public inbox for linux-integrity@vger.kernel.org
 help / color / mirror / Atom feed
- recent:[subjects (threaded)|topics (new)|topics (active)]
2026-04-11 20:12 [PATCH] trusted-keys: move pr_fmt out of trusted-type.h
2026-04-11  0:32 [PATCH v2 0/2] tpm_tis: fix retry exhaustion and add logging 3+ messages
2026-04-10 21:13 [PATCH] tpm_tis: Check for an error after exhausting send retires 2+ messages
2026-04-10 18:54 ima: audit log emitted from ima_collect_measurement when SIGKILL interrupts reads from slow-read filesystems
2026-04-10  1:49 [PATCH v1] tpm: restore timeout for key creation commands 2+ messages
2026-04-09 17:20 [PATCH] tpm: Use kfree_sensitive() to free auth session in tpm_dev_release()
2026-04-09 16:07 [PATCH v3] KEYS: trusted: Debugging as a feature 2+ messages
2026-04-08 17:41 [PATCH v2 1/2] integrity: Refactor asymmetric_verify for reusability 3+ messages
2026-04-08 16:43 [PATCH] tpm2-sessions: Fix missing tpm_buf_destroy() in tpm2_read_public() 2+ messages
2026-04-07  6:09 [PATCH] evm: zero-initialize the evm_xattrs read buffer
2026-04-06  0:08 [ima-evm-utils PATCH 2/5] Set size of xattr_value to MAX_SIGNATURE_SIZE 6+ messages
2026-04-05 23:12 [PATCH 0/3] Add support for ML-DSA signature for EVM and IMA 6+ messages
2026-04-02 18:11 [PATCH] tpm: Fix auth session leak in tpm2_get_random() error path 2+ messages
2026-04-01 17:29 [PATCH v5 0/3] Trim N entries of IMA event logs 5+ messages
2026-03-26 17:29 [PATCH v4 01/13] ima: Remove ima_h_table structure 20+ messages
2026-03-25 21:33 [PATCH] evm: Enforce signatures version 3 with new EVM policy 'bit 3' 2+ messages
2026-03-25  0:10 [PATCH] integrity: Allow sigv3 verification on EVM_XATTR_PORTABLE_DIGSIG 4+ messages
2026-03-24 22:03 [ima-evm-utils: PATCH 2/8] Implement support for IMA signatures V3 signing scheme 9+ messages
2026-03-24 21:26 [ima-evm-utils: PATCH] shellcheck: Fix shellcheck v0.11.0 issues detected in fsverity.test
2026-03-24 21:23 [ima-evm-utils: PATCH 1/2] Use EVP_PKEY_free to free a key of public_key_entry 3+ messages
2026-03-24 20:39 [PATCH 1/3] ima: Define asymmetric_verify_v3() to verify IMA sigv3 signatures 8+ messages
2026-03-24 18:12 [RFC v2 0/5] tpm_crb: Add command and response buffer chunking support 6+ messages
2026-03-24 15:39 [PATCH v3] tpm: i2c: atmel: fix block comment formatting 2+ messages
2026-03-24 11:01 [PATCH v2] KEYS: trusted: Debugging as a feature
2026-03-24 11:00 [PATCH v2] KEYS: trusted: Debugging as a feature 5+ messages
2026-03-24 11:00 [PATCH v2] KEYS: trusted: Debugging as a feature 4+ messages
2026-03-24  7:17 [RFC 0/4] tpm_crb: Add command and response buffer chunking support 13+ messages
2026-03-23 13:40 [PATCH v2] tpm: i2c: atmel: fix block comment formatting 2+ messages
2026-03-23  9:00 [PATCH] KEYS: trusted: Protocol debugging as a feature 2+ messages
2026-03-22 19:30 [PATCH] tpm: i2c: atmel: fix block comment formatting 2+ messages
2026-03-22 11:10 [PATCH] ima: abort file hash computation on fatal signal 2+ messages
2026-03-17 16:03 [PATCH 4/4] tpm: Move TPM common base definitions to the command header 11+ messages
2026-03-17 12:02 [zohar-integrity:next-integrity.ima-sigv3-support-1 13/15] security/integrity/evm/evm_main.c:267:22: error: too many arguments to function 'integrity_digsig_verify'
2026-03-17  9:16 [zohar-integrity:next-integrity.ima-sigv3-support-1 13/15] security/integrity/evm/evm_main.c:270:6: error: too many arguments to function call, expected 5, have 6
2026-03-16 19:02 [PATCH v3 0/2] vfs: follow-on fixes for i_ino widening 4+ messages
2026-03-13 18:45 [PATCH v2 0/2] vfs: follow-on fixes for i_ino widening 8+ messages
2026-03-13 18:44 [PATCH v2 0/2] vfs: follow-on fixes for i_ino widening
2026-03-13 14:31 [PATCH] tpm: fix tpm disabling if NULL name changes 2+ messages
2026-03-12  9:35 [PATCH] integrity: Fix spelling mistake TRUSTED_KEYRING
2026-03-12  5:39 [PATCH] ima: remove buggy support for asynchronous hashes 4+ messages
2026-03-11 17:19 [PATCH v3 1/3] ima: Remove ima_h_table structure 12+ messages
2026-03-10 17:40 [PATCH v6] ima_fs: Correctly create securityfs files for unsupported hash algos 2+ messages
2026-03-10 11:43 [PATCH 0/2] vfs: follow-on fixes for i_ino widening 7+ messages
2026-03-09 20:37 [PATCH] integrity: Eliminate weak definition of arch_get_secureboot() 5+ messages
2026-03-06 19:01 [PATCH] ima: detect file change code cleanup 2+ messages
2026-03-06 15:03 [PATCH] integrity: avoid using __weak functions 5+ messages
2026-03-05  9:31 [PATCH v3 0/8] module: Move 'struct module_signature' to UAPI 13+ messages
2026-03-05  7:11 [PATCH v2 0/8] module: Move 'struct module_signature' to UAPI 9+ messages
2026-03-04 15:32 [PATCH v3 00/12] vfs: change inode->i_ino from unsigned long to u64 31+ messages
2026-03-02 20:23 [PATCH v2 000/110] vfs: change inode->i_ino from unsigned long to u64 177+ messages
2026-03-02 12:42 [PATCH 0/8] modules: Move 'struct module_signature' to UAPI 12+ messages
2026-03-01  2:02 FAILED: Patch "ima: verify the previous kernel's IMA buffer lies in addressable RAM" failed to apply to 5.10-stable tree
2026-03-01  1:52 FAILED: Patch "ima: verify the previous kernel's IMA buffer lies in addressable RAM" failed to apply to 5.15-stable tree
2026-03-01  1:43 FAILED: Patch "ima: verify the previous kernel's IMA buffer lies in addressable RAM" failed to apply to 6.1-stable tree
2026-03-01  1:34 FAILED: Patch "ima: verify the previous kernel's IMA buffer lies in addressable RAM" failed to apply to 6.6-stable tree
2026-03-01  1:23 FAILED: Patch "ima: verify the previous kernel's IMA buffer lies in addressable RAM" failed to apply to 6.12-stable tree
2026-02-27 12:06 [PATCH v2] ima: Define and use a digest_size field in the ima_algo_desc structure
2026-02-27  6:23 [PATCH] integrity: digsig: Add blank line after declarations 2+ messages
2026-02-26 15:55 [PATCH 00/61] vfs: change inode->i_ino from unsigned long to u64 101+ messages
2026-02-26  7:20 [PATCH 2/2] powerpc/ima: Drop unnecessary check for CONFIG_MODULE_SIG 4+ messages
2026-02-26  1:39 [PATCH] dm-ima: use SHA-256 library
2026-02-25 12:53 [PATCH] ima: Add digest_size field to ima_algo_desc structure and use to show meas. 4+ messages
