Linux Integrity
[Prev Page][Next Page]
- [PATCH v9 0/6] KEYS: Measure keys when they are created or updated,
Lakshmi Ramasubramanian
- [PATCH 0/2] Revert patches fixing probing of interrupts,
Stefan Berger
- Re: [PATCH v10 00/25] LSM: Module stacking for AppArmor,
Casey Schaufler
- Re: possible deadlock in mnt_want_write,
syzbot
- [PATCH v0] IMA: Check IMA policy flag,
Lakshmi Ramasubramanian
- IMA: Data included in the key measurement,
Lakshmi Ramasubramanian
- [PATCH v2] security: Fix Kconfig indentation, Krzysztof Kozlowski
- Question about creating EVM key, Pouneh Aghababazadeh
- [PATCH] security: Fix Kconfig indentation, Krzysztof Kozlowski
- [PATCH v11 00/25] LSM: Module stacking for AppArmor,
Casey Schaufler
- [PATCH v8 0/5] KEYS: Measure keys when they are created or updated,
Lakshmi Ramasubramanian
- Re: linux-5.4-rc8/drivers/char/tpm/tpm1-cmd.c:735: possible missing return value check,
Greg KH
- Message not available
[PATCH v7 0/5] KEYS: Measure keys when they are created or updated,
Lakshmi Ramasubramanian
[PATCH v6 0/3] KEYS: Measure keys when they are created or updated,
Lakshmi Ramasubramanian
Re: One question about trusted key of keyring in Linux kernel.,
Mimi Zohar
[PATCH] tpm: move TPM_CHIP_FLAG_HAVE_TIMEOUTS check, Jerry Snitselaar
[PATCH 14/25] LSM: Ensure the correct LSM context releaser, Casey Schaufler
[PATCH 12/25] IMA: Change internal interfaces to use lsmblobs, Casey Schaufler
[PATCH 11/25] LSM: Use lsmblob in security_cred_getsecid, Casey Schaufler
[PATCH 10/25] LSM: Use lsmblob in security_inode_getsecid, Casey Schaufler
[PATCH 09/25] LSM: Use lsmblob in security_task_getsecid, Casey Schaufler
[PATCH] tpm_tis: Move setting of TPM_CHIP_FLAG_IRQ into tpm_tis_probe_irq_single,
Stefan Berger
[GIT PULL] tpmdd updates for Linux v5.5,
Jarkko Sakkinen
question about setting TPM_CHIP_FLAG_IRQ in tpm_tis_core_init,
Jerry Snitselaar
[PATCH] tpm_tis: turn on TPM before calling tpm_get_timeouts,
Jerry Snitselaar
[PATCH v5 0/10] KEYS: Measure keys when they are created or updated,
Lakshmi Ramasubramanian
- [PATCH v5 10/10] IMA: Call queue and dequeue functions to measure keys., Lakshmi Ramasubramanian
- [PATCH v5 09/10] IMA: Defined functions to queue and dequeue keys for measurement, Lakshmi Ramasubramanian
- [PATCH v5 07/10] KEYS: Call the IMA hook to measure key when a new key is created or an existing key is updated, Lakshmi Ramasubramanian
- [PATCH v5 04/10] IMA: Updated IMA policy functions to return keyrings option read from the policy, Lakshmi Ramasubramanian
- [PATCH v5 08/10] IMA: Added a flag to determine whether IMA hook can process the key now or has to queue for processing later, Lakshmi Ramasubramanian
- [PATCH v5 06/10] IMA: Defined an IMA hook to measure keys on key create or update, Lakshmi Ramasubramanian
- [PATCH v5 05/10] IMA: Measure key if the IMA policy allows measurement for the keyring to which the key is linked to, Lakshmi Ramasubramanian
- [PATCH v5 02/10] IMA: Added keyrings= option in IMA policy to only measure keys added to the specified keyrings., Lakshmi Ramasubramanian
