Linux-Integrity Archive mirror
 help / color / mirror / Atom feed
 messages from 2024-03-18 16:25:26 to 2024-04-03 08:07:28 UTC [more...]

[PATCH 00/34] address all -Wunused-const warnings
 2024-04-03  8:06 UTC 

[PATCH v8 0/6] DCP as trusted keys backend
 2024-04-03  7:21 UTC  (7+ messages)
` [PATCH v8 1/6] crypto: mxs-dcp: Add support for hardware-bound keys
` [PATCH v8 2/6] KEYS: trusted: improve scalability of trust source config
` [PATCH v8 3/6] KEYS: trusted: Introduce NXP DCP-backed trusted keys
` [PATCH v8 4/6] MAINTAINERS: add entry for DCP-based "
` [PATCH v8 5/6] docs: document DCP-backed trusted keys kernel params
` [PATCH v8 6/6] docs: trusted-encrypted: add DCP as new trust source

[PATCH v16 00/20] Integrity Policy Enforcement LSM (IPE)
 2024-04-03  5:10 UTC  (36+ messages)
` [PATCH v16 01/20] security: add ipe lsm
` [PATCH v16 02/20] ipe: add policy parser
` [PATCH v16 03/20] ipe: add evaluation loop
` [PATCH v16 04/20] ipe: add LSM hooks on execution and kernel read
` [PATCH v16 05/20] initramfs|security: Add a security hook to do_populate_rootfs()
` [PATCH v16 06/20] ipe: introduce 'boot_verified' as a trust provider
` [PATCH v16 07/20] security: add new securityfs delete function
` [PATCH v16 08/20] ipe: add userspace interface
` [PATCH v16 09/20] uapi|audit|ipe: add ipe auditing support
` [PATCH v16 10/20] ipe: add permissive toggle
` [PATCH v16 11/20] block|security: add LSM blob to block_device
` [PATCH v16 12/20] dm: add finalize hook to target_type
` [PATCH v16 13/20] dm verity: consume root hash digest and signature data via LSM hook
` [PATCH v16 14/20] ipe: add support for dm-verity as a trust provider
` [PATCH v16 15/20] security: add security_inode_setintegrity() hook
` [PATCH v16 16/20] fsverity: consume fsverity built-in signatures via LSM hook
` [PATCH v16 17/20] ipe: enable support for fs-verity as a trust provider
` [PATCH v16 18/20] scripts: add boot policy generation program
` [PATCH v16 19/20] ipe: kunit test for parser
` [PATCH v16 20/20] documentation: add ipe documentation

[GIT PULL] security changes for v6.9-rc3
 2024-04-03  2:21 UTC  (10+ messages)

[PATCH v7 00/21] add integrity and security to TPM2 transactions
 2024-04-02 19:30 UTC  (13+ messages)
` [PATCH v7 12/21] tpm: Add NULL primary creation

[GIT PULL] security changes for v6.9-rc3
 2024-04-02 12:15 UTC  (2+ messages)

[PATCH v2] security: Handle dentries without inode in security_path_post_mknod()
 2024-04-02  8:18 UTC 

[PATCH v4][next] integrity: Avoid -Wflex-array-member-not-at-end warnings
 2024-04-01 18:42 UTC 

[PATCH v8 00/15] x86: Trenchboot secure dynamic launch Linux kernel support
 2024-04-01 18:25 UTC  (16+ messages)
` [PATCH v8 01/15] x86/boot: Place kernel_info at a fixed offset
` [PATCH v8 04/15] x86: Secure Launch Resource Table header file
` [PATCH v8 14/15] x86: Secure Launch late initcall platform module

[GIT PULL] tpmdd changes for v6.9-rc2
 2024-04-01 13:17 UTC  (6+ messages)

[PATCH 1/2] security: Handle dentries without inode in security_path_post_mknod()
 2024-03-29 19:56 UTC  (10+ messages)
` [PATCH 2/2] ima: evm: Rename *_post_path_mknod() to *_path_post_mknod()

[PATCH] ima: Fix use-after-free on a dentry's dname.name
 2024-03-29  1:02 UTC  (2+ messages)

[PATCH v7 0/6] DCP as trusted keys backend
 2024-03-28 18:50 UTC  (13+ messages)
` [PATCH v7 1/6] crypto: mxs-dcp: Add support for hardware-bound keys
` [PATCH v7 2/6] KEYS: trusted: improve scalability of trust source config
` [PATCH v7 3/6] KEYS: trusted: Introduce NXP DCP-backed trusted keys
` [PATCH v7 4/6] MAINTAINERS: add entry for DCP-based "
` [PATCH v7 5/6] docs: document DCP-backed trusted keys kernel params
` [PATCH v7 6/6] docs: trusted-encrypted: add DCP as new trust source

kernel crash in mknod
 2024-03-28 13:03 UTC  (19+ messages)

[PATCH] ima: define an init_module critical data record
 2024-03-28  3:08 UTC  (4+ messages)

[ima-evm-utils: PATCH v2 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
 2024-03-27 12:43 UTC  (10+ messages)

Issue with TPM2 Encrypt/Decrypt Functionality and TSS API Integration
 2024-03-25 16:05 UTC  (3+ messages)

[PATCH v3 00/32] spi: get rid of some legacy macros
 2024-03-25  2:13 UTC  (3+ messages)

[PATCH v4] Documentation: tpm_tis
 2024-03-24  2:14 UTC  (6+ messages)

[RFC PATCH v15 12/21] security: add security_bdev_setintegrity() hook
 2024-03-21 17:25 UTC  (6+ messages)
` [PATCH RFC "

[PATCH v3] Documentation: tpm_tis
 2024-03-21 17:01 UTC  (3+ messages)

[PATCH v2] Documentation: tpm_tis
 2024-03-21 16:35 UTC  (9+ messages)

[PATCH v3][next] integrity: Avoid -Wflex-array-member-not-at-end warnings
 2024-03-21 15:49 UTC  (3+ messages)

[PATCH v4] ima: add crypto agility support for template-hash algorithm
 2024-03-21 15:26 UTC  (7+ messages)

[PATCH v2][next] integrity: Avoid -Wflex-array-member-not-at-end warnings
 2024-03-21  3:55 UTC 

[PATCH][next] integrity: Avoid -Wflex-array-member-not-at-end warnings
 2024-03-21  3:39 UTC  (4+ messages)

[RFC PATCH v15 14/21] dm verity: consume root hash digest and signature data via LSM hook
 2024-03-20 18:49 UTC  (6+ messages)
` [PATCH RFC "

[PATCH v3 00/10] evm: Support signatures on stacked filesystem
 2024-03-19 23:26 UTC  (17+ messages)
` [PATCH v3 01/10] ima: Rename backing_inode to real_inode
` [PATCH v3 02/10] security: allow finer granularity in permitting copy-up of security xattrs
` [PATCH v3 03/10] evm: Implement per signature type decision in security_inode_copy_up_xattr
` [PATCH v3 04/10] evm: Use the metadata inode to calculate metadata hash
` [PATCH v3 07/10] ima: re-evaluate file integrity on file metadata change
` [PATCH v3 08/10] evm: Enforce signatures on unsupported filesystem for EVM_INIT_X509
` [PATCH v3 09/10] fs: Rename SB_I_EVM_UNSUPPORTED to SB_I_EVM_HMAC_UNSUPPORTED
` [PATCH v3 10/10] evm: Rename is_unsupported_fs to is_unsupported_hmac_fs

[RFC PATCH v15 00/21] Integrity Policy Enforcement LSM (IPE)
 2024-03-19 23:00 UTC  (9+ messages)
` [RFC PATCH v15 17/21] fsverity: consume builtin signature via LSM hook
` [RFC PATCH v15 18/21] ipe: enable support for fs-verity as a trust provider

[RFC PATCH v15 16/21] security: add security_inode_setintegrity() hook
 2024-03-19 23:00 UTC  (2+ messages)
` [PATCH RFC "

[PATCH 1/1] Fix TPM chip hanging system before suspend/shutdown
 2024-03-19 21:41 UTC  (9+ messages)
` [PATCH v2] tpm: Fix suspend/shutdown on some boards by preserving chip Locality

[PATCH v2] MAINTAINERS: Update URL's for KEYS/KEYRINGS_INTEGRITY and TPM DEVICE DRIVER
 2024-03-19 20:50 UTC 

[PATCH] MAINTAINERS: Update W's for KEYS/KEYRINGS_INTEGRITY and TPM DEVICE RIVER
 2024-03-19 20:43 UTC  (6+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).