette
0andriy
carlocaione
luca
dgc
kbingham
derosier
narmstrong
narmstrong
atull
tytso
tytso
djwong
bvanassche
omos
jpirko
jpirko
GustavoARSilva
pkshih
patersonc
brauner
shuahkh
shuahkh
shuahkh
palmer
palmer
jgg
Kishon
idosch
labbott
jsimmons
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
broonie
broonie
broonie
mricon
mricon
mricon
kees
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
arnd
linusw
perfinion
bbrezillon
bachradsusi
rostedt
rostedt
kholk
nbd
ebiggers
ebiggers
pavelm
sds
m0reeze
ganis
jwcart2
matttbe
andmur01
lorpie01
chanwoochoi
dlezcano
jhedberg
vudentz
robertfoss
bgix
tedd_an
tsbogend
wens
wcrobert
robher
kstewart
kwilczynski
hansg
bpf
netdev
dsa
ethtool
netdrv
martineau
abelloni
trix
pabeni
mani_sadhasivam
mlimonci
liusong6
mjp
tohojo
pmalani
prestwoj
prestwoj
dhowells
tzungbi
conchuod
paulmck
jes
mtkaczyk
colyli
cem
pateldipen1984
iweiny
iweiny
bjorn
mhiramat
JanKiszka
jaegeuk
mraynal
aring
konradybcio
ij
Hailan
jstitt007
denkenz
denkenz
mkorenbl
jjohnson
frank_li
geliang
mdraidci
mdraidci
peluse
joelgranados
Apply
«
1
2
...
18
19
20
…
121
122
»
Patch
Series
A/R/T
S/W/F
Date
Submitter
Delegate
State
[v2,2/6] KEYS: trusted: Allow import from existing key material for development
KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- - -
-
-
-
2021-06-22
Ahmad Fatoum
New
[v2,6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- - -
-
-
-
2021-06-22
Ahmad Fatoum
New
[v2,5/6] crypto: caam - add in-kernel interface for blob generator
KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- - -
-
-
-
2021-06-22
Ahmad Fatoum
New
[v2,4/6] KEYS: trusted: allow trust sources to use kernel RNG for key material
KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- - -
-
-
-
2021-06-22
Ahmad Fatoum
New
[v2,3/6] KEYS: trusted: allow users to use kernel RNG for key material
KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- - -
-
-
-
2021-06-22
Ahmad Fatoum
New
[v2,1/6] KEYS: trusted: allow use of TEE as backend without TCG_TPM support
KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- - -
-
-
-
2021-06-22
Ahmad Fatoum
New
[v2] evm: Check xattr size discrepancy between kernel and user
[v2] evm: Check xattr size discrepancy between kernel and user
- - -
-
-
-
2021-06-21
Roberto Sassu
New
evm: Check xattr size misalignment between kernel and user
evm: Check xattr size misalignment between kernel and user
- - -
-
-
-
2021-06-21
Roberto Sassu
New
fs: Return raw xattr for security.* if there is size disagreement with LSMs
fs: Return raw xattr for security.* if there is size disagreement with LSMs
- - 1
-
-
-
2021-06-16
Roberto Sassu
New
[v3] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
[v3] lockdown,selinux: fix wrong subject in some SELinux lockdown checks
2 - -
-
-
-
2021-06-16
Ondrej Mosnacek
New
[v2,27/29] docs: userspace-api: landlock.rst: avoid using ReST :doc:`foo` markup
docs: avoid using ReST :doc:`foo` tag
1 - -
-
-
-
2021-06-16
Mauro Carvalho Chehab
New
[v2,24/29] docs: security: landlock.rst: avoid using ReST :doc:`foo` markup
docs: avoid using ReST :doc:`foo` tag
- - -
-
-
-
2021-06-16
Mauro Carvalho Chehab
New
[-next,v3] netlabel: Fix memory leak in netlbl_mgmt_add_common
[-next,v3] netlabel: Fix memory leak in netlbl_mgmt_add_common
1 - -
-
-
-
2021-06-15
Liu Shixin
New
[3/3] doc: trusted-encrypted: add DCP as new trust source
DCP as trusted keys backend
- - -
-
-
-
2021-06-14
Richard Weinberger
New
[2/3] KEYS: trusted: Introduce support for NXP DCP-based trusted keys
DCP as trusted keys backend
- - -
-
-
-
2021-06-14
Richard Weinberger
New
[1/3] crypto: mxs-dcp: Add support for hardware provided keys
DCP as trusted keys backend
- - -
-
-
-
2021-06-14
Richard Weinberger
New
security: add LSM hook at the memfd_create point
security: add LSM hook at the memfd_create point
- - -
-
-
-
2021-06-13
Li Qiang
New
[-next,v2] netlabel: Fix memory leak in netlbl_mgmt_add_common
[-next,v2] netlabel: Fix memory leak in netlbl_mgmt_add_common
- - -
-
-
-
2021-06-11
Liu Shixin
New
audit: remove unnecessary 'ret' initialization
audit: remove unnecessary 'ret' initialization
- - -
-
-
-
2021-06-11
Austin Kim
New
[v27,25/25] AppArmor: Remove the exclusive flag
LSM: Module stacking for AppArmor
2 1 -
-
-
-
2021-06-11
Casey Schaufler
New
[v27,24/25] LSM: Add /proc attr entry for full LSM context
LSM: Module stacking for AppArmor
- 1 -
-
-
-
2021-06-11
Casey Schaufler
New
[v27,23/25] Audit: Add record for multiple object LSM attributes
LSM: Module stacking for AppArmor
- - -
-
-
-
2021-06-11
Casey Schaufler
New
[v27,22/25] Audit: Add record for multiple process LSM attributes
LSM: Module stacking for AppArmor
- - -
-
-
-
2021-06-11
Casey Schaufler
New
[v27,21/25] audit: add support for non-syscall auxiliary records
LSM: Module stacking for AppArmor
- - -
-
-
-
2021-06-11
Casey Schaufler
New
[v27,20/25] LSM: Verify LSM display sanity in binder
LSM: Module stacking for AppArmor
2 2 -
-
-
-
2021-06-11
Casey Schaufler
New
[v27,19/25] NET: Store LSM netlabel data in a lsmblob
LSM: Module stacking for AppArmor
2 2 -
-
-
-
2021-06-11
Casey Schaufler
New
[v27,18/25] LSM: security_secid_to_secctx in netlink netfilter
LSM: Module stacking for AppArmor
2 2 -
-
-
-
2021-06-11
Casey Schaufler
New
[v27,17/25] LSM: Use lsmcontext in security_inode_getsecctx
LSM: Module stacking for AppArmor
3 1 -
-
-
-
2021-06-11
Casey Schaufler
New
[v27,16/25] LSM: Use lsmcontext in security_secid_to_secctx
LSM: Module stacking for AppArmor
2 1 -
-
-
-
2021-06-11
Casey Schaufler
New
[v27,15/25] LSM: Ensure the correct LSM context releaser
LSM: Module stacking for AppArmor
2 2 -
-
-
-
2021-06-11
Casey Schaufler
New
[v27,14/25] LSM: Specify which LSM to display
LSM: Module stacking for AppArmor
- - -
-
-
-
2021-06-11
Casey Schaufler
New
[v27,13/25] IMA: Change internal interfaces to use lsmblobs
LSM: Module stacking for AppArmor
1 2 -
-
-
-
2021-06-11
Casey Schaufler
New
[v27,12/25] LSM: Use lsmblob in security_cred_getsecid
LSM: Module stacking for AppArmor
2 2 -
-
-
-
2021-06-11
Casey Schaufler
New
[v27,11/25] LSM: Use lsmblob in security_inode_getsecid
LSM: Module stacking for AppArmor
2 2 -
-
-
-
2021-06-11
Casey Schaufler
New
[v27,10/25] LSM: Use lsmblob in security_task_getsecid
LSM: Module stacking for AppArmor
2 2 -
