public inbox for linux-integrity@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2026-03-12 15:03:36 to 2026-04-15 00:00:55 UTC [more...]

[PATCH] tpm2-sessions: Fix missing tpm_buf_destroy() in tpm2_read_public()
 2026-04-15  0:00 UTC  (3+ messages)

[RFC PATCH 00/10] Fix dm-ima bugs
 2026-04-14 18:35 UTC  (13+ messages)
` [PATCH 01/10] dm-ima: remove dm_ima_reset_data()
` [PATCH 02/10] dm-ima: remove broken last_target_measured logic
` [PATCH 03/10] dm-ima: Remove status_flags from dm_ima_measure_on_table_load()
` [PATCH 04/10] dm-ima: don't copy the active table to the inactive table
` [PATCH 05/10] dm-ima: Fix UAF errors and measuring incorrect context
` [PATCH 06/10] dm-ima: remove new_map from dm_ima_measure_on_device_clear
` [PATCH 07/10] dm-ima: Fix issues with dm_ima_measure_on_device_rename
` [PATCH 08/10] dm-ima: Handle race between rename and table swap
` [PATCH 09/10] dm-ima: Fail more gracefully in dm_ima_measure_on_*
` [PATCH 10/10] dm-ima: use active table's size if available

[PATCH] evm: zero-initialize the evm_xattrs read buffer
 2026-04-13 15:20 UTC  (2+ messages)

[PATCH] trusted-keys: move pr_fmt out of trusted-type.h
 2026-04-13 11:03 UTC  (3+ messages)

[PATCH v1] tpm: restore timeout for key creation commands
 2026-04-13  1:31 UTC  (3+ messages)

[PATCH] tpm: aovid -Wunused-but-set-variable
 2026-04-12 23:32 UTC 

[PATCH v3] KEYS: trusted: Debugging as a feature
 2026-04-12 18:47 UTC  (3+ messages)

[PATCH v2 0/2] tpm_tis: fix retry exhaustion and add logging
 2026-04-11  0:33 UTC  (3+ messages)
` [PATCH v2 1/2] tpm: tpm_tis: add error logging for data transfer
` [PATCH v2 2/2] tpm: tpm_tis: stop transmit if retries are exhausted

[PATCH] tpm_tis: Check for an error after exhausting send retires
 2026-04-10 21:21 UTC  (2+ messages)

ima: audit log emitted from ima_collect_measurement when SIGKILL interrupts reads from slow-read filesystems
 2026-04-10 18:54 UTC 

[PATCH] tpm: Use kfree_sensitive() to free auth session in tpm_dev_release()
 2026-04-09 17:20 UTC 

[PATCH v2] KEYS: trusted: Debugging as a feature
 2026-04-09  0:41 UTC  (5+ messages)

[PATCH v2 0/2] Add support for ML-DSA signature for EVM and IMA
 2026-04-08 17:41 UTC  (3+ messages)
` [PATCH v2 1/2] integrity: Refactor asymmetric_verify for reusability
` [PATCH v2 2/2] integrity: Add support for sigv3 verification using ML-DSA keys

[PATCH 0/3] Add support for ML-DSA signature for EVM and IMA
 2026-04-08 17:25 UTC  (6+ messages)
` [PATCH 1/3] crypto: public_key: Remove check for valid hash_algo for ML-DSA keys
` [PATCH 2/3] integrity: Refactor asymmetric_verify for reusability
` [PATCH 3/3] integrity: Add support for sigv3 verification using ML-DSA keys

[PATCH] tpm: Fix auth session leak in tpm2_get_random() error path
 2026-04-08  9:00 UTC  (2+ messages)

[PATCH 0/4] Reorganize TPM public headers
 2026-04-08  8:45 UTC  (11+ messages)
` [PATCH 1/4] tpm: Initial step to reorganize "
` [PATCH 2/4] tpm: Move TPM1 specific definitions to the command header
` [PATCH 3/4] tpm: Move TPM2 "
` [PATCH 4/4] tpm: Move TPM common base "

[PATCH v3] tpm: i2c: atmel: fix block comment formatting
 2026-04-08  8:38 UTC  (2+ messages)

[RFC 0/4] tpm_crb: Add command and response buffer chunking support
 2026-04-08  8:36 UTC  (13+ messages)
` [RFC 1/4] tpm_crb: Add definition of TPM CRB chunking fields
` [RFC 2/4] tpm_crb: Add new wrapper function to invoke start method
` [RFC 3/4] tpm_crb: Implement command and response chunking logic
` [RFC 4/4] tpm: Increase TPM_BUFSIZE to 64kB for chunking support

