linux-integrity.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2024-09-23 20:46:35 to 2024-10-18 15:23:03 UTC [more...]

[syzbot] [integrity?] [lsm?] possible deadlock in process_measurement (4)
 2024-10-18 15:23 UTC  (13+ messages)

[RFC][PATCH] mm: Split locks in remap_file_pages()
 2024-10-18 15:05 UTC  (2+ messages)

[PATCH 1/3] ima: Remove inode lock
 2024-10-18 14:48 UTC  (29+ messages)
` [PATCH 2/3] ima: Ensure lock is held when setting iint pointer in inode security blob
` [PATCH 3/3] ima: Mark concurrent accesses to the iint pointer in the "

[RFC PATCH v3 00/13] Clavis LSM
 2024-10-18  5:21 UTC  (26+ messages)
` [RFC PATCH v3 01/13] certs: Remove CONFIG_INTEGRITY_PLATFORM_KEYRING check
` [RFC PATCH v3 02/13] certs: Introduce ability to link to a system key
` [RFC PATCH v3 03/13] clavis: Introduce a new system keyring called clavis
` [RFC PATCH v3 04/13] keys: Add new verification type (VERIFYING_CLAVIS_SIGNATURE)
` [RFC PATCH v3 05/13] clavis: Introduce a new key type called clavis_key_acl
` [RFC PATCH v3 06/13] clavis: Populate clavis keyring acl with kernel module signature
` [RFC PATCH v3 07/13] keys: Add ability to track intended usage of the public key
` [RFC PATCH v3 08/13] clavis: Introduce new LSM called clavis
` [RFC PATCH v3 09/13] clavis: Allow user to define acl at build time
` [RFC PATCH v3 10/13] efi: Make clavis boot param persist across kexec
` [RFC PATCH v3 11/13] clavis: Prevent boot param change during kexec
` [RFC PATCH v3 12/13] clavis: Add function redirection for Kunit support
` [RFC PATCH v3 13/13] clavis: "

[PATCH] tpm: ibmvtpm: Set TPM_OPS_AUTO_STARTUP flag on driver
 2024-10-15 22:22 UTC  (3+ messages)

[PATCH v5 0/5] Lazy flush for the auth session
 2024-10-15 22:14 UTC  (40+ messages)
` [PATCH v5 1/5] tpm: Return on tpm2_create_null_primary() failure
` [PATCH v5 2/5] tpm: Implement tpm2_load_null() rollback
` [PATCH v5 4/5] tpm: Allocate chip->auth in tpm2_start_auth_session()
` [PATCH v5 5/5] tpm: flush the auth session only when /dev/tpm0 is open

[RFC PATCH] tpm: Allow the TPM2 pcr_extend HMAC capability to be disabled on boot
 2024-10-15 21:46 UTC  (3+ messages)

[PATCH v6 1/5] tpm: Return on tpm2_create_null_primary() failure
 2024-10-15 20:58 UTC  (5+ messages)
` [PATCH v6 2/5] tpm: Implement tpm2_load_null() rollback
` [PATCH v6 3/5] tpm: flush the null key only when /dev/tpm0 is accessed
` [PATCH v6 4/5] tpm: Allocate chip->auth in tpm2_start_auth_session()
` [PATCH v6 5/5] tpm: flush the auth session only when /dev/tpm0 is open

[PATCH v2 1/6] LSM: Ensure the correct LSM context releaser
 2024-10-15  3:40 UTC  (2+ messages)

[PATCH v20 0/6] Script execution control (was O_MAYEXEC)
 2024-10-15  3:26 UTC  (17+ messages)
` [PATCH v20 1/6] exec: Add a new AT_CHECK flag to execveat(2)
` [PATCH v20 2/6] security: Add EXEC_RESTRICT_FILE and EXEC_DENY_INTERACTIVE securebits
` [PATCH v20 3/6] selftests/exec: Add 32 tests for AT_CHECK and exec securebits
` [PATCH v20 4/6] selftests/landlock: Add tests for execveat + AT_CHECK
` [PATCH v20 5/6] samples/check-exec: Add set-exec
` [PATCH v20 6/6] samples/check-exec: Add an enlighten "inc" interpreter and 28 tests

[syzbot] [integrity?] [lsm?] KMSAN: uninit-value in ima_add_template_entry (2)
 2024-10-13 19:06 UTC  (3+ messages)

[PATCH] ima: Suspend PCR extends and log appends when rebooting
 2024-10-11 15:40 UTC  (2+ messages)

[PATCH 0/3] char: tpm: Adjust cr50_i2c locking mechanism
 2024-10-10  9:15 UTC  (9+ messages)
` [PATCH V2 0/2] "
  ` [PATCH V2 1/2] char: tpm: cr50: Use generic request/relinquish locality ops
  ` [PATCH V2 2/2] char: tpm: cr50: Move i2c locking to "
` [PATCH V3 0/2] char: tpm: Adjust cr50_i2c locking mechanism
  ` [PATCH V3 1/2] char: tpm: cr50: Use generic request/relinquish locality ops
  ` [PATCH V3 2/2] char: tpm: cr50: Move i2c locking to "

[PATCH] evm: stop avoidably reading i_writecount in evm_file_release
 2024-10-10  3:00 UTC  (5+ messages)

[PATCH][next] integrity: Use static_assert() to check struct sizes
 2024-10-10  3:00 UTC  (2+ messages)

[PATCH v4 07/13] LSM: Use lsm_prop in security_current_getsecid
 2024-10-09 17:32 UTC  (3+ messages)
` [PATCH v4 08/13] LSM: Use lsm_prop in security_inode_getsecid
` [PATCH v4 10/13] LSM: Create new security_cred_getlsmprop LSM hook

Possible overflow of TPM log
 2024-10-09 16:13 UTC  (2+ messages)

[PATCH] ima: Fix OOB read when violation occurs with ima template
 2024-10-09 15:34 UTC  (2+ messages)

[RFC] efi/tpm: add efi.tpm_log as a reserved region in 820_table_firmware
 2024-10-09 14:05 UTC  (3+ messages)

[PATCH 2/3] char: tpm: cr50: Use generic request/relinquish locality ops
 2024-10-07 23:37 UTC  (3+ messages)

[PATCH] hwrng: core - Add WARN_ON for buggy read return values
 2024-10-07 23:28 UTC  (11+ messages)

[PATCH] tpm_tis_spi: Pass in ACPI handle during init
 2024-10-07 18:57 UTC 

Problems with TPM timeouts
 2024-10-04 14:47 UTC  (7+ messages)
` [RFC PATCH] tpm: Workaround failed command reception on Infineon devices

[PATCH v3 00/14] KEYS: Add support for PGP keys and signatures
 2024-10-04 10:42 UTC  (8+ messages)

TPM HMAC (really) bad performance
 2024-10-01 13:10 UTC  (8+ messages)

[PATCH] dm verity: fallback to platform keyring also if key in trusted keyring is rejected
 2024-09-27  7:12 UTC  (14+ messages)

[GIT PULL] KEYS: keys-next-6.12-rc1
 2024-09-24 18:04 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).