Linux Integrity
[Prev Page][Next Page]
- [PATCH v6 0/6] Add CA enforcement keyring restrictions
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils] Include the filesystem UUID in HMAC calculation
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH ima-evm-utils] Include the filesystem UUID in HMAC calculation
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 03/38] char: impi, tpm: depend on HAS_IOPORT
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH next] tpm: Fix a possible dereference of ERR_PTR in tpm_init()
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH next] tpm: Fix a possible dereference of ERR_PTR in tpm_init()
- From: Harshit Mogalapalli <harshit.m.mogalapalli@xxxxxxxxxx>
- Re: [PATCH v5 5/6] KEYS: CA link restriction
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 5/6] KEYS: CA link restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v5 5/6] KEYS: CA link restriction
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/2] tpm: st33zp24: Mark ACPI and OF related data as maybe unused
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 0/3] tpm: Convert to platform remove callback returning void
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: tpm: fix build break in tpm-chip.c caused by AMD fTPM quirk
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] tpm: changes for v6.3-rc4
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] tpm: changes for v6.3-rc4
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: tpm: fix build break in tpm-chip.c caused by AMD fTPM quirk
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [GIT PULL] tpm: changes for v6.3-rc4
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: tpm: fix build break in tpm-chip.c caused by AMD fTPM quirk
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- tpm: fix build break in tpm-chip.c caused by AMD fTPM quirk
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 2/3] tpm/tpm_tis: Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 0/3] tpm: Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 3/3] tpm/tpm_tis_synquacer: Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 1/3] tpm/tpm_ftpm_tee: Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH v2 2/2] tpm: tpm_tis_spi: Mark ACPI and OF related data as maybe unused
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- [PATCH v2 1/2] tpm: st33zp24: Mark ACPI and OF related data as maybe unused
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v11 00/14] TPM IRQ fixes
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: remove unnecessary (void*) conversions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [Patch V8 2/3] tpm_tis-spi: Add hardware wait polling
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: cr50: i2c: use jiffies to wait for tpm ready irq
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 2/6] ocfs2: Switch to security_inode_init_security()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v9 07/16] uapi|audit|ipe: add ipe auditing support
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 11/16] ipe: add support for dm-verity as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: remove the 'checkreqprot' functionality
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: remove the 'checkreqprot' functionality
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v11 00/14] TPM IRQ fixes
- From: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
- [PATCH] tpm: remove unnecessary (void*) conversions
- From: Yu Zhe <yuzhe@xxxxxxxxxxxx>
- RE: [Patch V8 2/3] tpm_tis-spi: Add hardware wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- Re: [PATCH] ima: Fix potential NULL pointer access in ima_match_rules()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] Fix fsverity.test mount failure for ppc64
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] IMA: allow/fix UML builds
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH] tpm: cr50: i2c: use jiffies to wait for tpm ready irq
- From: Mark Hasemeyer <markhas@xxxxxxxxxxxx>
- Re: [PATCH] IMA: allow/fix UML builds
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] ima: Fix potential NULL pointer access in ima_match_rules()
- From: Roman Danilov <romanosauce57@xxxxxxxxx>
- Re: [PATCH v1 0/2] Add destructor hook to LSM modules
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 03/38] char: impi, tpm: depend on HAS_IOPORT
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH v3 03/38] char: impi, tpm: depend on HAS_IOPORT
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 03/38] char: impi, tpm: depend on HAS_IOPORT
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v3 03/38] char: impi, tpm: depend on HAS_IOPORT
- From: Corey Minyard <minyard@xxxxxxx>
- Re: [PATCH ima-evm-utils] Fix fsverity.test mount failure for ppc64
- From: R Nageswara Sastry <rnsastry@xxxxxxxxxxxxx>
- Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 10/12] tpm: fix up the tpm_class shutdown_pre pointer when created
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH 10/12] tpm: fix up the tpm_class shutdown_pre pointer when created
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 03/38] char: impi, tpm: depend on HAS_IOPORT
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v3 03/38] char: impi, tpm: depend on HAS_IOPORT
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [PATCH v1 0/2] Add destructor hook to LSM modules
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 10/12] tpm: fix up the tpm_class shutdown_pre pointer when created
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v1 0/2] Add destructor hook to LSM modules
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
- From: Thorsten Leemhuis <regressions@xxxxxxxxxxxxx>
- Re: [PATCH v8 0/6] evm: Do HMAC of multiple per LSM xattrs for new inodes
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 6/6] evm: Support multiple LSMs providing an xattr
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 5/6] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 2/6] ocfs2: Switch to security_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 1/6] reiserfs: Switch to security_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 3/6] security: Remove security_old_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 0/6] evm: Do HMAC of multiple per LSM xattrs for new inodes
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: Documentation on IMA for Linux Kernel Documentation
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: Documentation on IMA for Linux Kernel Documentation
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v1 0/2] Add destructor hook to LSM modules
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 10/12] tpm: fix up the tpm_class shutdown_pre pointer when created
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 6/6] integrity: machine keyring CA configuration
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v1 0/2] Add destructor hook to LSM modules
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] fsverity.test: Add /usr/sbin into $PATH
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH] IMA: allow/fix UML builds
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [GIT PULL] tpm: changes for v6.3-rc3
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] tpm: changes for v6.3-rc3
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] tpm: disable hwrng for fTPM on some AMD designs
- From: "Linux regression tracking (Thorsten Leemhuis)" <regressions@xxxxxxxxxxxxx>
- Re: [PATCH v3] tpm: disable hwrng for fTPM on some AMD designs
- From: "Linux regression tracking (Thorsten Leemhuis)" <regressions@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] tpm: tpm_tis_spi: Mark ACPI and OF related data as maybe unused
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm: st33zp24: Mark ACPI and OF related data as maybe unused
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v3] tpm: disable hwrng for fTPM on some AMD designs
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] tpm: disable hwrng for fTPM on some AMD designs
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/2] tpm: tpm_tis_spi: Mark ACPI and OF related data as maybe unused
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm: st33zp24: Mark ACPI and OF related data as maybe unused
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] tpm: disable hwrng for fTPM on some AMD designs
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v3] tpm: disable hwrng for fTPM on some AMD designs
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] tpm: disable hwrng for fTPM on some AMD designs
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 5/6] KEYS: CA link restriction
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 4/6] KEYS: X.509: Parse Key Usage
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 2/6] KEYS: Add missing function documentation
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 1/6] KEYS: Create static version of public_key_verify_signature
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [Patch V8 2/3] tpm_tis-spi: Add hardware wait polling
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 2/2] tpm: tpm_tis_spi: Mark ACPI and OF related data as maybe unused
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- [PATCH 1/2] tpm: st33zp24: Mark ACPI and OF related data as maybe unused
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v1 0/2] Add destructor hook to LSM modules
- From: Mirsad Goran Todorovac <mirsad.todorovac@xxxxxxxxxxxx>
- Re: [PATCH v1 0/2] Add destructor hook to LSM modules
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH ima-evm-utils] Fix fsverity.test mount failure for ppc64
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v4 0/3] security: Always enable integrity LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v1 1/2] Add release hook to LSM
- From: Mirsad Goran Todorovac <mirsad.todorovac@xxxxxxxxxxxx>
- Re: [PATCH v1 0/2] Add destructor hook to LSM modules
- From: Mirsad Goran Todorovac <mirsad.todorovac@xxxxxxxxxxxx>
- Re: [PATCH v1 0/2] Add destructor hook to LSM modules
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v1 0/2] Add destructor hook to LSM modules
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v1 1/2] Add release hook to LSM
- From: Mirsad Goran Todorovac <mirsad.todorovac@xxxxxxxxxxxx>
- Re: [PATCH v1 1/2] Add release hook to LSM
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH v1 1/2] Add release hook to LSM
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH v1 1/2] Add release hook to LSM
- From: Mirsad Goran Todorovac <mirsad.todorovac@xxxxxxxxxxxx>
- Re: [PATCH v3 1/3] security: Introduce LSM_ORDER_LAST and set it for the integrity LSM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v1 1/2] Add release hook to LSM
- From: Mirsad Goran Todorovac <mirsad.todorovac@xxxxxxxxxxxx>
- Re: [PATCH v1 1/2] Add release hook to LSM
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/2] Add destructor hook to LSM modules
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- [PATCH v1 1/2] Add release hook to LSM
- From: Mirsad Goran Todorovac <mirsad.goran.todorovac@xxxxxx>
- Re: [PATCH ima-evm-utils] fsverity.test: Add /usr/sbin into $PATH
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v1 0/2] Add destructor hook to LSM modules
- From: Mirsad Goran Todorovac <mirsad.goran.todorovac@xxxxxx>
- Re: [PATCH v3] tpm: disable hwrng for fTPM on some AMD designs
- From: Thorsten Leemhuis <regressions@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/3] security: Introduce LSM_ORDER_LAST and set it for the integrity LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/3] security: Introduce LSM_ORDER_LAST and set it for the integrity LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/3] security: Introduce LSM_ORDER_LAST and set it for the integrity LSM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/3] Revert "integrity: double check iint_cache was initialized"
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 3/3] security: Remove integrity from the LSM list in Kconfig
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/3] security: Introduce LSM_ORDER_LAST and set it for the integrity LSM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils] fsverity.test: Add /usr/sbin into $PATH
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v4 3/3] security: Remove integrity from the LSM list in Kconfig
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 1/3] security: Introduce LSM_ORDER_LAST and set it for the integrity LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 2/3] Revert "integrity: double check iint_cache was initialized"
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 0/3] security: Always enable integrity LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/3] security: Introduce LSM_ORDER_LAST and set it for the integrity LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] security: Remove integrity from the LSM list in Kconfig
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/3] security: Introduce LSM_ORDER_LAST and set it for the integrity LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- ima-evm-utils: version 1.5 released
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/3] security: Introduce LSM_ORDER_LAST and set it for the integrity LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] security: Remove integrity from the LSM list in Kconfig
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] security: Remove integrity from the LSM list in Kconfig
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/3] Revert "integrity: double check iint_cache was initialized"
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/3] security: Introduce LSM_ORDER_LAST and set it for the integrity LSM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 15/28] security: Introduce inode_post_removexattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 03/28] ima: Align ima_post_create_tmpfile() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 1/3] security: Introduce LSM_ORDER_LAST and set it for the integrity LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 3/3] security: Remove integrity from the LSM list in Kconfig
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 2/3] Revert "integrity: double check iint_cache was initialized"
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 0/3] security: Always enable integrity LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] security: Introduce LSM_ORDER_LAST and set it for the integrity LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 0/6] evm: Do HMAC of multiple per LSM xattrs for new inodes
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] security: Introduce LSM_ORDER_LAST and set it for the integrity LSM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 0/6] evm: Do HMAC of multiple per LSM xattrs for new inodes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] bpf: Fix IMA test
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH] bpf: Fix IMA test
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- [PATCH] Revert "integrity: double check iint_cache was initialized"
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v2] security: Introduce LSM_ORDER_LAST and set it for the integrity LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 00/28] security: Move IMA and EVM to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 23/28] security: Introduce LSM_ORDER_LAST
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 22/28] security: Introduce key_post_create_or_update hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 18/28] security: Introduce path_post_mknod hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 15/28] security: Introduce inode_post_removexattr hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 14/28] security: Introduce inode_post_setattr hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 03/28] ima: Align ima_post_create_tmpfile() definition with LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 00/28] security: Move IMA and EVM to the LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 23/28] security: Introduce LSM_ORDER_LAST
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- INFO: BUG: kobject: 'integrity' (000000005198bea8): does not have a release() function, it is broken and must be fixed. See ...
- From: Mirsad Todorovac <mirsad.todorovac@xxxxxxxxxxxx>
- Re: [PATCH 23/28] security: Introduce LSM_ORDER_LAST
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 23/28] security: Introduce LSM_ORDER_LAST
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 23/28] security: Introduce LSM_ORDER_LAST
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] bpf: Fix IMA test
- From: Matt Bobrowski <mattbobrowski@xxxxxxxxxx>
- Re: [PATCH] bpf: Fix IMA test
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] bpf: Fix IMA test
- From: Matt Bobrowski <mattbobrowski@xxxxxxxxxx>
- Re: [PATCH] bpf: Fix IMA test
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH] bpf: Fix IMA test
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] tpm: disable hwrng for fTPM on some AMD designs
- From: "Linux regression tracking (Thorsten Leemhuis)" <regressions@xxxxxxxxxxxxx>
- Re: [PATCH 23/28] security: Introduce LSM_ORDER_LAST
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 23/28] security: Introduce LSM_ORDER_LAST
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 22/28] security: Introduce key_post_create_or_update hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 26/28] evm: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 26/28] evm: Move to LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [External] Re: [BUG] blacklist: Problem blacklisting hash (-13) during boot
- From: Mark Pearson <markpearson@xxxxxxxxxx>
- Re: [PATCH 11/28] evm: Complete description of evm_inode_setattr()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 20/28] security: Introduce inode_post_set_acl hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 19/28] security: Introduce inode_post_create_tmpfile hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 18/28] security: Introduce path_post_mknod hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 17/28] security: Introduce file_pre_free_security hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 16/28] security: Introduce file_post_open hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 15/28] security: Introduce inode_post_removexattr hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 02/28] ima: Align ima_post_path_mknod() definition with LSM infrastructure
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 21/28] security: Introduce inode_post_remove_acl hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 14/28] security: Introduce inode_post_setattr hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 13/28] security: Align inode_setattr hook definition with EVM
