messages from 2021-06-09 00:25:56 to 2021-06-25 16:56:40 UTC [more...]
[RFC][PATCH 00/12] Huawei Digest Lists
2021-06-25 16:56 UTC
[PATCH 0/3] DCP as trusted keys backend
2021-06-25 13:12 UTC (7+ messages)
` [PATCH 1/3] crypto: mxs-dcp: Add support for hardware provided keys
` [PATCH 2/3] KEYS: trusted: Introduce support for NXP DCP-based trusted keys
` [PATCH 3/3] doc: trusted-encrypted: add DCP as new trust source
[PATCH] certs: Redirect openssl error message to null device
2021-06-25 12:32 UTC (2+ messages)
[PATCH v6 0/3] ima-evm-utils: Add --keyid option
2021-06-25 12:22 UTC (7+ messages)
` [PATCH v6 1/3] ima-evm-utils: Allow manual setting keyid for signing
` [PATCH v6 2/3] ima-evm-utils: Allow manual setting keyid from a cert file
` [PATCH v6 3/3] ima-evm-utils: Read keyid from the cert appended to the key file
[PATCH 0/3] Add GitHub Actions support
2021-06-25 6:12 UTC (8+ messages)
` [PATCH 1/3] CI: Rename travis script directory
` [PATCH 2/3] CI/openSUSE: Fix tpm_server symlink creation
` [PATCH 3/3] CI: Introduce GitHub Actions setup
[PATCH v2] tpm, tpm_tis_spi: Allow to sleep in the interrupt handler
2021-06-25 0:17 UTC (3+ messages)
[PATCH] Fix Atmel TPM crash caused by too frequent queries
2021-06-24 5:49 UTC (4+ messages)
[GIT PULL] TPM DEVICE DRIVER changes for v5.14
2021-06-23 13:56 UTC
Recent tpm_tis IRQ handling changes are causing kernel backtraces
2021-06-23 13:54 UTC (17+ messages)
[PATCH] char: tpm: vtpm_proxy: Fix race in init
2021-06-23 13:22 UTC
[PATCH v2 2/6] KEYS: trusted: Allow import from existing key material for development
2021-06-22 12:45 UTC
[PATCH v2 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
2021-06-22 12:37 UTC (6+ messages)
` [PATCH v2 1/6] KEYS: trusted: allow use of TEE as backend without TCG_TPM support
` [PATCH v2 3/6] KEYS: trusted: allow users to use kernel RNG for key material
` [PATCH v2 4/6] KEYS: trusted: allow trust sources "
` [PATCH v2 5/6] crypto: caam - add in-kernel interface for blob generator
` [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
[PATCH v2 00/12] x86: Trenchboot secure dynamic launch Linux kernel support
2021-06-22 11:06 UTC (17+ messages)
` [PATCH v2 01/12] x86/boot: Place kernel_info at a fixed offset
` [PATCH v2 02/12] x86: Secure Launch Kconfig
` [PATCH v2 03/12] x86: Secure Launch main header file
` [PATCH v2 04/12] x86: Add early SHA support for Secure Launch early measurements
` [PATCH v2 05/12] x86: Secure Launch kernel early boot stub
` [PATCH v2 06/12] x86: Secure Launch kernel late "
` [PATCH v2 07/12] x86: Secure Launch SMP bringup support
` [PATCH v2 08/12] kexec: Secure Launch kexec SEXIT support
` [PATCH v2 09/12] reboot: Secure Launch SEXIT support on reboot paths
` [PATCH v2 10/12] x86: Secure Launch late initcall platform module
` [PATCH v2 11/12] tpm: Allow locality 2 to be set when initializing the TPM for Secure Launch
` [PATCH v2 12/12] iommu: Do not allow IOMMU passthrough with "
[ANNOUNCE][CFP] Linux Security Summit 2021
2021-06-22 2:46 UTC (3+ messages)
[PATCH v2] evm: output EVM digest calculation info
2021-06-21 15:58 UTC (2+ messages)
[PATCH v2] evm: Check xattr size discrepancy between kernel and user
2021-06-21 13:25 UTC (2+ messages)
[PATCH] evm: Check xattr size misalignment between kernel and user
2021-06-21 12:22 UTC (2+ messages)
[integrity:next-integrity-testing 13/13] security/integrity/evm/evm_crypto.c:181:41: warning: format specifies type 'unsigned long' but the argument has type 'unsigned int'
2021-06-18 22:46 UTC
[integrity:next-integrity-testing 13/13] <command-line>: warning: format '%lu' expects argument of type 'long unsigned int', but argument 3 has type 'unsigned int'
2021-06-18 19:37 UTC
Size mismatch between vfs_getxattr_alloc() and vfs_getxattr()
2021-06-18 17:22 UTC (11+ messages)
` [PATCH] fs: Return raw xattr for security.* if there is size disagreement with LSMs
[PATCH v6 0/4] Add support for ECDSA-signed kernel modules
2021-06-18 9:04 UTC (15+ messages)
` [PATCH v6 1/4] certs: Trigger creation of RSA module signing key if it's not an RSA key
` [PATCH v6 2/4] certs: Check whether openssl tool is available
` [PATCH v6 3/4] certs: Add support for using elliptic curve keys for signing modules
` [PATCH v6 4/4] certs: Adjustment due to 'Check whether openssl tool is available'
[PATCH 1/2] tpm: Fix tpmrm reference counting
2021-06-17 5:44 UTC (6+ messages)
` [PATCH 2/2] tpm: Fix crash on tmprm release
[PATCH v19 00/13] Carry forward IMA measurement log on kexec on ARM64
2021-06-16 15:12 UTC (8+ messages)
` [PATCH v19 05/13] of: Add a common kexec FDT setup function
[PATCH] tpm2_load_command leaks memory
2021-06-16 14:49 UTC (3+ messages)
[PATCH] tpm, tpm_tis: Acquire locality in tpm_tis_gen_interrupt() and tpm_get_timeouts()
2021-06-15 16:27 UTC (18+ messages)
[PATCH v5 0/8] tee: Improve support for kexec and kdump
2021-06-15 14:15 UTC (16+ messages)
` [PATCH v5 1/8] optee: Fix memory leak when failing to register shm pages
` [PATCH v5 2/8] optee: Refuse to load the driver under the kdump kernel
` [PATCH v5 3/8] optee: fix tee out of memory failure seen during kexec reboot
` [PATCH v5 4/8] optee: Clear stale cache entries during initialization
` [PATCH v5 5/8] tee: add tee_shm_alloc_kernel_buf()
` [PATCH v5 6/8] tee: Correct inappropriate usage of TEE_SHM_DMA_BUF flag
` [PATCH v5 7/8] tpm_ftpm_tee: Free and unregister TEE shared memory during kexec
` [PATCH v5 8/8] firmware: tee_bnxt: Release TEE shm, session, and context "
[PATCH v4 0/8] tee: Improve support for kexec and kdump
2021-06-15 13:04 UTC (25+ messages)
` [PATCH v4 1/8] optee: Fix memory leak when failing to register shm pages
` [PATCH v4 2/8] optee: Refuse to load the driver under the kdump kernel
` [PATCH v4 3/8] optee: fix tee out of memory failure seen during kexec reboot
` [PATCH v4 4/8] optee: Clear stale cache entries during initialization
` [PATCH v4 5/8] tee: add tee_shm_alloc_kernel_buf()
` [PATCH v4 6/8] tee: Support kernel shm registration without dma-buf backing
` [PATCH v4 7/8] tpm_ftpm_tee: Free and unregister TEE shared memory during kexec
` [PATCH v4 8/8] firmware: tee_bnxt: Release TEE shm, session, and context "
[PATCH 1/2] ima: Fix warning: no previous prototype for function 'ima_add_kexec_buffer'
2021-06-11 15:41 UTC (6+ messages)
` [PATCH 2/2] ima: Fix warning: no previous prototype for function 'ima_post_key_create_or_update'
[PATCH v27 05/25] LSM: Use lsmblob in security_audit_rule_match
2021-06-11 0:04 UTC (6+ messages)
` [PATCH v27 10/25] LSM: Use lsmblob in security_task_getsecid
` [PATCH v27 11/25] LSM: Use lsmblob in security_inode_getsecid
` [PATCH v27 12/25] LSM: Use lsmblob in security_cred_getsecid
` [PATCH v27 13/25] IMA: Change internal interfaces to use lsmblobs
` [PATCH v27 15/25] LSM: Ensure the correct LSM context releaser
[PATCH v3 0/7] tee: Improve support for kexec and kdump
2021-06-10 21:05 UTC (17+ messages)
` [PATCH v3 5/7] tee: Support shm registration without dma-buf backing
` [PATCH v3 6/7] tpm_ftpm_tee: Free and unregister dynamic shared memory during kexec
` [PATCH v3 7/7] firmware: tee_bnxt: Release shm, session, and context "
ima - wait for tpm load
2021-06-10 20:31 UTC (4+ messages)
[PATCH v5 0/2] Add support for ECDSA-signed kernel modules
2021-06-10 11:50 UTC (7+ messages)
[PATCH v3] tpm: Replace WARN_ONCE() with dev_err_once() in tpm_tis_status()
2021-06-09 18:57 UTC (2+ messages)
[PATCH v2 0/1] tpm_tis: Use DEFINE_RES_MEM() to simplify code
2021-06-09 12:23 UTC (3+ messages)
` [PATCH v2 1/1] "
Proposal
2021-06-09 12:10 UTC
Projects
2021-06-09 12:09 UTC
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).