public inbox for linux-integrity@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2024-10-31 00:45:08 to 2024-11-19 10:52:24 UTC [more...]

[PATCH v6 00/15] integrity: Introduce the Integrity Digest Cache
 2024-11-19 10:49 UTC  (8+ messages)
` [PATCH v6 02/15] module: Introduce ksys_finit_module()
` [PATCH v6 03/15] integrity: Introduce the Integrity Digest Cache
` [PATCH v6 04/15] digest_cache: Initialize digest caches
` [PATCH v6 05/15] digest_cache: Add securityfs interface
` [PATCH v6 06/15] digest_cache: Add hash tables and operations
` [PATCH v6 07/15] digest_cache: Allow registration of digest list parsers
` [PATCH v6 08/15] digest_cache: Parse tlv digest lists

[PATCH] doc: correct the build steps for open_posix_testsuite
 2024-11-19 10:13 UTC 

[PATCH v3] ima: Suspend PCR extends and log appends when rebooting
 2024-11-19  0:56 UTC  (2+ messages)

[PATCH v9 00/19] x86: Trenchboot secure dynamic launch Linux kernel support
 2024-11-18 20:02 UTC  (19+ messages)
` [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements

[PATCH 1/2] ima_boot_aggregate: Fix openssl 3.0 deprecation warnings
 2024-11-15  5:10 UTC  (4+ messages)
` [PATCH 2/2] ima_boot_aggregate: TBROK on fread() failure

regression: kernel log "flooded" with tpm tpm0: A TPM error (2306) occurred attempting to create NULL primary
 2024-11-14 23:57 UTC  (15+ messages)

[GIT PULL] TPM DEVICE DRIVER: tpmdd-next-6.12-rc8
 2024-11-13 21:36 UTC  (2+ messages)

[PATCH] KEYS: trusted: dcp: fix improper sg use with CONFIG_VMAP_STACK=y
 2024-11-13 21:27 UTC 

[PATCH] tpm: Disable TPM on tpm2_create_primary() failure
 2024-11-13 18:44 UTC 

[PATCH v3] tpm: Opt-in in disable PCR integrity protection
 2024-11-13 12:42 UTC  (4+ messages)

[PATCH v2] ima: Suspend PCR extends and log appends when rebooting
 2024-11-13 12:33 UTC  (5+ messages)

[PATCH] tpm/eventlog: Use kvmalloc() for event log buffer
 2024-11-13  3:00 UTC  (16+ messages)

[GIT PULL] integrity: subsystem fixes for v6.12
 2024-11-12 21:38 UTC  (2+ messages)

[PATCH v2] tpm: Opt-in in disable PCR integrity protection
 2024-11-12 20:00 UTC  (14+ messages)

[PATCH v21 0/6] Script execution control (was O_MAYEXEC)
 2024-11-12 19:18 UTC  (7+ messages)
` [PATCH v21 1/6] exec: Add a new AT_EXECVE_CHECK flag to execveat(2)
` [PATCH v21 2/6] security: Add EXEC_RESTRICT_FILE and EXEC_DENY_INTERACTIVE securebits
` [PATCH v21 3/6] selftests/exec: Add 32 tests for AT_EXECVE_CHECK and exec securebits
` [PATCH v21 4/6] selftests/landlock: Add tests for execveat + AT_EXECVE_CHECK
` [PATCH v21 5/6] samples/check-exec: Add set-exec
` [PATCH v21 6/6] samples/check-exec: Add an enlighten "inc" interpreter and 28 tests

[PATCH] ima: Suspend PCR extends and log appends when rebooting
 2024-11-11 19:12 UTC  (4+ messages)

Reading public key portion of asymmetric keys
 2024-11-08 20:12 UTC 

[PATCH] tpm: Remove the documentation from tpm2-sessions.c
 2024-11-07 13:50 UTC  (2+ messages)

[RFC PATCH] tpm: Allow the TPM2 pcr_extend HMAC capability to be disabled on boot
 2024-11-07  6:32 UTC  (12+ messages)

[PATCH] tpm: Opt-in in disable PCR encryption on TPM2 chips
 2024-11-07  6:27 UTC  (6+ messages)

[GIT PULL] KEYS: keys-next-6.12-rc7
 2024-11-06 19:38 UTC  (3+ messages)

[PATCH] tpm: atmel: Drop PPC64 specific MMIO setup
 2024-11-06 18:38 UTC  (10+ messages)

[syzbot] Monthly integrity report (Nov 2024)
 2024-11-06  8:33 UTC 

[RFC PATCH 0/4] Alternative TPM patches for Trenchboot
 2024-11-05 18:21 UTC  (25+ messages)
` [RFC PATCH 1/4] tpm, tpm_tis: Close all localities
` [RFC PATCH 2/4] tpm, tpm_tis: Address positive localities in tpm_tis_request_locality()
` [RFC PATCH 3/4] tpm, tpm_tis: allow to set locality to a different value
` [RFC PATCH 4/4] tpm: sysfs: Show locality used by kernel

[GIT PULL] TPM DEVICE DRIVER: tpmdd-next-6.12-rc7
 2024-11-04 18:10 UTC  (2+ messages)

[PATCH] ima: kexec: Add RCU read lock protection for ima_measurements list traversal
 2024-11-04 10:47 UTC 

[syzbot] [integrity?] [lsm?] [erofs?] INFO: task hung in ima_file_free (4)
 2024-11-02 15:21 UTC 

[PATCH v11 00/20] x86: Trenchboot secure dynamic launch Linux kernel support
 2024-11-02 14:26 UTC  (44+ messages)
` [PATCH v11 01/20] Documentation/x86: Secure Launch kernel documentation
` [PATCH v11 14/20] tpm: Protect against locality counter underflow
` [PATCH v11 15/20] tpm: Ensure tpm is in known state at startup
` [PATCH v11 16/20] tpm: Make locality requests return consistent values
` [PATCH v11 17/20] tpm: Add ability to set the default locality the TPM chip uses
  ` [RFC PATCH] tpm, tpm_tis: Introduce TPM_IOC_SET_LOCALITY
      ` [RFC PATCH v2 1/2] "
        ` [RFC PATCH v2 2/2] tpm: show the default locality in sysfs
` [PATCH v11 18/20] tpm: Add sysfs interface to allow setting and querying the default locality

[PATCH v3] tpm: Lock TPM chip in tpm_pm_suspend() first
 2024-11-01 21:24 UTC  (7+ messages)

[PATCH v3 1/5] LSM: Ensure the correct LSM context releaser
 2024-10-31 22:53 UTC  (2+ messages)

[PATCH] tpm: set TPM_CHIP_FLAG_SUSPENDED early
 2024-10-31 16:02 UTC  (7+ messages)

[PATCH v6] tpm: Add new device/vendor ID 0x50666666
 2024-10-31 15:05 UTC  (5+ messages)

[PATCH v2] tpm: Lock TPM chip in tpm_pm_suspend() first
 2024-10-31  0:45 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox