Toggle navigation
Patchwork
Linux Integrity
Patches
Bundles
About this project
Login
Register
Mail settings
Show patches with
: State =
Action Required
| 9499 patches
Series
Submitter
State
any
Action Required
New
Under Review
Accepted
Rejected
RFC
Not Applicable
Changes Requested
Awaiting Upstream
Superseded
Deferred
Mainlined
Queued
Needs ACK
Handled Elsewhere
In Next
Search
Archived
No
Yes
Both
Delegate
------
Nobody
holtmann
holtmann
holtmann
agk
mchehab
mchehab
gregkh
gregkh
mtosatti
lethal
lethal
avi
cvaroqui
jbrassow
mikulas
dtor
bmarzins
tmlind
jmberg
jmberg
mcgrof
mcgrof
mcgrof
lenb
lenb
kyle
felipebalbi
varenet
helge
helge
khilman
khilman
khilman
khilman
jwoithe
mlin
Zhang Rui
Zhang Rui
iksaif
cjackiewicz
hmh
jbarnes
jbarnes
jbarnes
willy
snitzer
iwamatsu
dougsland
mjg59
rafael
rafael
rafael
ericvh@gmail.com
ykzhao
venkip
sandeen
pwsan
lucho@ionkov.net
rminnich
anholt
aystarik
roland
shefty
mason
glikely
krh
djbw
djbw
djbw
cmarinas
doyu
jrn
sage
tomba
mmarek
cjb
trondmy
jikos
bcousson
jic23
olof
olof
olof
nsekhar
weiny2
horms
horms
bwidawsk
bwidawsk
shemminger
eulfhan
josef
josef
josef
dianders
jpan9
hal
kdave
bleung
evalenti
jlbec
wsa
bhelgaas
vkoul
vkoul
szlin
davejiang
markgross
tagr
tiwai
vireshk
mmind
dledford
geert
geert
herbert
herbert
kvalo
kvalo
kvalo
bentiss
arend
rzwisler
stellarhopper
stellarhopper
jejb
matthias_bgg
dvhart
axboe
axboe
pcmoore
pcmoore
pcmoore
mkp
mkp
stefan_schmidt
leon
lucvoo
jsakkine
jsakkine
jsakkine
bamse
bamse
demarchi
krzk
groeck
groeck
sboyd
sboyd
mturquette
mturquette
0andriy
carlocaione
luca
dgc
kbingham
derosier
narmstrong
narmstrong
atull
tytso
tytso
djwong
bvanassche
omos
jpirko
jpirko
GustavoARSilva
pkshih
patersonc
brauner
shuahkh
shuahkh
shuahkh
palmer
palmer
jgg
Kishon
idosch
labbott
jsimmons
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
broonie
broonie
broonie
mricon
mricon
mricon
kees
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
arnd
linusw
perfinion
bbrezillon
bachradsusi
rostedt
rostedt
kholk
nbd
ebiggers
ebiggers
pavelm
sds
m0reeze
ganis
jwcart2
matttbe
andmur01
lorpie01
chanwoochoi
dlezcano
jhedberg
vudentz
robertfoss
bgix
tedd_an
tsbogend
wens
wcrobert
robher
kstewart
kwilczynski
hansg
bpf
netdev
dsa
ethtool
netdrv
martineau
abelloni
trix
pabeni
mani_sadhasivam
mlimonci
liusong6
mjp
tohojo
pmalani
prestwoj
prestwoj
dhowells
tzungbi
conchuod
paulmck
jes
mtkaczyk
colyli
cem
pateldipen1984
iweiny
iweiny
bjorn
mhiramat
JanKiszka
jaegeuk
mraynal
aring
konradybcio
ij
Hailan
jstitt007
denkenz
denkenz
mkorenbl
jjohnson
frank_li
geliang
mdraidci
mdraidci
peluse
joelgranados
Apply
«
1
2
...
