Linux Integrity Measurement development
 help / color / mirror / Atom feed
 messages from 2025-10-21 16:15:58 to 2025-11-27 21:42:06 UTC [more...]

[PATCH v8 00/11] Prepare TPM driver for Trenchboot
 2025-11-27 21:41 UTC  (5+ messages)
` [PATCH v8 01/11] tpm: Cap the number of PCR banks
` [PATCH v8 02/11] tpm: Use -EPERM as fallback error code in tpm_ret_to_err
` [PATCH v8 03/11] KEYS: trusted: remove redundant instance of tpm2_hash_map
` [PATCH v8 04/11] KEYS: trusted: Fix memory leak in tpm2_load()

[PATCH v7 00/11] Prepare TPM driver for Trenchboot
 2025-11-27 19:03 UTC  (18+ messages)
` [PATCH v7 01/11] tpm: Cap the number of PCR banks
` [PATCH v7 02/11] tpm: Use -EPERM as fallback error code in tpm_ret_to_err
` [PATCH v7 03/11] KEYS: trusted: remove redundant instance of tpm2_hash_map
` [PATCH v7 04/11] KEYS: trusted: Fix memory leak in tpm2_load()
` [PATCH v7 05/11] KEYS: trusted: Use tpm_ret_to_err() in trusted_tpm2
` [PATCH v7 06/11] tpm2-sessions: Remove 'attributes' from tpm_buf_append_auth
` [PATCH v7 07/11] tpm2-sessions: Unmask tpm_buf_append_hmac_session()
` [PATCH v7 08/11] KEYS: trusted: Open code tpm2_buf_append()
` [PATCH v7 09/11] tpm-buf: unify TPM_BUF_BOUNDARY_ERROR and TPM_BUF_OVERFLOW
` [PATCH v7 10/11] tpm-buf: Remove chip parameter from tpm_buf_append_handle
` [PATCH v7 11/11] tpm-buf: Enable managed and stack allocations

[PATCH] tpm: Remove tpm_find_get_ops
 2025-11-27 17:02 UTC 

[PATCH v3 0/4] tst_sudo.c, ima_{conditionals, measurements}.sh enhancements
 2025-11-27 12:55 UTC  (6+ messages)
` [PATCH v3 1/4] shell: Add tst_sudo.c helper
` [PATCH v3 2/4] tst_test.sh: Add TST_USR_{G,U}ID variables
` [PATCH v3 3/4] ima_{conditionals,measurements}.sh: Use tst_sudo
` [PATCH v3 4/4] ima_conditionals.sh: Split test by request

[RFC v1 0/1] Implement IMA Event Log Trimming
 2025-11-27  9:45 UTC  (9+ messages)
` [RFC v1 1/1] ima: Implement IMA event log trimming

[PATCHv2 1/2] kernel/kexec: Change the prototype of kimage_map_segment()
 2025-11-26  4:47 UTC  (18+ messages)
` [PATCHv2 2/2] kernel/kexec: Fix IMA when allocation happens in CMA area

[PATCH 1/1] tpm_crb: Fix a spelling mistake
 2025-11-25 15:36 UTC  (2+ messages)

[PATCH] selftests: tpm2: Fix ill defined assertions
 2025-11-25 15:36 UTC  (2+ messages)

[RFC][PATCH] exec: Move cred computation under exec_update_lock
 2025-11-25 11:55 UTC 

[PATCH 00/44] Change a lot of min_t() that might mask high bits
 2025-11-24  9:49 UTC  (7+ messages)
` [PATCH 15/44] drivers/char/tpm: use min() instead of min_t()
` (subset) [PATCH 00/44] Change a lot of min_t() that might mask high bits

[PATCH v3 0/9] module: Introduce hash-based integrity checking
 2025-11-24  9:41 UTC  (9+ messages)
` [PATCH v3 7/9] module: Move lockdown check into generic module loader

[PATCH] KEYS: encrypted: Use pr_fmt()
 2025-11-21 20:10 UTC  (4+ messages)

[PATCH -next] ima: Handle error code returned by ima_filter_rule_match()
 2025-11-21 15:38 UTC  (3+ messages)

[PATCH v2 0/4] tst_sudo.c, ima_{conditionals,measurements}.sh enhancements
 2025-11-21 15:21 UTC  (5+ messages)
` [PATCH v2 1/4] shell: Add tst_sudo.c helper
` [PATCH v2 2/4] tst_test.sh: Add TST_USR_{G,U}ID variables
` [PATCH v2 3/4] ima_{conditionals,measurements}.sh: Use tst_sudo
` [PATCH v2 4/4] ima_conditionals.sh: Split test by request

[Patch V1] ima: avoid duplicate policy rules insertions
 2025-11-20 15:39 UTC  (10+ messages)

[PATCH] ima: Fall back to default kernel module signature verification
 2025-11-19 15:29 UTC  (40+ messages)
` [PATCH v2] lsm,ima: new LSM hook security_kernel_module_read_file to access decompressed kernel module
  ` [PATCH v3] ima: Access decompressed kernel module to verify appended signature
  ` [PATCH v4] "

[PATCH] KEYS: encrypted: Replace deprecated strcpy and improve get_derived_key
 2025-11-19  2:50 UTC  (4+ messages)

[PATCH] KEYS: Remove the ad-hoc compilation flag CAAM_DEBUG
 2025-11-19  2:25 UTC  (4+ messages)

[PATCH v2] KEYS: encrypted: Replace deprecated strcpy and improve get_derived_key
 2025-11-14 10:30 UTC  (3+ messages)

[PATCH] Documentation: tpm: tpm-security: Demote "Null Primary Key Certification in Userspace" section
 2025-11-09 12:29 UTC  (9+ messages)

[PATCH] hwrng: tpm: Do not enable by default
 2025-11-09 10:04 UTC  (7+ messages)

[PATCH] tpm: add WQ_PERCPU to alloc_workqueue users
 2025-11-09  4:53 UTC  (2+ messages)

[PATCH] KEYS: encrypted: Return early on allocation failure and drop goto
 2025-11-09  4:47 UTC  (3+ messages)

[PATCH] tpm_crb: add missing loc parameter to kerneldoc
 2025-11-09  4:41 UTC  (2+ messages)

[PATCH v2 0/4] Re-establish ability for exclusive TPM access to userspace
 2025-11-09  4:34 UTC  (13+ messages)
` [PATCH v3 0/4] pm: Ensure exclusive userspace access when using /dev/tpm<n>
  ` [PATCH v3 4/4] tpm: Allow for exclusive TPM "

[PATCH 1/2] kernel/kexec: Change the prototype of kimage_map_segment()
 2025-11-07  0:44 UTC  (10+ messages)
` [PATCH 2/2] kernel/kexec: Fix IMA when allocation happens in CMA area

[PATCH] module: Only declare set_module_sig_enforced when CONFIG_MODULE_SIG=y
 2025-11-04  3:05 UTC  (5+ messages)

tpm2h 0.15.0
 2025-11-04  1:46 UTC 

[PATCH 1/2] vfs: Allow filesystems with foreign owner IDs to override UID checks
 2025-10-29 12:39 UTC  (4+ messages)

[PATCH] KEYS: fix compilation warnings in the dump_options() function
 2025-10-28  7:03 UTC  (7+ messages)

[PATCH v2] tpm_crb: Add idle support for the Arm FF-A start method
 2025-10-27 20:06 UTC  (2+ messages)

tpm2sh 0.12.3
 2025-10-27  8:56 UTC 

[PATCH AUTOSEL 6.17-6.6] ima: don't clear IMA_DIGSIG flag when setting or removing non-IMA xattr
 2025-10-25 15:57 UTC 

[PATCH v6 00/10] Prepare TPM driver for Trenchboot
 2025-10-24 18:50 UTC  (7+ messages)
` [PATCH v6 01/10] tpm: Cap the number of PCR banks
` [PATCH v6 10/10] tpm-buf: Enable managed and stack allocations

[PATCH] KEYS: encrypted: Use designated initializers for match_table_t structs
 2025-10-23 13:35 UTC  (5+ messages)

[PATCH v5 0/34] Rework the LSM initialization
 2025-10-22 23:34 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox