Show patches with: State = Action Required       |   12060 patches
« 1 2 ... 83 84 85120 121 »
Patch Series A/R/T S/W/F Date Submitter Delegate State
[v5,14/21] tpm: tpm-interface.c drop unused macros tpm: separate tpm 1.x and tpm 2.x commands - 1 - --- 2018-09-28 Winkler, Tomas New
[v5,13/21] tpm: add tpm_auto_startup() into tpm-interface.c tpm: separate tpm 1.x and tpm 2.x commands - 1 1 --- 2018-09-28 Winkler, Tomas New
[v5,12/21] tpm: move pcr extend code to tpm2-cmd.c tpm: separate tpm 1.x and tpm 2.x commands - - - --- 2018-09-28 Winkler, Tomas New
[v5,11/21] tpm: factor out tpm_startup function tpm: separate tpm 1.x and tpm 2.x commands - 1 1 --- 2018-09-28 Winkler, Tomas New
[v5,10/21] tpm: factor out tpm 1.x pm suspend flow into tpm1-cmd.c tpm: separate tpm 1.x and tpm 2.x commands - 1 1 --- 2018-09-28 Winkler, Tomas New
[v5,09/21] tpm: move tpm 1.x selftest code from tpm-interface.c tpm1-cmd.c tpm: separate tpm 1.x and tpm 2.x commands - 1 1 --- 2018-09-28 Winkler, Tomas New
[v5,08/21] tpm: factor out tpm1_get_random into tpm1-cmd.c tpm: separate tpm 1.x and tpm 2.x commands - 2 1 --- 2018-09-28 Winkler, Tomas New
[v5,07/21] tpm: move tpm_getcap to tpm1-cmd.c tpm: separate tpm 1.x and tpm 2.x commands - 1 1 --- 2018-09-28 Winkler, Tomas New
[v5,06/21] tpm: move tpm1_pcr_extend to tpm1-cmd.c tpm: separate tpm 1.x and tpm 2.x commands - 2 1 --- 2018-09-28 Winkler, Tomas New
[v5,05/21] tpm: factor out tpm_get_timeouts() tpm: separate tpm 1.x and tpm 2.x commands - 1 1 --- 2018-09-28 Winkler, Tomas New
[v5,04/21] tpm: add tpm_calc_ordinal_duration() wrapper tpm: separate tpm 1.x and tpm 2.x commands - 1 1 --- 2018-09-28 Winkler, Tomas New
[v5,03/21] tpm: factor out tpm 1.x duration calculation to tpm1-cmd.c tpm: separate tpm 1.x and tpm 2.x commands - - 1 --- 2018-09-28 Winkler, Tomas New
[v5,02/21] tpm: sort objects in the Makefile tpm: separate tpm 1.x and tpm 2.x commands - 1 1 --- 2018-09-28 Winkler, Tomas New
[v5,01/21] tpm2: add new tpm2 commands according to TCG 1.36 tpm: separate tpm 1.x and tpm 2.x commands - 1 1 --- 2018-09-28 Winkler, Tomas New
keys: Fix the use of the C++ keyword "private" in uapi/linux/keyctl.h keys: Fix the use of the C++ keyword "private" in uapi/linux/keyctl.h - - - --- 2018-09-27 David Howells New
apparmor: Fix uninitialized value in aa_split_fqname apparmor: Fix uninitialized value in aa_split_fqname - 1 - --- 2018-09-27 Zubin Mithra New
[6/5] capability: Repair sidechannel test in ptrace LSM: Add and use a hook for side-channel safety checks - 1 - --- 2018-09-27 Schaufler, Casey New
[21/19] LSM: Cleanup and fixes from Tetsuo Handa LSM: Module stacking for SARA and Landlock - - - --- 2018-09-26 Casey Schaufler New
[v4,20/19] LSM: Correct file blob free empty blob check LSM: Module stacking for SARA and Landlock - 1 - --- 2018-09-26 Casey Schaufler New
[v5,5/5] sidechannel: Linux Security Module for sidechannel LSM: Support ptrace sidechannel access checks - - - --- 2018-09-26 Schaufler, Casey New
[v5,4/5] Capability: Complete PTRACE_MODE_SCHED LSM: Support ptrace sidechannel access checks - - - --- 2018-09-26 Schaufler, Casey New
[v5,3/5] SELinux: Prepare for PTRACE_MODE_SCHED LSM: Support ptrace sidechannel access checks - - - --- 2018-09-26 Schaufler, Casey New
[v5,2/5] Smack: Prepare for PTRACE_MODE_SCHED LSM: Support ptrace sidechannel access checks - - - --- 2018-09-26 Schaufler, Casey New
[v5,1/5] AppArmor: Prepare for PTRACE_MODE_SCHED LSM: Support ptrace sidechannel access checks - - - --- 2018-09-26 Schaufler, Casey New