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 07/28] ima: Align ima_post_read_file() definition with LSM infrastructure
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 05/28] ima: Align ima_inode_setxattr() definition with LSM infrastructure
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 04/28] ima: Align ima_file_mprotect() definition with LSM infrastructure
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 03/28] ima: Align ima_post_create_tmpfile() definition with LSM infrastructure
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 21/28] security: Introduce inode_post_remove_acl hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 11/28] evm: Complete description of evm_inode_setattr()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 10/28] evm: Align evm_inode_post_setxattr() definition with LSM infrastructure
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 09/28] evm: Align evm_inode_setxattr() definition with LSM infrastructure
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 08/28] evm: Align evm_inode_post_setattr() definition with LSM infrastructure
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 06/28] ima: Align ima_inode_removexattr() definition with LSM infrastructure
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 01/28] ima: Align ima_inode_post_setattr() definition with LSM infrastructure
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 21/28] security: Introduce inode_post_remove_acl hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 21/28] security: Introduce inode_post_remove_acl hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils 2/2] tests: fix gen-keys.sh to generate sha256 certificates
- From: R Nageswara Sastry <rnsastry@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils 2/2] tests: fix gen-keys.sh to generate sha256 certificates
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils 1/2] Update README
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] evm: Complete description of evm_inode_setattr()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 12/28] fs: Fix description of vfs_tmpfile()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 12/28] fs: Fix description of vfs_tmpfile()
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH 26/28] evm: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 13/28] security: Align inode_setattr hook definition with EVM
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 26/28] evm: Move to LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Shouldn't we check if MokIgnoreDB is non volatile in load_uefi.c?
- From: Adam Vodopjan <adam.vodopjan@xxxxxxxxx>
- [PATCH 27/28] integrity: Move integrity functions to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 22/28] security: Introduce key_post_create_or_update hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 21/28] security: Introduce inode_post_remove_acl hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 09/28] evm: Align evm_inode_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 11/28] evm: Complete description of evm_inode_setattr()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 03/28] ima: Align ima_post_create_tmpfile() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 07/28] ima: Align ima_post_read_file() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 01/28] ima: Align ima_inode_post_setattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 08/28] evm: Align evm_inode_post_setattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 06/28] ima: Align ima_inode_removexattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 00/28] security: Move IMA and EVM to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 02/28] ima: Align ima_post_path_mknod() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 04/28] ima: Align ima_file_mprotect() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 05/28] ima: Align ima_inode_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 10/28] evm: Align evm_inode_post_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 28/28] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 24/28] ima: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 26/28] evm: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 25/28] ima: Move IMA-Appraisal to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 23/28] security: Introduce LSM_ORDER_LAST
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 20/28] security: Introduce inode_post_set_acl hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 19/28] security: Introduce inode_post_create_tmpfile hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 18/28] security: Introduce path_post_mknod hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 16/28] security: Introduce file_post_open hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 17/28] security: Introduce file_pre_free_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 15/28] security: Introduce inode_post_removexattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 14/28] security: Introduce inode_post_setattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 13/28] security: Align inode_setattr hook definition with EVM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 12/28] fs: Fix description of vfs_tmpfile()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v7] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] powerpc/tpm: Reserve SML log when kexec'ing
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 11/16] ipe: add support for dm-verity as a trust provider
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 09/16] block|security: add LSM blob to block_device
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 08/16] ipe: add permissive toggle
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 07/16] uapi|audit|ipe: add ipe auditing support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 06/16] ipe: add LSM hooks on execution and kernel read
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 05/16] ipe: add userspace interface
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 03/16] ipe: add evaluation loop and introduce 'boot_verified' as a trust provider
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 02/16] ipe: add policy parser
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 01/16] security: add ipe lsm
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH ima-evm-utils v7] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v6] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH ima-evm-utils v4] Add ima_policy_check.awk and ima_policy_check.test
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v6] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v5 0/6] Add CA enforcement keyring restrictions
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v5 5/6] KEYS: CA link restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v5 6/6] integrity: machine keyring CA configuration
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v5 1/6] KEYS: Create static version of public_key_verify_signature
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v5 3/6] KEYS: X.509: Parse Basic Constraints for CA
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v5 4/6] KEYS: X.509: Parse Key Usage
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v5 2/6] KEYS: Add missing function documentation
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils v3] Add ima_policy_check.awk and ima_policy_check.test
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v3] Add ima_policy_check.awk and ima_policy_check.test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v3] Add ima_policy_check.awk and ima_policy_check.test
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [Patch V8 3/3] spi: tegra210-quad: Enable TPM wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V8 2/3] tpm_tis-spi: Add hardware wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V8 0/3] Tegra TPM driver with HW flow control
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V8 1/3] spi: Add TPM HW flow flag
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- Re: [RFC PATCH v9 03/16] ipe: add evaluation loop and introduce 'boot_verified' as a trust provider
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v3] Add ima_policy_check.awk and ima_policy_check.test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [Patch V5 2/3] tpm_tis-spi: Support hardware wait polling
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/2] powerpc/tpm: Create linux,sml-base/size as big endian
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [Patch V7 2/3] tpm_tis-spi: Add hardware wait polling
- From: kernel test robot <lkp@xxxxxxxxx>
- [Patch V7 3/3] spi: tegra210-quad: Enable TPM wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V7 2/3] tpm_tis-spi: Add hardware wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V7 1/3] spi: Add TPM HW flow flag
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V7 0/3] Tegra TPM driver with HW flow control
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- Re: [Patch V5 2/3] tpm_tis-spi: Support hardware wait polling
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- RE: [Patch V6 1/3] spi: Add TPM HW flow flag
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- Re: [Patch V5 2/3] tpm_tis-spi: Support hardware wait polling
- From: Thierry Reding <thierry.reding@xxxxxxxxx>
- Re: [Patch V6 3/3] spi: tegra210-quad: Enable TPM wait polling
- From: Jon Hunter <jonathanh@xxxxxxxxxx>
- Re: [Patch V5 2/3] tpm_tis-spi: Support hardware wait polling
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [Patch V6 3/3] spi: tegra210-quad: Enable TPM wait polling
- From: Thierry Reding <thierry.reding@xxxxxxxxx>
- Re: [Patch V5 2/3] tpm_tis-spi: Support hardware wait polling
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [Patch V6 3/3] spi: tegra210-quad: Enable TPM wait polling
- From: Thierry Reding <thierry.reding@xxxxxxxxx>
- Re: [Patch V6 2/3] tpm_tis-spi: Support hardware wait polling
- From: Thierry Reding <thierry.reding@xxxxxxxxx>
- Re: [Patch V6 1/3] spi: Add TPM HW flow flag
- From: Thierry Reding <thierry.reding@xxxxxxxxx>
- Re: [Patch V5 2/3] tpm_tis-spi: Support hardware wait polling
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [Patch V5 2/3] tpm_tis-spi: Support hardware wait polling
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- RE: [Patch V5 2/3] tpm_tis-spi: Support hardware wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [PATCH ima-evm-utils v6] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] powerpc/tpm: Reserve SML log when kexec'ing
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v3] Add ima_policy_check.awk and ima_policy_check.test
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [Patch V5 2/3] tpm_tis-spi: Support hardware wait polling
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 1/2] powerpc/tpm: Create linux,sml-base/size as big endian
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- RE: [Patch V5 2/3] tpm_tis-spi: Support hardware wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- Re: [PATCH v3] tpm: disable hwrng for fTPM on some AMD designs
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/2] powerpc/tpm: Create linux,sml-base/size as big endian
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v3] tpm: disable hwrng for fTPM on some AMD designs
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- Re: [PATCH v2] tpm: disable hwrng for fTPM on some AMD designs
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm: disable hwrng for fTPM on some AMD designs
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- RE: [PATCH v2] tpm: disable hwrng for fTPM on some AMD designs
- From: "Limonciello, Mario" <Mario.Limonciello@xxxxxxx>
- Re: [Patch V5 2/3] tpm_tis-spi: Support hardware wait polling
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [Patch V5 0/3] Tegra TPM driver with HW flow control
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/2] powerpc/tpm: Create linux,sml-base/size as big endian
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [Patch V6 3/3] spi: tegra210-quad: Enable TPM wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V6 2/3] tpm_tis-spi: Support hardware wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V6 1/3] spi: Add TPM HW flow flag
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V6 0/3] Tegra TPM driver with HW flow control
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- Re: [PATCH v2] tpm: disable hwrng for fTPM on some AMD designs
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH v2] tpm: disable hwrng for fTPM on some AMD designs
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- Re: [PATCH v2] tpm: disable hwrng for fTPM on some AMD designs
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH v2] tpm: disable hwrng for fTPM on some AMD designs
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- Re: [External] Re: [BUG] blacklist: Problem blacklisting hash (-13) during boot
- From: Jeremy Kerr <jk@xxxxxxxxxxxxxxxxxxxx>
- Re: [External] Re: [BUG] blacklist: Problem blacklisting hash (-13) during boot
- From: Mark Pearson <markpearson@xxxxxxxxxx>
- [Patch V5 3/3] spi: tegra210-quad: Enable TPM wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V5 2/3] tpm_tis-spi: Support hardware wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V5 1/3] spi: Add TPM HW flow flag
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V5 0/3] Tegra TPM driver with HW flow control
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: Thorsten Leemhuis <regressions@xxxxxxxxxxxxx>
- Re: [PATCH 08/12] tpm: add hmac checks to tpm2_pcr_extend()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 05/12] tpm: add buffer function to point to returned parameters
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 04/12] tpm: add cursor based buffer functions for response parsing
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 06/12] tpm: export the context save and load commands
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 03/12] tpm: add buffer handling for TPM2B types
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 02/12] tpm: move buffer handling from static inlines to real functions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 01/12] crypto: lib - implement library version of AES in CFB mode
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [External] Re: [BUG] blacklist: Problem blacklisting hash (-13) during boot
- From: Jeremy Kerr <jk@xxxxxxxxxxxxxxxxxxxx>
- Re: [External] Re: [BUG] blacklist: Problem blacklisting hash (-13) during boot
- From: Thomas Weißschuh <thomas@xxxxxxxx>
- Re: [External] Re: [BUG] blacklist: Problem blacklisting hash (-13) during boot
- From: Jeremy Kerr <jk@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] tpm_crb: Fix an error handling path in crb_acpi_add()
- From: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
- RE: [Patch V4 3/3] spi: tegra210-quad: set half duplex flag
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- Re: [Patch V4 3/3] spi: tegra210-quad: set half duplex flag
- From: Mark Brown <broonie@xxxxxxxxxx>
- RE: [Patch V3 1/3] tpm_tis-spi: Support hardware wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- Re: [Patch V3 1/3] tpm_tis-spi: Support hardware wait polling
- From: Mark Brown <broonie@xxxxxxxxxx>
- [Patch V4 2/3] tpm_tis-spi: Support hardware wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V4 3/3] spi: tegra210-quad: set half duplex flag
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V4 1/3] spi: Add TPM HW flow flag
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V4 0/3] Tegra TPM driver with HW flow control
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- Re: [PATCH v11 00/14] TPM IRQ fixes
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- RE: [Patch V3 1/3] tpm_tis-spi: Support hardware wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [PATCH] IMA: allow/fix UML builds
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH 1/2] powerpc/tpm: Create linux,sml-base/size as big endian
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- [PATCH 2/2] powerpc/tpm: Reserve SML log when kexec'ing
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- RE: [Patch V3 3/3] spi: tegra210-quad: Enable TPM wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- Re: [Patch V3 1/3] tpm_tis-spi: Support hardware wait polling
- From: Mark Brown <broonie@xxxxxxxxxx>
- RE: [Patch V3 1/3] tpm_tis-spi: Support hardware wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- Re: (subset) [Patch V3 0/3] Tegra TPM driver with HW flow control
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [Patch V3 3/3] spi: tegra210-quad: Enable TPM wait polling
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [Patch V3 1/3] tpm_tis-spi: Support hardware wait polling
- From: Mark Brown <broonie@xxxxxxxxxx>
- [Patch V3 3/3] spi: tegra210-quad: Enable TPM wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V3 2/3] spi: tegra210-quad: set half duplex flag
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V3 1/3] tpm_tis-spi: Support hardware wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V3 0/3] Tegra TPM driver with HW flow control
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- RE: [Patch V2 3/4] spi: dt-bindings: Add Tegra TPM wait polling flag
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- Re: [GIT PULL] integrity: susbsytem updates for v6.3
- From: pr-tracker-bot@xxxxxxxxxx
- RE: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: "Limonciello, Mario" <Mario.Limonciello@xxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 2/6] ocfs2: Switch to security_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 2/6] ocfs2: Switch to security_inode_init_security()
- From: Joseph Qi <joseph.qi@xxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] tpm: changes for v6.3-rc1
- From: pr-tracker-bot@xxxxxxxxxx
- [PATCH v2] tpm: disable hwrng for fTPM on some AMD designs
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [GIT PULL] integrity: susbsytem updates for v6.3
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils 0/3] CI: Tumbleweed openSSL fix
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils 0/3] CI: Tumbleweed openSSL fix
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 2/6] ocfs2: Switch to security_inode_init_security()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 2/6] ocfs2: Switch to security_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 2/6] ocfs2: Switch to security_inode_init_security()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 6/6] evm: Support multiple LSMs providing an xattr
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 6/6] evm: Support multiple LSMs providing an xattr
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 2/6] ocfs2: Switch to security_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 2/6] ocfs2: Switch to security_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 6/6] evm: Support multiple LSMs providing an xattr
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 5/6] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 3/6] security: Remove security_old_inode_init_security()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: "Limonciello, Mario" <mario.limonciello@xxxxxxx>
- Re: [PATCH 00/12] add integrity and security to TPM2 transactions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] tpm/eventlog: Don't abort tpm_read_log on faulty ACPI address
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm/eventlog: Don't abort tpm_read_log on faulty ACPI address
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 06/11] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 2/6] ocfs2: Switch to security_inode_init_security()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 2/6] ocfs2: Switch to security_inode_init_security()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 1/6] reiserfs: Switch to security_inode_init_security()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: Thorsten Leemhuis <regressions@xxxxxxxxxxxxx>
- Re: [PATCH 07/12] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 07/12] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 07/12] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 11/12] tpm: add the null key name as a sysfs export
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 06/11] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 07/12] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 04/14] Implement CAP_TRUST capability.
- From: "Dr. Greg" <greg@xxxxxxxxxxxx>
- [PATCH 12/12] Documentation: add tpm-security.rst
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 11/12] tpm: add the null key name as a sysfs export
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 10/12] KEYS: trusted: Add session encryption protection to the seal/unseal path
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 09/12] tpm: add session encryption protection to tpm2_get_random()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 08/12] tpm: add hmac checks to tpm2_pcr_extend()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 07/12] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 06/12] tpm: export the context save and load commands
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 05/12] tpm: add buffer function to point to returned parameters
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 04/12] tpm: add cursor based buffer functions for response parsing
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 03/12] tpm: add buffer handling for TPM2B types
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 02/12] tpm: move buffer handling from static inlines to real functions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 01/12] crypto: lib - implement library version of AES in CFB mode
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 00/12] add integrity and security to TPM2 transactions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils 0/3] CI: Tumbleweed openSSL fix
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 06/11] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2] Add ima_policy_check.awk and ima_policy_check.test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2] Add ima_policy_check.awk and ima_policy_check.test
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2] Add ima_policy_check.awk and ima_policy_check.test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2] Add ima_policy_check.awk and ima_policy_check.test
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2] Add ima_policy_check.awk and ima_policy_check.test
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils 0/3] CI: Tumbleweed openSSL fix
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2] Add ima_policy_check.awk and ima_policy_check.test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2] Add ima_policy_check.awk and ima_policy_check.test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils 0/3] CI: Tumbleweed openSSL fix
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils 0/3] CI: Tumbleweed openSSL fix
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils 0/3] CI: Tumbleweed openSSL fix
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v6 00/26] pSeries dynamic secure boot secvar interface + platform keyring loading
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [PATCH v6 24/26] powerpc/pseries: Implement secvars for dynamic secure boot
- From: Michael Ellerman <michaele@xxxxxxxxxxx>
- [PATCH v3] tpm/eventlog: Don't abort tpm_read_log on faulty ACPI address
- From: Morten Linderud <morten@xxxxxxxxxxx>
- Re: [PATCH v2] tpm/eventlog: Don't abort tpm_read_log on faulty ACPI address
- From: Erkki Eilonen <erkki@xxxxxxxxxxxx>
- Re: [PATCH v4 6/6] integrity: machine keyring CA configuration
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils 0/3] CI: Tumbleweed openSSL fix
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH ima-evm-utils 1/3] tests/install-swtpm.sh: Update ibmswtpm2 to 1682
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH ima-evm-utils 3/3] github: Put openSSL build into own section
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH ima-evm-utils 2/3] github: travis: Remove COMPILE_SSL from tumbleweed
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH ima-evm-utils 0/3] CI: Tumbleweed openSSL fix
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH 0/1] Avoid triggering an fTPM bug from kernel
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH ima-evm-utils v2] Add ima_policy_check.awk and ima_policy_check.test
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 06/11] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 06/11] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 06/11] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 06/11] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v6 24/26] powerpc/pseries: Implement secvars for dynamic secure boot
- From: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
- Re: [PATCH 04/14] Implement CAP_TRUST capability.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v6 24/26] powerpc/pseries: Implement secvars for dynamic secure boot
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 04/14] Implement CAP_TRUST capability.
