Show patches with: Series = Lockdown as an LSM       |    State = Action Required       |   29 patches
Patch Series A/R/T S/W/F Date Submitter Delegate State
[V34,29/29] lockdown: Print current->comm in restriction messages Lockdown as an LSM - 1 - --- 2019-06-22 Matthew Garrett New
[V34,28/29] efi: Restrict efivar_ssdt_load when the kernel is locked down Lockdown as an LSM 1 1 - --- 2019-06-22 Matthew Garrett New
[V34,27/29] tracefs: Restrict tracefs when the kernel is locked down Lockdown as an LSM - - - --- 2019-06-22 Matthew Garrett New
[V34,26/29] debugfs: Restrict debugfs when the kernel is locked down Lockdown as an LSM - - - --- 2019-06-22 Matthew Garrett New
[V34,25/29] kexec: Allow kexec_file() with appropriate IMA policy when locked down Lockdown as an LSM 1 - - --- 2019-06-22 Matthew Garrett New
[V34,24/29] Lock down perf when in confidentiality mode Lockdown as an LSM - 1 - --- 2019-06-22 Matthew Garrett New
[V34,23/29] bpf: Restrict bpf when kernel lockdown is in confidentiality mode Lockdown as an LSM - 1 - --- 2019-06-22 Matthew Garrett New
[V34,22/29] Lock down tracing and perf kprobes when in confidentiality mode Lockdown as an LSM 1 1 - --- 2019-06-22 Matthew Garrett New
[V34,21/29] Lock down /proc/kcore Lockdown as an LSM - 1 - --- 2019-06-22 Matthew Garrett New
[V34,20/29] x86/mmiotrace: Lock down the testmmiotrace module Lockdown as an LSM - 2 - --- 2019-06-22 Matthew Garrett New
[V34,19/29] Lock down module params that specify hardware parameters (eg. ioport) Lockdown as an LSM - 1 - --- 2019-06-22 Matthew Garrett New
[V34,18/29] Lock down TIOCSSERIAL Lockdown as an LSM - 1 - --- 2019-06-22 Matthew Garrett New
[V34,17/29] Prohibit PCMCIA CIS storage when the kernel is locked down Lockdown as an LSM - 1 - --- 2019-06-22 Matthew Garrett New
[V34,16/29] acpi: Disable ACPI table override if the kernel is locked down Lockdown as an LSM - 1 - --- 2019-06-22 Matthew Garrett New
[V34,15/29] acpi: Ignore acpi_rsdp kernel param when the kernel has been locked down Lockdown as an LSM - 1 - --- 2019-06-22 Matthew Garrett New
[V34,14/29] ACPI: Limit access to custom_method when the kernel is locked down Lockdown as an LSM - 1 - --- 2019-06-22 Matthew Garrett New
[V34,13/29] x86/msr: Restrict MSR access when the kernel is locked down Lockdown as an LSM 1 1 - --- 2019-06-22 Matthew Garrett New
[V34,12/29] x86: Lock down IO port access when the kernel is locked down Lockdown as an LSM - 1 - --- 2019-06-22 Matthew Garrett New
[V34,11/29] PCI: Lock down BAR access when the kernel is locked down Lockdown as an LSM 1 1 - --- 2019-06-22 Matthew Garrett New
[V34,10/29] hibernate: Disable when the kernel is locked down Lockdown as an LSM - 1 - --- 2019-06-22 Matthew Garrett New
[V34,09/29] kexec_file: Restrict at runtime if the kernel is locked down Lockdown as an LSM - 2 - --- 2019-06-22 Matthew Garrett New
[V34,08/29] kexec_file: split KEXEC_VERIFY_SIG into KEXEC_SIG and KEXEC_SIG_FORCE Lockdown as an LSM - 2 - --- 2019-06-22 Matthew Garrett New
[V34,07/29] Copy secure_boot flag in boot params across kexec reboot Lockdown as an LSM - 1 - --- 2019-06-22 Matthew Garrett New
[V34,06/29] kexec_load: Disable at runtime if the kernel is locked down Lockdown as an LSM 1 1 - --- 2019-06-22 Matthew Garrett New
[V34,05/29] Restrict /dev/{mem,kmem,port} when the kernel is locked down Lockdown as an LSM - 1 - --- 2019-06-22 Matthew Garrett New
[V34,04/29] Enforce module signatures if the kernel is locked down Lockdown as an LSM - 1 - --- 2019-06-22 Matthew Garrett New
[V34,03/29] security: Add a static lockdown policy LSM Lockdown as an LSM - 1 - --- 2019-06-22 Matthew Garrett New
[V34,02/29] security: Add a "locked down" LSM hook Lockdown as an LSM 1 - - --- 2019-06-22 Matthew Garrett New
[V34,01/29] security: Support early LSMs Lockdown as an LSM 1 - - --- 2019-06-22 Matthew Garrett New