Linux Integrity
[Prev Page][Next Page]
- [PATCH v8 3/4] doc: trusted-encrypted: updates with TEE as a new trust source, (continued)
- [PATCH v4 0/3] wire up IMA secure boot for arm64,
Ard Biesheuvel
- [PATCH v5 0/7] IMA: Infrastructure for measurement of critical kernel data,
Tushar Sugandhi
- [RFC PATCH 0/4] Secure Launch early PCR extend support,
Daniel P. Smith
- [PATCH v8 0/4] Carry forward IMA measurement log on kexec on ARM64,
Lakshmi Ramasubramanian
- [PATCH v4 0/3,RESEND] KEYS, trusted: a bunch of bug fixes,
Jarkko Sakkinen
- [PATCH v3 0/3] add ima_arch support for ARM64,
Chester Lin
- [RFC] Finding the right target branch for patches that span IMA and SeLinux,
Tushar Sugandhi
- ima-evm-utils: version 1.3.2 released,
Mimi Zohar
- [PATCH 00/34] fs: idmapped mounts,
Christian Brauner
- [PATCH 02/34] namespace: only take read lock in do_reconfigure_mnt(), Christian Brauner
- [PATCH 05/34] fs: introduce MOUNT_ATTR_IDMAP, Christian Brauner
- [PATCH 11/34] acl: handle idmapped mounts, Christian Brauner
- [PATCH 04/34] tests: add mount_setattr() selftests, Christian Brauner
- [PATCH 10/34] attr: handle idmapped mounts, Christian Brauner
- [PATCH 13/34] selftests: add idmapped mounts xattr selftest, Christian Brauner
- [PATCH 22/34] af_unix: handle idmapped mounts, Christian Brauner
- [PATCH 31/34] expfs: handle idmapped mounts, Christian Brauner
- [PATCH 25/34] exec: handle idmapped mounts, Christian Brauner
- [PATCH 19/34] namei: add lookup helpers with idmapped mounts aware permission checking, Christian Brauner
- [PATCH 18/34] namei: prepare for idmapped mounts, Christian Brauner
- [PATCH 24/34] would_dump: handle idmapped mounts, Christian Brauner
- [PATCH 23/34] utimes: handle idmapped mounts, Christian Brauner
- [PATCH 28/34] audit: handle idmapped mounts, Christian Brauner
- [PATCH 20/34] open: handle idmapped mounts in do_truncate(), Christian Brauner
- [PATCH 17/34] namei: introduce struct renamedata, Christian Brauner
- [PATCH 32/34] overlayfs: handle idmapped lower directories, Christian Brauner
- [PATCH 27/34] apparmor: handle idmapped mounts, Christian Brauner
- [PATCH 16/34] namei: handle idmapped mounts in may_*() helpers, Christian Brauner
- [PATCH 21/34] open: handle idmapped mounts, Christian Brauner
- [PATCH 34/34] fat: handle idmapped mounts, Christian Brauner
- [PATCH 26/34] fs: add helpers for idmap mounts, Christian Brauner
- [PATCH 29/34] ima: handle idmapped mounts, Christian Brauner
- [PATCH 33/34] overlayfs: handle idmapped merged mounts, Christian Brauner
- [PATCH 30/34] ext4: support idmapped mounts, Christian Brauner
- [PATCH 14/34] commoncap: handle idmapped mounts, Christian Brauner
- [PATCH 15/34] stat: add mapped_generic_fillattr(), Christian Brauner
- [PATCH 12/34] xattr: handle idmapped mounts, Christian Brauner
- [PATCH 03/34] fs: add mount_setattr(), Christian Brauner
- [PATCH 08/34] namei: add idmapped mount aware permission helpers, Christian Brauner
- [PATCH 09/34] inode: add idmapped mount aware init and permission helpers, Christian Brauner
- [PATCH 07/34] capability: handle idmapped mounts, Christian Brauner
- [PATCH 06/34] fs: add id translation helpers, Christian Brauner
- [PATCH 01/34] namespace: take lock_mount_hash() directly when changing flags, Christian Brauner
- Re: [PATCH 00/34] fs: idmapped mounts, Sargun Dhillon
- Re: [PATCH 00/34] fs: idmapped mounts, Dave Chinner
- Re: [PATCH 00/34] fs: idmapped mounts, Eric W. Biederman
- Message not available
Re: [PATCH 00/34] fs: idmapped mounts, Andy Lutomirski
evmctl argument parsing, HMAC algorithm, HMAC replacement, Ahmed, Safayet (GE Research, US)
[PATCH] tpm_tis_core: Add the error log when the chip startup failed, Tian Tao
[PATCH] IMA: Measure kernel version in early boot, Raphael Gianotti
[PATCH v3] dm verity: Add support for signature verification with 2nd keyring, Mickaël Salaün
