linux-integrity
Thread
Date
Earlier messages
Later messages
Messages by Thread
Re: [PATCH v6 1/2] tpm: Map the ACPI provided event log
Jarkko Sakkinen
Re: [PATCH v6 1/2] tpm: Map the ACPI provided event log
Jarkko Sakkinen
[PATCH v5] tpm: Map the ACPI provided event log
Jarkko Sakkinen
Re: [PATCH v5] tpm: Map the ACPI provided event log
Jarkko Sakkinen
Re: [PATCH v5] tpm: Map the ACPI provided event log
Ard Biesheuvel
Re: [PATCH v5] tpm: Map the ACPI provided event log
Jarkko Sakkinen
Re: [PATCH v5] tpm: Map the ACPI provided event log
Ard Biesheuvel
Re: [PATCH v5] tpm: Map the ACPI provided event log
Jarkko Sakkinen
[PATCH v4] tpm: Map the ACPI provided event log
Jarkko Sakkinen
[PATCH v3] tpm: Map the ACPI provided event log
Jarkko Sakkinen
Re: [PATCH v3] tpm: Map the ACPI provided event log
Jarkko Sakkinen
[PATCH v2] tpm: Map the ACPI provided event log
Jarkko Sakkinen
[PATCH] tpm: Map the ACPI provided event log
Jarkko Sakkinen
Re: [PATCH] tpm: Map the ACPI provided event log
Ard Biesheuvel
Re: [PATCH] tpm: Map the ACPI provided event log
James Bottomley
Re: [PATCH] tpm: Map the ACPI provided event log
Jarkko Sakkinen
Re: [PATCH] tpm: Map the ACPI provided event log
Jarkko Sakkinen
Re: [PATCH] tpm: Map the ACPI provided event log
James Bottomley
Re: [PATCH] tpm: Map the ACPI provided event log
Jarkko Sakkinen
Re: [PATCH] tpm: Map the ACPI provided event log
Jarkko Sakkinen
Re: [PATCH] tpm: Map the ACPI provided event log
James Bottomley
Re: [PATCH] tpm: Map the ACPI provided event log
Jarkko Sakkinen
[PATCH] lsm: integrity: Allow enable/disable ima and evm with lsm= cmdline
Song Liu
[RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
Song Liu
[RFC 1/2] ima: Add kernel parameter to disable IMA
Song Liu
[RFC 2/2] evm: Add kernel parameter to disable EVM
Song Liu
Re: [RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
Casey Schaufler
Re: [RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
Paul Moore
Re: [RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
Song Liu
Re: [RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
Song Liu
Re: [RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
Paul Moore
Re: [RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
Song Liu
Re: [RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
Song Liu
Re: [RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
Casey Schaufler
Re: [RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
Song Liu
Re: [RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
Song Liu
Re: [RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
Mimi Zohar
Re: [RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
Song Liu
Re: [RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
Roberto Sassu
Re: [RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
Song Liu
Re: [RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
Mimi Zohar
[PATCH v2 0/8] LTP tests: load predefined policy, enhancements
Petr Vorel
[PATCH v2 4/8] ima_setup: Print warning when policy not readable
Petr Vorel
[PATCH v2 2/8] ima_setup.sh: Allow to load predefined policy
Petr Vorel
Re: [PATCH v2 2/8] ima_setup.sh: Allow to load predefined policy
Mimi Zohar
Re: [PATCH v2 2/8] ima_setup.sh: Allow to load predefined policy
Petr Vorel
Re: [PATCH v2 2/8] ima_setup.sh: Allow to load predefined policy
Mimi Zohar
Re: [PATCH v2 2/8] ima_setup.sh: Allow to load predefined policy
Petr Vorel
Re: [PATCH v2 2/8] ima_setup.sh: Allow to load predefined policy
Petr Vorel
Re: [PATCH v2 2/8] ima_setup.sh: Allow to load predefined policy
Mimi Zohar
[PATCH v2 5/8] ima_kexec.sh: Move checking policy if readable to ima_setup.sh
Petr Vorel
[PATCH v2 1/8] IMA: Add TCB policy as an example for ima_measurements.sh
Petr Vorel
Re: [PATCH v2 1/8] IMA: Add TCB policy as an example for ima_measurements.sh
Mimi Zohar
Re: [PATCH v2 1/8] IMA: Add TCB policy as an example for ima_measurements.sh
Petr Vorel
[PATCH v2 7/8] ima_violations.sh: Check for a required policy
Petr Vorel
Re: [PATCH v2 7/8] ima_violations.sh: Check for a required policy
Mimi Zohar
[PATCH v2 8/8] [RFC] ima_kexec.sh: Relax result on unreadable policy to TCONF
Petr Vorel
[PATCH v2 3/8] tst_test.sh: IMA: Allow to disable LSM warnings and use it for IMA
Petr Vorel
[PATCH v2 6/8] IMA: Add example policy for ima_violations.sh
Petr Vorel
Re: [PATCH v2 6/8] IMA: Add example policy for ima_violations.sh
Mimi Zohar
Re: [PATCH v2 6/8] IMA: Add example policy for ima_violations.sh
Petr Vorel
Re: [PATCH v2 6/8] IMA: Add example policy for ima_violations.sh
Petr Vorel
Re: [PATCH v2 6/8] IMA: Add example policy for ima_violations.sh
Mimi Zohar
Re: [PATCH v2 6/8] IMA: Add example policy for ima_violations.sh
Petr Vorel
Re: [PATCH v2 6/8] IMA: Add example policy for ima_violations.sh
Mimi Zohar
[PATCH v23 0/8] Script execution control (was O_MAYEXEC)
Mickaël Salaün
[PATCH v23 2/8] security: Add EXEC_RESTRICT_FILE and EXEC_DENY_INTERACTIVE securebits
Mickaël Salaün
[PATCH v23 3/8] selftests/exec: Add 32 tests for AT_EXECVE_CHECK and exec securebits
Mickaël Salaün
[PATCH v23 8/8] ima: instantiate the bprm_creds_for_exec() hook
Mickaël Salaün
[PATCH v23 4/8] selftests/landlock: Add tests for execveat + AT_EXECVE_CHECK
Mickaël Salaün
[PATCH v23 7/8] samples/check-exec: Add an enlighten "inc" interpreter and 28 tests
Mickaël Salaün
Re: [PATCH v23 7/8] samples/check-exec: Add an enlighten "inc" interpreter and 28 tests
Nathan Chancellor
Re: [PATCH v23 7/8] samples/check-exec: Add an enlighten "inc" interpreter and 28 tests
Mickaël Salaün
[PATCH v23 5/8] samples/check-exec: Add set-exec
Mickaël Salaün
[PATCH v23 1/8] exec: Add a new AT_EXECVE_CHECK flag to execveat(2)
Mickaël Salaün
[PATCH v23 6/8] selftests: ktap_helpers: Fix uninitialized variable
Mickaël Salaün
Re: [PATCH v23 0/8] Script execution control (was O_MAYEXEC)
Mickaël Salaün
Re: [PATCH v23 0/8] Script execution control (was O_MAYEXEC)
Kees Cook
Re: [PATCH v23 0/8] Script execution control (was O_MAYEXEC)
Mickaël Salaün
Re: [syzbot] [integrity?] [lsm?] KMSAN: uninit-value in ima_add_template_entry (2)
[email protected]
Re: [syzbot] [lsm?] [integrity?] KMSAN: uninit-value in ima_add_template_entry (2)
syzbot
[PATCH v3] doc: correct the build steps for open_posix_testsuite
xiubli
Re: [LTP] [PATCH v3] doc: correct the build steps for open_posix_testsuite
Petr Vorel
Re: [PATCH v3] doc: correct the build steps for open_posix_testsuite
Cyril Hrubis
[PATCH] tpm/eventlog: Limit memory allocations for event logs with excessive size
Stefan Berger
Re: [PATCH] tpm/eventlog: Limit memory allocations for event logs with excessive size
Jarkko Sakkinen
Re: [PATCH] tpm/eventlog: Limit memory allocations for event logs with excessive size
Stefan Berger
Re: [PATCH] tpm/eventlog: Limit memory allocations for event logs with excessive size
Jarkko Sakkinen
Re: [PATCH] tpm/eventlog: Limit memory allocations for event logs with excessive size
Jarkko Sakkinen
Re: [PATCH] tpm/eventlog: Limit memory allocations for event logs with excessive size
Takashi Iwai
Re: [PATCH] tpm/eventlog: Limit memory allocations for event logs with excessive size
Liang, Andy (Linux Ecosystem Engineering)
[PATCH 0/3] Enlightened vTPM support for SVSM on SEV-SNP
Stefano Garzarella
[PATCH 1/3] tpm: add generic platform device
Stefano Garzarella
Re: [PATCH 1/3] tpm: add generic platform device
Stefano Garzarella
Re: [PATCH 1/3] tpm: add generic platform device
James Bottomley
Re: [PATCH 1/3] tpm: add generic platform device
Stefano Garzarella
Re: [PATCH 1/3] tpm: add generic platform device
James Bottomley
Re: [PATCH 1/3] tpm: add generic platform device
Stefano Garzarella
[PATCH 2/3] x86/sev: add SVSM call macros for the vTPM protocol
Stefano Garzarella
[PATCH 3/3] x86/sev: add a SVSM vTPM platform device
Stefano Garzarella
Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
Jason Gunthorpe
Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
James Bottomley
Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
Jason Gunthorpe
Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
Stefano Garzarella
Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
Jason Gunthorpe
Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
Stefano Garzarella
Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
Jason Gunthorpe
Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
Stefano Garzarella
Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
Stefano Garzarella
Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
Jarkko Sakkinen
Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
Stefano Garzarella
Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
Stefano Garzarella
Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
Jason Gunthorpe
Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
Stefano Garzarella
Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
Jason Gunthorpe
Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
Jarkko Sakkinen
Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
Jarkko Sakkinen
Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
Jarkko Sakkinen
Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
Dionna Amalie Glaze
Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
Jarkko Sakkinen
Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
Stefano Garzarella
Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
Jarkko Sakkinen
Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
Jarkko Sakkinen
Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
Stefano Garzarella
Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
Tom Lendacky
Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
Stefano Garzarella
Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
James Bottomley
Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
Stefano Garzarella
Re: [syzbot] [integrity?] [lsm?] INFO: task hung in process_measurement (2)
syzbot
Re: [syzbot] [integrity?] [lsm?] INFO: task hung in process_measurement (2)
syzbot
Re: [syzbot] [integrity?] [lsm?] INFO: task hung in process_measurement (2)
[email protected]
Re: [syzbot] [integrity?] [lsm?] INFO: task hung in process_measurement (2)
syzbot
Re: [syzbot] [integrity?] [lsm?] INFO: task hung in process_measurement (2)
[email protected]
Re: [syzbot] [integrity?] [lsm?] INFO: task hung in process_measurement (2)
syzbot
Re: [syzbot] [integrity?] [lsm?] INFO: task hung in process_measurement (2)
[email protected]
Re: [syzbot] [integrity?] [lsm?] INFO: task hung in process_measurement (2)
syzbot
Re: [syzbot] [integrity?] [lsm?] INFO: task hung in process_measurement (2)
[email protected]
Re: [syzbot] [integrity?] [lsm?] INFO: task hung in process_measurement (2)
syzbot
[syzbot] Monthly integrity report (Dec 2024)
syzbot
Re: [syzbot] Monthly integrity report (Dec 2024)
Roberto Sassu
[PATCH v22 0/8] Script execution control (was O_MAYEXEC)
Mickaël Salaün
[PATCH v22 1/8] exec: Add a new AT_EXECVE_CHECK flag to execveat(2)
Mickaël Salaün
Re: [PATCH v22 1/8] exec: Add a new AT_EXECVE_CHECK flag to execveat(2)
Jeff Xu
[PATCH v22 2/8] security: Add EXEC_RESTRICT_FILE and EXEC_DENY_INTERACTIVE securebits
Mickaël Salaün
Re: [PATCH v22 2/8] security: Add EXEC_RESTRICT_FILE and EXEC_DENY_INTERACTIVE securebits
Mickaël Salaün
Re: [PATCH v22 2/8] security: Add EXEC_RESTRICT_FILE and EXEC_DENY_INTERACTIVE securebits
Jeff Xu
[PATCH v22 3/8] selftests/exec: Add 32 tests for AT_EXECVE_CHECK and exec securebits
Mickaël Salaün
[PATCH v22 6/8] selftests: ktap_helpers: Fix uninitialized variable
Mickaël Salaün
[PATCH v22 8/8] ima: instantiate the bprm_creds_for_exec() hook
Mickaël Salaün
