Linux-Integrity Archive on lore.kernel.org
 help / color / Atom feed
[PATCH 00/13] Introduce partial kernel_read_file() support
 2020-07-17 19:55 UTC  (21+ messages) - mbox.gz / Atom
` [PATCH 01/13] firmware_loader: EFI firmware loader must handle pre-allocated buffer
` [PATCH 02/13] fs/kernel_read_file: Remove FIRMWARE_PREALLOC_BUFFER enum
` [PATCH 03/13] fs/kernel_read_file: Remove FIRMWARE_EFI_EMBEDDED enum
` [PATCH 04/13] fs/kernel_read_file: Split into separate include file
` [PATCH 05/13] fs/kernel_read_file: Split into separate source file
` [PATCH 06/13] fs/kernel_read_file: Remove redundant size argument
` [PATCH 07/13] fs/kernel_read_file: Switch buffer size arg to size_t
` [PATCH 08/13] fs/kernel_read_file: Add file_size output argument
` [PATCH 09/13] LSM: Introduce kernel_post_load_data() hook
` [PATCH 10/13] firmware_loader: Use security_post_load_data()
` [PATCH 11/13] module: Call security_kernel_post_load_data()
` [PATCH 12/13] LSM: Add "contents" flag to kernel_read_file hook
` [PATCH 13/13] fs/kernel_file_read: Add "offset" arg for partial reads

[PATCH v3 00/12] ima: Fix rule parsing bugs and extend KEXEC_CMDLINE rule support
 2020-07-17 19:24 UTC  (16+ messages) - mbox.gz / Atom
` [PATCH v3 01/12] ima: Have the LSM free its audit rule
` [PATCH v3 06/12] ima: Fail rule parsing when the KEY_CHECK hook is combined with an invalid cond
` [PATCH v3 07/12] ima: Fail rule parsing when appraise_flag=blacklist is unsupportable
` [PATCH v3 08/12] ima: Shallow copy the args_p member of ima_rule_entry.lsm elements

[PATCH v6] ima: move APPRAISE_BOOTPARAM dependency on ARCH_POLICY to runtime
 2020-07-17 18:40 UTC  (2+ messages) - mbox.gz / Atom

[PATCH ima-evm-utils] Add sanity check for file parameter of ima_boot_aggregate
 2020-07-17 12:04 UTC  - mbox.gz / Atom

[PATCH 1/3] tpm: Put the TCPA table buf after using it
 2020-07-17 11:45 UTC  (3+ messages) - mbox.gz / Atom
` [PATCH 2/3] tpm: tpm_crb: Put the TPM2 table "
` [PATCH 3/3] tpm: tpm_tis: "

[PATCH v4 0/2] synquacer: add TPM support
 2020-07-17  8:49 UTC  (3+ messages) - mbox.gz / Atom
` [PATCH v4 1/2] tpm: tis: add support for MMIO TPM on SynQuacer
` [PATCH v4 2/2] dt-bindings: Add SynQucer TPM MMIO as a trivial device

[PATCH v2 0/5] LSM: Measure security module state
 2020-07-16 22:03 UTC  (10+ messages) - mbox.gz / Atom
` [PATCH v2 1/5] IMA: Add LSM_STATE func to measure LSM data
` [PATCH v2 2/5] IMA: Define an IMA hook "
` [PATCH v3 3/5] LSM: Add security_measure_data in lsm_info struct
` [PATCH v2 4/5] LSM: Define SELinux function to measure security state
` [PATCH v2 5/5] LSM: Define workqueue for measuring security module state

[PATCH 0/4] Fix misused kernel_read_file() enums
 2020-07-16 21:16 UTC  (9+ messages) - mbox.gz / Atom
` [PATCH 2/4] fs: Remove FIRMWARE_PREALLOC_BUFFER from "

[PATCH] encrypted-keys: Replace HTTP links with HTTPS ones
 2020-07-16 19:52 UTC  - mbox.gz / Atom

[PATCH v6 0/7] Add support for O_MAYEXEC
 2020-07-16 19:13 UTC  (22+ messages) - mbox.gz / Atom
` [PATCH v6 1/7] exec: Change uselib(2) IS_SREG() failure to EACCES
` [PATCH v6 2/7] exec: Move S_ISREG() check earlier
` [PATCH v6 3/7] exec: Move path_noexec() "
` [PATCH v6 4/7] fs: Introduce O_MAYEXEC flag for openat2(2)
` [PATCH v6 5/7] fs,doc: Enable to enforce noexec mounts or file exec through O_MAYEXEC
` [PATCH v6 6/7] selftest/openat2: Add tests for O_MAYEXEC enforcing
` [PATCH v6 7/7] ima: add policy support for the new file open MAY_OPENEXEC flag

