public inbox for linux-integrity@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2024-09-16 02:33:26 to 2024-10-14 12:34:11 UTC [more...]

[PATCH v5 0/5] Lazy flush for the auth session
 2024-10-14 12:34 UTC  (42+ messages)
` [PATCH v5 1/5] tpm: Return on tpm2_create_null_primary() failure
` [PATCH v5 2/5] tpm: Implement tpm2_load_null() rollback
` [PATCH v5 3/5] tpm: flush the null key only when /dev/tpm0 is accessed
` [PATCH v5 4/5] tpm: Allocate chip->auth in tpm2_start_auth_session()
` [PATCH v5 5/5] tpm: flush the auth session only when /dev/tpm0 is open

[PATCH 1/3] ima: Remove inode lock
 2024-10-14 11:45 UTC  (15+ messages)
` [PATCH 2/3] ima: Ensure lock is held when setting iint pointer in inode security blob
` [PATCH 3/3] ima: Mark concurrent accesses to the iint pointer in the "

[PATCH v20 0/6] Script execution control (was O_MAYEXEC)
 2024-10-14  8:24 UTC  (14+ messages)
` [PATCH v20 1/6] exec: Add a new AT_CHECK flag to execveat(2)
` [PATCH v20 2/6] security: Add EXEC_RESTRICT_FILE and EXEC_DENY_INTERACTIVE securebits
` [PATCH v20 3/6] selftests/exec: Add 32 tests for AT_CHECK and exec securebits
` [PATCH v20 4/6] selftests/landlock: Add tests for execveat + AT_CHECK
` [PATCH v20 5/6] samples/check-exec: Add set-exec
` [PATCH v20 6/6] samples/check-exec: Add an enlighten "inc" interpreter and 28 tests

[syzbot] [integrity?] [lsm?] KMSAN: uninit-value in ima_add_template_entry (2)
 2024-10-13 19:06 UTC  (3+ messages)

[PATCH] ima: Suspend PCR extends and log appends when rebooting
 2024-10-11 15:40 UTC  (2+ messages)

[PATCH 0/3] char: tpm: Adjust cr50_i2c locking mechanism
 2024-10-10  9:15 UTC  (9+ messages)
` [PATCH V2 0/2] "
  ` [PATCH V2 1/2] char: tpm: cr50: Use generic request/relinquish locality ops
  ` [PATCH V2 2/2] char: tpm: cr50: Move i2c locking to "
` [PATCH V3 0/2] char: tpm: Adjust cr50_i2c locking mechanism
  ` [PATCH V3 1/2] char: tpm: cr50: Use generic request/relinquish locality ops
  ` [PATCH V3 2/2] char: tpm: cr50: Move i2c locking to "

[PATCH] evm: stop avoidably reading i_writecount in evm_file_release
 2024-10-10  3:00 UTC  (5+ messages)

[PATCH][next] integrity: Use static_assert() to check struct sizes
 2024-10-10  3:00 UTC  (2+ messages)

[syzbot] [integrity?] [lsm?] possible deadlock in process_measurement (4)
 2024-10-09 19:05 UTC  (11+ messages)

[PATCH v4 07/13] LSM: Use lsm_prop in security_current_getsecid
 2024-10-09 17:32 UTC  (3+ messages)
` [PATCH v4 08/13] LSM: Use lsm_prop in security_inode_getsecid
` [PATCH v4 10/13] LSM: Create new security_cred_getlsmprop LSM hook

Possible overflow of TPM log
 2024-10-09 16:13 UTC  (2+ messages)

[PATCH] ima: Fix OOB read when violation occurs with ima template
 2024-10-09 15:34 UTC  (2+ messages)

[RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
 2024-10-09 14:05 UTC  (3+ messages)

[PATCH 2/3] char: tpm: cr50: Use generic request/relinquish locality ops
 2024-10-07 23:37 UTC  (3+ messages)

[PATCH] hwrng: core - Add WARN_ON for buggy read return values
 2024-10-07 23:28 UTC  (14+ messages)

[PATCH] tpm_tis_spi: Pass in ACPI handle during init
 2024-10-07 18:57 UTC 

Problems with TPM timeouts
 2024-10-04 14:47 UTC  (7+ messages)
` [RFC PATCH] tpm: Workaround failed command reception on Infineon devices

[PATCH v3 00/14] KEYS: Add support for PGP keys and signatures
 2024-10-04 10:42 UTC  (12+ messages)

TPM HMAC (really) bad performance
 2024-10-01 13:10 UTC  (8+ messages)

[PATCH] dm verity: fallback to platform keyring also if key in trusted keyring is rejected
 2024-09-27  7:12 UTC  (14+ messages)

[GIT PULL] KEYS: keys-next-6.12-rc1
 2024-09-24 18:04 UTC  (2+ messages)

[regression] significant delays when secureboot is enabled since 6.10
 2024-09-22 14:11 UTC  (17+ messages)

[PATCH v9 00/19] x86: Trenchboot secure dynamic launch Linux kernel support
 2024-09-21 22:40 UTC  (12+ messages)
` [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements

[PATCH v4 0/5] Lazy flush for the auth session
 2024-09-19 13:45 UTC  (8+ messages)
` [PATCH v4 1/5] tpm: Return on tpm2_create_null_primary() failure
` [PATCH v4 2/5] tpm: Return on tpm2_create_primary() failure in tpm2_load_null()
` [PATCH v4 3/5] tpm: flush the null key only when /dev/tpm0 is accessed
` [PATCH v4 4/5] tpm: Allocate chip->auth in tpm2_start_auth_session()
` [PATCH v4 5/5] tpm: flush the auth session only when /dev/tpm0 is open

[PATCH] MAINTAINERS: Add Google Security Chip entry
 2024-09-19 13:42 UTC  (2+ messages)

[GIT PULL] TPM DEVICE DRIVER: tpmdd-next-6.12-rc1
 2024-09-19  8:00 UTC  (3+ messages)

[PATCH v3 0/7] Lazy flush for the auth session
 2024-09-18 20:38 UTC  (10+ messages)
` [PATCH v3 1/7] tpm: Remove the top-level documentation tpm2-sessions.c
` [PATCH v3 2/7] tpm: Return on tpm2_create_null_primary() failure
` [PATCH v3 3/7] tpm: Return on tpm2_create_primary() failure in tpm2_load_null()
` [PATCH v3 4/7] tpm: flush the null key only when /dev/tpm0 is accessed
` [PATCH v3 5/7] tpm: Allocate chip->auth in tpm2_start_auth_session()
` [PATCH v3 6/7] tpm: flush the auth session only when /dev/tpm0 is open
` [PATCH v3 7/7] tpm: open code tpm2_create_null_primary()

[RFC] Proposal: Static SECCOMP Policies
 2024-09-18 19:22 UTC  (2+ messages)

[PATCH v2 0/6] lazy flush for the auth session
 2024-09-16 11:07 UTC  (7+ messages)
` [PATCH v2 1/6] tpm: Remove documentation from the header of tpm2-sessions.c
` [PATCH v2 2/6] tpm: Return on tpm2_create_null_primary() failure
` [PATCH v2 3/6] tpm: Return on tpm2_create_primary() failure in tpm2_load_null()
` [PATCH v2 4/6] tpm: flush the null key only when /dev/tpm0 is accessed
` [PATCH v2 5/6] tpm: Allocate chip->auth in tpm2_start_auth_session()
` [PATCH v2 6/6] tpm: flush the auth session only when /dev/tpm0 is open

[PATCH v5 00/14] integrity: Introduce the Integrity Digest Cache
 2024-09-16 10:05 UTC  (2+ messages)

[PATCH 0/4] tpm: lazy flush for the session null key
 2024-09-16  5:53 UTC  (4+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox