Linux Integrity
[Prev Page][Next Page]
- [PATCH 2/2] tpm: Add Field Upgrade mode support for Infineon TPM2 modules, (continued)
- [PATCH v9 0/7] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys,
Ahmad Fatoum
- Question on permissions of runtime and bios measurements files,
William Roberts
- [PATCH 0/3] Append line feed to files in securityfs,
Wang Weiyang
- [PATCH v9 0/7] ima: support fs-verity digests and signatures,
Mimi Zohar
- [PATCH v3 00/21] xen: simplify frontend side ring setup,
Juergen Gross
- [PATCH 00/10] Encrypted Hibernation,
Evan Green
- [PATCH 07/10] PM: hibernate: Use TPM-backed keys to encrypt image, Evan Green
- [PATCH 06/10] PM: hibernate: Add kernel-based encryption, Evan Green
- [PATCH 02/10] tpm: Allow PCR 23 to be restricted to kernel-only use, Evan Green
- [PATCH 03/10] security: keys: trusted: Parse out individual components of the key blob, Evan Green
- [PATCH 08/10] PM: hibernate: Mix user key in encrypted hibernate, Evan Green
- [PATCH 04/10] security: keys: trusted: Allow storage of PCR values in creation data, Evan Green
- [PATCH 05/10] security: keys: trusted: Verify creation data, Evan Green
- [PATCH 10/10] PM: hibernate: seal the encryption key with a PCR policy, Evan Green
- [PATCH 09/10] PM: hibernate: Verify the digest encryption key, Evan Green
- [PATCH 01/10] tpm: Add support for in-kernel resetting of PCRs, Evan Green
- Re: [PATCH 00/10] Encrypted Hibernation, Pavel Machek
- [PATCH 00/32] Introduce flexible array struct memcpy() helpers,
Kees Cook
- [PATCH 01/32] netlink: Avoid memcpy() across flexible array boundary, Kees Cook
- [PATCH 02/32] Introduce flexible array struct memcpy() helpers, Kees Cook
- [PATCH 03/32] flex_array: Add Kunit tests, Kees Cook
- [PATCH 04/32] fortify: Add run-time WARN for cross-field memcpy(), Kees Cook
- [PATCH 16/32] 802/mrp: Use mem_to_flex_dup() with struct mrp_attr, Kees Cook
- [PATCH 10/32] wcn36xx: Use mem_to_flex_dup() with struct wcn36xx_hal_ind_msg, Kees Cook
- [PATCH 05/32] brcmfmac: Use mem_to_flex_dup() with struct brcmf_fweh_queue_item, Kees Cook
- [PATCH 06/32] iwlwifi: calib: Prepare to use mem_to_flex_dup(), Kees Cook
- [PATCH 08/32] iwlwifi: mvm: Use mem_to_flex_dup() with struct ieee80211_key_conf, Kees Cook
- [PATCH 12/32] cfg80211: Use mem_to_flex_dup() with struct cfg80211_bss_ies, Kees Cook
- [PATCH 26/32] ima: Use mem_to_flex_dup() with struct modsig, Kees Cook
- [PATCH 07/32] iwlwifi: calib: Use mem_to_flex_dup() with struct iwl_calib_result, Kees Cook
- [PATCH 21/32] soc: qcom: apr: Use mem_to_flex_dup() with struct apr_rx_buf, Kees Cook
- [PATCH 23/32] Bluetooth: Use mem_to_flex_dup() with struct hci_op_configure_data_path, Kees Cook
- [PATCH 14/32] af_unix: Use mem_to_flex_dup() with struct unix_address, Kees Cook
- [PATCH 19/32] afs: Use mem_to_flex_dup() with struct afs_acl, Kees Cook
- [PATCH 11/32] nl80211: Use mem_to_flex_dup() with struct cfg80211_cqm_config, Kees Cook
- [PATCH 29/32] xtensa: Use mem_to_flex_dup() with struct property, Kees Cook
- [PATCH 25/32] Drivers: hv: utils: Use mem_to_flex_dup() with struct cn_msg, Kees Cook
- [PATCH 09/32] p54: Use mem_to_flex_dup() with struct p54_cal_database, Kees Cook
- [PATCH 17/32] net/flow_offload: Use mem_to_flex_dup() with struct flow_action_cookie, Kees Cook
- [PATCH 15/32] 802/garp: Use mem_to_flex_dup() with struct garp_attr, Kees Cook
- [PATCH 13/32] mac80211: Use mem_to_flex_dup() with several structs, Kees Cook
- [PATCH 18/32] firewire: Use __mem_to_flex_dup() with struct iso_interrupt_event, Kees Cook