[v4,6/6] x86/ima: define arch_get_ima_policy() for x86 Add support for architecture specific IMA policies - - - --- 2018-09-26 Nayna New
[v4,5/6] ima: add support for external setting of ima_appraise Add support for architecture specific IMA policies - - - --- 2018-09-26 Nayna New
[v4,4/6] ima: add support for arch specific policies Add support for architecture specific IMA policies - - - --- 2018-09-26 Nayna New
[v4,3/6] ima: refactor ima_init_policy() Add support for architecture specific IMA policies - - - --- 2018-09-26 Nayna New
[v4,2/6] ima: prevent kexec_load syscall based on runtime secureboot flag Add support for architecture specific IMA policies - - - --- 2018-09-26 Nayna New
[v4,1/6] x86/ima: define arch_ima_get_secureboot Add support for architecture specific IMA policies - - - --- 2018-09-26 Nayna New
[PULL] Smack: Changes for 4.20 [PULL] Smack: Changes for 4.20 - - - --- 2018-09-25 Casey Schaufler New
[security-next,v3,29/29] LSM: Add all exclusive LSMs to ordered initialization LSM: Explict LSM ordering - - - --- 2018-09-25 Kees Cook New
[security-next,v3,28/29] LSM: Separate idea of "major" LSM from "exclusive" LSM LSM: Explict LSM ordering - - - --- 2018-09-25 Kees Cook New
[security-next,v3,27/29] capability: Initialize as LSM_ORDER_FIRST LSM: Explict LSM ordering - - - --- 2018-09-25 Kees Cook New
[security-next,v3,26/29] LSM: Introduce enum lsm_order LSM: Explict LSM ordering - - - --- 2018-09-25 Kees Cook New
[security-next,v3,25/29] Yama: Initialize as ordered LSM LSM: Explict LSM ordering - - - --- 2018-09-25 Kees Cook New
[security-next,v3,24/29] LoadPin: Initialize as ordered LSM LSM: Explict LSM ordering - - - --- 2018-09-25 Kees Cook New
[security-next,v3,23/29] LSM: Introduce "lsm.order=" for boottime ordering LSM: Explict LSM ordering - - - --- 2018-09-25 Kees Cook New
[security-next,v3,22/29] LSM: Introduce CONFIG_LSM_ORDER LSM: Explict LSM ordering - - - --- 2018-09-25 Kees Cook New
[security-next,v3,21/29] LSM: Build ordered list of ordered LSMs for init LSM: Explict LSM ordering - - - --- 2018-09-25 Kees Cook New
[security-next,v3,20/29] LSM: Refactor "security=" in terms of enable/disable LSM: Explict LSM ordering - - - --- 2018-09-25 Kees Cook New
[security-next,v3,19/29] LSM: Prepare for reorganizing "security=" logic LSM: Explict LSM ordering - 1 - --- 2018-09-25 Kees Cook New
[security-next,v3,18/29] LSM: Introduce lsm.enable= and lsm.disable= LSM: Explict LSM ordering - - - --- 2018-09-25 Kees Cook New
[security-next,v3,17/29] LSM: Introduce CONFIG_LSM_ENABLE LSM: Explict LSM ordering - - - --- 2018-09-25 Kees Cook New
[security-next,v3,16/29] LSM: Prepare for arbitrary LSM enabling LSM: Explict LSM ordering - 1 - --- 2018-09-25 Kees Cook New
[security-next,v3,15/29] LSM: Lift LSM selection out of individual LSMs LSM: Explict LSM ordering - 1 - --- 2018-09-25 Kees Cook New
[security-next,v3,14/29] LSM: Plumb visibility into optional "enabled" state LSM: Explict LSM ordering - 1 - --- 2018-09-25 Kees Cook New
[security-next,v3,13/29] LoadPin: Rename "enable" to "enforce" LSM: Explict LSM ordering - 1 - --- 2018-09-25 Kees Cook New
[security-next,v3,12/29] LSM: Provide separate ordered initialization LSM: Explict LSM ordering - 1 - --- 2018-09-25 Kees Cook New
[security-next,v3,11/29] LSM: Introduce LSM_FLAG_LEGACY_MAJOR LSM: Explict LSM ordering - 1 - --- 2018-09-25 Kees Cook New
[security-next,v3,10/29] LSM: Don't ignore initialization failures LSM: Explict LSM ordering - 1 - --- 2018-09-25 Kees Cook New
[security-next,v3,09/29] LSM: Provide init debugging infrastructure LSM: Explict LSM ordering - 1 - --- 2018-09-25 Kees Cook New
[security-next,v3,08/29] LSM: Record LSM name in struct lsm_info LSM: Explict LSM ordering - - - --- 2018-09-25 Kees Cook New
[security-next,v3,07/29] LSM: Convert security_initcall() into DEFINE_LSM() LSM: Explict LSM ordering - - - --- 2018-09-25 Kees Cook New
[security-next,v3,06/29] vmlinux.lds.h: Move LSM_TABLE into INIT_DATA LSM: Explict LSM ordering - 1 - --- 2018-09-25 Kees Cook New
[security-next,v3,05/29] LSM: Convert from initcall to struct lsm_info LSM: Explict LSM ordering - 2 - --- 2018-09-25 Kees Cook New
[security-next,v3,04/29] LSM: Remove initcall tracing LSM: Explict LSM ordering - 1 - --- 2018-09-25 Kees Cook New
[security-next,v3,03/29] LSM: Rename .security_initcall section to .lsm_info LSM: Explict LSM ordering - 2 - --- 2018-09-25 Kees Cook New
[security-next,v3,02/29] vmlinux.lds.h: Avoid copy/paste of security_init section LSM: Explict LSM ordering - 2 - --- 2018-09-25 Kees Cook New
[security-next,v3,01/29] LSM: Correctly announce start of LSM initialization LSM: Explict LSM ordering - 3 - --- 2018-09-25 Kees Cook New
[GIT,PULL] Keys: fix C++ reserved word issue [GIT,PULL] Keys: fix C++ reserved word issue - - - --- 2018-09-24 James Morris New
[2/2] keys: Fix the use of the C++ keyword "private" in uapi/linux/keyctl.h KEYS: Revert and replace incorrect UAPI fix - 1 1 --- 2018-09-24 David Howells New
[1/2] Revert "uapi/linux/keyctl.h: don't use C++ reserved keyword as a struct member name" KEYS: Revert and replace incorrect UAPI fix - - - --- 2018-09-24 David Howells New
Revert "uapi/linux/keyctl.h: don't use C++ reserved keyword as a struct member name" Revert "uapi/linux/keyctl.h: don't use C++ reserved keyword as a struct member name" - - - --- 2018-09-24 Lubomir Rintel New
[v3,2/2] netfilter: nf_tables: add requirements for connsecmark support [v3,1/2] netfilter: nf_tables: add SECMARK support - - - --- 2018-09-23 Christian Göttsche New
[v3,1/2] netfilter: nf_tables: add SECMARK support [v3,1/2] netfilter: nf_tables: add SECMARK support - - - --- 2018-09-23 Christian Göttsche New
[2/2] netfilter: nf_tables: add requirements for connsecmark support [v2,1/2] netfilter: nf_tables: add SECMARK support 1 - - --- 2018-09-23 Christian Göttsche New
[v2,1/2] netfilter: nf_tables: add SECMARK support [v2,1/2] netfilter: nf_tables: add SECMARK support - - - --- 2018-09-23 Christian Göttsche New
[v4,09/19] SELinux: Abstract use of file security blob LSM: Module stacking for SARA and Landlock - 1 - --- 2018-09-22 Casey Schaufler New
[v4,19/19] LSM: Blob sharing support for S.A.R.A and LandLock LSM: Module stacking for SARA and Landlock - - - --- 2018-09-22 Casey Schaufler New
[v4,18/19] LSM: Infrastructure management of the ipc security blob LSM: Module stacking for SARA and Landlock - 1 - --- 2018-09-22 Casey Schaufler New
[v4,17/19] Smack: Abstract use of ipc security blobs LSM: Module stacking for SARA and Landlock - 1 - --- 2018-09-22 Casey Schaufler New
[v4,16/19] SELinux: Abstract use of ipc security blobs LSM: Module stacking for SARA and Landlock - 1 - --- 2018-09-22 Casey Schaufler New
[v4,15/19] LSM: Infrastructure management of the task security LSM: Module stacking for SARA and Landlock - 1 - --- 2018-09-22 Casey Schaufler New
[v4,14/19] LSM: Infrastructure management of the inode security LSM: Module stacking for SARA and Landlock - 1 - --- 2018-09-22 Casey Schaufler New
[v4,13/19] Smack: Abstract use of inode security blob LSM: Module stacking for SARA and Landlock - 1 - --- 2018-09-22 Casey Schaufler New
[v4,12/19] SELinux: Abstract use of inode security blob LSM: Module stacking for SARA and Landlock - 1 - --- 2018-09-22 Casey Schaufler New
[v4,11/19] LSM: Infrastructure management of the file security LSM: Module stacking for SARA and Landlock - 1 - --- 2018-09-22 Casey Schaufler New
[v4,10/19] Smack: Abstract use of file security blob LSM: Module stacking for SARA and Landlock - 1 - --- 2018-09-22 Casey Schaufler New
[v4,09/19] SELinux: Abstract use of file security blob Untitled series #21945 - 1 - --- 2018-09-22 Casey Schaufler New
[v4,08/19] Infrastructure management of the cred security blob LSM: Module stacking for SARA and Landlock - 1 - --- 2018-09-22 Casey Schaufler New
[v4,07/19] TOMOYO: Abstract use of cred security blob LSM: Module stacking for SARA and Landlock - 1 - --- 2018-09-22 Casey Schaufler New
[v4,06/19] AppArmor: Abstract use of cred security blob LSM: Module stacking for SARA and Landlock - 1 - --- 2018-09-22 Casey Schaufler New
[v4,05/19] SELinux: Remove unused selinux_is_enabled LSM: Module stacking for SARA and Landlock - 1 - --- 2018-09-22 Casey Schaufler New
[v4,04/19] SELinux: Remove cred security blob poisoning LSM: Module stacking for SARA and Landlock - 1 - --- 2018-09-22 Casey Schaufler New
[v4,03/19] SELinux: Abstract use of cred security blob LSM: Module stacking for SARA and Landlock - 1 - --- 2018-09-22 Casey Schaufler New
[v4,02/19] Smack: Abstract use of cred security blob LSM: Module stacking for SARA and Landlock - 1 - --- 2018-09-22 Casey Schaufler New
[v4,01/19] procfs: add smack subdir to attrs LSM: Module stacking for SARA and Landlock - 1 - --- 2018-09-22 Casey Schaufler New
[13/34] tomoyo: Implement security hooks for the new mount API [ver #12] VFS: Introduce filesystem context [ver #12] - - - --- 2018-09-21 David Howells New
[12/34] apparmor: Implement security hooks for the new mount API [ver #12] VFS: Introduce filesystem context [ver #12] 1 - - --- 2018-09-21 David Howells New
[11/34] smack: Implement filesystem context security hooks [ver #12] VFS: Introduce filesystem context [ver #12] - - - --- 2018-09-21 David Howells New
[10/34] selinux: Implement the new mount API LSM hooks [ver #12] VFS: Introduce filesystem context [ver #12] - - - --- 2018-09-21 David Howells New
[08/34] vfs: Add LSM hooks for the new mount API [ver #12] VFS: Introduce filesystem context [ver #12] - - - --- 2018-09-21 David Howells New
[v4,21/21] tpm: use u32 instead of int for PCR index tpm: separate tpm 1.x and tpm 2.x commands - 1 - --- 2018-09-21 Winkler, Tomas New
[v4,20/21] tpm1: reimplement tpm1_continue_selftest() using tpm_buf tpm: separate tpm 1.x and tpm 2.x commands - 1 1 --- 2018-09-21 Winkler, Tomas New
[v4,19/21] tpm1: reimplement SAVESTATE using tpm_buf tpm: separate tpm 1.x and tpm 2.x commands - 1 1 --- 2018-09-21 Winkler, Tomas New
[v4,18/21] tmp1: rename tpm1_pcr_read_dev to tpm1_pcr_read(). tpm: separate tpm 1.x and tpm 2.x commands - 1 - --- 2018-09-21 Winkler, Tomas New
[v4,17/21] tpm1: implement tpm1_pcr_read_dev() using tpm_buf structure tpm: separate tpm 1.x and tpm 2.x commands - 1 1 --- 2018-09-21 Winkler, Tomas New
[v4,16/21] tpm: tpm1: rewrite tpm1_get_random() using tpm_buf structure tpm: separate tpm 1.x and tpm 2.x commands - 1 1 --- 2018-09-21 Winkler, Tomas New
[v4,15/21] tpm: tpm-space.c remove unneeded semicolon tpm: separate tpm 1.x and tpm 2.x commands - 1 - --- 2018-09-21 Winkler, Tomas New
« 1 2 ... 83 84 85120 121 »