linux-integrity.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
[RFC][PATCH 00/12] Huawei Digest Lists
 2021-06-27 15:35 UTC  (18+ messages)
` [RFC][PATCH 01/12] ima: Add digest, algo, measured parameters to ima_measure_critical_data()
` [RFC][PATCH 02/12] digest_lists: Overview
` [RFC][PATCH 03/12] digest_lists: Basic definitions
` [RFC][PATCH 04/12] digest_lists: Objects
` [RFC][PATCH 05/12] digest_lists: Methods
` [RFC][PATCH 06/12] digest_lists: Parser
` [RFC][PATCH 07/12] digest_lists: Interfaces - digest_list_add, digest_list_del
` [RFC][PATCH 08/12] digest_lists: Interfaces - digest_lists_loaded
` [RFC][PATCH 09/12] digest_lists: Interfaces - digest_label
` [RFC][PATCH 10/12] digest_lists: Interfaces - digest_query
` [RFC][PATCH 11/12] digest_lists: Interfaces - digests_count
` [RFC][PATCH 12/12] digest_lists: Tests

[PATCH v6 0/3] ima-evm-utils: Add --keyid option
 2021-06-26  0:42 UTC  (10+ messages)
` [PATCH v6 1/3] ima-evm-utils: Allow manual setting keyid for signing
` [PATCH v6 2/3] ima-evm-utils: Allow manual setting keyid from a cert file
` [PATCH v6 3/3] ima-evm-utils: Read keyid from the cert appended to the key file

[PATCH 0/6] ima-evm-utils: Some cleanups and bugfixes
 2021-06-25 20:42 UTC  (2+ messages)

[PATCH 0/3] DCP as trusted keys backend
 2021-06-25 13:12 UTC  (7+ messages)
` [PATCH 1/3] crypto: mxs-dcp: Add support for hardware provided keys
` [PATCH 2/3] KEYS: trusted: Introduce support for NXP DCP-based trusted keys
` [PATCH 3/3] doc: trusted-encrypted: add DCP as new trust source

[PATCH] certs: Redirect openssl error message to null device
 2021-06-25 12:32 UTC  (2+ messages)

[PATCH 0/3] Add GitHub Actions support
 2021-06-25  6:12 UTC  (8+ messages)
` [PATCH 1/3] CI: Rename travis script directory
` [PATCH 2/3] CI/openSUSE: Fix tpm_server symlink creation
` [PATCH 3/3] CI: Introduce GitHub Actions setup

[PATCH v2] tpm, tpm_tis_spi: Allow to sleep in the interrupt handler
 2021-06-25  0:17 UTC  (3+ messages)

[PATCH] Fix Atmel TPM crash caused by too frequent queries
 2021-06-24  5:49 UTC  (4+ messages)

[GIT PULL] TPM DEVICE DRIVER changes for v5.14
 2021-06-23 13:56 UTC 

Recent tpm_tis IRQ handling changes are causing kernel backtraces
 2021-06-23 13:54 UTC  (17+ messages)

[PATCH] char: tpm: vtpm_proxy: Fix race in init
 2021-06-23 13:22 UTC 

[PATCH v2 2/6] KEYS: trusted: Allow import from existing key material for development
 2021-06-22 12:45 UTC 

[PATCH v2 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
 2021-06-22 12:37 UTC  (6+ messages)
` [PATCH v2 1/6] KEYS: trusted: allow use of TEE as backend without TCG_TPM support
` [PATCH v2 3/6] KEYS: trusted: allow users to use kernel RNG for key material
` [PATCH v2 4/6] KEYS: trusted: allow trust sources "
` [PATCH v2 5/6] crypto: caam - add in-kernel interface for blob generator
` [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys

[PATCH v2 00/12] x86: Trenchboot secure dynamic launch Linux kernel support
 2021-06-22 11:06 UTC  (17+ messages)
` [PATCH v2 01/12] x86/boot: Place kernel_info at a fixed offset
` [PATCH v2 02/12] x86: Secure Launch Kconfig
` [PATCH v2 03/12] x86: Secure Launch main header file
` [PATCH v2 04/12] x86: Add early SHA support for Secure Launch early measurements
` [PATCH v2 05/12] x86: Secure Launch kernel early boot stub
` [PATCH v2 06/12] x86: Secure Launch kernel late "
` [PATCH v2 07/12] x86: Secure Launch SMP bringup support
` [PATCH v2 08/12] kexec: Secure Launch kexec SEXIT support
` [PATCH v2 09/12] reboot: Secure Launch SEXIT support on reboot paths
` [PATCH v2 10/12] x86: Secure Launch late initcall platform module
` [PATCH v2 11/12] tpm: Allow locality 2 to be set when initializing the TPM for Secure Launch
` [PATCH v2 12/12] iommu: Do not allow IOMMU passthrough with "

[ANNOUNCE][CFP] Linux Security Summit 2021
 2021-06-22  2:46 UTC  (3+ messages)

[PATCH v2] evm: output EVM digest calculation info
 2021-06-21 15:58 UTC  (2+ messages)

[PATCH v2] evm: Check xattr size discrepancy between kernel and user
 2021-06-21 13:25 UTC  (2+ messages)

[PATCH] evm: Check xattr size misalignment between kernel and user
 2021-06-21 12:22 UTC  (2+ messages)

[integrity:next-integrity-testing 13/13] security/integrity/evm/evm_crypto.c:181:41: warning: format specifies type 'unsigned long' but the argument has type 'unsigned int'
 2021-06-18 22:46 UTC 

[integrity:next-integrity-testing 13/13] <command-line>: warning: format '%lu' expects argument of type 'long unsigned int', but argument 3 has type 'unsigned int'
 2021-06-18 19:37 UTC 

Size mismatch between vfs_getxattr_alloc() and vfs_getxattr()
 2021-06-18 17:22 UTC  (11+ messages)
` [PATCH] fs: Return raw xattr for security.* if there is size disagreement with LSMs

[PATCH v6 0/4] Add support for ECDSA-signed kernel modules
 2021-06-18  9:04 UTC  (15+ messages)
` [PATCH v6 1/4] certs: Trigger creation of RSA module signing key if it's not an RSA key
` [PATCH v6 2/4] certs: Check whether openssl tool is available
` [PATCH v6 3/4] certs: Add support for using elliptic curve keys for signing modules
` [PATCH v6 4/4] certs: Adjustment due to 'Check whether openssl tool is available'

[PATCH 1/2] tpm: Fix tpmrm reference counting
 2021-06-17  5:44 UTC  (6+ messages)
` [PATCH 2/2] tpm: Fix crash on tmprm release

[PATCH v19 00/13] Carry forward IMA measurement log on kexec on ARM64
 2021-06-16 15:12 UTC  (8+ messages)
` [PATCH v19 05/13] of: Add a common kexec FDT setup function

[PATCH] tpm2_load_command leaks memory
 2021-06-16 14:49 UTC  (3+ messages)

[PATCH] tpm, tpm_tis: Acquire locality in tpm_tis_gen_interrupt() and tpm_get_timeouts()
 2021-06-15 16:27 UTC  (18+ messages)

[PATCH v5 0/8] tee: Improve support for kexec and kdump
 2021-06-15 14:15 UTC  (16+ messages)
` [PATCH v5 1/8] optee: Fix memory leak when failing to register shm pages
` [PATCH v5 2/8] optee: Refuse to load the driver under the kdump kernel
` [PATCH v5 3/8] optee: fix tee out of memory failure seen during kexec reboot
` [PATCH v5 4/8] optee: Clear stale cache entries during initialization
` [PATCH v5 5/8] tee: add tee_shm_alloc_kernel_buf()
` [PATCH v5 6/8] tee: Correct inappropriate usage of TEE_SHM_DMA_BUF flag
` [PATCH v5 7/8] tpm_ftpm_tee: Free and unregister TEE shared memory during kexec
` [PATCH v5 8/8] firmware: tee_bnxt: Release TEE shm, session, and context "

[PATCH v4 0/8] tee: Improve support for kexec and kdump
 2021-06-15 13:04 UTC  (25+ messages)
` [PATCH v4 1/8] optee: Fix memory leak when failing to register shm pages
` [PATCH v4 2/8] optee: Refuse to load the driver under the kdump kernel
` [PATCH v4 3/8] optee: fix tee out of memory failure seen during kexec reboot
` [PATCH v4 4/8] optee: Clear stale cache entries during initialization
` [PATCH v4 5/8] tee: add tee_shm_alloc_kernel_buf()
` [PATCH v4 6/8] tee: Support kernel shm registration without dma-buf backing
` [PATCH v4 7/8] tpm_ftpm_tee: Free and unregister TEE shared memory during kexec
` [PATCH v4 8/8] firmware: tee_bnxt: Release TEE shm, session, and context "

[PATCH 1/2] ima: Fix warning: no previous prototype for function 'ima_add_kexec_buffer'
 2021-06-11 15:41 UTC  (6+ messages)
` [PATCH 2/2] ima: Fix warning: no previous prototype for function 'ima_post_key_create_or_update'

[PATCH v27 05/25] LSM: Use lsmblob in security_audit_rule_match
 2021-06-11  0:04 UTC  (6+ messages)
` [PATCH v27 10/25] LSM: Use lsmblob in security_task_getsecid
` [PATCH v27 11/25] LSM: Use lsmblob in security_inode_getsecid
` [PATCH v27 12/25] LSM: Use lsmblob in security_cred_getsecid
` [PATCH v27 13/25] IMA: Change internal interfaces to use lsmblobs
` [PATCH v27 15/25] LSM: Ensure the correct LSM context releaser

[PATCH v3 0/7] tee: Improve support for kexec and kdump
 2021-06-10 21:05 UTC  (14+ messages)
` [PATCH v3 5/7] tee: Support shm registration without dma-buf backing

ima - wait for tpm load
 2021-06-10 20:31 UTC  (4+ messages)

[PATCH v5 0/2] Add support for ECDSA-signed kernel modules
 2021-06-10 11:50 UTC  (7+ messages)

page:  |  | latest

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).