Show patches with: State = Action Required       |   12071 patches
« 1 2 ... 82 83 84120 121 »
Patch Series A/R/T S/W/F Date Submitter Delegate State
tpm: tpm_try_transmit() refactor error flow. tpm: tpm_try_transmit() refactor error flow. - 1 1 --- 2018-10-16 Winkler, Tomas New
[GIT,PULL] SELinux fixes for v4.19 (#1) [GIT,PULL] SELinux fixes for v4.19 (#1) - - - --- 2018-10-15 Paul Moore New
tpm: tpm_try_transmit() ignore value of go_to_idle() tpm: tpm_try_transmit() ignore value of go_to_idle() - 1 - --- 2018-10-15 Winkler, Tomas New
KEYS: trusted: fix -Wvarags warning KEYS: trusted: fix -Wvarags warning - - - --- 2018-10-11 Nick Desaulniers New
[GIT,PULL] linux-integrity patches for Linux 4.20 [GIT,PULL] linux-integrity patches for Linux 4.20 - - - --- 2018-10-11 Mimi Zohar New
[-next] KEYS: trusted: remove set but not used variable '' [-next] KEYS: trusted: remove set but not used variable '' - - - --- 2018-10-11 Yue Haibing New
[security-next,v5,30/30] capability: Initialize as LSM_ORDER_FIRST LSM: Explict ordering - 1 - --- 2018-10-11 Kees Cook New
[security-next,v5,29/30] LSM: Introduce enum lsm_order LSM: Explict ordering - - - --- 2018-10-11 Kees Cook New
[security-next,v5,28/30] Yama: Initialize as ordered LSM LSM: Explict ordering - 1 - --- 2018-10-11 Kees Cook New
[security-next,v5,27/30] LoadPin: Initialize as ordered LSM LSM: Explict ordering - 1 - --- 2018-10-11 Kees Cook New
[security-next,v5,26/30] LSM: Split LSM preparation from initialization LSM: Explict ordering - - - --- 2018-10-11 Kees Cook New
[security-next,v5,25/30] LSM: Add all exclusive LSMs to ordered initialization LSM: Explict ordering - - - --- 2018-10-11 Kees Cook New
[security-next,v5,24/30] selinux: Remove SECURITY_SELINUX_BOOTPARAM_VALUE LSM: Explict ordering - - - --- 2018-10-11 Kees Cook New
[security-next,v5,23/30] apparmor: Remove SECURITY_APPARMOR_BOOTPARAM_VALUE LSM: Explict ordering - - - --- 2018-10-11 Kees Cook New
[security-next,v5,22/30] LSM: Separate idea of "major" LSM from "exclusive" LSM LSM: Explict ordering - 1 - --- 2018-10-11 Kees Cook New
[security-next,v5,21/30] LSM: Refactor "security=" in terms of enable/disable LSM: Explict ordering - 1 - --- 2018-10-11 Kees Cook New
[security-next,v5,20/30] LSM: Prepare for reorganizing "security=" logic LSM: Explict ordering - 2 - --- 2018-10-11 Kees Cook New
[security-next,v5,19/30] LSM: Tie enabling logic to presence in ordered list LSM: Explict ordering - - - --- 2018-10-11 Kees Cook New
[security-next,v5,18/30] LSM: Introduce "lsm=" for boottime LSM selection LSM: Explict ordering - - - --- 2018-10-11 Kees Cook New
[security-next,v5,17/30] LSM: Introduce CONFIG_LSM LSM: Explict ordering - - - --- 2018-10-11 Kees Cook New
[security-next,v5,16/30] LSM: Build ordered list of LSMs to initialize LSM: Explict ordering - 1 - --- 2018-10-11 Kees Cook New
[security-next,v5,15/30] LSM: Lift LSM selection out of individual LSMs LSM: Explict ordering - 2 - --- 2018-10-11 Kees Cook New
[security-next,v5,14/30] LSM: Plumb visibility into optional "enabled" state LSM: Explict ordering - 2 - --- 2018-10-11 Kees Cook New
[security-next,v5,13/30] LoadPin: Rename boot param "enabled" to "enforce" LSM: Explict ordering - 2 - --- 2018-10-11 Kees Cook New
[security-next,v5,12/30] LSM: Provide separate ordered initialization LSM: Explict ordering - 2 - --- 2018-10-11 Kees Cook New
[security-next,v5,11/30] LSM: Introduce LSM_FLAG_LEGACY_MAJOR LSM: Explict ordering - 2 - --- 2018-10-11 Kees Cook New
