Toggle navigation
Patchwork
Linux Integrity
Patches
Bundles
About this project
Login
Register
Mail settings
Show patches with
: State =
Action Required
| Archived =
No
| 794 patches
Series
Submitter
State
any
Action Required
New
Under Review
Accepted
Rejected
RFC
Not Applicable
Changes Requested
Awaiting Upstream
Superseded
Deferred
Mainlined
Queued
Needs ACK
Handled Elsewhere
In Next
Search
Archived
No
Yes
Both
Delegate
------
Nobody
holtmann
holtmann
holtmann
agk
mchehab
mchehab
gregkh
gregkh
mtosatti
lethal
lethal
avi
asi123
andmike
cvaroqui
nomura
jbrassow
dtor
kueda
bmarzins
tmlind
jmberg
jmberg
mcgrof
lenb
lenb
kyle
felipebalbi
varenet
helge
helge
khilman
khilman
khilman
khilman
jwoithe
mlin
Zhang Rui
Zhang Rui
iksaif
cjackiewicz
hmh
jbarnes
jbarnes
jbarnes
willy
snitzer
iwamatsu
dougsland
mjg59
rafael
rafael
rafael
ericvh@gmail.com
ykzhao
venkip
sandeen
pwsan
lucho@ionkov.net
rminnich
anholt
aystarik
roland
shefty
mason
glikely
krh
djbw
djbw
djbw
cmarinas
doyu
jrn
sage
tomba
mmarek
cjb
trondmy
jikos
bcousson
jic23
olof
olof
olof
nsekhar
weiny2
horms
horms
bwidawsk
bwidawsk
shemminger
eulfhan
josef
josef
josef
dianders
jpan9
hal
kdave
bleung
evalenti
jlbec
bhelgaas
vkoul
vkoul
szlin
davejiang
markgross
tagr
tiwai
vireshk
mmind
dledford
geert
geert
herbert
herbert
kvalo
kvalo
kvalo
bentiss
arend
rzwisler
stellarhopper
stellarhopper
jejb
matthias_bgg
dvhart
axboe
axboe
pcmoore
pcmoore
pcmoore
mkp
mkp
stefan_schmidt
leon
lucvoo
jsakkine
jsakkine
jsakkine
bamse
bamse
demarchi
krzk
groeck
groeck
sboyd
sboyd
mturquette
mturquette
0andriy
carlocaione
luca
dgc
kbingham
derosier
narmstrong
narmstrong
atull
tytso
tytso
djwong
bvanassche
omos
jpirko
jpirko
GustavoARSilva
pkshih
patersonc
brauner
shuahkh
shuahkh
shuahkh
palmer
palmer
jgg
Kishon
idosch
labbott
jsimmons
broonie
broonie
broonie
mricon
mricon
mricon
kees
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
arnd
linusw
perfinion
bbrezillon
bachradsusi
rostedt
rostedt
kholk
nbd
ebiggers
ebiggers
pavelm
sds
m0reeze
ganis
jwcart2
matttbe
andmur01
lorpie01
chanwoochoi
dlezcano
jhedberg
vudentz
robertfoss
bgix
tedd_an
tsbogend
wens
wcrobert
robher
kstewart
kwilczynski
hansg
bpf
netdev
dsa
ethtool
netdrv
martineau
abelloni
trix
pabeni
mani_sadhasivam
liusong6
mjp
tohojo
pmalani
prestwoj
prestwoj
dhowells
tzungbi
conchuod
paulmck
jes
mtkaczyk
colyli
pateldipen1984
iweiny
iweiny
bjorn
mhiramat
JanKiszka
jaegeuk
mraynal
aring
konradybcio
ij
Hailan
jstitt007
denkenz
denkenz
mkorenbl
jjohnson
frank_li
geliang
mdraidci
Apply
«
1
2
3
4
…
7
8
»
Patch
Series
A/R/T
S/W/F
Date
Submitter
Delegate
State
integrity: Update comment for load_moklist_certs()
integrity: Update comment for load_moklist_certs()
- - -
-
-
-
2024-05-11
Yusong Gao
New
[27/33] tpm_tis_spi: Follow renaming of SPI "master" to "controller"
spi: get rid of some legacy macros
- 1 -
-
-
-
2024-01-15
Uwe Kleine-König
New
[v2,27/33] tpm_tis_spi: Follow renaming of SPI "master" to "controller"
spi: get rid of some legacy macros
- 1 -
-
-
-
2024-01-22
Uwe Kleine-König
New
[v3,26/32] tpm_tis_spi: Follow renaming of SPI "master" to "controller"
spi: get rid of some legacy macros
1 1 -
-
-
-
2024-02-07
Uwe Kleine-König
New
[v3,1/7] ima: define and call ima_alloc_kexec_file_buf
ima: kexec: measure events between kexec load and execute
- - -
-
-
-
2023-12-16
Tushar Sugandhi
New
[v3,2/7] ima: kexec: move ima log copy from kexec load to execute
ima: kexec: measure events between kexec load and execute
- - -
-
-
-
2023-12-16
Tushar Sugandhi
New
[v3,3/7] ima: kexec: map IMA buffer source pages to image after kexec load
ima: kexec: measure events between kexec load and execute
- - -
-
-
-
2023-12-16
Tushar Sugandhi
New
[v3,4/7] kexec: update kexec_file_load syscall to alloc ima buffer after load
ima: kexec: measure events between kexec load and execute
- - -
-
-
-
2023-12-16
Tushar Sugandhi
New
[v3,5/7] ima: suspend measurements during buffer copy at kexec execute
ima: kexec: measure events between kexec load and execute
- - -
-
-
-
2023-12-16
Tushar Sugandhi
New
[v3,6/7] ima: configure memory to log events between kexec load and execute
ima: kexec: measure events between kexec load and execute
- - -
-
-
-
2023-12-16
Tushar Sugandhi
New
[v3,7/7] ima: measure kexec load and exec events as critical data
ima: kexec: measure events between kexec load and execute
- - -
-
-
-
2023-12-16
Tushar Sugandhi
New
[v4,1/7] ima: define and call ima_alloc_kexec_file_buf
ima: kexec: measure events between kexec load and execute
- - -
-
-
-
2024-01-22
Tushar Sugandhi
New
[v4,2/7] kexec: define functions to map and unmap segments
ima: kexec: measure events between kexec load and execute
- - -
-
-
-
2024-01-22
Tushar Sugandhi
New
[v4,3/7] ima: kexec: skip IMA segment validation after kexec soft reboot
ima: kexec: measure events between kexec load and execute
- - -
-
-
-
2024-01-22
Tushar Sugandhi
New
[v4,4/7] ima: kexec: move ima log copy from kexec load to execute
ima: kexec: measure events between kexec load and execute
- - -
-
-
-
2024-01-22
Tushar Sugandhi
New
[v4,5/7] ima: suspend measurements during buffer copy at kexec execute
ima: kexec: measure events between kexec load and execute
- 1 -
-
-
-
2024-01-22
Tushar Sugandhi
New
[v4,6/7] ima: make the kexec extra memory configurable
ima: kexec: measure events between kexec load and execute
- - -
-
-
-
2024-01-22
Tushar Sugandhi
New
[v4,7/7] ima: measure kexec load and exec events as critical data
ima: kexec: measure events between kexec load and execute
- - -
-
-
-
2024-01-22
Tushar Sugandhi
New
[v5,1/8] ima: define and call ima_alloc_kexec_file_buf
ima: kexec: measure events between kexec load and execute
- - -
-
-
-
2024-02-14
Tushar Sugandhi
New
[v5,2/8] kexec: define functions to map and unmap segments
ima: kexec: measure events between kexec load and execute
- 1 -
-
-
-
2024-02-14
Tushar Sugandhi
New
[v5,3/8] ima: kexec: skip IMA segment validation after kexec soft reboot
ima: kexec: measure events between kexec load and execute
- - -
-
-
-
2024-02-14
Tushar Sugandhi
New
[v5,4/8] ima: kexec: define functions to copy IMA log at soft boot
ima: kexec: measure events between kexec load and execute
- 1 -
-
-
-
2024-02-14
Tushar Sugandhi
New
[v5,5/8] ima: kexec: move IMA log copy from kexec load to execute
