linux-integrity.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2019-01-14 19:39:45 to 2019-01-22 16:38:57 UTC [more...]

[PATCH v2] ima: define ima_post_create_tmpfile() hook and add missing call
 2019-01-22 16:38 UTC  (6+ messages)

[PATCH v5 0/2] let kexec_file_load use platform keyring to verify the kernel image
 2019-01-22 15:37 UTC  (6+ messages)
` [PATCH v5 1/2] integrity, KEYS: add a reference to platform keyring
` [PATCH v5 2/2] kexec, KEYS: Make use of platform keyring for signature verify

Getting weird TPM error after rebasing my tree to security/next-general
 2019-01-22 13:29 UTC  (6+ messages)

[PATCH v2 0/5] Extend TPM PPI interface to support revision 1.3
 2019-01-22 12:10 UTC  (10+ messages)
` [PATCH v2 1/5] tpm: ppi: pass function revision ID to tpm_eval_dsm()
` [PATCH v2 2/5] tpm: ppi: rename TPM_PPI_REVISION_ID to TPM_PPI_REVISION_ID_1
` [PATCH v2 3/5] tpm: ppi: Display up to 101 operations as define for version 1.3
` [PATCH v2 4/5] tpm: ppi: Possibly show command parameter if TPM PPI 1.3 is used
` [PATCH v2 5/5] tpm: ppi: Enable submission of optional command parameter for PPI 1.3

device tree "compatible" string value for Nuvoton TPM 75xxx
 2019-01-21 19:51 UTC  (8+ messages)

[PATCH v7 0/5] tpm: retrieve digest size of unknown algorithms from TPM
 2019-01-21 13:50 UTC  (10+ messages)
` [PATCH v7 5/5] tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()

[PATCH REVIEW 1/2] tpm: provide a way to override the chip returned durations
 2019-01-21 12:29 UTC  (7+ messages)
` [PATCH REVIEW 2/2] tpm_tis: override durations for STM tpm with firmware 1.2.8.28

[PATCH v4 0/2] let kexec_file_load use platform keyring to verify the kernel image
 2019-01-21  9:08 UTC  (12+ messages)
` [PATCH v4 1/2] integrity, KEYS: add a reference to platform keyring
` [PATCH v4 2/2] kexec, KEYS: Make use of platform keyring for signature verify

evm_inode_init_security and module stacking
 2019-01-20 18:54 UTC  (5+ messages)

[LTP][PATCH v3 0/6] LTP IMA fix bundle
 2019-01-20 18:38 UTC  (12+ messages)
` [PATCH v3 1/6] ima/ima_boot_aggregate: Fix the definition of event log
` [PATCH v3 2/6] ima/ima_boot_aggregate: Don't hard code the length of sha1 hash
` [PATCH v3 3/6] ima/ima_boot_aggregate: Fix extending PCRs beyond PCR 0-7
` [PATCH v3 4/6] ima: Code cleanup
` [PATCH v3 5/6] ima: Rename the folder name for policy files to datafiles
` [PATCH v3 6/6] ima/ima_violations: Temporarily remove the printk rate limit

[PATCH v2 0/2] tpm/eventlog/tpm1: Small fixes
 2019-01-19  7:48 UTC  (8+ messages)
` [PATCH 1/2] tpm/eventlog/tpm1: Simplify walking over *pos measurements
` [PATCH 2/2] tpm/eventlog/tpm1: Fix off-by-1 when reading binary_bios_measurements

[RFC PATCH v3] akcipher: Introduce verify_rsa/verify for public key algorithms
 2019-01-18 20:58 UTC 

Add support for the TCG2 event log on UEFI systems
 2019-01-18 15:15 UTC  (7+ messages)
` [PATCH 1/5] tpm: Abstract crypto agile event size calculations
` [PATCH 2/5] tpm: Fix event log types for TPM2

[PATCH,RESEND] selftests: add TPM 2.0 tests
 2019-01-18 15:01 UTC  (3+ messages)

[PATCH 0/5] Extend TPM PPI interface to support revision 1.3
 2019-01-18 15:00 UTC  (15+ messages)
` [PATCH 1/5] tpm: ppi: pass function revision ID to tpm_eval_dsm()
` [PATCH 2/5] tpm: ppi: rename TPM_PPI_REVISION_ID to TPM_PPI_REVISION_1
` [PATCH 3/5] tpm: ppi: Display up to 101 operations as define for version 1.3
` [PATCH 4/5] tpm: ppi: Possibly show command parameter if TPM PPI 1.3 is used
` [PATCH 5/5] tpm: ppi: Enable submission of optional command parameter for PPI 1.3

