Show patches with: State = Action Required       |   12042 patches
« 1 2 ... 82 83 84120 121 »
Patch Series A/R/T S/W/F Date Submitter Delegate State
[security-next,v5,07/30] LSM: Convert security_initcall() into DEFINE_LSM() LSM: Explict ordering - 2 - --- 2018-10-11 Kees Cook New
[security-next,v5,06/30] vmlinux.lds.h: Move LSM_TABLE into INIT_DATA LSM: Explict ordering - 3 - --- 2018-10-11 Kees Cook New
[security-next,v5,05/30] LSM: Convert from initcall to struct lsm_info LSM: Explict ordering - 3 - --- 2018-10-11 Kees Cook New
[security-next,v5,04/30] LSM: Remove initcall tracing LSM: Explict ordering - 2 - --- 2018-10-11 Kees Cook New
[security-next,v5,03/30] LSM: Rename .security_initcall section to .lsm_info LSM: Explict ordering - 3 - --- 2018-10-11 Kees Cook New
[security-next,v5,02/30] vmlinux.lds.h: Avoid copy/paste of security_init section LSM: Explict ordering - 3 - --- 2018-10-11 Kees Cook New
[security-next,v5,01/30] LSM: Correctly announce start of LSM initialization LSM: Explict ordering - 3 - --- 2018-10-11 Kees Cook New
[v6,5/5] x86/ima: define arch_get_ima_policy() for x86 Add support for architecture specific IMA policies - - - --- 2018-10-09 Nayna New
[v6,4/5] ima: add support for arch specific policies Add support for architecture specific IMA policies - - - --- 2018-10-09 Nayna New
[v6,3/5] ima: refactor ima_init_policy() Add support for architecture specific IMA policies - - - --- 2018-10-09 Nayna New
[v6,2/5] ima: prevent kexec_load syscall based on runtime secureboot flag Add support for architecture specific IMA policies - - - --- 2018-10-09 Nayna New
[v6,1/5] x86/ima: define arch_ima_get_secureboot Add support for architecture specific IMA policies - - - --- 2018-10-09 Nayna New
[22/22] KEYS: asym_tpm: Add support for the sign operation [ver #2] KEYS: Support TPM-wrapped key and crypto ops [ver #2] - 1 1 --- 2018-10-09 David Howells New
[21/22] KEYS: asym_tpm: Implement tpm_sign [ver #2] KEYS: Support TPM-wrapped key and crypto ops [ver #2] - 1 1 --- 2018-10-09 David Howells New
[20/22] KEYS: asym_tpm: Implement signature verification [ver #2] KEYS: Support TPM-wrapped key and crypto ops [ver #2] - 1 1 --- 2018-10-09 David Howells New
[19/22] KEYS: asym_tpm: Implement the decrypt operation [ver #2] KEYS: Support TPM-wrapped key and crypto ops [ver #2] - 1 1 --- 2018-10-09 David Howells New
[18/22] KEYS: asym_tpm: Implement tpm_unbind [ver #2] KEYS: Support TPM-wrapped key and crypto ops [ver #2] - 2 1 --- 2018-10-09 David Howells New
[17/22] KEYS: asym_tpm: Add loadkey2 and flushspecific [ver #2] KEYS: Support TPM-wrapped key and crypto ops [ver #2] - 2 1 --- 2018-10-09 David Howells New
[16/22] KEYS: Move trusted.h to include/keys [ver #2] KEYS: Support TPM-wrapped key and crypto ops [ver #2] - 1 1 --- 2018-10-09 David Howells New
[15/22] KEYS: trusted: Expose common functionality [ver #2] KEYS: Support TPM-wrapped key and crypto ops [ver #2] - 1 1 --- 2018-10-09 David Howells New
[14/22] KEYS: asym_tpm: Implement encryption operation [ver #2] KEYS: Support TPM-wrapped key and crypto ops [ver #2] - 1 1 --- 2018-10-09 David Howells New
[13/22] KEYS: asym_tpm: Implement pkey_query [ver #2] KEYS: Support TPM-wrapped key and crypto ops [ver #2] - 1 1 --- 2018-10-09 David Howells New
[12/22] KEYS: Add parser for TPM-based keys [ver #2] KEYS: Support TPM-wrapped key and crypto ops [ver #2] - 1 1 --- 2018-10-09 David Howells New
[11/22] KEYS: asym_tpm: extract key size & public key [ver #2] KEYS: Support TPM-wrapped key and crypto ops [ver #2] - 1 1 --- 2018-10-09 David Howells New
[10/22] KEYS: asym_tpm: add skeleton for asym_tpm [ver #2] KEYS: Support TPM-wrapped key and crypto ops [ver #2] - 1 1 --- 2018-10-09 David Howells New
[09/22] crypto: rsa-pkcs1pad: Allow hash to be optional [ver #2] KEYS: Support TPM-wrapped key and crypto ops [ver #2] - 1 1 --- 2018-10-09 David Howells New
[08/22] KEYS: Implement PKCS#8 RSA Private Key parser [ver #2] KEYS: Support TPM-wrapped key and crypto ops [ver #2] - 2 2 --- 2018-10-09 David Howells New
[07/22] KEYS: Implement encrypt, decrypt and sign for software asymmetric key [ver #2] KEYS: Support TPM-wrapped key and crypto ops [ver #2] - 2 2 --- 2018-10-09 David Howells New
[06/22] KEYS: Allow the public_key struct to hold a private key [ver #2] KEYS: Support TPM-wrapped key and crypto ops [ver #2] - 2 2 --- 2018-10-09 David Howells New
[05/22] KEYS: Provide software public key query function [ver #2] KEYS: Support TPM-wrapped key and crypto ops [ver #2] - 2 2 --- 2018-10-09 David Howells New
[04/22] KEYS: Make the X.509 and PKCS7 parsers supply the sig encoding type [ver #2] KEYS: Support TPM-wrapped key and crypto ops [ver #2] - 2 2 --- 2018-10-09 David Howells New
[03/22] KEYS: Provide missing asymmetric key subops for new key type ops [ver #2] KEYS: Support TPM-wrapped key and crypto ops [ver #2] - 2 2 --- 2018-10-09 David Howells New
[02/22] KEYS: Provide keyctls to drive the new key type ops for asymmetric keys [ver #2] KEYS: Support TPM-wrapped key and crypto ops [ver #2] - 2 2 --- 2018-10-09 David Howells New
[01/22] KEYS: Provide key type operations for asymmetric key ops [ver #2] KEYS: Support TPM-wrapped key and crypto ops [ver #2] - 2 2 --- 2018-10-09 David Howells New
security: fix LSM description location security: fix LSM description location 1 - - --- 2018-10-09 Randy Dunlap New
[v5,5/5] x86/ima: define arch_get_ima_policy() for x86 Add support for architecture specific IMA policies - - - --- 2018-10-05 Nayna New
[v5,4/5] ima: add support for arch specific policies Add support for architecture specific IMA policies - - - --- 2018-10-05 Nayna New
[v5,3/5] ima: refactor ima_init_policy() Add support for architecture specific IMA policies - - - --- 2018-10-05 Nayna New
[v5,2/5] ima: prevent kexec_load syscall based on runtime secureboot flag Add support for architecture specific IMA policies - - - --- 2018-10-05 Nayna New
[v5,1/5] x86/ima: define arch_ima_get_secureboot Add support for architecture specific IMA policies - - - --- 2018-10-05 Nayna New
apparmor: add #ifdef checks for secmark filtering apparmor: add #ifdef checks for secmark filtering - - - --- 2018-10-05 Arnd Bergmann New
[GIT,PULL] tpmdd updates for Linux 4.20 [GIT,PULL] tpmdd updates for Linux 4.20 - - - --- 2018-10-05 Jarkko Sakkinen New
[15/16] apparmor: Replace spin_is_locked() with lockdep Untitled series #26011 1 - - --- 2018-10-03 Lance Roy New
[security-next,v4,32/32] LSM: Add all exclusive LSMs to ordered initialization LSM: Explict LSM ordering - 1 - --- 2018-10-02 Kees Cook New
[security-next,v4,31/32] LSM: Separate idea of "major" LSM from "exclusive" LSM LSM: Explict LSM ordering - 1 - --- 2018-10-02 Kees Cook New
[security-next,v4,30/32] capability: Initialize as LSM_ORDER_FIRST LSM: Explict LSM ordering - 1 - --- 2018-10-02 Kees Cook New
[security-next,v4,29/32] LSM: Introduce enum lsm_order LSM: Explict LSM ordering - 1 - --- 2018-10-02 Kees Cook New
[security-next,v4,28/32] Yama: Initialize as ordered LSM LSM: Explict LSM ordering - 1 - --- 2018-10-02 Kees Cook New
[security-next,v4,27/32] LoadPin: Initialize as ordered LSM LSM: Explict LSM ordering - 1 - --- 2018-10-02 Kees Cook New
[security-next,v4,26/32] LSM: Introduce "lsm.order=" for boottime ordering LSM: Explict LSM ordering - 1 - --- 2018-10-02 Kees Cook New
[security-next,v4,25/32] LSM: Introduce CONFIG_LSM_ORDER LSM: Explict LSM ordering - 1 - --- 2018-10-02 Kees Cook New
[security-next,v4,24/32] LSM: Build ordered list of ordered LSMs for init LSM: Explict LSM ordering - 1 - --- 2018-10-02 Kees Cook New
[security-next,v4,23/32] selinux: Remove boot parameter LSM: Explict LSM ordering - - - --- 2018-10-02 Kees Cook New
[security-next,v4,22/32] apparmor: Remove boot parameter LSM: Explict LSM ordering - - - --- 2018-10-02 Kees Cook New
[security-next,v4,21/32] LSM: Finalize centralized LSM enabling logic LSM: Explict LSM ordering - - - --- 2018-10-02 Kees Cook New
[security-next,v4,20/32] LSM: Refactor "security=" in terms of enable/disable LSM: Explict LSM ordering - 1 - --- 2018-10-02 Kees Cook New
[security-next,v4,19/32] LSM: Prepare for reorganizing "security=" logic LSM: Explict LSM ordering - 2 - --- 2018-10-02 Kees Cook New
[security-next,v4,18/32] LSM: Introduce lsm.enable= and lsm.disable= LSM: Explict LSM ordering - 1 - --- 2018-10-02 Kees Cook New
[security-next,v4,17/32] LSM: Introduce CONFIG_LSM_ENABLE LSM: Explict LSM ordering - 1 - --- 2018-10-02 Kees Cook New
[security-next,v4,16/32] LSM: Prepare for arbitrary LSM enabling LSM: Explict LSM ordering - 2 - --- 2018-10-02 Kees Cook New
[security-next,v4,15/32] LSM: Lift LSM selection out of individual LSMs LSM: Explict LSM ordering - 2 - --- 2018-10-02 Kees Cook New
[security-next,v4,14/32] LSM: Plumb visibility into optional "enabled" state LSM: Explict LSM ordering - 2 - --- 2018-10-02 Kees Cook New
[security-next,v4,13/32] LoadPin: Rename "enable" to "enforce" LSM: Explict LSM ordering - 2 - --- 2018-10-02 Kees Cook New
[security-next,v4,12/32] LSM: Provide separate ordered initialization LSM: Explict LSM ordering - 2 - --- 2018-10-02 Kees Cook New
[security-next,v4,11/32] LSM: Introduce LSM_FLAG_LEGACY_MAJOR LSM: Explict LSM ordering - 2 - --- 2018-10-02 Kees Cook New
[security-next,v4,10/32] LSM: Don't ignore initialization failures LSM: Explict LSM ordering - 2 - --- 2018-10-02 Kees Cook New
[security-next,v4,09/32] LSM: Provide init debugging infrastructure LSM: Explict LSM ordering - 3 - --- 2018-10-02 Kees Cook New
[security-next,v4,08/32] LSM: Record LSM name in struct lsm_info LSM: Explict LSM ordering - 1 - --- 2018-10-02 Kees Cook New
[security-next,v4,07/32] LSM: Convert security_initcall() into DEFINE_LSM() LSM: Explict LSM ordering - 2 - --- 2018-10-02 Kees Cook New
[security-next,v4,06/32] vmlinux.lds.h: Move LSM_TABLE into INIT_DATA LSM: Explict LSM ordering - 3 - --- 2018-10-02 Kees Cook New
[security-next,v4,05/32] LSM: Convert from initcall to struct lsm_info LSM: Explict LSM ordering - 3 - --- 2018-10-02 Kees Cook New
[security-next,v4,04/32] LSM: Remove initcall tracing LSM: Explict LSM ordering - 2 - --- 2018-10-02 Kees Cook New
[security-next,v4,03/32] LSM: Rename .security_initcall section to .lsm_info LSM: Explict LSM ordering - 3 - --- 2018-10-02 Kees Cook New
[security-next,v4,02/32] vmlinux.lds.h: Avoid copy/paste of security_init section LSM: Explict LSM ordering - 3 - --- 2018-10-02 Kees Cook New
[security-next,v4,01/32] LSM: Correctly announce start of LSM initialization LSM: Explict LSM ordering - 3 - --- 2018-10-02 Kees Cook New
[v5,21/21] tpm: use u32 instead of int for PCR index tpm: separate tpm 1.x and tpm 2.x commands - 1 1 --- 2018-09-28 Winkler, Tomas New
[v5,20/21] tpm1: reimplement tpm1_continue_selftest() using tpm_buf tpm: separate tpm 1.x and tpm 2.x commands - 2 2 --- 2018-09-28 Winkler, Tomas New
[v5,19/21] tpm1: reimplement SAVESTATE using tpm_buf tpm: separate tpm 1.x and tpm 2.x commands - 1 1 --- 2018-09-28 Winkler, Tomas New
[v5,18/21] tmp1: rename tpm1_pcr_read_dev to tpm1_pcr_read(). tpm: separate tpm 1.x and tpm 2.x commands - 1 - --- 2018-09-28 Winkler, Tomas New
[v5,17/21] tpm1: implement tpm1_pcr_read_dev() using tpm_buf structure tpm: separate tpm 1.x and tpm 2.x commands - 1 1 --- 2018-09-28 Winkler, Tomas New
[v5,16/21] tpm: tpm1: rewrite tpm1_get_random() using tpm_buf structure tpm: separate tpm 1.x and tpm 2.x commands - 1 1 --- 2018-09-28 Winkler, Tomas New
[v5,15/21] tpm: tpm-space.c remove unneeded semicolon tpm: separate tpm 1.x and tpm 2.x commands - 1 - --- 2018-09-28 Winkler, Tomas New
[v5,14/21] tpm: tpm-interface.c drop unused macros tpm: separate tpm 1.x and tpm 2.x commands - 1 - --- 2018-09-28 Winkler, Tomas New
[v5,13/21] tpm: add tpm_auto_startup() into tpm-interface.c tpm: separate tpm 1.x and tpm 2.x commands - 1 1 --- 2018-09-28 Winkler, Tomas New
[v5,12/21] tpm: move pcr extend code to tpm2-cmd.c tpm: separate tpm 1.x and tpm 2.x commands - - - --- 2018-09-28 Winkler, Tomas New
[v5,11/21] tpm: factor out tpm_startup function tpm: separate tpm 1.x and tpm 2.x commands - 1 1 --- 2018-09-28 Winkler, Tomas New
[v5,10/21] tpm: factor out tpm 1.x pm suspend flow into tpm1-cmd.c tpm: separate tpm 1.x and tpm 2.x commands - 1 1 --- 2018-09-28 Winkler, Tomas New
[v5,09/21] tpm: move tpm 1.x selftest code from tpm-interface.c tpm1-cmd.c tpm: separate tpm 1.x and tpm 2.x commands - 1 1 --- 2018-09-28 Winkler, Tomas New
[v5,08/21] tpm: factor out tpm1_get_random into tpm1-cmd.c tpm: separate tpm 1.x and tpm 2.x commands - 2 1 --- 2018-09-28 Winkler, Tomas New
[v5,07/21] tpm: move tpm_getcap to tpm1-cmd.c tpm: separate tpm 1.x and tpm 2.x commands - 1 1 --- 2018-09-28 Winkler, Tomas New
[v5,06/21] tpm: move tpm1_pcr_extend to tpm1-cmd.c tpm: separate tpm 1.x and tpm 2.x commands - 2 1 --- 2018-09-28 Winkler, Tomas New
[v5,05/21] tpm: factor out tpm_get_timeouts() tpm: separate tpm 1.x and tpm 2.x commands - 1 1 --- 2018-09-28 Winkler, Tomas New
[v5,04/21] tpm: add tpm_calc_ordinal_duration() wrapper tpm: separate tpm 1.x and tpm 2.x commands - 1 1 --- 2018-09-28 Winkler, Tomas New
[v5,03/21] tpm: factor out tpm 1.x duration calculation to tpm1-cmd.c tpm: separate tpm 1.x and tpm 2.x commands - - 1 --- 2018-09-28 Winkler, Tomas New
[v5,02/21] tpm: sort objects in the Makefile tpm: separate tpm 1.x and tpm 2.x commands - 1 1 --- 2018-09-28 Winkler, Tomas New
[v5,01/21] tpm2: add new tpm2 commands according to TCG 1.36 tpm: separate tpm 1.x and tpm 2.x commands - 1 1 --- 2018-09-28 Winkler, Tomas New
keys: Fix the use of the C++ keyword "private" in uapi/linux/keyctl.h keys: Fix the use of the C++ keyword "private" in uapi/linux/keyctl.h - - - --- 2018-09-27 David Howells New
apparmor: Fix uninitialized value in aa_split_fqname apparmor: Fix uninitialized value in aa_split_fqname - 1 - --- 2018-09-27 Zubin Mithra New
[6/5] capability: Repair sidechannel test in ptrace LSM: Add and use a hook for side-channel safety checks - 1 - --- 2018-09-27 Schaufler, Casey New
[21/19] LSM: Cleanup and fixes from Tetsuo Handa LSM: Module stacking for SARA and Landlock - - - --- 2018-09-26 Casey Schaufler New
« 1 2 ... 82 83 84120 121 »