Show patches with: none      |   9020 patches
« 1 2 3 490 91 »
Patch Series A/R/T S/W/F Date Submitter Delegate State
MAINTAINERS: update TPM driver infrastructure changes - - - --- 2017-09-15 Jarkko Sakkinen New
[v3,1/5] tpm: move tpm_eventlog.h outside of drivers folder - - - --- 2017-09-20 Thiébaud Weksteen Accepted
[v3,2/5] tpm: rename event log provider files - 1 - --- 2017-09-20 Thiébaud Weksteen Accepted
[v3,3/5] tpm: add event log format version - - - --- 2017-09-20 Thiébaud Weksteen Accepted
[v3,4/5] efi: call get_event_log before ExitBootServices - - - --- 2017-09-20 Thiébaud Weksteen Accepted
[v3,5/5] tpm: parse TPM event logs based on EFI table - 1 - --- 2017-09-20 Thiébaud Weksteen Accepted
[1/3] tpm: move PCR read code to static function tpm2_pcr_read_common() - - - --- 2017-09-25 Roberto Sassu New
[2/3] tpm: retrieve digest size of unknown algorithms with PCR read - - - --- 2017-09-25 Roberto Sassu New
[3/3] tpm: add the crypto algorithm identifier to active_bank_info - - - --- 2017-09-25 Roberto Sassu New
ima: Use i_version only when filesystem supports it - - - --- 2017-09-27 Sascha Hauer New
[1/6] IMA: Allow EVM validation on appraisal even without a symmetric key - - - --- 2017-09-27 Matthew Garrett New
[2/6] EVM: Add infrastructure for making EVM fields optional - - - --- 2017-09-27 Matthew Garrett New
[3/6] EVM: Allow userland to override the default EVM attributes - - - --- 2017-09-27 Matthew Garrett New
[4/6] EVM: Add an hmac_ng xattr format - - - --- 2017-09-27 Matthew Garrett New
[5/6] EVM: Write out HMAC xattrs in the new format - - - --- 2017-09-27 Matthew Garrett New
[6/6] EVM: Add a new digital signature format - - - --- 2017-09-27 Matthew Garrett New
[RFC,1/3] fs: define new read_iter rwf flag - - - --- 2017-09-28 Mimi Zohar New
[RFC,2/3] integrity: use call_read_iter to calculate the file hash - - - --- 2017-09-28 Mimi Zohar New
[RFC,3/3] fs: detect that the i_rwsem has already been taken exclusively - - - --- 2017-09-28 Mimi Zohar New
[13/18] tpm: use ARRAY_SIZE - 1 - --- 2017-10-01 Jérémy Lefaure New
tpm: adjust command response sleep time for vTPM - - - --- 2017-10-03 Guilherme Magalhaes New
[v3,1/5] tpm: move wait_for_tpm_stat() to respective driver files - 1 - --- 2017-10-04 Nayna New
[v3,2/5] tpm: ignore burstcount to improve tpm_tis send() performance 1 - - --- 2017-10-04 Nayna New
[v3,3/5] tpm: reduce polling delay in tpm_tis wait_for_tpm_stat() - - - --- 2017-10-04 Nayna New
[v3,4/5] tpm: reduce tpm_msleep() time in get_burstcount() 1 - - --- 2017-10-04 Nayna New
[v3,5/5] tpm: use tpm_msleep() value as max delay 1 1 1 --- 2017-10-04 Nayna New
vfs: fix mounting a filesystem with i_version - - - --- 2017-10-08 Mimi Zohar New
EVM: Allow userspace to signal an RSA key has been loaded - - - --- 2017-10-10 Matthew Garrett New
EVM: Only complain about a missing HMAC key once - - - --- 2017-10-10 Matthew Garrett New
IMA: Add support for IMA validation after credentials are committed - - - --- 2017-10-10 Matthew Garrett New
[V2] IMA: Add support for IMA validation after credentials are committed - - - --- 2017-10-10 Matthew Garrett New
[V2] EVM: Allow userspace to signal an RSA key has been loaded - - - --- 2017-10-11 Matthew Garrett New
[V2] EVM: Only complain about a missing HMAC key once - - - --- 2017-10-11 Matthew Garrett New
[V3,1/2] IMA: Add support for IMA validation after credentials are committed - - - --- 2017-10-11 Matthew Garrett New