ima: kexec: measure events between kexec load and execute
- - -
-
-
-
2024-02-14
Tushar Sugandhi
New
[v5,6/8] ima: suspend measurements during buffer copy at kexec execute
ima: kexec: measure events between kexec load and execute
- 1 -
-
-
-
2024-02-14
Tushar Sugandhi
New
[v5,7/8] ima: make the kexec extra memory configurable
ima: kexec: measure events between kexec load and execute
- 1 -
-
-
-
2024-02-14
Tushar Sugandhi
New
[v5,8/8] ima: measure kexec load and exec events as critical data
ima: kexec: measure events between kexec load and execute
- - -
-
-
-
2024-02-14
Tushar Sugandhi
New
[v3,42/74] x86/cpu/vfm: Update tpm files
Untitled series #845212
- 1 -
-
-
-
2024-04-16
Tony Luck
New
[v4,01/71] tpm: Switch to new Intel CPU model defines
[v4,01/71] tpm: Switch to new Intel CPU model defines
- 1 -
-
-
-
2024-04-24
Tony Luck
New
TPM error path on probe
TPM error path on probe
- - -
-
-
-
2024-02-29
Tim Harvey
New
[1/3] arch/x86: Move struct pci_setup_rom into pci_setup.h
arch/x86: Remove unnecessary dependencies on bootparam.h
- - -
-
-
-
2023-12-06
Thomas Zimmermann
New
[2/3] arch/x86: Add <asm/ima-efi.h> for arch_ima_efi_boot_mode
arch/x86: Remove unnecessary dependencies on bootparam.h
- - -
-
-
-
2023-12-06
Thomas Zimmermann
New
[3/3] arch/x86: Do not include <asm/bootparam.h> in several header files
arch/x86: Remove unnecessary dependencies on bootparam.h
1 - -
-
-
-
2023-12-06
Thomas Zimmermann
New
[v2,1/3] arch/x86: Move UAPI setup structures into setup_data.h
arch/x86: Remove unnecessary dependencies on bootparam.h
- - -
-
-
-
2023-12-15
Thomas Zimmermann
New
[v2,2/3] arch/x86: Add <asm/ima-efi.h> for arch_ima_efi_boot_mode
arch/x86: Remove unnecessary dependencies on bootparam.h
- - -
-
-
-
2023-12-15
Thomas Zimmermann
New
[v2,3/3] arch/x86: Do not include <asm/bootparam.h> in several header files
arch/x86: Remove unnecessary dependencies on bootparam.h
1 - -
-
-
-
2023-12-15
Thomas Zimmermann
New
[v3,1/4] arch/x86: Move UAPI setup structures into setup_data.h
arch/x86: Remove unnecessary dependencies on bootparam.h
- - -
-
-
-
2024-01-04
Thomas Zimmermann
New
[v3,2/4] arch/x86: Move internal setup_data structures into setup_data.h
arch/x86: Remove unnecessary dependencies on bootparam.h
- - -
-
-
-
2024-01-04
Thomas Zimmermann
New
[v3,3/4] arch/x86: Implement arch_ima_efi_boot_mode() in source file
arch/x86: Remove unnecessary dependencies on bootparam.h
- - -
-
-
-
2024-01-04
Thomas Zimmermann
New
[v3,4/4] arch/x86: Do not include <asm/bootparam.h> in several files
arch/x86: Remove unnecessary dependencies on bootparam.h
1 - -
-
-
-
2024-01-04
Thomas Zimmermann
New
[v4,1/4] arch/x86: Move UAPI setup structures into setup_data.h
arch/x86: Remove unnecessary dependencies on bootparam.h
- - -
-
-
-
2024-01-08
Thomas Zimmermann
New
[v4,2/4] arch/x86: Move internal setup_data structures into setup_data.h
arch/x86: Remove unnecessary dependencies on bootparam.h
- - -
-
-
-
2024-01-08
Thomas Zimmermann
New
[v4,3/4] arch/x86: Implement arch_ima_efi_boot_mode() in source file
arch/x86: Remove unnecessary dependencies on bootparam.h
- - -
-
-
-
2024-01-08
Thomas Zimmermann
New
[v4,4/4] arch/x86: Do not include <asm/bootparam.h> in several files
arch/x86: Remove unnecessary dependencies on bootparam.h
1 - -
-
-
-
2024-01-08
Thomas Zimmermann
New
[v5,1/4] arch/x86: Move UAPI setup structures into setup_data.h
arch/x86: Remove unnecessary dependencies on bootparam.h
- - -
-
-
-
2024-01-12
Thomas Zimmermann
New
[v5,2/4] arch/x86: Move internal setup_data structures into setup_data.h
arch/x86: Remove unnecessary dependencies on bootparam.h
- - -
-
-
-
2024-01-12
Thomas Zimmermann
New
[v5,3/4] arch/x86: Implement arch_ima_efi_boot_mode() in source file
arch/x86: Remove unnecessary dependencies on bootparam.h
- - -
-
-
-
2024-01-12
Thomas Zimmermann
New
[v5,4/4] arch/x86: Do not include <asm/bootparam.h> in several files
arch/x86: Remove unnecessary dependencies on bootparam.h
1 - -
-
-
-
2024-01-12
Thomas Zimmermann
New
[1/5] security: allow finer granularity in permitting copy-up of security xattrs
evm: Support signatures on stacked filesystem
- - -
-
-
-
2024-01-30
Stefan Berger
New
[2/5] evm: Implement per signature type decision in security_inode_copy_up_xattr
evm: Support signatures on stacked filesystem
- - -
-
-
-
2024-01-30
Stefan Berger
New
[3/5] ima: Reset EVM status upon detecting changes to overlay backing file
evm: Support signatures on stacked filesystem
- - -
-
-
-
2024-01-30
Stefan Berger
New
[4/5] evm: Use the real inode's metadata to calculate metadata hash
evm: Support signatures on stacked filesystem
- - -
-
-
-
2024-01-30
Stefan Berger
New
[5/5] evm: Enforce signatures on unsupported filesystem for EVM_INIT_X509
evm: Support signatures on stacked filesystem
- - -
-
-
-
2024-01-30
Stefan Berger
New
[v1,ima-evm-utils,1/6] headers: Remove usage of CONFIG_IMA_EVM_ENGINE from public header
Deprecate sign_hash and add provider support
- - -
-
-
-
2024-02-05
Stefan Berger
New
[v1,ima-evm-utils,2/6] Pass ENGINE and keyid through to function using them
Deprecate sign_hash and add provider support
- - -
-
-
-
2024-02-05
Stefan Berger
New
[v1,ima-evm-utils,3/6] evmctl: Replace deprecated sign_hash with imaevm_signhash
Deprecate sign_hash and add provider support
- - -
-
-
-
2024-02-05
Stefan Berger
New
[v1,ima-evm-utils,4/6] Add support for OpenSSL provider to the library and evmctl
Deprecate sign_hash and add provider support
- - -
-
-
-
2024-02-05
Stefan Berger
New
[v1,ima-evm-utils,5/6] tests: Add pkcs11 test using provider
Deprecate sign_hash and add provider support
- - -
-
-
-
2024-02-05
Stefan Berger
New
[v1,ima-evm-utils,6/6] ci: Install pkcs11-provider where available
Deprecate sign_hash and add provider support
- - -
-
-
-
2024-02-05
Stefan Berger
New
[v2,1/9] ima: Rename backing_inode to real_inode
evm: Support signatures on stacked filesystem
1 - -
-
-
-
2024-02-05
Stefan Berger
New
[v2,2/9] security: allow finer granularity in permitting copy-up of security xattrs
evm: Support signatures on stacked filesystem
2 - -
-
-
-
2024-02-05
Stefan Berger
New
[v2,3/9] evm: Implement per signature type decision in security_inode_copy_up_xattr
evm: Support signatures on stacked filesystem
- - -
-
-
-
2024-02-05
Stefan Berger
New
[v2,4/9] ima: Reset EVM status upon detecting changes to the real file
evm: Support signatures on stacked filesystem
- - -
-
-
-
2024-02-05
Stefan Berger
New
[v2,5/9] evm: Use the inode holding the metadata to calculate metadata hash
evm: Support signatures on stacked filesystem
1 - -
-
-
-
2024-02-05
Stefan Berger
New
[v2,6/9] evm: Enforce signatures on unsupported filesystem for EVM_INIT_X509
evm: Support signatures on stacked filesystem
- - -
-
-
-
2024-02-05
Stefan Berger
New
[v2,7/9] fs: Rename SB_I_EVM_UNSUPPORTED to SB_I_EVM_HMAC_UNSUPPORTED
evm: Support signatures on stacked filesystem
1 - -
-
-
-
2024-02-05
Stefan Berger
New
[v2,8/9] evm: Rename is_unsupported_fs to is_unsupported_hmac_fs
evm: Support signatures on stacked filesystem
- - -
-
-
-
2024-02-05
Stefan Berger
New
[v2,9/9] ima: Record i_version of real_inode for change detection
evm: Support signatures on stacked filesystem
- - -
-
-
-
2024-02-05
Stefan Berger
New
[v2,ima-evm-utils,1/6] headers: Remove usage of CONFIG_IMA_EVM_ENGINE from public header
Deprecate sign_hash and add provider support
- - -
-
-
-
2024-02-23
Stefan Berger
New
[v2,ima-evm-utils,2/6] Pass ENGINE and keyid through to function using them
Deprecate sign_hash and add provider support
- - -
-
-
-
2024-02-23
Stefan Berger
New
[v2,ima-evm-utils,3/6] evmctl: Replace deprecated sign_hash with imaevm_signhash
Deprecate sign_hash and add provider support
- - -
-
-
-
2024-02-23
Stefan Berger
New
[v2,ima-evm-utils,4/6] Add support for OpenSSL provider to the library and evmctl
Deprecate sign_hash and add provider support
- - -
-
-
-
2024-02-23
Stefan Berger
New
[v2,ima-evm-utils,5/6] tests: Add pkcs11 test using provider
Deprecate sign_hash and add provider support
- - -
-
-
-
2024-02-23
Stefan Berger
New
[v2,ima-evm-utils,6/6] ci: Install pkcs11-provider where available
Deprecate sign_hash and add provider support
- - -
-
-
-
2024-02-23
Stefan Berger
New
[v3,01/10] ima: Rename backing_inode to real_inode
evm: Support signatures on stacked filesystem
1 - -
-
-
-
2024-02-23
Stefan Berger
New
[v3,02/10] security: allow finer granularity in permitting copy-up of security xattrs
evm: Support signatures on stacked filesystem
1 - -
-
-
-
2024-02-23
Stefan Berger
New
[v3,03/10] evm: Implement per signature type decision in security_inode_copy_up_xattr
evm: Support signatures on stacked filesystem
- - -
-
-
-
2024-02-23
Stefan Berger
New
[v3,04/10] evm: Use the metadata inode to calculate metadata hash
evm: Support signatures on stacked filesystem
1 - -
-
-
-
2024-02-23
Stefan Berger
New
[v3,05/10] ima: Move file-change detection variables into new structure
evm: Support signatures on stacked filesystem
- - -
-
-
-
2024-02-23
Stefan Berger
New
[v3,06/10] evm: Store and detect metadata inode attributes changes
evm: Support signatures on stacked filesystem
- - -
-
-
-
2024-02-23
Stefan Berger
New
[v3,07/10] ima: re-evaluate file integrity on file metadata change
evm: Support signatures on stacked filesystem
- - -
-
-
-
2024-02-23
Stefan Berger
New
[v3,08/10] evm: Enforce signatures on unsupported filesystem for EVM_INIT_X509
evm: Support signatures on stacked filesystem
- - -
