Linux Integrity
[Prev Page][Next Page]
- [PATCH 2/2] selftests: tpm: add async space test with noneexisting handle, (continued)
- [PATCH v2] tpm: fix potential NULL pointer access in tpm_del_char_device,
Lino Sanfilippo
- [PATCH] syscalls/keyctl09: test encrypted keys.,
Yael Tiomkin
- [PATCH v7 00/14] ima: Namespace IMA with audit support in IMA-ns,
Stefan Berger
- [PATCH v7 08/14] ima: Implement hierarchical processing of file accesses, Stefan Berger
- [PATCH v7 07/14] ima: Only accept AUDIT rules for IMA non-init_ima_ns namespaces for now, Stefan Berger
- [PATCH v7 05/14] ima: Move ima_htable into ima_namespace, Stefan Berger
- [PATCH v7 03/14] ima: Namespace audit status flags, Stefan Berger
- [PATCH v7 09/14] securityfs: Only use simple_pin_fs/simple_release_fs for init_user_ns, Stefan Berger
- [PATCH v7 13/14] ima: Move dentry into ima_namespace and others onto stack, Stefan Berger
- [PATCH v7 06/14] ima: Move measurement list related variables into ima_namespace, Stefan Berger
- [PATCH v7 11/14] ima: Move some IMA policy and filesystem related variables into ima_namespace, Stefan Berger
- [PATCH v7 02/14] ima: Define ns_status for storing namespaced iint data, Stefan Berger
- [PATCH v7 12/14] ima: Use mac_admin_ns_capable() to check corresponding capability, Stefan Berger
- [PATCH v7 10/14] securityfs: Extend securityfs with namespacing support, Stefan Berger
- [PATCH v7 04/14] ima: Move policy related variables into ima_namespace, Stefan Berger
- [PATCH v7 14/14] ima: Setup securityfs for IMA namespace, Stefan Berger
- [PATCH v7 01/14] ima: Add IMA namespace support, Stefan Berger
- Re: [PATCH v7 00/14] ima: Namespace IMA with audit support in IMA-ns, Christian Brauner
- [PATCH v31 15/28] LSM: Ensure the correct LSM context releaser, Casey Schaufler
- [PATCH v31 13/28] LSM: Use lsmblob in security_cred_getsecid, Casey Schaufler
- [PATCH v31 12/28] LSM: Use lsmblob in security_inode_getsecid, Casey Schaufler
- [PATCH v31 11/28] LSM: Use lsmblob in security_task_getsecid, Casey Schaufler
- [PATCH v2] Instantiate key with user-provided decrypted data.,
Yael Tiomkin
- [PATCH] ima: Fix undefined arch_ima_get_secureboot() and co,
Takashi Iwai
- [PATCH] tpm: Fix kexec crash due to access to ops NULL pointer (powerpc),
Stefan Berger
- [PATCH v6 00/17] ima: Namespace IMA with audit support in IMA-ns,
Stefan Berger
- [PATCH v6 02/17] ima: Define ns_status for storing namespaced iint data, Stefan Berger
- [PATCH v6 07/17] ima: Move ima_htable into ima_namespace, Stefan Berger
- [PATCH v6 17/17] ima: Setup securityfs for IMA namespace, Stefan Berger
- [PATCH v6 13/17] ima: Move some IMA policy and filesystem related variables into ima_namespace, Stefan Berger
- [PATCH v6 11/17] securityfs: Only use simple_pin_fs/simple_release_fs for init_user_ns, Stefan Berger
- [PATCH v6 08/17] ima: Move measurement list related variables into ima_namespace, Stefan Berger
- [PATCH v6 14/17] ima: Tie opened SecurityFS files to the IMA namespace it belongs to, Stefan Berger
- [PATCH v6 15/17] ima: Use mac_admin_ns_capable() to check corresponding capability, Stefan Berger
- [PATCH v6 01/17] ima: Add IMA namespace support, Stefan Berger
- [PATCH v6 16/17] ima: Move dentry into ima_namespace and others onto stack, Stefan Berger
- [PATCH v6 06/17] ima: Move policy related variables into ima_namespace, Stefan Berger
- [PATCH v6 09/17] ima: Only accept AUDIT rules for IMA non-init_ima_ns namespaces for now, Stefan Berger
- [PATCH v6 12/17] securityfs: Extend securityfs with namespacing support, Stefan Berger