[PATCH ima-evm-utils] boot_aggregate.test: Skip if CONFIG_IMA not enabled,
Petr Vorel
[PATCH] file2bin: Pass the right values to size and count parameters for fread(),
Lakshmi Ramasubramanian
[PATCH] security: remove unneeded break,
trix
[PATCH v4 0/2] dm-devel:dm-crypt: infrastructure for measurement of DM target data using IMA,
Tushar Sugandhi
[RESEND PATCH v11 0/3] Add trusted_for(2) (was O_MAYEXEC),
Mickaël Salaün
Measuring kernel modules with IMA,
Stephen Smalley
[RFC] treewide: cleanup unreachable breaks,
trix
[ima-evm-utils][PATCH 0/3] travis: misc software TPM changes,
Mimi Zohar
[PATCH] tpm_tis: Disable interrupts on ThinkPad T490s,
Jerry Snitselaar
[PATCH v2] dm verity: Add support for signature verification with 2nd keyring,
Mickaël Salaün
[PATCH v2] MAINTAINERS: jarkko.sakkinen@xxxxxxxxxxxxxxx -> jarkko@xxxxxxxxxx, Jarkko Sakkinen
WARN_ONCE triggered: tpm_tis: Add a check for invalid status,
Dirk Gouders
[GIT PULL] integrity subsystem updates for v5.10,
Mimi Zohar
QUEMU and TPM2 device emulation,
Roberts, William C
[PATCH v2 0/2] add ima_arch support for ARM64,
Chester Lin
[integrity:next-integrity-testing 13/13] security/integrity/ima/ima_appraise.c:21:62: error: expected ')' before numeric constant,
kernel test robot
[PATCH][V2] ima: Fix sizeof mismatches, Colin King
[PATCH] MAINTAINERS: jarkko.sakkinen@xxxxxxxxxxxxxxx -> jarkko@xxxxxxxxxx,
Jarkko Sakkinen
[PATCH v2] ima: defer arch_ima_get_secureboot() call to IMA init time,
Ard Biesheuvel
[PATCH v4 0/3] KEYS, trusted: a bunch of bug fixes,
Jarkko Sakkinen
- [PATCH v4 1/3] KEYS: trusted: Fix incorrect handling of tpm_get_random(), Jarkko Sakkinen
- [PATCH v4 2/3] KEYS: trusted: Fix migratable=1 failing, Jarkko Sakkinen
- [PATCH v4 3/3] KEYS: trusted: Reserve TPM for seal and unseal operations, Jarkko Sakkinen
- [PATCH v4 2/3,RESEND] KEYS: trusted: Fix migratable=1 failing, Jarkko Sakkinen
- [PATCH v4 3/3,RESEND] KEYS: trusted: Reserve TPM for seal and unseal operations, Jarkko Sakkinen
- [PATCH v4 1/3,RESEND] KEYS: trusted: Fix incorrect handling of tpm_get_random(), Jarkko Sakkinen
- [PATCH v4 1/3,RESEND 2] KEYS: trusted: Fix incorrect handling of tpm_get_random(), Jarkko Sakkinen
- [PATCH v4 2/3,RESEND 2] KEYS: trusted: Fix migratable=1 failing, Jarkko Sakkinen
- [PATCH v4 3/3,RESEND 2] KEYS: trusted: Reserve TPM for seal and unseal operations, Jarkko Sakkinen
[PATCH v3 0/3] KEYS, trusted: a bunch of bug fixes,
Jarkko Sakkinen
[PATCH v2 0/5] Updates to use IBM TSS C API rather than command line tools,
Ken Goldman
[PATCH v21 13/23] LSM: Ensure the correct LSM context releaser, Casey Schaufler
[PATCH v21 11/23] IMA: Change internal interfaces to use lsmblobs, Casey Schaufler
[PATCH v21 10/23] LSM: Use lsmblob in security_cred_getsecid, Casey Schaufler
[PATCH v21 09/23] LSM: Use lsmblob in security_inode_getsecid, Casey Schaufler
[PATCH v21 08/23] LSM: Use lsmblob in security_task_getsecid, Casey Schaufler
[PATCH] ima: defer arch_ima_get_secureboot() call to IMA init time,
Ard Biesheuvel
Does selinux rule needed for .ima keyring access - integrity: Request for unknown key 'id:87deb3bf' err -13, rishi gupta
[PATCH RFC PKS/Trusted keys 0/2] trusted keys: Add PKS protection to trusted keys,
ira . weiny
[PATCH 5/5] ima-evm-utils: Expand the INSTALL instructions., Ken Goldman
[PATCH 4/5] ima-evm-utils: Correct spelling errors, Ken Goldman
[PATCH 3/5] ima-evm-utils: Change tpm2_pcr_read() to use C code, Ken Goldman
[PATCH 2/5] ima-evm-utils: Change PCR iterater from int to uint32_t, Ken Goldman
[PATCH 1/5] ima-evm-utils: Change env variable TPM_SERVER_TYPE for, tpm_server, Ken Goldman
[PATCH 0/5] Updates to use IBM TSS C API rather than command line tools, Ken Goldman
[PATCH] ima: Fix sizeof mismatches,
Colin King
[PATCH v7 0/4] Introduce TEE based Trusted Keys support,
Sumit Garg
[PATCH 1/1] travis: Fix Tumbleweed installation, Petr Vorel
[PATCH 6/6] ima-evm-utils: Expand the INSTALL instructions., Ken Goldman
[PATCH 5/6] ima-evm-utils: Correct spelling errors, Ken Goldman
[PATCH 4/6] ima-evm-utils: Change tpm2_pcr_read() to use C code, Ken Goldman
[PATCH 3/6] ima-evm-utils: When using the IBM TSS, link in its library,
Ken Goldman
[PATCH 2/6] ima-evm-utils: Change PCR iterater from int to uint32_t, Ken Goldman
[PATCH v2 0/3] A bunch of trusted keys fixes,
Jarkko Sakkinen
[PATCH 0/3] A bunch of trusted keys fixes,
Jarkko Sakkinen
[GIT PULL] tpmdd updates for v5.10,
Jarkko Sakkinen
[PATCH 1/6] ima-evm-utils: Change env variable TPM_SERVER_TYPE for, tpm_server, Ken Goldman
[PATCH v5 00/16] Introduce partial kernel_read_file() support,
Kees Cook
- [PATCH v5 01/16] fs/kernel_read_file: Remove FIRMWARE_PREALLOC_BUFFER enum, Kees Cook
- [PATCH v5 02/16] fs/kernel_read_file: Remove FIRMWARE_EFI_EMBEDDED enum, Kees Cook
- [PATCH v5 05/16] fs/kernel_read_file: Remove redundant size argument, Kees Cook
- [PATCH v5 14/16] firmware: Store opt_flags in fw_priv, Kees Cook
- [PATCH v5 15/16] firmware: Add request_partial_firmware_into_buf(), Kees Cook
- [PATCH v5 10/16] module: Call security_kernel_post_load_data(), Kees Cook
- [PATCH v5 13/16] fs/kernel_file_read: Add "offset" arg for partial reads, Kees Cook
- [PATCH v5 09/16] firmware_loader: Use security_post_load_data(), Kees Cook
- [PATCH v5 11/16] LSM: Add "contents" flag to kernel_read_file hook, Kees Cook
- [PATCH v5 07/16] fs/kernel_read_file: Add file_size output argument, Kees Cook
- [PATCH v5 12/16] IMA: Add support for file reads without contents, Kees Cook
- [PATCH v5 08/16] LSM: Introduce kernel_post_load_data() hook, Kees Cook
- [PATCH v5 06/16] fs/kernel_read_file: Switch buffer size arg to size_t, Kees Cook
- [PATCH v5 03/16] fs/kernel_read_file: Split into separate include file, Kees Cook
- [PATCH v5 04/16] fs/kernel_read_file: Split into separate source file, Kees Cook
- [PATCH v5 16/16] test_firmware: Test partial read support, Kees Cook
[PATCH v1] dm verity: Add support for signature verification with 2nd keyring,
Mickaël Salaün
[PATCH v2 0/5] tpm_tis: fix interrupts (again),
James Bottomley
[PATCH v11 0/3] Add trusted_for(2) (was O_MAYEXEC),
Mickaël Salaün
[PATCH v7 0/3] Carry forward IMA measurement log on kexec on ARM64,
Lakshmi Ramasubramanian
[PATCH v4 0/4] TPM 2.0 fixes in IMA tests,
Petr Vorel
[PATCH v3 1/2] KEYS: trusted: Fix incorrect handling of tpm_get_random(),
Jarkko Sakkinen
[PATCH 0/4] tpm_tis: fix interrupts (again),
James Bottomley
[PATCH v3 0/4] TPM 2.0 fixes in IMA tests,
Petr Vorel
More interrupt problems with TIS TPM,
James Bottomley
[PATCH v1 0/1] ima: Add test for selinux measurement,
Lakshmi Ramasubramanian
[PATCH] tpm_tis: Add a check for invalid status,
James Bottomley
[PATCH v2 1/2] KEYS: trusted: Fix incorrect handling of tpm_get_random(),
Jarkko Sakkinen
[PATCH 1/2] KEYS: trusted: Fix incorrect handling of tpm_get_random(),
Jarkko Sakkinen
[Regression] "tpm: Require that all digests are present in TCG_PCR_EVENT2 structures" causes null pointer dereference,
Kai-Heng Feng
[PATCH] tpm: efi: Don't create binary_bios_measurements file for an empty log, Tyler Hicks
[PATCH v2 0/2] IMA: Add test for dm-crypt measurement,
Tushar Sugandhi
[PATCH] tpm: only export stand alone version of flush context command,
James Bottomley
[PATCH v2 0/1] selinux: Measure state and hash of policy using IMA,
Lakshmi Ramasubramanian
[PATCH v3 0/3] IMA: Generalize early boot data measurement,
Lakshmi Ramasubramanian
[PATCH v2 0/4] TPM 2.0 fixes in IMA tests,
Petr Vorel
[PATCH 0/4] TPM 2.0 fixes in IMA tests,
Petr Vorel
Fwd: How to extract linux kernel version information from a kernel image?,
Raphael Gianotti
[PATCH v10 0/3] Add trusted_for(2) (was O_MAYEXEC),
Mickaël Salaün
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux NFS]
[Linux NILFS]
[Linux USB Devel]
[Video for Linux]
[Linux SCSI]
[Yosemite Forum]