-
-
-
2021-06-11
Casey Schaufler
New
[v27,09/25] LSM: Use lsmblob in security_ipc_getsecid
LSM: Module stacking for AppArmor
2 2 -
-
-
-
2021-06-11
Casey Schaufler
New
[v27,08/25] LSM: Use lsmblob in security_secid_to_secctx
LSM: Module stacking for AppArmor
- - -
-
-
-
2021-06-11
Casey Schaufler
New
[v27,07/25] LSM: Use lsmblob in security_secctx_to_secid
LSM: Module stacking for AppArmor
- - -
-
-
-
2021-06-11
Casey Schaufler
New
[v27,06/25] LSM: Use lsmblob in security_kernel_act_as
LSM: Module stacking for AppArmor
2 2 -
-
-
-
2021-06-11
Casey Schaufler
New
[v27,05/25] LSM: Use lsmblob in security_audit_rule_match
LSM: Module stacking for AppArmor
2 2 -
-
-
-
2021-06-11
Casey Schaufler
New
[v27,04/25] IMA: avoid label collisions with stacked LSMs
LSM: Module stacking for AppArmor
- - -
-
-
-
2021-06-11
Casey Schaufler
New
[v27,03/25] LSM: provide lsm name and id slot mappings
LSM: Module stacking for AppArmor
- - -
-
-
-
2021-06-11
Casey Schaufler
New
[v27,02/25] LSM: Add the lsmblob data structure.
LSM: Module stacking for AppArmor
3 - -
-
-
-
2021-06-11
Casey Schaufler
New
[v27,01/25] LSM: Infrastructure management of the sock security
LSM: Module stacking for AppArmor
2 2 -
-
-
-
2021-06-11
Casey Schaufler
New
[v6,4/4] certs: Adjustment due to 'Check whether openssl tool is available'
Add support for ECDSA-signed kernel modules
- - -
-
-
-
2021-06-10
Stefan Berger
New
[v6,3/4] certs: Add support for using elliptic curve keys for signing modules
Add support for ECDSA-signed kernel modules
1 - 1
-
-
-
2021-06-10
Stefan Berger
New
[v6,2/4] certs: Check whether openssl tool is available
Add support for ECDSA-signed kernel modules
- - -
-
-
-
2021-06-10
Stefan Berger
New
[v6,1/4] certs: Trigger creation of RSA module signing key if it's not an RSA key
Add support for ECDSA-signed kernel modules
- 1 1
-
-
-
2021-06-10
Stefan Berger
New
tpm2_load_command leaks memory
tpm2_load_command leaks memory
- - -
-
-
-
2021-06-10
Dhiraj Shah
New
[-next] Yama: fix doc warnings
[-next] Yama: fix doc warnings
- - -
-
-
-
2021-06-10
ChenXiaoSong
New
[-next] tomoyo: fix doc warnings
[-next] tomoyo: fix doc warnings
- - -
-
-
-
2021-06-10
ChenXiaoSong
New
[-next] netlabel: Fix memory leak in netlbl_mgmt_add_common
[-next] netlabel: Fix memory leak in netlbl_mgmt_add_common
- - -
-
-
-
2021-06-10
Liu Shixin
New
LSM: SafeSetID: Mark safesetid_initialized as __initdata
LSM: SafeSetID: Mark safesetid_initialized as __initdata
- - -
-
-
-
2021-06-08
Austin Kim
New
[2/2] evm: output EVM digest calculation info
EVM: add some debugging info
- 1 -
-
-
-
2021-06-08
Mimi Zohar
New
[1/2] ima: differentiate between EVM failures in the audit log
EVM: add some debugging info
- 1 -
-
-
-
2021-06-08
Mimi Zohar
New
[5/5] ima: Pass NULL instead of 0 to ima_get_action() in ima_file_mprotect()
[1/5] doc: Fix warning in Documentation/security/IMA-templates.rst
- - -
-
-
-
2021-06-08
Roberto Sassu
New
[4/5] ima: Include header defining ima_post_key_create_or_update()
[1/5] doc: Fix warning in Documentation/security/IMA-templates.rst
- - -
-
-
-
2021-06-08
Roberto Sassu
New
[3/5] ima/evm: Fix type mismatch
[1/5] doc: Fix warning in Documentation/security/IMA-templates.rst
- - -
-
-
-
2021-06-08
Roberto Sassu
New
[2/5] ima: Set correct casting types
[1/5] doc: Fix warning in Documentation/security/IMA-templates.rst
- - -
-
-
-
2021-06-08
Roberto Sassu
New
[1/5] doc: Fix warning in Documentation/security/IMA-templates.rst
[1/5] doc: Fix warning in Documentation/security/IMA-templates.rst
- - -
-
-
-
2021-06-08
Roberto Sassu
New
net: ipv4: fix memory leak in netlbl_cipsov4_add_std
net: ipv4: fix memory leak in netlbl_cipsov4_add_std
1 - -
-
-
-
2021-06-08
Nanyong Sun
New
[-next,v2] capability: fix doc warnings in capability.c
[-next,v2] capability: fix doc warnings in capability.c
- - -
-
-
-
2021-06-08
Baokun Li
New
[next] ima: Fix fall-through warning for Clang
[next] ima: Fix fall-through warning for Clang
- 1 -
-
-
-
2021-06-07
Gustavo A. R. Silva
New
[net-next] netlabel: Fix spelling mistakes
[net-next] netlabel: Fix spelling mistakes
1 - -
-
-
-
2021-06-07
Zheng Yongjun
New
[-next] apparmor: fix doc warning
[-next] apparmor: fix doc warning
- - -
-
-
-
2021-06-07
ChenXiaoSong
New
[-next] Smack: fix doc warning
[-next] Smack: fix doc warning
- - -
-
-
-
2021-06-07
ChenXiaoSong
New
[v8,8/8] MAINTAINERS: Add a new entry for the Brute LSM
Fork brute force attack mitigation
- - -
-
-
-
2021-06-05
John Wood
New
[v8,7/8] Documentation: Add documentation for the Brute LSM
Fork brute force attack mitigation
- - -
-
-
-
2021-06-05
John Wood
New
[v8,6/8] selftests/brute: Add tests for the Brute LSM
Fork brute force attack mitigation
- - -
-
-
-
2021-06-05
John Wood
New
[v8,5/8] security/brute: Notify to userspace "task killed"
Fork brute force attack mitigation
- - -
-
-
-
2021-06-05
John Wood
New
[v8,4/8] security/brute: Mitigate a brute force attack
Fork brute force attack mitigation
- - -
-
-
-
2021-06-05
John Wood
New
[v8,3/8] security/brute: Detect a brute force attack
Fork brute force attack mitigation
- - -
-
-
-
2021-06-05
John Wood
New
[v8,2/8] security/brute: Define a LSM and add sysctl attributes
Fork brute force attack mitigation
- - -
-
-
-
2021-06-05
John Wood
New
[v8,1/8] security: Add LSM hook at the point where a task gets a fatal signal
Fork brute force attack mitigation
- 1 -
-
-
-
2021-06-05
John Wood
New
[32/34] docs: userspace-api: landlock.rst: avoid using ReSt :doc:`foo` markup
docs: avoid using ReST :doc:`foo` tag
- - -
-
-
-
2021-06-05
Mauro Carvalho Chehab
New
[29/34] docs: security: landlock.rst: avoid using ReSt :doc:`foo` markup
docs: avoid using ReST :doc:`foo` tag
- - -
-
-
-
2021-06-05
Mauro Carvalho Chehab
New
[-next] capability: fix doc warnings in capability.c
[-next] capability: fix doc warnings in capability.c
- - -
-
-
-
2021-06-05
Baokun Li
New
[RESEND,v2,6/7] ima: Define new template evm-sig
Untitled series #493361
- - -
-
-
-
2021-06-03
Roberto Sassu
New
[v5,2/2] certs: Add support for using elliptic curve keys for signing modules
Add support for ECDSA-signed kernel modules
- - -
-
-
-
2021-06-02
Stefan Berger
New
[v5,1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
Add support for ECDSA-signed kernel modules
- - -
-
-
-
2021-06-02
Stefan Berger
New
[v5,2/2] certs: Add support for using elliptic curve keys for signing modules
Add support for ECDSA-signed kernel modules
1 - 1
-
-
-
2021-06-01
Stefan Berger
New
[v5,1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
Add support for ECDSA-signed kernel modules
- 1 1
-
-
-
2021-06-01
Stefan Berger
New
[RESEND,v2,5/7] ima: Define new template fields xattrnames, xattrlengths and xattrvalues
Untitled series #491545
- - -
-
-
-
2021-06-01
Roberto Sassu
New
[2/2] audit: block PERM fields being used with io_uring filtering
[1/2] audit: add filtering for io_uring records, addendum
- - -
-
-
-
2021-05-31
Richard Guy Briggs
New
[1/2] audit: add filtering for io_uring records, addendum
[1/2] audit: add filtering for io_uring records, addendum
- - -
-
-
-
2021-05-31
Richard Guy Briggs
New
apparmor: Remove the repeated declaration
apparmor: Remove the repeated declaration
1 - -
-
-
-
2021-05-29
Shaokun Zhang
New
security: remove unneeded subdir-$(CONFIG_...)
security: remove unneeded subdir-$(CONFIG_...)
- - -
-
-
-
2021-05-28
Masahiro Yamada
New
[v2,7/7] evm: Don't return an error in evm_write_xattrs() if audit is not enabled
ima: Add template fields to verify EVM portable signatures
- - -
-
-
-
2021-05-28
Roberto Sassu
New
[v2,6/7] ima: Define new template evm-sig
ima: Add template fields to verify EVM portable signatures
- - -
-
-
-
2021-05-28
Roberto Sassu
New
[v2,5/7] ima: Define new template fields xattrnames, xattrlengths and xattrvalues
ima: Add template fields to verify EVM portable signatures
- - -
-
-
-
2021-05-28
Roberto Sassu
New
[v2,4/7] evm: Verify portable signatures against all protected xattrs
ima: Add template fields to verify EVM portable signatures
- - -
-
-
-
2021-05-28
Roberto Sassu
New
[v2,3/7] ima: Define new template field imode
ima: Add template fields to verify EVM portable signatures
- - -
-
-
-
2021-05-28
Roberto Sassu
New
[v2,2/7] ima: Define new template fields iuid and igid
ima: Add template fields to verify EVM portable signatures
1 - -
-
-
-
2021-05-28
Roberto Sassu
New
[v2,1/7] ima: Add ima_show_template_uint() template library function
ima: Add template fields to verify EVM portable signatures
- - -
-
-
-
2021-05-28
Roberto Sassu
New
crypto: arm64/gcm - remove Wunused-const-variable ghash_cpu_feature
crypto: arm64/gcm - remove Wunused-const-variable ghash_cpu_feature
- - -
-
-
-
2021-05-27
Austin Kim
New
proc: Check /proc/$pid/attr/ writes against file opener
proc: Check /proc/$pid/attr/ writes against file opener
- - -
-
-
-
2021-05-25
Kees Cook
New
[v7,7/7] MAINTAINERS: Add a new entry for the Brute LSM
Fork brute force attack mitigation
- - -
-
-
-
2021-05-22
John Wood
New
[v7,6/7] Documentation: Add documentation for the Brute LSM
Fork brute force attack mitigation
- - -
-
-
-
2021-05-22
John Wood
New
[v7,5/7] selftests/brute: Add tests for the Brute LSM
Fork brute force attack mitigation
- - -
-
-
-
2021-05-22
John Wood
New
[RFC,9/9] Smack: Brutalist io_uring support with debug
Add LSM access controls and auditing to io_uring
- - -
-
-
-
2021-05-21
Paul Moore
New
«
1
2
...
18
19
20
…
121
122
»