- [PATCH v6 05/17] ima: Move IMA's keys queue related variables into ima_namespace, Stefan Berger
- [PATCH v6 04/17] ima: Move delayed work queue and variables into ima_namespace, Stefan Berger
- [PATCH v6 10/17] ima: Implement hierarchical processing of file accesses, Stefan Berger
- [PATCH v6 03/17] ima: Namespace audit status flags, Stefan Berger
- [PATCH] Instantiate key with user-provided decrypted data.,
Yael Tiomkin
- <Possible follow-ups>
- [PATCH] Instantiate key with user-provided decrypted data., Yael Tiomkin
[PATCH v5 00/16] ima: Namespace IMA with audit support in IMA-ns,
Stefan Berger
- [PATCH v5 02/16] ima: Define ns_status for storing namespaced iint data, Stefan Berger
- [PATCH v5 04/16] ima: Move delayed work queue and variables into ima_namespace, Stefan Berger
- [PATCH v5 07/16] ima: Move ima_htable into ima_namespace, Stefan Berger
- [PATCH v5 11/16] securityfs: Only use simple_pin_fs/simple_release_fs for init_user_ns, Stefan Berger
- [PATCH v5 05/16] ima: Move IMA's keys queue related variables into ima_namespace, Stefan Berger
- [PATCH v5 08/16] ima: Move measurement list related variables into ima_namespace, Stefan Berger
- [PATCH v5 10/16] ima: Implement hierarchical processing of file accesses, Stefan Berger
- [PATCH v5 12/16] securityfs: Extend securityfs with namespacing support, Stefan Berger
- [PATCH v5 14/16] ima: Use mac_admin_ns_capable() to check corresponding capability, Stefan Berger
- [PATCH v5 06/16] ima: Move policy related variables into ima_namespace, Stefan Berger
- [PATCH v5 13/16] ima: Move some IMA policy and filesystem related variables into ima_namespace, Stefan Berger
- [PATCH v5 16/16] ima: Setup securityfs for IMA namespace, Stefan Berger
- [PATCH v5 01/16] ima: Add IMA namespace support, Stefan Berger
- [PATCH v5 09/16] ima: Only accept AUDIT rules for IMA non-init_ima_ns namespaces for now, Stefan Berger
- [PATCH v5 03/16] ima: Namespace audit status flags, Stefan Berger
- [PATCH v5 15/16] ima: Move dentries into ima_namespace, Stefan Berger
[PATCH v4 00/16] ima: Namespace IMA with audit support in IMA-ns,
Stefan Berger
- [PATCH v4 01/16] ima: Add IMA namespace support, Stefan Berger
- [PATCH v4 02/16] ima: Define ns_status for storing namespaced iint data, Stefan Berger
- [PATCH v4 03/16] ima: Namespace audit status flags, Stefan Berger
- [PATCH v4 04/16] ima: Move delayed work queue and variables into ima_namespace, Stefan Berger
- [PATCH v4 05/16] ima: Move IMA's keys queue related variables into ima_namespace, Stefan Berger
- [PATCH v4 06/16] ima: Move policy related variables into ima_namespace, Stefan Berger
- [PATCH v4 07/16] ima: Move ima_htable into ima_namespace, Stefan Berger
- [PATCH v4 08/16] ima: Move measurement list related variables into ima_namespace, Stefan Berger
- [PATCH v4 09/16] ima: Only accept AUDIT rules for IMA non-init_ima_ns namespaces for now, Stefan Berger
- [PATCH v4 10/16] ima: Implement hierarchical processing of file accesses, Stefan Berger
- [PATCH v4 11/16] securityfs: Only use simple_pin_fs/simple_release_fs for init_user_ns, Stefan Berger
- [PATCH v4 12/16] securityfs: Extend securityfs with namespacing support, Stefan Berger
- [PATCH v4 13/16] ima: Move some IMA policy and filesystem related variables into ima_namespace, Stefan Berger
- [PATCH v4 14/16] ima: Use mac_admin_ns_capable() to check corresponding capability, Stefan Berger
- [PATCH v4 15/16] ima: Move dentries into ima_namespace, Stefan Berger
- [PATCH v4 16/16] ima: Setup securityfs for IMA namespace, Stefan Berger
[PATCH v3 00/16] ima: Namespace IMA with audit support in IMA-ns,
Stefan Berger
