messages from 2024-12-12 17:42:47 to 2025-01-15 21:22:48 UTC [more...]
[PATCH v9] tpm: Map the ACPI provided event log
2025-01-15 21:22 UTC
[PATCH v23 0/8] Script execution control (was O_MAYEXEC)
2025-01-15 15:24 UTC (13+ messages)
` [PATCH v23 2/8] security: Add EXEC_RESTRICT_FILE and EXEC_DENY_INTERACTIVE securebits
` [PATCH v23 3/8] selftests/exec: Add 32 tests for AT_EXECVE_CHECK and exec securebits
` [PATCH v23 4/8] selftests/landlock: Add tests for execveat + AT_EXECVE_CHECK
` [PATCH v23 5/8] samples/check-exec: Add set-exec
` [PATCH v23 6/8] selftests: ktap_helpers: Fix uninitialized variable
` [PATCH v23 7/8] samples/check-exec: Add an enlighten "inc" interpreter and 28 tests
` [PATCH v23 8/8] ima: instantiate the bprm_creds_for_exec() hook
[PATCH v1] selftests: Handle old glibc without execveat(2)
2025-01-15 14:47 UTC
[PATCH v2 0/7] ima: Remove unnecessary inode locks
2025-01-15 13:46 UTC (11+ messages)
` [PATCH v2 2/7] ima: Remove inode lock
` [PATCH v2 3/7] ima: Ensure lock is held when setting iint pointer in inode security blob
` [PATCH v2 4/7] ima: Mark concurrent accesses to the iint pointer in the "
` [PATCH v2 5/7] ima: Set security.ima on file close when ima_appraise=fix
[PATCH] ima: ignore suffixed policy rule comments
2025-01-15 10:09 UTC (6+ messages)
` [PATCH] ima: limit the builtin 'tcb' dont_measure tmpfs policy rule
[PATCH] security: fix typos and spelling errors
2025-01-15 0:18 UTC (10+ messages)
` [PATCH V2] "
[PATCH 0/3] Enlightened vTPM support for SVSM on SEV-SNP
2025-01-14 23:12 UTC (20+ messages)
` [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
[RFC PATCH] IMA: Remove evm_overlay.sh
2025-01-14 11:32 UTC
[PATCH v3 00/10] LTP tests: load predefined policy, enhancements
2025-01-14 11:29 UTC (11+ messages)
` [PATCH v3 01/10] ima_violations.sh: Fix log detection
` [PATCH v3 02/10] IMA: Add TCB policy as an example for ima_measurements.sh
` [PATCH v3 03/10] IMA: Move requirement check to ima_setup.sh
` [PATCH v3 04/10] IMA: Add example policy for ima_violations.sh
` [PATCH v3 05/10] IMA: Read required policy from file
` [PATCH v3 06/10] ima_violations.sh: Declare tcb builtin policy
` [PATCH v3 07/10] ima_setup.sh: Add digest index detection for ima-buf format
` [PATCH v3 08/10] ima_setup.sh: Allow to load predefined policy
` [PATCH v3 09/10] ima_measurements.sh: Check policy for test3
` [PATCH v3 10/10] tst_test.sh: IMA: Allow to disable LSM warnings and use it for IMA
[PATCH] ima_violations.sh: Fix log detection
2025-01-14 1:43 UTC
[PATCH] KEYS: trusted: dcp: fix improper sg use with CONFIG_VMAP_STACK=y
2025-01-07 19:05 UTC (4+ messages)
[PATCH v2 0/8] LTP tests: load predefined policy, enhancements
2025-01-07 18:29 UTC (24+ messages)
` [PATCH v2 1/8] IMA: Add TCB policy as an example for ima_measurements.sh
` [PATCH v2 2/8] ima_setup.sh: Allow to load predefined policy
` [PATCH v2 3/8] tst_test.sh: IMA: Allow to disable LSM warnings and use it for IMA
` [PATCH v2 4/8] ima_setup: Print warning when policy not readable
` [PATCH v2 5/8] ima_kexec.sh: Move checking policy if readable to ima_setup.sh
` [PATCH v2 6/8] IMA: Add example policy for ima_violations.sh
` [PATCH v2 7/8] ima_violations.sh: Check for a required policy
` [PATCH v2 8/8] [RFC] ima_kexec.sh: Relax result on unreadable policy to TCONF
[PATCH v5] tpm: Map the ACPI provided event log
2025-01-06 21:20 UTC (6+ messages)
[PATCH v8] tpm: Map the ACPI provided event log
2025-01-06 19:39 UTC (3+ messages)
[RFC PATCH v3 00/13] Clavis LSM
2025-01-06 17:15 UTC (24+ messages)
` [RFC PATCH v3 01/13] certs: Remove CONFIG_INTEGRITY_PLATFORM_KEYRING check
` [RFC PATCH v3 02/13] certs: Introduce ability to link to a system key
` [RFC PATCH v3 03/13] clavis: Introduce a new system keyring called clavis
` [RFC PATCH v3 04/13] keys: Add new verification type (VERIFYING_CLAVIS_SIGNATURE)
` [RFC PATCH v3 08/13] clavis: Introduce new LSM called clavis
` [RFC PATCH v3 13/13] clavis: Kunit support
[syzbot] [integrity?] [lsm?] INFO: task hung in process_measurement (2)
2024-12-30 5:48 UTC (6+ messages)
[PATCH] dt-bindings: tpm: Add st,st33tphf2ei2c
2024-12-28 10:32 UTC (7+ messages)
[PATCH v7 1/2] tpm: Map the ACPI provided event log
2024-12-27 15:15 UTC (6+ messages)
` [PATCH v7 2/2] "
[PATCH v6 1/2] tpm: Map the ACPI provided event log
2024-12-26 20:22 UTC (4+ messages)
` [PATCH v6 2/2] "
Повідомлення від ТОВ Нова Пошта
2024-12-25 13:47 UTC
[PATCH v4] tpm: Map the ACPI provided event log
2024-12-24 3:54 UTC
[PATCH v3] tpm: Map the ACPI provided event log
2024-12-23 18:42 UTC (2+ messages)
[PATCH] tpm: Map the ACPI provided event log
2024-12-22 22:17 UTC (10+ messages)
[PATCH v2] tpm: Map the ACPI provided event log
2024-12-21 12:44 UTC
[PATCH] tpm/eventlog: Limit memory allocations for event logs with excessive size
2024-12-20 10:15 UTC (7+ messages)
[PATCH v12 00/19] x86: Trenchboot secure dynamic launch Linux kernel support
2024-12-19 19:42 UTC (20+ messages)
` [PATCH v12 01/19] Documentation/x86: Secure Launch kernel documentation
` [PATCH v12 02/19] x86: Secure Launch Kconfig
` [PATCH v12 03/19] x86: Secure Launch Resource Table header file
` [PATCH v12 04/19] x86: Secure Launch main "
` [PATCH v12 05/19] x86: Add early SHA-1 support for Secure Launch early measurements
` [PATCH v12 06/19] x86: Add early SHA-256 "
` [PATCH v12 07/19] x86/msr: Add variable MTRR base/mask and x2apic ID registers
` [PATCH v12 08/19] x86/boot: Place TXT MLE header in the kernel_info section
` [PATCH v12 09/19] x86: Secure Launch kernel early boot stub
` [PATCH v12 10/19] x86: Secure Launch kernel late "
` [PATCH v12 11/19] x86: Secure Launch SMP bringup support
` [PATCH v12 12/19] kexec: Secure Launch kexec SEXIT support
` [PATCH v12 13/19] x86/reboot: Secure Launch SEXIT support on reboot paths
` [PATCH v12 14/19] tpm, tpm_tis: Close all localities
` [PATCH v12 15/19] tpm, tpm_tis: Address positive localities in tpm_tis_request_locality()
` [PATCH v12 16/19] tpm, tpm_tis: Allow locality to be set to a different value
` [PATCH v12 17/19] tpm, sysfs: Show locality used by kernel
` [PATCH v12 18/19] x86: Secure Launch late initcall platform module
` [PATCH v12 19/19] x86/efi: EFI stub DRTM launch support for Secure Launch
[RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
2024-12-19 18:18 UTC (18+ messages)
` [RFC 1/2] ima: Add kernel parameter to disable IMA
` [RFC 2/2] evm: Add kernel parameter to disable EVM
[PATCH] lsm: integrity: Allow enable/disable ima and evm with lsm= cmdline
2024-12-18 6:43 UTC
[PATCH v3] doc: correct the build steps for open_posix_testsuite
2024-12-16 12:45 UTC (2+ messages)
TPM/EFI issue [Was: Linux 6.12]
2024-12-14 3:54 UTC (8+ messages)
[PATCH v9 00/19] x86: Trenchboot secure dynamic launch Linux kernel support
2024-12-14 2:56 UTC (19+ messages)
` [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
I urge you to understand my viewpoint accurately
2024-12-13 4:25 UTC
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).