messages from 2025-07-03 13:04:10 to 2025-08-12 18:03:16 UTC [more...]
[PATCH v5 00/23] x86: text_poke() fixes and executable lockdowns
2025-08-12 18:03 UTC (4+ messages)
` [PATCH v5 18/23] bpf: Use vmalloc special flag
[PATCH v2 0/3] KEYS: trusted_tpm1: HMAC fix and cleanup
2025-08-12 16:29 UTC (8+ messages)
` [PATCH v2 1/3] KEYS: trusted_tpm1: Compare HMAC values in constant time
` [PATCH v2 2/3] KEYS: trusted_tpm1: Use SHA-1 library instead of crypto_shash
` [PATCH v2 3/3] KEYS: trusted_tpm1: Move private functionality out of public header
[PATCH] tpm: prevents local DOS via tpm/tpm0/ppi/*operations
2025-08-12 16:03 UTC (6+ messages)
tpm2_protocol
2025-08-12 12:59 UTC
[PATCH v2 0/2] tpm: Clean up HMAC validation and computation
2025-08-09 17:38 UTC (8+ messages)
` [PATCH v2 1/2] tpm: Compare HMAC values in constant time
` [PATCH v2 2/2] tpm: Use HMAC-SHA256 library instead of open-coded HMAC
[PATCH 0/3] KEYS: trusted_tpm1: HMAC fix and cleanup
2025-08-09 17:21 UTC (12+ messages)
` [PATCH 1/3] KEYS: trusted_tpm1: Compare HMAC values in constant time
` [PATCH 2/3] KEYS: trusted_tpm1: Use SHA-1 library instead of crypto_shash
` [PATCH 3/3] KEYS: trusted_tpm1: Move private functionality out of public header
[PATCH] tst_security.sh: Use the same value for checkreqprot
2025-08-08 7:16 UTC (2+ messages)
Questions about CONFIG_TCG_TPM2_HMAC
2025-08-07 20:51 UTC
[PATCH] KEYS: encrypted: Use SHA-256 library instead of crypto_shash
2025-08-05 13:41 UTC (2+ messages)
[PATCH AUTOSEL 6.15 07/34] tpm: Check for completion after timeout
2025-08-03 21:18 UTC (2+ messages)
` [PATCH AUTOSEL 6.15 08/34] tpm: tpm_crb_ffa: try to probe tpm_crb_ffa when it's built-in
[PATCH AUTOSEL 6.16 07/35] tpm: Check for completion after timeout
2025-08-03 21:17 UTC (2+ messages)
` [PATCH AUTOSEL 6.16 08/35] tpm: tpm_crb_ffa: try to probe tpm_crb_ffa when it's built-in
[PATCH 0/2] tpm: HMAC fix and cleanup
2025-08-01 20:14 UTC (13+ messages)
` [PATCH 1/2] tpm: Compare HMAC values in constant time
` [PATCH 2/2] tpm: Use HMAC-SHA256 library instead of open-coded HMAC
[PATCH v2] integrity: Extract secure boot enquiry function out of IMA
2025-08-01 14:34 UTC (8+ messages)
[GIT PULL] integrity: subsystem fixes for v6.17
2025-07-31 19:07 UTC (2+ messages)
Umowa vPPA - termin spotkania
2025-07-29 8:11 UTC
[GIT PULL] TPM DEVICE DRIVER: tpmdd-next-6.17-rc1
2025-07-29 2:24 UTC (2+ messages)
[RFC PATCH v2 0/34] Rework the LSM initialization
2025-07-28 23:56 UTC (77+ messages)
` [RFC PATCH v2 01/34] lsm: split the notifier code out into lsm_notifier.c
` [RFC PATCH v2 02/34] lsm: split the init code out into lsm_init.c
` [RFC PATCH v2 03/34] lsm: consolidate lsm_allowed() and prepare_lsm() into lsm_prepare()
` [RFC PATCH v2 04/34] lsm: introduce looping macros for the initialization code
` [RFC PATCH v2 05/34] lsm: integrate report_lsm_order() code into caller
` [RFC PATCH v2 06/34] lsm: integrate lsm_early_cred() and lsm_early_task() "
` [RFC PATCH v2 07/34] lsm: rename ordered_lsm_init() to lsm_init_ordered()
` [RFC PATCH v2 08/34] lsm: replace the name field with a pointer to the lsm_id struct
` [RFC PATCH v2 09/34] lsm: rename the lsm order variables for consistency
` [RFC PATCH v2 10/34] lsm: rework lsm_active_cnt and lsm_idlist[]
` [RFC PATCH v2 11/34] lsm: get rid of the lsm_names list and do some cleanup
` [RFC PATCH v2 12/34] lsm: rework the LSM enable/disable setter/getter functions
` [RFC PATCH v2 13/34] lsm: rename exists_ordered_lsm() to lsm_order_exists()
` [RFC PATCH v2 14/34] lsm: rename/rework append_ordered_lsm() into lsm_order_append()
` [RFC PATCH v2 15/34] lsm: rename/rework ordered_lsm_parse() to lsm_order_parse()