[PATCH v2] KEYS: trusted: Debugging as a feature
 2026-04-08  8:24 UTC  (4+ messages)

[PATCH v5 0/3] Trim N entries of IMA event logs
 2026-04-07 16:19 UTC  (5+ messages)
` [PATCH v5 1/3] ima: make ima event log trimming configurable
` [PATCH v5 2/3] ima: trim N IMA event log records
` [PATCH v5 3/3] ima: add new critical data record to measure log trim

[ima-evm-utils PATCH 0/5] Add support for ML-DSA signing and verification
 2026-04-06  0:08 UTC  (6+ messages)
` [ima-evm-utils PATCH 1/5] checkpatch: Remove warning when function name is found in output string
` [ima-evm-utils PATCH 2/5] Set size of xattr_value to MAX_SIGNATURE_SIZE
` [ima-evm-utils PATCH 3/5] Support signing with ML-DSA keys when OpenSSL >=3.5 is available
` [ima-evm-utils PATCH 4/5] examples: Implement script to create ML-DSA-65 CA and signing keys
` [ima-evm-utils PATCH 5/5] test: Add tests for signing and verifying with ML-DSA keys

[PATCH 0/3] ima: add regular file data hash support for sigv3
 2026-04-05  9:46 UTC  (8+ messages)
` [PATCH 1/3] ima: Define asymmetric_verify_v3() to verify IMA sigv3 signatures
` [PATCH 2/3] ima: add regular file data hash signature version 3 support
` [PATCH 3/3] ima: add support to require IMA sigv3 signatures

[PATCH v4 00/13] ima: Introduce staging mechanism
 2026-04-01 17:52 UTC  (20+ messages)
` [PATCH v4 01/13] ima: Remove ima_h_table structure
` [PATCH v4 02/13] ima: Replace static htable queue with dynamically allocated array
` [PATCH v4 03/13] ima: Introduce per binary measurements list type ima_num_entries counter
` [PATCH v4 04/13] ima: Introduce per binary measurements list type binary_runtime_size value
` [PATCH v4 05/13] ima: Introduce _ima_measurements_start() and _ima_measurements_next()
` [PATCH v4 06/13] ima: Mediate open/release method of the measurements list
` [PATCH v4 07/13] ima: Use snprintf() in create_securityfs_measurement_lists
` [PATCH v4 08/13] ima: Introduce ima_dump_measurement()
` [PATCH v4 09/13] ima: Add support for staging measurements with prompt
` [PATCH v4 10/13] ima: Add support for flushing the hash table when staging measurements
` [PATCH v4 11/13] ima: Support staging and deleting N measurements entries
` [PATCH v4 12/13] ima: Return error on deleting staged measurements after kexec
` [PATCH v4 13/13] doc: security: Add documentation of the IMA staging mechanism

[PATCH v15 00/28] x86: Secure Launch support for Intel TXT
 2026-03-29 22:57 UTC  (3+ messages)
` [PATCH v15 08/28] tpm/tpm_tis: Close all localities

[PATCH v3 0/8] module: Move 'struct module_signature' to UAPI
 2026-03-26 20:06 UTC  (3+ messages)

[PATCH] evm: Enforce signatures version 3 with new EVM policy 'bit 3'
 2026-03-26  2:00 UTC  (2+ messages)

[PATCH] integrity: Allow sigv3 verification on EVM_XATTR_PORTABLE_DIGSIG
 2026-03-25 21:07 UTC  (4+ messages)

[ima-evm-utils: PATCH 0/8] Add sigv3 support for IMA and EVM and all key types
 2026-03-24 22:03 UTC  (9+ messages)
` [ima-evm-utils: PATCH 1/8] Implement imaevm_create_sigv3 for creating V3 signatures
` [ima-evm-utils: PATCH 2/8] Implement support for IMA signatures V3 signing scheme
` [ima-evm-utils: PATCH 3/8] Implement support for EVM "
` [ima-evm-utils: PATCH 4/8] Support v3 IMA and EVM file signatures with --v3 option
` [ima-evm-utils: PATCH 5/8] Use imaevm_create_sigv3 for fsverity signature creation
` [ima-evm-utils: PATCH 6/8] tests: Add new --v3 option to sign_verify tests
` [ima-evm-utils: PATCH 7/8] Allow verification of EVM_XATTR_PORTABLE_DIGSIG with sigv3
` [ima-evm-utils: PATCH 8/8] Allow hashing for sigv3 on EVM_XATTR_PORTABLE_DIGSIG

[ima-evm-utils: PATCH] shellcheck: Fix shellcheck v0.11.0 issues detected in fsverity.test
 2026-03-24 21:26 UTC 

[ima-evm-utils: PATCH 0/2] Fix memory leaks in libimaevm
 2026-03-24 21:23 UTC  (3+ messages)
` [ima-evm-utils: PATCH 1/2] Use EVP_PKEY_free to free a key of public_key_entry
` [ima-evm-utils: PATCH 2/2] Avoid memory leak if public_keys is NULL

[RFC v2 0/5] tpm_crb: Add command and response buffer chunking support
 2026-03-24 18:12 UTC  (6+ messages)
` [RFC v2 1/5] tpm_crb: Add register definitions of TPM CRB chunking fields
` [RFC v2 2/5] tpm_crb: Add new wrapper function to invoke start method
` [RFC v2 3/5] tpm_crb: Implement command and response chunking logic
` [RFC v2 4/5] tpm: Increase TPM_BUFSIZE to 8kB for chunking support
` [RFC v2 5/5] tpm: tis_i2c: Use local 4KB buffer to limit memory usage

[PATCH v2] KEYS: trusted: Debugging as a feature
 2026-03-24 11:01 UTC 

[PATCH v2] tpm: i2c: atmel: fix block comment formatting
 2026-03-24 10:37 UTC  (2+ messages)

[PATCH] KEYS: trusted: Protocol debugging as a feature
 2026-03-24 10:35 UTC  (2+ messages)

[PATCH v9 00/11] Streamline TPM2 HMAC sessions
 2026-03-23  5:46 UTC  (12+ messages)
` [PATCH v9 01/11] KEYS: trusted: Use get_random-fallback for TPM

[PATCH] tpm: i2c: atmel: fix block comment formatting
 2026-03-23  5:44 UTC  (2+ messages)

[PATCH] tpm: fix tpm disabling if NULL name changes
 2026-03-23  5:36 UTC  (2+ messages)

[PATCH v2 0/2] move TPM-specific fields into trusted_tpm_options
 2026-03-23  5:28 UTC  (7+ messages)
` [PATCH v2 1/2] keys/trusted_keys: clean up debug message logging in the tpm backend

[PATCH] ima: abort file hash computation on fatal signal
 2026-03-22 14:17 UTC  (2+ messages)

[PATCH v3 1/3] ima: Remove ima_h_table structure
 2026-03-20 17:40 UTC  (11+ messages)
` [PATCH v3 3/3] ima: Add support for staging measurements for deletion

[PATCH v3 0/2] vfs: follow-on fixes for i_ino widening
 2026-03-17 14:39 UTC  (4+ messages)
` [PATCH v3 1/2] EVM: add comment describing why ino field is still unsigned long
` [PATCH v3 2/2] nilfs2: fix 64-bit division operations in nilfs_bmap_find_target_in_group()

[PATCH] ima: remove buggy support for asynchronous hashes
 2026-03-17 14:13 UTC  (4+ messages)

[zohar-integrity:next-integrity.ima-sigv3-support-1 13/15] security/integrity/evm/evm_main.c:267:22: error: too many arguments to function 'integrity_digsig_verify'
 2026-03-17 12:02 UTC 

[zohar-integrity:next-integrity.ima-sigv3-support-1 13/15] security/integrity/evm/evm_main.c:270:6: error: too many arguments to function call, expected 5, have 6
 2026-03-17  9:16 UTC 

[PATCH v2 0/2] vfs: follow-on fixes for i_ino widening
 2026-03-16 18:50 UTC  (8+ messages)
` [PATCH v2 1/2] nilfs2: fix 64-bit division operations in nilfs_bmap_find_target_in_group()
` [PATCH v2 2/2] EVM: add comment describing why ino field is still unsigned long

[PATCH v2 0/2] vfs: follow-on fixes for i_ino widening
 2026-03-13 18:44 UTC 

[PATCH] integrity: Eliminate weak definition of arch_get_secureboot()
 2026-03-13 15:35 UTC  (5+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox