Linux Integrity
[Prev Page][Next Page]
- Re: [RFC][PATCH v2 03/13] integrity/digest_cache: Add functions to populate and search
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC][PATCH v2 02/13] integrity: Introduce a digest cache
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 6/6] integrity: PowerVM support for loading third party code signing keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 1/6] integrity: PowerVM support for loading CA keys on machine keyring
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: Revert "tpm_tis: Disable interrupts on ThinkPad T490s"
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH v2] tpm_tis: Revert "tpm_tis: Disable interrupts on ThinkPad T490s"
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH -next] tpm/tpm_tis_synquacer: Use module_platform_driver macro to simplify the code
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: Revert "tpm_tis: Disable interrupts on ThinkPad T490s"
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] s390/ipl: fix virtual vs physical address confusion
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] s390/ipl: fix virtual vs physical address confusion
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] s390/ipl: fix virtual vs physical address confusion
- From: Alexander Gordeev <agordeev@xxxxxxxxxxxxx>
- Re: [PATCH v2] s390/ipl: fix virtual vs physical address confusion
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] s390/ipl: fix virtual vs physical address confusion
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [PATCH v4 5/6] integrity: PowerVM machine keyring enablement
- From: R Nageswara Sastry <rnsastry@xxxxxxxxxxxxx>
- Re: [PATCH v4 6/6] integrity: PowerVM support for loading third party code signing keys
- From: R Nageswara Sastry <rnsastry@xxxxxxxxxxxxx>
- Re: [PATCH v4 4/6] integrity: check whether imputed trust is enabled
- From: R Nageswara Sastry <rnsastry@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/6] integrity: ignore keys failing CA restrictions on non-UEFI platform
- From: R Nageswara Sastry <rnsastry@xxxxxxxxxxxxx>
- Re: [PATCH v4 3/6] integrity: remove global variable from machine_keyring.c
- From: R Nageswara Sastry <rnsastry@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/6] integrity: PowerVM support for loading CA keys on machine keyring
- From: R Nageswara Sastry <rnsastry@xxxxxxxxxxxxx>
- [PATCH v2] s390/ipl: fix virtual vs physical address confusion
- From: Alexander Gordeev <agordeev@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/6] integrity: ignore keys failing CA restrictions on non-UEFI platform
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC][PATCH v2 03/13] integrity/digest_cache: Add functions to populate and search
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC][PATCH v2 02/13] integrity: Introduce a digest cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 6/6] integrity: PowerVM support for loading third party code signing keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4 5/6] integrity: PowerVM machine keyring enablement
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v4 1/6] integrity: PowerVM support for loading CA keys on machine keyring
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v4 0/6] Enable loading local and third party keys on PowerVM guest
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v4 4/6] integrity: check whether imputed trust is enabled
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v4 2/6] integrity: ignore keys failing CA restrictions on non-UEFI platform
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v4 6/6] integrity: PowerVM support for loading third party code signing keys
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v4 3/6] integrity: remove global variable from machine_keyring.c
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH -next] tpm/tpm_tis_synquacer: Use module_platform_driver macro to simplify the code
- From: Li Zetao <lizetao1@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: Revert "tpm_tis: Disable interrupts on ThinkPad T490s"
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] tpm/tpm_tis: Disable interrupts categorically for Lenovo
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [RFC] IMA Log Snapshotting Design Proposal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC] IMA Log Snapshotting Design Proposal
- From: Sush Shringarputale <sushring@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Revert "tpm_tis: Disable interrupts on ThinkPad T490s"
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v3 6/6] integrity: PowerVM support for loading third party code signing keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 2/6] integrity: ignore keys failing CA restrictions on non-UEFI platform
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 1/6] integrity: PowerVM support for loading CA keys on machine keyring
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC][PATCH v2 03/13] integrity/digest_cache: Add functions to populate and search
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC][PATCH v2 02/13] integrity: Introduce a digest cache
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH] tpm_tis: Revert "tpm_tis: Disable interrupts on ThinkPad T490s"
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v3 0/6] Enable loading local and third party keys on PowerVM guest
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v3 6/6] integrity: PowerVM support for loading third party code signing keys
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v3 5/6] integrity: PowerVM machine keyring enablement
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v3 3/6] integrity: remove global variable from machine_keyring.c
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v3 2/6] integrity: ignore keys failing CA restrictions on non-UEFI platform
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v3 4/6] integrity: check whether imputed trust is enabled
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v3 1/6] integrity: PowerVM support for loading CA keys on machine keyring
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: Grundik <ggrundik@xxxxxxxxx>
- [RFC][PATCH v2 13/13] docs: Add documentation of the integrity digest cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v2 10/13] tools: Add tool to manage digest lists
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v2 12/13] tools/digest-lists: Add rpm digest list generator and parser
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v2 11/13] tools/digest-lists: Add tlv digest list generator and parser
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v2 07/13] ima: Add digest_cache policy keyword
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v2 08/13] ima: Use digest cache for measurement
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v2 09/13] ima: Use digest cache for appraisal
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v2 02/13] integrity: Introduce a digest cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v2 03/13] integrity/digest_cache: Add functions to populate and search
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v2 00/13] integrity: Introduce a digest cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v2 04/13] integrity/digest_cache: Prefetch digest lists in a directory
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v2 06/13] integrity/digest_cache: Parse rpm digest lists
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v2 01/13] ima: Introduce hook DIGEST_LIST_CHECK
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v2 05/13] integrity/digest_cache: Parse tlv digest lists
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd changes for v6.5-rc7
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [GIT PULL] tpmdd changes for v6.5-rc7
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [GIT PULL] tpmdd changes for v6.5-rc7
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 1/2] tpm: tpm_tis: Fix UPX-i11 DMI_MATCH condition
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 0/2] tpm_tis: opt-in interrupts
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 2/2] tpm_tis: Opt-in interrupts
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: Grundik <ggrundik@xxxxxxxxx>
- Re: [RFC] IMA Log Snapshotting Design Proposal
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm/tpm_tis: Disable interrupts categorically for Lenovo
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm/tpm_tis: Disable interrupts categorically for Lenovo
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm/tpm_tis: Disable interrupts categorically for Lenovo
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC] IMA Log Snapshotting Design Proposal
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] IMA Log Snapshotting Design Proposal
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm/tpm_tis: Disable interrupts categorically for Lenovo
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [RFC] IMA Log Snapshotting Design Proposal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: Grundik <ggrundik@xxxxxxxxx>
- Re: [PATCH v2 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: Thorsten Leemhuis <regressions@xxxxxxxxxxxxx>
- Re: [PATCH] tpm/tpm_tis: Disable interrupts categorically for Lenovo
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH] tpm/tpm_tis: Disable interrupts categorically for Lenovo
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH] tpm: Add a helper for checking hwrng enabled
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm/tpm_tis: Disable interrupts for MSI GS66 Stealth 11UG
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 6/6] integrity: PowerVM support for loading third party code signing keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 5/6] integrity: PowerVM machine keyring enablement
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: Build failure on tpmdd master branch
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: Build failure on tpmdd master branch
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm/tpm_tis: Disable interrupts for Lenovo Thinkpad E14 Gen 2 and 13s-IML
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm/tpm_tis: Disable interrupts for Lenovo Thinkpad E14 Gen 2 and 13s-IML
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH] tpm/tpm_tis: Disable interrupts categorically for Lenovo
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm/tpm_tis: Disable interrupts for Lenovo Thinkpad E14 Gen 2 and 13s-IML
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH] tpm/tpm_tis: Disable interrupts for Lenovo Thinkpad E14 Gen 2 and 13s-IML
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 3/6] integrity: remove global variable from machine_keyring.c
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] tpm: Disable RNG for all AMD fTPMs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: Build failure on tpmdd master branch
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm/tpm_tis: Disable interrupts for Lenovo Thinkpad E14 Gen 2 and 13s-IML
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH v3] tpm: Disable RNG for all AMD fTPMs
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] tpm: tpm_tis: Fix UPX-i11 DMI_MATCH condition
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: tpm_tis: Fix UPX-i11 DMI_PRODUCT_VERSION string
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: tpm_tis: Fix UPX-i11 DMI_PRODUCT_VERSION string
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: Add a helper for checking hwrng enabled
- From: "Limonciello, Mario" <mario.limonciello@xxxxxxx>
- Re: [PATCH] tpm/tpm_tis: Disable interrupts for Lenovo Thinkpad E14 Gen 2 and 13s-IML
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: Add a helper for checking hwrng enabled
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] tpm: Disable RNG for all AMD fTPMs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] tpm: Disable RNG for all AMD fTPMs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] tpm: Disable RNG for all AMD fTPMs
- From: "Limonciello, Mario" <mario.limonciello@xxxxxxx>
- Re: [PATCH v3] tpm: Disable RNG for all AMD fTPMs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC] IMA Log Snapshotting Design Proposal
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC] IMA Log Snapshotting Design Proposal
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] tpm/tpm_tis: Disable interrupts for MSI GS66 Stealth 11UG
- From: Jonathan McDowell <noodles@xxxxxxxx>
- Re: [RFC] IMA Log Snapshotting Design Proposal
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] IMA Log Snapshotting Design Proposal
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] IMA Log Snapshotting Design Proposal
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] IMA Log Snapshotting Design Proposal
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] IMA Log Snapshotting Design Proposal
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] IMA Log Snapshotting Design Proposal
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: AMD fTPM patches for stable
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: AMD fTPM patches for stable
- From: "Limonciello, Mario" <mario.limonciello@xxxxxxx>
- Re: [PATCH v3] tpm: Disable RNG for all AMD fTPMs
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- AMD fTPM patches for stable
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v2 3/6] integrity: remove global variable from machine_keyring.c
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v2 5/6] integrity: PowerVM machine keyring enablement
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v2 1/6] integrity: PowerVM support for loading CA keys on machine keyring
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v2 6/6] integrity: PowerVM support for loading third party code signing keys
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v2 4/6] integrity: check whether imputed trust is enabled
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v2 2/6] integrity: ignore keys failing CA restrictions on non-UEFI platform
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v2 0/6] Enable loading local and third party keys on PowerVM guest
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [RFC PATCH v10 11/17] dm-verity: consume root hash digest and signature data via LSM hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] tpm: Disable RNG for all AMD fTPMs
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] s390/ipl: fix virtual vs physical address confusion
- From: Alexander Gordeev <agordeev@xxxxxxxxxxxxx>
- Re: [RFC PATCH v10 11/17] dm-verity: consume root hash digest and signature data via LSM hook
- From: Alasdair G Kergon <agk@xxxxxxxxxx>
- Re: [RFC PATCH v10 11/17] dm-verity: consume root hash digest and signature data via LSM hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] IMA Log Snapshotting Design Proposal
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: tee: use tee_shm_register_alloc_buf()
- From: Jens Wiklander <jens.wiklander@xxxxxxxxxx>
- Re: [RFC] IMA Log Snapshotting Design Proposal
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC] IMA Log Snapshotting Design Proposal
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm/tpm_tis: Disable interrupts for Lenovo Thinkpad E14 Gen 2 and 13s-IML
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH v3] tpm: Disable RNG for all AMD fTPMs
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [RFC] IMA Log Snapshotting Design Proposal
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC] IMA Log Snapshotting Design Proposal
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: tpm_tis: Fix UPX-i11 DMI_PRODUCT_VERSION string
- From: Péter Ujfalusi <peter.ujfalusi@xxxxxxxxxxxxxxx>
- [PATCH] tpm: tpm_tis: Fix UPX-i11 DMI_PRODUCT_VERSION string
- From: Peter Ujfalusi <peter.ujfalusi@xxxxxxxxxxxxxxx>
- [PATCH] tpm: tpm_tis: Fix UPX-i11 DMI_MATCH condition
- From: Peter Ujfalusi <peter.ujfalusi@xxxxxxxxxxxxxxx>
- [PATCH] tpm: Add a helper for checking hwrng enabled
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- Build failure on tpmdd master branch
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] tpm: Disable RNG for all AMD fTPMs
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] tpm: Disable RNG for all AMD fTPMs
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v3] tpm: Disable RNG for all AMD fTPMs
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- Re: [RFC] IMA Log Snapshotting Design Proposal
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3] tpm: Disable RNG for all AMD fTPMs
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [GIT PULL] tpmdd changes for v6.5-rc6
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH] tpm/tpm_tis: Disable interrupts for Lenovo Thinkpad E14 Gen 2 and 13s-IML
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [GIT PULL] tpmdd changes for v6.5-rc6
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 RESEND] kexec_lock: Replace kexec_mutex() by kexec_lock() in two comments
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] tpm/tpm_tis: Disable interrupts for Lenovo Thinkpad E14 Gen 2 and 13s-IML
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH] KEYS: trusted: tee: use tee_shm_register_alloc_buf()
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v2 RESEND] kexec_lock: Replace kexec_mutex() by kexec_lock() in two comments
- From: Wenyu Liu <liuwenyu7@xxxxxxxxxx>
- Re: [PATCH v2 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: Grundik <ggrundik@xxxxxxxxx>
- Re: [PATCH v3] tpm: Disable RNG for all AMD fTPMs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] tpm: Disable RNG for all AMD fTPMs
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- Re: [PATCH v2] tpm: Disable RNG for all AMD fTPMs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm/tpm_tis: Disable interrupts for Lenovo P620 devices
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] tpm: Disable RNG for all AMD fTPMs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] tpm: Disable RNG for all AMD fTPMs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: Add a missing check for TPM_CHIP_FLAG_HWRNG_DISABLED
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm: Disable RNG for all AMD fTPMs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: boot-time vtpm helper (was "Re: <void>")
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 4/6] ima: implement functionality to measure TPM update counter
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5/6] ima: measure TPM update counter at ima_init
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH] tpm/tpm_tis: Disable interrupts for Lenovo P620 devices
- From: Jonathan McDowell <noodles@xxxxxxxx>
- Re: [PATCH] crypto: lib - Move mpi into lib/crypto
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3] tpm: Disable RNG for all AMD fTPMs
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH -next] trusted-keys: Fix kernel-doc warnings in trusted-keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] crypto: lib - Move mpi into lib/crypto
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/6] ima: implement functionality to measure TPM update counter
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 5/6] ima: measure TPM update counter at ima_init
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 5/6] ima: measure TPM update counter at ima_init
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] trusted-keys: Fix kernel-doc warnings in trusted-keys
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 4/6] ima: implement functionality to measure TPM update counter
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/6] Measuring TPM update counter in IMA
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 0/6] Measuring TPM update counter in IMA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH -next] trusted-keys: Fix kernel-doc warnings in trusted-keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 5/6] ima: measure TPM update counter at ima_init
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 0/6] Measuring TPM update counter in IMA
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH -next] trusted-keys: Fix kernel-doc warnings in trusted-keys
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 0/6] Measuring TPM update counter in IMA
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/6] ima: implement functionality to measure TPM update counter
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/6] tpm: implement TPM2 function to get update counter
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/6] tpm: implement TPM2 function to get update counter
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/6] tpm: implement TPM2 function to get update counter
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3] tpm: Disable RNG for all AMD fTPMs
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- Re: [RFC][PATCH 00/12] integrity: Introduce a digest cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] tpm: Add a missing check for TPM_CHIP_FLAG_HWRNG_DISABLED
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v2] tpm: Disable RNG for all AMD fTPMs
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH 2/3] tpm: Add command line for not trusting tpm for RNG
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH 0/6] Measuring TPM update counter in IMA
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: boot-time vtpm helper (was "Re: <void>")
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH] KEYS: trusted: tee: use tee_shm_register_alloc_buf()
- From: Jens Wiklander <jens.wiklander@xxxxxxxxxx>
- Re: [PATCH 3/3] tpm: Drop CONFIG_HW_RANDOM_TPM
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- Re: [PATCH 1/3] tpm: Add a missing check for TPM_CHIP_FLAG_HWRNG_DISABLED
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- boot-time vtpm helper (was "Re: <void>")
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 3/3] tpm: Drop CONFIG_HW_RANDOM_TPM
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 3/3] tpm: Drop CONFIG_HW_RANDOM_TPM
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: Add a missing check for TPM_CHIP_FLAG_HWRNG_DISABLED
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/6] tpm: implement TPM2 function to get update counter
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/6] tpm: implement TPM2 function to get update counter
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [no subject]
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 3/3] tpm: Drop CONFIG_HW_RANDOM_TPM
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- [PATCH 3/3] tpm: Drop CONFIG_HW_RANDOM_TPM
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH 2/3] tpm: Add command line for not trusting tpm for RNG
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH 0/3] More changes related to TPM RNG handling
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH 1/3] tpm: Add a missing check for TPM_CHIP_FLAG_HWRNG_DISABLED
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- Re: [PATCH 1/6] tpm: implement TPM2 function to get update counter
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH 5/6] integrity: PowerVM machine keyring enablement.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 4/6] integrity: check whether imputed trust is enabled
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/6] integrity: ignore keys failing CA restrictions on non-UEFI platform
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/6] integrity: remove global variable from machine_keyring.c
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/6] integrity: PowerVM support for loading CA keys on machine keyring
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 0/6] Enable loading local and third party keys on PowerVM guest
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/6] tpm: implement TPM2 function to get update counter
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Disable RNG for all AMD fTPMs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH v2] tpm: Disable RNG for all AMD fTPMs
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- Re: [PATCH] tpm: Disable RNG for all AMD fTPMs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/6] tpm: implement TPM2 function to get update counter
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC] IMA Log Snapshotting Design Proposal
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] tpm: Disable RNG for all AMD fTPMs
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- Re: [PATCH 1/6] tpm: implement TPM2 function to get update counter
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v10 7/17] ipe: add userspace interface
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v10 8/17] uapi|audit|ipe: add ipe auditing support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC] IMA Log Snapshotting Design Proposal
- From: Sush Shringarputale <sushring@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/6] tpm: implement TPM2 function to get update counter
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH 5/6] ima: measure TPM update counter at ima_init
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 6/6] kexec: measure TPM update counter in ima log at kexec load
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4/6] ima: implement functionality to measure TPM update counter
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/6] tpm: implement TPM2 function to get update counter
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/6] ima: get TPM update counter
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/6] tpm: provide functionality to get update counter
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/6] Measuring TPM update counter in IMA
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: Mateusz Schyboll <dragonn@xxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: "Limonciello, Mario" <mario.limonciello@xxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: "Limonciello, Mario" <mario.limonciello@xxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: "Limonciello, Mario" <mario.limonciello@xxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] integrity: Always reference the blacklist keyring with appraisal
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm/tpm_tis: Disable interrupts for TUXEDO InfinityBook S 15/17 Gen7
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: Daniil Stas <daniil.stas@xxxxxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm/tpm_tis: Disable interrupts for TUXEDO InfinityBook S 15/17 Gen7
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH] tpm/tpm_tis: Disable interrupts for TUXEDO InfinityBook S 15/17 Gen7
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [GIT PULL] tpmdd changes for v6.5-rc4
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: "Limonciello, Mario" <mario.limonciello@xxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: "Limonciello, Mario" <mario.limonciello@xxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: Daniil Stas <daniil.stas@xxxxxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm/tpm_tis: Disable interrupts for TUXEDO InfinityBook S 15/17 Gen7
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [GIT PULL] tpmdd changes for v6.5-rc4
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v3] tpm: Explicitly include correct DT includes
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v2] ima: require signed IMA policy when UEFI secure boot is enabled
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4] integrity: Always reference the blacklist keyring with appraisal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: Remove deprecated IMA_TRUSTED_KEYRING Kconfig
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: Daniil Stas <daniil.stas@xxxxxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: Daniil Stas <daniil.stas@xxxxxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: Daniil Stas <daniil.stas@xxxxxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: Daniil Stas <daniil.stas@xxxxxxxxxx>
- [PATCH v2] char: Explicitly include correct DT includes
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH v4] integrity: Always reference the blacklist keyring with appraisal
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH] tpm/tpm_tis: Disable interrupts for TUXEDO InfinityBook S 15/17 Gen7
- From: Takashi Iwai <tiwai@xxxxxxx>
- [PATCH v2] ima: require signed IMA policy when UEFI secure boot is enabled
- From: Coiby Xu <coxu@xxxxxxxxxx>
- Re: [PATCH -next] trusted-keys: Fix kernel-doc warnings in trusted-keys
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v10 11/17] dm-verity: consume root hash digest and signature data via LSM hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2] kexec_lock: Replace kexec_mutex() by kexec_lock() in two comments
- From: Wenyu Liu <liuwenyu7@xxxxxxxxxx>
- Re: [PATCH] kexec_lock:Fix comment for kexec_lock
- From: "Wenyu Liu(D)" <liuwenyu7@xxxxxxxxxx>
- Re: [PATCH] kexec_lock:Fix comment for kexec_lock
- From: "Wenyu Liu(D)" <liuwenyu7@xxxxxxxxxx>
- Re: [PATCH] kexec_lock:Fix comment for kexec_lock
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: [PATCH] kexec_lock:Fix comment for kexec_lock
- From: Baoquan He <bhe@xxxxxxxxxx>
- [PATCH] kexec_lock:Fix comment for kexec_lock
- From: "Wenyu Liu(D)" <liuwenyu7@xxxxxxxxxx>
- [RFC][PATCH 01/12] ima: Introduce hook DIGEST_LIST_CHECK
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 03/12] integrity/digest_cache: Add functions to populate and search
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 00/12] integrity: Introduce a digest cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 07/12] ima: Add digest_cache policy keyword
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 12/12] tools/digest-lists: Add rpm digest list generator and parser
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 11/12] tools/digest-lists: Add tlv digest list generator and parser
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 10/12] tools: Add tool to manage digest lists
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 09/12] ima: Use digest cache for appraisal
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 08/12] ima: Use digest cache for measurement
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 05/12] integrity/digest_cache: Parse tlv digest lists
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 06/12] integrity/digest_cache: Parse rpm digest lists
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 02/12] integrity: Introduce a digest cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 04/12] integrity/digest_cache: Iterate over digest lists in same dir
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC][PATCH v3 0/9] KEYS: Introduce user asymmetric keys and signatures
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC][PATCH v3 0/9] KEYS: Introduce user asymmetric keys and signatures
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [RFC][GNUPG][PATCH v3 2/2] Convert PGP signatures to the user asymmetric key signatures format
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][GNUPG][PATCH v3 1/2] Convert PGP keys to the user asymmetric keys format
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v3 9/9] ima: Support non-PKCS#7 modsig types
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v3 8/9] KEYS: Introduce load_uasym_keyring()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v3 7/9] KEYS: asymmetric: Preload user asymmetric keys from a keyring blob
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v3 6/9] verification: Add verify_uasym_signature() and verify_uasym_sig_message()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v3 2/9] crypto: Export public key algorithm information
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v3 5/9] KEYS: asymmetric: Introduce the user asymmetric key signature parser
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v3 3/9] crypto: Export signature encoding information
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v3 4/9] KEYS: asymmetric: Introduce the user asymmetric key parser
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v3 0/9] KEYS: Introduce user asymmetric keys and signatures
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v3 1/9] lib: Add TLV parser
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] ima: require signed IMA policy when UEFI secure boot is enabled
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Switch i2c drivers back to use .probe()
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: Switch i2c drivers back to use .probe()
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd changes for v6.5-rc3
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] tpmdd changes for v6.5-rc3
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] tpmdd changes for v6.5-rc2
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] char: Explicitly include correct DT includes
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/2] powerpc/tpm: Create linux,sml-base/size as big endian
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] tpmdd changes for v6.5-rc2
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v10 9/17] ipe: add permissive toggle
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v10 8/17] uapi|audit|ipe: add ipe auditing support
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v10 7/17] ipe: add userspace interface
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v10 6/17] security: add new securityfs delete function
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v10 5/17] ipe: introduce 'boot_verified' as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v10 4/17] ipe: add LSM hooks on execution and kernel read
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v10 3/17] ipe: add evaluation loop
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [GIT PULL] tpmdd changes for v6.5-rc2
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] char: Explicitly include correct DT includes
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [GIT PULL] tpmdd changes for v6.5-rc2
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] kexec_file: ima: allow loading a kernel with its IMA signature verified
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH 3/6] integrity: remove global variable from machine_keyring.c
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH 5/6] integrity: PowerVM machine keyring enablement.
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH 6/6] integrity: PowerVM support for loading third party code signing keys
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH 4/6] integrity: check whether imputed trust is enabled
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH 2/6] integrity: ignore keys failing CA restrictions on non-UEFI platform
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH 1/6] integrity: PowerVM support for loading CA keys on machine keyring
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH 0/6] Enable loading local and third party keys on PowerVM guest
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [PATCH] kexec_file: ima: allow loading a kernel with its IMA signature verified
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3] integrity: Always reference the blacklist keyring with apprasial
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [GIT PULL] tpmdd changes for v6.5-rc2
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 RESEND] tpm,tpm_tis: Disable interrupts after 1000 unhandled IRQs
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH v3] integrity: Always reference the blacklist keyring with apprasial
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH RFC v10 2/17] ipe: add policy parser
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 RESEND] tpm,tpm_tis: Disable interrupts after 1000 unhandled IRQs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] kexec_file: ima: allow loading a kernel with its IMA signature verified
- From: Coiby Xu <coxu@xxxxxxxxxx>
- Re: [PATCH] kexec_file: ima: allow loading a kernel with its IMA signature verified
- From: Coiby Xu <coxu@xxxxxxxxxx>
- Re: [PATCH] ima: require signed IMA policy when UEFI secure boot is enabled
- From: Coiby Xu <coxu@xxxxxxxxxx>
- [PATCH v3] integrity: Always reference the blacklist keyring with apprasial
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH RFC v10 1/17] security: add ipe lsm
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 RESEND] tpm,tpm_tis: Disable interrupts after 1000 unhandled IRQs
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH] kexec_file: ima: allow loading a kernel with its IMA signature verified
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v4] tpm,tpm_tis: Disable interrupts after 1000 unhandled IRQs
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [linux-next:master] BUILD REGRESSION e3262265625831348cfb3128d35907ead75d8bf7
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH v2] integrity: Always reference the blacklist keyring with apprasial
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH 3] tpm,tpm_tis: Disable interrupts after 1000 unhandled IRQs
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH v2] integrity: Always reference the blacklist keyring with apprasial
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] integrity: Always reference the blacklist keyring with apprasial
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH 05/10] kexec: implement functions to map and unmap segment to kimage
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/10] ima: implement function to allocate buffer at kexec load
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 03/10] ima: allocate buffer at kexec load to hold ima measurements
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 10/10] kexec: update kexec_file_load syscall to call ima_kexec_post_load
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] kexec_file: ima: allow loading a kernel with its IMA signature verified
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] integrity: Always reference the blacklist keyring with apprasial
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH 06/10] ima: update buffer at kexec execute with ima measurements
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] powerpc/tpm: Create linux,sml-base/size as big endian
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] powerpc/tpm: Create linux,sml-base/size as big endian
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: Christian Hesse <list@xxxxxxxx>
- Re: [RFC PATCH v10 11/17] dm-verity: consume root hash digest and signature data via LSM hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 10/10] kexec: update kexec_file_load syscall to call ima_kexec_post_load
- From: RuiRui Yang <ruyang@xxxxxxxxxx>
- Re: [PATCH v2 1/2] powerpc/tpm: Create linux,sml-base/size as big endian
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 01/10] ima: implement function to allocate buffer at kexec load
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 03/10] ima: allocate buffer at kexec load to hold ima measurements
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 05/10] kexec: implement functions to map and unmap segment to kimage
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 10/10] kexec: update kexec_file_load syscall to call ima_kexec_post_load
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 07/10] ima: remove function ima_dump_measurement_list
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 06/10] ima: update buffer at kexec execute with ima measurements
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 06/10] ima: update buffer at kexec execute with ima measurements
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 05/10] kexec: implement functions to map and unmap segment to kimage
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 03/10] ima: allocate buffer at kexec load to hold ima measurements
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 02/10] ima: implement function to populate buffer at kexec execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/10] ima: implement function to allocate buffer at kexec load
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/10] ima: measure events between kexec load and execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/10] ima: measure events between kexec load and execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH] ima: Remove deprecated IMA_TRUSTED_KEYRING Kconfig
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: "Linux regression tracking (Thorsten Leemhuis)" <regressions@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] powerpc/tpm: Create linux,sml-base/size as big endian
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: Grundik <ggrundik@xxxxxxxxx>
- Re: [PATCH v12 1/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH] kexec_file: ima: allow loading a kernel with its IMA signature verified
- From: Coiby Xu <coxu@xxxxxxxxxx>
- Re: [PATCH] tpm: make all 'class' structures const
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm/tpm_tis: Disable interrupts for Lenovo L590 devices
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 3] tpm,tpm_tis: Disable interrupts after 1000 unhandled IRQs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH][next] tpm: remove redundant variable len
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] tpm: Do not remap from ACPI resouces again for Pluton TPM
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/2] powerpc/tpm: Create linux,sml-base/size as big endian
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: Christian Hesse <list@xxxxxxxx>
- [PATCH v3 2/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 13th gen
- From: Christian Hesse <mail@xxxxxxxx>
- [PATCH v3 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: Christian Hesse <mail@xxxxxxxx>
- [PATCH v3] tpm: Do not remap from ACPI resouces again for Pluton TPM
- From: Valentin David <valentin.david@xxxxxxxxx>
- Re: [PATCH] security: keys: Modify mismatched function name
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v12 1/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v3 4/4] tpm_tis: Resend command to recover from data transfer errors
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 3/4] tpm_tis: Use responseRetry to recover from data transfer errors
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 1/4] tpm_tis: Explicitly check for error code
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: "Linux regression tracking (Thorsten Leemhuis)" <regressions@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: Christian Hesse <mail@xxxxxxxx>
- [PATCH v2 2/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 13th gen
- From: Christian Hesse <mail@xxxxxxxx>
- Re: [PATCH 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: "Linux regression tracking (Thorsten Leemhuis)" <regressions@xxxxxxxxxxxxx>
- [PATCH 2/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 13th gen
- From: Christian Hesse <mail@xxxxxxxx>
- [PATCH 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: Christian Hesse <mail@xxxxxxxx>
- Re: [PATCH v2] tpm: Do not remap from ACPI resouces again for Pluton TPM
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: return false from tpm_amd_is_rng_defective on non-x86 platforms
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [regression] Kernel 6.4 failing to access TPM on Framework Laptop 12th gen
- From: Thorsten Leemhuis <regressions@xxxxxxxxxxxxx>
- Re: [PATCH RFC v10 8/17] uapi|audit|ipe: add ipe auditing support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v10 12/17] ipe: add support for dm-verity as a trust provider
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v10 9/17] ipe: add permissive toggle
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v10 7/17] ipe: add userspace interface
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v10 6/17] security: add new securityfs delete function
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v10 5/17] ipe: introduce 'boot_verified' as a trust provider
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v10 3/17] ipe: add evaluation loop
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v10 4/17] ipe: add LSM hooks on execution and kernel read
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v10 2/17] ipe: add policy parser
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v10 1/17] security: add ipe lsm
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v12 1/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] tpm: return false from tpm_amd_is_rng_defective on non-x86 platforms
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH 06/10] ima: update buffer at kexec execute with ima measurements
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 04/14] x86: Secure Launch Resource Table header file
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v12 1/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: return false from tpm_amd_is_rng_defective on non-x86 platforms
- From: "Linux regression tracking (Thorsten Leemhuis)" <regressions@xxxxxxxxxxxxx>
- Re: [PATCH 00/10] ima: measure events between kexec load and execute
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 06/10] ima: update buffer at kexec execute with ima measurements
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v10 11/17] dm-verity: consume root hash digest and signature data via LSM hook
- From: Mike Snitzer <snitzer@xxxxxxxxxx>
- Re: [PATCH v12 1/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v12 1/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 07/10] ima: remove function ima_dump_measurement_list
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 03/10] ima: allocate buffer at kexec load to hold ima measurements
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 02/10] ima: implement function to populate buffer at kexec execute
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 01/10] ima: implement function to allocate buffer at kexec load
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 05/10] kexec: implement functions to map and unmap segment to kimage
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 10/10] kexec: update kexec_file_load syscall to call ima_kexec_post_load
- From: RuiRui Yang <ruyang@xxxxxxxxxx>
- Re: [PATCH 00/10] ima: measure events between kexec load and execute
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [RFC][PATCH 00/10] KEYS: Introduce user asymmetric keys and signatures
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- RE: [PATCH v12 1/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v12 1/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC][PATCH 00/10] KEYS: Introduce user asymmetric keys and signatures
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- [PATCH v2] tpm: Do not remap from ACPI resouces again for Pluton TPM
- From: Valentin David <valentin.david@xxxxxxxxx>
- Re: [QUESTION] Full user space process isolation?
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][GNUPG][PATCH 2/2] Convert PGP signatures to the user asymmetric key signatures format
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][GNUPG][PATCH 1/2] Convert PGP keys to the user asymmetric keys format
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 10/10] selftests/bpf: Prepare a test for user asymmetric key signatures
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 09/10] bpf: Introduce bpf_verify_uasym_signature() kfunc
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 08/10] KEYS: Introduce load_uasym_keyring()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 07/10] KEYS: asymmetric: Preload user asymmetric keys from a keyring blob
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 06/10] verification: Add verify_uasym_signature() and verify_uasym_sig_message()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 05/10] KEYS: asymmetric: Introduce the user asymmetric key signature parser
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 04/10] KEYS: asymmetric: Introduce the user asymmetric key parser
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 03/10] KEYS: asymmetric: Introduce a parser for user asymmetric keys and sigs
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 02/10] crypto: Export signature encoding information
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 01/10] crypto: Export public key algorithm information
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 00/10] KEYS: Introduce user asymmetric keys and signatures
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [QUESTION] Full user space process isolation?
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [QUESTION] Full user space process isolation?
- From: "Dr. Greg" <greg@xxxxxxxxxxxx>
- [PATCH v2] integrity: Always reference the blacklist keyring with apprasial
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH] integrity: Always reference the blacklist keyring with apprasial
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH] tpm: return false from tpm_amd_is_rng_defective on non-x86 platforms
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [PATCH] tpm/tpm_tis_synquacer: do some cleanup
- From: Yangtao Li <frank.li@xxxxxxxx>
- Re: [QUESTION] Full user space process isolation?
- From: "Dr. Greg" <greg@xxxxxxxxxxxx>
- Re: [QUESTION] Full user space process isolation?
- From: Petr Tesarik <petr.tesarik.ext@xxxxxxxxxx>
- Re: [PATCH] ima: require signed IMA policy when UEFI secure boot is enabled
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] integrity: Always reference the blacklist keyring with apprasial
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 10/10] kexec: update kexec_file_load syscall to call ima_kexec_post_load
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 08/10] ima: implement and register a reboot notifier function to update kexec buffer
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 09/10] ima: suspend measurements while the kexec buffer is being copied
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 07/10] ima: remove function ima_dump_measurement_list
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 06/10] ima: update buffer at kexec execute with ima measurements
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 05/10] kexec: implement functions to map and unmap segment to kimage
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 03/10] ima: allocate buffer at kexec load to hold ima measurements
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 04/10] ima: implement functions to suspend and resume measurements
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 02/10] ima: implement function to populate buffer at kexec execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 01/10] ima: implement function to allocate buffer at kexec load
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 00/10] ima: measure events between kexec load and execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [QUESTION] Full user space process isolation?
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [QUESTION] Full user space process isolation?
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [QUESTION] Full user space process isolation?
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [QUESTION] Full user space process isolation?
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [QUESTION] Full user space process isolation?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] ima: require signed IMA policy when UEFI secure boot is enabled
- From: Coiby Xu <coxu@xxxxxxxxxx>
- Re: [QUESTION] Full user space process isolation?
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] security/integrity: fix pointer to ESL data and its size on pseries
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [QUESTION] Full user space process isolation?
- From: "Dr. Greg" <greg@xxxxxxxxxxxx>
- [PATCH] tpm: Do not remap from ACPI resouces again for Pluton TPM
- From: Valentin David <valentin.david@xxxxxxxxx>
- [PATCH] integrity: Always reference the blacklist keyring with apprasial
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- RE: [PATCH] tpm: return false from tpm_amd_is_rng_defective on non-x86 platforms
- From: "Limonciello, Mario" <Mario.Limonciello@xxxxxxx>
- Re: [PATCH] tpm: return false from tpm_amd_is_rng_defective on non-x86 platforms
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- RE: [PATCH] tpm: Ensure that tpm chip has ops to check if it's defective
- From: "Limonciello, Mario" <Mario.Limonciello@xxxxxxx>
- Re: [PATCH] tpm: Ensure that tpm chip has ops to check if it's defective
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- RE: [PATCH] tpm: Ensure that tpm chip has ops to check if it's defective
- From: "Limonciello, Mario" <Mario.Limonciello@xxxxxxx>
- [PATCH] tpm: return false from tpm_amd_is_rng_defective on non-x86 platforms
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- RE: [6.4-rc6] Crash during a kexec operation (tpm_amd_is_rng_defective)
- From: "Limonciello, Mario" <Mario.Limonciello@xxxxxxx>
- Re: [6.4-rc6] Crash during a kexec operation (tpm_amd_is_rng_defective)
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- RE: [6.4-rc6] Crash during a kexec operation (tpm_amd_is_rng_defective)
- From: "Limonciello, Mario" <Mario.Limonciello@xxxxxxx>
- Re: [6.4-rc6] Crash during a kexec operation (tpm_amd_is_rng_defective)
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH][next] tpm: remove redundant variable len
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] tpm/tpm_tis: Disable interrupts for Lenovo L590 devices
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [QUESTION] Full user space process isolation?
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [QUESTION] Full user space process isolation?
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v9 2/4] tpm: of: Make of-tree specific function commonly available
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [RFC PATCH v10 10/17] block|security: add LSM blob to block_device
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v10 16/17] ipe: kunit test for parser
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v10 09/17] ipe: add permissive toggle
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v10 06/17] security: add new securityfs delete function
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v10 00/17] Integrity Policy Enforcement LSM (IPE)
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v10 07/17] ipe: add userspace interface
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v10 05/17] ipe: introduce 'boot_verified' as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v10 17/17] documentation: add ipe documentation
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v10 15/17] scripts: add boot policy generation program
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v10 03/17] ipe: add evaluation loop
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v10 08/17] uapi|audit|ipe: add ipe auditing support
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v10 11/17] dm-verity: consume root hash digest and signature data via LSM hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v10 04/17] ipe: add LSM hooks on execution and kernel read
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v10 02/17] ipe: add policy parser
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v10 14/17] ipe: enable support for fs-verity as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v10 13/17] fsverity: consume builtin signature via LSM hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v10 01/17] security: add ipe lsm
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v10 12/17] ipe: add support for dm-verity as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] integrity: susbystem updates for v6.5
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] integrity: susbystem updates for v6.5
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: MSI B350M MORTAR: tpm tpm0: AMD fTPM version 0x3005700000004 causes system stutter; hwrng disabled
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- MSI B350M MORTAR: tpm tpm0: AMD fTPM version 0x3005700000004 causes system stutter; hwrng disabled
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: [PATCH v11 2/4] smack: Set the SMACK64TRANSMUTE xattr in smack_inode_init_security()
- From: Mengchi Cheng <mengcc@xxxxxxxxxx>
- Re: [PATCH v3 ima-evm-utils 4/4] Add simple tests to check EVM HMAC calculation
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Ensure that tpm chip has ops to check if it's defective
- From: "Limonciello, Mario" <mario.limonciello@xxxxxxx>
- Re: [PATCH v3 ima-evm-utils 4/4] Add simple tests to check EVM HMAC calculation
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 ima-evm-utils 4/4] Add simple tests to check EVM HMAC calculation
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Ensure that tpm chip has ops to check if it's defective
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH] tpm: Ensure that tpm chip has ops to check if it's defective
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- Re: [6.4-rc6] Crash during a kexec operation (tpm_amd_is_rng_defective)
- From: Sachin Sant <sachinp@xxxxxxxxxxxxx>
- [QUESTION] Full user space process isolation?
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [6.4-rc6] Crash during a kexec operation (tpm_amd_is_rng_defective)
- From: "Limonciello, Mario" <mario.limonciello@xxxxxxx>
- Re: [6.4-rc6] Crash during a kexec operation (tpm_amd_is_rng_defective)
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH -next] trusted-keys: Fix kernel-doc warnings in trusted-keys
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH -next] trusted-keys: Fix kernel-doc warnings in trusted-keys
- From: Gaosheng Cui <cuigaosheng1@xxxxxxxxxx>
- Re: [PATCH v3] fsverity: improve documentation for builtin signature support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2] fsverity: improve documentation for builtin signature support
- From: Luca Boccassi <bluca@xxxxxxxxxx>
- Re: [PATCH v3] fsverity: improve documentation for builtin signature support
- From: Luca Boccassi <bluca@xxxxxxxxxx>
- Re: [PATCH v2] fsverity: improve documentation for builtin signature support
- From: Luca Boccassi <bluca@xxxxxxxxxx>
- Re: [PATCH v2] fsverity: improve documentation for builtin signature support
- From: "Colin Walters" <walters@xxxxxxxxxx>
- Re: [PATCH v2] fsverity: improve documentation for builtin signature support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] tpm/tpm_tis: Disable interrupts for Lenovo L590 devices
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH] tpm: make all 'class' structures const
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] fsverity: improve documentation for builtin signature support
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: New kernel warning after updating from LTS 5.15.110 to 5.15.112 (and 5.15.113)
- From: "Linux regression tracking #update (Thorsten Leemhuis)" <regressions@xxxxxxxxxxxxx>
- Re: [PATCH v2] security/integrity: fix pointer to ESL data and its size on pseries
- From: R Nageswara Sastry <rnsastry@xxxxxxxxxxxxx>
- [PATCH] tpm/tpm_tis: Disable interrupts for Lenovo L590 devices
- From: Florian Bezdeka <florian@xxxxxxxxxx>
- Re: [PATCH v2] fsverity: improve documentation for builtin signature support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3] fsverity: improve documentation for builtin signature support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2] fsverity: improve documentation for builtin signature support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2] fsverity: improve documentation for builtin signature support
- From: Luca Boccassi <bluca@xxxxxxxxxx>
- Re: [PATCH v2] fsverity: improve documentation for builtin signature support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2] fsverity: improve documentation for builtin signature support
- From: Luca Boccassi <bluca@xxxxxxxxxx>
- Re: [PATCH v2] fsverity: improve documentation for builtin signature support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2] fsverity: improve documentation for builtin signature support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] fsverity: improve documentation for builtin signature support
- From: Luca Boccassi <bluca@xxxxxxxxxx>
- Re: [PATCH v3 ima-evm-utils 2/4] Restore correct HMAC calculation for directories
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 ima-evm-utils 3/4] Add --hmackey option for evmctl
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3 ima-evm-utils 2/4] Restore correct HMAC calculation for directories
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3 ima-evm-utils 1/4] Include the filesystem UUID in HMAC calculation
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 3] tpm,tpm_tis: Disable interrupts after 1000 unhandled IRQs
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH v2 2/2] powerpc/tpm: Reserve SML log when kexec'ing with kexec_file_load()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] fsverity: improve documentation for builtin signature support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v6 04/14] x86: Secure Launch Resource Table header file
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 04/14] x86: Secure Launch Resource Table header file
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- [PATCH v3 ima-evm-utils 4/4] Add simple tests to check EVM HMAC calculation
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 ima-evm-utils 2/4] Restore correct HMAC calculation for directories
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 ima-evm-utils 3/4] Add --hmackey option for evmctl
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 ima-evm-utils 1/4] Include the filesystem UUID in HMAC calculation
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 ima-evm-utils 0/4] Simple EVM HMAC calculation tests
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 02/14] Documentation/x86: Secure Launch kernel documentation
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- [PATCH][next] tpm: remove redundant variable len
- From: Colin Ian King <colin.i.king@xxxxxxxxx>
- Re: [PATCH v6 02/14] Documentation/x86: Secure Launch kernel documentation
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 02/14] Documentation/x86: Secure Launch kernel documentation
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] fsverity: improve documentation for builtin signature support
- From: Luca Boccassi <bluca@xxxxxxxxxx>
- Re: [PATCH] fsverity: improve documentation for builtin signature support
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] fsverity: improve documentation for builtin signature support
- From: Luca Boccassi <bluca@xxxxxxxxxx>
- Re: [PATCH] fsverity: improve documentation for builtin signature support
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 ima-evm-utils 4/4] Add simple test to check EVM HMAC calculation
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 ima-evm-utils 0/4] Simple EVM HMAC calculation tests
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] fsverity: improve documentation for builtin signature support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] fsverity: improve documentation for builtin signature support
- From: Luca Boccassi <bluca@xxxxxxxxxx>
- Re: Avoiding EBUSY on TPM writes
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: Avoiding EBUSY on TPM writes
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] fsverity: improve documentation for builtin signature support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Avoiding EBUSY on TPM writes
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v2 1/2] powerpc/tpm: Create linux,sml-base/size as big endian
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- [PATCH v2 2/2] powerpc/tpm: Reserve SML log when kexec'ing with kexec_file_load()
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v2] integrity: Fix possible multiple allocation in integrity_inode_get()
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 ima-evm-utils 4/4] Add simple test to check EVM HMAC calculation
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 ima-evm-utils 3/4] Add --hmackey option for evmctl
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v12 4/4] evm: Support multiple LSMs providing an xattr
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v12 3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 ima-evm-utils 0/4] Simple EVM HMAC calculation tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] security: keys: Modify mismatched function name
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 ima-evm-utils 0/4] Simple EVM HMAC calculation tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [linux-next:master] BUILD REGRESSION b16049b21162bb649cdd8519642a35972b7910fe
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] fsverity: rework fsverity_get_digest() again
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] fsverity: rework fsverity_get_digest() again
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] security: keys: Modify mismatched function name
- From: Jiapeng Chong <jiapeng.chong@xxxxxxxxxxxxxxxxx>
- [PATCH v3 1/4] tpm_tis: Explicitly check for error code
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- [PATCH v3 3/4] tpm_tis: Use responseRetry to recover from data transfer errors
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- [PATCH v3 4/4] tpm_tis: Resend command to recover from data transfer errors
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- [PATCH v3 2/4] tpm_tis: Move CRC check to generic send routine
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- [PATCH v3 0/4] Recovery from data transfer errors for tpm_tis
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- Re: [PATCH v2 3/4] tpm_tis: Use responseRetry to recover from data transfer errors
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- [PATCH ima-evm-utils 2/2] Add note that when -p is used password must not be provided
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils 1/2] Strip trailing newline from password entered via prompt
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils 0/2] Fix issues related to password
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH] fsverity: rework fsverity_get_digest() again
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v12 2/4] smack: Set the SMACK64TRANSMUTE xattr in smack_inode_init_security()
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v9 2/4] tpm: of: Make of-tree specific function commonly available
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 0/4] evm: Do HMAC of multiple per LSM xattrs for new inodes
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v12 4/4] evm: Support multiple LSMs providing an xattr
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v12 3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v12 2/4] smack: Set the SMACK64TRANSMUTE xattr in smack_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v12 1/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v12 0/4] evm: Do HMAC of multiple per LSM xattrs for new inodes
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v11 2/4] smack: Set the SMACK64TRANSMUTE xattr in smack_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v11 2/4] smack: Set the SMACK64TRANSMUTE xattr in smack_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v11 0/4] evm: Do HMAC of multiple per LSM xattrs for new inodes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v11 1/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v11 3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v11 2/4] smack: Set the SMACK64TRANSMUTE xattr in smack_inode_init_security()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 2/4] tpm: of: Make of-tree specific function commonly available
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: tpm_tis: Narrow the AAEON DMI quirk to UPX-i11 only
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]