Show patches with: Submitter = Roberto Sassu       |    State = Action Required       |   464 patches
« 1 2 3 44 5 »
Patch Series A/R/T S/W/F Date Submitter Delegate State
ima: Don't modify file descriptor mode on the fly ima: Don't modify file descriptor mode on the fly - 1 - --- 2020-11-26 Roberto Sassu New
[RESEND] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash() [RESEND] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash() - - - --- 2020-11-13 Roberto Sassu New
ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash() ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash() - - - --- 2020-11-12 Roberto Sassu New
[v3,11/11] ima: Don't remove security.ima if file must not be appraised evm: Improve usability of portable signatures - 1 - --- 2020-11-11 Roberto Sassu New
[v3,10/11] ima: Introduce template field evmsig and write to field sig as fallback evm: Improve usability of portable signatures - - - --- 2020-11-11 Roberto Sassu New
[v3,09/11] ima: Allow imasig requirement to be satisfied by EVM portable signatures evm: Improve usability of portable signatures - 1 - --- 2020-11-11 Roberto Sassu New
[v3,08/11] evm: Allow setxattr() and setattr() for unmodified metadata evm: Improve usability of portable signatures - - - --- 2020-11-11 Roberto Sassu New
[v3,07/11] evm: Allow xattr/attr operations for portable signatures evm: Improve usability of portable signatures - 1 - --- 2020-11-11 Roberto Sassu New
[v3,06/11] evm: Ignore INTEGRITY_NOLABEL if no HMAC key is loaded evm: Improve usability of portable signatures - - - --- 2020-11-11 Roberto Sassu New
[v3,05/11] evm: Introduce evm_status_revalidate() evm: Improve usability of portable signatures - - - --- 2020-11-11 Roberto Sassu New
[v3,04/11] ima: Move ima_reset_appraise_flags() call to post hooks evm: Improve usability of portable signatures - - - --- 2020-11-11 Roberto Sassu New
[v3,03/11] evm: Refuse EVM_ALLOW_METADATA_WRITES only if an HMAC key is loaded evm: Improve usability of portable signatures - - - --- 2020-11-11 Roberto Sassu New
[v3,02/11] evm: Load EVM key in ima_load_x509() to avoid appraisal evm: Improve usability of portable signatures - 1 - --- 2020-11-11 Roberto Sassu New
[v3,01/11] evm: Execute evm_inode_init_security() only when an HMAC key is loaded evm: Improve usability of portable signatures - 1 - --- 2020-11-11 Roberto Sassu New
[v2,12/12] ima: Don't remove security.ima if file must not be appraised IMA/EVM fixes - 1 - --- 2020-09-04 Roberto Sassu New
[v2,11/12] ima: Introduce template field evmsig and write to field sig as fallback IMA/EVM fixes - - - --- 2020-09-04 Roberto Sassu New
[v2,10/12] ima: Allow imasig requirement to be satisfied by EVM portable signatures IMA/EVM fixes - 1 - --- 2020-09-04 Roberto Sassu New
[v2,09/12] evm: Allow setxattr() and setattr() if metadata digest won't change IMA/EVM fixes - - - --- 2020-09-04 Roberto Sassu New
[v2,08/12] evm: Allow xattr/attr operations for portable signatures if check fails IMA/EVM fixes - 1 - --- 2020-09-04 Roberto Sassu New
[v2,07/12] evm: Introduce EVM_RESET_STATUS atomic flag IMA/EVM fixes - - - --- 2020-09-04 Roberto Sassu New
[v2,06/12] evm: Refuse EVM_ALLOW_METADATA_WRITES only if the HMAC key is loaded IMA/EVM fixes - - - --- 2020-09-04 Roberto Sassu New
[v2,05/12] evm: Load EVM key in ima_load_x509() to avoid appraisal IMA/EVM fixes - 1 - --- 2020-09-04 Roberto Sassu New
[v2,04/12] evm: Execute evm_inode_init_security() only when the HMAC key is loaded IMA/EVM fixes - 1 - --- 2020-09-04 Roberto Sassu New
[v2,03/12] evm: Check size of security.evm before using it IMA/EVM fixes - 1 - --- 2020-09-04 Roberto Sassu New
[v2,02/12] ima: Remove semicolon at the end of ima_get_binary_runtime_size() IMA/EVM fixes - - - --- 2020-09-04 Roberto Sassu New
[v2,01/12] ima: Don't ignore errors from crypto_shash_update() IMA/EVM fixes - 1 - --- 2020-09-04 Roberto Sassu New
[11/11] ima: Remove semicolon at the end of ima_get_binary_runtime_size() [01/11] evm: Execute evm_inode_init_security() only when the HMAC key is loaded - - - --- 2020-06-18 Roberto Sassu New
[10/11] ima: Don't ignore errors from crypto_shash_update() [01/11] evm: Execute evm_inode_init_security() only when the HMAC key is loaded - 1 - --- 2020-06-18 Roberto Sassu New
[09/11] ima: Don't remove security.ima if file must not be appraised [01/11] evm: Execute evm_inode_init_security() only when the HMAC key is loaded - 1 - --- 2020-06-18 Roberto Sassu New
[08/11] ima: Allow imasig requirement to be satisfied by EVM portable signatures [01/11] evm: Execute evm_inode_init_security() only when the HMAC key is loaded - 1 - --- 2020-06-18 Roberto Sassu New
[07/11] evm: Set IMA_CHANGE_XATTR/ATTR bit if EVM_ALLOW_METADATA_WRITES is set [01/11] evm: Execute evm_inode_init_security() only when the HMAC key is loaded - - - --- 2020-06-18 Roberto Sassu New
[06/11] evm: Allow setxattr() and setattr() if metadata digest won't change [01/11] evm: Execute evm_inode_init_security() only when the HMAC key is loaded - - - --- 2020-06-18 Roberto Sassu New
[05/11] evm: Allow xattr/attr operations for portable signatures if check fails [01/11] evm: Execute evm_inode_init_security() only when the HMAC key is loaded - - - --- 2020-06-18 Roberto Sassu New
[04/11] evm: Check size of security.evm before using it [01/11] evm: Execute evm_inode_init_security() only when the HMAC key is loaded - 1 - --- 2020-06-18 Roberto Sassu New
[03/11] evm: Refuse EVM_ALLOW_METADATA_WRITES only if the HMAC key is loaded [01/11] evm: Execute evm_inode_init_security() only when the HMAC key is loaded - - - --- 2020-06-18 Roberto Sassu New
[02/11] evm: Load EVM key in ima_load_x509() to avoid appraisal [01/11] evm: Execute evm_inode_init_security() only when the HMAC key is loaded - - - --- 2020-06-18 Roberto Sassu New
[01/11] evm: Execute evm_inode_init_security() only when the HMAC key is loaded [01/11] evm: Execute evm_inode_init_security() only when the HMAC key is loaded - 1 - --- 2020-06-18 Roberto Sassu New
ima: Directly free *entry in ima_alloc_init_template() if digests is NULL ima: Directly free *entry in ima_alloc_init_template() if digests is NULL - - - --- 2020-06-05 Roberto Sassu New
[2/2] ima: Call ima_calc_boot_aggregate() in ima_eventdigest_init() [1/2] ima: Directly assign the ima_default_policy pointer to ima_rules - - - --- 2020-06-03 Roberto Sassu New
[1/2] ima: Directly assign the ima_default_policy pointer to ima_rules [1/2] ima: Directly assign the ima_default_policy pointer to ima_rules - - - --- 2020-06-03 Roberto Sassu New
[RFC,3/3] evm: Return -EAGAIN to ignore verification failures [RFC,1/3] evm: Move hooks outside LSM infrastructure - - - --- 2020-04-29 Roberto Sassu New
[RFC,2/3] evm: Extend API of post hooks to pass the result of pre hooks [RFC,1/3] evm: Move hooks outside LSM infrastructure - - - --- 2020-04-29 Roberto Sassu New
[RFC,1/3] evm: Move hooks outside LSM infrastructure [RFC,1/3] evm: Move hooks outside LSM infrastructure - - - --- 2020-04-29 Roberto Sassu New
[RESEND,v2,3/6] ima: Fix ima digest hash table key calculation Untitled series #278443 1 - - --- 2020-04-28 Roberto Sassu New
[v2,6/6] ima: Fix return value of ima_write_policy() [v2,1/6] ima: Set file->f_mode instead of file->f_flags in ima_calc_file_hash() - 1 - --- 2020-04-27 Roberto Sassu New
[v2,5/6] ima: Set again build_ima_appraise variable [v2,1/6] ima: Set file->f_mode instead of file->f_flags in ima_calc_file_hash() - - - --- 2020-04-27 Roberto Sassu New
[v2,4/6] ima: Remove redundant policy rule set in add_rules() [v2,1/6] ima: Set file->f_mode instead of file->f_flags in ima_calc_file_hash() - - - --- 2020-04-27 Roberto Sassu New
[v2,3/6] ima: Fix ima digest hash table key calculation [v2,1/6] ima: Set file->f_mode instead of file->f_flags in ima_calc_file_hash() - - - --- 2020-04-27 Roberto Sassu New
[v2,2/6] evm: Check also if *tfm is an error pointer in init_desc() [v2,1/6] ima: Set file->f_mode instead of file->f_flags in ima_calc_file_hash() - - - --- 2020-04-27 Roberto Sassu New
[v2,1/6] ima: Set file->f_mode instead of file->f_flags in ima_calc_file_hash() [v2,1/6] ima: Set file->f_mode instead of file->f_flags in ima_calc_file_hash() - 1 - --- 2020-04-27 Roberto Sassu New
ima: Allow imasig requirement to be satisfied by EVM portable signatures ima: Allow imasig requirement to be satisfied by EVM portable signatures - - - --- 2020-04-21 Roberto Sassu New
ima: Fix return value of ima_write_policy() ima: Fix return value of ima_write_policy() - - - --- 2020-04-21 Roberto Sassu New
evm: Fix possible memory leak in evm_calc_hmac_or_hash() evm: Fix possible memory leak in evm_calc_hmac_or_hash() - - - --- 2020-04-14 Roberto Sassu New
[5/5] ima: Remove unused build_ima_appraise variable [1/5] ima: Set file->f_mode instead of file->f_flags in ima_calc_file_hash() - - - --- 2020-03-25 Roberto Sassu New
[4/5] ima: Remove redundant policy rule set in add_rules() [1/5] ima: Set file->f_mode instead of file->f_flags in ima_calc_file_hash() - - - --- 2020-03-25 Roberto Sassu New
[3/5] ima: Fix ima digest hash table key calculation [1/5] ima: Set file->f_mode instead of file->f_flags in ima_calc_file_hash() - - - --- 2020-03-25 Roberto Sassu New
[2/5] evm: Check also if *tfm is an error pointer in init_desc() [1/5] ima: Set file->f_mode instead of file->f_flags in ima_calc_file_hash() - - - --- 2020-03-25 Roberto Sassu New
[1/5] ima: Set file->f_mode instead of file->f_flags in ima_calc_file_hash() [1/5] ima: Set file->f_mode instead of file->f_flags in ima_calc_file_hash() - - - --- 2020-03-25 Roberto Sassu New
[v4,7/7] ima: Use ima_hash_algo for collision detection in the measurement list ima: support stronger algorithms for attestation - - - --- 2020-03-25 Roberto Sassu New
[v4,6/7] ima: Calculate and extend PCR with digests in ima_template_entry ima: support stronger algorithms for attestation - - - --- 2020-03-25 Roberto Sassu New
[v4,5/7] ima: Allocate and initialize tfm for each PCR bank ima: support stronger algorithms for attestation - - - --- 2020-03-25 Roberto Sassu New
[v4,4/7] ima: Switch to dynamically allocated buffer for template digests ima: support stronger algorithms for attestation - - - --- 2020-03-25 Roberto Sassu New
[v4,3/7] ima: Store template digest directly in ima_template_entry ima: support stronger algorithms for attestation - - - --- 2020-03-25 Roberto Sassu New
[v4,2/7] ima: Evaluate error in init_ima() ima: support stronger algorithms for attestation - 1 - --- 2020-03-25 Roberto Sassu New
[v4,1/7] ima: Switch to ima_hash_algo for boot aggregate ima: support stronger algorithms for attestation - - 1 --- 2020-03-25 Roberto Sassu New
[v3,8/8] ima: Use ima_hash_algo for collision detection in the measurement list ima: support stronger algorithms for attestation - - - --- 2020-02-10 Roberto Sassu New
[v3,7/8] ima: Calculate and extend PCR with digests in ima_template_entry ima: support stronger algorithms for attestation - - - --- 2020-02-10 Roberto Sassu New
[v3,6/8] ima: Allocate and initialize tfm for each PCR bank ima: support stronger algorithms for attestation - - - --- 2020-02-10 Roberto Sassu New
[v3,5/8] ima: Switch to dynamically allocated buffer for template digests ima: support stronger algorithms for attestation - - - --- 2020-02-10 Roberto Sassu New
[v3,4/8] ima: Store template digest directly in ima_template_entry ima: support stronger algorithms for attestation - - - --- 2020-02-10 Roberto Sassu New
[v3,3/8] ima: Evaluate error in init_ima() ima: support stronger algorithms for attestation - - - --- 2020-02-10 Roberto Sassu New
[v3,2/8] ima: Switch to ima_hash_algo for boot aggregate ima: support stronger algorithms for attestation - - - --- 2020-02-10 Roberto Sassu New
[v3,1/8] tpm: Initialize crypto_id of allocated_banks to HASH_ALGO__LAST ima: support stronger algorithms for attestation - 2 - --- 2020-02-10 Roberto Sassu New
[v2,8/8] ima: Use ima_hash_algo for collision detection in the measurement list ima: support stronger algorithms for attestation - - - --- 2020-02-05 Roberto Sassu New
[v2,7/8] ima: Calculate and extend PCR with digests in ima_template_entry ima: support stronger algorithms for attestation - - - --- 2020-02-05 Roberto Sassu New
[v2,6/8] ima: Allocate and initialize tfm for each PCR bank ima: support stronger algorithms for attestation - - - --- 2020-02-05 Roberto Sassu New
[v2,5/8] ima: Switch to dynamically allocated buffer for template digests ima: support stronger algorithms for attestation - - - --- 2020-02-05 Roberto Sassu New
[v2,4/8] ima: Store template digest directly in ima_template_entry ima: support stronger algorithms for attestation - - - --- 2020-02-05 Roberto Sassu New
[v2,3/8] ima: Evaluate error in init_ima() ima: support stronger algorithms for attestation - - - --- 2020-02-05 Roberto Sassu New
[v2,2/8] ima: Switch to ima_hash_algo for boot aggregate ima: support stronger algorithms for attestation - - - --- 2020-02-05 Roberto Sassu New
[v2,1/8] tpm: Initialize crypto_id of allocated_banks to HASH_ALGO__LAST ima: support stronger algorithms for attestation - 1 - --- 2020-02-05 Roberto Sassu New
[8/8] ima: switch to ima_hash_algo for boot aggregate ima: support stronger algorithms for attestation - - - --- 2020-01-27 Roberto Sassu New
[7/8] ima: use ima_hash_algo for collision detection in the measurement list ima: support stronger algorithms for attestation - - - --- 2020-01-27 Roberto Sassu New
[6/8] ima: calculate and extend PCR with digests in ima_template_entry ima: support stronger algorithms for attestation - - - --- 2020-01-27 Roberto Sassu New
[5/8] ima: allocate and initialize tfm for each PCR bank ima: support stronger algorithms for attestation - - - --- 2020-01-27 Roberto Sassu New
[4/8] ima: switch to dynamically allocated buffer for template digests ima: support stronger algorithms for attestation - - - --- 2020-01-27 Roberto Sassu New
[3/8] ima: store template digest directly in ima_template_entry ima: support stronger algorithms for attestation - - - --- 2020-01-27 Roberto Sassu New
[2/8] ima: evaluate error in init_ima() ima: support stronger algorithms for attestation - - - --- 2020-01-27 Roberto Sassu New
[1/8] tpm: initialize crypto_id of allocated_banks to HASH_ALGO__LAST ima: support stronger algorithms for attestation - 1 - --- 2020-01-27 Roberto Sassu New
[v4] KEYS: trusted: correctly initialize digests and fix locking issue [v4] KEYS: trusted: correctly initialize digests and fix locking issue - 2 - --- 2019-09-13 Roberto Sassu New
[v3] KEYS: trusted: correctly initialize digests and fix locking issue [v3] KEYS: trusted: correctly initialize digests and fix locking issue - - - --- 2019-09-08 Roberto Sassu New
[v2] KEYS: trusted: correctly initialize digests and fix locking issue [v2] KEYS: trusted: correctly initialize digests and fix locking issue - - - --- 2019-09-04 Roberto Sassu New
KEYS: trusted: correctly initialize digests and fix locking issue KEYS: trusted: correctly initialize digests and fix locking issue - - - --- 2019-09-04 Roberto Sassu New
[WIP,RFC,3/3] security: add infoflow LSM Introduce Infoflow LSM - - - --- 2019-08-18 Roberto Sassu New
[WIP,RFC,2/3] lsm notifier: distinguish between state change and policy change Introduce Infoflow LSM - - - --- 2019-08-18 Roberto Sassu New
[WIP,RFC,1/3] security: introduce call_int_hook_and() macro Introduce Infoflow LSM - - - --- 2019-08-18 Roberto Sassu New
[v3] KEYS: trusted: allow module init if TPM is inactive or deactivated [v3] KEYS: trusted: allow module init if TPM is inactive or deactivated - 2 - --- 2019-08-05 Roberto Sassu New
[v2] KEYS: trusted: allow module init if TPM is inactive or deactivated [v2] KEYS: trusted: allow module init if TPM is inactive or deactivated - - - --- 2019-08-02 Roberto Sassu New
KEYS: trusted: allow module init if TPM is inactive or deactivated KEYS: trusted: allow module init if TPM is inactive or deactivated - - - --- 2019-07-05 Roberto Sassu New
[v4,14/14] ima: add Documentation/security/IMA-digest-lists.txt ima: introduce IMA Digest Lists extension - - - --- 2019-06-14 Roberto Sassu New
« 1 2 3 44 5 »