Show patches with: Submitter = Casey Schaufler       |    Archived = No       |   407 patches
« 1 2 3 44 5 »
Patch Series A/R/T S/W/F Date Submitter Delegate State
[v3,5/5] LSM: secctx provider check on release LSM: Replace secctx/len pairs with lsm_context - - - --- 2024-10-23 Casey Schaufler pcmoore Accepted
[v3,4/5] LSM: lsm_context in security_dentry_init_security LSM: Replace secctx/len pairs with lsm_context - - - --- 2024-10-23 Casey Schaufler pcmoore Accepted
[v3,3/5] LSM: Use lsm_context in security_inode_getsecctx LSM: Replace secctx/len pairs with lsm_context - - - --- 2024-10-23 Casey Schaufler pcmoore Accepted
[v3,2/5] LSM: Replace context+len with lsm_context LSM: Replace secctx/len pairs with lsm_context - - - --- 2024-10-23 Casey Schaufler pcmoore Accepted
[v3,1/5] LSM: Ensure the correct LSM context releaser LSM: Replace secctx/len pairs with lsm_context - - - --- 2024-10-23 Casey Schaufler pcmoore Accepted
[v2,6/6] LSM: Use lsm_context in security_inode_notifysecctx LSM: Replace secctx/len pairs with lsm_context - - - --- 2024-10-14 Casey Schaufler pcmoore Changes Requested
[v2,5/6] LSM: secctx provider check on release LSM: Replace secctx/len pairs with lsm_context - - - --- 2024-10-14 Casey Schaufler pcmoore Changes Requested
[v2,4/6] LSM: lsm_context in security_dentry_init_security LSM: Replace secctx/len pairs with lsm_context - - - --- 2024-10-14 Casey Schaufler pcmoore Changes Requested
[v2,3/6] LSM: Use lsm_context in security_inode_getsecctx LSM: Replace secctx/len pairs with lsm_context - - - --- 2024-10-14 Casey Schaufler pcmoore Changes Requested
[v2,2/6] LSM: Replace context+len with lsm_context LSM: Replace secctx/len pairs with lsm_context - - - --- 2024-10-14 Casey Schaufler pcmoore Changes Requested
[v2,1/6] LSM: Ensure the correct LSM context releaser LSM: Replace secctx/len pairs with lsm_context - 1 - --- 2024-10-14 Casey Schaufler pcmoore Changes Requested
[v4,13/13] LSM: Remove lsm_prop scaffolding LSM: Move away from secids - - - --- 2024-10-09 Casey Schaufler pcmoore Accepted
[v4,12/13] Use lsm_prop for audit data LSM: Move away from secids - - - --- 2024-10-09 Casey Schaufler pcmoore Accepted
[v4,11/13] Audit: Change context data from secid to lsm_prop LSM: Move away from secids - - - --- 2024-10-09 Casey Schaufler pcmoore Accepted
[v4,10/13] LSM: Create new security_cred_getlsmprop LSM hook LSM: Move away from secids - - - --- 2024-10-09 Casey Schaufler pcmoore Accepted
[v4,09/13] Audit: use an lsm_prop in audit_names LSM: Move away from secids - - - --- 2024-10-09 Casey Schaufler pcmoore Accepted
[v4,08/13] LSM: Use lsm_prop in security_inode_getsecid LSM: Move away from secids - - - --- 2024-10-09 Casey Schaufler pcmoore Accepted
[v4,07/13] LSM: Use lsm_prop in security_current_getsecid LSM: Move away from secids - - - --- 2024-10-09 Casey Schaufler pcmoore Accepted
[v4,06/13] Audit: Update shutdown LSM data LSM: Move away from secids - - - --- 2024-10-09 Casey Schaufler pcmoore Accepted
[v4,05/13] LSM: Use lsm_prop in security_ipc_getsecid LSM: Move away from secids - - - --- 2024-10-09 Casey Schaufler pcmoore Accepted
[v4,04/13] Audit: maintain an lsm_prop in audit_context LSM: Move away from secids - - - --- 2024-10-09 Casey Schaufler pcmoore Accepted
[v4,03/13] LSM: Add lsmprop_to_secctx hook LSM: Move away from secids - - - --- 2024-10-09 Casey Schaufler pcmoore Accepted
[v4,02/13] LSM: Use lsm_prop in security_audit_rule_match LSM: Move away from secids - - - --- 2024-10-09 Casey Schaufler pcmoore Accepted
[v4,01/13] LSM: Add the lsm_prop data structure. LSM: Move away from secids 1 - - --- 2024-10-09 Casey Schaufler pcmoore Accepted
[5/5] LSM: Use lsm_context in security_inode_notifysecctx LSM: Replace secctx/len pairs with lsm_context - - - --- 2024-09-17 Casey Schaufler pcmoore Superseded
[4/5] LSM: secctx provider check on release LSM: Replace secctx/len pairs with lsm_context - - - --- 2024-09-17 Casey Schaufler pcmoore Superseded
[3/5] LSM: lsm_context in security_dentry_init_security LSM: Replace secctx/len pairs with lsm_context - - - --- 2024-09-17 Casey Schaufler pcmoore Superseded
[2/5] LSM: Use lsm_context in security_inode_getsecctx LSM: Replace secctx/len pairs with lsm_context - - - --- 2024-09-17 Casey Schaufler pcmoore Superseded
[1/5] LSM: Replace context+len with lsm_context LSM: Replace secctx/len pairs with lsm_context - 1 - --- 2024-09-17 Casey Schaufler pcmoore Superseded
[GIT,PULL] Smack patches for 6.12 [GIT,PULL] Smack patches for 6.12 - - - --- 2024-09-14 Casey Schaufler Handled Elsewhere
[v3,13/13] LSM: Remove lsm_prop scaffolding LSM: Move away from secids - - - --- 2024-09-10 Casey Schaufler pcmoore Superseded
[v3,12/13] Use lsm_prop for audit data LSM: Move away from secids - - - --- 2024-09-10 Casey Schaufler pcmoore Superseded
[v3,11/13] Audit: Change context data from secid to lsm_prop LSM: Move away from secids - - - --- 2024-09-10 Casey Schaufler pcmoore Superseded
[v3,10/13] LSM: Create new security_cred_getlsmprop LSM hook LSM: Move away from secids - - - --- 2024-09-10 Casey Schaufler pcmoore Superseded
[v3,09/13] Audit: use an lsm_prop in audit_names LSM: Move away from secids - - - --- 2024-09-10 Casey Schaufler pcmoore Superseded
[v3,08/13] LSM: Use lsm_prop in security_inode_getsecid LSM: Move away from secids - - - --- 2024-09-10 Casey Schaufler pcmoore Superseded
[v3,07/13] LSM: Use lsm_prop in security_current_getsecid LSM: Move away from secids - - - --- 2024-09-10 Casey Schaufler pcmoore Superseded
[v3,06/13] Audit: Update shutdown LSM data LSM: Move away from secids - - - --- 2024-09-10 Casey Schaufler pcmoore Superseded
[v3,05/13] LSM: Use lsm_prop in security_ipc_getsecid LSM: Move away from secids - - - --- 2024-09-10 Casey Schaufler pcmoore Superseded
[v3,04/13] Audit: maintain an lsm_prop in audit_context LSM: Move away from secids - - - --- 2024-09-10 Casey Schaufler pcmoore Superseded
[v3,03/13] LSM: Add lsmprop_to_secctx hook LSM: Move away from secids - - - --- 2024-09-10 Casey Schaufler pcmoore Superseded
[v3,02/13] LSM: Use lsm_prop in security_audit_rule_match LSM: Move away from secids - - - --- 2024-09-10 Casey Schaufler pcmoore Superseded
[v3,01/13] LSM: Add the lsm_prop data structure. LSM: Move away from secids - - - --- 2024-09-10 Casey Schaufler pcmoore Superseded
[v2,13/13] LSM: Remove lsmblob scaffolding LSM: Move away from secids - - - --- 2024-08-30 Casey Schaufler pcmoore Changes Requested
[v2,12/13] Netlabel: Use lsmblob for audit data LSM: Move away from secids - - - --- 2024-08-30 Casey Schaufler pcmoore Changes Requested
[v2,11/13] Audit: Change context data from secid to lsmblob LSM: Move away from secids - - - --- 2024-08-30 Casey Schaufler pcmoore Changes Requested
[v2,10/13] LSM: Create new security_cred_getlsmblob LSM hook LSM: Move away from secids - - - --- 2024-08-30 Casey Schaufler pcmoore Changes Requested
[v2,09/13] Audit: use an lsmblob in audit_names LSM: Move away from secids - - - --- 2024-08-30 Casey Schaufler pcmoore Changes Requested
[v2,08/13] LSM: Use lsmblob in security_inode_getsecid LSM: Move away from secids - - - --- 2024-08-30 Casey Schaufler pcmoore Changes Requested
[v2,07/13] LSM: Use lsmblob in security_current_getsecid LSM: Move away from secids - - - --- 2024-08-30 Casey Schaufler pcmoore Changes Requested
[v2,06/13] Audit: Update shutdown LSM data LSM: Move away from secids - - - --- 2024-08-30 Casey Schaufler pcmoore Changes Requested
[v2,05/13] LSM: Use lsmblob in security_ipc_getsecid LSM: Move away from secids - - - --- 2024-08-30 Casey Schaufler pcmoore Changes Requested
[v2,04/13] Audit: maintain an lsmblob in audit_context LSM: Move away from secids - - - --- 2024-08-30 Casey Schaufler pcmoore Changes Requested
[v2,03/13] LSM: Add lsmblob_to_secctx hook LSM: Move away from secids - - - --- 2024-08-30 Casey Schaufler pcmoore Changes Requested
[v2,02/13] LSM: Use lsmblob in security_audit_rule_match LSM: Move away from secids - - - --- 2024-08-30 Casey Schaufler pcmoore Changes Requested
[v2,01/13] LSM: Add the lsmblob data structure. LSM: Move away from secids - - - --- 2024-08-30 Casey Schaufler pcmoore Changes Requested
[13/13] LSM: Remove lsmblob scaffolding LSM: Move away from secids - - - --- 2024-08-25 Casey Schaufler pcmoore Superseded
[12/13] Netlabel: Use lsmblob for audit data LSM: Move away from secids - - - --- 2024-08-25 Casey Schaufler pcmoore Superseded
[11/13] Audit: Change context data from secid to lsmblob LSM: Move away from secids - - - --- 2024-08-25 Casey Schaufler pcmoore Superseded
[10/13] LSM: Create new security_cred_getlsmblob LSM hook LSM: Move away from secids 2 2 - --- 2024-08-25 Casey Schaufler pcmoore Superseded
[09/13] Audit: use an lsmblob in audit_names LSM: Move away from secids - - - --- 2024-08-25 Casey Schaufler pcmoore Superseded
[08/13] LSM: Use lsmblob in security_inode_getsecid LSM: Move away from secids 2 2 - --- 2024-08-25 Casey Schaufler pcmoore Superseded
[07/13] LSM: Use lsmblob in security_current_getsecid LSM: Move away from secids 2 2 - --- 2024-08-25 Casey Schaufler pcmoore Superseded
[06/13] Audit: Update shutdown LSM data LSM: Move away from secids - - - --- 2024-08-25 Casey Schaufler pcmoore Superseded
[05/13] LSM: Use lsmblob in security_ipc_getsecid LSM: Move away from secids 2 2 - --- 2024-08-25 Casey Schaufler pcmoore Superseded
[04/13] Audit: maintain an lsmblob in audit_context LSM: Move away from secids - - - --- 2024-08-25 Casey Schaufler pcmoore Superseded
[03/13] LSM: Add lsmblob_to_secctx hook LSM: Move away from secids - - - --- 2024-08-25 Casey Schaufler pcmoore Superseded
[02/13] LSM: Use lsmblob in security_audit_rule_match LSM: Move away from secids 1 1 - --- 2024-08-25 Casey Schaufler pcmoore Superseded
[01/13] LSM: Add the lsmblob data structure. LSM: Move away from secids - - - --- 2024-08-25 Casey Schaufler pcmoore Superseded
[GIT,PULL] Smack patches for 6.11 [GIT,PULL] Smack patches for 6.11 - - - --- 2024-07-15 Casey Schaufler Handled Elsewhere
[v2,6/6] LSM: Infrastructure management of the perf_event security blob LSM: Infrastructure blob allocation - 1 - --- 2024-07-10 Casey Schaufler pcmoore Accepted
[v2,5/6] LSM: Infrastructure management of the infiniband blob LSM: Infrastructure blob allocation - 1 - --- 2024-07-10 Casey Schaufler pcmoore Accepted
[v2,4/6] LSM: Infrastructure management of the dev_tun blob LSM: Infrastructure blob allocation - 1 - --- 2024-07-10 Casey Schaufler pcmoore Accepted
[v2,3/6] LSM: Add helper for blob allocations LSM: Infrastructure blob allocation - 1 - --- 2024-07-10 Casey Schaufler pcmoore Accepted
[v2,2/6] LSM: Infrastructure management of the key security blob LSM: Infrastructure blob allocation - 1 - --- 2024-07-10 Casey Schaufler pcmoore Accepted
[v2,1/6] LSM: Infrastructure management of the sock security LSM: Infrastructure blob allocation 2 2 - --- 2024-07-10 Casey Schaufler pcmoore Accepted
