linux-integrity.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2024-12-24 04:18:47 to 2025-01-29 16:21:28 UTC [more...]

TPM operation times out (very rarely)
 2025-01-29 16:20 UTC  (3+ messages)

[PATCH v6 0/7] ima: kexec: measure events between kexec load and excute
 2025-01-28 18:35 UTC  (14+ messages)
` [PATCH v6 1/7] ima: define and call ima_alloc_kexec_file_buf
` [PATCH v6 2/7] kexec: define functions to map and unmap segments
` [PATCH v6 3/7] ima: kexec: skip IMA segment validation after kexec soft reboot
` [PATCH v6 4/7] ima: kexec: define functions to copy IMA log at soft boot
` [PATCH v6 5/7] ima: kexec: move IMA log copy from kexec load to execute
` [PATCH v6 6/7] ima: make the kexec extra memory configurable
` [PATCH 7/7] ima: measure kexec load and exec events as critical data

[PATCH v1] selftests: Handle old glibc without execveat(2)
 2025-01-27 19:39 UTC  (5+ messages)

[PATCH v2] selftests: tpm2: create a dedicated .gitignore
 2025-01-27 17:18 UTC  (12+ messages)
` [PATCH v3] "
  ` [PATCH v4] "

[PATCH 00/34] address all -Wunused-const warnings
 2025-01-27 13:24 UTC  (2+ messages)

[PATCH v6 0/7] *** SUBJECT HERE ***
 2025-01-24 22:42 UTC  (8+ messages)
` [PATCH v6 1/7] ima: define and call ima_alloc_kexec_file_buf
` [PATCH v6 2/7] kexec: define functions to map and unmap segments
` [PATCH v6 3/7] ima: kexec: skip IMA segment validation after kexec soft reboot
` [PATCH v6 4/7] ima: kexec: define functions to copy IMA log at soft boot
` [PATCH v6 5/7] ima: kexec: move IMA log copy from kexec load to execute
` [PATCH v6 6/7] ima: make the kexec extra memory configurable
` [PATCH 7/7] ima: measure kexec load and exec events as critical data

[GIT PULL] TPM DEVICE DRIVER: tpmdd-next-6.14-rc1
 2025-01-24 16:05 UTC  (2+ messages)

[PATCH] integrity: fix typos and spelling errors
 2025-01-23 19:37 UTC 

[PATCH v3 00/10] LTP tests: load predefined policy, enhancements
 2025-01-23 17:45 UTC  (19+ messages)
` [PATCH v3 01/10] ima_violations.sh: Fix log detection
` [PATCH v3 02/10] IMA: Add TCB policy as an example for ima_measurements.sh
` [PATCH v3 03/10] IMA: Move requirement check to ima_setup.sh
` [PATCH v3 04/10] IMA: Add example policy for ima_violations.sh
` [PATCH v3 05/10] IMA: Read required policy from file
` [PATCH v3 06/10] ima_violations.sh: Declare tcb builtin policy
` [PATCH v3 07/10] ima_setup.sh: Add digest index detection for ima-buf format
` [PATCH v3 08/10] ima_setup.sh: Allow to load predefined policy
` [PATCH v3 09/10] ima_measurements.sh: Check policy for test3
` [PATCH v3 10/10] tst_test.sh: IMA: Allow to disable LSM warnings and use it for IMA

[PATCH 0/3] Enlightened vTPM support for SVSM on SEV-SNP
 2025-01-23 12:29 UTC  (23+ messages)
` [PATCH 3/3] x86/sev: add a SVSM vTPM platform device

[GIT PULL] KEYS: keys-next-6.13-rc1
 2025-01-23  4:49 UTC  (3+ messages)

[PATCH v3 0/6] ima: Remove unnecessary inode locks
 2025-01-22 17:24 UTC  (7+ messages)
` [PATCH v3 1/6] fs: ima: Remove S_IMA and IS_IMA()
` [PATCH v3 2/6] ima: Remove inode lock
` [PATCH v3 3/6] ima: Detect if lock is held when iint pointer is set in inode security blob
` [PATCH v3 4/6] ima: Mark concurrent accesses to the iint pointer in the "
` [PATCH v3 5/6] ima: Defer fixing security.ima to __fput()
` [PATCH v3 6/6] ima: Reset IMA_NONACTION_RULE_FLAGS after post_setattr

[GIT PULL] integrity: subsystem updates for v6.13
 2025-01-22  4:15 UTC  (3+ messages)
` [GIT PULL] integrity: subsystem updates for v6.13 (please ignore)

[PATCH v6 00/15] integrity: Introduce the Integrity Digest Cache
 2025-01-21 21:42 UTC  (8+ messages)
` [PATCH v6 01/15] lib: Add TLV parser

[PATCH v2 0/6] module: Introduce hash-based integrity checking
 2025-01-21 13:11 UTC  (3+ messages)

[GIT PULL] KEYS: keys-next-6.14-rc1
 2025-01-21  9:43 UTC 

[PATCH v10] tpm: Map the ACPI provided event log
 2025-01-18  8:09 UTC  (7+ messages)

[PATCH v2] ima: kexec: silence RCU list traversal warning
 2025-01-17 23:37 UTC  (3+ messages)

[GIT PULL] integrity: subsystem updates for v6.14
 2025-01-17 23:37 UTC 

[PATCH v2 0/7] ima: Remove unnecessary inode locks
 2025-01-17 17:06 UTC  (16+ messages)
` [PATCH v2 2/7] ima: Remove inode lock
` [PATCH v2 3/7] ima: Ensure lock is held when setting iint pointer in inode security blob
` [PATCH v2 4/7] ima: Mark concurrent accesses to the iint pointer in the "
` [PATCH v2 5/7] ima: Set security.ima on file close when ima_appraise=fix
` [PATCH v2 6/7] ima: Discard files opened with O_PATH
` [PATCH v2 7/7] ima: Reset IMA_NONACTION_RULE_FLAGS after post_setattr

[PATCH v9] tpm: Map the ACPI provided event log
 2025-01-15 22:57 UTC  (3+ messages)

[PATCH v23 0/8] Script execution control (was O_MAYEXEC)
 2025-01-15 15:24 UTC  (4+ messages)
` [PATCH v23 7/8] samples/check-exec: Add an enlighten "inc" interpreter and 28 tests

[PATCH] ima: ignore suffixed policy rule comments
 2025-01-15 10:09 UTC  (6+ messages)
` [PATCH] ima: limit the builtin 'tcb' dont_measure tmpfs policy rule

[PATCH] security: fix typos and spelling errors
 2025-01-15  0:18 UTC  (10+ messages)
  ` [PATCH V2] "

[RFC PATCH] IMA: Remove evm_overlay.sh
 2025-01-14 11:32 UTC 

[PATCH] ima_violations.sh: Fix log detection
 2025-01-14  1:43 UTC 

[PATCH] KEYS: trusted: dcp: fix improper sg use with CONFIG_VMAP_STACK=y
 2025-01-07 19:05 UTC  (4+ messages)

[PATCH v2 0/8] LTP tests: load predefined policy, enhancements
 2025-01-07 18:29 UTC  (20+ messages)
` [PATCH v2 1/8] IMA: Add TCB policy as an example for ima_measurements.sh
` [PATCH v2 2/8] ima_setup.sh: Allow to load predefined policy
` [PATCH v2 6/8] IMA: Add example policy for ima_violations.sh
` [PATCH v2 7/8] ima_violations.sh: Check for a required policy

[PATCH v5] tpm: Map the ACPI provided event log
 2025-01-06 21:20 UTC  (6+ messages)

[PATCH v8] tpm: Map the ACPI provided event log
 2025-01-06 19:39 UTC  (3+ messages)

[RFC PATCH v3 00/13] Clavis LSM
 2025-01-06 17:15 UTC  (20+ messages)
` [RFC PATCH v3 01/13] certs: Remove CONFIG_INTEGRITY_PLATFORM_KEYRING check
` [RFC PATCH v3 03/13] clavis: Introduce a new system keyring called clavis
` [RFC PATCH v3 04/13] keys: Add new verification type (VERIFYING_CLAVIS_SIGNATURE)
` [RFC PATCH v3 08/13] clavis: Introduce new LSM called clavis

[syzbot] [integrity?] [lsm?] INFO: task hung in process_measurement (2)
 2024-12-30  5:48 UTC  (4+ messages)

[PATCH] dt-bindings: tpm: Add st,st33tphf2ei2c
 2024-12-28 10:32 UTC  (7+ messages)

[PATCH v7 1/2] tpm: Map the ACPI provided event log
 2024-12-27 15:15 UTC  (6+ messages)
` [PATCH v7 2/2] "

[PATCH v6 1/2] tpm: Map the ACPI provided event log
 2024-12-26 20:22 UTC  (4+ messages)
` [PATCH v6 2/2] "

Повідомлення від ТОВ Нова Пошта
 2024-12-25 13:47 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).