Roberto Sassu ([email protected])

Number of posts: 889 (0.36 per day)
First post: 2017-06-06 08:52:45
Last post: 2024-03-25 17:59:10

Date List Subject
2020-11-11 09:27:57 linux-kernel [PATCH v3 05/11] evm: Introduce evm_status_revalidate()
2020-11-11 09:27:38 linux-kernel [PATCH v3 06/11] evm: Ignore INTEGRITY_NOLABEL if no HMAC key is loaded
2020-11-11 09:26:59 linux-kernel [PATCH v3 02/11] evm: Load EVM key in ima_load_x509() to avoid appraisal
2020-11-11 09:26:32 linux-kernel [PATCH v3 03/11] evm: Refuse EVM_ALLOW_METADATA_WRITES only if an HMAC key is loaded
2020-11-11 09:26:07 linux-kernel [PATCH v3 04/11] ima: Move ima_reset_appraise_flags() call to post hooks
2020-11-11 09:26:05 linux-kernel [PATCH v3 00/11] evm: Improve usability of portable signatures
2020-11-11 09:25:56 linux-kernel [PATCH v3 01/11] evm: Execute evm_inode_init_security() only when an HMAC key is loaded
2020-10-07 17:16:22 linux-kernel RE: [PATCH] ima: Fix sizeof mismatches
2020-09-17 17:41:37 linux-kernel RE: [PATCH v2 07/12] evm: Introduce EVM_RESET_STATUS atomic flag
2020-09-17 15:26:14 linux-kernel RE: [PATCH v2 11/12] ima: Introduce template field evmsig and write to field sig as fallback
2020-09-04 09:35:35 linux-kernel [PATCH v2 12/12] ima: Don't remove security.ima if file must not be appraised
2020-09-04 09:34:14 linux-kernel [PATCH v2 05/12] evm: Load EVM key in ima_load_x509() to avoid appraisal
2020-09-04 09:33:53 linux-kernel [PATCH v2 10/12] ima: Allow imasig requirement to be satisfied by EVM portable signatures
2020-09-04 09:33:36 linux-kernel [PATCH v2 11/12] ima: Introduce template field evmsig and write to field sig as fallback
2020-09-04 09:32:23 linux-kernel [PATCH v2 07/12] evm: Introduce EVM_RESET_STATUS atomic flag
2020-09-04 09:32:14 linux-kernel [PATCH v2 08/12] evm: Allow xattr/attr operations for portable signatures if check fails
2020-09-04 09:32:03 linux-kernel [PATCH v2 06/12] evm: Refuse EVM_ALLOW_METADATA_WRITES only if the HMAC key is loaded
2020-09-04 09:31:39 linux-kernel [PATCH v2 09/12] evm: Allow setxattr() and setattr() if metadata digest won't change
2020-09-04 09:30:22 linux-kernel [PATCH v2 00/12] IMA/EVM fixes
2020-09-04 09:29:37 linux-kernel [PATCH v2 02/12] ima: Remove semicolon at the end of ima_get_binary_runtime_size()
2020-09-04 09:28:45 linux-kernel [PATCH v2 03/12] evm: Check size of security.evm before using it
2020-09-04 09:28:40 linux-kernel [PATCH v2 01/12] ima: Don't ignore errors from crypto_shash_update()
2020-09-04 09:28:32 linux-kernel [PATCH v2 04/12] evm: Execute evm_inode_init_security() only when the HMAC key is loaded
2020-09-02 11:46:50 linux-kernel RE: [PATCH 01/11] evm: Execute evm_inode_init_security() only when the HMAC key is loaded
2020-09-01 11:53:10 linux-kernel RE: [PATCH 07/11] evm: Set IMA_CHANGE_XATTR/ATTR bit if EVM_ALLOW_METADATA_WRITES is set
2020-09-01 09:11:07 linux-kernel RE: [PATCH 07/11] evm: Set IMA_CHANGE_XATTR/ATTR bit if EVM_ALLOW_METADATA_WRITES is set
2020-08-31 09:46:54 linux-kernel RE: [PATCH 02/11] evm: Load EVM key in ima_load_x509() to avoid appraisal
2020-08-31 08:53:03 linux-kernel RE: [PATCH 06/11] evm: Allow setxattr() and setattr() if metadata digest won't change
2020-08-31 08:26:56 linux-kernel RE: [PATCH 03/11] evm: Refuse EVM_ALLOW_METADATA_WRITES only if the HMAC key is loaded
2020-06-18 20:41:08 linux-kernel [PATCH 10/11] ima: Don't ignore errors from crypto_shash_update()
2020-06-18 20:41:07 linux-kernel [PATCH 07/11] evm: Set IMA_CHANGE_XATTR/ATTR bit if EVM_ALLOW_METADATA_WRITES is set
2020-06-18 18:39:10 linux-kernel [PATCH 06/11] evm: Allow setxattr() and setattr() if metadata digest won't change
2020-06-18 16:12:09 linux-kernel [PATCH 11/11] ima: Remove semicolon at the end of ima_get_binary_runtime_size()
2020-06-18 16:10:14 linux-kernel [PATCH 09/11] ima: Don't remove security.ima if file must not be appraised
2020-06-18 16:10:14 linux-kernel [PATCH 08/11] ima: Allow imasig requirement to be satisfied by EVM portable signatures
2020-06-18 16:09:04 linux-kernel [PATCH 04/11] evm: Check size of security.evm before using it
2020-06-18 16:08:52 linux-kernel [PATCH 01/11] evm: Execute evm_inode_init_security() only when the HMAC key is loaded
2020-06-18 16:07:34 linux-kernel [PATCH 05/11] evm: Allow xattr/attr operations for portable signatures if check fails
2020-06-18 16:07:32 linux-kernel [PATCH 02/11] evm: Load EVM key in ima_load_x509() to avoid appraisal
2020-06-18 16:06:48 linux-kernel [PATCH 03/11] evm: Refuse EVM_ALLOW_METADATA_WRITES only if the HMAC key is loaded
2020-06-18 12:43:35 linux-kernel RE: [PATCH] extend IMA boot_aggregate with kernel measurements
2020-06-16 17:31:59 linux-kernel RE: [PATCH] extend IMA boot_aggregate with kernel measurements
2020-06-12 15:16:27 linux-kernel RE: [PATCH] extend IMA boot_aggregate with kernel measurements
2020-06-07 21:11:10 linux-kernel [PATCH] ima: Remove __init annotation from ima_pcrread()
2020-06-07 20:16:37 linux-kernel RE: [GIT PULL] integrity subsystem updates for v5.8
2020-06-05 06:56:44 linux-kernel [PATCH] ima: Directly free *entry in ima_alloc_init_template() if digests is NULL
2020-06-04 15:13:17 linux-kernel RE: general protection fault in ima_free_template_entry
2020-06-03 15:14:46 linux-kernel [PATCH 1/2] ima: Directly assign the ima_default_policy pointer to ima_rules
2020-06-03 15:14:18 linux-kernel [PATCH 2/2] ima: Call ima_calc_boot_aggregate() in ima_eventdigest_init()
2020-06-01 13:32:51 linux-crypto RE: [linux-next:master 2476/12912] security/integrity/ima/ima_crypto.c:575:12: warning: stack frame size of 1152 bytes in function 'ima_calc_field_array_hash_tfm'
2020-05-29 07:35:41 linux-kernel RE: Oops at boot with linux-next kernel with IMA boot options