Linux Integrity
[Prev Page][Next Page]
- [PATCH ghau85 v1] ima: add support for AUDIT_INTEGRITY_EVM_XATTR records, Richard Guy Briggs
- [PATCH v2 0/3] LTP reproducer on broken IMA on overlayfs,
Petr Vorel
- appraisal reset safety,
Janne Karhunen
- [PATCH] x86/ima: add missing include, Mimi Zohar
- [PATCH] doc/kernel-parameters.txt: Deprecate ima_appraise_tcb,
Petr Vorel
- Re: Unable to suspend lenovo t61, Roberto Sassu
- [PATCH V32 24/27] kexec: Allow kexec_file() with appropriate IMA policy when locked down, Matthew Garrett
- [PATCH] efi: Include tpm_eventlog.h after asm/efi.h to avoid memcpy breakage,
Matthew Garrett
- [PATCH] TCG2 log support build fixes for non-x86_64,
Matthew Garrett
- [PATCH 1/2] ftpm: dt-binding: add dts documentation for fTPM driver,
Sasha Levin
- [PATCH 0/4] Enabling secure boot on PowerNV systems,
Claudio Carvalho
- [PATCH v3] tpm: Actually fail on TPM errors during "get random",
Kees Cook
- [PATCH v2] tpm: Actually fail on TPM errors during "get random",
Kees Cook
- [PATCH] tpm: Actually fail on TPM errors during "get random",
Kees Cook
- [GIT PULL] tpmdd fixes for Linux v5.1,
Jarkko Sakkinen
- [PATCH v4] tpm: fix an invalid condition in tpm_common_poll,
Tadeusz Struk
- [PATCH 0/3] LTP reproducer on broken IMA on overlayfs,
Petr Vorel
- [REGRESSION] 5.1-rc1: tpm_try_transmit: send(): error -5,
Domenico Andreoli
- [PATCH ghak109 V2] audit: link integrity evm_write_xattrs record to syscall event,
Richard Guy Briggs
- [PATCH v5 0/9] selftests/kexec: add kexec tests,
Mimi Zohar
- [PATCH v5 8/9] selftests/kexec: check kexec_load and kexec_file_load are enabled, Mimi Zohar
- [PATCH v5 4/9] selftests/kexec: define common logging functions, Mimi Zohar
- [PATCH v5 9/9] selftests/kexec: make kexec_load test independent of IMA being enabled, Mimi Zohar
- [PATCH v5 6/9] selftests/kexec: kexec_file_load syscall test, Mimi Zohar
- [PATCH v5 7/9] selftests/kexec: Add missing '=y' to config options, Mimi Zohar
- [PATCH v5 1/9] selftests/kexec: move the IMA kexec_load selftest to selftests/kexec, Mimi Zohar
- [PATCH v5 5/9] kselftest/kexec: define "require_root_privileges", Mimi Zohar
- [PATCH v5 3/9] selftests/kexec: define a set of common functions, Mimi Zohar
- [PATCH v5 2/9] selftests/kexec: cleanup the kexec selftest, Mimi Zohar
- [PATCH] selftests/kexec: update get_secureboot_mode, Mimi Zohar
- [PATCH v8 00/10] crypto: add EC-RDSA (GOST 34.10) algorithm,
Vitaly Chikunov
- [PATCH v8 01/10] crypto: akcipher - default implementations for request callbacks, Vitaly Chikunov
- [PATCH v8 02/10] crypto: rsa - unimplement sign/verify for raw RSA backends, Vitaly Chikunov
- [PATCH v8 03/10] crypto: akcipher - new verify API for public key algorithms, Vitaly Chikunov
- [PATCH v8 04/10] KEYS: do not kmemdup digest in {public,tpm}_key_verify_signature, Vitaly Chikunov
- [PATCH v8 05/10] X.509: parse public key parameters from x509 for akcipher, Vitaly Chikunov
- [PATCH v8 06/10] crypto: Kconfig - create Public-key cryptography section, Vitaly Chikunov
- [PATCH v8 07/10] crypto: ecc - make ecc into separate module, Vitaly Chikunov
- [PATCH v8 08/10] crypto: ecrdsa - add EC-RDSA (GOST 34.10) algorithm, Vitaly Chikunov
- [PATCH v8 09/10] crypto: ecrdsa - add EC-RDSA test vectors to testmgr, Vitaly Chikunov
- [PATCH v8 10/10] integrity: support EC-RDSA signatures for asymmetric_verify, Vitaly Chikunov
- [PATCH v3] KEYS: trusted: allow trusted.ko to initialize w/o a TPM,
Jarkko Sakkinen
- [PATCH v2] KEYS: trusted: allow trusted.ko to initialize w/o a TPM, Jarkko Sakkinen
- [PATCH 27/27] kexec: Allow kexec_file() with appropriate IMA policy when locked down,
Matthew Garrett
- Bad file pattern in MAINTAINERS section 'KEYS-TRUSTED',
Joe Perches
- [PATCH] KEYS: trusted: allow trusted.ko to initialize w/o a TPM,
Jarkko Sakkinen
- [PATCH v3] ima-evm-utils: Convert sign v2 from RSA to EVP_PKEY API,
Vitaly Chikunov
- [PATCH v3] ima-evm-utils: Rework openssl init,
Vitaly Chikunov
- [PATCH 0/2] ima-evm-utils: rebase of digest algo resolving,
Vitaly Chikunov
- [PATCH v4a 1/2] selftests/kexec: make tests independent of IMA being enabled,
Mimi Zohar
- [PATCH] KEYS: trusted: defer execution of TPM-specific code until key instantiate,
Roberto Sassu
- Portable Executable (PE) Signature Validation and Measurement for KEXEC system call using IMA,
Lakshmi Ramasubramanian
- Adding cmldine args measure to ima,
Prakhar Srivastava
- [PATCH RESEND v3] tpm: fix an invalid condition in tpm_common_poll,
Tadeusz Struk
- [PATCH] tpm: turn on TPM on suspend for TPM 1.x,
Jarkko Sakkinen
- [PATCH v2 1/8] evmtest: Regression testing integrity subsystem,
djacobs7
- [PATCH v3] tpm: fix an invalid condition in tpm_common_poll,
Tadeusz Struk
- [PATCH v2] tpm: fix an invalid condition in tpm_common_poll,
Tadeusz Struk
- [PATCH 0/6] security/keys/encrypted: Break module dependency chain,
Dan Williams
- [PATCH] kexec: Allow kexec_file() with appropriate IMA policy when locked down,
Matthew Garrett
- [PATCH] tpm: fix a race between poll and write in tpm-dev-common,
Tadeusz Struk
- Re: Regression in suspend-to-ram (TPM related) with 5.1-rc1,
Paul Zimmerman
- Re: [openssl-tpm2-engine] tpm sessions, James Bottomley
- Should mprotect(..., PROT_EXEC) be checked by IMA?,
Igor Zhbanov
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Mimi Zohar
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Igor Zhbanov
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Mimi Zohar
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Igor Zhbanov
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Mimi Zohar
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Igor Zhbanov
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Matthew Garrett
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Igor Zhbanov
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Mimi Zohar
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Igor Zhbanov
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Matthew Garrett
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Igor Zhbanov
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Mimi Zohar
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Igor Zhbanov
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Mimi Zohar
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Jordan Glover
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Stephen Smalley
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Igor Zhbanov
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Matthew Garrett
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Igor Zhbanov
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Matthew Garrett
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Igor Zhbanov
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Matthew Garrett
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Igor Zhbanov
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Matthew Garrett
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Igor Zhbanov
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Mimi Zohar
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Perez Yves-Alexis
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Mimi Zohar
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Stephen Smalley
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Mimi Zohar
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Stephen Smalley
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Mimi Zohar
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Matthew Garrett
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?, Matthew Garrett
- [PATCH ghak109 V1] audit: link integrity evm_write_xattrs record to syscall event,
Richard Guy Briggs
- [PATCH v4 0/8] selftests/kexec: add kexec tests,
Mimi Zohar
[RFC] kexec: Allow kexec_file() with appropriate IMA policy when locked down,
Matthew Garrett
[PATCH] tpm: Make timeout logic simpler and more robust,
Calvin Owens
[PATCH] secuirty: integrity: ima: pedantic formatting, Enrico Weigelt, metux IT consult
[PATCH v3 0/7] selftests/ima: add kexec and kernel module tests,
Mimi Zohar
Kernel 5.0 regression in /dev/tpm0 access,
Mantas Mikulėnas
[PATCH v2] MAINTAINERS: fix typo in Mimi Zohar's address, Baruch Siach
[PATCH v2 0/5] RFC: Linux IMA on NFS prototype,
