messages from 2019-03-07 20:25:30 to 2019-03-25 11:57:47 UTC [more...]
INFO: task hung in process_measurement
2019-03-25 11:57 UTC (3+ messages)
[PATCH v4a 1/2] selftests/kexec: make tests independent of IMA being enabled
2019-03-25 8:09 UTC (3+ messages)
` [PATCH v4a 2/2] selftests/kexec: testing CONFIG_KEXEC_BZIMAGE_VERIFY_SIG is not enough
[PATCH v3] ima-evm-utils: Convert sign v2 from RSA to EVP_PKEY API
2019-03-23 2:56 UTC
[PATCH v3] ima-evm-utils: Rework openssl init
2019-03-23 2:16 UTC
[PATCH 0/2] ima-evm-utils: rebase of digest algo resolving
2019-03-23 1:41 UTC (3+ messages)
` [PATCH 1/2] ima-evm-utils: Extract digest algorithms from hash_info.h
` [PATCH 2/2] ima-evm-utils: try to load digest by its alias
[PATCH v2] ima-evm-utils: rework openssl init
2019-03-23 1:25 UTC (4+ messages)
[PATCH v2 0/5] RFC: Linux IMA on NFS prototype
2019-03-22 22:55 UTC (11+ messages)
` [PATCH v2 3/5] NFSD: Remove ima_file_check call
[PATCH v7 00/11] crypto: add EC-RDSA (GOST 34.10) algorithm
2019-03-22 22:41 UTC (12+ messages)
` [PATCH v7 02/11] crypto: akcipher - check the presence of callback before the call
` [PATCH v7 03/11] crypto: rsa - unimplement sign/verify for raw RSA backends
` [PATCH v7 05/11] KEYS: do not kmemdup digest in {public,tpm}_key_verify_signature
` [PATCH v7 11/11] integrity: support EC-RDSA signatures for asymmetric_verify
Adding cmldine args measure to ima
2019-03-22 20:36 UTC (2+ messages)
[PATCH] KEYS: trusted: defer execution of TPM-specific code until key instantiate
2019-03-22 18:49 UTC (2+ messages)
Portable Executable (PE) Signature Validation and Measurement for KEXEC system call using IMA
2019-03-22 17:39 UTC
[PATCH RESEND v3] tpm: fix an invalid condition in tpm_common_poll
2019-03-22 15:59 UTC (2+ messages)
[PATCH v3] tpm: fix an invalid condition in tpm_common_poll
2019-03-22 11:34 UTC (3+ messages)
[PATCH v2 1/8] evmtest: Regression testing integrity subsystem
2019-03-22 12:18 UTC (9+ messages)
` [PATCH v2 2/8] evmtest: test loading IMA policies
` [PATCH v2 3/8] evmtest: test kernel module loading
` [PATCH v2 4/8] evmtest: test kexec signature policy
` [PATCH v2 5/8] evmtest: validate boot record
` [PATCH v2 6/8] evmtest: test the preservation of extended attributes
` [PATCH v2 7/8] emvtest: Add ability to run all tests
` [PATCH v2 8/8] evmtest: virtual machine compatibility
[PATCH] tpm: turn on TPM on suspend for TPM 1.x
2019-03-22 10:51 UTC
Should mprotect(..., PROT_EXEC) be checked by IMA?
2019-03-22 7:59 UTC (15+ messages)
[PATCH v2] tpm: fix an invalid condition in tpm_common_poll
2019-03-21 14:04 UTC (7+ messages)
[PATCH 0/6] security/keys/encrypted: Break module dependency chain
2019-03-21 13:48 UTC (8+ messages)
` [PATCH 5/6] security/integrity/evm: Drop direct dependency on key_type_encrypted
Regression in suspend-to-ram (TPM related) with 5.1-rc1
2019-03-21 13:41 UTC (4+ messages)
` Regression in suspend-to-ram (TPM related) with 5.1-rc1 (BISECTED)
[PATCH] tpm: fix a race between poll and write in tpm-dev-common
2019-03-21 13:34 UTC (5+ messages)
[PATCH v10, RESEND 0/6] tpm: retrieve digest size of unknown algorithms from TPM
2019-03-21 13:25 UTC (5+ messages)
` [PATCH v10, RESEND 5/6] KEYS: trusted: explicitly use tpm_chip structure from tpm_default_chip()
[PATCH ghak109 V1] audit: link integrity evm_write_xattrs record to syscall event
2019-03-21 1:03 UTC (4+ messages)
[PATCH v4 0/8] selftests/kexec: add kexec tests
2019-03-20 12:03 UTC (12+ messages)
` [PATCH v4 1/8] selftests/kexec: move the IMA kexec_load selftest to selftests/kexec
` [PATCH v4 2/8] selftests/kexec: cleanup the kexec selftest
` [PATCH v4 3/8] selftests/kexec: define a set of common functions
` [PATCH v4 4/8] selftests/kexec: define common logging functions
` [PATCH v4 5/8] kselftest/kexec: define "require_root_privileges"
` [PATCH v4 6/8] selftests/kexec: kexec_file_load syscall test
` [PATCH v4 7/8] selftests/kexec: Add missing '=y' to config options
` [PATCH v4 8/8] selftests/kexec: check kexec_load and kexec_file_load are enabled
Kernel 5.0 regression in /dev/tpm0 access
2019-03-20 9:58 UTC (11+ messages)
[PATCH] kexec: Allow kexec_file() with appropriate IMA policy when locked down
2019-03-19 2:47 UTC (2+ messages)
[RFC] kexec: Allow kexec_file() with appropriate IMA policy when locked down
2019-03-18 19:51 UTC (13+ messages)
[openssl-tpm2-engine] tpm sessions
2019-03-18 18:19 UTC
Add support for TCG2 log format on UEFI systems
2019-03-15 11:47 UTC (4+ messages)
[PATCH v3 0/7] selftests/ima: add kexec and kernel module tests
2019-03-14 18:38 UTC (14+ messages)
` [PATCH v3 1/7] selftests/ima: cleanup the kexec selftest
` [PATCH v3 2/7] selftests/ima: define a set of common functions
` [PATCH v3 3/7] selftests/ima: define common logging functions
` [PATCH v3 4/7] kselftest/ima: define "require_root_privileges"
` [PATCH v3 5/7] selftests/ima: kexec_file_load syscall test
` [PATCH v3 6/7] selftests/ima: loading kernel modules
` [PATCH v3 7/7] selftests/ima: Add missing '=y' to config options
[PATCH] tpm: Make timeout logic simpler and more robust
2019-03-13 13:23 UTC (18+ messages)
[PATCH 0/3] selftest/ima: fail kexec_load syscall
2019-03-11 19:20 UTC (12+ messages)
` [PATCH 3/3] x86/ima: retry detecting secure boot mode
[PATCH] secuirty: integrity: ima: pedantic formatting
2019-03-11 13:44 UTC
[PATCH v2 0/5] selftests/ima: add kexec and kernel module tests
2019-03-11 11:49 UTC (9+ messages)
` [PATCH v2 4/5] selftests/ima: kexec_file_load syscall test
` [PATCH v2 5/5] selftests/ima: loading kernel modules
[PATCH v2] ima-evm-utils: simplify digest alias handling
2019-03-11 0:04 UTC (5+ messages)
[PATCH] selftests/ima: Add missing '=y' to config options
2019-03-10 17:48 UTC (2+ messages)
[RFC PATCH v2] ima-evm-utils: convert sign v2 from RSA to EVP_PKEY API
2019-03-08 21:49 UTC (2+ messages)
[PATCH 0/3] selftest/ima: add kexec_file_load test
2019-03-08 13:45 UTC (6+ messages)
` [PATCH 2/3] scripts/ima: define a set of common functions
[PATCH v2] x86/ima: require signed kernel modules
2019-03-07 22:45 UTC (6+ messages)
Allow trusted filesystems to provide IMA hashes directly
2019-03-07 22:41 UTC (22+ messages)
` [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
[PATCH v2 10/20] x86: avoid W^X being broken during modules loading
2019-03-07 20:25 UTC (11+ messages)
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).