Linux-Integrity Archive on lore.kernel.org
 help / color / Atom feed
[PATCH v1] selftest/trustedkeys: TPM 1.2 trusted keys test
 2019-10-24 19:14 UTC  - mbox.gz / Atom

[PATCH] ima: skip verifying TPM 2.0 PCR values
 2019-10-24 19:14 UTC  (7+ messages) - mbox.gz / Atom
    ` [LTP] "

[PATCH] tpm: Switch to platform_get_irq_optional()
 2019-10-24 19:11 UTC  (12+ messages) - mbox.gz / Atom

[PATCH v8] tpm_crb: fix fTPM on AMD Zen+ CPUs
 2019-10-24 19:02 UTC  (6+ messages) - mbox.gz / Atom

[PATCH v9 0/8] powerpc: Enabling IMA arch specific secure boot policies
 2019-10-24 17:48 UTC  (15+ messages) - mbox.gz / Atom
` [PATCH v9 1/8] powerpc: detect the secure boot mode of the system
` [PATCH v9 2/8] powerpc/ima: add support to initialize ima policy rules
` [PATCH v9 3/8] powerpc: detect the trusted boot state of the system
` [PATCH v9 4/8] powerpc/ima: define trusted boot policy
` [PATCH v9 5/8] ima: make process_buffer_measurement() generic
` [PATCH v9 6/8] certs: add wrapper function to check blacklisted binary hash
` [PATCH v9 7/8] ima: check against blacklisted hashes for files with modsig
` [PATCH v9 8/8] powerpc/ima: update ima arch policy to check for blacklist

Measure ima policy
 2019-10-24  1:27 UTC  - mbox.gz / Atom

[PATCH v2 0/4] KEYS: measure keys when they are created or updated
 2019-10-23 23:39 UTC  (5+ messages) - mbox.gz / Atom
` [PATCH v2 1/4] KEYS: Defined an ima hook for measuring keys on key create or update
` [PATCH v2 2/4] KEYS: Queue key for measurement if ima is not initialized. Measure queued keys when ima is initialized
` [PATCH v2 3/4] KEYS: Added BUILTIN_TRUSTED_KEYS enum to measure keys added to builtin_trusted_keys keyring
` [PATCH v2 4/4] KEYS: Enabled ima policy "

[PATCH v1 0/6] KEYS: measure keys when they are created or updated
 2019-10-23 18:49 UTC  (16+ messages) - mbox.gz / Atom
` [PATCH v1 1/6] KEYS: Helper function to check if the given keyring is builtin_trusted_keys
` [PATCH v1 2/6] KEYS: ima: Refactored process_buffer_measurement function so that it can measure any buffer (and not just KEXEC_CMDLINE one)
` [PATCH v1 3/6] KEYS: ima hook to measure builtin_trusted_keys
` [PATCH v1 4/6] KEYS: ima functions to queue and dequeue keys to measure
` [PATCH v1 5/6] KEYS: measure queued keys
` [PATCH v1 6/6] KEYS: measure keys when they are created or updated

[PATCH] ima-evm-utils: add support for tpm2-tools to read the TPM 2.0 PCRs
 2019-10-23 13:23 UTC  - mbox.gz / Atom

[Patch v8 0/4] Create and consolidate trusted keys subsystem
 2019-10-23 11:49 UTC  (7+ messages) - mbox.gz / Atom
` [Patch v8 1/4] tpm: Move tpm_buf code to include/linux/
` [Patch v8 2/4] KEYS: Use common tpm_buf for trusted and asymmetric keys
` [Patch v8 3/4] KEYS: trusted: Create trusted keys subsystem
` [Patch v8 4/4] KEYS: trusted: Move TPM2 trusted keys code

[PATCH v8 0/8] powerpc: Enabling IMA arch specific secure boot policies
 2019-10-22 23:38 UTC  (18+ messages) - mbox.gz / Atom
` [PATCH v8 1/8] powerpc: detect the secure boot mode of the system
` [PATCH v8 2/8] powerpc/ima: add support to initialize ima policy rules
` [PATCH v8 3/8] powerpc: detect the trusted boot state of the system
` [PATCH v8 4/8] powerpc/ima: add measurement rules to ima arch specific policy
` [PATCH v8 5/8] ima: make process_buffer_measurement() generic
` [PATCH v8 6/8] certs: add wrapper function to check blacklisted binary hash
` [PATCH v8 7/8] ima: check against blacklisted hashes for files with modsig
` [PATCH v8 8/8] powerpc/ima: update ima arch policy to check for blacklist

[PATCH] selftest/trustedkeys: TPM 1.2 trusted keys test
 2019-10-22 14:43 UTC  (5+ messages) - mbox.gz / Atom

[bug report] tpm: add support for nonblocking operation
 2019-10-22 13:15 UTC  - mbox.gz / Atom

[PATCH V4 0/2] Add support for arm64 to carry ima measurement
 2019-10-21 17:38 UTC  (8+ messages) - mbox.gz / Atom

[PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
 2019-10-21 11:39 UTC  (26+ messages) - mbox.gz / Atom

[PATCH v7 0/8] powerpc: Enabling IMA arch specific secure boot policies
 2019-10-19 18:30 UTC  (16+ messages) - mbox.gz / Atom
` [PATCH v7 1/8] powerpc: detect the secure boot mode of the system
` [PATCH v7 2/8] powerpc: add support to initialize ima policy rules
` [PATCH v7 3/8] powerpc: detect the trusted boot state of the system
` [PATCH v7 4/8] powerpc/ima: add measurement rules to ima arch specific policy
` [PATCH v7 7/8] ima: check against blacklisted hashes for files with modsig

[PATCH v0 0/1] ima: Refactor process_buffer_measurement() to make it generic
 2019-10-19 18:13 UTC  (3+ messages) - mbox.gz / Atom
` [PATCH v0 1/1] "

[PATCH AUTOSEL 4.4 12/21] efi/cper: Fix endianness of PCIe class code
 2019-10-18 22:09 UTC  (2+ messages) - mbox.gz / Atom
` [PATCH AUTOSEL 4.4 13/21] efi/x86: Do not clean dummy variable in kexec path

[PATCH AUTOSEL 4.9 17/29] efi/cper: Fix endianness of PCIe class code
 2019-10-18 22:09 UTC  (2+ messages) - mbox.gz / Atom
` [PATCH AUTOSEL 4.9 18/29] efi/x86: Do not clean dummy variable in kexec path

[PATCH AUTOSEL 4.14 37/56] efi/cper: Fix endianness of PCIe class code
 2019-10-18 22:07 UTC  (2+ messages) - mbox.gz / Atom
` [PATCH AUTOSEL 4.14 38/56] efi/x86: Do not clean dummy variable in kexec path

[PATCH AUTOSEL 4.19 075/100] efi/cper: Fix endianness of PCIe class code
 2019-10-18 22:05 UTC  (2+ messages) - mbox.gz / Atom
` [PATCH AUTOSEL 4.19 076/100] efi/x86: Do not clean dummy variable in kexec path

[PATCH AUTOSEL 5.3 48/89] efi/cper: Fix endianness of PCIe class code
 2019-10-18 22:02 UTC  (2+ messages) - mbox.gz / Atom
` [PATCH AUTOSEL 5.3 49/89] efi/x86: Do not clean dummy variable in kexec path

[PATCH v0] KEYS: Security LSM Hook for key_create_or_update
 2019-10-18 20:38 UTC  (3+ messages) - mbox.gz / Atom

[PATCH v3] tpm/tpm_ftpm_tee: add shutdown call back
 2019-10-17 18:06 UTC  (3+ messages) - mbox.gz / Atom

[PATCH] tpm: Salt tpm_get_random() result with get_random_bytes()
 2019-10-17 16:21 UTC  (10+ messages) - mbox.gz / Atom

[PATCH v3] x86, efi: never relocate kernel below lowest acceptable address
 2019-10-16 23:25 UTC  (8+ messages) - mbox.gz / Atom

[PATCH 4.19 49/81] efivar/ssdt: Dont iterate over EFI vars if no SSDT override was specified
 2019-10-16 21:51 UTC  - mbox.gz / Atom

[PATCH 5.3 062/112] efivar/ssdt: Dont iterate over EFI vars if no SSDT override was specified
 2019-10-16 21:50 UTC  (4+ messages) - mbox.gz / Atom
` [PATCH 5.3 063/112] efi/tpm: Dont access event->count when it isnt mapped
` [PATCH 5.3 064/112] efi/tpm: Dont traverse an event log with no events
` [PATCH 5.3 065/112] efi/tpm: Only set efi_tpm_final_log_size after successful event log parsing

[PATCH 4.14 43/65] efivar/ssdt: Dont iterate over EFI vars if no SSDT override was specified
 2019-10-16 21:50 UTC  - mbox.gz / Atom

[PATCH 4.9 76/92] efivar/ssdt: Dont iterate over EFI vars if no SSDT override was specified
 2019-10-16 21:50 UTC  - mbox.gz / Atom

[PATCH v0 0/1] KEYS: LSM Hook for key_create_or_update
 2019-10-16 16:41 UTC  (5+ messages) - mbox.gz / Atom
` [PATCH v0 1/1] "

[PATCH v2] tpm/tpm_ftpm_tee: add shutdown call back
 2019-10-16 16:31 UTC  (3+ messages) - mbox.gz / Atom

[PATCH v7 0/6] tpm: Add driver for cr50
 2019-10-16 15:27 UTC  (6+ messages) - mbox.gz / Atom

[PATCH] efi/tpm: return -EINVAL when determining tpm final events log size fails
 2019-10-16 10:56 UTC  (2+ messages) - mbox.gz / Atom

[PATCH v4 0/4] powerpc: expose secure variables to the kernel and userspace
 2019-10-15  8:34 UTC  (5+ messages) - mbox.gz / Atom
` [PATCH v4 1/4] powerpc/powernv: Add OPAL API interface to access secure variable
` [PATCH v4 2/4] powerpc: expose secure variables to userspace via sysfs

[Patch v7 0/4] Create and consolidate trusted keys subsystem
 2019-10-15  8:32 UTC  (11+ messages) - mbox.gz / Atom
` [Patch v7 1/4] tpm: Move tpm_buf code to include/linux/
` [Patch v7 2/4] KEYS: Use common tpm_buf for trusted and asymmetric keys

[PATCH] ftpm: add shutdown call back
 2019-10-14 20:17 UTC  (3+ messages) - mbox.gz / Atom

[PATCH] tpm: remove tpm_dev_wq_lock
 2019-10-14 19:39 UTC  (4+ messages) - mbox.gz / Atom

[PATCH v2] tpm: use GFP kernel for tpm_buf allocations
 2019-10-14 19:35 UTC  (3+ messages) - mbox.gz / Atom

[PATCH v6] tpm_crb: fix fTPM on AMD Zen+ CPUs
 2019-10-14 18:45 UTC  (3+ messages) - mbox.gz / Atom

[PATCH v0 0/2] KEYS: Measure keys added to builtin or secondary trusted keys keyring
 2019-10-14 16:21 UTC  (7+ messages) - mbox.gz / Atom
` [PATCH v0 1/2] "
` [PATCH v0 2/2] KEYS: LSM Hook for key_create_or_update

[PATCH v4 0/3] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
 2019-10-14 10:39 UTC  (6+ messages) - mbox.gz / Atom
` [PATCH v4 3/3] "

[PATCH v7] tpm_crb: fix fTPM on AMD Zen+ CPUs
 2019-10-14  8:10 UTC  (2+ messages) - mbox.gz / Atom

page:   latest

Linux-Integrity Archive on lore.kernel.org

Archives are clonable:
	git clone --mirror https://lore.kernel.org/linux-integrity/0 linux-integrity/git/0.git

	# If you have public-inbox 1.1+ installed, you may
	# initialize and index your mirror using the following commands:
	public-inbox-init -V2 linux-integrity linux-integrity/ https://lore.kernel.org/linux-integrity \
		linux-integrity@vger.kernel.org
	public-inbox-index linux-integrity

Example config snippet for mirrors

Newsgroup available over NNTP:
	nntp://nntp.lore.kernel.org/org.kernel.vger.linux-integrity


AGPL code for this site: git clone https://public-inbox.org/public-inbox.git