2026-02-23 15:55 [PATCH v1] tpm_crb: Convert ACPI driver to a platform one 2+ messages
2026-02-23 14:56 [PATCH v5] ima_fs: Avoid creating measurement lists for unsupported hash algos 7+ messages
2026-02-20 19:54 [PATCH] lsm: move inode IS_PRIVATE checks to individual LSMs 6+ messages
2026-02-20 18:34 [PATCH v2 0/2] move TPM-specific fields into trusted_tpm_options 10+ messages
2026-02-16 11:04 [PATCH] tpm: Make tcpci_pm_ops variable static const 2+ messages
2026-02-13 17:49 [PATCH v2] ima: fallback to using i_version to detect file change 3+ messages
2026-02-13  1:28 [PATCH v3 0/3] Make detecting the secure boot status integrity-wide 10+ messages
2026-02-12 20:11 [PATCH] ima: fallback to using i_version
2026-02-12  1:09 [PATCH AUTOSEL 6.19-5.15] char: tpm: cr50: Remove IRQF_ONESHOT
2026-02-10 14:54 [GIT PULL] integrity: subsystem updates for v7.0 2+ messages
2026-02-09 21:21 [PATCH v6 1/3] ima: Unify vfs_getattr_nosec() stat comparisons under helper function 6+ messages
2026-02-06 10:37 IMA vs TPM (SPI) boot order problems 3+ messages
2026-02-05 23:58 [PATCH v4 0/1] Trim N entries of IMA event logs 4+ messages
2026-02-03  4:14 [PATCH v2 0/3] Make detecting the secure boot status integrity-wide 7+ messages
2026-02-03  0:46 [GIT PULL] TPM DEVICE DRIVER: tpmdd-next-7.0-rc1 2+ messages
2026-02-02 20:44 [RFC PATCH v2] media: Virtual camera driver 23+ messages
2026-02-01 13:59 [PATCH v6 0/6] Extend "trusted" keys to support a new trust source named the PowerVM Key Wrapping Module (PKWM) 11+ messages
2026-02-01  2:40 [PATCH] ima: check return value of crypto_shash_final() in boot aggregate 3+ messages
2026-01-31 18:22 [PATCH] evm: check return values of crypto_shash functions 9+ messages
2026-01-30 22:39 [PATCH v5 0/3] ima: Detect changes to files via kstat changes rather than i_version 10+ messages
2026-01-29 18:07 [PATCH v4] ima: Fallback to ctime check for FS without kstat.change_cookie 4+ messages
2026-01-28 12:58 [PATCH] ima_setup.sh: Fix signed policy requirement check 3+ messages
2026-01-28  9:55 [PATCH v2 09/20] char: tpm: cr50: Remove IRQF_ONESHOT
2026-01-27 15:03 [PATCH v4] ima_fs: Avoid creating measurement lists for unsupported hash algos 4+ messages
2026-01-27 14:52 [PATCH v5 0/6] Extend "trusted" keys to support a new trust source named the PowerVM Key Wrapping Module (PKWM) 8+ messages
2026-01-27 14:21 [PATCH v3] ima_fs: Avoid creating measurement lists for unsupported hash algos 2+ messages
2026-01-27 14:18 [PATCH v2] ima_fs: Avoid creating measurement lists for unsupported hash algos 4+ messages
2026-01-27  3:05 [PATCH] ima_fs: Avoid creating measurement lists for unsupported hash algos 5+ messages
2026-01-26 20:58 [ANN] Linux Security Summit 2026 CfP
2026-01-25 19:25 [PATCH v9 00/11] Streamline TPM2 HMAC sessions 26+ messages
2026-01-25 17:14 [GIT PULL] KEYS: trusted: keys-trusted-next-6.19-rc7 2+ messages
2026-01-23 17:43 IMA and PQC 21+ messages
2026-01-23 16:55 [PATCH 1/2] keys/trusted_keys: fix handle passed to tpm_buf_append_name during unseal 6+ messages
2026-01-23 11:36 [PATCH 09/21] char: tpm: cr50: Remove IRQF_ONESHOT 4+ messages
2026-01-22 16:49 [PATCH v3] ima: Fallback to ctime check for FS without kstat.change_cookie 2+ messages
2026-01-22  8:07 [PATCH] evm: Use ordered xattrs list to calculate HMAC in evm_init_hmac() 2+ messages
2026-01-21  8:33 [PATCH] ima_setup.sh: Fix check of signed policy requirement 4+ messages
2026-01-21  7:43 [PATCH] efi: Mark UEFI skip cert quirks list as __initconst
2026-01-20 20:20 [PATCH v2] ima: Fallback to ctime check for FS without kstat.change_cookie 5+ messages
2026-01-15 10:04 [PATCH v4 0/6] Extend "trusted" keys to support a new trust source named the PowerVM Key Wrapping Module (PKWM) 14+ messages
2026-01-15  0:43 [PATCH 0/3] Make detecting the secure boot status integrity-wide 23+ messages
2026-01-14 17:23 [PATCH v2] tpm2-sessions: Fix out of range indexing in name_size
2026-01-13 14:38 [PATCH] tpm/tpm_ftpm_tee: Fix kdoc after function renames 7+ messages
2026-01-13 12:28 [PATCH v4 02/17] powerpc/ima: Drop unnecessary check for CONFIG_MODULE_SIG 77+ messages
2026-01-12 22:32 [PATCH] ima: Detect changes to files via kstat changes rather than i_version 6+ messages
2026-01-08 12:31 [PATCH] tpm2-sessions: Fix out of range indexing in name_size 4+ messages
2026-01-07 16:15 [PATCH] tpm: Cap the number of PCR banks
2026-01-07 15:57 [PATCH 1/2] ima_kexec.sh: Detect kernel image 5+ messages
2026-01-06 15:05 [PATCH v3 0/6] Extend "trusted" keys to support a new trust source named the PowerVM Key Wrapping Module (PKWM) 10+ messages
2026-01-06  2:07 [PATCH v3 0/1] Trim N entries of IMA event logs 6+ messages
2025-12-30  1:40 [PATCH v2 1/2] dt-bindings: tpm: Add st,st33tphf2ei2c 3+ messages
2025-12-29 17:52 [PATCH RFC] ima: Fallback to a ctime guard without i_version updates 12+ messages
2025-12-26 12:09 [PATCH] tpm: st33zp24: Fix missing cleanup on get_burstcount() error 2+ messages
2025-12-26 11:35 [PATCH] tpm: tpm_tis_spi: Initialize ret variable in tpm_tis_spi_transfer_half() 2+ messages
2025-12-26 11:12 [PATCH] tpm: tpm2-space: Skip handle check when context load returns -ENOENT 2+ messages
2025-12-26 10:23 [PATCH] tpm: tpm_i2c_infineon: Fix locality leak on get_burstcount() failure 2+ messages
2025-12-19 19:54 [PATCH] ima: Fix stack-out-of-bounds in is_bprm_creds_for_exec() 8+ messages
2025-12-18 10:31 [PATCH] integrity: Fix spelling mistake TRUSTED_KEYRING
2025-12-17 17:24 [PATCH v2 0/6] Extend "trusted" keys to support a new trust source named the PowerVM Key Wrapping Module (PKWM) 14+ messages
2025-12-16  9:21 [PATCH v8 00/12] Streamline TPM2 HMAC sessions 25+ messages
2025-12-16  7:44 [PATCH v7 00/12] Streamline TPM2 HMAC sessions 14+ messages
2025-12-16  1:48 [PATCHv3 1/2] kernel/kexec: Change the prototype of kimage_map_segment() 3+ messages
2025-12-15 23:49 [PATCH v3] KEYS: trusted: Use get_random-fallback for TPM
2025-12-15 23:32 [PATCH v15 01/28] tpm: Initial step to reorganize TPM public headers 80+ messages
2025-12-15 23:14 [PATCH v2] KEYS: trusted: Use get_random-fallback for TPM 3+ messages
2025-12-15 14:16 [PATCH v2 00/17] tee: Use bus callbacks instead of driver callbacks 19+ messages
2025-12-14 21:32 [PATCH] KEYS: trusted: Use get_random-fallback for TPM 13+ messages
2025-12-14 15:37 [PATCH v6 00/11]  Streamline TPM2 HMAC sessions 14+ messages
2025-12-13 20:32 [PATCH v5 00/12] Streamline TPM2 HMAC sessions 13+ messages
2025-12-13  5:26 [PATCH 0/6] Extend "trusted" keys to support a new trust source named the PowerVM Key Wrapping Module (PKWM) 10+ messages
2025-12-12 17:19 [RFC][PATCH v2] ima: Add support for staging measurements for deletion and trimming 11+ messages
2025-12-11 20:29 xfs/ima: Regression caching i_version 6+ messages
2025-12-11 17:14 [PATCH v1 00/17] tee: Use bus callbacks instead of driver callbacks 18+ messages
2025-12-11 11:10 [PATCH] ima_violations.sh: Another fix of condition evaluation 5+ messages
2025-12-10 23:53 [PATCH v2 0/1] Trim N entries of IMA event logs 10+ messages
2025-12-10 17:20 [PATCH v4 0/8] Streamline TPM2 HMAC sessions 9+ messages
2025-12-10 14:39 [PATCH v3 0/7] Streamline TPM2 HMAC sessions 8+ messages
2025-12-09 18:55 [PATCH v4 1/4] shell: Add tst_runas.c helper 11+ messages
2025-12-09 10:17 [RFC][PATCH] ima: Add support for staging measurements for deletion 12+ messages
2025-12-09 10:05 [PATCH v2 0/5] Streamline TPM2 HMAC sessions 10+ messages
2025-12-09  7:38 [PATCH 0/4] Streamline TPM2 HMAC sessions 6+ messages
2025-12-09  7:11 [PATCH] KEYS: trusted: Don't use 'buf->handles'
2025-12-08 14:54 [PATCH] KEYS: trusted: Fix overwrite of keyhandle parameter 2+ messages
2025-12-08 14:13 [PATCH] ima_selinux: Fix requirements 3+ messages
2025-12-08  5:06 [PATCH v7 0/3] Optimize tpm2_read_public() calls 5+ messages
2025-12-07 18:17 Static values for TPM 1.2 command durations
2025-12-07 17:32 [PATCH v6 0/2] Optimize tpm2_read_public() calls 6+ messages
2025-12-06 16:13 [PATCH v5 0/2] Optimize tpm2_read_public() calls 3+ messages
2025-12-06 11:31 [PATCH 0/3] Implement managed allocations 5+ messages
2025-12-05 15:19 [PATCH v4 0/4] Optimize tpm2_read_public() calls 5+ messages
2025-12-05  5:51 [GIT PULL] TPM DEVICE DRIVER: tpmdd-sessions-next-6.19-rc1 2+ messages
2025-12-05  4:00 [PATCH v3 0/2] KEYS: trusted: Optimize tpm2_read_public() calls 3+ messages
2025-12-05  3:02 [PATCH v2 0/2] KEYS: trusted: Optimize tpm2_read_public() calls 5+ messages
2025-12-04 22:31 [PATCH] KEYS: trusted: Re-orchestrate tpm2_read_public() calls 6+ messages
2025-12-04 19:47 [PATCH v4 0/4] tpm2-sessions: Fixes for v6.19-rc2 5+ messages
2025-12-03 22:12 [PATCH v3 0/4] tpm2-sessions: Fixes for v6.19-rc2 9+ messages
2025-12-03 21:18 [GIT PULL] TPM DEVICE DRIVER: tpmdd-next-6.19-rc1-v4 2+ messages
2025-12-02 23:28 [PATCH 0/1] Trim N entries of IMA event logs 12+ messages
2025-12-02 21:55 [GIT PULL] integrity: subsystem updates for v6.19 2+ messages
2025-12-02 20:26 [PATCH v2 0/4] tpm2-sessions: Fixes aime for v6.19-rc2 5+ messages
2025-12-02 19:10 Re: [PATCH] x86/kexec: Add a sanity check on previous kernel's ima kexec buffer
2025-12-01 23:38 [GIT PULL] TPM DEVICE DRIVER: tpmdd-next-6.19-rc1-v3 2+ messages
2025-12-01 22:45 [PATCH 0/4] tpm2-sessions: Fixes for v6.19 7+ messages
