Linux Integrity
[Prev Page][Next Page]
- Re: [PATCH v4 04/13] tpm: add buffer handling for TPM2B types
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 03/13] tpm: add kernel doc to buffer handling functions
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 02/13] tpm: move buffer handling from static inlines to real functions
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 01/13] crypto: lib - implement library version of AES in CFB mode
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 00/14] TPM IRQ fixes
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH] tpm_tis_spi: fix:release chip select when flow control fails
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 5/6] KEYS: CA link restriction
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 00/14] TPM IRQ fixes
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 00/14] TPM IRQ fixes
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v11 00/14] TPM IRQ fixes
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [Patch V10 0/3] Tegra TPM driver with HW flow control
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [Patch V10 3/3] spi: tegra210-quad: Enable TPM wait polling
- From: Jon Hunter <jonathanh@xxxxxxxxxx>
- [Patch V10 3/3] spi: tegra210-quad: Enable TPM wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V10 2/3] tpm_tis-spi: Add hardware wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V10 0/3] Tegra TPM driver with HW flow control
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V10 1/3] spi: Add TPM HW flow flag
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- RE: [Patch V9 2/3] tpm_tis-spi: Add hardware wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [Patch V9 2/3] tpm_tis-spi: Add hardware wait polling
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [Patch V9 2/3] tpm_tis-spi: Add hardware wait polling
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [Patch V8 1/3] spi: Add TPM HW flow flag
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Mengchi Cheng <mengcc@xxxxxxxxxx>
- [PATCH v2] tpm_tis: fix stall after iowrite*()s
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH ima-evm-utils] Add openssl command line examples for creation of EC keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v9 4/4] tpm/kexec: Duplicate TPM measurement log in of-tree for kexec
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v9 4/4] tpm/kexec: Duplicate TPM measurement log in of-tree for kexec
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [PATCH v9 4/4] tpm/kexec: Duplicate TPM measurement log in of-tree for kexec
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH ima-evm-utils] Do not get 'generation' using ioctl when evm_portable is true
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v9 1/4] drivers: of: kexec ima: Support 32-bit platforms
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v9 4/4] tpm/kexec: Duplicate TPM measurement log in of-tree for kexec
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v9 2/4] tpm: of: Make of-tree specific function commonly available
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v9 3/4] of: kexec: Refactor IMA buffer related functions to make them reusable
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v9 0/4] tpm: Preserve TPM measurement log across kexec (ppc64)
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] IMA: use vfs_getattr_nosec to get the i_version
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 05/16] ipe: add userspace interface
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 05/16] ipe: add userspace interface
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 05/16] ipe: add userspace interface
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 05/16] ipe: add userspace interface
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH] IMA: use vfs_getattr_nosec to get the i_version
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- [ANNOUNCE] [CFP] Linux Security Summit Europe (LSS-EU)
- From: "Reshetova, Elena" <elena.reshetova@xxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH 0/3] tpm: Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC PATCH v9 05/16] ipe: add userspace interface
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 05/16] ipe: add userspace interface
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 07/16] uapi|audit|ipe: add ipe auditing support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 07/16] uapi|audit|ipe: add ipe auditing support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 05/16] ipe: add userspace interface
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 03/16] ipe: add evaluation loop and introduce 'boot_verified' as a trust provider
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 02/16] ipe: add policy parser
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v10 3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 4/4] evm: Support multiple LSMs providing an xattr
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v9 06/16] ipe: add LSM hooks on execution and kernel read
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 05/16] ipe: add userspace interface
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 03/16] ipe: add evaluation loop and introduce 'boot_verified' as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH] tpm_tis_spi: fix:release chip select when flow control fails
- From: Peijie Shao <shaopeijie@xxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v4 00/13] add integrity and security to TPM2 transactions
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC PATCH v9 02/16] ipe: add policy parser
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [RFC PATCH v9 01/16] security: add ipe lsm
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 00/13] add integrity and security to TPM2 transactions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/13] add integrity and security to TPM2 transactions
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/13] add integrity and security to TPM2 transactions
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v4 00/13] add integrity and security to TPM2 transactions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/13] add integrity and security to TPM2 transactions
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v4 00/13] add integrity and security to TPM2 transactions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/13] add integrity and security to TPM2 transactions
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v4 00/13] add integrity and security to TPM2 transactions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 00/13] add integrity and security to TPM2 transactions
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v10 1/4] reiserfs: Add security prefix to xattr name in reiserfs_security_write()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 08/13] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v4 13/13] Documentation: add tpm-security.rst
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v4 12/13] tpm: add the null key name as a sysfs export
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v4 11/13] KEYS: trusted: Add session encryption protection to the seal/unseal path
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v4 10/13] tpm: add session encryption protection to tpm2_get_random()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v4 09/13] tpm: add hmac checks to tpm2_pcr_extend()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v4 08/13] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v4 07/13] tpm: export the context save and load commands
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v4 06/13] tpm: add buffer function to point to returned parameters
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v4 05/13] tpm: add cursor based buffer functions for response parsing
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v4 04/13] tpm: add buffer handling for TPM2B types
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v4 03/13] tpm: add kernel doc to buffer handling functions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v4 02/13] tpm: move buffer handling from static inlines to real functions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v4 01/13] crypto: lib - implement library version of AES in CFB mode
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v4 00/13] add integrity and security to TPM2 transactions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 06/12] tpm: export the context save and load commands
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 0/4] evm: Do HMAC of multiple per LSM xattrs for new inodes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v10 4/4] evm: Support multiple LSMs providing an xattr
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 1/4] reiserfs: Add security prefix to xattr name in reiserfs_security_write()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 0/4] evm: Do HMAC of multiple per LSM xattrs for new inodes
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 1/4] reiserfs: Add security prefix to xattr name in reiserfs_security_write()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v9 3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 1/4] reiserfs: Add security prefix to xattr name in reiserfs_security_write()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 5/6] KEYS: CA link restriction
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: fix stall after iowrite*()s
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: tpm: fix build break in tpm-chip.c caused by AMD fTPM quirk
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 5/6] KEYS: CA link restriction
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [Patch V9 2/3] tpm_tis-spi: Add hardware wait polling
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [Patch V9 1/3] spi: Add TPM HW flow flag
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [Patch V9 0/3] Tegra TPM driver with HW flow control
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [no subject]
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 0/6] Add CA enforcement keyring restrictions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH next] tpm: Fix a possible dereference of ERR_PTR in tpm_init()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH next] tpm: Fix a possible dereference of ERR_PTR in tpm_init()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 5/6] KEYS: CA link restriction
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v9 4/4] evm: Support multiple LSMs providing an xattr
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 1/4] reiserfs: Add security prefix to xattr name in reiserfs_security_write()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 0/4] evm: Do HMAC of multiple per LSM xattrs for new inodes
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC PATCH v1 1/1] ima: obtain child measurement list from init namespace
- From: Denis Semakin <denis.semakin@xxxxxxxxxx>
- [RFC PATCH v1 0/1] ima: obtain child measurement list from init namespace
- From: Denis Semakin <denis.semakin@xxxxxxxxxx>
- Re: [PATCH v8 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 03/12] tpm: add buffer handling for TPM2B types
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] ima: Fix potential NULL pointer access in ima_match_rules()
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [PATCH v8 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v8 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [Patch V9 3/3] spi: tegra210-quad: Enable TPM wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V9 2/3] tpm_tis-spi: Add hardware wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V9 1/3] spi: Add TPM HW flow flag
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V9 0/3] Tegra TPM driver with HW flow control
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- Re: [PATCH v8 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v8 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH ima-evm-utils 2/2] Add simple test to check EVM HMAC calculation
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH ima-evm-utils 1/2] Add --hmackey option for evmctl
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v8 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v8 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v8 3/6] security: Remove security_old_inode_init_security()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v8 2/6] ocfs2: Switch to security_inode_init_security()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v8 1/6] reiserfs: Switch to security_inode_init_security()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] tpm_tis: fix stall after iowrite*()s
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: tpm: fix build break in tpm-chip.c caused by AMD fTPM quirk
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- RE: [Patch V8 2/3] tpm_tis-spi: Add hardware wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- Re: Documentation on IMA for Linux Kernel Documentation
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: Documentation on IMA for Linux Kernel Documentation
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- [PATCH v6 2/6] KEYS: Add missing function documentation
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v6 1/6] KEYS: Create static version of public_key_verify_signature
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v6 4/6] KEYS: X.509: Parse Key Usage
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v6 5/6] KEYS: CA link restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v6 6/6] integrity: machine keyring CA configuration
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v6 3/6] KEYS: X.509: Parse Basic Constraints for CA
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v6 0/6] Add CA enforcement keyring restrictions
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils] Include the filesystem UUID in HMAC calculation
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH ima-evm-utils] Include the filesystem UUID in HMAC calculation
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 03/38] char: impi, tpm: depend on HAS_IOPORT
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH next] tpm: Fix a possible dereference of ERR_PTR in tpm_init()
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH next] tpm: Fix a possible dereference of ERR_PTR in tpm_init()
- From: Harshit Mogalapalli <harshit.m.mogalapalli@xxxxxxxxxx>
- Re: [PATCH v5 5/6] KEYS: CA link restriction
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 5/6] KEYS: CA link restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v5 5/6] KEYS: CA link restriction
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/2] tpm: st33zp24: Mark ACPI and OF related data as maybe unused
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 0/3] tpm: Convert to platform remove callback returning void
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: tpm: fix build break in tpm-chip.c caused by AMD fTPM quirk
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] tpm: changes for v6.3-rc4
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] tpm: changes for v6.3-rc4
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: tpm: fix build break in tpm-chip.c caused by AMD fTPM quirk
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [GIT PULL] tpm: changes for v6.3-rc4
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: tpm: fix build break in tpm-chip.c caused by AMD fTPM quirk
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- tpm: fix build break in tpm-chip.c caused by AMD fTPM quirk
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 2/3] tpm/tpm_tis: Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 0/3] tpm: Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 3/3] tpm/tpm_tis_synquacer: Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 1/3] tpm/tpm_ftpm_tee: Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH v2 2/2] tpm: tpm_tis_spi: Mark ACPI and OF related data as maybe unused
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- [PATCH v2 1/2] tpm: st33zp24: Mark ACPI and OF related data as maybe unused
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v11 00/14] TPM IRQ fixes
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: remove unnecessary (void*) conversions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [Patch V8 2/3] tpm_tis-spi: Add hardware wait polling
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: cr50: i2c: use jiffies to wait for tpm ready irq
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 2/6] ocfs2: Switch to security_inode_init_security()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v9 07/16] uapi|audit|ipe: add ipe auditing support
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 11/16] ipe: add support for dm-verity as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: remove the 'checkreqprot' functionality
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: remove the 'checkreqprot' functionality
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v11 00/14] TPM IRQ fixes
- From: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
- [PATCH] tpm: remove unnecessary (void*) conversions
- From: Yu Zhe <yuzhe@xxxxxxxxxxxx>
- RE: [Patch V8 2/3] tpm_tis-spi: Add hardware wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- Re: [PATCH] ima: Fix potential NULL pointer access in ima_match_rules()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] Fix fsverity.test mount failure for ppc64
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] IMA: allow/fix UML builds
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH] tpm: cr50: i2c: use jiffies to wait for tpm ready irq
- From: Mark Hasemeyer <markhas@xxxxxxxxxxxx>
- Re: [PATCH] IMA: allow/fix UML builds
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] ima: Fix potential NULL pointer access in ima_match_rules()
- From: Roman Danilov <romanosauce57@xxxxxxxxx>
- Re: [PATCH v1 0/2] Add destructor hook to LSM modules
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 03/38] char: impi, tpm: depend on HAS_IOPORT
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH v3 03/38] char: impi, tpm: depend on HAS_IOPORT
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 03/38] char: impi, tpm: depend on HAS_IOPORT
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v3 03/38] char: impi, tpm: depend on HAS_IOPORT
- From: Corey Minyard <minyard@xxxxxxx>
- Re: [PATCH ima-evm-utils] Fix fsverity.test mount failure for ppc64
- From: R Nageswara Sastry <rnsastry@xxxxxxxxxxxxx>
- Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 10/12] tpm: fix up the tpm_class shutdown_pre pointer when created
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH 10/12] tpm: fix up the tpm_class shutdown_pre pointer when created
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 03/38] char: impi, tpm: depend on HAS_IOPORT
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v3 03/38] char: impi, tpm: depend on HAS_IOPORT
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [PATCH v1 0/2] Add destructor hook to LSM modules
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 10/12] tpm: fix up the tpm_class shutdown_pre pointer when created
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v1 0/2] Add destructor hook to LSM modules
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
- From: Thorsten Leemhuis <regressions@xxxxxxxxxxxxx>
- Re: [PATCH v8 0/6] evm: Do HMAC of multiple per LSM xattrs for new inodes
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 6/6] evm: Support multiple LSMs providing an xattr
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 5/6] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 2/6] ocfs2: Switch to security_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 1/6] reiserfs: Switch to security_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 3/6] security: Remove security_old_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 0/6] evm: Do HMAC of multiple per LSM xattrs for new inodes
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: Documentation on IMA for Linux Kernel Documentation
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: Documentation on IMA for Linux Kernel Documentation
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v1 0/2] Add destructor hook to LSM modules
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 10/12] tpm: fix up the tpm_class shutdown_pre pointer when created
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 6/6] integrity: machine keyring CA configuration
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v1 0/2] Add destructor hook to LSM modules
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] fsverity.test: Add /usr/sbin into $PATH
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH] IMA: allow/fix UML builds
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [GIT PULL] tpm: changes for v6.3-rc3
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] tpm: changes for v6.3-rc3
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] tpm: disable hwrng for fTPM on some AMD designs
- From: "Linux regression tracking (Thorsten Leemhuis)" <regressions@xxxxxxxxxxxxx>
- Re: [PATCH v3] tpm: disable hwrng for fTPM on some AMD designs
- From: "Linux regression tracking (Thorsten Leemhuis)" <regressions@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] tpm: tpm_tis_spi: Mark ACPI and OF related data as maybe unused
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm: st33zp24: Mark ACPI and OF related data as maybe unused
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v3] tpm: disable hwrng for fTPM on some AMD designs
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] tpm: disable hwrng for fTPM on some AMD designs
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/2] tpm: tpm_tis_spi: Mark ACPI and OF related data as maybe unused
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm: st33zp24: Mark ACPI and OF related data as maybe unused
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] tpm: disable hwrng for fTPM on some AMD designs
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v3] tpm: disable hwrng for fTPM on some AMD designs
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] tpm: disable hwrng for fTPM on some AMD designs
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 5/6] KEYS: CA link restriction
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 4/6] KEYS: X.509: Parse Key Usage
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 2/6] KEYS: Add missing function documentation
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 1/6] KEYS: Create static version of public_key_verify_signature
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [Patch V8 2/3] tpm_tis-spi: Add hardware wait polling
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 2/2] tpm: tpm_tis_spi: Mark ACPI and OF related data as maybe unused
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- [PATCH 1/2] tpm: st33zp24: Mark ACPI and OF related data as maybe unused
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v1 0/2] Add destructor hook to LSM modules
- From: Mirsad Goran Todorovac <mirsad.todorovac@xxxxxxxxxxxx>
- Re: [PATCH v1 0/2] Add destructor hook to LSM modules
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH ima-evm-utils] Fix fsverity.test mount failure for ppc64
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v4 0/3] security: Always enable integrity LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v1 1/2] Add release hook to LSM
- From: Mirsad Goran Todorovac <mirsad.todorovac@xxxxxxxxxxxx>
- Re: [PATCH v1 0/2] Add destructor hook to LSM modules
- From: Mirsad Goran Todorovac <mirsad.todorovac@xxxxxxxxxxxx>
- Re: [PATCH v1 0/2] Add destructor hook to LSM modules
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v1 0/2] Add destructor hook to LSM modules
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v1 1/2] Add release hook to LSM
- From: Mirsad Goran Todorovac <mirsad.todorovac@xxxxxxxxxxxx>
- Re: [PATCH v1 1/2] Add release hook to LSM
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH v1 1/2] Add release hook to LSM
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH v1 1/2] Add release hook to LSM
- From: Mirsad Goran Todorovac <mirsad.todorovac@xxxxxxxxxxxx>
- Re: [PATCH v3 1/3] security: Introduce LSM_ORDER_LAST and set it for the integrity LSM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v1 1/2] Add release hook to LSM
- From: Mirsad Goran Todorovac <mirsad.todorovac@xxxxxxxxxxxx>
- Re: [PATCH v1 1/2] Add release hook to LSM
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/2] Add destructor hook to LSM modules
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- [PATCH v1 1/2] Add release hook to LSM
- From: Mirsad Goran Todorovac <mirsad.goran.todorovac@xxxxxx>
- Re: [PATCH ima-evm-utils] fsverity.test: Add /usr/sbin into $PATH
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v1 0/2] Add destructor hook to LSM modules
- From: Mirsad Goran Todorovac <mirsad.goran.todorovac@xxxxxx>
- Re: [PATCH v3] tpm: disable hwrng for fTPM on some AMD designs
- From: Thorsten Leemhuis <regressions@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/3] security: Introduce LSM_ORDER_LAST and set it for the integrity LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/3] security: Introduce LSM_ORDER_LAST and set it for the integrity LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/3] security: Introduce LSM_ORDER_LAST and set it for the integrity LSM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/3] Revert "integrity: double check iint_cache was initialized"
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 3/3] security: Remove integrity from the LSM list in Kconfig
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/3] security: Introduce LSM_ORDER_LAST and set it for the integrity LSM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils] fsverity.test: Add /usr/sbin into $PATH
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v4 3/3] security: Remove integrity from the LSM list in Kconfig
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 1/3] security: Introduce LSM_ORDER_LAST and set it for the integrity LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 2/3] Revert "integrity: double check iint_cache was initialized"
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 0/3] security: Always enable integrity LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/3] security: Introduce LSM_ORDER_LAST and set it for the integrity LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] security: Remove integrity from the LSM list in Kconfig
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/3] security: Introduce LSM_ORDER_LAST and set it for the integrity LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- ima-evm-utils: version 1.5 released
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/3] security: Introduce LSM_ORDER_LAST and set it for the integrity LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] security: Remove integrity from the LSM list in Kconfig
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] security: Remove integrity from the LSM list in Kconfig
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/3] Revert "integrity: double check iint_cache was initialized"
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/3] security: Introduce LSM_ORDER_LAST and set it for the integrity LSM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 15/28] security: Introduce inode_post_removexattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 03/28] ima: Align ima_post_create_tmpfile() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 1/3] security: Introduce LSM_ORDER_LAST and set it for the integrity LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 3/3] security: Remove integrity from the LSM list in Kconfig
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 2/3] Revert "integrity: double check iint_cache was initialized"
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 0/3] security: Always enable integrity LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] security: Introduce LSM_ORDER_LAST and set it for the integrity LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 0/6] evm: Do HMAC of multiple per LSM xattrs for new inodes
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] security: Introduce LSM_ORDER_LAST and set it for the integrity LSM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 0/6] evm: Do HMAC of multiple per LSM xattrs for new inodes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] bpf: Fix IMA test
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH] bpf: Fix IMA test
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- [PATCH] Revert "integrity: double check iint_cache was initialized"
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v2] security: Introduce LSM_ORDER_LAST and set it for the integrity LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 00/28] security: Move IMA and EVM to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 23/28] security: Introduce LSM_ORDER_LAST
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 22/28] security: Introduce key_post_create_or_update hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 18/28] security: Introduce path_post_mknod hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 15/28] security: Introduce inode_post_removexattr hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 14/28] security: Introduce inode_post_setattr hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 03/28] ima: Align ima_post_create_tmpfile() definition with LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 00/28] security: Move IMA and EVM to the LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 23/28] security: Introduce LSM_ORDER_LAST
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- INFO: BUG: kobject: 'integrity' (000000005198bea8): does not have a release() function, it is broken and must be fixed. See ...
- From: Mirsad Todorovac <mirsad.todorovac@xxxxxxxxxxxx>
- Re: [PATCH 23/28] security: Introduce LSM_ORDER_LAST
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 23/28] security: Introduce LSM_ORDER_LAST
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 23/28] security: Introduce LSM_ORDER_LAST
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] bpf: Fix IMA test
- From: Matt Bobrowski <mattbobrowski@xxxxxxxxxx>
- Re: [PATCH] bpf: Fix IMA test
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] bpf: Fix IMA test
- From: Matt Bobrowski <mattbobrowski@xxxxxxxxxx>
- Re: [PATCH] bpf: Fix IMA test
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH] bpf: Fix IMA test
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] tpm: disable hwrng for fTPM on some AMD designs
- From: "Linux regression tracking (Thorsten Leemhuis)" <regressions@xxxxxxxxxxxxx>
- Re: [PATCH 23/28] security: Introduce LSM_ORDER_LAST
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 23/28] security: Introduce LSM_ORDER_LAST
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 22/28] security: Introduce key_post_create_or_update hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 26/28] evm: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 26/28] evm: Move to LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [External] Re: [BUG] blacklist: Problem blacklisting hash (-13) during boot
- From: Mark Pearson <markpearson@xxxxxxxxxx>
- Re: [PATCH 11/28] evm: Complete description of evm_inode_setattr()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 20/28] security: Introduce inode_post_set_acl hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 19/28] security: Introduce inode_post_create_tmpfile hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 18/28] security: Introduce path_post_mknod hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 17/28] security: Introduce file_pre_free_security hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 16/28] security: Introduce file_post_open hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 15/28] security: Introduce inode_post_removexattr hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 02/28] ima: Align ima_post_path_mknod() definition with LSM infrastructure
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 21/28] security: Introduce inode_post_remove_acl hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 14/28] security: Introduce inode_post_setattr hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 13/28] security: Align inode_setattr hook definition with EVM
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 07/28] ima: Align ima_post_read_file() definition with LSM infrastructure
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 05/28] ima: Align ima_inode_setxattr() definition with LSM infrastructure
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 04/28] ima: Align ima_file_mprotect() definition with LSM infrastructure
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 03/28] ima: Align ima_post_create_tmpfile() definition with LSM infrastructure
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 21/28] security: Introduce inode_post_remove_acl hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 11/28] evm: Complete description of evm_inode_setattr()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 10/28] evm: Align evm_inode_post_setxattr() definition with LSM infrastructure
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 09/28] evm: Align evm_inode_setxattr() definition with LSM infrastructure
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 08/28] evm: Align evm_inode_post_setattr() definition with LSM infrastructure
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 06/28] ima: Align ima_inode_removexattr() definition with LSM infrastructure
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 01/28] ima: Align ima_inode_post_setattr() definition with LSM infrastructure
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 21/28] security: Introduce inode_post_remove_acl hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 21/28] security: Introduce inode_post_remove_acl hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils 2/2] tests: fix gen-keys.sh to generate sha256 certificates
- From: R Nageswara Sastry <rnsastry@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils 2/2] tests: fix gen-keys.sh to generate sha256 certificates
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils 1/2] Update README
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] evm: Complete description of evm_inode_setattr()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 12/28] fs: Fix description of vfs_tmpfile()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 12/28] fs: Fix description of vfs_tmpfile()
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH 26/28] evm: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 13/28] security: Align inode_setattr hook definition with EVM
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 26/28] evm: Move to LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Shouldn't we check if MokIgnoreDB is non volatile in load_uefi.c?
- From: Adam Vodopjan <adam.vodopjan@xxxxxxxxx>
- [PATCH 27/28] integrity: Move integrity functions to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 22/28] security: Introduce key_post_create_or_update hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 21/28] security: Introduce inode_post_remove_acl hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 09/28] evm: Align evm_inode_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 11/28] evm: Complete description of evm_inode_setattr()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 03/28] ima: Align ima_post_create_tmpfile() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 07/28] ima: Align ima_post_read_file() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 01/28] ima: Align ima_inode_post_setattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 08/28] evm: Align evm_inode_post_setattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 06/28] ima: Align ima_inode_removexattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 00/28] security: Move IMA and EVM to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 02/28] ima: Align ima_post_path_mknod() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 04/28] ima: Align ima_file_mprotect() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 05/28] ima: Align ima_inode_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 10/28] evm: Align evm_inode_post_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 28/28] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 24/28] ima: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 26/28] evm: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 25/28] ima: Move IMA-Appraisal to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 23/28] security: Introduce LSM_ORDER_LAST
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 20/28] security: Introduce inode_post_set_acl hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 19/28] security: Introduce inode_post_create_tmpfile hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 18/28] security: Introduce path_post_mknod hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 16/28] security: Introduce file_post_open hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 17/28] security: Introduce file_pre_free_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 15/28] security: Introduce inode_post_removexattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 14/28] security: Introduce inode_post_setattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 13/28] security: Align inode_setattr hook definition with EVM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 12/28] fs: Fix description of vfs_tmpfile()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v7] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] powerpc/tpm: Reserve SML log when kexec'ing
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 11/16] ipe: add support for dm-verity as a trust provider
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 09/16] block|security: add LSM blob to block_device
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 08/16] ipe: add permissive toggle
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 07/16] uapi|audit|ipe: add ipe auditing support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 06/16] ipe: add LSM hooks on execution and kernel read
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 05/16] ipe: add userspace interface
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 03/16] ipe: add evaluation loop and introduce 'boot_verified' as a trust provider
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 02/16] ipe: add policy parser
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 01/16] security: add ipe lsm
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH ima-evm-utils v7] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v6] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH ima-evm-utils v4] Add ima_policy_check.awk and ima_policy_check.test
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v6] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v5 0/6] Add CA enforcement keyring restrictions
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v5 5/6] KEYS: CA link restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v5 6/6] integrity: machine keyring CA configuration
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v5 1/6] KEYS: Create static version of public_key_verify_signature
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v5 3/6] KEYS: X.509: Parse Basic Constraints for CA
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v5 4/6] KEYS: X.509: Parse Key Usage
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v5 2/6] KEYS: Add missing function documentation
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils v3] Add ima_policy_check.awk and ima_policy_check.test
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v3] Add ima_policy_check.awk and ima_policy_check.test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v3] Add ima_policy_check.awk and ima_policy_check.test
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [Patch V8 3/3] spi: tegra210-quad: Enable TPM wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V8 2/3] tpm_tis-spi: Add hardware wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V8 0/3] Tegra TPM driver with HW flow control
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V8 1/3] spi: Add TPM HW flow flag
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- Re: [RFC PATCH v9 03/16] ipe: add evaluation loop and introduce 'boot_verified' as a trust provider
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v3] Add ima_policy_check.awk and ima_policy_check.test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [Patch V5 2/3] tpm_tis-spi: Support hardware wait polling
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/2] powerpc/tpm: Create linux,sml-base/size as big endian
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [Patch V7 2/3] tpm_tis-spi: Add hardware wait polling
- From: kernel test robot <lkp@xxxxxxxxx>
- [Patch V7 3/3] spi: tegra210-quad: Enable TPM wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V7 2/3] tpm_tis-spi: Add hardware wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V7 1/3] spi: Add TPM HW flow flag
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V7 0/3] Tegra TPM driver with HW flow control
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- Re: [Patch V5 2/3] tpm_tis-spi: Support hardware wait polling
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- RE: [Patch V6 1/3] spi: Add TPM HW flow flag
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- Re: [Patch V5 2/3] tpm_tis-spi: Support hardware wait polling
- From: Thierry Reding <thierry.reding@xxxxxxxxx>
- Re: [Patch V6 3/3] spi: tegra210-quad: Enable TPM wait polling
- From: Jon Hunter <jonathanh@xxxxxxxxxx>
- Re: [Patch V5 2/3] tpm_tis-spi: Support hardware wait polling
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [Patch V6 3/3] spi: tegra210-quad: Enable TPM wait polling
- From: Thierry Reding <thierry.reding@xxxxxxxxx>
- Re: [Patch V5 2/3] tpm_tis-spi: Support hardware wait polling
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [Patch V6 3/3] spi: tegra210-quad: Enable TPM wait polling
- From: Thierry Reding <thierry.reding@xxxxxxxxx>
- Re: [Patch V6 2/3] tpm_tis-spi: Support hardware wait polling
- From: Thierry Reding <thierry.reding@xxxxxxxxx>
- Re: [Patch V6 1/3] spi: Add TPM HW flow flag
- From: Thierry Reding <thierry.reding@xxxxxxxxx>
- Re: [Patch V5 2/3] tpm_tis-spi: Support hardware wait polling
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [Patch V5 2/3] tpm_tis-spi: Support hardware wait polling
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- RE: [Patch V5 2/3] tpm_tis-spi: Support hardware wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [PATCH ima-evm-utils v6] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] powerpc/tpm: Reserve SML log when kexec'ing
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v3] Add ima_policy_check.awk and ima_policy_check.test
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [Patch V5 2/3] tpm_tis-spi: Support hardware wait polling
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 1/2] powerpc/tpm: Create linux,sml-base/size as big endian
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- RE: [Patch V5 2/3] tpm_tis-spi: Support hardware wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- Re: [PATCH v3] tpm: disable hwrng for fTPM on some AMD designs
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/2] powerpc/tpm: Create linux,sml-base/size as big endian
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v3] tpm: disable hwrng for fTPM on some AMD designs
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- Re: [PATCH v2] tpm: disable hwrng for fTPM on some AMD designs
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm: disable hwrng for fTPM on some AMD designs