[V2 PATCH 0/3] Adding support for carrying IMA measurement logs
 2020-07-16 17:51 UTC  (8+ messages) - mbox.gz / Atom
` [V2 PATCH 1/3] Refactoring powerpc code for carrying over IMA measurement logs, to move non architecture specific code to security/ima
` [V2 PATCH 2/3] dt-bindings: chosen: Document ima-kexec-buffer

[PATCH] tpm: avoid accessing cleared ops during shutdown
 2020-07-16 17:38 UTC  (9+ messages) - mbox.gz / Atom

[PATCH v2] tpm: Require that all digests are present in TCG_PCR_EVENT2 structures
 2020-07-16 17:29 UTC  (4+ messages) - mbox.gz / Atom

[PATCH v9 0/2] tpm2: Make TPM2 logs accessible for non-UEFI firmware
 2020-07-16 17:26 UTC  (13+ messages) - mbox.gz / Atom
` [PATCH v9 2/2] tpm: Add support for event log pointer found in TPM2 ACPI table

[PATCH] ima: Rename internal audit rule functions
 2020-07-16 14:23 UTC  (4+ messages) - mbox.gz / Atom

[PATCH ima-evm-utils v2] Check for tsspcrread in runtime
 2020-07-16  8:15 UTC  (8+ messages) - mbox.gz / Atom

[PATCH 1/3] ima-evm-utils: address new compiler complaints
 2020-07-16  8:15 UTC  (5+ messages) - mbox.gz / Atom
` [PATCH 2/3] ima-evm-utils: reading public keys
` [PATCH 3/3] ima-evm-utils: add missing license info
` [PATCH 1/3 v1] ima-evm-utils: address new compiler complaints

[PATCH 0/3] ima-evm-utils: miscellanous bug fixes
 2020-07-15 22:33 UTC  (7+ messages) - mbox.gz / Atom
` [PATCH 1/3] ima-evm-utils: fix empty label at end of function
` [PATCH 2/3] ima-evm-utils: fix memory leak in case of error
` [PATCH 3/3] ima-evm-utils: fix overflow on printing boot_aggregate

[PATCH 0/6] ima-evm-utils: miscellanous code clean up and bug fixes
 2020-07-15 20:18 UTC  (5+ messages) - mbox.gz / Atom
` [PATCH 6/6] ima-evm-utils: define a basic hash_info.h file

[PATCH v2 0/8] additional "ima-measurement" support
 2020-07-15 20:17 UTC  (13+ messages) - mbox.gz / Atom
` [PATCH v2 1/8] ima-evm-utils: improve reading TPM 1.2 PCRs
` [PATCH v2 2/8] ima_evm_utils: support extending TPM 2.0 banks w/original SHA1 padded digest
` [PATCH v2 3/8] ima-evm-utils: support providing the TPM 1.2 PCRs as a file
` [PATCH v2 4/8] ima-evm-utils: emit "ima_measurement" messages based on log level
` [PATCH v2 5/8] ima-evm-utils: guarantee the measurement list contains all the records
` [PATCH v2 6/8] ima-evm-utils: the IMA measurement list may have too many measurements
` [PATCH v2 7/8] ima-evm-utils: optionally verify the template data file signature
` [PATCH v2 8/8] ima-evm-utils: update README to reflect "--pcrs", "--verify" and "--validate"

[PATCH 0/2] Test cmdline measurement and IMA buffer passing through kexec
 2020-07-15 19:46 UTC  (10+ messages) - mbox.gz / Atom
` [PATCH 1/2] IMA: Verify that the kernel cmdline is passed and measured correctly through the kexec barrier
` [PATCH 2/2] IMA: Verify IMA buffer passing "

[RFC PATCH v3 00/12] Integrity Policy Enforcement LSM (IPE)
 2020-07-15 19:16 UTC  (3+ messages) - mbox.gz / Atom
` [RFC PATCH v3 03/12] security: add ipe lsm policy parser and policy loading

[PATCH v1 0/5] LSM: Measure security module state
 2020-07-15 18:34 UTC  (8+ messages) - mbox.gz / Atom
` [PATCH v1 1/5] IMA: Add LSM_STATE func to measure LSM data
` [PATCH v1 2/5] IMA: Define an IMA hook "
` [PATCH v1 3/5] LSM: Add security_state function pointer in lsm_info struct
` [PATCH v1 4/5] LSM: Define SELinux function to measure security state
` [PATCH v1 5/5] LSM: Define workqueue for measuring security module state

[PATCH ima-evm-utils] Check for tsspcrread in runtime
 2020-07-15 13:15 UTC  (5+ messages) - mbox.gz / Atom

[PATCH v5 0/2] IMA: Verify measurement of certificates
 2020-07-15 13:00 UTC  (4+ messages) - mbox.gz / Atom
` [PATCH v5 1/2] IMA: Add a test to verify measurment of keys
` [PATCH v5 2/2] IMA: Add a test to verify importing a certificate into keyring

Queries regarding portable feature and signing process for EVM
 2020-07-14 15:03 UTC  (3+ messages) - mbox.gz / Atom

[PATCH v3 0/2] synquacer: add TPM support
 2020-07-13 23:05 UTC  (8+ messages) - mbox.gz / Atom
` [PATCH v3 2/2] dt-bindings: Add SynQucer TPM MMIO as a trivial device

[PATCH v5] ima: move APPRAISE_BOOTPARAM dependency on ARCH_POLICY to runtime
 2020-07-13 15:03 UTC  (7+ messages) - mbox.gz / Atom

[PATCH -next] IMA: Make ima_mok_init() static
 2020-07-13 14:26 UTC  - mbox.gz / Atom

[PATCH v5 0/8] crpyto: introduce OSCCA certificate and SM2 asymmetric algorithm
 2020-07-13  2:17 UTC  (11+ messages) - mbox.gz / Atom
` [PATCH v5 1/8] crypto: sm3 - export crypto_sm3_final function
` [PATCH v5 2/8] lib/mpi: Extend the MPI library
` [PATCH v5 3/8] lib/mpi: Introduce ec implementation to "
` [PATCH v5 4/8] crypto: sm2 - introduce OSCCA SM2 asymmetric cipher algorithm
` [PATCH v5 5/8] crypto: testmgr - support test with different ciphertext per encryption
` [PATCH v5 6/8] X.509: support OSCCA certificate parse
` [PATCH v5 7/8] X.509: support OSCCA sm2-with-sm3 certificate verification
` [PATCH v5 8/8] integrity: Asymmetric digsig supports SM2-with-SM3 algorithm

[PATCH v5 0/6] TPM 2.0 trusted keys with attached policy
 2020-07-12 21:54 UTC  (11+ messages) - mbox.gz / Atom
` [PATCH v5 4/6] security: keys: trusted: use ASN.1 TPM2 key format for the blobs

ima-evm-utils: before releasing a new version
 2020-07-10 20:44 UTC  (2+ messages) - mbox.gz / Atom

[PATCH v2] ima: Rename internal audit rule functions
 2020-07-10 20:37 UTC  - mbox.gz / Atom

[PATCH ima-evm-utils v2 1/2] ima-evm-utils: beautify the code to make it more readable
 2020-07-10 17:54 UTC  (3+ messages) - mbox.gz / Atom
` [PATCH ima-evm-utils v2 2/2] ima-evm-utils: add SM3 to pkey_hash_algo algorithm list

[PATCH] tpm: Require that all digests are present in TCG_PCR_EVENT2 structures
 2020-07-10 11:02 UTC  (7+ messages) - mbox.gz / Atom

[PATCH 0/3] additional "ima-measurement" support
 2020-07-09 14:36 UTC  (4+ messages) - mbox.gz / Atom
` [PATCH 1/3] ima-evm-utils: improve reading TPM 1.2 PCRs
` [PATCH 2/3] ima_evm_utils: support extending TPM 2.0 banks w/original SHA1 padded digest
` [PATCH 3/3] ima-evm-utils: support providing the TPM 1.2 PCRs as a file

page:   latest

Linux-Integrity Archive on lore.kernel.org

Archives are clonable:
	git clone --mirror https://lore.kernel.org/linux-integrity/0 linux-integrity/git/0.git

	# If you have public-inbox 1.1+ installed, you may
	# initialize and index your mirror using the following commands:
	public-inbox-init -V2 linux-integrity linux-integrity/ https://lore.kernel.org/linux-integrity \
		linux-integrity@vger.kernel.org
	public-inbox-index linux-integrity

Example config snippet for mirrors

Newsgroup available over NNTP:
	nntp://nntp.lore.kernel.org/org.kernel.vger.linux-integrity


AGPL code for this site: git clone https://public-inbox.org/public-inbox.git