linux-integrity.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2025-04-09 21:55:11 to 2025-04-18 09:32:45 UTC [more...]

[PATCH v8 0/5] Add Loongson Security Engine chip driver
 2025-04-18  9:34 UTC  (3+ messages)
` [PATCH v8 1/5] crypto: loongson - Add Loongson Security Engine chip controller driver
` [PATCH v8 3/5] MAINTAINERS: Add entry for Loongson crypto driver

[PATCH v12 0/9] ima: kexec: measure events between kexec load and execute
 2025-04-18  9:08 UTC  (18+ messages)
` [PATCH v12 1/9] ima: rename variable the seq_file "file" to "ima_kexec_file"
` [PATCH v12 2/9] ima: define and call ima_alloc_kexec_file_buf()
` [PATCH v12 3/9] kexec: define functions to map and unmap segments
` [PATCH v12 4/9] ima: kexec: skip IMA segment validation after kexec soft reboot
` [PATCH v12 5/9] ima: kexec: define functions to copy IMA log at soft boot
` [PATCH v12 6/9] ima: kexec: move IMA log copy from kexec load to execute
` [PATCH v12 7/9] ima: verify if the segment size has changed
` [PATCH v12 8/9] ima: make the kexec extra memory configurable
` [PATCH v12 9/9] ima: measure kexec load and exec events as critical data

[PATCH RFC v2 0/5] kernel-hacking: introduce CONFIG_NO_AUTO_INLINE
 2025-04-16 19:34 UTC  (8+ messages)
` [PATCH RFC v2 1/5] nvme: add __always_inline for nvme_pci_npages_prp
` [PATCH RFC v2 2/5] mm: add __always_inline for page_contains_unaccepted
` [PATCH RFC v2 3/5] vfio/virtio: add __always_inline for virtiovf_get_device_config_size
` [PATCH RFC v2 4/5] tpm: add __always_inline for tpm_is_hwrng_enabled
` [PATCH RFC v2 5/5] lib/Kconfig.debug: introduce CONFIG_NO_AUTO_INLINE

[RFC PATCH 0/7] kernel-hacking: introduce CONFIG_NO_AUTO_INLINE
 2025-04-16 10:09 UTC  (3+ messages)

[PATCH v5 0/2] tpm_ffa_crb: add support direct message request v2
 2025-04-16  9:08 UTC  (4+ messages)
` [PATCH v5 1/2] tpm_ffa_crb: access tpm service over FF-A "
` [PATCH v5 2/2] tpm_crb_ffa: use dev_xx() macro to print log

[RFC PATCH] ima: add a knob to make IMA be able to be disabled
 2025-04-16  3:22 UTC  (11+ messages)

[RFC PATCH 0/29] Rework the LSM initialization
 2025-04-15 23:04 UTC  (84+ messages)
` [RFC PATCH 01/29] lsm: split the notifier code out into lsm_notifier.c
` [RFC PATCH 02/29] lsm: split the init code out into lsm_init.c
` [RFC PATCH 03/29] lsm: simplify prepare_lsm() and rename to lsm_prep_single()
` [RFC PATCH 04/29] lsm: simplify ordered_lsm_init() and rename to lsm_init_ordered()
` [RFC PATCH 05/29] lsm: replace the name field with a pointer to the lsm_id struct
` [RFC PATCH 06/29] lsm: cleanup and normalize the LSM order symbols naming
` [RFC PATCH 07/29] lsm: rework lsm_active_cnt and lsm_idlist[]
` [RFC PATCH 08/29] lsm: get rid of the lsm_names list and do some cleanup
` [RFC PATCH 09/29] lsm: cleanup and normalize the LSM enabled functions
` [RFC PATCH 10/29] lsm: cleanup the LSM blob size code
` [RFC PATCH 11/29] lsm: cleanup initialize_lsm() and rename to lsm_init_single()
` [RFC PATCH 17/29] lsm: introduce an initcall mechanism into the LSM framework
` [RFC PATCH 18/29] loadpin: move initcalls to "
` [RFC PATCH 19/29] ipe: "
` [RFC PATCH 20/29] smack: "
` [RFC PATCH 21/29] tomoyo: "
` [RFC PATCH 22/29] safesetid: "
` [RFC PATCH 23/29] apparmor: "
` [RFC PATCH 24/29] lockdown: "
` [RFC PATCH 26/29] selinux: "
` [RFC PATCH 27/29] lsm: consolidate all of the LSM framework initcalls
` [RFC PATCH 28/29] lsm: add a LSM_STARTED_ALL notification event

[PATCH v13 00/19] x86: Trenchboot secure dynamic launch Linux kernel support
 2025-04-15 22:16 UTC  (34+ messages)
` [PATCH v13 01/19] Documentation/x86: Secure Launch kernel documentation
` [PATCH v13 02/19] x86: Secure Launch Kconfig
` [PATCH v13 03/19] x86: Secure Launch Resource Table header file
` [PATCH v13 04/19] x86: Secure Launch main "
` [PATCH v13 05/19] x86: Add early SHA-1 support for Secure Launch early measurements
` [PATCH v13 06/19] x86: Add early SHA-256 "
` [PATCH v13 07/19] x86/msr: Add variable MTRR base/mask and x2apic ID registers
` [PATCH v13 08/19] x86/boot: Place TXT MLE header in the kernel_info section
` [PATCH v13 09/19] x86: Secure Launch kernel early boot stub
` [PATCH v13 10/19] x86: Secure Launch kernel late "
` [PATCH v13 11/19] x86: Secure Launch SMP bringup support
` [PATCH v13 12/19] kexec: Secure Launch kexec SEXIT support
` [PATCH v13 13/19] x86/reboot: Secure Launch SEXIT support on reboot paths
` [PATCH v13 14/19] tpm, tpm_tis: Close all localities
` [PATCH v13 15/19] tpm, tpm_tis: Address positive localities in tpm_tis_request_locality()
` [PATCH v13 16/19] tpm, tpm_tis: Allow locality to be set to a different value
` [PATCH v13 17/19] tpm, sysfs: Show locality used by kernel
` [PATCH v13 18/19] x86: Secure Launch late initcall platform module
` [PATCH v13 19/19] x86/efi: EFI stub DRTM launch support for Secure Launch

[PATCH v4 0/2] tpm_ffa_crb: add support direct message request v2
 2025-04-15 18:42 UTC  (5+ messages)
` [PATCH v4 1/2] tpm_ffa_crb: access tpm service over FF-A "
` [PATCH v4 2/2] tpm_crb_ffa: use dev_xx() macro to print log

[PATCH v3] tpm_ffa_crb: access tpm service over FF-A direct message request v2
 2025-04-15  7:32 UTC  (3+ messages)

[RFC PATCH 0/7] kernel-hacking: introduce CONFIG_NO_AUTO_INLINE
 2025-04-15  2:28 UTC  (4+ messages)
  ` [RFC PATCH 6/7] tpm: add __always_inline for tpm_is_hwrng_enabled

[PATCH] tpm_crb: ffa_tpm: return errors from interface functions if no ffa-crb driver
 2025-04-14 15:18 UTC  (2+ messages)

[PATCH v3 0/4] tpm: add support for sync send() and use it in ftpm and svsm drivers
 2025-04-14 14:59 UTC  (6+ messages)
` [PATCH v3 1/4] tpm: add buf_size parameter in the .send callback
` [PATCH v3 2/4] tpm: support devices with synchronous send()
` [PATCH v3 3/4] tpm/tpm_ftpm_tee: support TPM_CHIP_FLAG_SYNC
` [PATCH v3 4/4] tpm/tpm_svsm: "

[PATCH AUTOSEL 5.4 9/9] tpm: End any active auth session before shutdown
 2025-04-14  0:11 UTC  (3+ messages)

[PATCH v8] KEYS: Add a list for unreferenced keys
 2025-04-12 12:37 UTC  (8+ messages)

[PATCH v2] tpm_ffa_crb: access tpm service over FF-A direct message request v2
 2025-04-12  5:42 UTC  (10+ messages)

Credentials not fully initialized before bprm_check LSM hook
 2025-04-11 22:14 UTC  (4+ messages)

[PATCH] tpm_ffa_crb: access tpm service over FF-A direct message request v2
 2025-04-11  9:03 UTC  (3+ messages)

[PATCH v2] char: tpm: tpm-buf: Add sanity check fallback in read helpers
 2025-04-11  9:01 UTC  (5+ messages)

[PATCH v11 0/9] ima: kexec: measure events between kexec load and execute
 2025-04-10 19:47 UTC  (19+ messages)
` [PATCH v11 3/9] kexec: define functions to map and unmap segments
` [PATCH v11 4/9] ima: kexec: skip IMA segment validation after kexec soft reboot
` [PATCH v11 5/9] ima: kexec: define functions to copy IMA log at soft boot
` [PATCH v11 6/9] ima: kexec: move IMA log copy from kexec load to execute
` [PATCH v11 8/9] ima: make the kexec extra memory configurable

[PATCH v7 0/4] Enlightened vTPM support for SVSM on SEV-SNP
 2025-04-10 13:51 UTC  (5+ messages)
` [PATCH v7 1/4] x86/sev: add SVSM vTPM probe/send_command functions
` [PATCH v7 2/4] svsm: add header with SVSM_VTPM_CMD helpers
` [PATCH v7 3/4] tpm: add SNP SVSM vTPM driver
` [PATCH v7 4/4] x86/sev: register tpm-svsm platform device

[PATCH] char: tpm: tpm-buf: Fix uninitialized return values in read helpers
 2025-04-10  9:46 UTC  (9+ messages)

[PATCH v6 4/4] x86/sev: register tpm-svsm platform device
 2025-04-10  8:15 UTC  (11+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).