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- RE: [PATCH v2] tpm: disable hwrng for fTPM on some AMD designs
- From: "Limonciello, Mario" <Mario.Limonciello@xxxxxxx>
- Re: [Patch V5 2/3] tpm_tis-spi: Support hardware wait polling
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [Patch V5 0/3] Tegra TPM driver with HW flow control
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/2] powerpc/tpm: Create linux,sml-base/size as big endian
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [Patch V6 3/3] spi: tegra210-quad: Enable TPM wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V6 2/3] tpm_tis-spi: Support hardware wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V6 1/3] spi: Add TPM HW flow flag
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V6 0/3] Tegra TPM driver with HW flow control
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- Re: [PATCH v2] tpm: disable hwrng for fTPM on some AMD designs
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH v2] tpm: disable hwrng for fTPM on some AMD designs
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- Re: [PATCH v2] tpm: disable hwrng for fTPM on some AMD designs
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH v2] tpm: disable hwrng for fTPM on some AMD designs
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- Re: [External] Re: [BUG] blacklist: Problem blacklisting hash (-13) during boot
- From: Jeremy Kerr <jk@xxxxxxxxxxxxxxxxxxxx>
- Re: [External] Re: [BUG] blacklist: Problem blacklisting hash (-13) during boot
- From: Mark Pearson <markpearson@xxxxxxxxxx>
- [Patch V5 3/3] spi: tegra210-quad: Enable TPM wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V5 2/3] tpm_tis-spi: Support hardware wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V5 1/3] spi: Add TPM HW flow flag
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V5 0/3] Tegra TPM driver with HW flow control
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: Thorsten Leemhuis <regressions@xxxxxxxxxxxxx>
- Re: [PATCH 08/12] tpm: add hmac checks to tpm2_pcr_extend()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 05/12] tpm: add buffer function to point to returned parameters
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 04/12] tpm: add cursor based buffer functions for response parsing
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 06/12] tpm: export the context save and load commands
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 03/12] tpm: add buffer handling for TPM2B types
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 02/12] tpm: move buffer handling from static inlines to real functions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 01/12] crypto: lib - implement library version of AES in CFB mode
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [External] Re: [BUG] blacklist: Problem blacklisting hash (-13) during boot
- From: Jeremy Kerr <jk@xxxxxxxxxxxxxxxxxxxx>
- Re: [External] Re: [BUG] blacklist: Problem blacklisting hash (-13) during boot
- From: Thomas Weißschuh <thomas@xxxxxxxx>
- Re: [External] Re: [BUG] blacklist: Problem blacklisting hash (-13) during boot
- From: Jeremy Kerr <jk@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] tpm_crb: Fix an error handling path in crb_acpi_add()
- From: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
- RE: [Patch V4 3/3] spi: tegra210-quad: set half duplex flag
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- Re: [Patch V4 3/3] spi: tegra210-quad: set half duplex flag
- From: Mark Brown <broonie@xxxxxxxxxx>
- RE: [Patch V3 1/3] tpm_tis-spi: Support hardware wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- Re: [Patch V3 1/3] tpm_tis-spi: Support hardware wait polling
- From: Mark Brown <broonie@xxxxxxxxxx>
- [Patch V4 2/3] tpm_tis-spi: Support hardware wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V4 3/3] spi: tegra210-quad: set half duplex flag
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V4 1/3] spi: Add TPM HW flow flag
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V4 0/3] Tegra TPM driver with HW flow control
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- Re: [PATCH v11 00/14] TPM IRQ fixes
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- RE: [Patch V3 1/3] tpm_tis-spi: Support hardware wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [PATCH] IMA: allow/fix UML builds
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH 1/2] powerpc/tpm: Create linux,sml-base/size as big endian
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- [PATCH 2/2] powerpc/tpm: Reserve SML log when kexec'ing
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- RE: [Patch V3 3/3] spi: tegra210-quad: Enable TPM wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- Re: [Patch V3 1/3] tpm_tis-spi: Support hardware wait polling
- From: Mark Brown <broonie@xxxxxxxxxx>
- RE: [Patch V3 1/3] tpm_tis-spi: Support hardware wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- Re: (subset) [Patch V3 0/3] Tegra TPM driver with HW flow control
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [Patch V3 3/3] spi: tegra210-quad: Enable TPM wait polling
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [Patch V3 1/3] tpm_tis-spi: Support hardware wait polling
- From: Mark Brown <broonie@xxxxxxxxxx>
- [Patch V3 3/3] spi: tegra210-quad: Enable TPM wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V3 2/3] spi: tegra210-quad: set half duplex flag
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V3 1/3] tpm_tis-spi: Support hardware wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V3 0/3] Tegra TPM driver with HW flow control
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- RE: [Patch V2 3/4] spi: dt-bindings: Add Tegra TPM wait polling flag
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- Re: [GIT PULL] integrity: susbsytem updates for v6.3
- From: pr-tracker-bot@xxxxxxxxxx
- RE: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: "Limonciello, Mario" <Mario.Limonciello@xxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 2/6] ocfs2: Switch to security_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 2/6] ocfs2: Switch to security_inode_init_security()
- From: Joseph Qi <joseph.qi@xxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] tpm: changes for v6.3-rc1
- From: pr-tracker-bot@xxxxxxxxxx
- [PATCH v2] tpm: disable hwrng for fTPM on some AMD designs
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [GIT PULL] integrity: susbsytem updates for v6.3
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils 0/3] CI: Tumbleweed openSSL fix
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils 0/3] CI: Tumbleweed openSSL fix
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 2/6] ocfs2: Switch to security_inode_init_security()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 2/6] ocfs2: Switch to security_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 2/6] ocfs2: Switch to security_inode_init_security()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 6/6] evm: Support multiple LSMs providing an xattr
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 6/6] evm: Support multiple LSMs providing an xattr
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 2/6] ocfs2: Switch to security_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 2/6] ocfs2: Switch to security_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 6/6] evm: Support multiple LSMs providing an xattr
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 5/6] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 3/6] security: Remove security_old_inode_init_security()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: "Limonciello, Mario" <mario.limonciello@xxxxxxx>
- Re: [PATCH 00/12] add integrity and security to TPM2 transactions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] tpm/eventlog: Don't abort tpm_read_log on faulty ACPI address
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm/eventlog: Don't abort tpm_read_log on faulty ACPI address
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 06/11] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 2/6] ocfs2: Switch to security_inode_init_security()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 2/6] ocfs2: Switch to security_inode_init_security()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 1/6] reiserfs: Switch to security_inode_init_security()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: Thorsten Leemhuis <regressions@xxxxxxxxxxxxx>
- Re: [PATCH 07/12] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 07/12] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 07/12] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 11/12] tpm: add the null key name as a sysfs export
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 06/11] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 07/12] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 04/14] Implement CAP_TRUST capability.
- From: "Dr. Greg" <greg@xxxxxxxxxxxx>
- [PATCH 12/12] Documentation: add tpm-security.rst
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 11/12] tpm: add the null key name as a sysfs export
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 10/12] KEYS: trusted: Add session encryption protection to the seal/unseal path
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 09/12] tpm: add session encryption protection to tpm2_get_random()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 08/12] tpm: add hmac checks to tpm2_pcr_extend()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 07/12] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 06/12] tpm: export the context save and load commands
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 05/12] tpm: add buffer function to point to returned parameters
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 04/12] tpm: add cursor based buffer functions for response parsing
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 03/12] tpm: add buffer handling for TPM2B types
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 02/12] tpm: move buffer handling from static inlines to real functions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 01/12] crypto: lib - implement library version of AES in CFB mode
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 00/12] add integrity and security to TPM2 transactions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils 0/3] CI: Tumbleweed openSSL fix
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 06/11] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2] Add ima_policy_check.awk and ima_policy_check.test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2] Add ima_policy_check.awk and ima_policy_check.test
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2] Add ima_policy_check.awk and ima_policy_check.test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2] Add ima_policy_check.awk and ima_policy_check.test
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2] Add ima_policy_check.awk and ima_policy_check.test
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils 0/3] CI: Tumbleweed openSSL fix
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2] Add ima_policy_check.awk and ima_policy_check.test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2] Add ima_policy_check.awk and ima_policy_check.test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils 0/3] CI: Tumbleweed openSSL fix
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils 0/3] CI: Tumbleweed openSSL fix
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils 0/3] CI: Tumbleweed openSSL fix
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v6 00/26] pSeries dynamic secure boot secvar interface + platform keyring loading
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [PATCH v6 24/26] powerpc/pseries: Implement secvars for dynamic secure boot
- From: Michael Ellerman <michaele@xxxxxxxxxxx>
- [PATCH v3] tpm/eventlog: Don't abort tpm_read_log on faulty ACPI address
- From: Morten Linderud <morten@xxxxxxxxxxx>
- Re: [PATCH v2] tpm/eventlog: Don't abort tpm_read_log on faulty ACPI address
- From: Erkki Eilonen <erkki@xxxxxxxxxxxx>
- Re: [PATCH v4 6/6] integrity: machine keyring CA configuration
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils 0/3] CI: Tumbleweed openSSL fix
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH ima-evm-utils 1/3] tests/install-swtpm.sh: Update ibmswtpm2 to 1682
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH ima-evm-utils 3/3] github: Put openSSL build into own section
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH ima-evm-utils 2/3] github: travis: Remove COMPILE_SSL from tumbleweed
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH ima-evm-utils 0/3] CI: Tumbleweed openSSL fix
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH 0/1] Avoid triggering an fTPM bug from kernel
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH ima-evm-utils v2] Add ima_policy_check.awk and ima_policy_check.test
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 06/11] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 06/11] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 06/11] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 06/11] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v6 24/26] powerpc/pseries: Implement secvars for dynamic secure boot
- From: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
- Re: [PATCH 04/14] Implement CAP_TRUST capability.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v6 24/26] powerpc/pseries: Implement secvars for dynamic secure boot
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 04/14] Implement CAP_TRUST capability.
- From: "Dr. Greg" <greg@xxxxxxxxxxxx>
- Re: [PATCH v6 24/26] powerpc/pseries: Implement secvars for dynamic secure boot
- From: Michael Ellerman <michaele@xxxxxxxxxxx>
- Re: [PATCH v2 06/11] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: Yujie Liu <yujie.liu@xxxxxxxxx>
- [GIT PULL] tpm: changes for v6.3-rc1
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils] Add ima_policy_check.awk and ima_policy_check.test
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]