linux-integrity.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2021-01-16 01:25:24 to 2021-01-27 17:59:35 UTC [more...]

Bug: TPM returned invalid status
 2021-01-27 17:58 UTC  (2+ messages)

[PATCH v15 00/10] Carry forward IMA measurement log on kexec on ARM64
 2021-01-27 17:56 UTC  (7+ messages)
` [PATCH v15 09/10] arm64: Call kmalloc() to allocate DTB buffer
` [PATCH v15 10/10] arm64: Add IMA log information in kimage used for kexec

[PATCH v8 0/4] Introduce TEE based Trusted Keys support
 2021-01-27 17:19 UTC  (18+ messages)
` [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys

[PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
 2021-01-27 15:41 UTC  (2+ messages)

[PATCH 0/4] TPM fixes
 2021-01-27 15:14 UTC  (11+ messages)
` [PATCH 1/4] tpm: in case of error properly cleanup in tpmm_chip_alloc
` [PATCH 2/4] tpm: fix reference counting for struct tpm_chip
` [PATCH 3/4] tpm: in tpm2_del_space check if ops pointer is still valid
` [PATCH 4/4] tpm: Provide a function tpm_chip_free() to free tpm chips

AW: TPM V2: kernel panic on linux reboot
 2021-01-27 14:51 UTC  (3+ messages)
  `  "

[PATCH v6 00/40] idmapped mounts
 2021-01-27  5:50 UTC  (70+ messages)
` [PATCH v6 01/40] mount: attach mappings to mounts
` [PATCH v6 02/40] fs: add id translation helpers
` [PATCH v6 03/40] fs: add file and path permissions helpers
` [PATCH v6 04/40] capability: handle idmapped mounts
` [PATCH v6 05/39] namei: make permission helpers idmapped mount aware
` [PATCH v6 06/40] inode: make init and "
` [PATCH v6 07/40] attr: handle idmapped mounts
` [PATCH v6 08/40] acl: "
` [PATCH v6 09/40] xattr: "
` [PATCH v6 10/40] commoncap: "
` [PATCH v6 11/40] stat: "
` [PATCH v6 12/40] namei: handle idmapped mounts in may_*() helpers
` [PATCH v6 13/40] namei: introduce struct renamedata
` [PATCH v6 14/40] namei: prepare for idmapped mounts
` [PATCH v6 15/40] open: handle idmapped mounts in do_truncate()
` [PATCH v6 16/40] open: handle idmapped mounts
` [PATCH v6 17/40] af_unix: "
` [PATCH v6 18/40] utimes: "
` [PATCH v6 19/40] fcntl: "
` [PATCH v6 20/40] init: "
` [PATCH v6 21/40] ioctl: "
` [PATCH v6 22/40] would_dump: "
` [PATCH v6 23/40] exec: "
` [PATCH v6 25/40] apparmor: "
` [PATCH v6 26/39] ima: "
` [PATCH v6 27/40] ecryptfs: do not mount on top of "
` [PATCH v6 28/40] overlayfs: "
` [PATCH v6 29/40] namespace: take lock_mount_hash() directly when changing flags
` [PATCH v6 30/40] mount: make {lock,unlock}_mount_hash() static
` [PATCH v6 31/40] namespace: only take read lock in do_reconfigure_mnt()
` [PATCH v6 32/40] fs: split out functions to hold writers
` [PATCH v6 33/40] fs: add attr_flags_to_mnt_flags helper
` [PATCH v6 34/40] fs: add mount_setattr()
` [PATCH v6 35/40] fs: introduce MOUNT_ATTR_IDMAP
` [PATCH v6 36/40] tests: add mount_setattr() selftests
` [PATCH v6 37/40] fat: handle idmapped mounts
` [PATCH v6 38/40] ext4: support "
` [PATCH v6 39/40] xfs: "

[PATCH v24 05/25] LSM: Use lsmblob in security_audit_rule_match
 2021-01-26 16:40 UTC  (6+ messages)
` [PATCH v24 10/25] LSM: Use lsmblob in security_task_getsecid
` [PATCH v24 11/25] LSM: Use lsmblob in security_inode_getsecid
` [PATCH v24 12/25] LSM: Use lsmblob in security_cred_getsecid
` [PATCH v24 13/25] IMA: Change internal interfaces to use lsmblobs
` [PATCH v24 15/25] LSM: Ensure the correct LSM context releaser

[PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
 2021-01-26 18:55 UTC  (6+ messages)

[PATCH v4] IMA: Measure kernel version in early boot
 2021-01-26 19:14 UTC 

[PATCH v3] IMA: Measure kernel version in early boot
 2021-01-26 16:14 UTC  (2+ messages)

[PATCH v2] tpm: ibmvtpm: fix error return code in tpm_ibmvtpm_probe()
 2021-01-26  1:47 UTC 

[PATCH] selinux: measure state and policy capabilities
 2021-01-24 17:04 UTC  (3+ messages)

[PATCH v2] IMA: Measure kernel version in early boot
 2021-01-24 14:55 UTC  (2+ messages)

[PATCH] selinux: include a consumer of the new IMA critical data hook
 2021-01-24 14:01 UTC  (3+ messages)

[PATCH 1/2] ima: Free IMA measurement buffer on error
 2021-01-22 22:31 UTC  (6+ messages)
` [PATCH 2/2] ima: Free IMA measurement buffer after kexec syscall

[PATCH 2/2] dm crypt: support using trusted keys
 2021-01-22 19:04 UTC  (4+ messages)

[PATCH v4 00/10] Enable root to update the blacklist keyring
 2021-01-21 15:55 UTC  (11+ messages)
` [PATCH v4 01/10] tools/certs: Add print-cert-tbs-hash.sh
` [PATCH v4 02/10] certs: Check that builtin blacklist hashes are valid
` [PATCH v4 03/10] certs: Fix blacklisted hexadecimal hash string check
` [PATCH v4 04/10] certs: Fix blacklist flag type confusion
` [PATCH v4 05/10] certs: Replace K{U,G}IDT_INIT() with GLOBAL_ROOT_{U,G}ID
` [PATCH v4 06/10] certs: Make blacklist_vet_description() more strict
` [PATCH v4 07/10] certs/blacklist: fix kernel doc interface issue
` [PATCH v4 08/10] certs: Factor out the blacklist hash creation
` [PATCH v4 09/10] PKCS#7: Fix missing include
` [PATCH v4 10/10] certs: Allow root user to append signed hashes to the blacklist keyring

[PATCH v3 00/10] Enable root to update the blacklist keyring
 2021-01-21 15:21 UTC  (29+ messages)
` [PATCH v3 01/10] certs/blacklist: fix kernel doc interface issue
` [PATCH v3 02/10] certs: Fix blacklisted hexadecimal hash string check
` [PATCH v3 03/10] PKCS#7: Fix missing include
` [PATCH v3 04/10] certs: Fix blacklist flag type confusion
` [PATCH v3 05/10] certs: Replace K{U,G}IDT_INIT() with GLOBAL_ROOT_{U,G}ID
` [PATCH v3 06/10] certs: Make blacklist_vet_description() more strict
` [PATCH v3 08/10] certs: Check that builtin blacklist hashes are valid
` [PATCH v3 09/10] certs: Allow root user to append signed hashes to the blacklist keyring

[PATCH] doc: trusted-encrypted: updates with TEE as a new trust source (update)
 2021-01-20 14:25 UTC  (10+ messages)

[PATCH v5 00/42] idmapped mounts
 2021-01-20 12:03 UTC  (56+ messages)
` [PATCH v5 09/42] mount: attach mappings to mounts
` [PATCH v5 10/42] capability: handle idmapped mounts
` [PATCH v5 11/42] namei: make permission helpers idmapped mount aware
` [PATCH v5 12/42] inode: make init and "
` [PATCH v5 13/42] attr: handle idmapped mounts
` [PATCH v5 14/42] acl: "
` [PATCH v5 15/42] fs: add file_user_ns() helper
` [PATCH v5 16/42] xattr: handle idmapped mounts
` [PATCH v5 17/42] commoncap: "
` [PATCH v5 18/42] stat: "
` [PATCH v5 19/42] namei: handle idmapped mounts in may_*() helpers
` [PATCH v5 20/42] namei: introduce struct renamedata
` [PATCH v5 21/42] namei: prepare for idmapped mounts
` [PATCH v5 22/42] open: handle idmapped mounts in do_truncate()
` [PATCH v5 23/42] open: handle idmapped mounts
` [PATCH v5 24/42] af_unix: "
` [PATCH v5 25/42] utimes: "
` [PATCH v5 26/42] fcntl: "
` [PATCH v5 27/42] notify: "
` [PATCH v5 29/42] ioctl: "
` [PATCH v5 30/42] would_dump: "
` [PATCH v5 31/42] exec: "
` [PATCH v5 37/42] xfs: support "
` [PATCH v5 40/42] fs: introduce MOUNT_ATTR_IDMAP
  ` [PATCH v5 32/42] fs: make helpers idmap mount aware

[PATCH] tpm/tpm_tis: Fix variable reset during IRQ probing
 2021-01-20  4:03 UTC  (5+ messages)

[PATCH 00/13] x86: Trenchboot secure dynamic launch Linux kernel support
 2021-01-20  0:33 UTC  (4+ messages)
` [PATCH 05/13] x86: Add early TPM1.2/TPM2.0 interface support for Secure Launch


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).