messages from 2024-09-16 02:33:26 to 2024-10-14 12:34:11 UTC [more...]
[PATCH v5 0/5] Lazy flush for the auth session
2024-10-14 12:34 UTC (42+ messages)
` [PATCH v5 1/5] tpm: Return on tpm2_create_null_primary() failure
` [PATCH v5 2/5] tpm: Implement tpm2_load_null() rollback
` [PATCH v5 3/5] tpm: flush the null key only when /dev/tpm0 is accessed
` [PATCH v5 4/5] tpm: Allocate chip->auth in tpm2_start_auth_session()
` [PATCH v5 5/5] tpm: flush the auth session only when /dev/tpm0 is open
[PATCH 1/3] ima: Remove inode lock
2024-10-14 11:45 UTC (15+ messages)
` [PATCH 2/3] ima: Ensure lock is held when setting iint pointer in inode security blob
` [PATCH 3/3] ima: Mark concurrent accesses to the iint pointer in the "
[PATCH v20 0/6] Script execution control (was O_MAYEXEC)
2024-10-14 8:24 UTC (14+ messages)
` [PATCH v20 1/6] exec: Add a new AT_CHECK flag to execveat(2)
` [PATCH v20 2/6] security: Add EXEC_RESTRICT_FILE and EXEC_DENY_INTERACTIVE securebits
` [PATCH v20 3/6] selftests/exec: Add 32 tests for AT_CHECK and exec securebits
` [PATCH v20 4/6] selftests/landlock: Add tests for execveat + AT_CHECK
` [PATCH v20 5/6] samples/check-exec: Add set-exec
` [PATCH v20 6/6] samples/check-exec: Add an enlighten "inc" interpreter and 28 tests
[syzbot] [integrity?] [lsm?] KMSAN: uninit-value in ima_add_template_entry (2)
2024-10-13 19:06 UTC (3+ messages)
[PATCH] ima: Suspend PCR extends and log appends when rebooting
2024-10-11 15:40 UTC (2+ messages)
[PATCH 0/3] char: tpm: Adjust cr50_i2c locking mechanism
2024-10-10 9:15 UTC (9+ messages)
` [PATCH V2 0/2] "
` [PATCH V2 1/2] char: tpm: cr50: Use generic request/relinquish locality ops
` [PATCH V2 2/2] char: tpm: cr50: Move i2c locking to "
` [PATCH V3 0/2] char: tpm: Adjust cr50_i2c locking mechanism
` [PATCH V3 1/2] char: tpm: cr50: Use generic request/relinquish locality ops
` [PATCH V3 2/2] char: tpm: cr50: Move i2c locking to "
[PATCH] evm: stop avoidably reading i_writecount in evm_file_release
2024-10-10 3:00 UTC (5+ messages)
[PATCH][next] integrity: Use static_assert() to check struct sizes
2024-10-10 3:00 UTC (2+ messages)
[syzbot] [integrity?] [lsm?] possible deadlock in process_measurement (4)
2024-10-09 19:05 UTC (11+ messages)
[PATCH v4 07/13] LSM: Use lsm_prop in security_current_getsecid
2024-10-09 17:32 UTC (3+ messages)
` [PATCH v4 08/13] LSM: Use lsm_prop in security_inode_getsecid
` [PATCH v4 10/13] LSM: Create new security_cred_getlsmprop LSM hook
Possible overflow of TPM log
2024-10-09 16:13 UTC (2+ messages)
[PATCH] ima: Fix OOB read when violation occurs with ima template
2024-10-09 15:34 UTC (2+ messages)
[RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
2024-10-09 14:05 UTC (3+ messages)
[PATCH 2/3] char: tpm: cr50: Use generic request/relinquish locality ops
2024-10-07 23:37 UTC (3+ messages)
[PATCH] hwrng: core - Add WARN_ON for buggy read return values
2024-10-07 23:28 UTC (14+ messages)
[PATCH] tpm_tis_spi: Pass in ACPI handle during init
2024-10-07 18:57 UTC
Problems with TPM timeouts
2024-10-04 14:47 UTC (7+ messages)
` [RFC PATCH] tpm: Workaround failed command reception on Infineon devices
[PATCH v3 00/14] KEYS: Add support for PGP keys and signatures
2024-10-04 10:42 UTC (12+ messages)
TPM HMAC (really) bad performance
2024-10-01 13:10 UTC (8+ messages)
[PATCH] dm verity: fallback to platform keyring also if key in trusted keyring is rejected
2024-09-27 7:12 UTC (14+ messages)
[GIT PULL] KEYS: keys-next-6.12-rc1
2024-09-24 18:04 UTC (2+ messages)
[regression] significant delays when secureboot is enabled since 6.10
2024-09-22 14:11 UTC (17+ messages)
[PATCH v9 00/19] x86: Trenchboot secure dynamic launch Linux kernel support
2024-09-21 22:40 UTC (12+ messages)
` [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
[PATCH v4 0/5] Lazy flush for the auth session
2024-09-19 13:45 UTC (8+ messages)
` [PATCH v4 1/5] tpm: Return on tpm2_create_null_primary() failure
` [PATCH v4 2/5] tpm: Return on tpm2_create_primary() failure in tpm2_load_null()
` [PATCH v4 3/5] tpm: flush the null key only when /dev/tpm0 is accessed
` [PATCH v4 4/5] tpm: Allocate chip->auth in tpm2_start_auth_session()
` [PATCH v4 5/5] tpm: flush the auth session only when /dev/tpm0 is open
[PATCH] MAINTAINERS: Add Google Security Chip entry
2024-09-19 13:42 UTC (2+ messages)
[GIT PULL] TPM DEVICE DRIVER: tpmdd-next-6.12-rc1
2024-09-19 8:00 UTC (3+ messages)
[PATCH v3 0/7] Lazy flush for the auth session
2024-09-18 20:38 UTC (10+ messages)
` [PATCH v3 1/7] tpm: Remove the top-level documentation tpm2-sessions.c
` [PATCH v3 2/7] tpm: Return on tpm2_create_null_primary() failure
` [PATCH v3 3/7] tpm: Return on tpm2_create_primary() failure in tpm2_load_null()
` [PATCH v3 4/7] tpm: flush the null key only when /dev/tpm0 is accessed
` [PATCH v3 5/7] tpm: Allocate chip->auth in tpm2_start_auth_session()
` [PATCH v3 6/7] tpm: flush the auth session only when /dev/tpm0 is open
` [PATCH v3 7/7] tpm: open code tpm2_create_null_primary()
[RFC] Proposal: Static SECCOMP Policies
2024-09-18 19:22 UTC (2+ messages)
[PATCH v2 0/6] lazy flush for the auth session
2024-09-16 11:07 UTC (7+ messages)
` [PATCH v2 1/6] tpm: Remove documentation from the header of tpm2-sessions.c
` [PATCH v2 2/6] tpm: Return on tpm2_create_null_primary() failure
` [PATCH v2 3/6] tpm: Return on tpm2_create_primary() failure in tpm2_load_null()
` [PATCH v2 4/6] tpm: flush the null key only when /dev/tpm0 is accessed
` [PATCH v2 5/6] tpm: Allocate chip->auth in tpm2_start_auth_session()
` [PATCH v2 6/6] tpm: flush the auth session only when /dev/tpm0 is open
[PATCH v5 00/14] integrity: Introduce the Integrity Digest Cache
2024-09-16 10:05 UTC (2+ messages)
[PATCH 0/4] tpm: lazy flush for the session null key
2024-09-16 5:53 UTC (4+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox