Show patches with: State = Action Required       |   12149 patches
« 1 2 ... 12 13 14121 122 »
Patch Series A/R/T S/W/F Date Submitter Delegate State
[RFC,01/20] ima: Add IMA namespace support ima: Namespace IMA with audit support in IMA-ns - - - --- 2021-11-30 Stefan Berger New
[v6,5/5] docs: security: Add coco/efi_secret documentation Allow guest access to EFI confidential computing secret area - - - --- 2021-11-29 Dov Murik New
[v6,4/5] efi: Load efi_secret module if EFI secret area is populated Allow guest access to EFI confidential computing secret area - - - --- 2021-11-29 Dov Murik New
[v6,3/5] virt: Add efi_secret module to expose confidential computing secrets Allow guest access to EFI confidential computing secret area - - - --- 2021-11-29 Dov Murik New
[v6,2/5] efi/libstub: Reserve confidential computing secret area Allow guest access to EFI confidential computing secret area - - - --- 2021-11-29 Dov Murik New
[v6,1/5] efi: Save location of EFI confidential computing area Allow guest access to EFI confidential computing secret area - - - --- 2021-11-29 Dov Murik New
[v2,6/6] module: Move duplicate mod_check_sig users code to mod_parse_sig KEXEC_SIG with appended signature - - - --- 2021-11-25 Michal Suchanek New
[v2,5/6] module: Use key_being_used_for for log messages in verify_appended_signature KEXEC_SIG with appended signature - - - --- 2021-11-25 Michal Suchanek New
[v2,4/6] module: strip the signature marker in the verification function. KEXEC_SIG with appended signature - - - --- 2021-11-25 Michal Suchanek New
[v2,3/6] kexec_file: Don't opencode appended signature verification. KEXEC_SIG with appended signature - - - --- 2021-11-25 Michal Suchanek New
[v2,2/6] powerpc/kexec_file: Add KEXEC_SIG support. KEXEC_SIG with appended signature - - - --- 2021-11-25 Michal Suchanek New
[v2,1/6] s390/kexec_file: Don't opencode appended signature check. KEXEC_SIG with appended signature - - - --- 2021-11-25 Michal Suchanek New
ima: Fix trivial typos in the comments ima: Fix trivial typos in the comments - 1 - --- 2021-11-24 Austin Kim New
[v5,2/2] integrity: support including firmware ".platform" keys at build time integrity: support including firmware ".platform" keys at build time - 1 - --- 2021-11-24 Nayna Jain New
[v5,1/2] certs: export load_certificate_list() to be used outside certs/ integrity: support including firmware ".platform" keys at build time - 1 - --- 2021-11-24 Nayna Jain New
security:trusted_tpm2: Fix memory leak in tpm2_key_encode() security:trusted_tpm2: Fix memory leak in tpm2_key_encode() - - - --- 2021-11-24 Jianglei Nie New
[5.10,130/154] block: Check ADMIN before NICE for IOPRIO_CLASS_RT Untitled series #585213 1 1 - --- 2021-11-24 Greg KH New
[5.15,222/279] block: Check ADMIN before NICE for IOPRIO_CLASS_RT Untitled series #585225 1 1 - --- 2021-11-24 Greg KH New
[v8,17/17] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true Enroll kernel keys thru MOK - 1 - --- 2021-11-24 Eric Snowberg New
[v8,16/17] integrity: Trust MOK keys if MokListTrustedRT found Enroll kernel keys thru MOK - 1 - --- 2021-11-24 Eric Snowberg New
[v8,15/17] efi/mokvar: move up init order Enroll kernel keys thru MOK - 1 - --- 2021-11-24 Eric Snowberg New
[v8,14/17] KEYS: link machine trusted keys to secondary_trusted_keys Enroll kernel keys thru MOK - 1 - --- 2021-11-24 Eric Snowberg New
[v8,13/17] integrity: store reference to machine keyring Enroll kernel keys thru MOK - 1 - --- 2021-11-24 Eric Snowberg New
[v8,12/17] KEYS: integrity: change link restriction to trust the machine keyring Enroll kernel keys thru MOK - 1 - --- 2021-11-24 Eric Snowberg New
[v8,11/17] KEYS: Introduce link restriction for machine keys Enroll kernel keys thru MOK - 1 - --- 2021-11-24 Eric Snowberg New
[v8,10/17] KEYS: add a reference to machine keyring Enroll kernel keys thru MOK - 1 - --- 2021-11-24 Eric Snowberg New
[v8,09/17] KEYS: Rename get_builtin_and_secondary_restriction Enroll kernel keys thru MOK - 1 - --- 2021-11-24 Eric Snowberg New
[v8,08/17] integrity: add new keyring handler for mok keys Enroll kernel keys thru MOK - 1 - --- 2021-11-24 Eric Snowberg New
[v8,07/17] integrity: restrict INTEGRITY_KEYRING_MACHINE to restrict_link_by_ca Enroll kernel keys thru MOK - 1 - --- 2021-11-24 Eric Snowberg New
[v8,06/17] KEYS: CA link restriction Enroll kernel keys thru MOK - - - --- 2021-11-24 Eric Snowberg New
[v8,05/17] X.509: Parse Basic Constraints for CA Enroll kernel keys thru MOK - - - --- 2021-11-24 Eric Snowberg New
[v8,04/17] integrity: Do not allow machine keyring updates following init Enroll kernel keys thru MOK - 1 - --- 2021-11-24 Eric Snowberg New
[v8,03/17] integrity: Introduce a Linux keyring called machine Enroll kernel keys thru MOK - 2 - --- 2021-11-24 Eric Snowberg New
[v8,02/17] integrity: Fix warning about missing prototypes Enroll kernel keys thru MOK - 1 - --- 2021-11-24 Eric Snowberg New
[v8,01/17] KEYS: Create static version of public_key_verify_signature Enroll kernel keys thru MOK - 1 - --- 2021-11-24 Eric Snowberg New
[v30,28/28] AppArmor: Remove the exclusive flag LSM: Module stacking for AppArmor 2 1 - --- 2021-11-24 Casey Schaufler New
[v30,27/28] LSM: Add /proc attr entry for full LSM context LSM: Module stacking for AppArmor - 1 - --- 2021-11-24 Casey Schaufler New
[v30,26/28] Audit: Add record for multiple object security contexts LSM: Module stacking for AppArmor - - - --- 2021-11-24 Casey Schaufler New
[v30,25/28] Audit: Add record for multiple task security contexts LSM: Module stacking for AppArmor - - - --- 2021-11-24 Casey Schaufler New
[v30,24/28] Audit: Add framework for auxiliary records LSM: Module stacking for AppArmor - - - --- 2021-11-24 Casey Schaufler New
[v30,23/28] Audit: Create audit_stamp structure LSM: Module stacking for AppArmor 1 - - --- 2021-11-24 Casey Schaufler New
[v30,22/28] Audit: Keep multiple LSM data in audit_names LSM: Module stacking for AppArmor 1 - - --- 2021-11-24 Casey Schaufler New
[v30,21/28] LSM: Extend security_secid_to_secctx to include module selection LSM: Module stacking for AppArmor - - - --- 2021-11-24 Casey Schaufler New
[v30,20/28] binder: Pass LSM identifier for confirmation LSM: Module stacking for AppArmor - - - --- 2021-11-24 Casey Schaufler New
[v30,19/28] NET: Store LSM netlabel data in a lsmblob LSM: Module stacking for AppArmor 2 2 - --- 2021-11-24 Casey Schaufler New
[v30,18/28] LSM: security_secid_to_secctx in netlink netfilter LSM: Module stacking for AppArmor 3 2 - --- 2021-11-24 Casey Schaufler New
[v30,17/28] LSM: Use lsmcontext in security_inode_getsecctx LSM: Module stacking for AppArmor 3 2 - --- 2021-11-24 Casey Schaufler New
[v30,16/28] LSM: Use lsmcontext in security_secid_to_secctx LSM: Module stacking for AppArmor 2 1 - --- 2021-11-24 Casey Schaufler New
[v30,15/28] LSM: Ensure the correct LSM context releaser LSM: Module stacking for AppArmor 3 2 - --- 2021-11-24 Casey Schaufler New
[v30,14/28] LSM: Specify which LSM to display LSM: Module stacking for AppArmor - - - --- 2021-11-24 Casey Schaufler New
[v30,13/28] LSM: Use lsmblob in security_cred_getsecid LSM: Module stacking for AppArmor 2 2 - --- 2021-11-24 Casey Schaufler New
[v30,12/28] LSM: Use lsmblob in security_inode_getsecid LSM: Module stacking for AppArmor 2 2 - --- 2021-11-24 Casey Schaufler New
[v30,11/28] LSM: Use lsmblob in security_task_getsecid LSM: Module stacking for AppArmor 2 2 - --- 2021-11-24 Casey Schaufler New
[v30,10/28] LSM: Use lsmblob in security_ipc_getsecid LSM: Module stacking for AppArmor 2 2 - --- 2021-11-24 Casey Schaufler New
[v30,09/28] LSM: Use lsmblob in security_secid_to_secctx LSM: Module stacking for AppArmor 1 1 - --- 2021-11-24 Casey Schaufler New
[v30,08/28] LSM: Use lsmblob in security_secctx_to_secid LSM: Module stacking for AppArmor 1 1 - --- 2021-11-24 Casey Schaufler New
[v30,07/28] LSM: Use lsmblob in security_kernel_act_as LSM: Module stacking for AppArmor 2 2 - --- 2021-11-24 Casey Schaufler New
[v30,06/28] LSM: Use lsmblob in security_audit_rule_match LSM: Module stacking for AppArmor 1 - - --- 2021-11-24 Casey Schaufler New
[v30,05/28] IMA: avoid label collisions with stacked LSMs LSM: Module stacking for AppArmor - - - --- 2021-11-24 Casey Schaufler New
[v30,04/28] LSM: provide lsm name and id slot mappings LSM: Module stacking for AppArmor 1 1 - --- 2021-11-24 Casey Schaufler New
[v30,03/28] LSM: Add the lsmblob data structure. LSM: Module stacking for AppArmor - - - --- 2021-11-24 Casey Schaufler New
[v30,02/28] LSM: Infrastructure management of the sock security LSM: Module stacking for AppArmor 2 2 - --- 2021-11-24 Casey Schaufler New
[v30,01/28] integrity: disassociate ima_filter_rule from security_audit_rule LSM: Module stacking for AppArmor 1 - - --- 2021-11-24 Casey Schaufler New
[GIT,PULL] SELinux fixes for v5.16 (#2) [GIT,PULL] SELinux fixes for v5.16 (#2) - - - --- 2021-11-23 Paul Moore New
[v5,4/4] docs: security: Add coco/efi_secret documentation Allow guest access to EFI confidential computing secret area - - - --- 2021-11-18 Dov Murik New
[v5,3/4] virt: Add efi_secret module to expose confidential computing secrets Allow guest access to EFI confidential computing secret area - - - --- 2021-11-18 Dov Murik New
[v5,2/4] efi/libstub: Reserve confidential computing secret area Allow guest access to EFI confidential computing secret area - - - --- 2021-11-18 Dov Murik New
[v5,1/4] efi: Save location of EFI confidential computing area Allow guest access to EFI confidential computing secret area - - - --- 2021-11-18 Dov Murik New
[-next] apparmor: Fix kernel-doc [-next] apparmor: Fix kernel-doc 1 - - --- 2021-11-17 Yang Li New
[v19,4/4] overlayfs: inode_owner_or_capable called during execv overlayfs override_creds=off & nested get xattr fix - - - --- 2021-11-17 David Anderson New
[v19,3/4] overlayfs: override_creds=off option bypass creator_cred overlayfs override_creds=off & nested get xattr fix - - - --- 2021-11-17 David Anderson New
[v19,2/4] overlayfs: handle XATTR_NOSECURITY flag for get xattr method overlayfs override_creds=off & nested get xattr fix - - - --- 2021-11-17 David Anderson New
[v19,1/4] Add flags option to get xattr method paired to __vfs_getxattr overlayfs override_creds=off & nested get xattr fix 5 1 - --- 2021-11-17 David Anderson New
[v7,17/17] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true Enroll kernel keys thru MOK - - - --- 2021-11-16 Eric Snowberg New
[v7,16/17] integrity: Trust MOK keys if MokListTrustedRT found Enroll kernel keys thru MOK - - - --- 2021-11-16 Eric Snowberg New
[v7,15/17] efi/mokvar: move up init order Enroll kernel keys thru MOK - - - --- 2021-11-16 Eric Snowberg New
[v7,14/17] integrity: store reference to machine keyring Enroll kernel keys thru MOK - - - --- 2021-11-16 Eric Snowberg New
[v7,13/17] KEYS: link secondary_trusted_keys to machine trusted keys Enroll kernel keys thru MOK - - - --- 2021-11-16 Eric Snowberg New
[v7,12/17] KEYS: integrity: change link restriction to trust the machine keyring Enroll kernel keys thru MOK - 1 - --- 2021-11-16 Eric Snowberg New
[v7,11/17] KEYS: Introduce link restriction for machine keys Enroll kernel keys thru MOK - - - --- 2021-11-16 Eric Snowberg New
[v7,10/17] KEYS: add a reference to machine keyring Enroll kernel keys thru MOK - - - --- 2021-11-16 Eric Snowberg New
[v7,09/17] KEYS: Rename get_builtin_and_secondary_restriction Enroll kernel keys thru MOK - 1 - --- 2021-11-16 Eric Snowberg New
[v7,08/17] integrity: add new keyring handler for mok keys Enroll kernel keys thru MOK - 1 - --- 2021-11-16 Eric Snowberg New
[v7,07/17] integrity: Fix warning about missing prototypes Enroll kernel keys thru MOK - 1 - --- 2021-11-16 Eric Snowberg New
[v7,06/17] integrity: restrict INTEGRITY_KEYRING_MACHINE to restrict_link_by_ca Enroll kernel keys thru MOK - - - --- 2021-11-16 Eric Snowberg New
[v7,05/17] KEYS: CA link restriction Enroll kernel keys thru MOK - - - --- 2021-11-16 Eric Snowberg New
[v7,04/17] X.509: Parse Basic Constraints for CA Enroll kernel keys thru MOK - - - --- 2021-11-16 Eric Snowberg New
[v7,03/17] KEYS: Create static version of public_key_verify_signature Enroll kernel keys thru MOK - 1 - --- 2021-11-16 Eric Snowberg New
[v7,02/17] integrity: Do not allow machine keyring updates following init Enroll kernel keys thru MOK - 1 - --- 2021-11-16 Eric Snowberg New
[v7,01/17] integrity: Introduce a Linux keyring called machine Enroll kernel keys thru MOK - 1 - --- 2021-11-16 Eric Snowberg New
[v17,3/3] selftest/interpreter: Add tests for trusted_for(2) policies Add trusted_for(2) (was O_MAYEXEC) - 2 - --- 2021-11-15 Mickaël Salaün New
[v17,2/3] arch: Wire up trusted_for(2) Add trusted_for(2) (was O_MAYEXEC) 1 2 - --- 2021-11-15 Mickaël Salaün New
[v17,1/3] fs: Add trusted_for(2) syscall implementation and related sysctl Add trusted_for(2) (was O_MAYEXEC) 1 - - --- 2021-11-15 Mickaël Salaün New
[v2] block: Check ADMIN before NICE for IOPRIO_CLASS_RT [v2] block: Check ADMIN before NICE for IOPRIO_CLASS_RT - - - --- 2021-11-15 Alistair Delva New
block: Check ADMIN before NICE for IOPRIO_CLASS_RT block: Check ADMIN before NICE for IOPRIO_CLASS_RT - - - --- 2021-11-15 Alistair Delva New
[GIT,PULL] SELinux fix / revert for v5.16 (#1) [GIT,PULL] SELinux fix / revert for v5.16 (#1) - - - --- 2021-11-12 Paul Moore New
net,lsm,selinux: revert the security_sctp_assoc_established() hook net,lsm,selinux: revert the security_sctp_assoc_established() hook - - - --- 2021-11-12 Paul Moore New
binder: fix test regression due to sender_euid change binder: fix test regression due to sender_euid change 2 - - --- 2021-11-12 Todd Kjos New
[v4,2/2] integrity: support including firmware ".platform" keys at build time integrity: support including firmware ".platform" keys at build time - - - --- 2021-11-11 Nayna Jain New
[v4,1/2] certs: export load_certificate_list() to be used outside certs/ integrity: support including firmware ".platform" keys at build time - - - --- 2021-11-11 Nayna Jain New
« 1 2 ... 12 13 14121 122 »