Linux Integrity
[Prev Page][Next Page]
- [PATCH v3 1/2] crypto: use SM3 instead of SM3_256, (continued)
- [PATCH ima-evm-utils 1/2] switch to using crun for podman,
Mimi Zohar
- [GIT PULL] TPM DEVICE DRIVER changes for v5.16,
Jarkko Sakkinen
- RE: [RFC PATCH v7 00/16] Integrity Policy Enforcement (IPE),
Roberto Sassu
- [PATCH v17 0/6] Add tpm i2c ptp driver,
amirmizi6
- RE: [RFC PATCH v7 12/16] fsverity|security: add security hooks to fsverity digest and signature,
Roberto Sassu
- [PATCH v16 0/6] Add tpm i2c ptp driver,
amirmizi6
- [PATCH v2 0/2] use SM3 instead of SM3_256,
Tianjia Zhang
- [PATCH v1 1/3] ima: define ima_trusted_for hook,
Mimi Zohar
- [PATCH 1/2] ima: define ima_trusted_for hook,
Mimi Zohar
- [PATCH] tpm/st33zp24: drop unneeded over-commenting,
Sohaib Mohamed
- [PATCH v15 0/3] Add trusted_for(2) (was O_MAYEXEC),
Mickaël Salaün
- [PATCH v15 2/3] arch: Wire up trusted_for(2), Mickaël Salaün
[PATCH v2 00/20] Make some spi device drivers return zero in .remove(),
Uwe Kleine-König
[PATCH v2 1/1] tpm: add request_locality before write TPM_INT_ENABLE,
Chen Jun
[PATCH v2] tpm: ibmvtpm: Make use of dma_alloc_noncoherent(),
Cai Huoqing
[PATCH 13/13] tpm: st33zp24: Make st33zp24_remove() return void,
Uwe Kleine-König
[PATCH v4 0/5] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys,
Ahmad Fatoum
[PATCH] tpm: ibmvtpm: Make use of dma_alloc_coherent(),
Cai Huoqing
[PATCH 0/2] tpm: use SM3 instead of SM3_256,
Tianjia Zhang
[PATCH v14 0/3] Add trusted_for(2) (was O_MAYEXEC),
Mickaël Salaün
[PATCH v6 0/2] IMA checkpatch fixes,
Petr Vorel
[PATCH] tpm/st33zp24: Fix typo in st33zp24.c,
Sohaib Mohamed
[PATCH v3 1/2] ima: fix uid code style problems,
Alex Henrie
[PATCH v13 0/3] Add trusted_for(2) (was O_MAYEXEC),
Mickaël Salaün
[PATCH v8 0/3] IMA: Add tests for uid, gid, fowner, and fgroup options,
Petr Vorel
- [PATCH v8 1/3] IMA: Move check_policy_writable() to ima_setup.sh and rename it, Petr Vorel
- [PATCH v8 2/3] IMA: Move ima_check to ima_setup.sh, Petr Vorel
- [PATCH v8 3/3] IMA: Add tests for uid, gid, fowner, and fgroup options, Petr Vorel
- Re: [PATCH v8 0/3] IMA: Add tests for uid, gid, fowner, and fgroup options, Petr Vorel
[PATCH] IMA: make runtime measurement list pollable,
Daiki Ueno
[PATCH v2] ima: add gid support,
Alex Henrie
[PATCH v3] integrity: support including firmware ".platform" keys at build time,
Nayna Jain
[PATCH v6] tpm: Add Upgrade/Reduced mode support for TPM2 modules,
Borys Movchan
DIGLIM demo, Roberto Sassu
[RFC][PATCH 0/7] ima: Measure and appraise files with DIGLIM,
Roberto Sassu
[PATCH] spi: bcm2835: do not unregister controller in shutdown handler,
Lino Sanfilippo
[PATCH v29 15/28] LSM: Ensure the correct LSM context releaser, Casey Schaufler
[PATCH v29 13/28] IMA: Change internal interfaces to use lsmblobs, Casey Schaufler
[PATCH v29 12/28] LSM: Use lsmblob in security_cred_getsecid, Casey Schaufler
[PATCH v29 11/28] LSM: Use lsmblob in security_inode_getsecid, Casey Schaufler
[PATCH v29 10/28] LSM: Use lsmblob in security_task_getsecid, Casey Schaufler
[PATCH v29 05/28] LSM: Use lsmblob in security_audit_rule_match, Casey Schaufler