Chuck Lever
[PATCH] vfs: Move kernel_read_file() to fs/read_write.c,
David Howells
[PATCH] integrity: use KERNEL_DS instead of get_ds(),
Jann Horn
[PATCH v7 00/11] crypto: add EC-RDSA (GOST 34.10) algorithm,
Vitaly Chikunov
- [PATCH v7 01/11] KEYS: report to keyctl only actually supported key ops, Vitaly Chikunov
- [PATCH v7 09/11] crypto: ecrdsa - add EC-RDSA (GOST 34.10) algorithm, Vitaly Chikunov
- [PATCH v7 10/11] crypto: ecrdsa - add EC-RDSA test vectors to testmgr, Vitaly Chikunov
- [PATCH v7 11/11] integrity: support EC-RDSA signatures for asymmetric_verify, Vitaly Chikunov
- [PATCH v7 08/11] crypto: ecc - make ecc into separate module, Vitaly Chikunov
- [PATCH v7 06/11] X.509: parse public key parameters from x509 for akcipher, Vitaly Chikunov
- [PATCH v7 05/11] KEYS: do not kmemdup digest in {public,tpm}_key_verify_signature, Vitaly Chikunov
- [PATCH v7 03/11] crypto: rsa - unimplement sign/verify for raw RSA backends, Vitaly Chikunov
- [PATCH v7 04/11] crypto: akcipher - new verify API for public key algorithms, Vitaly Chikunov
- [PATCH v7 07/11] crypto: Kconfig - create Public-key cryptography section, Vitaly Chikunov
- [PATCH v7 02/11] crypto: akcipher - check the presence of callback before the call, Vitaly Chikunov
- Re: [PATCH v7 00/11] crypto: add EC-RDSA (GOST 34.10) algorithm, Herbert Xu
[integrity:next-queued-testing 7/12] arch/x86/kernel/ima_arch.c:78:4: error: implicit declaration of function 'set_module_sig_enforced', kbuild test robot
[PATCH] selftests/ima: Add missing '=y' to config options,
Petr Vorel
[DISCUSSION] IMA Signature Measurements,
Jordan Hand
Add support for TCG2 log format on UEFI systems,
Matthew Garrett
About PureBoot and TPM based DRM's,
Jarkko Sakkinen
[PATCH RFC v6] integrity: support EC-RDSA signatures for asymmetric_verify, Vitaly Chikunov
[PATCH v2 0/5] selftests/ima: add kexec and kernel module tests,
Mimi Zohar
Allow trusted filesystems to provide IMA hashes directly,
Matthew Garrett
- [PATCH V2 1/4] VFS: Add a call to obtain a file's hash, Matthew Garrett
- [PATCH V2 2/4] IMA: Allow rule matching on filesystem subtype, Matthew Garrett
- [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Matthew Garrett
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Mimi Zohar
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Mimi Zohar
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Matthew Garrett
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Mimi Zohar
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Matthew Garrett
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Matthew Garrett
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Mimi Zohar
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Matthew Garrett
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Mimi Zohar
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Matthew Garrett
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Mimi Zohar
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Matthew Garrett
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Mimi Zohar
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Matthew Garrett
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Mimi Zohar
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Matthew Garrett
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Mimi Zohar
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Matthew Garrett
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Mimi Zohar
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Matthew Garrett
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Matthew Garrett
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, James Bottomley
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Matthew Garrett
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, James Bottomley
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Matthew Garrett
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, James Bottomley
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Matthew Garrett
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Matthew Garrett
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Mimi Zohar
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Matthew Garrett
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Mimi Zohar
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Roberto Sassu
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Roberto Sassu
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Mimi Zohar
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes, Roberto Sassu
- [PATCH V2 4/4] FUSE: Allow filesystems to provide gethash methods, Matthew Garrett
[PATCH ima-evm-utils] Include sys/types.h in header to fix build with musl, luca . boccassi
[PATCH v5 00/10] crypto: add EC-RDSA (GOST 34.10) algorithm,
Vitaly Chikunov
- [PATCH v5 06/10] crypto: Kconfig - create Public-key cryptography section, Vitaly Chikunov
- [PATCH v5 05/10] X.509: parse public key parameters from x509 for akcipher, Vitaly Chikunov
- [PATCH v5 08/10] crypto: ecrdsa - add EC-RDSA (GOST 34.10) algorithm, Vitaly Chikunov
- [PATCH v5 07/10] crypto: ecc - make ecc into separate module, Vitaly Chikunov
- [PATCH v5 09/10] crypto: ecrdsa - add EC-RDSA test vectors to testmgr, Vitaly Chikunov
- [PATCH v5 10/10] integrity: support EC-RDSA signatures for asymmetric_verify, Vitaly Chikunov
- [PATCH v5 04/10] crypto: akcipher - new verify API for public key algorithms, Vitaly Chikunov
- [PATCH v5 01/10] KEYS: report to keyctl only actually supported key ops, Vitaly Chikunov
- [PATCH v5 02/10] crypto: akcipher - check the presence of callback before the call, Vitaly Chikunov
- [PATCH v5 03/10] crypto: rsa - unimplement sign/verify for raw RSA backends, Vitaly Chikunov
- Re: [PATCH v5 04/10] crypto: akcipher - new verify API for public key algorithms, David Howells
[PATCH V4 0/4] Add support for TCG2 event logs on EFI systems,
Matthew Garrett
[PATCH] tpm: Add driver for TPM over virtio,
David Tolnay
[PATCH v3 00/20] Merge text_poke fixes and executable lockdowns,
Rick Edgecombe
- [PATCH v3 09/20] x86/kprobes: Set instruction page as executable, Rick Edgecombe
- [PATCH v3 16/20] modules: Use vmalloc special flag, Rick Edgecombe
- [PATCH v3 20/20] x86/alternative: Comment about module removal races, Rick Edgecombe
- [PATCH v3 19/20] x86/kprobes: Use vmalloc special flag, Rick Edgecombe
- [PATCH v3 18/20] x86/ftrace: Use vmalloc special flag, Rick Edgecombe
- [PATCH v3 17/20] bpf: Use vmalloc special flag, Rick Edgecombe
- [PATCH v3 15/20] vmalloc: Add flag for free of special permsissions, Rick Edgecombe
- [PATCH v3 14/20] mm: Make hibernate handle unmapped pages, Rick Edgecombe
- [PATCH v3 12/20] x86/alternative: Remove the return value of text_poke_*(), Rick Edgecombe
- [PATCH v3 13/20] x86/mm/cpa: Add set_direct_map_ functions, Rick Edgecombe
- [PATCH v3 01/20] x86/jump_label: Use text_poke_early() during early init, Rick Edgecombe
- [PATCH v3 05/20] x86/alternative: Initialize temporary mm for patching, Rick Edgecombe
- [PATCH v3 08/20] x86/ftrace: Set trampoline pages as executable, Rick Edgecombe
- [PATCH v3 10/20] x86/module: Avoid breaking W^X while loading modules, Rick Edgecombe
- [PATCH v3 11/20] x86/jump-label: Remove support for custom poker, Rick Edgecombe
- [PATCH v3 07/20] x86/kgdb: Avoid redundant comparison of patched code, Rick Edgecombe
- [PATCH v3 06/20] x86/alternative: Use temporary mm for text poking, Rick Edgecombe
- [PATCH v3 03/20] x86/mm: Save DRs when loading a temporary mm, Rick Edgecombe
- [PATCH v3 04/20] fork: Provide a function for copying init_mm, Rick Edgecombe
- [PATCH v3 02/20] x86/mm: Introduce temporary mm structs, Rick Edgecombe
- Re: [PATCH v3 00/20] Merge text_poke fixes and executable lockdowns, Borislav Petkov
Re: linux-next: Tree for Feb 20,
Jarkko Sakkinen
[PATCH v3 -next] tpm: Fix the type of the return value in calc_tpm2_event_size(),
Yue Haibing
[PATCH] MAINTAINERS: add linux-security-module mailing list to TPM drivers,
Jerry Snitselaar
[PATCH v2 -next] tpm: Fix the type of the return value in calc_tpm2_event_size(),
YueHaibing
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux NFS]
[Linux NILFS]
[Linux USB Devel]
[Video for Linux]
[Linux SCSI]
[Yosemite Forum]