Linux Integrity
[Prev Page][Next Page]
- RE: [RFC][PATCH v2 06/12] diglim: Interfaces - digest_list_add, digest_list_del, (continued)
- [PATCH][V2] security: keys: trusted: Fix memory leaks on allocated blob,
Colin King
- [PATCH ima-evm-utils v3] ima-evm-utils: Fix incorrect algorithm name in hash_info.gen, Tianjia Zhang
- [PATCH 1/2] char: tpm: Kconfig: remove bad i2c cr50 select,
Adrian Ratiu
- [PATCH] security: keys: trusted: Fix memory leaks on allocated blob,
Colin King
- [PATCH v4 0/3] ima: Provide more info about buffer measurement,
Roberto Sassu
- [PATCH ima-evm-utils v2] ima-evm-utils: Fix incorrect algorithm name in hash_info.gen,
Tianjia Zhang
- [RFC][PATCH ima-evm-utils 0/7] ima-evm-utils: Add UML support and tests for EVM portable signatures,
Roberto Sassu
- [RFC PATCH v1 0/4] keys: introduce key_extract_material helper,
Ahmad Fatoum
- [PATCH ima-evm-utils] ima-evm-utils: Fix incorrect algorithm name in hash_info.gen,
Tianjia Zhang
- [PATCH v28 15/25] LSM: Ensure the correct LSM context releaser, Casey Schaufler
- [PATCH v28 13/25] IMA: Change internal interfaces to use lsmblobs, Casey Schaufler
- [PATCH v28 12/25] LSM: Use lsmblob in security_cred_getsecid, Casey Schaufler
- [PATCH v28 11/25] LSM: Use lsmblob in security_inode_getsecid, Casey Schaufler
- [PATCH v28 10/25] LSM: Use lsmblob in security_task_getsecid, Casey Schaufler
- [PATCH v28 05/25] LSM: Use lsmblob in security_audit_rule_match, Casey Schaufler
- [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys,
Ahmad Fatoum
- [PATCH v2] KEYS: trusted: fix use as module when CONFIG_TCG_TPM=m,
Ahmad Fatoum
- [PATCH ima-evm-utils v7] ima-evm-utils: Support SM2/3 algorithm for sign and verify,
Tianjia Zhang
- [PATCH v2 0/3] IMA: restrict the accepted digest algorithms,
THOBY Simon
- [PATCH ima-evm-utils v6] ima-evm-utils: Support SM2/3 algorithm for sign and verify,
Tianjia Zhang
- Re: [syzbot] possible deadlock in mnt_want_write (2),
Miklos Szeredi
- Re: [syzbot] possible deadlock in mnt_want_write (2), Miklos Szeredi
[PATCH] tpm: Add Upgrade/Reduced mode support for TPM2 modules,
Borys Movchan
[PATCH] evmctl: Remove left-over check S_ISDIR() for directory signing,
Stefan Berger
[PATCH ima-evm-utils v9 0/3] ima-evm-utils: Add --keyid option,
Vitaly Chikunov
[PATCH ima-evm-utils 1/3] Fix out-of-bounds read,
Mimi Zohar
[PATCH ima-evm-utils v5] ima-evm-utils: Support SM2/3 algorithm for sign and verify,
Tianjia Zhang
[PATCH] KEYS: trusted: Fix trusted key backends when building as module,
Andreas Rammhold
Re: [PATCH v5 8/8] firmware: tee_bnxt: Release TEE shm, session, and context during kexec,
Vikas Gupta
[PATCH ima-evm-utils v3] CI: Add support for ALT Linux,
Vitaly Chikunov
[PATCH ima-evm-utils v2] CI: Add support for ALT Linux,
Vitaly Chikunov
[PATCH ima-evm-utils] tests: list crypto algorithm tests skipped, Mimi Zohar
[PATCH ima-evm-utils v4] ima-evm-utils: Support SM2 algorithm for sign and verify,
Tianjia Zhang
[PATCH ima-evm-utils] Fix NULL pointer warning,
Mimi Zohar
[PATCH] IMA: add an option to restrict the accepted hash algorithms,
THOBY Simon
[PATCH 0/7] device mapper target measurements using IMA,
Tushar Sugandhi
[PATCH v8 0/5] Enable root to update the blacklist keyring,
Mickaël Salaün
[PATCH] tpm: ibmvtpm: Avoid error message when process gets signal while waiting,
Stefan Berger
[PATCH ima-evm-utils v8 0/3] ima-evm-utils: Add --keyid option,
