Show patches with: none      |   15534 patches
« 1 2 ... 112 113 114155 156 »
Patch Series A/R/T S/W/F Date Submitter Delegate State
[v5,25/38] AppArmor: Abstract use of cred security blob LSM: Module stacking for SARA and Landlock - 1 - --- 2018-12-11 Casey Schaufler New
[v5,24/38] SELinux: Remove unused selinux_is_enabled LSM: Module stacking for SARA and Landlock - 1 - --- 2018-12-11 Casey Schaufler New
[v5,23/38] SELinux: Remove cred security blob poisoning LSM: Module stacking for SARA and Landlock - 1 - --- 2018-12-11 Casey Schaufler New
[v5,22/38] SELinux: Abstract use of cred security blob LSM: Module stacking for SARA and Landlock - 1 - --- 2018-12-11 Casey Schaufler New
[v5,21/38] Smack: Abstract use of cred security blob LSM: Module stacking for SARA and Landlock - 1 - --- 2018-12-11 Casey Schaufler New
[v5,20/38] procfs: add smack subdir to attrs LSM: Module stacking for SARA and Landlock - 1 - --- 2018-12-11 Casey Schaufler New
[v5,19/38] capability: Initialize as LSM_ORDER_FIRST LSM: Module stacking for SARA and Landlock - 1 - --- 2018-12-11 Casey Schaufler New
[v5,18/38] LSM: Introduce enum lsm_order LSM: Module stacking for SARA and Landlock - - - --- 2018-12-11 Casey Schaufler New
[v5,17/38] Yama: Initialize as ordered LSM LSM: Module stacking for SARA and Landlock - 1 - --- 2018-12-11 Casey Schaufler New
[v5,16/38] LoadPin: Initialize as ordered LSM LSM: Module stacking for SARA and Landlock - 1 - --- 2018-12-11 Casey Schaufler New
[v5,15/38] LSM: Split LSM preparation from initialization LSM: Module stacking for SARA and Landlock - - - --- 2018-12-11 Casey Schaufler New
[v5,14/38] LSM: Add all exclusive LSMs to ordered initialization LSM: Module stacking for SARA and Landlock - - - --- 2018-12-11 Casey Schaufler New
[v5,13/38] selinux: Remove SECURITY_SELINUX_BOOTPARAM_VALUE LSM: Module stacking for SARA and Landlock - - - --- 2018-12-11 Casey Schaufler New
[v5,12/38] apparmor: Remove SECURITY_APPARMOR_BOOTPARAM_VALUE LSM: Module stacking for SARA and Landlock - - - --- 2018-12-11 Casey Schaufler New
[v5,11/38] LSM: Separate idea of "major" LSM from "exclusive" LSM LSM: Module stacking for SARA and Landlock - 1 - --- 2018-12-11 Casey Schaufler New
[v5,10/38] LSM: Refactor "security=" in terms of enable/disable LSM: Module stacking for SARA and Landlock - 1 - --- 2018-12-11 Casey Schaufler New
[v5,09/38] LSM: Prepare for reorganizing "security=" logic LSM: Module stacking for SARA and Landlock - 2 - --- 2018-12-11 Casey Schaufler New
[v5,08/38] LSM: Tie enabling logic to presence in ordered list LSM: Module stacking for SARA and Landlock - - - --- 2018-12-11 Casey Schaufler New
[v5,07/38] LSM: Introduce "lsm=" for boottime LSM selection LSM: Module stacking for SARA and Landlock - - - --- 2018-12-11 Casey Schaufler New
[v5,06/38] LSM: Introduce CONFIG_LSM LSM: Module stacking for SARA and Landlock - - - --- 2018-12-11 Casey Schaufler New
[v5,05/38] LSM: Build ordered list of LSMs to initialize LSM: Module stacking for SARA and Landlock - 1 - --- 2018-12-11 Casey Schaufler New
[v5,04/38] LSM: Lift LSM selection out of individual LSMs LSM: Module stacking for SARA and Landlock - 2 - --- 2018-12-11 Casey Schaufler New
[v5,03/38] LSM: Plumb visibility into optional "enabled" state LSM: Module stacking for SARA and Landlock - 2 - --- 2018-12-11 Casey Schaufler New
[v5,02/38] LSM: Provide separate ordered initialization LSM: Module stacking for SARA and Landlock - 2 - --- 2018-12-11 Casey Schaufler New
[v5,01/38] LSM: Introduce LSM_FLAG_LEGACY_MAJOR LSM: Module stacking for SARA and Landlock - 2 - --- 2018-12-11 Casey Schaufler New
ima: Use inode_is_open_for_write ima: Use inode_is_open_for_write - - - --- 2018-12-11 Nikolay Borisov New
[5/5] security: integrity: make ima_main explicitly non-modular security: remove needless usage of module header - - - --- 2018-12-09 Paul Gortmaker New
[4/5] security: integrity: make evm_main explicitly non-modular security: remove needless usage of module header - - - --- 2018-12-09 Paul Gortmaker New
[3/5] security: fs: make inode explicitly non-modular security: remove needless usage of module header - - - --- 2018-12-09 Paul Gortmaker New
[2/5] keys: remove needless modular infrastructure from ecryptfs_format security: remove needless usage of module header - - - --- 2018-12-09 Paul Gortmaker New
[1/5] security: audit and remove any unnecessary uses of module.h security: remove needless usage of module header - - - --- 2018-12-09 Paul Gortmaker New
[v2,1/7] integrity: Define a trusted platform keyring [v2,1/7] integrity: Define a trusted platform keyring 1 2 - --- 2018-12-09 Nayna Jain New
[v2,7/7] ima: Support platform keyring for kernel appraisal add platform/firmware keys support for kernel verification by IMA 1 3 - --- 2018-12-08 Nayna Jain New
[v2,6/7] efi: Allow the "db" UEFI variable to be suppressed add platform/firmware keys support for kernel verification by IMA 2 1 - --- 2018-12-08 Nayna Jain New
[v2,5/7] efi: Import certificates from UEFI Secure Boot add platform/firmware keys support for kernel verification by IMA - - - --- 2018-12-08 Nayna Jain New
[v2,4/7] efi: Add an EFI signature blob parser add platform/firmware keys support for kernel verification by IMA 1 - - --- 2018-12-08 Nayna Jain New
[v2,3/7] efi: Add EFI signature data types add platform/firmware keys support for kernel verification by IMA 2 1 - --- 2018-12-08 Nayna Jain New
[v2,2/7] integrity: Load certs to the platform keyring add platform/firmware keys support for kernel verification by IMA 1 3 - --- 2018-12-08 Nayna Jain New
[v2,1/7] integrity: Define a trusted platform keyring add platform/firmware keys support for kernel verification by IMA 1 2 - --- 2018-12-08 Nayna Jain New
tpm-dev: Require response to be read only if there actually is a response tpm-dev: Require response to be read only if there actually is a response - - - --- 2018-12-06 Alexander Steffen New
[v7,14/14] module: Prevent module removal racing with text_poke() x86/alternative: text_poke() enhancements - - - --- 2018-12-05 Nadav Amit New
[v7,13/14] module: Do not set nx for module memory before freeing x86/alternative: text_poke() enhancements - - - --- 2018-12-05 Nadav Amit New
[v7,12/14] x86/alternative: Remove the return value of text_poke_*() x86/alternative: text_poke() enhancements - - - --- 2018-12-05 Nadav Amit New
[v7,11/14] x86/jump-label: remove support for custom poker x86/alternative: text_poke() enhancements - - - --- 2018-12-05 Nadav Amit New
[v7,10/14] x86: avoid W^X being broken during modules loading x86/alternative: text_poke() enhancements - - - --- 2018-12-05 Nadav Amit New
[v7,09/14] x86/kprobes: Instruction pages initialization enhancements x86/alternative: text_poke() enhancements 1 - - --- 2018-12-05 Nadav Amit New
[v7,08/14] x86/ftrace: Use text_poke_*() infrastructure x86/alternative: text_poke() enhancements - - - --- 2018-12-05 Nadav Amit New
[v7,07/14] x86/kgdb: avoid redundant comparison of patched code x86/alternative: text_poke() enhancements - - - --- 2018-12-05 Nadav Amit New
[v7,06/14] x86/alternative: use temporary mm for text poking x86/alternative: text_poke() enhancements - - - --- 2018-12-05 Nadav Amit New
[v7,05/14] x86/alternative: initializing temporary mm for patching x86/alternative: text_poke() enhancements - 1 1 --- 2018-12-05 Nadav Amit New
[v7,04/14] fork: provide a function for copying init_mm x86/alternative: text_poke() enhancements - 1 1 --- 2018-12-05 Nadav Amit New
[v7,03/14] x86/mm: temporary mm struct x86/alternative: text_poke() enhancements - 1 1 --- 2018-12-05 Nadav Amit New
[v7,02/14] x86/jump_label: Use text_poke_early() during early init x86/alternative: text_poke() enhancements - - - --- 2018-12-05 Nadav Amit New
[v7,01/14] Fix "x86/alternatives: Lockdep-enforce text_mutex in text_poke*()" x86/alternative: text_poke() enhancements 1 - - --- 2018-12-05 Nadav Amit New
[v6,7/7] tpm: pass an array of tpm_bank_list structures to tpm_pcr_extend() tpm: retrieve digest size of unknown algorithms from TPM - - - --- 2018-12-04 Roberto Sassu New
[v6,6/7] tpm: ensure that the output of PCR read contains the correct digest size tpm: retrieve digest size of unknown algorithms from TPM - 1 - --- 2018-12-04 Roberto Sassu New
[v6,5/7] tpm: retrieve digest size of unknown algorithms with PCR read tpm: retrieve digest size of unknown algorithms from TPM 1 1 - --- 2018-12-04 Roberto Sassu New
[v6,4/7] tpm: modify tpm_pcr_read() definition to pass a TPM hash algorithm tpm: retrieve digest size of unknown algorithms from TPM 1 1 1 --- 2018-12-04 Roberto Sassu New
[v6,3/7] tpm: rename and export tpm2_digest and tpm2_algorithms tpm: retrieve digest size of unknown algorithms from TPM 1 1 - --- 2018-12-04 Roberto Sassu New
[v6,2/7] tpm: add _head suffix to tcg_efi_specid_event and tcg_pcr_event2 tpm: retrieve digest size of unknown algorithms from TPM - 1 1 --- 2018-12-04 Roberto Sassu New
[v6,1/7] tpm: dynamically allocate the allocated_banks array tpm: retrieve digest size of unknown algorithms from TPM - - 1 --- 2018-12-04 Roberto Sassu New
[RFC,v2,13/13] keys/mktme: Support CPU Hotplug for MKTME keys Multi-Key Total Memory Encryption API (MKTME) - - - --- 2018-12-04 Alison Schofield New
[RFC,v2,12/13] keys/mktme: Save MKTME data if kernel cmdline parameter allows Multi-Key Total Memory Encryption API (MKTME) - - - --- 2018-12-04 Alison Schofield New
[RFC,v2,11/13] keys/mktme: Program memory encryption keys on a system wide basis Multi-Key Total Memory Encryption API (MKTME) - - - --- 2018-12-04 Alison Schofield New
[RFC,v2,10/13] keys/mktme: Add the MKTME Key Service type for memory encryption Multi-Key Total Memory Encryption API (MKTME) - - - --- 2018-12-04 Alison Schofield New
[RFC,v2,09/13] mm: Restrict memory encryption to anonymous VMA's Multi-Key Total Memory Encryption API (MKTME) - - - --- 2018-12-04 Alison Schofield New
[RFC,v2,08/13] mm: Use reference counting for encrypted VMAs Multi-Key Total Memory Encryption API (MKTME) - - - --- 2018-12-04 Alison Schofield New
[RFC,v2,07/13] x86/mm: Add helpers for reference counting encrypted VMAs Multi-Key Total Memory Encryption API (MKTME) - - - --- 2018-12-04 Alison Schofield New
[RFC,v2,06/13] mm: Add the encrypt_mprotect() system call Untitled series #51259 - - - --- 2018-12-04 Alison Schofield New
[RFC,v2,05/13] x86/mm: Set KeyIDs in encrypted VMAs Multi-Key Total Memory Encryption API (MKTME) - - - --- 2018-12-04 Alison Schofield New
[RFC,v2,04/13] x86/mm: Add helper functions for MKTME memory encryption keys Multi-Key Total Memory Encryption API (MKTME) - - - --- 2018-12-04 Alison Schofield New
[RFC,v2,03/13] syscall/x86: Wire up a new system call for memory encryption keys Multi-Key Total Memory Encryption API (MKTME) - - - --- 2018-12-04 Alison Schofield New
[RFC,v2,02/13] mm: Generalize the mprotect implementation to support extensions Multi-Key Total Memory Encryption API (MKTME) - - - --- 2018-12-04 Alison Schofield New
[RFC,v2,01/13] x86/mktme: Document the MKTME APIs Multi-Key Total Memory Encryption API (MKTME) - - - --- 2018-12-04 Alison Schofield New
[GIT,PULL] SELinux fixes for v4.20 (#2) [GIT,PULL] SELinux fixes for v4.20 (#2) - - - --- 2018-11-29 Paul Moore New
selftests: add TPM 2.0 tests selftests: add TPM 2.0 tests 1 - - --- 2018-11-27 Jarkko Sakkinen New
[v5,38/38] TOMOYO: Update LSM flags to no longer be exclusive LSM: Module stacking for SARA and Landlock - - - --- 2018-11-26 Casey Schaufler New
[v5,37/38] LSM: Infrastructure management of the ipc security blob LSM: Module stacking for SARA and Landlock - 1 - --- 2018-11-26 Casey Schaufler New
[v5,36/38] Smack: Abstract use of ipc security blobs LSM: Module stacking for SARA and Landlock - 1 - --- 2018-11-26 Casey Schaufler New
[v5,35/38] SELinux: Abstract use of ipc security blobs LSM: Module stacking for SARA and Landlock - 1 - --- 2018-11-26 Casey Schaufler New
[v5,34/38] LSM: Infrastructure management of the task security LSM: Module stacking for SARA and Landlock - 1 - --- 2018-11-26 Casey Schaufler New
[v5,33/38] LSM: Infrastructure management of the inode security LSM: Module stacking for SARA and Landlock - 1 - --- 2018-11-26 Casey Schaufler New
[v5,32/38] Smack: Abstract use of inode security blob LSM: Module stacking for SARA and Landlock - 1 - --- 2018-11-26 Casey Schaufler New
[v5,31/38] SELinux: Abstract use of inode security blob LSM: Module stacking for SARA and Landlock - 1 - --- 2018-11-26 Casey Schaufler New
[v5,30/38] LSM: Infrastructure management of the file security LSM: Module stacking for SARA and Landlock - 1 - --- 2018-11-26 Casey Schaufler New
[v5,29/38] Smack: Abstract use of file security blob LSM: Module stacking for SARA and Landlock - 1 - --- 2018-11-26 Casey Schaufler New
[v5,28/38] SELinux: Abstract use of file security blob LSM: Module stacking for SARA and Landlock - 1 - --- 2018-11-26 Casey Schaufler New
[v5,27/38] Infrastructure management of the cred security blob LSM: Module stacking for SARA and Landlock - 1 - --- 2018-11-26 Casey Schaufler New
[v5,26/38] TOMOYO: Abstract use of cred security blob LSM: Module stacking for SARA and Landlock - 1 - --- 2018-11-26 Casey Schaufler New
[v5,25/38] AppArmor: Abstract use of cred security blob LSM: Module stacking for SARA and Landlock - 1 - --- 2018-11-26 Casey Schaufler New
[v5,24/38] SELinux: Remove unused selinux_is_enabled LSM: Module stacking for SARA and Landlock - 1 - --- 2018-11-26 Casey Schaufler New
[v5,23/38] SELinux: Remove cred security blob poisoning LSM: Module stacking for SARA and Landlock - 1 - --- 2018-11-26 Casey Schaufler New
[v5,22/38] SELinux: Abstract use of cred security blob LSM: Module stacking for SARA and Landlock - 1 - --- 2018-11-26 Casey Schaufler New
[v5,21/38] Smack: Abstract use of cred security blob LSM: Module stacking for SARA and Landlock - 1 - --- 2018-11-26 Casey Schaufler New
[v5,20/38] procfs: add smack subdir to attrs LSM: Module stacking for SARA and Landlock - 1 - --- 2018-11-26 Casey Schaufler New
[v5,19/38] capability: Initialize as LSM_ORDER_FIRST LSM: Module stacking for SARA and Landlock - 1 - --- 2018-11-26 Casey Schaufler New
[v5,18/38] LSM: Introduce enum lsm_order LSM: Module stacking for SARA and Landlock - - - --- 2018-11-26 Casey Schaufler New
[v5,17/38] Yama: Initialize as ordered LSM LSM: Module stacking for SARA and Landlock - 1 - --- 2018-11-26 Casey Schaufler New
[v5,16/38] LoadPin: Initialize as ordered LSM LSM: Module stacking for SARA and Landlock - 1 - --- 2018-11-26 Casey Schaufler New
[v5,15/38] LSM: Split LSM preparation from initialization LSM: Module stacking for SARA and Landlock - - - --- 2018-11-26 Casey Schaufler New
« 1 2 ... 112 113 114155 156 »