- [PATCH v5 01/10] IMA: Added KEYRING_CHECK func in IMA policy to measure keys, Lakshmi Ramasubramanian
- [PATCH v5 03/10] IMA: Read keyrings= option from the IMA policy into ima_rule_entry, Lakshmi Ramasubramanian
- Re: [PATCH v5 0/10] KEYS: Measure keys when they are created or updated, Lakshmi Ramasubramanian
[PATCH] ima: avoid appraise error for hash calc interrupt,
Patrick Callaghan
[PATCH v9 0/4] powerpc: expose secure variables to the kernel and userspace,
Nayna Jain
[PATCH v1 0/5] add tpm i2c ptp driver,
amirmizi6
[PATCH v8 0/4] powerpc: expose secure variables to the kernel and userspace,
Nayna Jain
PROBLEM: TPM bug causes suspend to turn off device,
Christian Bundy
[PATCH v7 0/4] powerpc: expose secure variables to the kernel and userspace,
Eric Richter
Mail to David Howells @ redhat bounced,
Lakshmi Ramasubramanian
[PATCH v4 0/10] KEYS: Measure keys when they are created or updated,
Lakshmi Ramasubramanian
- [PATCH v4 01/10] IMA: Defined an IMA hook to measure keys on key create or update, Lakshmi Ramasubramanian
- [PATCH v4 04/10] IMA: Read keyrings= option from the IMA policy into ima_rule_entry, Lakshmi Ramasubramanian
- [PATCH v4 05/10] IMA: Updated IMA policy functions to return keyrings option read from the policy, Lakshmi Ramasubramanian
- [PATCH v4 09/10] IMA: Call queue and dequeue functions to measure keys, Lakshmi Ramasubramanian
- [PATCH v4 08/10] IMA: Defined functions to queue and dequeue keys for measurement, Lakshmi Ramasubramanian
- [PATCH v4 07/10] IMA: Added a boolean flag to track IMA initialization status, Lakshmi Ramasubramanian
- [PATCH v4 10/10] KEYS: Call the IMA hook to measure key when a new key is created or an existing key is updated, Lakshmi Ramasubramanian
- [PATCH v4 06/10] IMA: Measure key if the IMA policy allows measurement for the keyring to which the key is linked to, Lakshmi Ramasubramanian
- [PATCH v4 02/10] IMA: Added KEYRING_CHECK func in IMA policy to measure keys, Lakshmi Ramasubramanian
- [PATCH v4 03/10] IMA: Added keyrings= option in IMA policy to only measure keys added to the specified keyrings., Lakshmi Ramasubramanian
[PATCH v6 0/4] powerpc: expose secure variables to the kernel and userspace,
Eric Richter
[PATCH 4.4 16/46] efi/x86: Do not clean dummy variable in kexec path, Greg Kroah-Hartman
[PATCH 4.4 15/46] efi/cper: Fix endianness of PCIe class code, Greg Kroah-Hartman
[PATCH 4.9 21/62] efi/cper: Fix endianness of PCIe class code, Greg Kroah-Hartman
[PATCH 4.14 41/95] efi/cper: Fix endianness of PCIe class code, Greg Kroah-Hartman
[PATCH 4.14 42/95] efi/x86: Do not clean dummy variable in kexec path, Greg Kroah-Hartman
[PATCH 5.3 051/163] efi/cper: Fix endianness of PCIe class code, Greg Kroah-Hartman
[PATCH 5.3 052/163] efi/x86: Do not clean dummy variable in kexec path, Greg Kroah-Hartman
[PATCH 4.19 081/149] efi/cper: Fix endianness of PCIe class code, Greg Kroah-Hartman
[PATCH 4.19 082/149] efi/x86: Do not clean dummy variable in kexec path, Greg Kroah-Hartman
[PATCH 4.9 22/62] efi/x86: Do not clean dummy variable in kexec path, Greg Kroah-Hartman
[Patch v3 0/7] Introduce TEE based Trusted Keys support,
Sumit Garg
[PATCH] x86/ima: update IMA arch policy to support appended signatures, Mimi Zohar
[PATCH v10 0/9] powerpc: Enabling IMA arch specific secure boot policies,
Mimi Zohar
- [PATCH v10 4/9] powerpc/ima: define trusted boot policy, Mimi Zohar
- [PATCH v10 8/9] powerpc/ima: update ima arch policy to check for blacklist, Mimi Zohar
- [RFC PATCH v10 9/9] powerpc/ima: indicate kernel modules appended signatures are enforced, Mimi Zohar
- [PATCH v10 1/9] powerpc: detect the secure boot mode of the system, Mimi Zohar
- [PATCH v10 2/9] powerpc/ima: add support to initialize ima policy rules, Mimi Zohar
- [PATCH v10 3/9] powerpc: detect the trusted boot state of the system, Mimi Zohar
- [PATCH v10 6/9] certs: add wrapper function to check blacklisted binary hash, Mimi Zohar
- [PATCH v10 7/9] ima: check against blacklisted hashes for files with modsig, Mimi Zohar
- [PATCH v10 5/9] ima: make process_buffer_measurement() generic, Mimi Zohar
- Re: [PATCH v10 0/9] powerpc: Enabling IMA arch specific secure boot policies, Lakshmi Ramasubramanian
[PATCH v3 0/9] KEYS: Measure keys when they are created or updated,
Lakshmi Ramasubramanian
[PATCH v4] tpm: Add tpm_version_major sysfs file,
Jerry Snitselaar
[PATCH v3] tpm: Add version_major sysfs file, Jerry Snitselaar
[PATCH] tpm: Update mailing list contact information in sysfs-class-tpm,
Jerry Snitselaar
[PATCH v2] tpm: Add major_version sysfs file,
Jerry Snitselaar
Tests to run to validate ima related changes, Lakshmi Ramasubramanian
[PATCH] tpm: Add major_version sysfs file,
Jerry Snitselaar
[PATCH v2] tpm: Switch to platform_get_irq_optional(),
Hans de Goede
[PATCH v5 4/4] powerpc: load firmware trusted keys/hashes into kernel keyring,
Nayna Jain
[PATCH v5 0/4] powerpc: expose secure variables to the kernel and userspace,
Nayna Jain
IMA test information, Prakhar Srivastava
[PATCH v1] selftest/trustedkeys: TPM 1.2 trusted keys test,
Mimi Zohar
[PATCH v9 0/8] powerpc: Enabling IMA arch specific secure boot policies,
Nayna Jain
Measure ima policy, Lakshmi Ramasubramanian
[PATCH v2 0/4] KEYS: measure keys when they are created or updated,
Lakshmi Ramasubramanian
[PATCH] ima-evm-utils: add support for tpm2-tools to read the TPM 2.0 PCRs, Patrick Uiterwijk
[PATCH v1 0/6] KEYS: measure keys when they are created or updated,
Lakshmi Ramasubramanian
[bug report] tpm: add support for nonblocking operation, Dan Carpenter
[PATCH v8 0/8] powerpc: Enabling IMA arch specific secure boot policies,
Nayna Jain
[PATCH] tpm: Switch to platform_get_irq_optional(),
Hans de Goede
[PATCH AUTOSEL 5.3 48/89] efi/cper: Fix endianness of PCIe class code, Sasha Levin
[PATCH AUTOSEL 5.3 49/89] efi/x86: Do not clean dummy variable in kexec path, Sasha Levin
[PATCH AUTOSEL 4.19 075/100] efi/cper: Fix endianness of PCIe class code, Sasha Levin
[PATCH AUTOSEL 4.19 076/100] efi/x86: Do not clean dummy variable in kexec path, Sasha Levin
[PATCH AUTOSEL 4.14 38/56] efi/x86: Do not clean dummy variable in kexec path, Sasha Levin
[PATCH AUTOSEL 4.9 18/29] efi/x86: Do not clean dummy variable in kexec path, Sasha Levin
[PATCH AUTOSEL 4.4 12/21] efi/cper: Fix endianness of PCIe class code, Sasha Levin
[PATCH AUTOSEL 4.4 13/21] efi/x86: Do not clean dummy variable in kexec path, Sasha Levin
[PATCH AUTOSEL 4.9 17/29] efi/cper: Fix endianness of PCIe class code, Sasha Levin
[PATCH AUTOSEL 4.14 37/56] efi/cper: Fix endianness of PCIe class code, Sasha Levin
[PATCH v0] KEYS: Security LSM Hook for key_create_or_update,
Lakshmi Ramasubramanian
[PATCH 4.14 43/65] efivar/ssdt: Dont iterate over EFI vars if no SSDT override was specified, Greg Kroah-Hartman
[PATCH 4.19 49/81] efivar/ssdt: Dont iterate over EFI vars if no SSDT override was specified, Greg Kroah-Hartman
[PATCH 5.3 063/112] efi/tpm: Dont access event->count when it isnt mapped, Greg Kroah-Hartman
[PATCH 5.3 064/112] efi/tpm: Dont traverse an event log with no events, Greg Kroah-Hartman
[PATCH 5.3 065/112] efi/tpm: Only set efi_tpm_final_log_size after successful event log parsing, Greg Kroah-Hartman
[PATCH 5.3 062/112] efivar/ssdt: Dont iterate over EFI vars if no SSDT override was specified, Greg Kroah-Hartman
[PATCH 4.9 76/92] efivar/ssdt: Dont iterate over EFI vars if no SSDT override was specified, Greg Kroah-Hartman
[PATCH v8] tpm_crb: fix fTPM on AMD Zen+ CPUs,
ivan . lazeev
[PATCH v3] tpm/tpm_ftpm_tee: add shutdown call back,
Pavel Tatashin
[Patch v8 0/4] Create and consolidate trusted keys subsystem,
Sumit Garg
[PATCH v0 0/1] KEYS: LSM Hook for key_create_or_update,
Lakshmi Ramasubramanian
[PATCH v0 0/1] ima: Refactor process_buffer_measurement() to make it generic,
Lakshmi Ramasubramanian
[PATCH] tpm: Salt tpm_get_random() result with get_random_bytes(),
Jarkko Sakkinen
[PATCH v2] tpm/tpm_ftpm_tee: add shutdown call back,
Pavel Tatashin
Re: [PATCH v3] x86, efi: never relocate kernel below lowest acceptable address,
Jarkko Sakkinen
[PATCH] efi/tpm: return -EINVAL when determining tpm final events log size fails,
Jerry Snitselaar
[PATCH v0 0/2] KEYS: Measure keys added to builtin or secondary trusted keys keyring,
Lakshmi Ramasubramanian
[PATCH v2] tpm: use GFP kernel for tpm_buf allocations,
James Bottomley
[PATCH] ftpm: add shutdown call back,
Pavel Tatashin
[PATCH V4 0/2] Add support for arm64 to carry ima measurement,
Prakhar Srivastava
[PATCH v3 0/2] Add support for arm64 to carry ima measurement log in kexec_file_load,
Prakhar Srivastava
[PATCH v4 0/3] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations,
Jarkko Sakkinen
[PATCH v7] tpm_crb: fix fTPM on AMD Zen+ CPUs,
ivan . lazeev
[PATCH v7 0/8] powerpc: Enabling IMA arch specific secure boot policies,
Nayna Jain
[PATCH] tpm: add check after commands attribs tab allocation,
Tadeusz Struk
[PATCH v2 0/2] Add support to carry ima measurement log in kexec_file_load,
Prakhar Srivastava
[Patch v7 0/4] Create and consolidate trusted keys subsystem,
Sumit Garg
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux NFS]
[Linux NILFS]
[Linux USB Devel]
[Video for Linux]
[Linux SCSI]
[Yosemite Forum]