Linux Integrity
[Prev Page][Next Page]
- Re: [PATCH v2 1/8] evmtest: Regression testing integrity subsystem, (continued)
- [PATCH v3] tpm: fix an invalid condition in tpm_common_poll,
Tadeusz Struk
- [PATCH v2] tpm: fix an invalid condition in tpm_common_poll,
Tadeusz Struk
- [PATCH 0/6] security/keys/encrypted: Break module dependency chain,
Dan Williams
- [PATCH] kexec: Allow kexec_file() with appropriate IMA policy when locked down,
Matthew Garrett
- [PATCH] tpm: fix a race between poll and write in tpm-dev-common,
Tadeusz Struk
- Re: Regression in suspend-to-ram (TPM related) with 5.1-rc1,
Paul Zimmerman
- Re: [openssl-tpm2-engine] tpm sessions, James Bottomley
- Should mprotect(..., PROT_EXEC) be checked by IMA?,
Igor Zhbanov
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Mimi Zohar
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Igor Zhbanov
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Mimi Zohar
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Igor Zhbanov
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Mimi Zohar
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Igor Zhbanov
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Matthew Garrett
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Igor Zhbanov
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Mimi Zohar
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Igor Zhbanov
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Matthew Garrett
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Igor Zhbanov
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Mimi Zohar
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Igor Zhbanov
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Mimi Zohar
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Jordan Glover
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Stephen Smalley
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Igor Zhbanov
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Matthew Garrett
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Igor Zhbanov
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Matthew Garrett
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Igor Zhbanov
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Matthew Garrett
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Igor Zhbanov
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Matthew Garrett
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Igor Zhbanov
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Mimi Zohar
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Perez Yves-Alexis
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Mimi Zohar
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Stephen Smalley
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Mimi Zohar
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Stephen Smalley
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Mimi Zohar
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Matthew Garrett
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Matthew Garrett
- [PATCH ghak109 V1] audit: link integrity evm_write_xattrs record to syscall event,
Richard Guy Briggs
- [PATCH v4 0/8] selftests/kexec: add kexec tests,
Mimi Zohar
[RFC] kexec: Allow kexec_file() with appropriate IMA policy when locked down,
Matthew Garrett
[PATCH] tpm: Make timeout logic simpler and more robust,
Calvin Owens
[PATCH] secuirty: integrity: ima: pedantic formatting, Enrico Weigelt, metux IT consult
[PATCH v3 0/7] selftests/ima: add kexec and kernel module tests,
Mimi Zohar
Kernel 5.0 regression in /dev/tpm0 access,
Mantas Mikulėnas
[PATCH v2] MAINTAINERS: fix typo in Mimi Zohar's address, Baruch Siach
[PATCH v2 0/5] RFC: Linux IMA on NFS prototype,
Chuck Lever
[PATCH] vfs: Move kernel_read_file() to fs/read_write.c,
David Howells
[PATCH] integrity: use KERNEL_DS instead of get_ds(),
Jann Horn
[PATCH v7 00/11] crypto: add EC-RDSA (GOST 34.10) algorithm,
Vitaly Chikunov
- [PATCH v7 01/11] KEYS: report to keyctl only actually supported key ops, Vitaly Chikunov
- [PATCH v7 09/11] crypto: ecrdsa - add EC-RDSA (GOST 34.10) algorithm, Vitaly Chikunov
- [PATCH v7 10/11] crypto: ecrdsa - add EC-RDSA test vectors to testmgr, Vitaly Chikunov
- [PATCH v7 11/11] integrity: support EC-RDSA signatures for asymmetric_verify, Vitaly Chikunov
- [PATCH v7 08/11] crypto: ecc - make ecc into separate module, Vitaly Chikunov
- [PATCH v7 06/11] X.509: parse public key parameters from x509 for akcipher, Vitaly Chikunov
- [PATCH v7 05/11] KEYS: do not kmemdup digest in {public,tpm}_key_verify_signature, Vitaly Chikunov
- [PATCH v7 03/11] crypto: rsa - unimplement sign/verify for raw RSA backends, Vitaly Chikunov
- [PATCH v7 04/11] crypto: akcipher - new verify API for public key algorithms, Vitaly Chikunov
- [PATCH v7 07/11] crypto: Kconfig - create Public-key cryptography section, Vitaly Chikunov
- [PATCH v7 02/11] crypto: akcipher - check the presence of callback before the call, Vitaly Chikunov
- Re: [PATCH v7 00/11] crypto: add EC-RDSA (GOST 34.10) algorithm, Herbert Xu
[integrity:next-queued-testing 7/12] arch/x86/kernel/ima_arch.c:78:4: error: implicit declaration of function 'set_module_sig_enforced', kbuild test robot
[PATCH] selftests/ima: Add missing '=y' to config options,
Petr Vorel
[DISCUSSION] IMA Signature Measurements,
Jordan Hand
Add support for TCG2 log format on UEFI systems,
Matthew Garrett
About PureBoot and TPM based DRM's,
Jarkko Sakkinen
[PATCH RFC v6] integrity: support EC-RDSA signatures for asymmetric_verify, Vitaly Chikunov
[PATCH v2 0/5] selftests/ima: add kexec and kernel module tests,
Mimi Zohar
Allow trusted filesystems to provide IMA hashes directly,
Matthew Garrett
- [PATCH V2 1/4] VFS: Add a call to obtain a file's hash, Matthew Garrett
- [PATCH V2 2/4] IMA: Allow rule matching on filesystem subtype, Matthew Garrett
- [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Matthew Garrett
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Mimi Zohar
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Mimi Zohar
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Matthew Garrett
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Mimi Zohar
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Matthew Garrett
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Matthew Garrett
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Mimi Zohar
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Matthew Garrett
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Mimi Zohar
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Matthew Garrett
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Mimi Zohar
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Matthew Garrett
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Mimi Zohar
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Matthew Garrett
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Mimi Zohar
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Matthew Garrett
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Mimi Zohar
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Matthew Garrett
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Mimi Zohar
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Matthew Garrett
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Matthew Garrett
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, James Bottomley
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Matthew Garrett
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, James Bottomley
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Matthew Garrett
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, James Bottomley
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Matthew Garrett
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Matthew Garrett
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Mimi Zohar
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Matthew Garrett
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Mimi Zohar
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Roberto Sassu
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Roberto Sassu
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Mimi Zohar
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Roberto Sassu
- [PATCH V2 4/4] FUSE: Allow filesystems to provide gethash methods, Matthew Garrett
[PATCH ima-evm-utils] Include sys/types.h in header to fix build with musl, luca . boccassi
[PATCH v5 00/10] crypto: add EC-RDSA (GOST 34.10) algorithm,
Vitaly Chikunov
- [PATCH v5 06/10] crypto: Kconfig - create Public-key cryptography section, Vitaly Chikunov
- [PATCH v5 05/10] X.509: parse public key parameters from x509 for akcipher, Vitaly Chikunov
- [PATCH v5 08/10] crypto: ecrdsa - add EC-RDSA (GOST 34.10) algorithm, Vitaly Chikunov
- [PATCH v5 07/10] crypto: ecc - make ecc into separate module, Vitaly Chikunov
- [PATCH v5 09/10] crypto: ecrdsa - add EC-RDSA test vectors to testmgr, Vitaly Chikunov
- [PATCH v5 10/10] integrity: support EC-RDSA signatures for asymmetric_verify, Vitaly Chikunov
- [PATCH v5 04/10] crypto: akcipher - new verify API for public key algorithms, Vitaly Chikunov
- [PATCH v5 01/10] KEYS: report to keyctl only actually supported key ops, Vitaly Chikunov
- [PATCH v5 02/10] crypto: akcipher - check the presence of callback before the call, Vitaly Chikunov
- [PATCH v5 03/10] crypto: rsa - unimplement sign/verify for raw RSA backends, Vitaly Chikunov
- Re: [PATCH v5 04/10] crypto: akcipher - new verify API for public key algorithms, David Howells
[PATCH V4 0/4] Add support for TCG2 event logs on EFI systems,
Matthew Garrett
[PATCH] tpm: Add driver for TPM over virtio,
David Tolnay
[PATCH v3 00/20] Merge text_poke fixes and executable lockdowns,
Rick Edgecombe
- [PATCH v3 09/20] x86/kprobes: Set instruction page as executable, Rick Edgecombe
- [PATCH v3 16/20] modules: Use vmalloc special flag, Rick Edgecombe
- [PATCH v3 20/20] x86/alternative: Comment about module removal races, Rick Edgecombe
- [PATCH v3 19/20] x86/kprobes: Use vmalloc special flag, Rick Edgecombe
- [PATCH v3 18/20] x86/ftrace: Use vmalloc special flag, Rick Edgecombe
- [PATCH v3 17/20] bpf: Use vmalloc special flag, Rick Edgecombe
- [PATCH v3 15/20] vmalloc: Add flag for free of special permsissions, Rick Edgecombe
- [PATCH v3 14/20] mm: Make hibernate handle unmapped pages, Rick Edgecombe
- [PATCH v3 12/20] x86/alternative: Remove the return value of text_poke_*(), Rick Edgecombe
- [PATCH v3 13/20] x86/mm/cpa: Add set_direct_map_ functions, Rick Edgecombe
- [PATCH v3 01/20] x86/jump_label: Use text_poke_early() during early init, Rick Edgecombe
- [PATCH v3 05/20] x86/alternative: Initialize temporary mm for patching, Rick Edgecombe
- [PATCH v3 08/20] x86/ftrace: Set trampoline pages as executable, Rick Edgecombe
- [PATCH v3 10/20] x86/module: Avoid breaking W^X while loading modules, Rick Edgecombe
- [PATCH v3 11/20] x86/jump-label: Remove support for custom poker, Rick Edgecombe
- [PATCH v3 07/20] x86/kgdb: Avoid redundant comparison of patched code, Rick Edgecombe
- [PATCH v3 06/20] x86/alternative: Use temporary mm for text poking, Rick Edgecombe
- [PATCH v3 03/20] x86/mm: Save DRs when loading a temporary mm, Rick Edgecombe
- [PATCH v3 04/20] fork: Provide a function for copying init_mm, Rick Edgecombe
- [PATCH v3 02/20] x86/mm: Introduce temporary mm structs, Rick Edgecombe
- Re: [PATCH v3 00/20] Merge text_poke fixes and executable lockdowns, Borislav Petkov
Re: linux-next: Tree for Feb 20,
Jarkko Sakkinen
[PATCH v3 -next] tpm: Fix the type of the return value in calc_tpm2_event_size(),
Yue Haibing
[PATCH] MAINTAINERS: add linux-security-module mailing list to TPM drivers,
Jerry Snitselaar
[PATCH v2 -next] tpm: Fix the type of the return value in calc_tpm2_event_size(),