- [PATCH v3 10/16] ima: Implement hierarchical processing of file accesses, Stefan Berger
- [PATCH v3 08/16] ima: Move measurement list related variables into ima_namespace, Stefan Berger
- [PATCH v3 15/16] ima: Move dentries into ima_namespace, Stefan Berger
- [PATCH v3 02/16] ima: Define ns_status for storing namespaced iint data, Stefan Berger
- [PATCH v3 11/16] securityfs: Move vfsmount into user_namespace, Stefan Berger
- [PATCH v3 09/16] ima: Only accept AUDIT rules for IMA non-init_ima_ns namespaces for now, Stefan Berger
- [PATCH v3 12/16] securityfs: Extend securityfs with namespacing support, Stefan Berger
- [PATCH v3 07/16] ima: Move ima_htable into ima_namespace, Stefan Berger
- [PATCH v3 01/16] ima: Add IMA namespace support, Stefan Berger
- [PATCH v3 14/16] ima: Use mac_admin_ns_capable() to check corresponding capability, Stefan Berger
- [PATCH v3 05/16] ima: Move IMA's keys queue related variables into ima_namespace, Stefan Berger
- [PATCH v3 13/16] ima: Move some IMA policy and filesystem related variables into ima_namespace, Stefan Berger
- [PATCH v3 03/16] ima: Namespace audit status flags, Stefan Berger
- [PATCH v3 16/16] ima: Setup securityfs for IMA namespace, Stefan Berger
- [PATCH v3 06/16] ima: Move policy related variables into ima_namespace, Stefan Berger
- [PATCH v3 04/16] ima: Move delayed work queue and variables into ima_namespace, Stefan Berger
- Re: [PATCH v3 00/16] ima: Namespace IMA with audit support in IMA-ns, James Bottomley
- Re: [PATCH v3 00/16] ima: Namespace IMA with audit support in IMA-ns, Christian Brauner
[RFC v2 00/19] ima: Namespace IMA with audit support in IMA-ns,
Stefan Berger
- [RFC v2 01/19] ima: Add IMA namespace support, Stefan Berger
- [RFC v2 02/19] ima: Define ns_status for storing namespaced iint data, Stefan Berger
- [RFC v2 06/19] ima: Move policy related variables into ima_namespace, Stefan Berger
- [RFC v2 07/19] ima: Move ima_htable into ima_namespace, Stefan Berger
- [RFC v2 04/19] ima: Move delayed work queue and variables into ima_namespace, Stefan Berger
- [RFC v2 03/19] ima: Namespace audit status flags, Stefan Berger
- [RFC v2 12/19] securityfs: Pass static variables as parameters from top level functions, Stefan Berger
- [RFC v2 10/19] ima: Implement hierarchical processing of file accesses, Stefan Berger
- [RFC v2 14/19] ima: Move some IMA policy and filesystem related variables into ima_namespace, Stefan Berger
- [RFC v2 08/19] ima: Move measurement list related variables into ima_namespace, Stefan Berger
- [RFC v2 11/19] securityfs: Prefix global variables with securityfs_, Stefan Berger
- [RFC v2 16/19] ima: Use integrity_admin_ns_capable() to check corresponding capability, Stefan Berger
- [RFC v2 13/19] securityfs: Extend securityfs with namespacing support, Stefan Berger
- [RFC v2 09/19] ima: Only accept AUDIT rules for IMA non-init_ima_ns namespaces for now, Stefan Berger
- [RFC v2 15/19] capabilities: Introduce CAP_INTEGRITY_ADMIN, Stefan Berger
- [RFC v2 17/19] userns: Introduce a refcount variable for calling early teardown function, Stefan Berger
- [RFC v2 19/19] ima: Setup securityfs for IMA namespace, Stefan Berger
- [RFC v2 05/19] ima: Move IMA's keys queue related variables into ima_namespace, Stefan Berger
- [RFC v2 18/19] ima/userns: Define early teardown function for IMA namespace, Stefan Berger
[PATCH v1 0/5] ima: support fs-verity signatures stored as,
Mimi Zohar
[RFC v2 0/3] Namespace IMA log entries,
James Bottomley
[PATCH v4] KEYS: trusted: Fix trusted key backends when building as module,
Ahmad Fatoum
[PATCH] char: tpm: cr50: Set TPM_FIRMWARE_POWER_MANAGED based on device property,
Rob Barnes
[RFC 00/20] ima: Namespace IMA with audit support in IMA-ns,
Stefan Berger
- [RFC 20/20] ima: Setup securityfs_ns for IMA namespace, Stefan Berger
- [RFC 01/20] ima: Add IMA namespace support, Stefan Berger
- [RFC 14/20] ima: Move some IMA policy and filesystem related variables into ima_namespace, Stefan Berger
- [RFC 10/20] ima: Implement hierarchical processing of file accesses, Stefan Berger
- [RFC 09/20] ima: Only accept AUDIT rules for IMA non-init_ima_ns namespaces for now, Stefan Berger
- [RFC 17/20] ima: Use integrity_admin_ns_capable() to check corresponding capability, Stefan Berger
- [RFC 13/20] securityfs: Build securityfs_ns for namespacing support, Stefan Berger
- [RFC 07/20] ima: Move ima_htable into ima_namespace, Stefan Berger
- [RFC 02/20] ima: Define ns_status for storing namespaced iint data, Stefan Berger
- [RFC 16/20] ima: Use ns_capable() for namespace policy access, Stefan Berger
- [RFC 18/20] userns: Introduce a refcount variable for calling early teardown function, Stefan Berger
- [RFC 12/20] securityfs: Pass static variables as parameters from top level functions, Stefan Berger
- [RFC 03/20] ima: Namespace audit status flags, Stefan Berger
- [RFC 11/20] securityfs: Prefix global variables with securityfs_, Stefan Berger
- [RFC 15/20] capabilities: Introduce CAP_INTEGRITY_ADMIN, Stefan Berger
- [RFC 04/20] ima: Move delayed work queue and variables into ima_namespace, Stefan Berger
- [RFC 08/20] ima: Move measurement list related variables into ima_namespace, Stefan Berger
- [RFC 05/20] ima: Move IMA's keys queue related variables into ima_namespace, Stefan Berger
- [RFC 19/20] ima/userns: Define early teardown function for IMA namespace, Stefan Berger
- [RFC 06/20] ima: Move policy related variables into ima_namespace, Stefan Berger
[PATCH 0/4] ima: support fs-verity signatures stored as,
Mimi Zohar
[PATCH] fix iint inode add race resulting in duplication of iint entries, James Bottomley
[PATCH v4 0/2] selftests: tpm2: Determine available PCR bank,
Stefan Berger
[PATCH] tpm: make const pointer desc a static const array,
Colin Ian King
[RFC 0/3] Namespace IMA,
James Bottomley
[PATCH v2 0/6] KEXEC_SIG with appended signature,
Michal Suchanek
[PATCH v2 6/6] module: Move duplicate mod_check_sig users code to mod_parse_sig, Michal Suchanek
[PATCH v2 5/6] module: Use key_being_used_for for log messages in verify_appended_signature, Michal Suchanek
[PATCH v2 4/6] module: strip the signature marker in the verification function., Michal Suchanek
[PATCH v2 3/6] kexec_file: Don't opencode appended signature verification., Michal Suchanek
Re: [PATCH v2 0/6] KEXEC_SIG with appended signature, Heiko Carstens
Re: [PATCH v2 0/6] KEXEC_SIG with appended signature, Baoquan He
Re: [PATCH v2 0/6] KEXEC_SIG with appended signature, Philipp Rudo
Re: [PATCH v2 0/6] KEXEC_SIG with appended signature, Nayna
RE: [RFC PATCH v7 11/16] ipe: add support for dm-verity as a trust provider,
Roberto Sassu
[PATCH v3 0/3] selftests: tpm2: Probe for available PCR bank,
Stefan Berger
[PATCH] ima: Fix trivial typos in the comments,
Austin Kim
[PATCH v5 0/2] integrity: support including firmware ".platform" keys at build time,
Nayna Jain
[PATCH] security:trusted_tpm2: Fix memory leak in tpm2_key_encode(),
Jianglei Nie
[PATCH v2 0/3] selftests: tpm2: Probe for available PCR bank,
Stefan Berger
[PATCH 1/3] selftest/kexec: fix "ignored null byte in input" warning,
Nageswara R Sastry
[PATCH v8 00/17] Enroll kernel keys thru MOK,
Eric Snowberg
- [PATCH v8 04/17] integrity: Do not allow machine keyring updates following init, Eric Snowberg
