messages from 2025-07-21 23:24:29 to 2025-08-22 19:46:10 UTC [more...]
[RFC PATCH v1 0/2] Add O_DENY_WRITE (complement AT_EXECVE_CHECK)
2025-08-22 19:45 UTC (4+ messages)
` [RFC PATCH v1 1/2] fs: Add O_DENY_WRITE
` [RFC PATCH v1 2/2] selftests/exec: Add O_DENY_WRITE tests
tpm2-protocol 0.10.0 / tpm2sh 0.10.0
2025-08-22 2:47 UTC
[PATCH v12 0/4] Add Loongson Security Engine chip driver
2025-08-20 2:33 UTC (7+ messages)
` [PATCH v12 2/4] crypto: loongson - add Loongson RNG driver support
` [PATCH v12 3/4] tpm: Add a driver for Loongson TPM device
tpm2_protocol / tpm2sh 0.9.0
2025-08-20 0:27 UTC (2+ messages)
[PATCH] tpm: prevents local DOS via tpm/tpm0/ppi/*operations
2025-08-19 22:38 UTC (13+ messages)
[PATCH 0/2] Convert lib/digsig.c to SHA-1 library
2025-08-19 18:11 UTC (6+ messages)
` [PATCH 1/2] integrity: Select CRYPTO from INTEGRITY_ASYMMETRIC_KEYS
` [PATCH 2/2] lib/digsig: Use SHA-1 library instead of crypto_shash
Questions about CONFIG_TCG_TPM2_HMAC
2025-08-19 13:54 UTC (5+ messages)
[PATCH] tpm: Disable TCG_TPM2_HMAC by default
2025-08-18 17:42 UTC (11+ messages)
tpm2_protocol / tpm2sh 0.6.1
2025-08-17 20:42 UTC
[RFC PATCH v3 0/34] Rework the LSM initialization
2025-08-15 17:05 UTC (37+ messages)
` [PATCH v3 01/34] lsm: split the notifier code out into lsm_notifier.c
` [PATCH v3 02/34] lsm: split the init code out into lsm_init.c
` [PATCH v3 03/34] lsm: consolidate lsm_allowed() and prepare_lsm() into lsm_prepare()
` [PATCH v3 04/34] lsm: introduce looping macros for the initialization code
` [PATCH v3 05/34] lsm: integrate report_lsm_order() code into caller
` [PATCH v3 06/34] lsm: integrate lsm_early_cred() and lsm_early_task() "
` [PATCH v3 07/34] lsm: rename ordered_lsm_init() to lsm_init_ordered()
` [PATCH v3 08/34] lsm: replace the name field with a pointer to the lsm_id struct
` [PATCH v3 09/34] lsm: rename the lsm order variables for consistency
` [PATCH v3 10/34] lsm: rework lsm_active_cnt and lsm_idlist[]
` [PATCH v3 11/34] lsm: get rid of the lsm_names list and do some cleanup
` [PATCH v3 12/34] lsm: rework the LSM enable/disable setter/getter functions
` [PATCH v3 13/34] lsm: rename exists_ordered_lsm() to lsm_order_exists()
` [PATCH v3 14/34] lsm: rename/rework append_ordered_lsm() into lsm_order_append()
` [PATCH v3 15/34] lsm: rename/rework ordered_lsm_parse() to lsm_order_parse()
` [PATCH v3 16/34] lsm: cleanup the LSM blob size code
` [PATCH v3 17/34] lsm: cleanup initialize_lsm() and rename to lsm_init_single()
` [PATCH v3 18/34] lsm: fold lsm_init_ordered() into security_init()
` [PATCH v3 19/34] lsm: add/tweak function header comment blocks in lsm_init.c
` [PATCH v3 20/34] lsm: cleanup the debug and console output "
` [PATCH v3 21/34] lsm: output available LSMs when debugging
` [PATCH v3 22/34] lsm: group lsm_order_parse() with the other lsm_order_*() functions
` [PATCH v3 23/34] lsm: introduce an initcall mechanism into the LSM framework
` [PATCH v3 24/34] loadpin: move initcalls to "
` [PATCH v3 25/34] ipe: "
` [PATCH v3 26/34] smack: "
` [PATCH v3 27/34] tomoyo: "
` [PATCH v3 28/34] safesetid: "
` [PATCH v3 29/34] apparmor: "
` [PATCH v3 30/34] lockdown: "
` [PATCH v3 31/34] ima,evm: "
` [PATCH v3 32/34] selinux: "
` [PATCH v3 33/34] lsm: consolidate all of the LSM framework initcalls
` [PATCH v3 34/34] lsm: add a LSM_STARTED_ALL notification event
tpm2_protocol/tpm2sh
2025-08-14 4:28 UTC (2+ messages)
tpm2_protocol
2025-08-13 0:48 UTC (3+ messages)
[PATCH v5 00/23] x86: text_poke() fixes and executable lockdowns
2025-08-12 18:59 UTC (7+ messages)
` [PATCH v5 18/23] bpf: Use vmalloc special flag
[PATCH v2 0/3] KEYS: trusted_tpm1: HMAC fix and cleanup
2025-08-12 16:29 UTC (8+ messages)
` [PATCH v2 1/3] KEYS: trusted_tpm1: Compare HMAC values in constant time
` [PATCH v2 2/3] KEYS: trusted_tpm1: Use SHA-1 library instead of crypto_shash
` [PATCH v2 3/3] KEYS: trusted_tpm1: Move private functionality out of public header
[PATCH v2 0/2] tpm: Clean up HMAC validation and computation
2025-08-09 17:38 UTC (8+ messages)
` [PATCH v2 1/2] tpm: Compare HMAC values in constant time
` [PATCH v2 2/2] tpm: Use HMAC-SHA256 library instead of open-coded HMAC
[PATCH 0/3] KEYS: trusted_tpm1: HMAC fix and cleanup
2025-08-09 17:21 UTC (12+ messages)
` [PATCH 1/3] KEYS: trusted_tpm1: Compare HMAC values in constant time
` [PATCH 2/3] KEYS: trusted_tpm1: Use SHA-1 library instead of crypto_shash
` [PATCH 3/3] KEYS: trusted_tpm1: Move private functionality out of public header
[PATCH] tst_security.sh: Use the same value for checkreqprot
2025-08-08 7:16 UTC (2+ messages)
[PATCH] KEYS: encrypted: Use SHA-256 library instead of crypto_shash
2025-08-05 13:41 UTC (2+ messages)
[PATCH AUTOSEL 6.15 07/34] tpm: Check for completion after timeout
2025-08-03 21:18 UTC (2+ messages)
` [PATCH AUTOSEL 6.15 08/34] tpm: tpm_crb_ffa: try to probe tpm_crb_ffa when it's built-in
[PATCH AUTOSEL 6.16 07/35] tpm: Check for completion after timeout
2025-08-03 21:17 UTC (2+ messages)
` [PATCH AUTOSEL 6.16 08/35] tpm: tpm_crb_ffa: try to probe tpm_crb_ffa when it's built-in
[PATCH 0/2] tpm: HMAC fix and cleanup
2025-08-01 20:14 UTC (13+ messages)
` [PATCH 1/2] tpm: Compare HMAC values in constant time
` [PATCH 2/2] tpm: Use HMAC-SHA256 library instead of open-coded HMAC
[PATCH v2] integrity: Extract secure boot enquiry function out of IMA
2025-08-01 14:34 UTC (8+ messages)
[GIT PULL] integrity: subsystem fixes for v6.17
2025-07-31 19:07 UTC (2+ messages)
Umowa vPPA - termin spotkania
2025-07-29 8:11 UTC
[GIT PULL] TPM DEVICE DRIVER: tpmdd-next-6.17-rc1
2025-07-29 2:24 UTC (2+ messages)
[RFC PATCH v2 0/34] Rework the LSM initialization
2025-07-28 23:56 UTC (75+ messages)
` [RFC PATCH v2 01/34] lsm: split the notifier code out into lsm_notifier.c
` [RFC PATCH v2 02/34] lsm: split the init code out into lsm_init.c
` [RFC PATCH v2 03/34] lsm: consolidate lsm_allowed() and prepare_lsm() into lsm_prepare()
` [RFC PATCH v2 04/34] lsm: introduce looping macros for the initialization code
` [RFC PATCH v2 05/34] lsm: integrate report_lsm_order() code into caller
` [RFC PATCH v2 06/34] lsm: integrate lsm_early_cred() and lsm_early_task() "
` [RFC PATCH v2 07/34] lsm: rename ordered_lsm_init() to lsm_init_ordered()
` [RFC PATCH v2 08/34] lsm: replace the name field with a pointer to the lsm_id struct
` [RFC PATCH v2 09/34] lsm: rename the lsm order variables for consistency
` [RFC PATCH v2 10/34] lsm: rework lsm_active_cnt and lsm_idlist[]
` [RFC PATCH v2 11/34] lsm: get rid of the lsm_names list and do some cleanup
` [RFC PATCH v2 12/34] lsm: rework the LSM enable/disable setter/getter functions
` [RFC PATCH v2 13/34] lsm: rename exists_ordered_lsm() to lsm_order_exists()
` [RFC PATCH v2 14/34] lsm: rename/rework append_ordered_lsm() into lsm_order_append()
` [RFC PATCH v2 15/34] lsm: rename/rework ordered_lsm_parse() to lsm_order_parse()
` [RFC PATCH v2 16/34] lsm: cleanup the LSM blob size code
` [RFC PATCH v2 17/34] lsm: cleanup initialize_lsm() and rename to lsm_init_single()
` [RFC PATCH v2 18/34] lsm: fold lsm_init_ordered() into security_init()
` [RFC PATCH v2 19/34] lsm: add/tweak function header comment blocks in lsm_init.c
` [RFC PATCH v2 20/34] lsm: cleanup the debug and console output "
` [RFC PATCH v2 21/34] lsm: output available LSMs when debugging
` [RFC PATCH v2 22/34] lsm: group lsm_order_parse() with the other lsm_order_*() functions
` [RFC PATCH v2 23/34] lsm: introduce an initcall mechanism into the LSM framework
` [RFC PATCH v2 26/34] smack: move initcalls to "
` [RFC PATCH v2 27/34] tomoyo: "
` [RFC PATCH v2 28/34] safesetid: "
` [RFC PATCH v2 29/34] apparmor: "
` [RFC PATCH v2 30/34] lockdown: "
` [RFC PATCH v2 31/34] ima,evm: "
` [RFC PATCH v2 32/34] selinux: "
` [RFC PATCH v2 33/34] lsm: consolidate all of the LSM framework initcalls
` [RFC PATCH v2 34/34] lsm: add a LSM_STARTED_ALL notification event
[PATCH 1/2] vfs: Allow filesystems with foreign owner IDs to override UID checks
2025-07-23 15:26 UTC
[PATCH v3] tpm: Check for completion after timeout
2025-07-22 23:22 UTC (4+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).