` [RFC PATCH v2 16/34] lsm: cleanup the LSM blob size code
` [RFC PATCH v2 17/34] lsm: cleanup initialize_lsm() and rename to lsm_init_single()
` [RFC PATCH v2 18/34] lsm: fold lsm_init_ordered() into security_init()
` [RFC PATCH v2 19/34] lsm: add/tweak function header comment blocks in lsm_init.c
` [RFC PATCH v2 20/34] lsm: cleanup the debug and console output "
` [RFC PATCH v2 21/34] lsm: output available LSMs when debugging
` [RFC PATCH v2 22/34] lsm: group lsm_order_parse() with the other lsm_order_*() functions
` [RFC PATCH v2 23/34] lsm: introduce an initcall mechanism into the LSM framework
` [RFC PATCH v2 24/34] loadpin: move initcalls to "
` [RFC PATCH v2 25/34] ipe: "
` [RFC PATCH v2 26/34] smack: "
` [RFC PATCH v2 27/34] tomoyo: "
` [RFC PATCH v2 28/34] safesetid: "
` [RFC PATCH v2 29/34] apparmor: "
` [RFC PATCH v2 30/34] lockdown: "
` [RFC PATCH v2 31/34] ima,evm: "
` [RFC PATCH v2 32/34] selinux: "
` [RFC PATCH v2 33/34] lsm: consolidate all of the LSM framework initcalls
` [RFC PATCH v2 34/34] lsm: add a LSM_STARTED_ALL notification event
[PATCH v12 0/4] Add Loongson Security Engine chip driver
2025-07-26 7:05 UTC (9+ messages)
` [PATCH v12 1/4] mfd: Add support for Loongson Security Engine chip controller
` [PATCH v12 2/4] crypto: loongson - add Loongson RNG driver support
` [PATCH v12 3/4] tpm: Add a driver for Loongson TPM device
` [PATCH v12 4/4] MAINTAINERS: Add entry for Loongson Security Engine drivers
[PATCH 1/2] vfs: Allow filesystems with foreign owner IDs to override UID checks
2025-07-23 15:26 UTC
[PATCH v3] tpm: Check for completion after timeout
2025-07-22 23:22 UTC (4+ messages)
[RFC PATCH 0/29] Rework the LSM initialization
2025-07-21 21:59 UTC (6+ messages)
` [RFC PATCH 25/29] ima,evm: move initcalls to the LSM framework
[PATCH] tpm: crb: Fix typo in function name __tpm_crb_ffa_send_receive
2025-07-21 18:33 UTC
[PATCH 2/2] vfs: Fix inode ownership checks with regard to foreign ownership
2025-07-21 16:15 UTC (3+ messages)
[PATCH v9 0/3] tpm_crb_ffa: handle tpm busy return code
2025-07-20 23:05 UTC (6+ messages)
` [PATCH v9 1/3] tpm_crb_ffa: Fix typos in function name
` [PATCH v9 2/3] tpm_crb_ffa:Remove memset usage
` [PATCH v9 3/3] tpm_crb_ffa: handle tpm busy return code
[PATCH v2] tpm: Fix the timeout & use ktime
2025-07-19 20:19 UTC (9+ messages)
[RFC PATCH] tpm, tpm_vtpm_proxy: boot-time TPM
2025-07-19 14:17 UTC (5+ messages)
[PATCH -next RFC 0/4] IMA Root of Trust (RoT) Framework
2025-07-08 21:15 UTC (2+ messages)
[PATCH] Revert "integrity: Do not load MOK and MOKx when secure boot be disabled"
2025-07-08 20:52 UTC (10+ messages)
[PATCH v8 0/3] tpm_crb_ffa: handle tpm busy return code
2025-07-05 17:11 UTC (10+ messages)
` [PATCH v8 2/3] tpm_crb_ffa:Introduce memzero macro to replace memset
[PATCH v4 0/3] Enhancements to the secvar interface in static key management mode
2025-07-04 8:43 UTC (7+ messages)
` [PATCH v4 1/3] powerpc/pseries: Correct secvar format representation for static key management
` [PATCH v4 2/3] powerpc/secvar: Expose secvars relevant to the key management mode
` [PATCH v4 3/3] integrity/platform_certs: Allow loading of keys in the static "
[PATCH v4 0/2] integrity: Extract secure boot enquiry function out of IMA
2025-07-04 7:51 UTC (3+ messages)
` [PATCH v4 1/2] x86/efi: Rename IMA-related function and macro of boot mode
` [PATCH v4 2/2] integrity: Extract secure boot enquiry function out of IMA
[PATCH] tpm: Use of_reserved_mem_region_to_resource() for "memory-region"
2025-07-04 2:58 UTC (2+ messages)
[PATCH v5] tpm: Managed allocations for tpm_buf instances
2025-07-04 2:53 UTC (3+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).