messages from 2024-09-23 20:46:35 to 2024-10-18 15:23:03 UTC [more...]
[syzbot] [integrity?] [lsm?] possible deadlock in process_measurement (4)
2024-10-18 15:23 UTC (13+ messages)
[RFC][PATCH] mm: Split locks in remap_file_pages()
2024-10-18 15:05 UTC (2+ messages)
[PATCH 1/3] ima: Remove inode lock
2024-10-18 14:48 UTC (29+ messages)
` [PATCH 2/3] ima: Ensure lock is held when setting iint pointer in inode security blob
` [PATCH 3/3] ima: Mark concurrent accesses to the iint pointer in the "
[RFC PATCH v3 00/13] Clavis LSM
2024-10-18 5:21 UTC (26+ messages)
` [RFC PATCH v3 01/13] certs: Remove CONFIG_INTEGRITY_PLATFORM_KEYRING check
` [RFC PATCH v3 02/13] certs: Introduce ability to link to a system key
` [RFC PATCH v3 03/13] clavis: Introduce a new system keyring called clavis
` [RFC PATCH v3 04/13] keys: Add new verification type (VERIFYING_CLAVIS_SIGNATURE)
` [RFC PATCH v3 05/13] clavis: Introduce a new key type called clavis_key_acl
` [RFC PATCH v3 06/13] clavis: Populate clavis keyring acl with kernel module signature
` [RFC PATCH v3 07/13] keys: Add ability to track intended usage of the public key
` [RFC PATCH v3 08/13] clavis: Introduce new LSM called clavis
` [RFC PATCH v3 09/13] clavis: Allow user to define acl at build time
` [RFC PATCH v3 10/13] efi: Make clavis boot param persist across kexec
` [RFC PATCH v3 11/13] clavis: Prevent boot param change during kexec
` [RFC PATCH v3 12/13] clavis: Add function redirection for Kunit support
` [RFC PATCH v3 13/13] clavis: "
[PATCH] tpm: ibmvtpm: Set TPM_OPS_AUTO_STARTUP flag on driver
2024-10-15 22:22 UTC (3+ messages)
[PATCH v5 0/5] Lazy flush for the auth session
2024-10-15 22:14 UTC (40+ messages)
` [PATCH v5 1/5] tpm: Return on tpm2_create_null_primary() failure
` [PATCH v5 2/5] tpm: Implement tpm2_load_null() rollback
` [PATCH v5 4/5] tpm: Allocate chip->auth in tpm2_start_auth_session()
` [PATCH v5 5/5] tpm: flush the auth session only when /dev/tpm0 is open
[RFC PATCH] tpm: Allow the TPM2 pcr_extend HMAC capability to be disabled on boot
2024-10-15 21:46 UTC (3+ messages)
[PATCH v6 1/5] tpm: Return on tpm2_create_null_primary() failure
2024-10-15 20:58 UTC (5+ messages)
` [PATCH v6 2/5] tpm: Implement tpm2_load_null() rollback
` [PATCH v6 3/5] tpm: flush the null key only when /dev/tpm0 is accessed
` [PATCH v6 4/5] tpm: Allocate chip->auth in tpm2_start_auth_session()
` [PATCH v6 5/5] tpm: flush the auth session only when /dev/tpm0 is open
[PATCH v2 1/6] LSM: Ensure the correct LSM context releaser
2024-10-15 3:40 UTC (2+ messages)
[PATCH v20 0/6] Script execution control (was O_MAYEXEC)
2024-10-15 3:26 UTC (17+ messages)
` [PATCH v20 1/6] exec: Add a new AT_CHECK flag to execveat(2)
` [PATCH v20 2/6] security: Add EXEC_RESTRICT_FILE and EXEC_DENY_INTERACTIVE securebits
` [PATCH v20 3/6] selftests/exec: Add 32 tests for AT_CHECK and exec securebits
` [PATCH v20 4/6] selftests/landlock: Add tests for execveat + AT_CHECK
` [PATCH v20 5/6] samples/check-exec: Add set-exec
` [PATCH v20 6/6] samples/check-exec: Add an enlighten "inc" interpreter and 28 tests
[syzbot] [integrity?] [lsm?] KMSAN: uninit-value in ima_add_template_entry (2)
2024-10-13 19:06 UTC (3+ messages)
[PATCH] ima: Suspend PCR extends and log appends when rebooting
2024-10-11 15:40 UTC (2+ messages)
[PATCH 0/3] char: tpm: Adjust cr50_i2c locking mechanism
2024-10-10 9:15 UTC (9+ messages)
` [PATCH V2 0/2] "
` [PATCH V2 1/2] char: tpm: cr50: Use generic request/relinquish locality ops
` [PATCH V2 2/2] char: tpm: cr50: Move i2c locking to "
` [PATCH V3 0/2] char: tpm: Adjust cr50_i2c locking mechanism
` [PATCH V3 1/2] char: tpm: cr50: Use generic request/relinquish locality ops
` [PATCH V3 2/2] char: tpm: cr50: Move i2c locking to "
[PATCH] evm: stop avoidably reading i_writecount in evm_file_release
2024-10-10 3:00 UTC (5+ messages)
[PATCH][next] integrity: Use static_assert() to check struct sizes
2024-10-10 3:00 UTC (2+ messages)
[PATCH v4 07/13] LSM: Use lsm_prop in security_current_getsecid
2024-10-09 17:32 UTC (3+ messages)
` [PATCH v4 08/13] LSM: Use lsm_prop in security_inode_getsecid
` [PATCH v4 10/13] LSM: Create new security_cred_getlsmprop LSM hook
Possible overflow of TPM log
2024-10-09 16:13 UTC (2+ messages)
[PATCH] ima: Fix OOB read when violation occurs with ima template
2024-10-09 15:34 UTC (2+ messages)
[RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
2024-10-09 14:05 UTC (3+ messages)
[PATCH 2/3] char: tpm: cr50: Use generic request/relinquish locality ops
2024-10-07 23:37 UTC (3+ messages)
[PATCH] hwrng: core - Add WARN_ON for buggy read return values
2024-10-07 23:28 UTC (11+ messages)
[PATCH] tpm_tis_spi: Pass in ACPI handle during init
2024-10-07 18:57 UTC
Problems with TPM timeouts
2024-10-04 14:47 UTC (7+ messages)
` [RFC PATCH] tpm: Workaround failed command reception on Infineon devices
[PATCH v3 00/14] KEYS: Add support for PGP keys and signatures
2024-10-04 10:42 UTC (8+ messages)
TPM HMAC (really) bad performance
2024-10-01 13:10 UTC (8+ messages)
[PATCH] dm verity: fallback to platform keyring also if key in trusted keyring is rejected
2024-09-27 7:12 UTC (14+ messages)
[GIT PULL] KEYS: keys-next-6.12-rc1
2024-09-24 18:04 UTC (2+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).