YueHaibing
[PATCH -next] tpm: change the return type of calc_tpm2_event_size to size_t,
YueHaibing
IMA fails to see TPM chip (rpi3, linaro optee),
Markku Savela
[PATCH v3] x86/ima: require signed kernel modules,
Mimi Zohar
[PATCH RFC 0/4] IMA on NFS prototype,
Chuck Lever
[GIT PULL] linux-integrity patches for Linux 5.1,
Mimi Zohar
[RFC PATCH v5 00/12] hardening: statically allocated protected memory,
Igor Stoppa
- [RFC PATCH v5 02/12] __wr_after_init: linker section and attribute, Igor Stoppa
- [RFC PATCH v5 03/12] __wr_after_init: Core and default arch, Igor Stoppa
- [RFC PATCH v5 04/12] __wr_after_init: x86_64: randomize mapping offset, Igor Stoppa
- [RFC PATCH v5 11/12] __wr_after_init: test write rare functionality, Igor Stoppa
- [RFC PATCH v5 12/12] IMA: turn ima_policy_flags into __wr_after_init, Igor Stoppa
- [RFC PATCH v5 10/12] __wr_after_init: rodata_test: test __wr_after_init, Igor Stoppa
- [RFC PATCH v5 08/12] __wr_after_init: lkdtm test, Igor Stoppa
- [RFC PATCH v5 09/12] __wr_after_init: rodata_test: refactor tests, Igor Stoppa
- [RFC PATCH v5 07/12] __wr_after_init: Documentation: self-protection, Igor Stoppa
- [RFC PATCH v5 06/12] __wr_after_init: arm64: enable, Igor Stoppa
- [RFC PATCH v5 05/12] __wr_after_init: x86_64: enable, Igor Stoppa
[PATCH v3 1/2] ima: fix build error redeclaration of enumerator,
Anders Roxell
[PATCH v2] selftests/tpm2: Open tpm dev in unbuffered mode,
Tadeusz Struk
[PATCH v2] x86/ima: require signed kernel modules,
Mimi Zohar
[PATCH v2 1/2] selftests/tpm2: Open tpm dev in unbuffered mode,
Tadeusz Struk
[PATCH v2] ima-evm-utils: simplify digest alias handling,
Vitaly Chikunov
[PATCH v2 1/2] ima: fix build error redeclaration of enumerator,
Anders Roxell
[PATCH 1/2] ima: fix build error redeclaration of enumerator,
Anders Roxell
[PATCH] ima-evm-utils: simplify digest alias handling,
Vitaly Chikunov
[RFC PATCH v4 00/12] hardening: statically allocated protected memory,
Igor Stoppa
- [RFC PATCH v4 02/12] __wr_after_init: x86_64: memset_user(), Igor Stoppa
- [RFC PATCH v4 10/12] __wr_after_init: rodata_test: test __wr_after_init, Igor Stoppa
- [RFC PATCH v4 11/12] __wr_after_init: test write rare functionality, Igor Stoppa
- [RFC PATCH v4 12/12] IMA: turn ima_policy_flags into __wr_after_init, Igor Stoppa
- [RFC PATCH v4 09/12] __wr_after_init: rodata_test: refactor tests, Igor Stoppa
- [RFC PATCH v4 07/12] __wr_after_init: Documentation: self-protection, Igor Stoppa
- [RFC PATCH v4 04/12] __wr_after_init: x86_64: enable, Igor Stoppa
- [RFC PATCH v4 01/12] __wr_after_init: Core and default arch, Igor Stoppa
- [RFC PATCH v4 03/12] __wr_after_init: x86_64: randomize mapping offset, Igor Stoppa
- [RFC PATCH v4 05/12] __wr_after_init: arm64: memset_user(), Igor Stoppa
- [RFC PATCH v4 06/12] __wr_after_init: arm64: enable, Igor Stoppa
- [RFC PATCH v4 08/12] __wr_after_init: lkdtm test, Igor Stoppa
- Re: [RFC PATCH v4 00/12] hardening: statically allocated protected memory, Kees Cook
[PATCH V3] Add support for TPM2 event logs on EFI systems,
Matthew Garrett
[RFC PATCH 0/5] Fix overlayfs on EVM,
Ignaz Forster
[PATCH 0/5] Add support for TPM event log 2.0 on EFI/ARM,
bsz
[PATCH] tpm: remove tpm_dev_wq_lock,
Sebastian Andrzej Siewior
[PATCH] MAINTAINERS: rectify two issues in KEYS-TRUSTED entry,
Lukas Bulwahn
[PATCH] MAINTAINERS: use tab instead of spaces,
Lukas Bulwahn
[PATCH v2] security: mark expected switch fall-throughs and add a missing break,
Gustavo A. R. Silva
[PATCH v4 0/2] tpm: Unify send() callbacks,
Jarkko Sakkinen
Re: linux-next: Tree for Feb 8 (drivers/char/tpm/), Randy Dunlap
[PATCH v3 0/2] tpm: Unify send() callbacks,
Jarkko Sakkinen
[PATCH v2 0/2] tpm: Unify send() callbacks,
Jarkko Sakkinen
[PATCH 0/2] Unify send() callbacks,
Jarkko Sakkinen
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux NFS]
[Linux NILFS]
[Linux USB Devel]
[Video for Linux]
[Linux SCSI]
[Yosemite Forum]