[PATCH 00/17] Merge text_poke fixes and executable lockdowns
 2019-01-18 13:32 UTC  (42+ messages)
` [PATCH 01/17] Fix "x86/alternatives: Lockdep-enforce text_mutex in text_poke*()"
` [PATCH 02/17] x86/jump_label: Use text_poke_early() during early init
` [PATCH 03/17] x86/mm: temporary mm struct
` [PATCH 04/17] fork: provide a function for copying init_mm
` [PATCH 05/17] x86/alternative: initializing temporary mm for patching
` [PATCH 06/17] x86/alternative: use temporary mm for text poking
` [PATCH 07/17] x86/kgdb: avoid redundant comparison of patched code
` [PATCH 08/17] x86/ftrace: set trampoline pages as executable
` [PATCH 09/17] x86/kprobes: Instruction pages initialization enhancements
` [PATCH 10/17] x86: avoid W^X being broken during modules loading
` [PATCH 11/17] x86/jump-label: remove support for custom poker
` [PATCH 12/17] x86/alternative: Remove the return value of text_poke_*()
` [PATCH 13/17] Add set_alias_ function and x86 implementation
` [PATCH 14/17] mm: Make hibernate handle unmapped pages
` [PATCH 15/17] vmalloc: New flags for safe vfree on special perms
` [PATCH 16/17] Plug in new special vfree flag
` [PATCH 17/17] module: Prevent module removal racing with text_poke()

[PATCH v3 0/2] let kexec_file_load use platform keyring to verify the kernel image
 2019-01-18  2:16 UTC  (10+ messages)
` [PATCH v3 1/2] integrity, KEYS: add a reference to platform keyring
` [PATCH v3 2/2] kexec, KEYS: Make use of platform keyring for signature verify

[PATCH] ovl: IMA Call ima_post_mknod_path() on copy_up'd dentry
 2019-01-17 15:44 UTC  (4+ messages)

[PATCH -next] evm: CHECK-remove set but not used variable 'xattr'
 2019-01-17  8:21 UTC  (3+ messages)
` [PATCH -next] evm: remove "

[PATCH v10 00/17] Remove nested TPM operations
 2019-01-16 21:23 UTC  (18+ messages)
` [PATCH v10 01/17] tpm: use tpm_buf in tpm_transmit_cmd() as the IO parameter
` [PATCH v10 02/17] tpm: fix invalid return value in pubek_show()
` [PATCH v10 03/17] tpm: return 0 from pcrs_show() when tpm1_pcr_read() fails
` [PATCH v10 04/17] tpm: print tpm2_commit_space() error inside tpm2_commit_space()
` [PATCH v10 05/17] tpm: declare struct tpm_header
` [PATCH v10 06/17] tpm: access command header through struct in tpm_try_transmit()
` [PATCH v10 07/17] tpm: encapsulate tpm_dev_transmit()
` [PATCH v10 08/17] tpm: call tpm2_flush_space() on error in tpm_try_transmit()
` [PATCH v10 09/17] tpm: clean up tpm_try_transmit() error handling flow
` [PATCH v10 10/17] tpm: move tpm_validate_commmand() to tpm2-space.c
` [PATCH v10 11/17] tpm: move TPM space code out of tpm_transmit()
` [PATCH v10 12/17] tpm: remove @space from tpm_transmit()
` [PATCH v10 13/17] tpm: use tpm_try_get_ops() in tpm-sysfs.c
` [PATCH v10 14/17] tpm: remove TPM_TRANSMIT_UNLOCKED flag
` [PATCH v10 15/17] tpm: introduce tpm_chip_start() and tpm_chip_stop()
` [PATCH v10 16/17] tpm: take TPM chip power gating out of tpm_transmit()
` [PATCH v10 17/17] tpm: remove @flags from tpm_transmit()

[RFC PATCH 4/4] crypto: Add EC-RDSA algorithm
 2019-01-16 16:19 UTC  (7+ messages)
` [RFC PATCH 0/4] "
  ` [RFC PATCH 2/4] akcipher: Introduce verify2 for public key algorithms

[PATCH v2 0/6] LTP IMA fix bundle
 2019-01-16  2:53 UTC  (11+ messages)
` [PATCH 1/6] ima/ima_boot_aggregate: Fix the definition of event log
` [PATCH 2/6] ima/ima_boot_aggregate: Don't hard code the length of sha1 hash
` [PATCH 3/6] ima/ima_boot_aggregate: Fix extending PCRs beyond PCR 0-7
` [PATCH 4/6] ima: Code cleanup
` [PATCH 5/6] ima: Rename the folder name for policy files to datafiles
` [PATCH 6/6] ima/ima_violations: Temporarily remove the printk rate limit

[RFC PATCH v2 0/2] let kexec_file_load use platform keyring to verify the kernel image
 2019-01-15 16:48 UTC  (8+ messages)
` [RFC PATCH v2 1/2] integrity, KEYS: add a reference to platform keyring
` [RFC PATCH v2 2/2] kexec, KEYS: Make use of platform keyring for signature verify

[RFC PATCH 0/2] let kexec_file_load use platform keyring to verify the kernel image
 2019-01-15 15:17 UTC  (9+ messages)
` [RFC PATCH 2/2] kexec, KEYS: Make use of platform keyring for signature verify

[PATCH 0/6] LTP IMA fix bundle
 2019-01-15 10:50 UTC  (11+ messages)
` [PATCH 2/6] ima/ima_boot_aggregate: Don't hard code the length of sha1 hash
` [PATCH 3/6] ima/ima_boot_aggregate: Fix extending PCRs beyond PCR 0-7
` [PATCH 4/6] ima: Code cleanup
` [PATCH 6/6] ima: Use ima tcb policy files for test

[RFC PATCH 2/4] akcipher: Introduce verify2 for public key algorithms
 2019-01-06 13:36 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).