linux-integrity.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2024-12-04 19:25:39 to 2024-12-27 08:44:06 UTC [more...]

[PATCH v7 1/2] tpm: Map the ACPI provided event log
 2024-12-27  8:43 UTC  (3+ messages)
` [PATCH v7 2/2] "

[PATCH] dt-bindings: tpm: Add st,st33tphf2ei2c
 2024-12-27  7:00 UTC  (5+ messages)

[PATCH v6 1/2] tpm: Map the ACPI provided event log
 2024-12-26 20:22 UTC  (4+ messages)
` [PATCH v6 2/2] "

[PATCH v5] tpm: Map the ACPI provided event log
 2024-12-25 15:31 UTC  (4+ messages)

Повідомлення від ТОВ Нова Пошта
 2024-12-25 13:47 UTC 

[RFC PATCH v3 00/13] Clavis LSM
 2024-12-24 17:43 UTC  (14+ messages)
` [RFC PATCH v3 01/13] certs: Remove CONFIG_INTEGRITY_PLATFORM_KEYRING check
` [RFC PATCH v3 02/13] certs: Introduce ability to link to a system key
` [RFC PATCH v3 03/13] clavis: Introduce a new system keyring called clavis
` [RFC PATCH v3 04/13] keys: Add new verification type (VERIFYING_CLAVIS_SIGNATURE)
` [RFC PATCH v3 08/13] clavis: Introduce new LSM called clavis
` [RFC PATCH v3 13/13] clavis: Kunit support

[PATCH v4] tpm: Map the ACPI provided event log
 2024-12-24  3:54 UTC 

[PATCH v3] tpm: Map the ACPI provided event log
 2024-12-23 18:42 UTC  (2+ messages)

[PATCH] tpm: Map the ACPI provided event log
 2024-12-22 22:17 UTC  (10+ messages)

[PATCH v2] tpm: Map the ACPI provided event log
 2024-12-21 12:44 UTC 

[PATCH] tpm/eventlog: Limit memory allocations for event logs with excessive size
 2024-12-20 10:15 UTC  (7+ messages)

[PATCH v12 00/19] x86: Trenchboot secure dynamic launch Linux kernel support
 2024-12-19 19:42 UTC  (20+ messages)
` [PATCH v12 01/19] Documentation/x86: Secure Launch kernel documentation
` [PATCH v12 02/19] x86: Secure Launch Kconfig
` [PATCH v12 03/19] x86: Secure Launch Resource Table header file
` [PATCH v12 04/19] x86: Secure Launch main "
` [PATCH v12 05/19] x86: Add early SHA-1 support for Secure Launch early measurements
` [PATCH v12 06/19] x86: Add early SHA-256 "
` [PATCH v12 07/19] x86/msr: Add variable MTRR base/mask and x2apic ID registers
` [PATCH v12 08/19] x86/boot: Place TXT MLE header in the kernel_info section
` [PATCH v12 09/19] x86: Secure Launch kernel early boot stub
` [PATCH v12 10/19] x86: Secure Launch kernel late "
` [PATCH v12 11/19] x86: Secure Launch SMP bringup support
` [PATCH v12 12/19] kexec: Secure Launch kexec SEXIT support
` [PATCH v12 13/19] x86/reboot: Secure Launch SEXIT support on reboot paths
` [PATCH v12 14/19] tpm, tpm_tis: Close all localities
` [PATCH v12 15/19] tpm, tpm_tis: Address positive localities in tpm_tis_request_locality()
` [PATCH v12 16/19] tpm, tpm_tis: Allow locality to be set to a different value
` [PATCH v12 17/19] tpm, sysfs: Show locality used by kernel
` [PATCH v12 18/19] x86: Secure Launch late initcall platform module
` [PATCH v12 19/19] x86/efi: EFI stub DRTM launch support for Secure Launch

[RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
 2024-12-19 18:18 UTC  (18+ messages)
` [RFC 1/2] ima: Add kernel parameter to disable IMA
` [RFC 2/2] evm: Add kernel parameter to disable EVM

[PATCH 0/3] Enlightened vTPM support for SVSM on SEV-SNP
 2024-12-19 16:06 UTC  (24+ messages)
` [PATCH 1/3] tpm: add generic platform device
` [PATCH 2/3] x86/sev: add SVSM call macros for the vTPM protocol
` [PATCH 3/3] x86/sev: add a SVSM vTPM platform device

[PATCH v23 0/8] Script execution control (was O_MAYEXEC)
 2024-12-19  7:44 UTC  (12+ messages)
` [PATCH v23 1/8] exec: Add a new AT_EXECVE_CHECK flag to execveat(2)
` [PATCH v23 2/8] security: Add EXEC_RESTRICT_FILE and EXEC_DENY_INTERACTIVE securebits
` [PATCH v23 3/8] selftests/exec: Add 32 tests for AT_EXECVE_CHECK and exec securebits
` [PATCH v23 4/8] selftests/landlock: Add tests for execveat + AT_EXECVE_CHECK
` [PATCH v23 5/8] samples/check-exec: Add set-exec
` [PATCH v23 6/8] selftests: ktap_helpers: Fix uninitialized variable
` [PATCH v23 7/8] samples/check-exec: Add an enlighten "inc" interpreter and 28 tests
` [PATCH v23 8/8] ima: instantiate the bprm_creds_for_exec() hook

[PATCH] lsm: integrity: Allow enable/disable ima and evm with lsm= cmdline
 2024-12-18  6:43 UTC 

[PATCH v3] doc: correct the build steps for open_posix_testsuite
 2024-12-16 12:45 UTC  (3+ messages)
` [LTP] "

[syzbot] [integrity?] [lsm?] INFO: task hung in process_measurement (2)
 2024-12-16  6:31 UTC  (9+ messages)

TPM/EFI issue [Was: Linux 6.12]
 2024-12-14  3:54 UTC  (9+ messages)

[PATCH v9 00/19] x86: Trenchboot secure dynamic launch Linux kernel support
 2024-12-14  2:56 UTC  (19+ messages)
` [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements

[PATCH v2 0/8] LTP tests: load predefined policy, enhancements
 2024-12-13 22:20 UTC  (9+ messages)
` [PATCH v2 1/8] IMA: Add TCB policy as an example for ima_measurements.sh
` [PATCH v2 2/8] ima_setup.sh: Allow to load predefined policy
` [PATCH v2 3/8] tst_test.sh: IMA: Allow to disable LSM warnings and use it for IMA
` [PATCH v2 4/8] ima_setup: Print warning when policy not readable
` [PATCH v2 5/8] ima_kexec.sh: Move checking policy if readable to ima_setup.sh
` [PATCH v2 6/8] IMA: Add example policy for ima_violations.sh
` [PATCH v2 7/8] ima_violations.sh: Check for a required policy
` [PATCH v2 8/8] [RFC] ima_kexec.sh: Relax result on unreadable policy to TCONF

I urge you to understand my viewpoint accurately
 2024-12-13  4:25 UTC 

[PATCH 0/3] LTP tests: load predefined policy
 2024-12-12 15:11 UTC  (12+ messages)
` [PATCH 1/3] ima: Add TCB policy as an example
` [PATCH 2/3] ima_setup.sh: Allow to load predefined policy
` [PATCH 3/3] ima_{kexec,keys,selinux}: Set minimal kernel version

[syzbot] [integrity?] [lsm?] KMSAN: uninit-value in ima_add_template_entry (2)
 2024-12-12 11:21 UTC  (4+ messages)
    ` [syzbot] [lsm?] [integrity?] "

[syzbot] Monthly integrity report (Dec 2024)
 2024-12-11  8:54 UTC  (2+ messages)

[PATCH v22 0/8] Script execution control (was O_MAYEXEC)
 2024-12-11  6:12 UTC  (15+ messages)
` [PATCH v22 1/8] exec: Add a new AT_EXECVE_CHECK flag to execveat(2)
` [PATCH v22 2/8] security: Add EXEC_RESTRICT_FILE and EXEC_DENY_INTERACTIVE securebits
` [PATCH v22 3/8] selftests/exec: Add 32 tests for AT_EXECVE_CHECK and exec securebits
` [PATCH v22 4/8] selftests/landlock: Add tests for execveat + AT_EXECVE_CHECK
` [PATCH v22 5/8] samples/check-exec: Add set-exec
` [PATCH v22 6/8] selftests: ktap_helpers: Fix uninitialized variable
` [PATCH v22 7/8] samples/check-exec: Add an enlighten "inc" interpreter and 28 tests
` [PATCH v22 8/8] ima: instantiate the bprm_creds_for_exec() hook

[PATCH] doc: correct the build steps for open_posix_testsuite
 2024-12-11  1:17 UTC  (6+ messages)
` [LTP] "

[PATCH v2] ima: instantiate the bprm_creds_for_exec() hook
 2024-12-10 16:47 UTC  (6+ messages)

[REGRESSION][BISECTED] tpm: Popping noise in USB headphones since 1b6d7f9eb150
 2024-12-09 12:58 UTC  (6+ messages)

[PATCH v3 1/5] LSM: Ensure the correct LSM context releaser
 2024-12-06 20:57 UTC  (3+ messages)

[PATCH v6 00/15] integrity: Introduce the Integrity Digest Cache
 2024-12-06 15:26 UTC  (12+ messages)

[PATCH v2] ima: instantiate the bprm_creds_for_exec() hook
 2024-12-05 15:44 UTC  (4+ messages)

QEMU launch failure with TPM passthrough
 2024-12-05 10:19 UTC  (3+ messages)

[PATCH v21 0/6] Script execution control (was O_MAYEXEC)
 2024-12-05  3:33 UTC  (7+ messages)
` [PATCH v21 1/6] exec: Add a new AT_EXECVE_CHECK flag to execveat(2)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).