messages from 2024-06-20 00:53:19 to 2024-07-11 11:14:05 UTC [more...]
[PATCH bpf-next v4 00/20] Add return value range check for BPF LSM
2024-07-11 11:18 UTC (7+ messages)
` [PATCH bpf-next v4 02/20] lsm: Refactor return value of LSM hook inode_need_killpriv
` [PATCH bpf-next v4 03/20] lsm: Refactor return value of LSM hook inode_getsecurity
` [PATCH bpf-next v4 04/20] lsm: Refactor return value of LSM hook inode_listsecurity
` [PATCH bpf-next v4 05/20] lsm: Refactor return value of LSM hook inode_copy_up_xattr
` [PATCH bpf-next v4 08/20] lsm: Refactor return value of LSM hook getprocattr
` [PATCH bpf-next v4 11/20] bpf, lsm: Add disabled BPF LSM hook list
[RFC PATCH v19 0/5] Script execution control (was O_MAYEXEC)
2024-07-11 8:57 UTC (53+ messages)
` [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2)
` [PATCH] binfmt_elf: Fail execution of shared objects with ELIBEXEC (was: Re: [RFC PATCH v19 1/5] exec: Add a new AT_CHECK flag to execveat(2))
` [PATCH] binfmt_elf: Fail execution of shared objects with ELIBEXEC
` [RFC PATCH v19 2/5] security: Add new SHOULD_EXEC_CHECK and SHOULD_EXEC_RESTRICT securebits
` [RFC PATCH v19 3/5] selftests/exec: Add tests for AT_CHECK and related securebits
` [RFC PATCH v19 4/5] selftests/landlock: Add tests for execveat + AT_CHECK
` [RFC PATCH v19 5/5] samples/should-exec: Add set-should-exec
[PATCH] tpm: Add new device/vendor ID 0x50666666
2024-07-10 15:59 UTC (3+ messages)
[PATCH] tpm: Move dereference after NULL check in tpm_buf_check_hmac_response
2024-07-09 6:04 UTC (2+ messages)
[PATCH] tpm: validate object type in tpm2_handle_mso()
2024-07-07 10:14 UTC (2+ messages)
[GIT PULL] integrity: subsystem update for v6.10-rcX
2024-07-05 23:24 UTC (2+ messages)
[GIT PULL] TPM DEVICE DRIVER: tpmdd-next-6.10-rc7
2024-07-05 19:37 UTC (2+ messages)
[PATCH v2 0/3] Address !chip->auth
2024-07-05 15:04 UTC (15+ messages)
` [PATCH v2 1/3] tpm: Address !chip->auth in tpm2_*_auth_session()
` [PATCH v2 2/3] tpm: Address !chip->auth in tpm_buf_append_name()
` [PATCH v2 3/3] tpm: Address !chip->auth in tpm_buf_append_hmac_session*()
[PATCH v4 0/3] Address !chip->auth
2024-07-04 18:53 UTC (4+ messages)
` [PATCH v4 1/3] tpm: Address !chip->auth in tpm2_*_auth_session()
` [PATCH v4 2/3] tpm: Address !chip->auth in tpm_buf_append_name()
` [PATCH v4 3/3] tpm: Address !chip->auth in tpm_buf_append_hmac_session*()
[PATCH 0/3] Address !chip->auth
2024-07-04 14:45 UTC (7+ messages)
` [PATCH 1/3] tpm: Address !chip->auth in tpm2_*_auth_session()
` [PATCH 2/3] tpm: Address !chip->auth in tpm_buf_append_name()
` [PATCH 3/3] tpm: Address !chip->auth in tpm_buf_append_hmac_session*()
[PATCH v3 0/3] Address !chip->auth
2024-07-04 8:57 UTC (4+ messages)
` [PATCH v3 1/3] tpm: Address !chip->auth in tpm2_*_auth_session()
` [PATCH v3 2/3] tpm: Address !chip->auth in tpm_buf_append_name()
` [PATCH v3 3/3] tpm: Address !chip->auth in tpm_buf_append_hmac_session*()
[PATCH] tpm: Limit TCG_TPM2_HMAC to known good drivers
2024-07-03 17:24 UTC (3+ messages)
[ima-evm-utils PATCH] Release version 1.6
2024-07-03 16:44 UTC
[PATCH 1/2] KEYS: trusted: fix DCP blob payload length assignment
2024-07-03 12:53 UTC (2+ messages)
` [PATCH 2/2] KEYS: trusted: dcp: fix leak of blob encryption key
[PATCH] tpm: atmel: Drop PPC64 specific MMIO setup
2024-07-03 12:14 UTC (3+ messages)
[PATCH] tpm: ibmvtpm: Call tpm2_sessions_init() to initialize session support
2024-07-03 1:00 UTC (18+ messages)
[ima-evm-utils PATCH] Require specifying openssl PKCS11 engine or provider access method
2024-07-03 0:56 UTC (2+ messages)
[ima-evm-utils PATCH v2] ci: EOL CentOS Stream 8 and CentOS 7
2024-07-02 22:48 UTC
[RFC] integrity: wait for completion of i2c initialization using late_initcall_sync()
2024-07-02 2:37 UTC (4+ messages)
[PATCH] tpm: Check non-nullity of chip->auth
2024-07-01 19:21 UTC (2+ messages)
[GIT PULL] TPM DEVICE DRIVER: tpmdd-next-6.11-rc1
2024-07-01 17:16 UTC (3+ messages)
[GIT PULL] KEYS: keys-next-6.11-rc1
2024-07-01 15:43 UTC
[PATCH v1] tpm_tis_spi: add missing attpm20p SPI device ID entry
2024-07-01 15:28 UTC (6+ messages)
[PATCH v2] char: tpm: Fix possible memory leak in tpm_bios_measurements_open()
2024-07-01 15:18 UTC (2+ messages)
[PATCH v3 0/2] KEYS: add missing MODULE_DESCRIPTION() macros
2024-07-01 15:00 UTC (5+ messages)
` [PATCH v3 1/2] KEYS: trusted: add missing MODULE_DESCRIPTION()
[ima-evm-utils PATCH] ci: EOL CentOS Stream 8 and CentOS 7
2024-06-27 19:20 UTC
IMA vs TPM (i2c) builtin driver boot order
2024-06-25 20:17 UTC (2+ messages)
[PATCH v39 01/42] integrity: disassociate ima_filter_rule from security_audit_rule
2024-06-24 23:16 UTC (15+ messages)
[ima-evm-utils][PATCH v2 0/4] Enable and disable OpenSSL provider tests
2024-06-24 22:01 UTC (5+ messages)
` [ima-evm-utils][PATCH v2 1/4] Call OPENSSL_Cleanup before main exit to avoid crashes when engine was used
` [ima-evm-utils][PATCH v2 2/4] CI/CD: Disable pkcs11 providers for Debian and AltLinux
` [ima-evm-utils][PATCH v2 3/4] CI/CD: Prepare Ubuntu 24.04 (Noble) to run provider tests
` [ima-evm-utils][PATCH v2 4/4] Replace Ubuntu mantic with noble
[ima-evm-utils][PATCH 0/3] Enable and disable OpenSSL provider tests
2024-06-24 9:24 UTC (11+ messages)
` [ima-evm-utils][PATCH 1/3] Call OPENSSL_Cleanup before main exit to avoid crashes when engine was used
` [ima-evm-utils][PATCH 2/3] CI/CD: Disable pkcs11 providers for Debian and AltLinux
` [ima-evm-utils][PATCH 3/3] CI/CD: Also enable Ubuntu 24.04 (Noble) and run provider tests
[PATCH ] ima: fix buffer overrun in ima_eventdigest_init_common
2024-06-21 22:56 UTC (4+ messages)
[PATCH v4 00/14] security: digest_cache LSM
2024-06-21 7:10 UTC (20+ messages)
[RFC PATCH v2 0/8] Clavis LSM
2024-06-20 20:18 UTC (3+ messages)
[PATCH v9 00/19] x86: Trenchboot secure dynamic launch Linux kernel support
2024-06-20 16:55 UTC (14+ messages)
` [PATCH v9 04/19] x86: Secure Launch Resource Table header file
[PATCH] char: tpm: Fix possible memory leak in tpm_bios_measurements_open()
2024-06-20 0:53 UTC (2+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).