linux-integrity.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2021-06-13 08:16:12 to 2021-06-30 09:47:42 UTC [more...]

[PATCH v2 00/12] x86: Trenchboot secure dynamic launch Linux kernel support
 2021-06-30  9:47 UTC  (18+ messages)
` [PATCH v2 01/12] x86/boot: Place kernel_info at a fixed offset
` [PATCH v2 02/12] x86: Secure Launch Kconfig
` [PATCH v2 03/12] x86: Secure Launch main header file
` [PATCH v2 04/12] x86: Add early SHA support for Secure Launch early measurements
` [PATCH v2 05/12] x86: Secure Launch kernel early boot stub
` [PATCH v2 06/12] x86: Secure Launch kernel late "
` [PATCH v2 07/12] x86: Secure Launch SMP bringup support
` [PATCH v2 08/12] kexec: Secure Launch kexec SEXIT support
` [PATCH v2 09/12] reboot: Secure Launch SEXIT support on reboot paths
` [PATCH v2 10/12] x86: Secure Launch late initcall platform module
` [PATCH v2 11/12] tpm: Allow locality 2 to be set when initializing the TPM for Secure Launch
` [PATCH v2 12/12] iommu: Do not allow IOMMU passthrough with "

[PATCH] char: tpm: vtpm_proxy: Fix race in init
 2021-06-30  7:24 UTC  (5+ messages)

[PATCH] Fix Atmel TPM crash caused by too frequent queries
 2021-06-30  4:27 UTC  (8+ messages)
  ` [PATCH] tpm: fix ATMEL "

[PATCH] IMA: remove -Wmissing-prototypes warning
 2021-06-29 22:40 UTC  (3+ messages)

Recent tpm_tis IRQ handling changes are causing kernel backtraces
 2021-06-29 22:05 UTC  (20+ messages)
                            ` Recent tpm_tis IRQ handling changes are causing kernel backtraces]

[PATCH v8 0/2] Add support for ECDSA-signed kernel modules
 2021-06-29 21:34 UTC  (3+ messages)
` [PATCH v8 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
` [PATCH v8 2/2] certs: Add support for using elliptic curve keys for signing modules

[GIT PULL] TPM DEVICE DRIVER changes for v5.14
 2021-06-29 21:10 UTC  (10+ messages)

[PATCH v7 0/2] Add support for ECDSA-signed kernel modules
 2021-06-29 20:56 UTC  (4+ messages)
` [PATCH v7 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
` [PATCH v7 2/2] certs: Add support for using elliptic curve keys for signing modules

[PATCH] certs: Redirect openssl error message to null device
 2021-06-29 20:26 UTC  (4+ messages)

[RFC] ima: check ima-policy's path
 2021-06-29 11:55 UTC  (2+ messages)

[PATCH v6 0/3] ima-evm-utils: Add --keyid option
 2021-06-29  1:32 UTC  (12+ messages)
` [PATCH v6 1/3] ima-evm-utils: Allow manual setting keyid for signing
` [PATCH v6 2/3] ima-evm-utils: Allow manual setting keyid from a cert file
` [PATCH v6 3/3] ima-evm-utils: Read keyid from the cert appended to the key file

[GIT PULL] integrity subsystem updates for v5.14
 2021-06-28 23:36 UTC  (2+ messages)

/dev/tpmrm0 session handling
 2021-06-28 22:22 UTC 

ima - wait for tpm load
 2021-06-28 22:04 UTC  (5+ messages)

[RFC][PATCH 00/12] Huawei Digest Lists
 2021-06-28  9:51 UTC  (25+ messages)
` [RFC][PATCH 01/12] ima: Add digest, algo, measured parameters to ima_measure_critical_data()
` [RFC][PATCH 02/12] digest_lists: Overview
` [RFC][PATCH 03/12] digest_lists: Basic definitions
` [RFC][PATCH 04/12] digest_lists: Objects
` [RFC][PATCH 05/12] digest_lists: Methods
` [RFC][PATCH 06/12] digest_lists: Parser
` [RFC][PATCH 07/12] digest_lists: Interfaces - digest_list_add, digest_list_del
` [RFC][PATCH 08/12] digest_lists: Interfaces - digest_lists_loaded
` [RFC][PATCH 09/12] digest_lists: Interfaces - digest_label
` [RFC][PATCH 10/12] digest_lists: Interfaces - digest_query
` [RFC][PATCH 11/12] digest_lists: Interfaces - digests_count
` [RFC][PATCH 12/12] digest_lists: Tests

[PATCH 0/6] ima-evm-utils: Some cleanups and bugfixes
 2021-06-25 20:42 UTC  (2+ messages)

[PATCH 0/3] DCP as trusted keys backend
 2021-06-25 13:12 UTC  (7+ messages)
` [PATCH 1/3] crypto: mxs-dcp: Add support for hardware provided keys
` [PATCH 2/3] KEYS: trusted: Introduce support for NXP DCP-based trusted keys
` [PATCH 3/3] doc: trusted-encrypted: add DCP as new trust source

[PATCH 0/3] Add GitHub Actions support
 2021-06-25  6:12 UTC  (8+ messages)
` [PATCH 1/3] CI: Rename travis script directory
` [PATCH 2/3] CI/openSUSE: Fix tpm_server symlink creation
` [PATCH 3/3] CI: Introduce GitHub Actions setup

[PATCH v2] tpm, tpm_tis_spi: Allow to sleep in the interrupt handler
 2021-06-25  0:17 UTC  (3+ messages)

[PATCH v2 2/6] KEYS: trusted: Allow import from existing key material for development
 2021-06-22 12:45 UTC 

[PATCH v2 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
 2021-06-22 12:37 UTC  (6+ messages)
` [PATCH v2 1/6] KEYS: trusted: allow use of TEE as backend without TCG_TPM support
` [PATCH v2 3/6] KEYS: trusted: allow users to use kernel RNG for key material
` [PATCH v2 4/6] KEYS: trusted: allow trust sources "
` [PATCH v2 5/6] crypto: caam - add in-kernel interface for blob generator
` [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys

[ANNOUNCE][CFP] Linux Security Summit 2021
 2021-06-22  2:46 UTC  (3+ messages)

[PATCH v2] evm: output EVM digest calculation info
 2021-06-21 15:58 UTC  (2+ messages)

[PATCH v2] evm: Check xattr size discrepancy between kernel and user
 2021-06-21 13:25 UTC  (2+ messages)

[PATCH] evm: Check xattr size misalignment between kernel and user
 2021-06-21 12:22 UTC  (2+ messages)

[integrity:next-integrity-testing 13/13] security/integrity/evm/evm_crypto.c:181:41: warning: format specifies type 'unsigned long' but the argument has type 'unsigned int'
 2021-06-18 22:46 UTC 

[integrity:next-integrity-testing 13/13] <command-line>: warning: format '%lu' expects argument of type 'long unsigned int', but argument 3 has type 'unsigned int'
 2021-06-18 19:37 UTC 

Size mismatch between vfs_getxattr_alloc() and vfs_getxattr()
 2021-06-18 17:22 UTC  (11+ messages)
` [PATCH] fs: Return raw xattr for security.* if there is size disagreement with LSMs

[PATCH v6 0/4] Add support for ECDSA-signed kernel modules
 2021-06-18  9:04 UTC  (11+ messages)
` [PATCH v6 4/4] certs: Adjustment due to 'Check whether openssl tool is available'

[PATCH 1/2] tpm: Fix tpmrm reference counting
 2021-06-17  5:44 UTC  (6+ messages)
` [PATCH 2/2] tpm: Fix crash on tmprm release

[PATCH v19 00/13] Carry forward IMA measurement log on kexec on ARM64
 2021-06-16 15:12 UTC  (8+ messages)
` [PATCH v19 05/13] of: Add a common kexec FDT setup function

[PATCH] tpm2_load_command leaks memory
 2021-06-16 14:49 UTC  (3+ messages)

[PATCH] tpm, tpm_tis: Acquire locality in tpm_tis_gen_interrupt() and tpm_get_timeouts()
 2021-06-15 16:27 UTC  (14+ messages)

[PATCH v5 0/8] tee: Improve support for kexec and kdump
 2021-06-15 14:15 UTC  (16+ messages)
` [PATCH v5 1/8] optee: Fix memory leak when failing to register shm pages
` [PATCH v5 2/8] optee: Refuse to load the driver under the kdump kernel
` [PATCH v5 3/8] optee: fix tee out of memory failure seen during kexec reboot
` [PATCH v5 4/8] optee: Clear stale cache entries during initialization
` [PATCH v5 5/8] tee: add tee_shm_alloc_kernel_buf()
` [PATCH v5 6/8] tee: Correct inappropriate usage of TEE_SHM_DMA_BUF flag
` [PATCH v5 7/8] tpm_ftpm_tee: Free and unregister TEE shared memory during kexec
` [PATCH v5 8/8] firmware: tee_bnxt: Release TEE shm, session, and context "

[PATCH v4 0/8] tee: Improve support for kexec and kdump
 2021-06-15 13:04 UTC  (19+ messages)
` [PATCH v4 3/8] optee: fix tee out of memory failure seen during kexec reboot
` [PATCH v4 4/8] optee: Clear stale cache entries during initialization
` [PATCH v4 6/8] tee: Support kernel shm registration without dma-buf backing
` [PATCH v4 7/8] tpm_ftpm_tee: Free and unregister TEE shared memory during kexec


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).