[6/6] LSM: Infrastructure management of the perf_event security blob LSM: Infrastructure blob allocation - - - --- 2024-07-08 Casey Schaufler pcmoore Changes Requested
[5/6] LSM: Infrastructure management of the infiniband blob LSM: Infrastructure blob allocation - - - --- 2024-07-08 Casey Schaufler pcmoore Changes Requested
[4/6] LSM: Infrastructure management of the dev_tun blob LSM: Infrastructure blob allocation - - - --- 2024-07-08 Casey Schaufler pcmoore Changes Requested
[3/6] LSM: Add helper for blob allocations LSM: Infrastructure blob allocation - 1 - --- 2024-07-08 Casey Schaufler pcmoore Changes Requested
[2/6] LSM: Infrastructure management of the key security blob LSM: Infrastructure blob allocation - - - --- 2024-07-08 Casey Schaufler pcmoore Changes Requested
[1/6] LSM: Infrastructure management of the sock security LSM: Infrastructure blob allocation 2 2 - --- 2024-07-08 Casey Schaufler pcmoore Accepted
[RFC] LSM, net: Add SO_PEERCONTEXT for peer LSM data [RFC] LSM, net: Add SO_PEERCONTEXT for peer LSM data - - - --- 2024-05-13 Casey Schaufler pcmoore Changes Requested
Systemd v254 LSM stacking issue - patch Systemd v254 LSM stacking issue - patch - - - --- 2024-03-19 Casey Schaufler pcmoore Not Applicable
[v3] LSM: use 32 bit compatible data types in LSM syscalls. [v3] LSM: use 32 bit compatible data types in LSM syscalls. - - - --- 2024-03-13 Casey Schaufler pcmoore Accepted
[v2] LSM: use 32 bit compatible data types in LSM syscalls. [v2] LSM: use 32 bit compatible data types in LSM syscalls. - - - --- 2024-03-13 Casey Schaufler pcmoore Changes Requested
LSM: use 32 bit compatible data types in LSM syscalls. LSM: use 32 bit compatible data types in LSM syscalls. - - - --- 2024-03-12 Casey Schaufler pcmoore Changes Requested
[GIT,PULL] Smack patches for 6.9 [GIT,PULL] Smack patches for 6.9 - - - --- 2024-03-11 Casey Schaufler pcmoore Handled Elsewhere
[v39,42/42] Smack: Remove LSM_FLAG_EXCLUSIVE LSM: General module stacking - - - --- 2023-12-15 Casey Schaufler pcmoore Under Review
[v39,41/42] LSM: restrict security_cred_getsecid() to a single LSM LSM: General module stacking - - - --- 2023-12-15 Casey Schaufler pcmoore Under Review
[v39,40/42] LSM: Allow reservation of netlabel LSM: General module stacking - - - --- 2023-12-15 Casey Schaufler pcmoore Under Review
[v39,39/42] LSM: Remove lsmblob scaffolding LSM: General module stacking - - - --- 2023-12-15 Casey Schaufler pcmoore Under Review
[v39,38/42] LSM: Correct handling of ENOSYS in inode_setxattr LSM: General module stacking - - - --- 2023-12-15 Casey Schaufler pcmoore Under Review
[v39,37/42] LSM: Infrastructure management of the mnt_opts security blob LSM: General module stacking - - - --- 2023-12-15 Casey Schaufler pcmoore Under Review
[v39,36/42] LSM: Infrastructure management of the key security blob LSM: General module stacking - - - --- 2023-12-15 Casey Schaufler pcmoore Under Review
[v39,35/42] LSM: allocate mnt_opts blobs instead of module specific data LSM: General module stacking - - - --- 2023-12-15 Casey Schaufler pcmoore Under Review
[v39,34/42] LSM: Add mount opts blob size tracking LSM: General module stacking - - - --- 2023-12-15 Casey Schaufler pcmoore Under Review
[v39,33/42] AppArmor: Remove the exclusive flag LSM: General module stacking 2 1 - --- 2023-12-15 Casey Schaufler pcmoore Under Review
[v39,32/42] LSM: Identify which LSM handles the context string LSM: General module stacking - - - --- 2023-12-15 Casey Schaufler pcmoore Under Review
[v39,31/42] LSM: Exclusive secmark usage LSM: General module stacking - - - --- 2023-12-15 Casey Schaufler pcmoore Under Review
« 1 2 3 44 5 »