messages from 2024-10-28 12:39:30 to 2024-11-14 21:48:38 UTC [more...]
[PATCH 1/2] ima_boot_aggregate: Fix openssl 3.0 deprecation warnings
2024-11-14 21:48 UTC (3+ messages)
` [PATCH 2/2] ima_boot_aggregate: TBROK on fread() failure
regression: kernel log "flooded" with tpm tpm0: A TPM error (2306) occurred attempting to create NULL primary
2024-11-14 4:57 UTC (14+ messages)
[GIT PULL] TPM DEVICE DRIVER: tpmdd-next-6.12-rc8
2024-11-13 21:36 UTC (2+ messages)
[PATCH] KEYS: trusted: dcp: fix improper sg use with CONFIG_VMAP_STACK=y
2024-11-13 21:27 UTC
[PATCH] tpm: Disable TPM on tpm2_create_primary() failure
2024-11-13 18:44 UTC
[PATCH v3] tpm: Opt-in in disable PCR integrity protection
2024-11-13 12:42 UTC (4+ messages)
[PATCH v2] ima: Suspend PCR extends and log appends when rebooting
2024-11-13 12:33 UTC (5+ messages)
[PATCH] tpm/eventlog: Use kvmalloc() for event log buffer
2024-11-13 3:00 UTC (16+ messages)
[GIT PULL] integrity: subsystem fixes for v6.12
2024-11-12 21:38 UTC (2+ messages)
[PATCH v2] tpm: Opt-in in disable PCR integrity protection
2024-11-12 20:00 UTC (14+ messages)
[PATCH v21 0/6] Script execution control (was O_MAYEXEC)
2024-11-12 19:18 UTC (7+ messages)
` [PATCH v21 1/6] exec: Add a new AT_EXECVE_CHECK flag to execveat(2)
` [PATCH v21 2/6] security: Add EXEC_RESTRICT_FILE and EXEC_DENY_INTERACTIVE securebits
` [PATCH v21 3/6] selftests/exec: Add 32 tests for AT_EXECVE_CHECK and exec securebits
` [PATCH v21 4/6] selftests/landlock: Add tests for execveat + AT_EXECVE_CHECK
` [PATCH v21 5/6] samples/check-exec: Add set-exec
` [PATCH v21 6/6] samples/check-exec: Add an enlighten "inc" interpreter and 28 tests
[PATCH] ima: Suspend PCR extends and log appends when rebooting
2024-11-11 19:12 UTC (4+ messages)
Reading public key portion of asymmetric keys
2024-11-08 20:12 UTC
[PATCH] tpm: Remove the documentation from tpm2-sessions.c
2024-11-07 13:50 UTC (2+ messages)
[RFC PATCH] tpm: Allow the TPM2 pcr_extend HMAC capability to be disabled on boot
2024-11-07 6:32 UTC (12+ messages)
[PATCH] tpm: Opt-in in disable PCR encryption on TPM2 chips
2024-11-07 6:27 UTC (6+ messages)
[GIT PULL] KEYS: keys-next-6.12-rc7
2024-11-06 19:38 UTC (3+ messages)
[PATCH] tpm: atmel: Drop PPC64 specific MMIO setup
2024-11-06 18:38 UTC (10+ messages)
[syzbot] Monthly integrity report (Nov 2024)
2024-11-06 8:33 UTC
[RFC PATCH 0/4] Alternative TPM patches for Trenchboot
2024-11-05 18:21 UTC (25+ messages)
` [RFC PATCH 1/4] tpm, tpm_tis: Close all localities
` [RFC PATCH 2/4] tpm, tpm_tis: Address positive localities in tpm_tis_request_locality()
` [RFC PATCH 3/4] tpm, tpm_tis: allow to set locality to a different value
` [RFC PATCH 4/4] tpm: sysfs: Show locality used by kernel
[GIT PULL] TPM DEVICE DRIVER: tpmdd-next-6.12-rc7
2024-11-04 18:10 UTC (2+ messages)
[PATCH] ima: kexec: Add RCU read lock protection for ima_measurements list traversal
2024-11-04 10:47 UTC
[PATCH v9 00/19] x86: Trenchboot secure dynamic launch Linux kernel support
2024-11-02 16:04 UTC (14+ messages)
` [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
[syzbot] [integrity?] [lsm?] [erofs?] INFO: task hung in ima_file_free (4)
2024-11-02 15:21 UTC
[PATCH v11 00/20] x86: Trenchboot secure dynamic launch Linux kernel support
2024-11-02 14:26 UTC (44+ messages)
` [PATCH v11 01/20] Documentation/x86: Secure Launch kernel documentation
` [PATCH v11 14/20] tpm: Protect against locality counter underflow
` [PATCH v11 15/20] tpm: Ensure tpm is in known state at startup
` [PATCH v11 16/20] tpm: Make locality requests return consistent values
` [PATCH v11 17/20] tpm: Add ability to set the default locality the TPM chip uses
` [RFC PATCH] tpm, tpm_tis: Introduce TPM_IOC_SET_LOCALITY
` [RFC PATCH v2 1/2] "
` [RFC PATCH v2 2/2] tpm: show the default locality in sysfs
` [PATCH v11 18/20] tpm: Add sysfs interface to allow setting and querying the default locality
[PATCH v3] tpm: Lock TPM chip in tpm_pm_suspend() first
2024-11-01 21:24 UTC (7+ messages)
[PATCH v3 1/5] LSM: Ensure the correct LSM context releaser
2024-10-31 22:53 UTC (2+ messages)
[PATCH] tpm: set TPM_CHIP_FLAG_SUSPENDED early
2024-10-31 16:02 UTC (7+ messages)
[PATCH v6] tpm: Add new device/vendor ID 0x50666666
2024-10-31 15:05 UTC (5+ messages)
[PATCH v2] tpm: Lock TPM chip in tpm_pm_suspend() first
2024-10-31 0:45 UTC
[PATCH v8 0/3] Lazy flush for the auth session
2024-10-30 23:50 UTC (15+ messages)
` [PATCH v8 1/3] tpm: Return tpm2_sessions_init() when null key creation fails
` [PATCH v8 2/3] tpm: Rollback tpm2_load_null()
` [PATCH v8 3/3] tpm: Lazily flush the auth session
[GIT PULL] TPM DEVICE DRIVER: tpmdd-next-6.12-rc6
2024-10-30 2:44 UTC (2+ messages)
Trusted keys: DCP: Unable to handle paging request
2024-10-29 22:38 UTC (4+ messages)
` [PATCH] KEYS: trusted: dcp: fix NULL dereference in AEAD crypto operation
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).