[PATCH v2] tpm_tis_spi: Add missing SPI ID,
Mark Brown
[bug report] tpm/tpm_i2c_stm_st33: Split tpm_i2c_tpm_st33 in 2 layers (core + phy), Dan Carpenter
[PATCH] tpm_tis_spi: Add missing SPI ID,
Mark Brown
[PATCH ltp v7 1/3] IMA: Move check_policy_writable() to ima_setup.sh and rename it,
Alex Henrie
[PATCH v6 0/3] IMA: Add tests for uid, gid, fowner, and fgroup options,
Petr Vorel
[PATCH ltp v5 1/3] IMA: Move check_policy_writable to ima_setup.sh and rename it,
Alex Henrie
[PATCH ltp v4 1/3] IMA: Move check_policy_writable to ima_setup.sh and rename it,
Alex Henrie
[PATCH] tpm/eventlog: Don't abort tpm_read_log on faulty ACPI config,
Morten Linderud
[PATCH v2] integrity: support including firmware ".platform" keys at build time,
Nayna Jain
[RFC][PATCH 0/9] integrity: Introduce DIGLIM advanced features,
Roberto Sassu
[zohar-integrity:next-integrity-testing 1/1] security/integrity/ima/ima_policy.c:684:25: sparse: sparse: incompatible types in comparison expression (different address spaces):,
kernel test robot
[PATCH v6 00/13] Enroll kernel keys thru MOK,
Eric Snowberg
- [PATCH v6 01/13] integrity: Introduce a Linux keyring called machine, Eric Snowberg
- [PATCH v6 07/13] KEYS: add a reference to machine keyring, Eric Snowberg
- [PATCH v6 03/13] KEYS: CA link restriction, Eric Snowberg
- [PATCH v6 02/13] integrity: Do not allow machine keyring updates following init, Eric Snowberg
- [PATCH v6 05/13] integrity: add new keyring handler for mok keys, Eric Snowberg
- [PATCH v6 08/13] KEYS: Introduce link restriction for machine keys, Eric Snowberg
- [PATCH v6 12/13] integrity: Trust MOK keys if MokListTrustedRT found, Eric Snowberg
- [PATCH v6 04/13] integrity: restrict INTEGRITY_KEYRING_MACHINE to restrict_link_by_ca, Eric Snowberg
- [PATCH v6 13/13] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true, Eric Snowberg
- [PATCH v6 06/13] KEYS: Rename get_builtin_and_secondary_restriction, Eric Snowberg
- [PATCH v6 10/13] KEYS: link secondary_trusted_keys to machine trusted keys, Eric Snowberg
- [PATCH v6 11/13] integrity: store reference to machine keyring, Eric Snowberg
- [PATCH v6 09/13] KEYS: integrity: change link restriction to trust the machine keyring, Eric Snowberg
- Re: [PATCH v6 00/13] Enroll kernel keys thru MOK, Jarkko Sakkinen
- Re: [PATCH v6 00/13] Enroll kernel keys thru MOK, Nayna
[PATCH v3 00/13] integrity: Introduce DIGLIM,
Roberto Sassu
- [PATCH v3 01/13] diglim: Overview, Roberto Sassu
- [PATCH v3 03/13] diglim: Objects, Roberto Sassu
- [PATCH v3 04/13] diglim: Methods, Roberto Sassu
- [PATCH v3 02/13] diglim: Basic definitions, Roberto Sassu
- [PATCH v3 05/13] diglim: Parser, Roberto Sassu
- [PATCH v3 06/13] diglim: IMA info, Roberto Sassu
- [PATCH v3 07/13] diglim: Interfaces - digest_list_add, digest_list_del, Roberto Sassu
- [PATCH v3 09/13] diglim: Interfaces - digest_list_label, Roberto Sassu
- [PATCH v3 08/13] diglim: Interfaces - digest_lists_loaded, Roberto Sassu
- [PATCH v3 10/13] diglim: Interfaces - digest_query, Roberto Sassu
- [PATCH v3 11/13] diglim: Interfaces - digests_count, Roberto Sassu
- [PATCH v3 12/13] diglim: Remote Attestation, Roberto Sassu
- [PATCH v3 13/13] diglim: Tests, Roberto Sassu
- RE: [PATCH v3 00/13] integrity: Introduce DIGLIM, Roberto Sassu
[PATCH ltp v3 1/2] IMA: Move check_policy_writable to ima_setup.sh and rename it,
Alex Henrie
[PATCH v15 0/6] Add tpm i2c ptp driver,
amirmizi6
[PATCH v4 0/9] ima-evm-utils: Add support for signing with pkcs11 URIs,
Stefan Berger
- [PATCH v4 2/9] evmctl: Handle failure to initialize the openssl engine, Stefan Berger
- [PATCH v4 1/9] evmctl: Implement support for EVMCTL_KEY_PASSWORD environment variable, Stefan Berger
- [PATCH v4 3/9] evmctl: Implement function for setting up an OpenSSL engine, Stefan Berger
- [PATCH v4 4/9] evmctl: Define and use an ENGINE field in libimaevm_params, Stefan Berger
- [PATCH v4 5/9] evmctl: use the pkcs11 engine for pkcs11: prefixed URIs, Stefan Berger
- [PATCH v4 6/9] libimaevm: Add support for pkcs11 private keys for signing a v2 hash, Stefan Berger
- [PATCH v4 7/9] tests: Import softhsm_setup script to enable pkcs11 test case, Stefan Berger
- [PATCH v4 9/9] tests: Get the packages for pkcs11 testing on the CI/CD system, Stefan Berger
- [PATCH v4 8/9] tests: Extend sign_verify test with pkcs11-specific test, Stefan Berger
- Re: [PATCH v4 0/9] ima-evm-utils: Add support for signing with pkcs11 URIs, Mimi Zohar
[PATCH v14 0/7] Add tpm i2c ptp driver,
amirmizi6
[PATCH v2 1/1] tpm/tpm_i2c_infineon: Fix init endian vendor check,
Florian Eckert
[PATCH v6 0/1] NAX (No Anonymous Execution) LSM,
Igor Zhbanov
[PATCH v7 ima-evm-utils 0/2] make default hash algorithm dynamic,
Bruno Meneguele
[PATCH] tpm: fix potential NULL pointer access in tpm_del_char_device(),
Lino Sanfilippo
[PATCH] integrity: support including firmware ".platform" keys at build time,
Nayna Jain
[PATCH ltp v2] IMA: Add tests for uid, gid, fowner, and fgroup options,
Alex Henrie
[PATCH linux rebase] ima: add gid support,
Alex Henrie
[PATCH v3 0/9] ima-evm-utils: Add support for signing with pkcs11 URIs,
Stefan Berger
- [PATCH v3 1/9] evmctl: Implement support for EVMCTL_KEY_PASSWORD environment variable, Stefan Berger
- [PATCH v3 2/9] evmctl: Handle failure to initialize the openssl engine, Stefan Berger
- [PATCH v3 5/9] evmctl: use the pkcs11 engine for pkcs11: prefixed URIs, Stefan Berger
- [PATCH v3 6/9] libimaevm: Add support for pkcs11 private keys for signing a v2 hash, Stefan Berger
- [PATCH v3 4/9] evmctl: Define and use an ENGINE field in libimaevm_params, Stefan Berger
- [PATCH v3 3/9] evmctl: Implement function for setting up an OpenSSL engine, Stefan Berger
- [PATCH v3 9/9] tests: Get the packages for pkcs11 testing on the CI/CD system, Stefan Berger
- [PATCH v3 7/9] tests: Import softhsm_setup script to enable pkcs11 test case, Stefan Berger
- [PATCH v3 8/9] tests: Extend sign_verify test with pkcs11-specific test, Stefan Berger
- Re: [PATCH v3 0/9] ima-evm-utils: Add support for signing with pkcs11 URIs, Mimi Zohar
[PATCH] tpm/tpm_i2c_infineon: Fix init endian vendor check,
Florian Eckert
[PATCH v6] tpm: fix Atmel TPM crash caused by too frequent queries,
Hao Wu
[PATCH] tpm: Check for integer overflow in tpm2_map_response_body(),
Dan Carpenter
[PATCH v5 00/12] Enroll kernel keys thru MOK,
Eric Snowberg
- [PATCH v5 04/12] integrity: restrict INTEGRITY_KEYRING_MACHINE to restrict_link_by_ca, Eric Snowberg
- [PATCH v5 07/12] KEYS: Introduce link restriction to include builtin, secondary and machine keys, Eric Snowberg
- [PATCH v5 03/12] KEYS: CA link restriction, Eric Snowberg
- [PATCH v5 05/12] integrity: add new keyring handler for mok keys, Eric Snowberg
- [PATCH v5 10/12] integrity: store reference to machine keyring, Eric Snowberg
- [PATCH v5 08/12] KEYS: integrity: change link restriction to trust the machine keyring, Eric Snowberg
- [PATCH v5 01/12] integrity: Introduce a Linux keyring called machine, Eric Snowberg
- [PATCH v5 11/12] integrity: Trust MOK keys if MokListTrustedRT found, Eric Snowberg
- [PATCH v5 06/12] KEYS: add a reference to machine keyring, Eric Snowberg
- [PATCH v5 02/12] integrity: Do not allow machine keyring updates following init, Eric Snowberg
- [PATCH v5 09/12] KEYS: link secondary_trusted_keys to machine trusted keys, Eric Snowberg
- [PATCH v5 12/12] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true, Eric Snowberg
- Re: [PATCH v5 00/12] Enroll kernel keys thru MOK, Jarkko Sakkinen
[PATCH ima-evm-utils v4] evmctl: Use secure heap for private keys and passwords,
Vitaly Chikunov
[PATCH v5 ima-evm-utils 0/2] make default hash algorithm dynamic,
Bruno Meneguele
IMA namespaces,
Denis Semakin
[GIT PULL] integrity subsystem updates for v5.15,
Mimi Zohar
[PATCH v4 00/14] x86: Trenchboot secure dynamic launch Linux kernel support,
Ross Philipson
- [PATCH v4 03/14] x86/boot: Place kernel_info at a fixed offset, Ross Philipson
- [PATCH v4 05/14] x86: Secure Launch Kconfig, Ross Philipson
- [PATCH v4 04/14] Documentation/x86: Secure Launch kernel documentation, Ross Philipson
- [PATCH v4 10/14] x86: Secure Launch SMP bringup support, Ross Philipson
- [PATCH v4 11/14] kexec: Secure Launch kexec SEXIT support, Ross Philipson
- [PATCH v4 12/14] reboot: Secure Launch SEXIT support on reboot paths, Ross Philipson
- [PATCH v4 07/14] x86: Add early SHA support for Secure Launch early measurements, Ross Philipson
- [PATCH v4 02/14] x86/boot: Add setup_indirect support in early_memremap_is_setup_data, Ross Philipson
- [PATCH v4 06/14] x86: Secure Launch main header file, Ross Philipson
- [PATCH v4 01/14] x86/boot: Fix memremap of setup_indirect structures, Ross Philipson
- [PATCH v4 14/14] tpm: Allow locality 2 to be set when initializing the TPM for Secure Launch, Ross Philipson
- [PATCH v4 09/14] x86: Secure Launch kernel late boot stub, Ross Philipson
- [PATCH v4 13/14] x86: Secure Launch late initcall platform module, Ross Philipson
- [PATCH v4 08/14] x86: Secure Launch kernel early boot stub, Ross Philipson
- Re: [PATCH v4 00/14] x86: Trenchboot secure dynamic launch Linux kernel support, Paul Moore
[PATCH v13 0/7] Add tpm i2c ptp driver,
amirmizi6
[PATCH v2] tpm: tis: Kconfig: Add helper dependency on COMPILE_TEST,
Cai Huoqing
[PATCH] tpm: tis: Kconfig: Add helper dependency on COMPILE_TEST,
Cai Huoqing
Writes to /proc/self/mem and file_mprotect() LSM hook, Igor Zhbanov
[PATCH linux-next] char:tpm: fix boolreturn.cocci warnings, CGEL
[GIT PULL] TPM DEVICE DRIVER changes for v5.15,
Jarkko Sakkinen
[PATCH] IMA: reject unknown hash algorithms in ima_get_hash_algo,
THOBY Simon
[PATCH ima-evm-utils v3] Use secure heap for private keys and passwords,
Vitaly Chikunov
[PATCH v5 0/1] NAX (No Anonymous Execution) LSM,
Igor Zhbanov
[PATCH v4 ima-evm-utils 0/2] make default hash algorithm dynamic,
Bruno Meneguele
[PATCH v3 ima-evm-utils 0/2] make default hash algorithm dynamic,
Bruno Meneguele
[PATCH v4 0/1] NAX (No Anonymous Execution) LSM,
Igor Zhbanov
[PATCH] IMA: set a default value for unknown digsig algorithms,
THOBY Simon
[PATCH v3 0/1] NAX (No Anonymous Execution) LSM,
Igor Zhbanov
[syzbot] UBSAN: array-index-out-of-bounds in ima_inode_setxattr, syzbot
[PATCH] ima: fix infinite loop within "ima_match_policy" function.,
liqiong
[PATCH ima-evm-utils v2] Use secure heap for private keys and passwords,
Vitaly Chikunov
[PATCH v4 00/12] Enroll kernel keys thru MOK,
Eric Snowberg
- [PATCH v4 06/12] KEYS: add a reference to mok keyring, Eric Snowberg
- [PATCH v4 07/12] KEYS: Introduce link restriction to include builtin, secondary and mok keys, Eric Snowberg
- [PATCH v4 03/12] KEYS: CA link restriction, Eric Snowberg
- [PATCH v4 05/12] integrity: add new keyring handler for mok keys, Eric Snowberg
- [PATCH v4 01/12] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK), Eric Snowberg
- [PATCH v4 08/12] KEYS: integrity: change link restriction to trust the mok keyring, Eric Snowberg
- [PATCH v4 04/12] integrity: restrict INTEGRITY_KEYRING_MOK to restrict_link_by_ca, Eric Snowberg
- [PATCH v4 02/12] integrity: Do not allow mok keyring updates following init, Eric Snowberg
- [PATCH v4 09/12] KEYS: link secondary_trusted_keys to mok trusted keys, Eric Snowberg
- [PATCH v4 10/12] integrity: store reference to mok keyring, Eric Snowberg
- [PATCH v4 11/12] integrity: Trust MOK keys if MokListTrustedRT found, Eric Snowberg
- [PATCH v4 12/12] integrity: Only use mok keyring when uefi_check_trust_mok_keys is true, Eric Snowberg
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK, Jarkko Sakkinen
[PATCH v2 ima-evm-utils] libimaevm: make SHA-256 the default hash algorithm,
Bruno Meneguele
[PATCH] libimaevm: make SHA-256 the default hash algorithm, Bruno Meneguele
[PATCH v2 0/1] NAX (No Anonymous Execution) LSM,
Igor Zhbanov
[PATCH v2 ima-evm-utils] evmctl: fix memory leak in get_password,
Bruno Meneguele
[PATCH v8 0/6] IMA: restrict the accepted digest algorithms for the security.ima xattr,
THOBY Simon
[PATCH 1/1] ima: check control characters in policy file path,
Tianxing Zhang
[PATCH 0/1] ima: check control characters in policy path,
Tianxing Zhang
[PATCH 0/6] updates to device mapper target measurement using ima,
Tushar Sugandhi
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux NFS]
[Linux NILFS]
[Linux USB Devel]
[Video for Linux]
[Linux SCSI]
[Yosemite Forum]