linux-integrity.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2025-11-06 03:22:08 to 2025-12-03 08:06:39 UTC [more...]

[PATCHv2 1/2] kernel/kexec: Change the prototype of kimage_map_segment()
 2025-12-03  8:06 UTC  (20+ messages)
` [PATCHv2 2/2] kernel/kexec: Fix IMA when allocation happens in CMA area

[PATCH v7 00/11] Prepare TPM driver for Trenchboot
 2025-12-03  2:03 UTC  (27+ messages)
` [PATCH v7 01/11] tpm: Cap the number of PCR banks
` [PATCH v7 02/11] tpm: Use -EPERM as fallback error code in tpm_ret_to_err
` [PATCH v7 03/11] KEYS: trusted: remove redundant instance of tpm2_hash_map
` [PATCH v7 04/11] KEYS: trusted: Fix memory leak in tpm2_load()
` [PATCH v7 05/11] KEYS: trusted: Use tpm_ret_to_err() in trusted_tpm2
` [PATCH v7 06/11] tpm2-sessions: Remove 'attributes' from tpm_buf_append_auth
` [PATCH v7 07/11] tpm2-sessions: Unmask tpm_buf_append_hmac_session()
` [PATCH v7 08/11] KEYS: trusted: Open code tpm2_buf_append()
` [PATCH v7 09/11] tpm-buf: unify TPM_BUF_BOUNDARY_ERROR and TPM_BUF_OVERFLOW
` [PATCH v7 10/11] tpm-buf: Remove chip parameter from tpm_buf_append_handle
` [PATCH v7 11/11] tpm-buf: Enable managed and stack allocations

[GIT PULL] TPM DEVICE DRIVER: tpmdd-next-6.19-rc1-v3
 2025-12-03  2:02 UTC  (2+ messages)

[PATCH 0/1] Trim N entries of IMA event logs
 2025-12-02 23:28 UTC  (2+ messages)
` [PATCH 1/1] IMA event log trimming

[PATCH v3] tpm2-sessions: address out-of-range indexing
 2025-12-02 22:07 UTC  (4+ messages)

[GIT PULL] integrity: subsystem updates for v6.19
 2025-12-02 21:55 UTC 

[PATCH v2 0/4] tpm2-sessions: Fixes aime for v6.19-rc2
 2025-12-02 20:26 UTC  (5+ messages)
` [PATCH v2 1/4] tpm2-sessions: fix out of range indexing in name_size
` [PATCH v2 2/4] tpm2-sessions: Fix tpm2_read_public range checks
` [PATCH v2 3/4] tpm2-sessions: Remove 'attributes' parameter from tpm_buf_append_auth
` [PATCH v2 4/4] tpm2-sessions: Open code tpm_buf_append_hmac_session()

[PATCH] x86/kexec: Add a sanity check on previous kernel's ima kexec buffer
 2025-12-02 19:10 UTC 

[PATCH v2 1/2] evm: fix security.evm for a file with IMA signature
 2025-12-02 17:10 UTC  (3+ messages)

[PATCH 0/4] tpm2-sessions: Fixes for v6.19
 2025-12-01 23:27 UTC  (7+ messages)
` [PATCH 1/4] tpm2-sessions: address out-of-range indexing
` [PATCH 2/4] tpm2-sessions: Fix tpm2_read_public range checks
` [PATCH 3/4] tpm2-sessions: Remove 'attributes' parameter from tpm_buf_append_auth
` [PATCH 4/4] tpm2-sessions: Open code tpm_buf_append_hmac_session()
` [PATCH v3] tpm2-sessions: address out-of-range indexing

[RFC][PATCH] exec: Move cred computation under exec_update_lock
 2025-12-01 21:39 UTC  (5+ messages)
                        ` Are setuid shell scripts safe? (Implied by security_bprm_creds_for_exec)

[RFC v1 0/1] Implement IMA Event Log Trimming
 2025-12-01 17:42 UTC  (10+ messages)
` [RFC v1 1/1] ima: Implement IMA event log trimming

[PATCH] tpm2-sessions: Fix tpm2_read_public range checks
 2025-12-01 16:55 UTC 

[PATCH] module: Only declare set_module_sig_enforced when CONFIG_MODULE_SIG=y
 2025-12-01  3:06 UTC  (2+ messages)
` [PATCH v2] "

[PATCH v2] tpm2-sessions: address out-of-range indexing
 2025-11-30 21:35 UTC 

[PATCH] tpm2-sessions: address out-of-range indexing
 2025-11-30 21:18 UTC 

[GIT PULL] KEYS: trusted: keys-trusted-next-rc1
 2025-11-29 21:09 UTC 

[GIT PULL] TPM DEVICE DRIVER: tpmdd-next-6.19-rc1-v2
 2025-11-28 16:40 UTC 

[GIT PULL] TPM DEVICE DRIVER: tpmdd-next-6.19-rc1
 2025-11-28 16:27 UTC  (4+ messages)

[PATCH v9 0/8] Prepare TPM driver for Trenchboot
 2025-11-28 15:14 UTC  (11+ messages)
` [PATCH v9 1/8] tpm2-sessions: Remove 'attributes' parameter from tpm_buf_append_auth
` [PATCH v9 2/8] tpm2-sessions: Open code tpm_buf_append_hmac_session()
` [PATCH v9 3/8] KEYS: trusted: Replace a redundant instance of tpm2_hash_map
` [PATCH v9 4/8] KEYS: trusted: Fix a memory leak in tpm2_load_cmd
` [PATCH v9 5/8] KEYS: trusted: Open code tpm2_buf_append()
` [PATCH v9 6/8] tpm-buf: Merge TPM_BUF_BOUNDARY_ERROR and TPM_BUF_OVERFLOW
` [PATCH v9 7/8] tpm-buf: Remove chip parameter from tpm_buf_append_handle
` [PATCH v9 8/8] tpm-buf: Enable managed and stack allocations

[GIT PULL] KEYS: keys-next-6.19-rc1
 2025-11-27 22:36 UTC 

[PATCH] tpm: Remove tpm_find_get_ops
 2025-11-27 21:54 UTC  (2+ messages)

[PATCH v8 00/11] Prepare TPM driver for Trenchboot
 2025-11-27 21:41 UTC  (12+ messages)
` [PATCH v8 01/11] tpm: Cap the number of PCR banks
` [PATCH v8 02/11] tpm: Use -EPERM as fallback error code in tpm_ret_to_err
` [PATCH v8 03/11] KEYS: trusted: remove redundant instance of tpm2_hash_map
` [PATCH v8 04/11] KEYS: trusted: Fix memory leak in tpm2_load()
` [PATCH v8 05/11] KEYS: trusted: Use tpm_ret_to_err() in trusted_tpm2
` [PATCH v8 06/11] tpm2-sessions: Remove 'attributes' from tpm_buf_append_auth
` [PATCH v8 07/11] tpm2-sessions: Unmask tpm_buf_append_hmac_session()
` [PATCH v8 08/11] KEYS: trusted: Open code tpm2_buf_append()
` [PATCH v8 09/11] tpm-buf: unify TPM_BUF_BOUNDARY_ERROR and TPM_BUF_OVERFLOW
` [PATCH v8 10/11] tpm-buf: Remove chip parameter from tpm_buf_append_handle
` [PATCH v8 11/11] tpm-buf: Enable managed and stack allocations

[PATCH v3 0/4] tst_sudo.c, ima_{conditionals, measurements}.sh enhancements
 2025-11-27 12:55 UTC  (6+ messages)
` [PATCH v3 1/4] shell: Add tst_sudo.c helper
` [PATCH v3 2/4] tst_test.sh: Add TST_USR_{G,U}ID variables
` [PATCH v3 3/4] ima_{conditionals,measurements}.sh: Use tst_sudo
` [PATCH v3 4/4] ima_conditionals.sh: Split test by request

[PATCH 1/1] tpm_crb: Fix a spelling mistake
 2025-11-25 15:36 UTC  (2+ messages)

[PATCH] selftests: tpm2: Fix ill defined assertions
 2025-11-25 15:36 UTC  (2+ messages)

[PATCH 00/44] Change a lot of min_t() that might mask high bits
 2025-11-24  9:49 UTC  (7+ messages)
` [PATCH 15/44] drivers/char/tpm: use min() instead of min_t()
` (subset) [PATCH 00/44] Change a lot of min_t() that might mask high bits

[PATCH v3 0/9] module: Introduce hash-based integrity checking
 2025-11-24  9:41 UTC  (9+ messages)
` [PATCH v3 7/9] module: Move lockdown check into generic module loader

[PATCH] KEYS: encrypted: Use pr_fmt()
 2025-11-21 20:10 UTC  (4+ messages)

[PATCH -next] ima: Handle error code returned by ima_filter_rule_match()
 2025-11-21 15:38 UTC  (3+ messages)

[PATCH v2 0/4] tst_sudo.c, ima_{conditionals,measurements}.sh enhancements
 2025-11-21 15:21 UTC  (5+ messages)
` [PATCH v2 1/4] shell: Add tst_sudo.c helper
` [PATCH v2 2/4] tst_test.sh: Add TST_USR_{G,U}ID variables
` [PATCH v2 3/4] ima_{conditionals,measurements}.sh: Use tst_sudo
` [PATCH v2 4/4] ima_conditionals.sh: Split test by request

[Patch V1] ima: avoid duplicate policy rules insertions
 2025-11-20 15:39 UTC  (10+ messages)

[PATCH] ima: Fall back to default kernel module signature verification
 2025-11-19 15:29 UTC  (23+ messages)
` [PATCH v2] lsm,ima: new LSM hook security_kernel_module_read_file to access decompressed kernel module
  ` [PATCH v3] ima: Access decompressed kernel module to verify appended signature
  ` [PATCH v4] "

[PATCH] KEYS: encrypted: Replace deprecated strcpy and improve get_derived_key
 2025-11-19  2:50 UTC  (4+ messages)

[PATCH] KEYS: Remove the ad-hoc compilation flag CAAM_DEBUG
 2025-11-19  2:25 UTC  (3+ messages)

[PATCH v2] KEYS: encrypted: Replace deprecated strcpy and improve get_derived_key
 2025-11-14 10:30 UTC  (3+ messages)

[PATCH] Documentation: tpm: tpm-security: Demote "Null Primary Key Certification in Userspace" section
 2025-11-09 12:29 UTC  (3+ messages)

[PATCH] hwrng: tpm: Do not enable by default
 2025-11-09 10:04 UTC  (5+ messages)

[PATCH] tpm: add WQ_PERCPU to alloc_workqueue users
 2025-11-09  4:53 UTC  (2+ messages)

[PATCH] KEYS: encrypted: Return early on allocation failure and drop goto
 2025-11-09  4:47 UTC  (2+ messages)

[PATCH] tpm_crb: add missing loc parameter to kerneldoc
 2025-11-09  4:41 UTC  (2+ messages)

[PATCH v3 0/4] pm: Ensure exclusive userspace access when using /dev/tpm<n>
 2025-11-09  4:34 UTC  (6+ messages)
` [PATCH v3 4/4] tpm: Allow for exclusive TPM "

[PATCH 1/2] kernel/kexec: Change the prototype of kimage_map_segment()
 2025-11-07  0:44 UTC  (9+ messages)
` [PATCH 2/2] kernel/kexec: Fix IMA when allocation happens in CMA area


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).