2025-12-01 19:39 [PATCH v3] tpm2-sessions: address out-of-range indexing 4+ messages
2025-12-01 16:55 [PATCH] tpm2-sessions: Fix tpm2_read_public range checks
2025-11-30 21:35 [PATCH v2] tpm2-sessions: address out-of-range indexing
2025-11-30 21:18 [PATCH] tpm2-sessions: address out-of-range indexing
2025-11-29 21:09 [GIT PULL] KEYS: trusted: keys-trusted-next-rc1 2+ messages
2025-11-28 16:40 [GIT PULL] TPM DEVICE DRIVER: tpmdd-next-6.19-rc1-v2
2025-11-28  2:53 [PATCH v9 0/8] Prepare TPM driver for Trenchboot 11+ messages
2025-11-27 22:36 [GIT PULL] KEYS: keys-next-6.19-rc1 2+ messages
2025-11-27 22:26 [GIT PULL] TPM DEVICE DRIVER: tpmdd-next-6.19-rc1 4+ messages
2025-11-27 21:41 [PATCH v8 00/11] Prepare TPM driver for Trenchboot 12+ messages
2025-11-27 17:02 [PATCH] tpm: Remove tpm_find_get_ops 2+ messages
2025-11-27 13:54 [PATCH v7 00/11] Prepare TPM driver for Trenchboot 27+ messages
2025-11-27  8:26 [PATCH v3 0/4] tst_sudo.c, ima_{conditionals, measurements}.sh enhancements 8+ messages
2025-11-25 11:55 Re: [RFC][PATCH] exec: Move cred computation under exec_update_lock 11+ messages
2025-11-25  2:30 [PATCH 1/1] tpm_crb: Fix a spelling mistake 2+ messages
2025-11-23 11:18 [PATCH] selftests: tpm2: Fix ill defined assertions 2+ messages
2025-11-21 15:21 [PATCH v2 1/4] shell: Add tst_sudo.c helper 5+ messages
2025-11-20  7:18 [PATCH -next] ima: Handle error code returned by ima_filter_rule_match() 3+ messages
2025-11-19 22:41 [PATCH 15/44] drivers/char/tpm: use min() instead of min_t() 7+ messages
2025-11-19 21:33 [RFC v1 0/1] Implement IMA Event Log Trimming 10+ messages
2025-11-13 21:55 [PATCH v2] KEYS: encrypted: Replace deprecated strcpy and improve get_derived_key 3+ messages
2025-11-13 13:58 [PATCH] KEYS: encrypted: Replace deprecated strcpy and improve get_derived_key 4+ messages
2025-11-13 12:35 [PATCH] KEYS: encrypted: Use pr_fmt() 4+ messages
2025-11-06 18:14 [Patch V1] ima: avoid duplicate policy rules insertions 10+ messages
2025-11-06  6:59 [PATCHv2 1/2] kernel/kexec: Change the prototype of kimage_map_segment() 20+ messages
2025-11-04 13:13 [PATCH] Documentation: tpm: tpm-security: Demote "Null Primary Key Certification in Userspace" section 9+ messages
2025-10-31  8:09 [PATCH] module: Only declare set_module_sig_enforced when CONFIG_MODULE_SIG=y 7+ messages
2025-10-28 13:22 [PATCH] KEYS: Remove the ad-hoc compilation flag CAAM_DEBUG 4+ messages
2025-10-17 20:24 [PATCH v5 0/34] Rework the LSM initialization 43+ messages
2025-09-30  2:26 [PATCH v2 1/2] evm: fix security.evm for a file with IMA signature 4+ messages
2025-09-28  3:03 [PATCH] ima: Fall back to default kernel module signature verification 42+ messages
2025-05-21 17:47 [syzbot] [integrity?] [lsm?] INFO: task hung in process_measurement (3) 2+ messages
2025-04-29 13:04 [PATCH v3 1/9] powerpc/ima: Drop unnecessary check for CONFIG_MODULE_SIG 33+ messages
2025-02-25 13:12 [RFC][PATCH] ima: add measurement for first unverified write on ima policy file 18+ messages
2024-05-31  1:03 [PATCH v9 03/19] x86: Secure Launch Kconfig 116+ messages

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox