linux-integrity.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2019-10-31 03:32:07 to 2019-11-14 09:08:09 UTC [more...]

[PATCH v10 0/9] powerpc: Enabling IMA arch specific secure boot policies
 2019-11-14  9:08 UTC  (14+ messages)
` [PATCH v10 1/9] powerpc: detect the secure boot mode of the system
  ` [PATCH v10a "
` [PATCH v10 2/9] powerpc/ima: add support to initialize ima policy rules
` [PATCH v10 3/9] powerpc: detect the trusted boot state of the system
  ` [PATCH v10a "
` [PATCH v10 5/9] ima: make process_buffer_measurement() generic
` [PATCH v10 6/9] certs: add wrapper function to check blacklisted binary hash
` [PATCH v10 7/9] ima: check against blacklisted hashes for files with modsig
` [RFC PATCH v10 9/9] powerpc/ima: indicate kernel modules appended signatures are enforced

[PATCH v7 0/5] KEYS: Measure keys when they are created or updated
 2019-11-14  3:12 UTC  (6+ messages)
` [PATCH v7 1/5] IMA: Add KEY_CHECK func to measure keys
` [PATCH v7 2/5] IMA: Define an IMA hook "
` [PATCH v7 3/5] KEYS: Call the "
` [PATCH v7 4/5] IMA: Add support to limit measuring keys
` [PATCH v7 5/5] IMA: Read keyrings= option from the IMA policy

Investment opportunity
 2019-11-14  2:24 UTC 

[PATCH v6 0/3] KEYS: Measure keys when they are created or updated
 2019-11-13 22:04 UTC  (14+ messages)
` [PATCH v6 1/3] IMA: Add KEY_CHECK func to measure keys
` [PATCH v6 2/3] IMA: Define an IMA hook "
` [PATCH v6 3/3] KEYS: Call the "

One question about trusted key of keyring in Linux kernel
 2019-11-13 15:46 UTC 

[PATCH] tpm: move TPM_CHIP_FLAG_HAVE_TIMEOUTS check
 2019-11-13  8:00 UTC 

[PATCH] ima: avoid appraise error for hash calc interrupt
 2019-11-13  7:52 UTC  (6+ messages)

[PATCH 09/25] LSM: Use lsmblob in security_task_getsecid
 2019-11-13  0:09 UTC  (6+ messages)
` [PATCH 10/25] LSM: Use lsmblob in security_inode_getsecid
` [PATCH 11/25] LSM: Use lsmblob in security_cred_getsecid
` [PATCH 12/25] IMA: Change internal interfaces to use lsmblobs
` [PATCH 14/25] LSM: Ensure the correct LSM context releaser

[PATCH] tpm_tis: turn on TPM before calling tpm_get_timeouts
 2019-11-13  0:02 UTC  (10+ messages)
` [PATCH v2] "
` [PATCH v3] "

question about setting TPM_CHIP_FLAG_IRQ in tpm_tis_core_init
 2019-11-12 20:30 UTC  (8+ messages)

[PATCH] tpm_tis: Move setting of TPM_CHIP_FLAG_IRQ into tpm_tis_probe_irq_single
 2019-11-12 20:27 UTC 

[PATCH v1 0/5] add tpm i2c ptp driver
 2019-11-12 20:22 UTC  (9+ messages)
` [PATCH v1 1/5] char: tpm: Make implementation of read16 read32 write32 optional
` [PATCH v1 2/5] char: tpm: Add check_data handle to tpm_tis_phy_ops in order to check data integrity
` [PATCH v1 3/5] char: tpm: rewrite "tpm_tis_req_canceled()"
` [PATCH v1 4/5] dt-bindings: tpm: Add the TPM TIS I2C device tree binding documentaion
` [PATCH v1 5/5] char: tpm: add tpm_tis_i2c driver

[GIT PULL] tpmdd updates for Linux v5.5
 2019-11-12 19:58 UTC  (2+ messages)

PROBLEM: TPM bug causes suspend to turn off device
 2019-11-12 19:43 UTC  (5+ messages)

[PATCH v5 0/10] KEYS: Measure keys when they are created or updated
 2019-11-12 18:06 UTC  (22+ messages)
` [PATCH v5 01/10] IMA: Added KEYRING_CHECK func in IMA policy to measure keys
` [PATCH v5 02/10] IMA: Added keyrings= option in IMA policy to only measure keys added to the specified keyrings
` [PATCH v5 03/10] IMA: Read keyrings= option from the IMA policy into ima_rule_entry
` [PATCH v5 04/10] IMA: Updated IMA policy functions to return keyrings option read from the policy
` [PATCH v5 05/10] IMA: Measure key if the IMA policy allows measurement for the keyring to which the key is linked to
` [PATCH v5 06/10] IMA: Defined an IMA hook to measure keys on key create or update
` [PATCH v5 07/10] KEYS: Call the IMA hook to measure key when a new key is created or an existing key is updated
` [PATCH v5 08/10] IMA: Added a flag to determine whether IMA hook can process the key now or has to queue for processing later
` [PATCH v5 09/10] IMA: Defined functions to queue and dequeue keys for measurement
` [PATCH v5 10/10] IMA: Call queue and dequeue functions to measure keys

[PATCH v9 0/4] powerpc: expose secure variables to the kernel and userspace
 2019-11-12  1:21 UTC  (7+ messages)
` [PATCH v9 1/4] powerpc/powernv: Add OPAL API interface to access secure variable
` [PATCH v9 2/4] powerpc: expose secure variables to userspace via sysfs
` [PATCH v9 3/4] x86/efi: move common keyring handler functions to new file
` [PATCH v9 4/4] powerpc: load firmware trusted keys/hashes into kernel keyring

[PATCH v8 0/4] powerpc: expose secure variables to the kernel and userspace
 2019-11-09 19:00 UTC  (5+ messages)
` [PATCH v8 1/4] powerpc/powernv: Add OPAL API interface to access secure variable
` [PATCH v8 2/4] powerpc: expose secure variables to userspace via sysfs
` [PATCH v8 3/4] x86/efi: move common keyring handler functions to new file
` [PATCH v8 4/4] powerpc: load firmware trusted keys/hashes into kernel keyring

[PATCH v7 0/4] powerpc: expose secure variables to the kernel and userspace
 2019-11-08  9:42 UTC  (7+ messages)
` [PATCH v7 1/4] powerpc/powernv: Add OPAL API interface to access secure variable
` [PATCH v7 2/4] powerpc: expose secure variables to userspace via sysfs
` [PATCH v7 3/4] x86/efi: move common keyring handler functions to new file
` [PATCH v7 4/4] powerpc: load firmware trusted keys/hashes into kernel keyring

[PATCH v4 0/10] KEYS: Measure keys when they are created or updated
 2019-11-07 21:12 UTC  (20+ messages)
` [PATCH v4 01/10] IMA: Defined an IMA hook to measure keys on key create or update
` [PATCH v4 02/10] IMA: Added KEYRING_CHECK func in IMA policy to measure keys
` [PATCH v4 03/10] IMA: Added keyrings= option in IMA policy to only measure keys added to the specified keyrings
` [PATCH v4 04/10] IMA: Read keyrings= option from the IMA policy into ima_rule_entry
` [PATCH v4 05/10] IMA: Updated IMA policy functions to return keyrings option read from the policy
` [PATCH v4 06/10] IMA: Measure key if the IMA policy allows measurement for the keyring to which the key is linked to
` [PATCH v4 07/10] IMA: Added a boolean flag to track IMA initialization status
` [PATCH v4 08/10] IMA: Defined functions to queue and dequeue keys for measurement
` [PATCH v4 09/10] IMA: Call queue and dequeue functions to measure keys
` [PATCH v4 10/10] KEYS: Call the IMA hook to measure key when a new key is created or an existing key is updated

[PATCH] tpm: remove tpm_dev_wq_lock
 2019-11-07 18:35 UTC  (12+ messages)

Mail to David Howells @ redhat bounced
 2019-11-06 19:30 UTC  (2+ messages)

[PATCH v6 0/4] powerpc: expose secure variables to the kernel and userspace
 2019-11-06  3:22 UTC  (7+ messages)
` [PATCH v6 1/4] powerpc/powernv: Add OPAL API interface to access secure variable
` [PATCH v6 2/4] powerpc: expose secure variables to userspace via sysfs
` [PATCH v6 3/4] x86/efi: move common keyring handler functions to new file
` [PATCH v6 4/4] powerpc: load firmware trusted keys/hashes into kernel keyring

Investment opportunity
 2019-11-05  8:24 UTC 

[PATCH 4.4 15/46] efi/cper: Fix endianness of PCIe class code
 2019-11-04 21:44 UTC  (2+ messages)
` [PATCH 4.4 16/46] efi/x86: Do not clean dummy variable in kexec path

[PATCH 4.9 21/62] efi/cper: Fix endianness of PCIe class code
 2019-11-04 21:44 UTC  (2+ messages)
` [PATCH 4.9 22/62] efi/x86: Do not clean dummy variable in kexec path

[PATCH 4.14 41/95] efi/cper: Fix endianness of PCIe class code
 2019-11-04 21:44 UTC  (2+ messages)
` [PATCH 4.14 42/95] efi/x86: Do not clean dummy variable in kexec path

[PATCH 5.3 051/163] efi/cper: Fix endianness of PCIe class code
 2019-11-04 21:44 UTC  (2+ messages)
` [PATCH 5.3 052/163] efi/x86: Do not clean dummy variable in kexec path

[PATCH 4.19 081/149] efi/cper: Fix endianness of PCIe class code
 2019-11-04 21:44 UTC  (2+ messages)
` [PATCH 4.19 082/149] efi/x86: Do not clean dummy variable in kexec path

[Patch v3 0/7] Introduce TEE based Trusted Keys support
 2019-11-04 20:55 UTC  (13+ messages)
` [Patch v3 1/7] tee: optee: allow kernel pages to register as shm
` [Patch v3 2/7] tee: enable support to register kernel memory
` [Patch v3 3/7] tee: add private login method for kernel clients
` [Patch v3 4/7] KEYS: trusted: Add generic trusted keys framework
` [Patch v3 5/7] KEYS: trusted: Introduce TEE based Trusted Keys
` [Patch v3 6/7] doc: keys: Document usage of "
` [Patch v3 7/7] MAINTAINERS: Add entry for "

[PATCH v4] tpm: Add tpm_version_major sysfs file
 2019-10-31 21:35 UTC  (3+ messages)

[PATCH v2] tpm: Add major_version sysfs file
 2019-10-31 21:04 UTC  (8+ messages)

[PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
 2019-10-31 21:03 UTC  (11+ messages)

[PATCH v3 0/9] KEYS: Measure keys when they are created or updated
 2019-10-31 15:42 UTC  (17+ messages)
` [PATCH v3 1/9] KEYS: Defined an IMA hook to measure keys on key create or update
` [PATCH v3 2/9] KEYS: Defined functions to queue and dequeue keys for measurement
` [PATCH v3 3/9] KEYS: Added KEYRING_CHECK policy for key measurement
` [PATCH v3 4/9] KEYS: Updated IMA policy functions for handling "

[PATCH] x86/ima: update IMA arch policy to support appended signatures
 2019-10-31  3:54 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).