-
-
-
2024-02-23
Stefan Berger
New
[v3,09/10] fs: Rename SB_I_EVM_UNSUPPORTED to SB_I_EVM_HMAC_UNSUPPORTED
evm: Support signatures on stacked filesystem
1 - -
-
-
-
2024-02-23
Stefan Berger
New
[v3,10/10] evm: Rename is_unsupported_fs to is_unsupported_hmac_fs
evm: Support signatures on stacked filesystem
- - -
-
-
-
2024-02-23
Stefan Berger
New
[v3,ima-evm-utils,1/7] tests: Skip pkcs11 test if no engine support in evmctl
Deprecate sign_hash and add provider support
- - -
-
-
-
2024-02-26
Stefan Berger
New
[v3,ima-evm-utils,2/7] headers: Remove usage of CONFIG_IMA_EVM_ENGINE from public header
Deprecate sign_hash and add provider support
- - -
-
-
-
2024-02-26
Stefan Berger
New
[v3,ima-evm-utils,3/7] Pass ENGINE and keyid through to function using them
Deprecate sign_hash and add provider support
- - -
-
-
-
2024-02-26
Stefan Berger
New
[v3,ima-evm-utils,4/7] evmctl: Replace deprecated sign_hash with imaevm_signhash
Deprecate sign_hash and add provider support
- - -
-
-
-
2024-02-26
Stefan Berger
New
[v3,ima-evm-utils,5/7] Add support for OpenSSL provider to the library and evmctl
Deprecate sign_hash and add provider support
- - -
-
-
-
2024-02-26
Stefan Berger
New
[v3,ima-evm-utils,6/7] tests: Add pkcs11 test using provider
Deprecate sign_hash and add provider support
- - -
-
-
-
2024-02-26
Stefan Berger
New
[v3,ima-evm-utils,7/7] ci: Install pkcs11-provider where available
Deprecate sign_hash and add provider support
- - -
-
-
-
2024-02-26
Stefan Berger
New
[v4,ima-evm-utils,1/7] tests: Skip pkcs11 test if no engine support in evmctl
Implement imaevm_signhash and add provider support
- - -
-
-
-
2024-02-28
Stefan Berger
New
[v4,ima-evm-utils,2/7] headers: Remove usage of CONFIG_IMA_EVM_ENGINE from public header
Implement imaevm_signhash and add provider support
- - -
-
-
-
2024-02-28
Stefan Berger
New
[v4,ima-evm-utils,3/7] Implement imaevm_signhash library function and deprecate sign_hash
Implement imaevm_signhash and add provider support
- - -
-
-
-
2024-02-28
Stefan Berger
New
[v4,ima-evm-utils,4/7] evmctl: Replace deprecated sign_hash with imaevm_signhash
Implement imaevm_signhash and add provider support
- - -
-
-
-
2024-02-28
Stefan Berger
New
[v4,ima-evm-utils,5/7] Add support for OpenSSL provider to the library and evmctl
Implement imaevm_signhash and add provider support
- - -
-
-
-
2024-02-28
Stefan Berger
New
[v4,ima-evm-utils,6/7] tests: Add pkcs11 test using provider
Implement imaevm_signhash and add provider support
- - -
-
-
-
2024-02-28
Stefan Berger
New
[v4,ima-evm-utils,7/7] ci: Install pkcs11-provider where available
Implement imaevm_signhash and add provider support
- - -
-
-
-
2024-02-28
Stefan Berger
New
[ima-evm-utils] Add missing newline to error message
[ima-evm-utils] Add missing newline to error message
- - -
-
-
-
2024-03-01
Stefan Berger
New
[1/2] powerpc/prom_init: Replace linux,sml-base/sml-size with linux,sml-log
Preserve TPM log across kexec
- - -
-
-
-
2024-03-06
Stefan Berger
New
[2/2] tpm: of: If available Use linux,sml-log to get the log and its size
Preserve TPM log across kexec
- - -
-
-
-
2024-03-06
Stefan Berger
New
«
1
2
3
4
…
7
8
»