Show patches with: State = Action Required       |   9499 patches
« 1 2 ... 81 82 8394 95 »
Patch Series A/R/T S/W/F Date Submitter Delegate State
[3/6] ima/ima_boot_aggregate: Fix extending PCRs beyond PCR 0-7 LTP IMA fix bundle - 1 - --- 2019-01-15 Jia Zhang New
[2/6] ima/ima_boot_aggregate: Don't hard code the length of sha1 hash LTP IMA fix bundle - 1 - --- 2019-01-15 Jia Zhang New
[1/6] ima/ima_boot_aggregate: Fix the definition of event log LTP IMA fix bundle - - - --- 2019-01-15 Jia Zhang New
[2/2] tpm/eventlog/tpm1: Fix off-by-1 when reading binary_bios_measurements tpm/eventlog/tpm1: Small fixes - - - --- 2019-01-11 Jia Zhang New
[1/2] tpm/eventlog/tpm1: Simplify walking over *pos measurements tpm/eventlog/tpm1: Small fixes - - - --- 2019-01-11 Jia Zhang New
[5/5] tpm: ppi: Enable submission of optional command parameter for PPI 1.3 Extend TPM PPI interface to support revision 1.3 - - - --- 2019-01-09 Stefan Berger New
[4/5] tpm: ppi: Possibly show command parameter if TPM PPI 1.3 is used Extend TPM PPI interface to support revision 1.3 - - - --- 2019-01-09 Stefan Berger New
[3/5] tpm: ppi: Display up to 101 operations as define for version 1.3 Extend TPM PPI interface to support revision 1.3 - 1 - --- 2019-01-09 Stefan Berger New
[2/5] tpm: ppi: rename TPM_PPI_REVISION_ID to TPM_PPI_REVISION_1 Extend TPM PPI interface to support revision 1.3 - - - --- 2019-01-09 Stefan Berger New
[1/5] tpm: ppi: pass function revision ID to tpm_eval_dsm() Extend TPM PPI interface to support revision 1.3 - 1 - --- 2019-01-09 Stefan Berger New
[RFC,2/2] kexec, KEYS: Make use of platform keyring for signature verify let kexec_file_load use platform keyring to verify the kernel image 1 - - --- 2019-01-09 Kairui Song New
[RFC,1/2] integrity, KEYS: add a reference to platform keyring let kexec_file_load use platform keyring to verify the kernel image - - - --- 2019-01-09 Kairui Song New
[5/5] efi: Attempt to get the TCG2 event log in the boot stub [1/5] tpm: Abstract crypto agile event size calculations - - - --- 2019-01-09 Matthew Garrett New
[4/5] tpm: Append the final event log to the TPM event log [1/5] tpm: Abstract crypto agile event size calculations - - - --- 2019-01-09 Matthew Garrett New
[3/5] tpm: Reserve the TPM final events table [1/5] tpm: Abstract crypto agile event size calculations - - - --- 2019-01-09 Matthew Garrett New
[2/5] tpm: Fix event log types for TPM2 [1/5] tpm: Abstract crypto agile event size calculations - - - --- 2019-01-09 Matthew Garrett New
[1/5] tpm: Abstract crypto agile event size calculations [1/5] tpm: Abstract crypto agile event size calculations - - - --- 2019-01-09 Matthew Garrett New
[6/6] ima: Use ima tcb policy files for test LTP IMA fix bundle - - - --- 2019-01-07 Jia Zhang New
[5/6] ima: Rename the folder name for policy files to datafiles LTP IMA fix bundle - - - --- 2019-01-07 Jia Zhang New
[4/6] ima: Code cleanup LTP IMA fix bundle - 1 - --- 2019-01-07 Jia Zhang New
[3/6] ima/ima_boot_aggregate: Fix extending PCRs beyond PCR 0-7 LTP IMA fix bundle - 1 - --- 2019-01-07 Jia Zhang New
[2/6] ima/ima_boot_aggregate: Don't hard code the length of sha1 hash LTP IMA fix bundle - 1 - --- 2019-01-07 Jia Zhang New
[1/6] ima/ima_boot_aggregate: Fix the definition of event log LTP IMA fix bundle - - - --- 2019-01-07 Jia Zhang New
[RFC,4/4] crypto: Add EC-RDSA algorithm crypto: Add EC-RDSA algorithm - - - --- 2019-01-06 Vitaly Chikunov New
[RFC,3/4] KEYS: set correct flags for keyctl if encrypt is not supported crypto: Add EC-RDSA algorithm - - - --- 2019-01-06 Vitaly Chikunov New
[RFC,2/4] akcipher: Introduce verify2 for public key algorithms crypto: Add EC-RDSA algorithm - - - --- 2019-01-06 Vitaly Chikunov New
[RFC,1/4] X.509: Parse public key parameters from x509 for akcipher crypto: Add EC-RDSA algorithm - - - --- 2019-01-06 Vitaly Chikunov New
[2/2] tpm/eventlog/tpm1: Fix off-by-1 when reading binary_bios_measurements [1/2] tpm/eventlog/tpm1: Simplify walking over *pos measurements - - - --- 2019-01-06 Jia Zhang New
[1/2] tpm/eventlog/tpm1: Simplify walking over *pos measurements [1/2] tpm/eventlog/tpm1: Simplify walking over *pos measurements - - - --- 2019-01-06 Jia Zhang New
tpm: fix incorrect success returns from tpm_try_transmit() tpm: fix incorrect success returns from tpm_try_transmit() - - - --- 2018-12-31 James Bottomley New
MAINTAINERS: fix typo in Mimi Zohar's address MAINTAINERS: fix typo in Mimi Zohar's address - 1 - --- 2018-12-27 Baruch Siach New
[12/12] x86_64: __clear_user as case of __memset_user [01/12] x86_64: memset_user() - - - --- 2018-12-21 Igor Stoppa New
[11/12] IMA: turn ima_policy_flags into __wr_after_init [01/12] x86_64: memset_user() - - - --- 2018-12-21 Igor Stoppa New
[10/12] __wr_after_init: test write rare functionality [01/12] x86_64: memset_user() - - - --- 2018-12-21 Igor Stoppa New
[09/12] rodata_test: add verification for __wr_after_init [01/12] x86_64: memset_user() - - - --- 2018-12-21 Igor Stoppa New
[08/12] rodata_test: refactor tests [01/12] x86_64: memset_user() - - - --- 2018-12-21 Igor Stoppa New
[07/12] __wr_after_init: lkdtm test [01/12] x86_64: memset_user() - - - --- 2018-12-21 Igor Stoppa New
[06/12] __wr_after_init: Documentation: self-protection [01/12] x86_64: memset_user() - - - --- 2018-12-21 Igor Stoppa New
[05/12] __wr_after_init: x86_64: __wr_op [01/12] x86_64: memset_user() - - - --- 2018-12-21 Igor Stoppa New
[04/12] __wr_after_init: debug writes [01/12] x86_64: memset_user() - - - --- 2018-12-21 Igor Stoppa New
[03/12] __wr_after_init: generic functionality [01/12] x86_64: memset_user() - - - --- 2018-12-21 Igor Stoppa New
[02/12] __wr_after_init: linker section and label [01/12] x86_64: memset_user() - - - --- 2018-12-21 Igor Stoppa New
[01/12] x86_64: memset_user() [01/12] x86_64: memset_user() - - - --- 2018-12-21 Igor Stoppa New
[12/12] x86_64: __clear_user as case of __memset_user hardening: statically allocated protected memory - - - --- 2018-12-19 Igor Stoppa New
[11/12] IMA: turn ima_policy_flags into __wr_after_init hardening: statically allocated protected memory - - - --- 2018-12-19 Igor Stoppa New
[10/12] __wr_after_init: test write rare functionality hardening: statically allocated protected memory - - - --- 2018-12-19 Igor Stoppa New
[09/12] rodata_test: add verification for __wr_after_init hardening: statically allocated protected memory - - - --- 2018-12-19 Igor Stoppa New
[08/12] rodata_test: refactor tests hardening: statically allocated protected memory - - - --- 2018-12-19 Igor Stoppa New
[07/12] __wr_after_init: lkdtm test hardening: statically allocated protected memory - - - --- 2018-12-19 Igor Stoppa New
[06/12] __wr_after_init: Documentation: self-protection hardening: statically allocated protected memory - - - --- 2018-12-19 Igor Stoppa New
[05/12] __wr_after_init: x86_64: debug writes hardening: statically allocated protected memory - - - --- 2018-12-19 Igor Stoppa New
[04/12] __wr_after_init: x86_64: __wr_op hardening: statically allocated protected memory - - - --- 2018-12-19 Igor Stoppa New
[03/12] __wr_after_init: generic header hardening: statically allocated protected memory - - - --- 2018-12-19 Igor Stoppa New
[02/12] __wr_after_init: linker section and label hardening: statically allocated protected memory - - - --- 2018-12-19 Igor Stoppa New
[01/12] x86_64: memset_user() hardening: statically allocated protected memory - - - --- 2018-12-19 Igor Stoppa New
[v2] ima: define ima_post_create_tmpfile() hook and add missing call [v2] ima: define ima_post_create_tmpfile() hook and add missing call - - 1 --- 2018-12-18 Mimi Zohar New
ima: cleanup the match_token policy code ima: cleanup the match_token policy code - - - --- 2018-12-18 Mimi Zohar New
ima: define ima_create_tmpfile() hook and add missing call ima: define ima_create_tmpfile() hook and add missing call - - - --- 2018-12-17 Mimi Zohar New
[-next] evm: remove set but not used variable 'xattr' [-next] evm: remove set but not used variable 'xattr' - - - --- 2018-12-15 Yue Haibing New
[-next] evm: CHECK-remove set but not used variable 'xattr' [-next] evm: CHECK-remove set but not used variable 'xattr' - - - --- 2018-12-15 Yue Haibing New
[GIT,PULL] linux-integrity patches for Linux 4.21 [GIT,PULL] linux-integrity patches for Linux 4.21 - - - --- 2018-12-14 Mimi Zohar New
[REVIEW,2/2] tpm_tis: override durations for STM tpm with firmware 1.2.8.28 [REVIEW,1/2] tpm: provide a way to override the chip returned durations - - - --- 2018-12-14 Alexey Klimov New
[REVIEW,1/2] tpm: provide a way to override the chip returned durations [REVIEW,1/2] tpm: provide a way to override the chip returned durations - - - --- 2018-12-14 Alexey Klimov New
fs: Evaluate O_WRONLY | O_RDWR to O_RDWR fs: Evaluate O_WRONLY | O_RDWR to O_RDWR - - - --- 2018-12-13 Goldwyn Rodrigues New
[v7,5/5] tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend() tpm: retrieve digest size of unknown algorithms from TPM - - - --- 2018-12-13 Roberto Sassu New
[v7,4/5] tpm: retrieve digest size of unknown algorithms with PCR read tpm: retrieve digest size of unknown algorithms from TPM 1 1 - --- 2018-12-13 Roberto Sassu New
[v7,3/5] tpm: rename and export tpm2_digest and tpm2_algorithms tpm: retrieve digest size of unknown algorithms from TPM 1 1 - --- 2018-12-13 Roberto Sassu New
[v7,2/5] tpm: add _head suffix to tcg_efi_specid_event and tcg_pcr_event2 tpm: retrieve digest size of unknown algorithms from TPM - 1 1 --- 2018-12-13 Roberto Sassu New
[v7,1/5] tpm: dynamically allocate the allocated_banks array tpm: retrieve digest size of unknown algorithms from TPM - - 1 --- 2018-12-13 Roberto Sassu New
[v9,14/14] ima: Store the measurement again when appraising a modsig Appended signatures support for IMA appraisal - - - --- 2018-12-13 Thiago Jung Bauermann New
[v9,13/14] ima: Write modsig to the measurement list Appended signatures support for IMA appraisal - - - --- 2018-12-13 Thiago Jung Bauermann New
[v9,12/14] ima: Add new "d-sig" template field Appended signatures support for IMA appraisal - - - --- 2018-12-13 Thiago Jung Bauermann New
[v9,11/14] ima: Implement support for module-style appended signatures Appended signatures support for IMA appraisal - - - --- 2018-12-13 Thiago Jung Bauermann New
[v9,10/14] ima: Add modsig appraise_type option for module-style appended signatures Appended signatures support for IMA appraisal - - - --- 2018-12-13 Thiago Jung Bauermann New
[v9,09/14] ima: Export func_tokens Appended signatures support for IMA appraisal - - - --- 2018-12-13 Thiago Jung Bauermann New
[v9,08/14] ima: Introduce is_signed() Appended signatures support for IMA appraisal - - - --- 2018-12-13 Thiago Jung Bauermann New
[v9,07/14] integrity: Select CONFIG_KEYS instead of depending on it Appended signatures support for IMA appraisal - - - --- 2018-12-13 Thiago Jung Bauermann New
[v9,06/14] integrity: Introduce asymmetric_sig_has_known_key() Appended signatures support for IMA appraisal - - - --- 2018-12-13 Thiago Jung Bauermann New
[v9,05/14] integrity: Introduce integrity_keyring_from_id() Appended signatures support for IMA appraisal - - - --- 2018-12-13 Thiago Jung Bauermann New
[v9,04/14] integrity: Introduce struct evm_xattr Appended signatures support for IMA appraisal - 1 - --- 2018-12-13 Thiago Jung Bauermann New
[v9,03/14] PKCS#7: Introduce pkcs7_get_digest() Appended signatures support for IMA appraisal - 1 - --- 2018-12-13 Thiago Jung Bauermann New
[v9,02/14] PKCS#7: Refactor verify_pkcs7_signature() and add pkcs7_get_message_sig() Appended signatures support for IMA appraisal - 1 - --- 2018-12-13 Thiago Jung Bauermann New
[v9,01/14] MODSIGN: Export module signature definitions Appended signatures support for IMA appraisal - 1 - --- 2018-12-13 Thiago Jung Bauermann New
[v2a,5/7] efi: Import certificates from UEFI Secure Boot Untitled series #55887 1 - - --- 2018-12-12 Nayna Jain New
ima: Use inode_is_open_for_write ima: Use inode_is_open_for_write - - - --- 2018-12-11 Nikolay Borisov New
[v2] fs: Convert open-coded "is inode open for write" check [v2] fs: Convert open-coded "is inode open for write" check - 1 - --- 2018-12-10 Nikolay Borisov New
fs: Convert open-coded "is inode open for write" check fs: Convert open-coded "is inode open for write" check - - - --- 2018-12-10 Nikolay Borisov New
[2/5] keys: remove needless modular infrastructure from ecryptfs_format security: remove needless usage of module header - - - --- 2018-12-09 Paul Gortmaker New
[1/5] security: audit and remove any unnecessary uses of module.h security: remove needless usage of module header - - - --- 2018-12-09 Paul Gortmaker New
[v2,1/7] integrity: Define a trusted platform keyring [v2,1/7] integrity: Define a trusted platform keyring 1 2 - --- 2018-12-09 Nayna Jain New
[v2,7/7] ima: Support platform keyring for kernel appraisal add platform/firmware keys support for kernel verification by IMA 1 3 - --- 2018-12-08 Nayna Jain New
[v2,6/7] efi: Allow the "db" UEFI variable to be suppressed add platform/firmware keys support for kernel verification by IMA 2 1 - --- 2018-12-08 Nayna Jain New
[v2,5/7] efi: Import certificates from UEFI Secure Boot add platform/firmware keys support for kernel verification by IMA - - - --- 2018-12-08 Nayna Jain New
[v2,4/7] efi: Add an EFI signature blob parser add platform/firmware keys support for kernel verification by IMA 1 - - --- 2018-12-08 Nayna Jain New
[v2,3/7] efi: Add EFI signature data types add platform/firmware keys support for kernel verification by IMA 2 1 - --- 2018-12-08 Nayna Jain New
[v2,2/7] integrity: Load certs to the platform keyring add platform/firmware keys support for kernel verification by IMA 1 3 - --- 2018-12-08 Nayna Jain New
[v2,1/7] integrity: Define a trusted platform keyring add platform/firmware keys support for kernel verification by IMA 1 2 - --- 2018-12-08 Nayna Jain New
tpm-dev: Require response to be read only if there actually is a response tpm-dev: Require response to be read only if there actually is a response - - - --- 2018-12-06 Alexander Steffen New
[v7,14/14] module: Prevent module removal racing with text_poke() x86/alternative: text_poke() enhancements - - - --- 2018-12-05 Nadav Amit New
[v7,13/14] module: Do not set nx for module memory before freeing x86/alternative: text_poke() enhancements - - - --- 2018-12-05 Nadav Amit New
« 1 2 ... 81 82 8394 95 »