Re: [PATCH v22 8/8] ima: instantiate the bprm_creds_for_exec() hook
Paul Moore
[PATCH v22 4/8] selftests/landlock: Add tests for execveat + AT_EXECVE_CHECK
Mickaël Salaün
[PATCH v22 7/8] samples/check-exec: Add an enlighten "inc" interpreter and 28 tests
Mickaël Salaün
[PATCH v22 5/8] samples/check-exec: Add set-exec
Mickaël Salaün
Re: [PATCH v22 0/8] Script execution control (was O_MAYEXEC)
Mickaël Salaün
Re: [PATCH v22 0/8] Script execution control (was O_MAYEXEC)
jeffxu
QEMU launch failure with TPM passthrough
Yuvaraj Ranganathan
Re: QEMU launch failure with TPM passthrough
Stefan Berger
Re: QEMU launch failure with TPM passthrough
Yuvaraj Ranganathan
[PATCH v2] doc: correct the build steps for open_posix_testsuite
xiubli
Re: [PATCH v2] doc: correct the build steps for open_posix_testsuite
Xiubo Li
[PATCH v2 0/7] ima: Remove unnecessary inode locks
Roberto Sassu
[PATCH v2 1/7] fs: ima: Remove S_IMA and IS_IMA()
Roberto Sassu
Re: [PATCH v2 1/7] fs: ima: Remove S_IMA and IS_IMA()
Jan Kara
Re: [PATCH v2 1/7] fs: ima: Remove S_IMA and IS_IMA()
Christian Brauner
[PATCH v2 3/7] ima: Ensure lock is held when setting iint pointer in inode security blob
Roberto Sassu
Re: [PATCH v2 3/7] ima: Ensure lock is held when setting iint pointer in inode security blob
Mimi Zohar
Re: [PATCH v2 3/7] ima: Ensure lock is held when setting iint pointer in inode security blob
Roberto Sassu
[PATCH v2 4/7] ima: Mark concurrent accesses to the iint pointer in the inode security blob
Roberto Sassu
Re: [PATCH v2 4/7] ima: Mark concurrent accesses to the iint pointer in the inode security blob
Mimi Zohar
[PATCH v2 5/7] ima: Set security.ima on file close when ima_appraise=fix
Roberto Sassu
Re: [PATCH v2 5/7] ima: Set security.ima on file close when ima_appraise=fix
Mimi Zohar
Re: [PATCH v2 5/7] ima: Set security.ima on file close when ima_appraise=fix
Roberto Sassu
[PATCH v2 6/7] ima: Discard files opened with O_PATH
Roberto Sassu
Re: [PATCH v2 6/7] ima: Discard files opened with O_PATH
Christian Brauner
Re: [PATCH v2 6/7] ima: Discard files opened with O_PATH
Roberto Sassu
Re: [PATCH v2 6/7] ima: Discard files opened with O_PATH
Mimi Zohar
[PATCH v2 7/7] ima: Reset IMA_NONACTION_RULE_FLAGS after post_setattr
Roberto Sassu
Re: [PATCH v2 7/7] ima: Reset IMA_NONACTION_RULE_FLAGS after post_setattr
Mimi Zohar
Re: [PATCH v2 2/7] ima: Remove inode lock
Mimi Zohar
Re: [PATCH v2 2/7] ima: Remove inode lock
Roberto Sassu
[PATCH] ima: instantiate the bprm_creds_for_exec() hook
Mimi Zohar
Re: [PATCH] ima: instantiate the bprm_creds_for_exec() hook
kernel test robot
Re: [PATCH] ima: instantiate the bprm_creds_for_exec() hook
kernel test robot
Re: [PATCH] ima: instantiate the bprm_creds_for_exec() hook
Stefan Berger
Re: [PATCH 1/3] ima: Remove inode lock
Roberto Sassu
[RFC PATCH] ima: instantiate the bprm_creds_for_exec() hook
Mimi Zohar
[PATCH 0/3] LTP tests: load predefined policy
Petr Vorel
[PATCH 1/3] ima: Add TCB policy as an example
Petr Vorel
Re: [PATCH 1/3] ima: Add TCB policy as an example
Mimi Zohar
Re: [PATCH 1/3] ima: Add TCB policy as an example
Petr Vorel
[PATCH 2/3] ima_setup.sh: Allow to load predefined policy
Petr Vorel
Re: [PATCH 2/3] ima_setup.sh: Allow to load predefined policy
Petr Vorel
Re: [PATCH 2/3] ima_setup.sh: Allow to load predefined policy
Mimi Zohar
Re: [PATCH 2/3] ima_setup.sh: Allow to load predefined policy
Petr Vorel
Re: [PATCH 2/3] ima_setup.sh: Allow to load predefined policy
Mimi Zohar
Re: [PATCH 2/3] ima_setup.sh: Allow to load predefined policy
Petr Vorel
[PATCH 3/3] ima_{kexec,keys,selinux}: Set minimal kernel version
Petr Vorel
Re: [PATCH 3/3] ima_{kexec,keys,selinux}: Set minimal kernel version
Mimi Zohar
Re: [PATCH 3/3] ima_{kexec,keys,selinux}: Set minimal kernel version
Petr Vorel
ima: property parameter unused in ima_match_rules()
Christian Göttsche
Earlier messages
Later messages