[V3,2/2] Add a bprm_interpreted security hook and call into IMA from it - - - --- 2017-10-11 Matthew Garrett New
EVM: Include security.apparmor in EVM measurements 1 - - --- 2017-10-13 Matthew Garrett New
[tpmdd-devel] tpm device not showing up in /dev anymore - - - --- 2017-10-14 Jerry Snitselaar New
keys, trusted: fix missing support for TPM 2.0 in trusted_update() - 1 - --- 2017-10-16 Wang Boshi New
[1/4] char/tpm: Delete an error message for a failed memory allocation in tpm_ascii_bios_measuremen… - - - --- 2017-10-16 SF Markus Elfring New
[2/4] char/tpm: Delete an error message for a failed memory allocation in tpm_ibmvtpm_probe() - - - --- 2017-10-16 SF Markus Elfring New
[3/4] char/tpm: Improve a size determination in nine functions - - - --- 2017-10-16 SF Markus Elfring New
[4/4] char/tpm: Less checks in tpm_ibmvtpm_probe() after error detection - - - --- 2017-10-16 SF Markus Elfring New
[1/2] security: Add a cred_getsecid hook 1 - - --- 2017-10-16 Matthew Garrett New
[2/2] IMA: Support using new creds in appraisal policy - - - --- 2017-10-16 Matthew Garrett New
[v4,1/4] tpm: move wait_for_tpm_stat() to respective driver files - 2 1 --- 2017-10-17 Nayna Accepted
[v4,2/4] tpm: ignore burstcount to improve tpm_tis send() performance 1 1 1 --- 2017-10-17 Nayna Accepted
[v4,3/4] tpm: reduce tpm polling delay in tpm_tis_core - 1 1 --- 2017-10-17 Nayna Accepted
[v4,4/4] tpm: use tpm_msleep() value as max delay 1 1 2 --- 2017-10-17 Nayna Accepted
[v5,01/18] ima: Remove redundant conditional operator - - - --- 2017-10-18 Thiago Jung Bauermann New
[v5,02/18] ima: Remove some superfluous parentheses - - - --- 2017-10-18 Thiago Jung Bauermann New
[v5,03/18] evm, ima: Remove superfluous parentheses - - - --- 2017-10-18 Thiago Jung Bauermann New
[v5,04/18] evm, ima: Remove more superfluous parentheses - - - --- 2017-10-18 Thiago Jung Bauermann New
[v5,05/18] ima: Simplify ima_eventsig_init - - - --- 2017-10-18 Thiago Jung Bauermann New
[v5,06/18] ima: Improvements in ima_appraise_measurement - - - --- 2017-10-18 Thiago Jung Bauermann New
[v5,07/18] integrity: Introduce struct evm_xattr - - - --- 2017-10-18 Thiago Jung Bauermann New
[v5,08/18] integrity: Select CONFIG_KEYS instead of depending on it - - - --- 2017-10-18 Thiago Jung Bauermann New
[v5,09/18] ima: Don't pass xattr value to EVM xattr verification. - - - --- 2017-10-18 Thiago Jung Bauermann New
[v5,10/18] ima: Store measurement after appraisal - - - --- 2017-10-18 Thiago Jung Bauermann New
[v5,11/18] ima: Export func_tokens - - - --- 2017-10-18 Thiago Jung Bauermann New
[v5,12/18] MODSIGN: Export module signature definitions - 1 - --- 2017-10-18 Thiago Jung Bauermann New
[v5,13/18] PKCS#7: Introduce pkcs7_get_message_sig and verify_pkcs7_message_sig - 1 - --- 2017-10-18 Thiago Jung Bauermann New
[v5,14/18] integrity: Introduce integrity_keyring_from_id - - - --- 2017-10-18 Thiago Jung Bauermann New
[v5,15/18] ima: Add modsig appraise_type option for module-style appended signatures - - - --- 2017-10-18 Thiago Jung Bauermann New
[v5,16/18] ima: Add functions to read and verify a modsig signature - - - --- 2017-10-18 Thiago Jung Bauermann New
[v5,17/18] ima: Implement support for module-style appended signatures - - - --- 2017-10-18 Thiago Jung Bauermann New
[v5,18/18] ima: Write modsig to the measurement list - - - --- 2017-10-18 Thiago Jung Bauermann New
ima: fix ineffective default hash algorithm due to invalid hash algorithm boot argument - - - --- 2017-10-18 Wang Boshi New
EVM: Add support for portable signature format - - - --- 2017-10-18 Matthew Garrett New
EVM: Add support for portable signature format - - - --- 2017-10-19 Dmitry Kasatkin New
[V2] EVM: Add support for portable signature format - - - --- 2017-10-19 Matthew Garrett New
EVM: Allow userland to permit modification of EVM-protected xattrs - - - --- 2017-10-19 Matthew Garrett New
[1/2] security: Add a cred_getsecid hook - - - --- 2017-10-19 Matthew Garrett New
[2/2] IMA: Support using new creds in appraisal policy - - - --- 2017-10-19 Matthew Garrett New
ima: fix hash algorithm initialization - - - --- 2017-10-20 Wang Boshi New
[RFC,1/2] ima: preserve the integrity of appraised files - - - --- 2017-10-20 Roberto Sassu New
[RFC,2/2] ima: don't measure files in the TCB if Biba strict policy is enforced - - - --- 2017-10-20 Roberto Sassu New
[1/2] module: export module signature enforcement status - - - --- 2017-10-20 Bruno E. O. Meneguele New
[2/2] ima: check signature enforcement against cmdline param instead of CONFIG - - - --- 2017-10-20 Bruno E. O. Meneguele New
tpm_i2c_nuvoton: Use common error handling code in i2c_nuvoton_send() - - - --- 2017-10-21 SF Markus Elfring New
tpm_tis_core: Use common error handling code in tpm_tis_send_data() - - - --- 2017-10-22 SF Markus Elfring New
[1/2] xen-tpmfront: Use common error handling code in vtpm_send() - - - --- 2017-10-22 SF Markus Elfring New
[2/2] xen-tpmfront: Combine two condition checks into one statement in vtpm_send() - 1 - --- 2017-10-22 SF Markus Elfring New
tpm: remove a misleading error message from tpm_get_timeouts() - - - --- 2017-10-23 Jarkko Sakkinen New
tpm: remove chip_num parameter from in-kernel API - - - --- 2017-10-23 Jarkko Sakkinen New
[RFC] ima: require secure_boot rules in lockdown mode - - - --- 2017-10-23 Mimi Zohar New
[v2,1/2] module: export module signature enforcement status - - - --- 2017-10-23 Bruno E. O. Meneguele New
[v2,2/2] ima: check signature enforcement against cmdline param instead of CONFIG - - - --- 2017-10-23 Bruno E. O. Meneguele New
[v3,1/2] module: export module signature enforcement status - - - --- 2017-10-24 Bruno E. O. Meneguele New
[v3,2/2] ima: check signature enforcement against cmdline param instead of CONFIG - - - --- 2017-10-24 Bruno E. O. Meneguele New
tpm: Move Linux RNG connection to hwrng - 1 - --- 2017-10-24 Jason Gunthorpe New
tpm: Move Linux RNG connection to hwrng - - - --- 2017-10-24 Jason Gunthorpe New
[V3] EVM: Add support for portable signature format - 1 - --- 2017-10-25 Matthew Garrett New
[V2] EVM: Allow userland to permit modification of EVM-protected xattrs - - - --- 2017-10-25 Matthew Garrett New
[v2] tpm: use struct tpm_chip for tpm_chip_find_get() - 1 - --- 2017-10-25 Jarkko Sakkinen New
[RFC] EVM: Add support for portable signature format - - - --- 2017-10-26 Matthew Garrett New
[V3,1/2] security: Add a cred_getsecid hook 2 - - --- 2017-10-26 Matthew Garrett New
[V3,2/2] IMA: Support using new creds in appraisal policy - 1 - --- 2017-10-26 Matthew Garrett New
[v2] tpm: Move Linux RNG connection to hwrng - 1 2 --- 2017-10-31 Jason Gunthorpe New
tpm: Update MAINTAINERS for Jason Gunthorpe - 1 - --- 2017-10-31 Jason Gunthorpe New
[RFC] ima: require secure_boot rules in lockdown mode - - - --- 2017-11-02 David Howells New
« 1 2 3 490 91 »