messages from 2024-09-12 13:54:26 to 2024-10-07 23:28:32 UTC [more...]
[PATCH] hwrng: core - Add WARN_ON for buggy read return values
2024-10-07 23:28 UTC (14+ messages)
[PATCH] tpm_tis_spi: Pass in ACPI handle during init
2024-10-07 18:57 UTC
[syzbot] [integrity?] [lsm?] possible deadlock in process_measurement (4)
2024-10-07 16:58 UTC (9+ messages)
Problems with TPM timeouts
2024-10-04 14:47 UTC (7+ messages)
` [RFC PATCH] tpm: Workaround failed command reception on Infineon devices
[PATCH v3 00/14] KEYS: Add support for PGP keys and signatures
2024-10-04 10:42 UTC (24+ messages)
` [PATCH v3 03/14] PGPLIB: PGP definitions (RFC 9580)
` [PATCH v3 04/14] PGPLIB: Basic packet parser
` [PATCH v3 05/14] PGPLIB: Signature parser
[PATCH v5 0/5] Lazy flush for the auth session
2024-10-03 15:27 UTC (33+ messages)
` [PATCH v5 1/5] tpm: Return on tpm2_create_null_primary() failure
` [PATCH v5 2/5] tpm: Implement tpm2_load_null() rollback
` [PATCH v5 3/5] tpm: flush the null key only when /dev/tpm0 is accessed
` [PATCH v5 4/5] tpm: Allocate chip->auth in tpm2_start_auth_session()
` [PATCH v5 5/5] tpm: flush the auth session only when /dev/tpm0 is open
[syzbot] [integrity?] [lsm?] KMSAN: uninit-value in ima_add_template_entry (2)
2024-10-02 7:56 UTC (2+ messages)
TPM HMAC (really) bad performance
2024-10-01 13:10 UTC (8+ messages)
[PATCH 2/3] char: tpm: cr50: Use generic request/relinquish locality ops
2024-09-30 11:52 UTC (2+ messages)
[PATCH] dm verity: fallback to platform keyring also if key in trusted keyring is rejected
2024-09-27 7:12 UTC (14+ messages)
[GIT PULL] KEYS: keys-next-6.12-rc1
2024-09-24 18:04 UTC (2+ messages)
[PATCH] evm: stop avoidably reading i_writecount in evm_file_release
2024-09-24 11:56 UTC (4+ messages)
[regression] significant delays when secureboot is enabled since 6.10
2024-09-22 14:11 UTC (31+ messages)
[PATCH v9 00/19] x86: Trenchboot secure dynamic launch Linux kernel support
2024-09-21 22:40 UTC (12+ messages)
` [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
[PATCH v4 0/5] Lazy flush for the auth session
2024-09-19 13:45 UTC (8+ messages)
` [PATCH v4 1/5] tpm: Return on tpm2_create_null_primary() failure
` [PATCH v4 2/5] tpm: Return on tpm2_create_primary() failure in tpm2_load_null()
` [PATCH v4 3/5] tpm: flush the null key only when /dev/tpm0 is accessed
` [PATCH v4 4/5] tpm: Allocate chip->auth in tpm2_start_auth_session()
` [PATCH v4 5/5] tpm: flush the auth session only when /dev/tpm0 is open
[PATCH] MAINTAINERS: Add Google Security Chip entry
2024-09-19 13:42 UTC (2+ messages)
[GIT PULL] TPM DEVICE DRIVER: tpmdd-next-6.12-rc1
2024-09-19 8:00 UTC (3+ messages)
[PATCH v3 0/7] Lazy flush for the auth session
2024-09-18 20:38 UTC (10+ messages)
` [PATCH v3 1/7] tpm: Remove the top-level documentation tpm2-sessions.c
` [PATCH v3 2/7] tpm: Return on tpm2_create_null_primary() failure
` [PATCH v3 3/7] tpm: Return on tpm2_create_primary() failure in tpm2_load_null()
` [PATCH v3 4/7] tpm: flush the null key only when /dev/tpm0 is accessed
` [PATCH v3 5/7] tpm: Allocate chip->auth in tpm2_start_auth_session()
` [PATCH v3 6/7] tpm: flush the auth session only when /dev/tpm0 is open
` [PATCH v3 7/7] tpm: open code tpm2_create_null_primary()
[RFC] Proposal: Static SECCOMP Policies
2024-09-18 19:22 UTC (2+ messages)
[PATCH v2 0/6] lazy flush for the auth session
2024-09-16 11:07 UTC (7+ messages)
` [PATCH v2 1/6] tpm: Remove documentation from the header of tpm2-sessions.c
` [PATCH v2 2/6] tpm: Return on tpm2_create_null_primary() failure
` [PATCH v2 3/6] tpm: Return on tpm2_create_primary() failure in tpm2_load_null()
` [PATCH v2 4/6] tpm: flush the null key only when /dev/tpm0 is accessed
` [PATCH v2 5/6] tpm: Allocate chip->auth in tpm2_start_auth_session()
` [PATCH v2 6/6] tpm: flush the auth session only when /dev/tpm0 is open
[PATCH v5 00/14] integrity: Introduce the Integrity Digest Cache
2024-09-16 10:05 UTC (2+ messages)
[PATCH 0/4] tpm: lazy flush for the session null key
2024-09-16 5:53 UTC (9+ messages)
` [PATCH 1/4] tpm: remove file header documentation from tpm2-sessions.c
` [PATCH 2/4] tpm: address tpm2_create_null_primary() return value
` [PATCH 3/4] tpm: address tpm2_create_primary() failure
` [PATCH 4/4] tpm: flush the session null key only when required
[PATCH] tpm: remove file header documentation from tpm2-sessions.c
2024-09-15 12:47 UTC (2+ messages)
[PATCH v11 00/20] x86: Trenchboot secure dynamic launch Linux kernel support
2024-09-13 20:05 UTC (21+ messages)
` [PATCH v11 01/20] Documentation/x86: Secure Launch kernel documentation
` [PATCH v11 02/20] x86: Secure Launch Kconfig
` [PATCH v11 03/20] x86: Secure Launch Resource Table header file
` [PATCH v11 04/20] x86: Secure Launch main "
` [PATCH v11 05/20] x86: Add early SHA-1 support for Secure Launch early measurements
` [PATCH v11 06/20] x86: Add early SHA-256 "
` [PATCH v11 07/20] x86/msr: Add variable MTRR base/mask and x2apic ID registers
` [PATCH v11 08/20] x86/boot: Place TXT MLE header in the kernel_info section
` [PATCH v11 09/20] x86: Secure Launch kernel early boot stub
` [PATCH v11 10/20] x86: Secure Launch kernel late "
` [PATCH v11 11/20] x86: Secure Launch SMP bringup support
` [PATCH v11 12/20] kexec: Secure Launch kexec SEXIT support
` [PATCH v11 13/20] x86/reboot: Secure Launch SEXIT support on reboot paths
` [PATCH v11 14/20] tpm: Protect against locality counter underflow
` [PATCH v11 15/20] tpm: Ensure tpm is in known state at startup
` [PATCH v11 16/20] tpm: Make locality requests return consistent values
` [PATCH v11 17/20] tpm: Add ability to set the default locality the TPM chip uses
` [PATCH v11 18/20] tpm: Add sysfs interface to allow setting and querying the default locality
` [PATCH v11 19/20] x86: Secure Launch late initcall platform module
` [PATCH v11 20/20] x86/efi: EFI stub DRTM launch support for Secure Launch
CFP for the containers and checkpoint-restore micro-conference at LPC 2024 mailing/containers
2024-09-13 10:39 UTC
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).