- [PATCH v8 07/17] integrity: restrict INTEGRITY_KEYRING_MACHINE to restrict_link_by_ca, Eric Snowberg
- [PATCH v8 05/17] X.509: Parse Basic Constraints for CA, Eric Snowberg
- [PATCH v8 06/17] KEYS: CA link restriction, Eric Snowberg
- [PATCH v8 03/17] integrity: Introduce a Linux keyring called machine, Eric Snowberg
- [PATCH v8 13/17] integrity: store reference to machine keyring, Eric Snowberg
- [PATCH v8 12/17] KEYS: integrity: change link restriction to trust the machine keyring, Eric Snowberg
- [PATCH v8 10/17] KEYS: add a reference to machine keyring, Eric Snowberg
- [PATCH v8 14/17] KEYS: link machine trusted keys to secondary_trusted_keys, Eric Snowberg
- [PATCH v8 02/17] integrity: Fix warning about missing prototypes, Eric Snowberg
- [PATCH v8 17/17] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true, Eric Snowberg
- [PATCH v8 09/17] KEYS: Rename get_builtin_and_secondary_restriction, Eric Snowberg
- [PATCH v8 11/17] KEYS: Introduce link restriction for machine keys, Eric Snowberg
- [PATCH v8 15/17] efi/mokvar: move up init order, Eric Snowberg
- [PATCH v8 16/17] integrity: Trust MOK keys if MokListTrustedRT found, Eric Snowberg
- [PATCH v8 08/17] integrity: add new keyring handler for mok keys, Eric Snowberg
- [PATCH v8 01/17] KEYS: Create static version of public_key_verify_signature, Eric Snowberg
- Re: [PATCH v8 00/17] Enroll kernel keys thru MOK, Jarkko Sakkinen
[PATCH v30 15/28] LSM: Ensure the correct LSM context releaser, Casey Schaufler
[PATCH v30 13/28] LSM: Use lsmblob in security_cred_getsecid, Casey Schaufler
[PATCH v30 12/28] LSM: Use lsmblob in security_inode_getsecid, Casey Schaufler
[PATCH v30 11/28] LSM: Use lsmblob in security_task_getsecid, Casey Schaufler
[PATCH 0/2] selftests: tpm2: Probe for available PCR bank,
Stefan Berger
[PATCH v7 00/17] Enroll kernel keys thru MOK,
Eric Snowberg
- [PATCH v7 05/17] KEYS: CA link restriction, Eric Snowberg
- [PATCH v7 12/17] KEYS: integrity: change link restriction to trust the machine keyring, Eric Snowberg
- [PATCH v7 04/17] X.509: Parse Basic Constraints for CA, Eric Snowberg
- [PATCH v7 01/17] integrity: Introduce a Linux keyring called machine, Eric Snowberg
- [PATCH v7 06/17] integrity: restrict INTEGRITY_KEYRING_MACHINE to restrict_link_by_ca, Eric Snowberg
- [PATCH v7 02/17] integrity: Do not allow machine keyring updates following init, Eric Snowberg
- [PATCH v7 07/17] integrity: Fix warning about missing prototypes, Eric Snowberg
- [PATCH v7 13/17] KEYS: link secondary_trusted_keys to machine trusted keys, Eric Snowberg
- [PATCH v7 15/17] efi/mokvar: move up init order, Eric Snowberg
- [PATCH v7 14/17] integrity: store reference to machine keyring, Eric Snowberg
- [PATCH v7 16/17] integrity: Trust MOK keys if MokListTrustedRT found, Eric Snowberg
- [PATCH v7 10/17] KEYS: add a reference to machine keyring, Eric Snowberg
- [PATCH v7 11/17] KEYS: Introduce link restriction for machine keys, Eric Snowberg
- [PATCH v7 17/17] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true, Eric Snowberg
- [PATCH v7 09/17] KEYS: Rename get_builtin_and_secondary_restriction, Eric Snowberg
- [PATCH v7 08/17] integrity: add new keyring handler for mok keys, Eric Snowberg
- [PATCH v7 03/17] KEYS: Create static version of public_key_verify_signature, Eric Snowberg
- Re: [PATCH v7 00/17] Enroll kernel keys thru MOK, Jarkko Sakkinen
[PATCH v17 0/3] Add trusted_for(2) (was O_MAYEXEC),
Mickaël Salaün
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux NFS]
[Linux NILFS]
[Linux USB Devel]
[Video for Linux]
[Linux SCSI]
[Yosemite Forum]