[security-next,v5,10/30] LSM: Don't ignore initialization failures LSM: Explict ordering - 2 - --- 2018-10-11 Kees Cook New
[security-next,v5,09/30] LSM: Provide init debugging infrastructure LSM: Explict ordering - 3 - --- 2018-10-11 Kees Cook New
[security-next,v5,08/30] LSM: Record LSM name in struct lsm_info LSM: Explict ordering - 1 - --- 2018-10-11 Kees Cook New
[security-next,v5,07/30] LSM: Convert security_initcall() into DEFINE_LSM() LSM: Explict ordering - 2 - --- 2018-10-11 Kees Cook New
[security-next,v5,06/30] vmlinux.lds.h: Move LSM_TABLE into INIT_DATA LSM: Explict ordering - 3 - --- 2018-10-11 Kees Cook New
[security-next,v5,05/30] LSM: Convert from initcall to struct lsm_info LSM: Explict ordering - 3 - --- 2018-10-11 Kees Cook New
[security-next,v5,04/30] LSM: Remove initcall tracing LSM: Explict ordering - 2 - --- 2018-10-11 Kees Cook New
[security-next,v5,03/30] LSM: Rename .security_initcall section to .lsm_info LSM: Explict ordering - 3 - --- 2018-10-11 Kees Cook New
[security-next,v5,02/30] vmlinux.lds.h: Avoid copy/paste of security_init section LSM: Explict ordering - 3 - --- 2018-10-11 Kees Cook New
[security-next,v5,01/30] LSM: Correctly announce start of LSM initialization LSM: Explict ordering - 3 - --- 2018-10-11 Kees Cook New
[v6,5/5] x86/ima: define arch_get_ima_policy() for x86 Add support for architecture specific IMA policies - - - --- 2018-10-09 Nayna New
[v6,4/5] ima: add support for arch specific policies Add support for architecture specific IMA policies - - - --- 2018-10-09 Nayna New
[v6,3/5] ima: refactor ima_init_policy() Add support for architecture specific IMA policies - - - --- 2018-10-09 Nayna New
[v6,2/5] ima: prevent kexec_load syscall based on runtime secureboot flag Add support for architecture specific IMA policies - - - --- 2018-10-09 Nayna New
[v6,1/5] x86/ima: define arch_ima_get_secureboot Add support for architecture specific IMA policies - - - --- 2018-10-09 Nayna New
[22/22] KEYS: asym_tpm: Add support for the sign operation [ver #2] KEYS: Support TPM-wrapped key and crypto ops [ver #2] - 1 1 --- 2018-10-09 David Howells New
[21/22] KEYS: asym_tpm: Implement tpm_sign [ver #2] KEYS: Support TPM-wrapped key and crypto ops [ver #2] - 1 1 --- 2018-10-09 David Howells New
[20/22] KEYS: asym_tpm: Implement signature verification [ver #2] KEYS: Support TPM-wrapped key and crypto ops [ver #2] - 1 1 --- 2018-10-09 David Howells New
[19/22] KEYS: asym_tpm: Implement the decrypt operation [ver #2] KEYS: Support TPM-wrapped key and crypto ops [ver #2] - 1 1 --- 2018-10-09 David Howells New
[18/22] KEYS: asym_tpm: Implement tpm_unbind [ver #2] KEYS: Support TPM-wrapped key and crypto ops [ver #2] - 2 1 --- 2018-10-09 David Howells New
[17/22] KEYS: asym_tpm: Add loadkey2 and flushspecific [ver #2] KEYS: Support TPM-wrapped key and crypto ops [ver #2] - 2 1 --- 2018-10-09 David Howells New
[16/22] KEYS: Move trusted.h to include/keys [ver #2] KEYS: Support TPM-wrapped key and crypto ops [ver #2] - 1 1 --- 2018-10-09 David Howells New
[15/22] KEYS: trusted: Expose common functionality [ver #2] KEYS: Support TPM-wrapped key and crypto ops [ver #2] - 1 1 --- 2018-10-09 David Howells New
[14/22] KEYS: asym_tpm: Implement encryption operation [ver #2] KEYS: Support TPM-wrapped key and crypto ops [ver #2] - 1 1 --- 2018-10-09 David Howells New
[13/22] KEYS: asym_tpm: Implement pkey_query [ver #2] KEYS: Support TPM-wrapped key and crypto ops [ver #2] - 1 1 --- 2018-10-09 David Howells New
[12/22] KEYS: Add parser for TPM-based keys [ver #2] KEYS: Support TPM-wrapped key and crypto ops [ver #2] - 1 1 --- 2018-10-09 David Howells New
[11/22] KEYS: asym_tpm: extract key size & public key [ver #2] KEYS: Support TPM-wrapped key and crypto ops [ver #2] - 1 1 --- 2018-10-09 David Howells New
[10/22] KEYS: asym_tpm: add skeleton for asym_tpm [ver #2] KEYS: Support TPM-wrapped key and crypto ops [ver #2] - 1 1 --- 2018-10-09 David Howells New
[09/22] crypto: rsa-pkcs1pad: Allow hash to be optional [ver #2] KEYS: Support TPM-wrapped key and crypto ops [ver #2] - 1 1 --- 2018-10-09 David Howells New
[08/22] KEYS: Implement PKCS#8 RSA Private Key parser [ver #2] KEYS: Support TPM-wrapped key and crypto ops [ver #2] - 2 2 --- 2018-10-09 David Howells New
[07/22] KEYS: Implement encrypt, decrypt and sign for software asymmetric key [ver #2] KEYS: Support TPM-wrapped key and crypto ops [ver #2] - 2 2 --- 2018-10-09 David Howells New
[06/22] KEYS: Allow the public_key struct to hold a private key [ver #2] KEYS: Support TPM-wrapped key and crypto ops [ver #2] - 2 2 --- 2018-10-09 David Howells New
[05/22] KEYS: Provide software public key query function [ver #2] KEYS: Support TPM-wrapped key and crypto ops [ver #2] - 2 2 --- 2018-10-09 David Howells New
[04/22] KEYS: Make the X.509 and PKCS7 parsers supply the sig encoding type [ver #2] KEYS: Support TPM-wrapped key and crypto ops [ver #2] - 2 2 --- 2018-10-09 David Howells New
[03/22] KEYS: Provide missing asymmetric key subops for new key type ops [ver #2] KEYS: Support TPM-wrapped key and crypto ops [ver #2] - 2 2 --- 2018-10-09 David Howells New
[02/22] KEYS: Provide keyctls to drive the new key type ops for asymmetric keys [ver #2] KEYS: Support TPM-wrapped key and crypto ops [ver #2] - 2 2 --- 2018-10-09 David Howells New
[01/22] KEYS: Provide key type operations for asymmetric key ops [ver #2] KEYS: Support TPM-wrapped key and crypto ops [ver #2] - 2 2 --- 2018-10-09 David Howells New
security: fix LSM description location security: fix LSM description location 1 - - --- 2018-10-09 Randy Dunlap New
[v5,5/5] x86/ima: define arch_get_ima_policy() for x86 Add support for architecture specific IMA policies - - - --- 2018-10-05 Nayna New
[v5,4/5] ima: add support for arch specific policies Add support for architecture specific IMA policies - - - --- 2018-10-05 Nayna New
[v5,3/5] ima: refactor ima_init_policy() Add support for architecture specific IMA policies - - - --- 2018-10-05 Nayna New
[v5,2/5] ima: prevent kexec_load syscall based on runtime secureboot flag Add support for architecture specific IMA policies - - - --- 2018-10-05 Nayna New
[v5,1/5] x86/ima: define arch_ima_get_secureboot Add support for architecture specific IMA policies - - - --- 2018-10-05 Nayna New
apparmor: add #ifdef checks for secmark filtering apparmor: add #ifdef checks for secmark filtering - - - --- 2018-10-05 Arnd Bergmann New
[GIT,PULL] tpmdd updates for Linux 4.20 [GIT,PULL] tpmdd updates for Linux 4.20 - - - --- 2018-10-05 Jarkko Sakkinen New
[15/16] apparmor: Replace spin_is_locked() with lockdep Untitled series #26011 1 - - --- 2018-10-03 Lance Roy New
[security-next,v4,32/32] LSM: Add all exclusive LSMs to ordered initialization LSM: Explict LSM ordering - 1 - --- 2018-10-02 Kees Cook New
[security-next,v4,31/32] LSM: Separate idea of "major" LSM from "exclusive" LSM LSM: Explict LSM ordering - 1 - --- 2018-10-02 Kees Cook New
[security-next,v4,30/32] capability: Initialize as LSM_ORDER_FIRST LSM: Explict LSM ordering - 1 - --- 2018-10-02 Kees Cook New
[security-next,v4,29/32] LSM: Introduce enum lsm_order LSM: Explict LSM ordering - 1 - --- 2018-10-02 Kees Cook New
[security-next,v4,28/32] Yama: Initialize as ordered LSM LSM: Explict LSM ordering - 1 - --- 2018-10-02 Kees Cook New
[security-next,v4,27/32] LoadPin: Initialize as ordered LSM LSM: Explict LSM ordering - 1 - --- 2018-10-02 Kees Cook New
[security-next,v4,26/32] LSM: Introduce "lsm.order=" for boottime ordering LSM: Explict LSM ordering - 1 - --- 2018-10-02 Kees Cook New
[security-next,v4,25/32] LSM: Introduce CONFIG_LSM_ORDER LSM: Explict LSM ordering - 1 - --- 2018-10-02 Kees Cook New
[security-next,v4,24/32] LSM: Build ordered list of ordered LSMs for init LSM: Explict LSM ordering - 1 - --- 2018-10-02 Kees Cook New
[security-next,v4,23/32] selinux: Remove boot parameter LSM: Explict LSM ordering - - - --- 2018-10-02 Kees Cook New
[security-next,v4,22/32] apparmor: Remove boot parameter LSM: Explict LSM ordering - - - --- 2018-10-02 Kees Cook New
[security-next,v4,21/32] LSM: Finalize centralized LSM enabling logic LSM: Explict LSM ordering - - - --- 2018-10-02 Kees Cook New
[security-next,v4,20/32] LSM: Refactor "security=" in terms of enable/disable LSM: Explict LSM ordering - 1 - --- 2018-10-02 Kees Cook New
[security-next,v4,19/32] LSM: Prepare for reorganizing "security=" logic LSM: Explict LSM ordering - 2 - --- 2018-10-02 Kees Cook New
[security-next,v4,18/32] LSM: Introduce lsm.enable= and lsm.disable= LSM: Explict LSM ordering - 1 - --- 2018-10-02 Kees Cook New
[security-next,v4,17/32] LSM: Introduce CONFIG_LSM_ENABLE LSM: Explict LSM ordering - 1 - --- 2018-10-02 Kees Cook New
[security-next,v4,16/32] LSM: Prepare for arbitrary LSM enabling LSM: Explict LSM ordering - 2 - --- 2018-10-02 Kees Cook New
[security-next,v4,15/32] LSM: Lift LSM selection out of individual LSMs LSM: Explict LSM ordering - 2 - --- 2018-10-02 Kees Cook New
[security-next,v4,14/32] LSM: Plumb visibility into optional "enabled" state LSM: Explict LSM ordering - 2 - --- 2018-10-02 Kees Cook New
[security-next,v4,13/32] LoadPin: Rename "enable" to "enforce" LSM: Explict LSM ordering - 2 - --- 2018-10-02 Kees Cook New
[security-next,v4,12/32] LSM: Provide separate ordered initialization LSM: Explict LSM ordering - 2 - --- 2018-10-02 Kees Cook New
[security-next,v4,11/32] LSM: Introduce LSM_FLAG_LEGACY_MAJOR LSM: Explict LSM ordering - 2 - --- 2018-10-02 Kees Cook New
[security-next,v4,10/32] LSM: Don't ignore initialization failures LSM: Explict LSM ordering - 2 - --- 2018-10-02 Kees Cook New
[security-next,v4,09/32] LSM: Provide init debugging infrastructure LSM: Explict LSM ordering - 3 - --- 2018-10-02 Kees Cook New
[security-next,v4,08/32] LSM: Record LSM name in struct lsm_info LSM: Explict LSM ordering - 1 - --- 2018-10-02 Kees Cook New
[security-next,v4,07/32] LSM: Convert security_initcall() into DEFINE_LSM() LSM: Explict LSM ordering - 2 - --- 2018-10-02 Kees Cook New
[security-next,v4,06/32] vmlinux.lds.h: Move LSM_TABLE into INIT_DATA LSM: Explict LSM ordering - 3 - --- 2018-10-02 Kees Cook New
[security-next,v4,05/32] LSM: Convert from initcall to struct lsm_info LSM: Explict LSM ordering - 3 - --- 2018-10-02 Kees Cook New
« 1 2 ... 82 83 84120 121 »