Vitaly Chikunov
[PATCH ima-evm-utils 1/3] CI: Do not install swtpm if it cannot work anyway,
Vitaly Chikunov
[PATCH] CI: Add GitHub Actions for ALT Linux,
Vitaly Chikunov
Vacation weeks 28, 29, Jarkko Sakkinen
[no subject], Jarkko Sakkinen
[PATCH ima-evm-utils v2 0/4] libimaevm: Remove digest calculations not supported by IMA,
Stefan Berger
[PATCH v2] char: tpm: vtpm_proxy: Fix race in init,
Saubhik Mukherjee
[PATCH] efi/tpm: Differentiate missing and invalid final event log table.,
Michal Suchanek
[PATCH] ima: check control characters in policy path, Tianxing Zhang
Weak hash algorithms allowed with DIGEST_NG,
THOBY Simon
[PATCH RFC 00/12] Enroll kernel keys thru MOK,
Eric Snowberg
- [PATCH RFC 02/12] KEYS: Allow unrestricted keys to be moved to the secondary keyring, Eric Snowberg
- [PATCH RFC 05/12] integrity: Introduce mok keyring, Eric Snowberg
- [PATCH RFC 09/12] integrity: accessor function to get trust_moklist, Eric Snowberg
- [PATCH RFC 04/12] integrity: add integrity_destroy_keyring, Eric Snowberg
- [PATCH RFC 03/12] KEYS: CA link restriction, Eric Snowberg
- [PATCH RFC 01/12] KEYS: Add KEY_ALLOC_BYPASS_RESTRICTION option to key_move, Eric Snowberg
- [PATCH RFC 12/12] integrity: Suppress error message for keys added to the mok keyring, Eric Snowberg
- [PATCH RFC 08/12] integrity: restrict INTEGRITY_KEYRING_MOK to restrict_link_by_secondary_trusted_or_ca, Eric Snowberg
- [PATCH RFC 11/12] integrity: move keys from the mok keyring into the secondary keyring, Eric Snowberg
- [PATCH RFC 06/12] integrity: Trust mok keys if MokListTrustedRT found, Eric Snowberg
- [PATCH RFC 07/12] integrity: add add_to_mok_keyring, Eric Snowberg
- [PATCH RFC 10/12] integrity: add new keyring handler, Eric Snowberg
- Re: [PATCH RFC 00/12] Enroll kernel keys thru MOK, Christoph Hellwig
- Re: [PATCH RFC 00/12] Enroll kernel keys thru MOK, Mimi Zohar
[PATCH 1/1] NAX LSM: Add initial support support,
Igor Zhbanov
[PATCH 0/1] NAX (No Anonymous Execution) LSM, Igor Zhbanov
[PATCH] ima: Support euid keyword for buffer measurement,
Roberto Sassu
[PATCH v3 0/3] ima: Provide more info about buffer measurement,
Roberto Sassu
[PATCH AUTOSEL 5.12 36/80] ima: Don't remove security.ima if file must not be appraised, Sasha Levin
[PATCH AUTOSEL 5.13 38/85] ima: Don't remove security.ima if file must not be appraised, Sasha Levin
[PATCH] ima: add gid support,
Alex Henrie
[PATCH v2 0/3] ima: Provide more info about buffer measurement,
Roberto Sassu
[PATCH v7 0/3] ima-evm-utils: Add --keyid option,
Vitaly Chikunov
[PATCH ima-evm-utils 0/3] libimaevm: Remove digest calculations not supported by IMA,
Stefan Berger
[PATCH 0/3] ima: Provide more info about buffer measurement,
Roberto Sassu
[PATCH v8 0/2] Add support for ECDSA-signed kernel modules,
Stefan Berger
[PATCH] IMA: remove -Wmissing-prototypes warning,
Austin Kim
[RFC] ima: check ima-policy's path,
Tianxing Zhang
/dev/tpmrm0 session handling, Ken Goldman
[PATCH v7 0/2] Add support for ECDSA-signed kernel modules,
Stefan Berger
[GIT PULL] integrity subsystem updates for v5.14,
Mimi Zohar
[RFC][PATCH 00/12] Huawei Digest Lists,
Roberto Sassu
- [RFC][PATCH 03/12] digest_lists: Basic definitions, Roberto Sassu
- [RFC][PATCH 01/12] ima: Add digest, algo, measured parameters to ima_measure_critical_data(), Roberto Sassu
- [RFC][PATCH 02/12] digest_lists: Overview, Roberto Sassu
- [RFC][PATCH 04/12] digest_lists: Objects, Roberto Sassu
- [RFC][PATCH 06/12] digest_lists: Parser, Roberto Sassu
- [RFC][PATCH 07/12] digest_lists: Interfaces - digest_list_add, digest_list_del, Roberto Sassu
- [RFC][PATCH 05/12] digest_lists: Methods, Roberto Sassu
- [RFC][PATCH 09/12] digest_lists: Interfaces - digest_label, Roberto Sassu
- [RFC][PATCH 08/12] digest_lists: Interfaces - digest_lists_loaded, Roberto Sassu
- [RFC][PATCH 10/12] digest_lists: Interfaces - digest_query, Roberto Sassu
- [RFC][PATCH 11/12] digest_lists: Interfaces - digests_count, Roberto Sassu
- [RFC][PATCH 12/12] digest_lists: Tests, Roberto Sassu
[PATCH] certs: Redirect openssl error message to null device,
Stefan Berger
[GIT PULL] TPM DEVICE DRIVER changes for v5.14,
Jarkko Sakkinen
[PATCH] char: tpm: vtpm_proxy: Fix race in init,
Saubhik Mukherjee
[PATCH 0/3] Add GitHub Actions support,
Petr Vorel
[PATCH v2 2/6] KEYS: trusted: Allow import from existing key material for development, Ahmad Fatoum
[PATCH v2 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys,
Ahmad Fatoum
[PATCH v2] evm: Check xattr size discrepancy between kernel and user,
Roberto Sassu
[PATCH] evm: Check xattr size misalignment between kernel and user,
Roberto Sassu
[PATCH v2] evm: output EVM digest calculation info,
Mimi Zohar
[PATCH v2] tpm, tpm_tis_spi: Allow to sleep in the interrupt handler,
Lino Sanfilippo
[integrity:next-integrity-testing 13/13] security/integrity/evm/evm_crypto.c:181:41: warning: format specifies type 'unsigned long' but the argument has type 'unsigned int', kernel test robot
[integrity:next-integrity-testing 13/13] <command-line>: warning: format '%lu' expects argument of type 'long unsigned int', but argument 3 has type 'unsigned int', kernel test robot
[PATCH v2 00/12] x86: Trenchboot secure dynamic launch Linux kernel support,
Ross Philipson
- [PATCH v2 08/12] kexec: Secure Launch kexec SEXIT support, Ross Philipson
- [PATCH v2 11/12] tpm: Allow locality 2 to be set when initializing the TPM for Secure Launch, Ross Philipson
- [PATCH v2 06/12] x86: Secure Launch kernel late boot stub, Ross Philipson
- [PATCH v2 09/12] reboot: Secure Launch SEXIT support on reboot paths, Ross Philipson
- [PATCH v2 12/12] iommu: Do not allow IOMMU passthrough with Secure Launch, Ross Philipson
- [PATCH v2 04/12] x86: Add early SHA support for Secure Launch early measurements, Ross Philipson
- [PATCH v2 10/12] x86: Secure Launch late initcall platform module, Ross Philipson
- [PATCH v2 05/12] x86: Secure Launch kernel early boot stub, Ross Philipson
- [PATCH v2 03/12] x86: Secure Launch main header file, Ross Philipson
- [PATCH v2 02/12] x86: Secure Launch Kconfig, Ross Philipson
- [PATCH v2 01/12] x86/boot: Place kernel_info at a fixed offset, Ross Philipson
- [PATCH v2 07/12] x86: Secure Launch SMP bringup support, Ross Philipson
[PATCH 1/2] tpm: Fix tpmrm reference counting,
Vincent Whitchurch
[PATCH v5 0/8] tee: Improve support for kexec and kdump,
Tyler Hicks
- [PATCH v5 1/8] optee: Fix memory leak when failing to register shm pages, Tyler Hicks
- [PATCH v5 2/8] optee: Refuse to load the driver under the kdump kernel, Tyler Hicks
- [PATCH v5 3/8] optee: fix tee out of memory failure seen during kexec reboot, Tyler Hicks
- [PATCH v5 4/8] optee: Clear stale cache entries during initialization, Tyler Hicks
- [PATCH v5 5/8] tee: add tee_shm_alloc_kernel_buf(), Tyler Hicks
- [PATCH v5 6/8] tee: Correct inappropriate usage of TEE_SHM_DMA_BUF flag, Tyler Hicks
- [PATCH v5 7/8] tpm_ftpm_tee: Free and unregister TEE shared memory during kexec, Tyler Hicks
- [PATCH v5 8/8] firmware: tee_bnxt: Release TEE shm, session, and context during kexec, Tyler Hicks
- Re: [PATCH v5 0/8] tee: Improve support for kexec and kdump, Sumit Garg
- Re: [PATCH v5 0/8] tee: Improve support for kexec and kdump, Jens Wiklander
[PATCH 0/3] DCP as trusted keys backend,
Richard Weinberger
Size mismatch between vfs_getxattr_alloc() and vfs_getxattr(),
Roberto Sassu
[PATCH v27 15/25] LSM: Ensure the correct LSM context releaser, Casey Schaufler
[PATCH v27 13/25] IMA: Change internal interfaces to use lsmblobs, Casey Schaufler
[PATCH v27 12/25] LSM: Use lsmblob in security_cred_getsecid, Casey Schaufler
[PATCH v27 11/25] LSM: Use lsmblob in security_inode_getsecid, Casey Schaufler
[PATCH v27 10/25] LSM: Use lsmblob in security_task_getsecid, Casey Schaufler
[PATCH v27 05/25] LSM: Use lsmblob in security_audit_rule_match, Casey Schaufler
[PATCH v4 0/8] tee: Improve support for kexec and kdump,
Tyler Hicks
- [PATCH v4 1/8] optee: Fix memory leak when failing to register shm pages, Tyler Hicks
- [PATCH v4 2/8] optee: Refuse to load the driver under the kdump kernel, Tyler Hicks
- [PATCH v4 3/8] optee: fix tee out of memory failure seen during kexec reboot, Tyler Hicks
- [PATCH v4 4/8] optee: Clear stale cache entries during initialization, Tyler Hicks
- [PATCH v4 5/8] tee: add tee_shm_alloc_kernel_buf(), Tyler Hicks
- [PATCH v4 6/8] tee: Support kernel shm registration without dma-buf backing, Tyler Hicks
- [PATCH v4 7/8] tpm_ftpm_tee: Free and unregister TEE shared memory during kexec, Tyler Hicks
- [PATCH v4 8/8] firmware: tee_bnxt: Release TEE shm, session, and context during kexec, Tyler Hicks
[PATCH 1/2] ima: Fix warning: no previous prototype for function 'ima_add_kexec_buffer',
Lakshmi Ramasubramanian
[PATCH v6 0/4] Add support for ECDSA-signed kernel modules,
Stefan Berger
[PATCH] tpm2_load_command leaks memory,
Dhiraj Shah
ima - wait for tpm load,
Jorge Ramirez-Ortiz, Foundries
[PATCH v3] tpm: Replace WARN_ONCE() with dev_err_once() in tpm_tis_status(),
Jarkko Sakkinen
[PATCH v3 0/7] tee: Improve support for kexec and kdump,
Tyler Hicks
[PATCH 0/2] EVM: add some debugging info,
Mimi Zohar
[PATCH 1/5] doc: Fix warning in Documentation/security/IMA-templates.rst,
Roberto Sassu
[PATCH][next] ima: Fix fall-through warning for Clang,
Gustavo A. R. Silva
[integrity:next-integrity-testing 5/9] security/integrity/ima/ima_template_lib.c:616:22: sparse: sparse: incorrect type in assignment (different base types),
kernel test robot
[integrity:next-integrity-testing 4/9] security/integrity/ima/ima_template_lib.c:571:28: sparse: sparse: incorrect type in assignment (different base types), kernel test robot
[integrity:next-integrity-testing 3/9] security/integrity/ima/ima_template_lib.c:100:44: sparse: sparse: cast to restricted __le16, kernel test robot
[RFC PATCH 0/2] EVM: add some debugging info,
Mimi Zohar
[PATCH v2 0/1] tpm_tis: Use DEFINE_RES_MEM() to simplify code,
Zhen Lei
[PATCH -next] tpm: fix some doc warnings in tpm1-cmd.c,
Yang Yingliang
[PATCH v5 0/2] Add support for ECDSA-signed kernel modules,
Stefan Berger
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux NFS]
[Linux NILFS]
[Linux USB Devel]
[Video for Linux]
[Linux SCSI]
[Yosemite Forum]