81
82
83
…
94
95
»
Patch
Series
A/R/T
S/W/F
Date
Submitter
Delegate
State
[3/6] ima/ima_boot_aggregate: Fix extending PCRs beyond PCR 0-7
LTP IMA fix bundle
- 1 -
-
-
-
2019-01-15
Jia Zhang
New
[2/6] ima/ima_boot_aggregate: Don't hard code the length of sha1 hash
LTP IMA fix bundle
- 1 -
-
-
-
2019-01-15
Jia Zhang
New
[1/6] ima/ima_boot_aggregate: Fix the definition of event log
LTP IMA fix bundle
- - -
-
-
-
2019-01-15
Jia Zhang
New
[2/2] tpm/eventlog/tpm1: Fix off-by-1 when reading binary_bios_measurements
tpm/eventlog/tpm1: Small fixes
- - -
-
-
-
2019-01-11
Jia Zhang
New
[1/2] tpm/eventlog/tpm1: Simplify walking over *pos measurements
tpm/eventlog/tpm1: Small fixes
- - -
-
-
-
2019-01-11
Jia Zhang
New
[5/5] tpm: ppi: Enable submission of optional command parameter for PPI 1.3
Extend TPM PPI interface to support revision 1.3
- - -
-
-
-
2019-01-09
Stefan Berger
New
[4/5] tpm: ppi: Possibly show command parameter if TPM PPI 1.3 is used
Extend TPM PPI interface to support revision 1.3
- - -
-
-
-
2019-01-09
Stefan Berger
New
[3/5] tpm: ppi: Display up to 101 operations as define for version 1.3
Extend TPM PPI interface to support revision 1.3
- 1 -
-
-
-
2019-01-09
Stefan Berger
New
[2/5] tpm: ppi: rename TPM_PPI_REVISION_ID to TPM_PPI_REVISION_1
Extend TPM PPI interface to support revision 1.3
- - -
-
-
-
2019-01-09
Stefan Berger
New
[1/5] tpm: ppi: pass function revision ID to tpm_eval_dsm()
Extend TPM PPI interface to support revision 1.3
- 1 -
-
-
-
2019-01-09
Stefan Berger
New
[RFC,2/2] kexec, KEYS: Make use of platform keyring for signature verify
let kexec_file_load use platform keyring to verify the kernel image
1 - -
-
-
-
2019-01-09
Kairui Song
New
[RFC,1/2] integrity, KEYS: add a reference to platform keyring
let kexec_file_load use platform keyring to verify the kernel image
- - -
-
-
-
2019-01-09
Kairui Song
New
[5/5] efi: Attempt to get the TCG2 event log in the boot stub
[1/5] tpm: Abstract crypto agile event size calculations
- - -
-
-
-
2019-01-09
Matthew Garrett
New
[4/5] tpm: Append the final event log to the TPM event log
[1/5] tpm: Abstract crypto agile event size calculations
- - -
-
-
-
2019-01-09
Matthew Garrett
New
[3/5] tpm: Reserve the TPM final events table
[1/5] tpm: Abstract crypto agile event size calculations
- - -
-
-
-
2019-01-09
Matthew Garrett
New
[2/5] tpm: Fix event log types for TPM2
[1/5] tpm: Abstract crypto agile event size calculations
- - -
-
-
-
2019-01-09
Matthew Garrett
New
[1/5] tpm: Abstract crypto agile event size calculations
[1/5] tpm: Abstract crypto agile event size calculations
- - -
-
-
-
2019-01-09
Matthew Garrett
New
[6/6] ima: Use ima tcb policy files for test
LTP IMA fix bundle
- - -
-
-
-
2019-01-07
Jia Zhang
New
[5/6] ima: Rename the folder name for policy files to datafiles
LTP IMA fix bundle
- - -
-
-
-
2019-01-07
Jia Zhang
New
[4/6] ima: Code cleanup
LTP IMA fix bundle
- 1 -
-
-
-
2019-01-07
Jia Zhang
New
[3/6] ima/ima_boot_aggregate: Fix extending PCRs beyond PCR 0-7
LTP IMA fix bundle
- 1 -
-
-
-
2019-01-07
Jia Zhang
New
[2/6] ima/ima_boot_aggregate: Don't hard code the length of sha1 hash
LTP IMA fix bundle
- 1 -
-
-
-
2019-01-07
Jia Zhang
New
[1/6] ima/ima_boot_aggregate: Fix the definition of event log
LTP IMA fix bundle
- - -
-
-
-
2019-01-07
Jia Zhang
New
[RFC,4/4] crypto: Add EC-RDSA algorithm
crypto: Add EC-RDSA algorithm
- - -
-
-
-
2019-01-06
Vitaly Chikunov
New
[RFC,3/4] KEYS: set correct flags for keyctl if encrypt is not supported
crypto: Add EC-RDSA algorithm
- - -
-
-
-
2019-01-06
Vitaly Chikunov
New
[RFC,2/4] akcipher: Introduce verify2 for public key algorithms
crypto: Add EC-RDSA algorithm
- - -
-
-
-
2019-01-06
Vitaly Chikunov
New
[RFC,1/4] X.509: Parse public key parameters from x509 for akcipher
crypto: Add EC-RDSA algorithm
- - -
-
-
-
2019-01-06
Vitaly Chikunov
New
[2/2] tpm/eventlog/tpm1: Fix off-by-1 when reading binary_bios_measurements
[1/2] tpm/eventlog/tpm1: Simplify walking over *pos measurements
- - -
-
-
-
2019-01-06
Jia Zhang
New
[1/2] tpm/eventlog/tpm1: Simplify walking over *pos measurements
[1/2] tpm/eventlog/tpm1: Simplify walking over *pos measurements
- - -
-
-
-
2019-01-06
Jia Zhang
New
tpm: fix incorrect success returns from tpm_try_transmit()
tpm: fix incorrect success returns from tpm_try_transmit()
- - -
-
-
-
2018-12-31
James Bottomley
New
MAINTAINERS: fix typo in Mimi Zohar's address
MAINTAINERS: fix typo in Mimi Zohar's address
- 1 -
-
-
-
2018-12-27
Baruch Siach
New
[12/12] x86_64: __clear_user as case of __memset_user
[01/12] x86_64: memset_user()
- - -
-
-
-
2018-12-21
Igor Stoppa
New
[11/12] IMA: turn ima_policy_flags into __wr_after_init
[01/12] x86_64: memset_user()
- - -
-
-
-
2018-12-21
Igor Stoppa
New
[10/12] __wr_after_init: test write rare functionality
[01/12] x86_64: memset_user()
- - -
-
-
-
2018-12-21
Igor Stoppa
New
[09/12] rodata_test: add verification for __wr_after_init
[01/12] x86_64: memset_user()
- - -
-
-
-
2018-12-21
Igor Stoppa
New
[08/12] rodata_test: refactor tests
[01/12] x86_64: memset_user()
- - -
-
-
-
2018-12-21
Igor Stoppa
New
[07/12] __wr_after_init: lkdtm test
[01/12] x86_64: memset_user()
- - -
-
-
-
2018-12-21
Igor Stoppa
New
[06/12] __wr_after_init: Documentation: self-protection
[01/12] x86_64: memset_user()
- - -
-
-
-
2018-12-21
Igor Stoppa
New
[05/12] __wr_after_init: x86_64: __wr_op
[01/12] x86_64: memset_user()
- - -
-
-
-
2018-12-21
Igor Stoppa
New
[04/12] __wr_after_init: debug writes
[01/12] x86_64: memset_user()
- - -
-
-
-
2018-12-21
Igor Stoppa
New
[03/12] __wr_after_init: generic functionality
[01/12] x86_64: memset_user()
- - -
-
-
-
2018-12-21
Igor Stoppa
New
[02/12] __wr_after_init: linker section and label
[01/12] x86_64: memset_user()
- - -
-
-
-
2018-12-21
Igor Stoppa
New
[01/12] x86_64: memset_user()
[01/12] x86_64: memset_user()
- - -
-
-
-
2018-12-21
Igor Stoppa
New
[12/12] x86_64: __clear_user as case of __memset_user
hardening: statically allocated protected memory
- - -
-
-
-
2018-12-19
Igor Stoppa
New
[11/12] IMA: turn ima_policy_flags into __wr_after_init
hardening: statically allocated protected memory
- - -
-
-
-
2018-12-19
Igor Stoppa
New
[10/12] __wr_after_init: test write rare functionality
hardening: statically allocated protected memory
- - -
-
-
-
2018-12-19
Igor Stoppa
New
[09/12] rodata_test: add verification for __wr_after_init
hardening: statically allocated protected memory
- - -
-
-
-
2018-12-19
Igor Stoppa
New
[08/12] rodata_test: refactor tests
hardening: statically allocated protected memory
- - -
-
-
-
2018-12-19
Igor Stoppa
New
[07/12] __wr_after_init: lkdtm test
hardening: statically allocated protected memory
- - -
-
-
-
2018-12-19
Igor Stoppa
New
[06/12] __wr_after_init: Documentation: self-protection
hardening: statically allocated protected memory
- - -
-
-
-
2018-12-19
Igor Stoppa
New
[05/12] __wr_after_init: x86_64: debug writes
hardening: statically allocated protected memory
- - -
-
-
-
2018-12-19
Igor Stoppa
New
[04/12] __wr_after_init: x86_64: __wr_op
hardening: statically allocated protected memory
- - -
-
-
-
2018-12-19
Igor Stoppa
New
[03/12] __wr_after_init: generic header
hardening: statically allocated protected memory
- - -
-
-
-
2018-12-19
Igor Stoppa
New
[02/12] __wr_after_init: linker section and label
hardening: statically allocated protected memory
- - -
-
-
-
2018-12-19
Igor Stoppa
New
[01/12] x86_64: memset_user()
hardening: statically allocated protected memory
- - -
-
-
-
2018-12-19
Igor Stoppa
New
[v2] ima: define ima_post_create_tmpfile() hook and add missing call
[v2] ima: define ima_post_create_tmpfile() hook and add missing call
- - 1
-
-
-
2018-12-18
Mimi Zohar
New
ima: cleanup the match_token policy code
ima: cleanup the match_token policy code
- - -
-
-
-
2018-12-18
Mimi Zohar
New
ima: define ima_create_tmpfile() hook and add missing call
ima: define ima_create_tmpfile() hook and add missing call
- - -
-
-
-
2018-12-17
Mimi Zohar
New
[-next] evm: remove set but not used variable 'xattr'
[-next] evm: remove set but not used variable 'xattr'
- - -
-
-
-
2018-12-15
Yue Haibing
New
[-next] evm: CHECK-remove set but not used variable 'xattr'
[-next] evm: CHECK-remove set but not used variable 'xattr'
- - -
-
-
-
2018-12-15
Yue Haibing
New
[GIT,PULL] linux-integrity patches for Linux 4.21
[GIT,PULL] linux-integrity patches for Linux 4.21
- - -
-
-
-
2018-12-14
Mimi Zohar
New
[REVIEW,2/2] tpm_tis: override durations for STM tpm with firmware 1.2.8.28
[REVIEW,1/2] tpm: provide a way to override the chip returned durations
- - -
-
-
-
2018-12-14
Alexey Klimov
New
[REVIEW,1/2] tpm: provide a way to override the chip returned durations
[REVIEW,1/2] tpm: provide a way to override the chip returned durations
- - -
-
-
-
2018-12-14
Alexey Klimov
New
fs: Evaluate O_WRONLY | O_RDWR to O_RDWR
fs: Evaluate O_WRONLY | O_RDWR to O_RDWR
- - -
-
-
-
2018-12-13
Goldwyn Rodrigues
New
[v7,5/5] tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()
tpm: retrieve digest size of unknown algorithms from TPM
- - -
-
-
-
2018-12-13
Roberto Sassu
New
[v7,4/5] tpm: retrieve digest size of unknown algorithms with PCR read
tpm: retrieve digest size of unknown algorithms from TPM
1 1 -
-
-
-
2018-12-13
Roberto Sassu
New
[v7,3/5] tpm: rename and export tpm2_digest and tpm2_algorithms
tpm: retrieve digest size of unknown algorithms from TPM
1 1 -
-
-
-
2018-12-13
Roberto Sassu
New
[v7,2/5] tpm: add _head suffix to tcg_efi_specid_event and tcg_pcr_event2
tpm: retrieve digest size of unknown algorithms from TPM
- 1 1
-
-
-
2018-12-13
Roberto Sassu
New
[v7,1/5] tpm: dynamically allocate the allocated_banks array
tpm: retrieve digest size of unknown algorithms from TPM
- - 1
-
-
-
2018-12-13
Roberto Sassu
New
[v9,14/14] ima: Store the measurement again when appraising a modsig
Appended signatures support for IMA appraisal
- - -
-
-
-
2018-12-13
Thiago Jung Bauermann
New
[v9,13/14] ima: Write modsig to the measurement list
Appended signatures support for IMA appraisal
- - -
-
-
-
2018-12-13
Thiago Jung Bauermann
New
[v9,12/14] ima: Add new "d-sig" template field
Appended signatures support for IMA appraisal
- - -
-
-
-
2018-12-13
Thiago Jung Bauermann
New
[v9,11/14] ima: Implement support for module-style appended signatures
Appended signatures support for IMA appraisal
- - -
-
-
-
2018-12-13
Thiago Jung Bauermann
New
[v9,10/14] ima: Add modsig appraise_type option for module-style appended signatures
Appended signatures support for IMA appraisal
- - -
-
-
-
2018-12-13
Thiago Jung Bauermann
New
[v9,09/14] ima: Export func_tokens
Appended signatures support for IMA appraisal
- - -
-
-
-
2018-12-13
Thiago Jung Bauermann
New
[v9,08/14] ima: Introduce is_signed()
Appended signatures support for IMA appraisal
- - -
-
-
-
2018-12-13
Thiago Jung Bauermann
New
[v9,07/14] integrity: Select CONFIG_KEYS instead of depending on it
Appended signatures support for IMA appraisal
