linux-integrity.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2021-06-01 17:37:03 to 2021-06-18 16:08:08 UTC [more...]

[PATCH v2 00/12] x86: Trenchboot secure dynamic launch Linux kernel support
 2021-06-18 16:12 UTC  (13+ messages)
` [PATCH v2 01/12] x86/boot: Place kernel_info at a fixed offset
` [PATCH v2 02/12] x86: Secure Launch Kconfig
` [PATCH v2 03/12] x86: Secure Launch main header file
` [PATCH v2 04/12] x86: Add early SHA support for Secure Launch early measurements
` [PATCH v2 05/12] x86: Secure Launch kernel early boot stub
` [PATCH v2 06/12] x86: Secure Launch kernel late "
` [PATCH v2 07/12] x86: Secure Launch SMP bringup support
` [PATCH v2 08/12] kexec: Secure Launch kexec SEXIT support
` [PATCH v2 09/12] reboot: Secure Launch SEXIT support on reboot paths
` [PATCH v2 10/12] x86: Secure Launch late initcall platform module
` [PATCH v2 11/12] tpm: Allow locality 2 to be set when initializing the TPM for Secure Launch
` [PATCH v2 12/12] iommu: Do not allow IOMMU passthrough with "

Size mismatch between vfs_getxattr_alloc() and vfs_getxattr()
 2021-06-18 16:04 UTC  (8+ messages)
` [PATCH] fs: Return raw xattr for security.* if there is size disagreement with LSMs

[PATCH v6 0/4] Add support for ECDSA-signed kernel modules
 2021-06-18  9:04 UTC  (15+ messages)
` [PATCH v6 1/4] certs: Trigger creation of RSA module signing key if it's not an RSA key
` [PATCH v6 2/4] certs: Check whether openssl tool is available
` [PATCH v6 3/4] certs: Add support for using elliptic curve keys for signing modules
` [PATCH v6 4/4] certs: Adjustment due to 'Check whether openssl tool is available'

[PATCH 1/2] tpm: Fix tpmrm reference counting
 2021-06-17  5:44 UTC  (6+ messages)
` [PATCH 2/2] tpm: Fix crash on tmprm release

[PATCH v19 00/13] Carry forward IMA measurement log on kexec on ARM64
 2021-06-16 15:12 UTC  (8+ messages)
` [PATCH v19 05/13] of: Add a common kexec FDT setup function

[PATCH] tpm2_load_command leaks memory
 2021-06-16 14:49 UTC  (3+ messages)

[PATCH] tpm, tpm_tis: Acquire locality in tpm_tis_gen_interrupt() and tpm_get_timeouts()
 2021-06-15 16:27 UTC  (18+ messages)

[PATCH v5 0/8] tee: Improve support for kexec and kdump
 2021-06-15 14:15 UTC  (16+ messages)
` [PATCH v5 1/8] optee: Fix memory leak when failing to register shm pages
` [PATCH v5 2/8] optee: Refuse to load the driver under the kdump kernel
` [PATCH v5 3/8] optee: fix tee out of memory failure seen during kexec reboot
` [PATCH v5 4/8] optee: Clear stale cache entries during initialization
` [PATCH v5 5/8] tee: add tee_shm_alloc_kernel_buf()
` [PATCH v5 6/8] tee: Correct inappropriate usage of TEE_SHM_DMA_BUF flag
` [PATCH v5 7/8] tpm_ftpm_tee: Free and unregister TEE shared memory during kexec
` [PATCH v5 8/8] firmware: tee_bnxt: Release TEE shm, session, and context "

Recent tpm_tis IRQ handling changes are causing kernel backtraces
 2021-06-15 13:59 UTC  (16+ messages)

[PATCH v4 0/8] tee: Improve support for kexec and kdump
 2021-06-15 13:04 UTC  (25+ messages)
` [PATCH v4 1/8] optee: Fix memory leak when failing to register shm pages
` [PATCH v4 2/8] optee: Refuse to load the driver under the kdump kernel
` [PATCH v4 3/8] optee: fix tee out of memory failure seen during kexec reboot
` [PATCH v4 4/8] optee: Clear stale cache entries during initialization
` [PATCH v4 5/8] tee: add tee_shm_alloc_kernel_buf()
` [PATCH v4 6/8] tee: Support kernel shm registration without dma-buf backing
` [PATCH v4 7/8] tpm_ftpm_tee: Free and unregister TEE shared memory during kexec
` [PATCH v4 8/8] firmware: tee_bnxt: Release TEE shm, session, and context "

[PATCH 0/3] DCP as trusted keys backend
 2021-06-14 20:16 UTC  (4+ messages)
` [PATCH 1/3] crypto: mxs-dcp: Add support for hardware provided keys
` [PATCH 2/3] KEYS: trusted: Introduce support for NXP DCP-based trusted keys
` [PATCH 3/3] doc: trusted-encrypted: add DCP as new trust source

[PATCH 1/2] ima: Fix warning: no previous prototype for function 'ima_add_kexec_buffer'
 2021-06-11 15:41 UTC  (6+ messages)
` [PATCH 2/2] ima: Fix warning: no previous prototype for function 'ima_post_key_create_or_update'

[PATCH v27 05/25] LSM: Use lsmblob in security_audit_rule_match
 2021-06-11  0:04 UTC  (6+ messages)
` [PATCH v27 10/25] LSM: Use lsmblob in security_task_getsecid
` [PATCH v27 11/25] LSM: Use lsmblob in security_inode_getsecid
` [PATCH v27 12/25] LSM: Use lsmblob in security_cred_getsecid
` [PATCH v27 13/25] IMA: Change internal interfaces to use lsmblobs
` [PATCH v27 15/25] LSM: Ensure the correct LSM context releaser

[PATCH v3 0/7] tee: Improve support for kexec and kdump
 2021-06-10 21:05 UTC  (21+ messages)
` [PATCH v3 1/7] optee: Fix memory leak when failing to register shm pages
` [PATCH v3 2/7] optee: Refuse to load the driver under the kdump kernel
` [PATCH v3 3/7] optee: fix tee out of memory failure seen during kexec reboot
` [PATCH v3 4/7] optee: Clear stale cache entries during initialization
` [PATCH v3 5/7] tee: Support shm registration without dma-buf backing
` [PATCH v3 6/7] tpm_ftpm_tee: Free and unregister dynamic shared memory during kexec
` [PATCH v3 7/7] firmware: tee_bnxt: Release shm, session, and context "

ima - wait for tpm load
 2021-06-10 20:31 UTC  (4+ messages)

[PATCH v5 0/2] Add support for ECDSA-signed kernel modules
 2021-06-10 11:50 UTC  (9+ messages)
` [PATCH v5 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
` [PATCH v5 2/2] certs: Add support for using elliptic curve keys for signing modules

[PATCH v3] tpm: Replace WARN_ONCE() with dev_err_once() in tpm_tis_status()
 2021-06-09 18:57 UTC  (2+ messages)

Projects
 2021-06-09 12:09 UTC 

Proposal
 2021-06-09 12:10 UTC 

[PATCH v2 0/1] tpm_tis: Use DEFINE_RES_MEM() to simplify code
 2021-06-09 12:23 UTC  (3+ messages)
` [PATCH v2 1/1] "

[PATCH][next] ima: Fix fall-through warning for Clang
 2021-06-08 17:02 UTC  (2+ messages)

[PATCH 0/2] EVM: add some debugging info
 2021-06-08 16:06 UTC  (4+ messages)
` [PATCH 1/2] ima: differentiate between EVM failures in the audit log
` [PATCH 2/2] evm: output EVM digest calculation info

[PATCH v3 0/6] evm: Prepare for moving to the LSM infrastructure
 2021-06-08 13:02 UTC  (2+ messages)

[PATCH 1/5] doc: Fix warning in Documentation/security/IMA-templates.rst
 2021-06-08 12:31 UTC  (5+ messages)
` [PATCH 2/5] ima: Set correct casting types
` [PATCH 3/5] ima/evm: Fix type mismatch
` [PATCH 4/5] ima: Include header defining ima_post_key_create_or_update()
` [PATCH 5/5] ima: Pass NULL instead of 0 to ima_get_action() in ima_file_mprotect()

[integrity:next-integrity-testing 5/9] security/integrity/ima/ima_template_lib.c:616:22: sparse: sparse: incorrect type in assignment (different base types)
 2021-06-04 12:47 UTC  (3+ messages)

[integrity:next-integrity-testing 4/9] security/integrity/ima/ima_template_lib.c:571:28: sparse: sparse: incorrect type in assignment (different base types)
 2021-06-04  7:33 UTC 

[integrity:next-integrity-testing 3/9] security/integrity/ima/ima_template_lib.c:100:44: sparse: sparse: cast to restricted __le16
 2021-06-04  6:56 UTC 

[RFC PATCH 0/2] EVM: add some debugging info
 2021-06-04  6:37 UTC  (7+ messages)
` [RFC PATCH 1/2] ima: differentiate between EVM failures in the audit log
` [RFC PATCH 2/2] evm: output EVM digest calculation info needed for debugging

[PATCH v2 0/7] ima: Add template fields to verify EVM portable signatures
 2021-06-03 14:30 UTC  (5+ messages)
` [PATCH v2 6/7] ima: Define new template evm-sig
    ` [RESEND][PATCH "

[PATCH 1/1] tpm_tis: Use DEFINE_RES_MEM() to simplify code
 2021-06-03  6:27 UTC  (5+ messages)

[PATCH -next] tpm: fix some doc warnings in tpm1-cmd.c
 2021-06-01 17:59 UTC  (2+ messages)

[PATCH v5 0/2] Add support for ECDSA-signed kernel modules
 2021-06-01 17:58 UTC  (3+ messages)
` [PATCH v5 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key

[PATCH v2] tpm: Replace WARN_ONCE() with dev_err_once() in tpm_tis_status()
 2021-06-01 17:43 UTC  (3+ messages)

[PATCH] tpm: Replace WARN_ONCE() with dev_err_once() in tpm_tis_status()
 2021-06-01 17:36 UTC  (3+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).