- [PATCH 20/32] ASoC: sigmadsp: Use mem_to_flex_dup() with struct sigmadsp_data, Kees Cook
- [PATCH 22/32] atags_proc: Use mem_to_flex_dup() with struct buffer, Kees Cook
- [PATCH 28/32] selinux: Use mem_to_flex_dup() with xfrm and sidtab, Kees Cook
- [PATCH 32/32] esas2r: Use __mem_to_flex() with struct atto_ioctl, Kees Cook
- [PATCH 24/32] IB/hfi1: Use mem_to_flex_dup() for struct tid_rb_node, Kees Cook
- [PATCH 27/32] KEYS: Use mem_to_flex_dup() with struct user_key_payload, Kees Cook
- [PATCH 31/32] xenbus: Use mem_to_flex_dup() with struct read_buffer, Kees Cook
- [PATCH 30/32] usb: gadget: f_fs: Use mem_to_flex_dup() with struct ffs_buffer, Kees Cook
- Re: [PATCH 19/32] afs: Use mem_to_flex_dup() with struct afs_acl, David Howells
- Re: [PATCH 00/32] Introduce flexible array struct memcpy() helpers, David Howells
- Permissions on binary_runtime_measurements and tpm0/binary_bios_measurements, William Roberts
- [PATCH 05/37] char: impi, tpm: depend on HAS_IOPORT,
Niklas Schnelle
- [RFC v2 04/39] char: impi, tpm: depend on HAS_IOPORT,
Niklas Schnelle
- [PATCH v8 0/7] ima: support fs-verity digests and signatures,
Mimi Zohar
- Re: Dell XPS 13 9310 2-in-1: tpm tpm0: invalid TPM_STS.x 0xff, dumping stack for forensics,
Paul Menzel
- [PATCH v8 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys,
Ahmad Fatoum
- [PATCH v2 00/19] xen: simplify frontend side ring setup,
Juergen Gross
- [PATCH] integrity: Allow ima_appraise bootparam to be set when SB is enabled,
Eric Snowberg
- tpm tpm0: invalid TPM_STS.x 0xff, dumping stack for forensics, Laurent Bigonville
- [PATCH] tpm: Add check for Failure mode for TPM2 modules,
Mårten Lindahl
- [PATCH 1/2] clk-bcm2835: use subsys_initcall for the clock driver when IMA is enabled, Alberto Solavagione
- [PATCH] Carry forward IMA measurement log on kexec on x86_64,
Jonathan McDowell
- [PATCH] integrity: Fix sparse warnings in keyring_handler, Stefan Berger
- [PATCH 2/2] tpm_tis_spi_main: Force probe routine to run synchronously with driver and device registration when IMA is enabled, Scovotto Davide
- [PATCH 00/18] xen: simplify frontend side ring setup,
Juergen Gross
- [PATCH v12 00/26] ima: Namespace IMA with audit support in IMA-ns,
Stefan Berger
- [PATCH v12 15/26] ima: Implement ima_free_policy_rules() for freeing of an ima_namespace, Stefan Berger
- [PATCH v12 09/26] ima: Move ima_lsm_policy_notifier into ima_namespace, Stefan Berger
- [PATCH v12 24/26] ima: Limit number of policy rules in non-init_ima_ns, Stefan Berger
- [PATCH v12 07/26] ima: Move some IMA policy and filesystem related variables into ima_namespace, Stefan Berger
- [PATCH v12 22/26] ima: Introduce securityfs file to activate an IMA namespace, Stefan Berger
- [PATCH v12 13/26] userns: Add pointer to ima_namespace to user_namespace, Stefan Berger
- [PATCH v12 26/26] ima: Enable IMA namespaces, Stefan Berger
- [PATCH v12 12/26] ima: Only accept AUDIT rules for non-init_ima_ns namespaces for now, Stefan Berger
- [PATCH v12 20/26] ima: Remove unused iints from the integrity_iint_cache, Stefan Berger
- [PATCH v12 04/26] ima: Move arch_policy_entry into ima_namespace, Stefan Berger
- [PATCH v12 11/26] ima: Define mac_admin_ns_capable() as a wrapper for ns_capable(), Stefan Berger
- [PATCH v12 16/26] ima: Add functions for creating and freeing of an ima_namespace, Stefan Berger
- [PATCH v12 21/26] ima: Setup securityfs for IMA namespace, Stefan Berger
- [PATCH v12 02/26] securityfs: Extend securityfs with namespacing support, Stefan Berger
- [PATCH v12 19/26] ima: Namespace audit status flags, Stefan Berger
- [PATCH v12 14/26] ima: Implement hierarchical processing of file accesses, Stefan Berger
- [PATCH v12 05/26] ima: Move ima_htable into ima_namespace, Stefan Berger
- [PATCH v12 10/26] ima: Switch to lazy lsm policy updates for better performance, Stefan Berger
- [PATCH v12 06/26] ima: Move measurement list related variables into ima_namespace, Stefan Berger
- [PATCH v12 03/26] ima: Define ima_namespace struct and start moving variables into it, Stefan Berger
- [PATCH v12 18/26] integrity: Add optional callback function to integrity_inode_free(), Stefan Berger
- [PATCH v12 08/26] ima: Move IMA securityfs files into ima_namespace or onto stack, Stefan Berger
- [PATCH v12 17/26] integrity/ima: Define ns_status for storing namespaced iint data, Stefan Berger
- [PATCH v12 25/26] ima: Restrict informational audit messages to init_ima_ns, Stefan Berger
- [PATCH v12 23/26] ima: Show owning user namespace's uid and gid when displaying policy, Stefan Berger
- [PATCH v12 01/26] securityfs: rework dentry creation, Stefan Berger
- [GIT PULL] TPM DEVICE DRIVER updates for tpmdd-next-v5.18-rc4,
Jarkko Sakkinen
- [PATCH v2] tpm: cr50: Add new device/vendor ID 0x504a6666,
Jes B. Klinke
- Re: [PATCH v35 05/29] IMA: avoid label collisions with stacked LSMs,
Casey Schaufler
- [PATCH v35 15/29] LSM: Ensure the correct LSM context releaser, Casey Schaufler
- [PATCH v35 12/29] LSM: Use lsmblob in security_inode_getsecid, Casey Schaufler
- [PATCH v35 13/29] LSM: Use lsmblob in security_cred_getsecid,
Casey Schaufler
- [PATCH v35 11/29] LSM: Use lsmblob in security_current_getsecid, Casey Schaufler
- [PATCH v7 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys,
Ahmad Fatoum
- [PATCH v2] char: tpm: Prepare cleanup of powerpc's asm/prom.h, Christophe Leroy
- [PATCH] ima: simplify if-if to if-else, Yihao Han
- [PATCH v3 RESEND] efi: Do not import certificates from UEFI Secure Boot for T2 Macs,
Aditya Garg
- [PATCH v34 15/29] LSM: Ensure the correct LSM context releaser,
Casey Schaufler
- [PATCH v34 13/29] LSM: Use lsmblob in security_cred_getsecid,
Casey Schaufler
- [PATCH v34 12/29] LSM: Use lsmblob in security_inode_getsecid,
Casey Schaufler
- [PATCH v34 11/29] LSM: Use lsmblob in security_current_getsecid,
Casey Schaufler
- [PATCH 0/5] Support TPM Reset GPIO,
Lino Sanfilippo
- [PATCH v3 0/1] ima: fix boot command line issue,
GUO Zihua
- [PATCH 0/7] Add CA enforcement keyring restrictions,
Eric Snowberg
- [PATCH v2 0/1] ima: fix boot command line issue,
GUO Zihua
- [PATCH v2] ima: remove the IMA_TEMPLATE Kconfig option,
GUO Zihua
- [PATCH] tpm: cr50: Add new device/vendor ID 0x504a6666,
Jes B. Klinke
- [PATCH 5.15 235/913] KEYS: trusted: Avoid calling null function trusted_key_exit, Greg Kroah-Hartman
- [PATCH 5.16 0248/1017] KEYS: trusted: Avoid calling null function trusted_key_exit, Greg Kroah-Hartman
- [PATCH 5.17 0255/1126] KEYS: trusted: Avoid calling null function trusted_key_exit, Greg Kroah-Hartman
- [PATCH] drivers/char/tpm: Google TPM, additional DID:VID,
Jes Klinke
- PATCH: Google security chip, additional DID:VID,
Jes Klinke
- [PATCH 1/4] tpm: Add tpm_tis_i2c backend for tpm_tis_core,
Johannes Holland
- [PATCH] char: tpm: Prepare cleanup of powerpc's asm/prom.h,
Christophe Leroy
- Progress about SM2-with-SM3 signature support for PKCS #7.,
Guozihua (Scott)
- [PATCH 2/5] integrity: Remove redundant assignments, Michal Orzel
- [PATCH 00/18] bpf: Secure and authenticated preloading of eBPF programs,
Roberto Sassu
- [PATCH 04/18] bpf-preload: Export and call bpf_obj_do_pin_kernel(), Roberto Sassu
- [PATCH 03/18] bpf-preload: Generalize object pinning from the kernel, Roberto Sassu
- [PATCH 01/18] bpf: Export bpf_link_inc(), Roberto Sassu
- [PATCH 02/18] bpf-preload: Move bpf_preload.h to include/linux, Roberto Sassu
- [PATCH 05/18] bpf-preload: Generate static variables, Roberto Sassu
- [PATCH 06/18] bpf-preload: Generate free_objs_and_skel(), Roberto Sassu
- [PATCH 09/18] bpf-preload: Generate code to pin non-internal maps, Roberto Sassu
- [PATCH 08/18] bpf-preload: Generate load_skel(), Roberto Sassu
- [PATCH 07/18] bpf-preload: Generate preload(), Roberto Sassu
- [PATCH 14/18] bpf-preload: Switch to new preload registration method, Roberto Sassu
- [PATCH 11/18] bpf-preload: Store multiple bpf_preload_ops structures in a linked list, Roberto Sassu
- [PATCH 12/18] bpf-preload: Implement new registration method for preloading eBPF programs, Roberto Sassu
- [PATCH 10/18] bpf-preload: Generate bpf_preload_ops, Roberto Sassu
- [PATCH 13/18] bpf-preload: Move pinned links and maps to a dedicated directory in bpffs, Roberto Sassu
- [PATCH 15/18] bpf-preload: Generate code of kernel module to preload, Roberto Sassu
- [PATCH 16/18] bpf-preload: Do kernel mount to ensure that pinned objects don't disappear, Roberto Sassu
- [PATCH 18/18] bpf-preload/selftests: Preload a test eBPF program and check pinned objects, Roberto Sassu
- [PATCH 17/18] bpf-preload/selftests: Add test for automatic generation of preload methods, Roberto Sassu
- Re: [PATCH 00/18] bpf: Secure and authenticated preloading of eBPF programs, Andrii Nakryiko
- Re: [PATCH 00/18] bpf: Secure and authenticated preloading of eBPF programs, Alexei Starovoitov
- [PATCH v7 0/5] ima: support fs-verity digests and signatures,
Mimi Zohar
- [PATCH 5.16 14/37] tpm: Fix error handling in async work, Greg Kroah-Hartman
- [PATCH 5.15 03/37] tpm: Fix error handling in async work, Greg Kroah-Hartman
- [PATCH 5.17 01/39] tpm: Fix error handling in async work, Greg Kroah-Hartman
- [PATCH 5.10 07/38] tpm: Fix error handling in async work, Greg Kroah-Hartman
- [PATCH 5.4 06/29] tpm: Fix error handling in async work, Greg Kroah-Hartman
- [PATCH v2] tpm: Fix regression in tpm_tis_synquacer.c, Johannes Holland
- [PATCH ima-evm-utils] travis: include CentOS stream 8,
Mimi Zohar
- [no subject], Unknown
- [PATCH v2 1/1] ci/GitHub: Remove CentOS 8, Petr Vorel
- [PATCH v1] tpm: Fix regression in tpm_tis_synquacer.c,
Johannes Holland
- [GIT PULL] integrity: subsystem fixes for v5.18,
Mimi Zohar
- [GIT PULL] Add trusted_for(2) (was O_MAYEXEC),
Mickaël Salaün
- [PATCH v4] tpm: Remove read16/read32/write32 calls from tpm_tis_phy_ops,
Johannes Holland
- [PATCH] ima: remove template "ima" as the compiled default,
GUO Zihua
- [PATCH v6 0/5] ima: support fs-verity digests and signatures,
Mimi Zohar
- [PATCH v3] tpm: Remove read16/read32/write32 calls from tpm_tis_phy_ops,
Johannes Holland
- [PATCH -next] tpm: ibmvtpm: Correct the return value in tpm_ibmvtpm_probe(),
Xiu Jianfeng
- [PATCH] tpm/tpm_ftpm_tee: Return true/false (not 1/0) from bool functions,
Haowen Bai
- [PATCH -next] char: tpm: cr50: Fix tpm_cr50_i2c_probe() kernel-doc comment, Yang Li
- [PATCH v6 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys,
Ahmad Fatoum
- [PATCH v12 0/4] integrity: support including firmware ".platform" keys at build time,
Nayna Jain
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux NFS]
[Linux NILFS]
[Linux USB Devel]
[Video for Linux]
[Linux SCSI]
[Yosemite Forum]