- - -
-
-
-
2018-12-13
Thiago Jung Bauermann
New
[v9,06/14] integrity: Introduce asymmetric_sig_has_known_key()
Appended signatures support for IMA appraisal
- - -
-
-
-
2018-12-13
Thiago Jung Bauermann
New
[v9,05/14] integrity: Introduce integrity_keyring_from_id()
Appended signatures support for IMA appraisal
- - -
-
-
-
2018-12-13
Thiago Jung Bauermann
New
[v9,04/14] integrity: Introduce struct evm_xattr
Appended signatures support for IMA appraisal
- 1 -
-
-
-
2018-12-13
Thiago Jung Bauermann
New
[v9,03/14] PKCS#7: Introduce pkcs7_get_digest()
Appended signatures support for IMA appraisal
- 1 -
-
-
-
2018-12-13
Thiago Jung Bauermann
New
[v9,02/14] PKCS#7: Refactor verify_pkcs7_signature() and add pkcs7_get_message_sig()
Appended signatures support for IMA appraisal
- 1 -
-
-
-
2018-12-13
Thiago Jung Bauermann
New
[v9,01/14] MODSIGN: Export module signature definitions
Appended signatures support for IMA appraisal
- 1 -
-
-
-
2018-12-13
Thiago Jung Bauermann
New
[v2a,5/7] efi: Import certificates from UEFI Secure Boot
Untitled series #55887
1 - -
-
-
-
2018-12-12
Nayna Jain
New
ima: Use inode_is_open_for_write
ima: Use inode_is_open_for_write
- - -
-
-
-
2018-12-11
Nikolay Borisov
New
[v2] fs: Convert open-coded "is inode open for write" check
[v2] fs: Convert open-coded "is inode open for write" check
- 1 -
-
-
-
2018-12-10
Nikolay Borisov
New
fs: Convert open-coded "is inode open for write" check
fs: Convert open-coded "is inode open for write" check
- - -
-
-
-
2018-12-10
Nikolay Borisov
New
[2/5] keys: remove needless modular infrastructure from ecryptfs_format
security: remove needless usage of module header
- - -
-
-
-
2018-12-09
Paul Gortmaker
New
[1/5] security: audit and remove any unnecessary uses of module.h
security: remove needless usage of module header
- - -
-
-
-
2018-12-09
Paul Gortmaker
New
[v2,1/7] integrity: Define a trusted platform keyring
[v2,1/7] integrity: Define a trusted platform keyring
1 2 -
-
-
-
2018-12-09
Nayna Jain
New
[v2,7/7] ima: Support platform keyring for kernel appraisal
add platform/firmware keys support for kernel verification by IMA
1 3 -
-
-
-
2018-12-08
Nayna Jain
New
[v2,6/7] efi: Allow the "db" UEFI variable to be suppressed
add platform/firmware keys support for kernel verification by IMA
2 1 -
-
-
-
2018-12-08
Nayna Jain
New
[v2,5/7] efi: Import certificates from UEFI Secure Boot
add platform/firmware keys support for kernel verification by IMA
- - -
-
-
-
2018-12-08
Nayna Jain
New
[v2,4/7] efi: Add an EFI signature blob parser
add platform/firmware keys support for kernel verification by IMA
1 - -
-
-
-
2018-12-08
Nayna Jain
New
[v2,3/7] efi: Add EFI signature data types
add platform/firmware keys support for kernel verification by IMA
2 1 -
-
-
-
2018-12-08
Nayna Jain
New
[v2,2/7] integrity: Load certs to the platform keyring
add platform/firmware keys support for kernel verification by IMA
1 3 -
-
-
-
2018-12-08
Nayna Jain
New
[v2,1/7] integrity: Define a trusted platform keyring
add platform/firmware keys support for kernel verification by IMA
1 2 -
-
-
-
2018-12-08
Nayna Jain
New
tpm-dev: Require response to be read only if there actually is a response
tpm-dev: Require response to be read only if there actually is a response
- - -
-
-
-
2018-12-06
Alexander Steffen
New
[v7,14/14] module: Prevent module removal racing with text_poke()
x86/alternative: text_poke() enhancements
- - -
-
-
-
2018-12-05
Nadav Amit
New
[v7,13/14] module: Do not set nx for module memory before freeing
x86/alternative: text_poke() enhancements
- - -
-
-
-
2018-12-05
Nadav Amit
New
«
1
2
...
81
82
83
…
94
95
»