Patchwork Linux Integrity

login
register
mail settings

Incoming patches

« Previous 1 2 3 4 Next »
Filters: State = Action Required remove filter    |    Archived = No remove filter
Patch A/R/T Date Submitter Delegate State
[1/2,v5] tpm: cmd_ready command can be issued only after granting locality - - 1 2018-02-25 Winkler, Tomas New
[1/2,v4] tpm: cmd_ready command can be issued only after granting locality - 1 1 2018-02-24 Winkler, Tomas New
[v2,4/4] fuse: define the filesystem as untrusted - - - 2018-02-22 Mimi Zohar New
[v2,3/4] ima: fail signature verification based on policy - - - 2018-02-22 Mimi Zohar New
[v2,2/4] ima: re-evaluate files on privileged mounted filesystems - - - 2018-02-22 Mimi Zohar New
[v2,1/4] ima: fail file signature verification on non-init mounted filesystems - - - 2018-02-22 Mimi Zohar New
[v4] tpm: Trigger only missing TPM 2.0 self tests - - - 2018-02-20 Jarkko Sakkinen New
[v2] tpm: use kmemdup() to copy the event log - 1 - 2018-02-20 Jarkko Sakkinen New
[v1,2/2] fuse: define the filesystem as untrusted - - - 2018-02-19 Mimi Zohar New
[v1,1/2] ima: fail signature verification on untrusted filesystems - - - 2018-02-19 Mimi Zohar New
[v3] tpm: fix intermittent failure with self tests - - 1 2018-02-19 James Bottomley New
tpm: use kmemdup() to copy the EFI event log - - - 2018-02-19 Jarkko Sakkinen New
[v2] tpm: fix intermittent failure with self tests - - - 2018-02-16 James Bottomley New
tpm: rename TPM_TRANSMIT_RAW -> TPM_TRANSMIT_IGNORE_LOCALITY - - - 2018-02-16 Jarkko Sakkinen New
[RFC,2/4] ima: fail signature verification on unprivileged & untrusted filesystems - - - 2018-02-15 Eric W. Biederman New
[2/2,v3] tpm: separate cmd_ready/go_idle from runtime_pm - 1 1 2018-02-14 Winkler, Tomas New
[1/2,v3] tpm: cmd_ready command can be issued only after granting locality - - 1 2018-02-14 Winkler, Tomas New
[RFC,4/4] fuse: define the filesystem as untrusted - - - 2018-02-14 Mimi Zohar New
[RFC,3/4] ima: define a new policy option named "fail" - - - 2018-02-14 Mimi Zohar New
[RFC,2/4] ima: fail signature verification on unprivileged & untrusted filesystems 1 - - 2018-02-14 Mimi Zohar New
[RFC,1/4] ima: define a new policy condition based on the filesystem name - - - 2018-02-14 Mimi Zohar New
integrity/security: fix digsig.c build error with header file - - - 2018-02-13 Randy Dunlap New
tpm: migrate tpm2_do_selftest() to use struct tpm_buf - - 1 2018-02-09 Jarkko Sakkinen New
tpm: fix selftest failure regression - - - 2018-02-08 James Bottomley New
[v2,5/5] tpm_tis: fix potential buffer overruns caused by bit glitches on the bus - - - 2018-02-08 James Bottomley New
[v2,4/5] tpm_i2c_nuvoton: fix potential buffer overruns caused by bit glitches on the bus - - - 2018-02-08 James Bottomley New
[v2,3/5] tpm_i2c_infineon: fix potential buffer overruns caused by bit glitches on the bus - - - 2018-02-08 James Bottomley New
[v2,2/5] tpm: st33zp24: fix potential buffer overruns caused by bit glitches on the bus - - - 2018-02-08 James Bottomley New
[v2,1/5] tpm: fix potential buffer overruns caused by bit glitches on the bus - 1 1 2018-02-08 James Bottomley New
[RFC,v5,2/2] fuse: introduce new fs_type flag FS_IMA_NO_CACHE 3 - 1 2018-02-07 Dongsu Park New
[RFC,v5,1/2] ima: force re-appraisal on filesystems with FS_IMA_NO_CACHE 2 - 1 2018-02-07 Dongsu Park New
[RFC] ima: force the re-evaluation of files on untrusted file systems - - - 2018-02-05 Mimi Zohar New
[2/2] tpm drivers: fix potential buffer overruns caused by bit glitches on the bus - - - 2018-02-02 James Bottomley New
[1/2] tpm: fix potential buffer overruns caused by bit glitches on the bus - - - 2018-02-02 James Bottomley New
TPM selftest failure in 4.15 - - - 2018-02-01 James Bottomley New
TPM selftest failure in 4.15 - - - 2018-02-01 James Bottomley New
[v2] iversion: make inode_cmp_iversion{+raw} return bool instead of s64 - - - 2018-01-30 jlayton@kernel.org New
[RFC,v4,2/2] ima: force re-appraisal on filesystems with FS_IMA_NO_CACHE 2 - 1 2018-01-30 Dongsu Park New
[RFC,v4,1/2] fuse: introduce new fs_type flag FS_IMA_NO_CACHE 3 - 1 2018-01-30 Dongsu Park New
iversion: make inode_cmp_iversion{+raw} return bool instead of s64 - - - 2018-01-30 jlayton@kernel.org New
PATCH v2] Add backward compatible support for openssl 1.1 - - 1 2018-01-28 James Bottomley New
ima-evm-utils: Add backward compatible support for openssl 1.1 - - 1 2018-01-28 James Bottomley New
[v2] tpm: add longer timeouts for creation commands. - - - 2018-01-28 Winkler, Tomas New
[2/2,v2] tpm: separate cmd_ready/go_idle from runtime_pm - - - 2018-01-28 Winkler, Tomas New
[1/2,v2] tpm: cmd_ready command can be issued only after granting locality - - - 2018-01-28 Winkler, Tomas New
ima-evm-utils: migrate to the new openssl 1.1 api - - - 2018-01-27 James Bottomley New
ima: re-initialize iint->atomic_flags - - - 2018-01-23 Mimi Zohar New
[3/3] tpm: add longer timeouts for creation commands. - - - 2018-01-23 Winkler, Tomas New
[2/3] tpm: separate cmd_ready/go_idle from runtime_pm - - - 2018-01-23 Winkler, Tomas New
[1/3] tpm: cmd_ready command can be issued only after granting locality - - - 2018-01-23 Winkler, Tomas New
[RFC,v3,2/2] ima: force re-appraisal on filesystems with FS_IMA_NO_CACHE 2 - 1 2018-01-22 Alban Crequy New
[RFC,v3,1/2] fuse: introduce new fs_type flag FS_IMA_NO_CACHE - - 1 2018-01-22 Alban Crequy New
[10/10] ima-evm-utils: add support for validating multiple pcrs - - - 2018-01-22 Mimi Zohar New
[09/10] ima-evm-utils: verify IMA file hashes stored as xattrs - - - 2018-01-22 Mimi Zohar New
[08/10] ima-evm-utils: verify the measurement list signature based on the list digest - - - 2018-01-22 Mimi Zohar New
[07/10] ima-evm-utils: add support for specifying the pcr file location - - - 2018-01-22 Mimi Zohar New
[06/10] ima-evm-utils: indicate measurement list signature verification failure - - - 2018-01-22 Mimi Zohar New
[05/10] ima-evm-utils: support verifying the measurement list using multiple keys - - - 2018-01-22 Mimi Zohar New
[04/10] ima-evm-utils: remove the unnecessary display of the keyid - - - 2018-01-22 Mimi Zohar New
[03/10] ima-evm-utils: fix spelling error - - - 2018-01-22 Mimi Zohar New
[02/10] ima-evm-utils: revert the change to use printf instead of log_info() - - - 2018-01-22 Mimi Zohar New
[01/10] ima-evm-utils: fix "ima_measurement" template fields length - - - 2018-01-22 Mimi Zohar New
[v3] fscrypt: add support for the encrypted key type - - - 2018-01-18 André Draszik New
ima/policy: fix parsing of fsuuid - - - 2018-01-17 Mike Rapoport New
[RFC,v2] ima,fuse: introduce new fs flag FS_NO_IMA_CACHE - - - 2018-01-16 Alban Crequy New
ima,fuse: introduce new fs flag FS_NO_IMA_CACHE - - - 2018-01-16 Alban Crequy New
ima: define new policy condition based on the filesystem name - - - 2018-01-15 Mimi Zohar New
[RFC,2/2] security/ima: Run measurements after policy - - - 2018-01-11 Petr Vorel New
[RFC,1/2] security/ima: Rewrite tests into new API + fixes - - - 2018-01-11 Petr Vorel New
[2/2] ima: turn on force option for FUSE in builtin policies - - - 2018-01-11 Dongsu Park New
[1/2] fs/fuse: move SUPER_MAGIC definitions to linux/magic.h - - - 2018-01-11 Dongsu Park New
[3/3] encrypted-keys: document new fscrypt key format - - - 2018-01-10 André Draszik New
[2/3] fscrypt: add support for the encrypted key type - - - 2018-01-10 André Draszik New
[1/3] encrypted-keys: add fscrypt format support - - - 2018-01-10 André Draszik New
[v5,19/19] fs: handle inode->i_version more efficiently 1 1 1 2018-01-09 jlayton@kernel.org New
[v5,18/19] btrfs: only dirty the inode in btrfs_update_time if something was changed 1 1 - 2018-01-09 jlayton@kernel.org New
[v5,17/19] xfs: avoid setting XFS_ILOG_CORE if i_version doesn't need incrementing 2 - - 2018-01-09 jlayton@kernel.org New
[v5,16/19] fs: only set S_VERSION when updating times if necessary - 1 - 2018-01-09 jlayton@kernel.org New
[v5,15/19] IMA: switch IMA over to new i_version API - - - 2018-01-09 jlayton@kernel.org New
[v5,14/19] xfs: convert to new i_version API 2 - - 2018-01-09 jlayton@kernel.org New
[v5,13/19] ufs: use new i_version API - - - 2018-01-09 jlayton@kernel.org New
[v5,12/19] ocfs2: convert to new i_version API - 1 - 2018-01-09 jlayton@kernel.org New
[v5,11/19] nfsd: convert to new i_version API - - - 2018-01-09 jlayton@kernel.org New
[v5,10/19] nfs: convert to new i_version API - - 1 2018-01-09 jlayton@kernel.org New
[v5,09/19] ext4: convert to new i_version API 1 - - 2018-01-09 jlayton@kernel.org New
[v5,08/19] ext2: convert to new i_version API - 1 - 2018-01-09 jlayton@kernel.org New
[v5,07/19] exofs: switch to new i_version API - - - 2018-01-09 jlayton@kernel.org New
[v5,06/19] btrfs: convert to new i_version API 1 - - 2018-01-09 jlayton@kernel.org New
[v5,05/19] afs: convert to new i_version API - - - 2018-01-09 jlayton@kernel.org New
[v5,04/19] affs: convert to new i_version API - - - 2018-01-09 jlayton@kernel.org New
[v5,03/19] fat: convert to new i_version API - - - 2018-01-09 jlayton@kernel.org New
[v5,02/19] fs: don't take the i_lock in inode_inc_iversion - 1 - 2018-01-09 jlayton@kernel.org New
[v5,01/19] fs: new API for handling inode->i_version - 1 - 2018-01-09 jlayton@kernel.org New
[v4,19/19] fs: handle inode->i_version more efficiently - - - 2018-01-08 jlayton@kernel.org New
[V6,2/2] IMA: Support using new creds in appraisal policy - - - 2018-01-08 Matthew Garrett New
[V6,1/2] security: Add a cred_getsecid hook 1 - - 2018-01-08 Matthew Garrett New
[v4,19/19] fs: handle inode->i_version more efficiently - - - 2018-01-08 jlayton@kernel.org New
[v4,19/19] fs: handle inode->i_version more efficiently - - - 2018-01-08 jlayton@kernel.org New
[v4,19/19] fs: handle inode->i_version more efficiently - - - 2018-01-08 jlayton@kernel.org New
[V5,2/2] IMA: Support using new creds in appraisal policy - - - 2018-01-05 Matthew Garrett New
« Previous 1 2 3 4 Next »