- From: "Dr. Greg" <greg@xxxxxxxxxxxx>
- Re: [PATCH v6 24/26] powerpc/pseries: Implement secvars for dynamic secure boot
- From: Michael Ellerman <michaele@xxxxxxxxxxx>
- Re: [PATCH v2 06/11] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: Yujie Liu <yujie.liu@xxxxxxxxx>
- [GIT PULL] tpm: changes for v6.3-rc1
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils] Add ima_policy_check.awk and ima_policy_check.test
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: add vendor flag to command code validation
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 6/6] integrity: machine keyring CA configuration
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 06/11] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 24/26] powerpc/pseries: Implement secvars for dynamic secure boot
- From: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
- Re: [PATCH v6 24/26] powerpc/pseries: Implement secvars for dynamic secure boot
- From: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
- Re: [PATCH v6 24/26] powerpc/pseries: Implement secvars for dynamic secure boot
- From: Michael Ellerman <michaele@xxxxxxxxxxx>
- Re: [PATCH v6 24/26] powerpc/pseries: Implement secvars for dynamic secure boot
- From: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
- Re: [PATCH v6 21/26] powerpc/pseries: Clarify warning when PLPKS password already set
- From: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
- Re: [PATCH RFC] tpm: disable hwrng for known-defective AMD RNGs
- From: "Linux regression tracking (Thorsten Leemhuis)" <regressions@xxxxxxxxxxxxx>
- Re: [RFC PATCH v9 03/16] ipe: add evaluation loop and introduce 'boot_verified' as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 6/6] integrity: machine keyring CA configuration
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v4 4/6] KEYS: X.509: Parse Key Usage
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v4 1/6] KEYS: Create static version of public_key_verify_signature
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v6 24/26] powerpc/pseries: Implement secvars for dynamic secure boot
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v6 24/26] powerpc/pseries: Implement secvars for dynamic secure boot
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v6 23/26] powerpc/pseries: Pass PLPKS password on kexec
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v6 05/26] powerpc/secvar: Warn and error if multiple secvar ops are set
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v6 21/26] powerpc/pseries: Clarify warning when PLPKS password already set
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: add vendor flag to command code validation
- From: Julien Gomes <julien@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils] Add ima_policy_check.awk and ima_policy_check.test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 06/11] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] Add ima_policy_check.awk and ima_policy_check.test
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 6/6] integrity: machine keyring CA configuration
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v6 01/26] powerpc/pseries: Fix handling of PLPKS object flushing timeout
- From: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
- [PATCH v6 20/26] powerpc/pseries: Turn PSERIES_PLPKS into a hidden option
- From: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
- [PATCH v6 17/26] powerpc/pseries: Implement signed update for PLPKS objects
- From: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
- [PATCH v6 25/26] integrity/powerpc: Improve error handling & reporting when loading certs
- From: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
- [PATCH v6 23/26] powerpc/pseries: Pass PLPKS password on kexec
- From: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
- [PATCH v6 15/26] powerpc/pseries: Move PLPKS constants to header file
- From: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
- [PATCH v6 14/26] powerpc/pseries: Move plpks.h to include directory
- From: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
- [PATCH v6 22/26] powerpc/pseries: Add helper to get PLPKS password length
- From: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
- [PATCH v6 10/26] powerpc/secvar: Extend sysfs to include config vars
- From: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
- [PATCH v6 26/26] integrity/powerpc: Support loading keys from PLPKS
- From: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
- [PATCH v6 24/26] powerpc/pseries: Implement secvars for dynamic secure boot
- From: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
- [PATCH v6 21/26] powerpc/pseries: Clarify warning when PLPKS password already set
- From: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
- [PATCH v6 19/26] powerpc/pseries: Make caller pass buffer to plpks_read_var()
- From: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
- [PATCH v6 16/26] powerpc/pseries: Expose PLPKS config values, support additional fields
- From: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
- [PATCH v6 18/26] powerpc/pseries: Log hcall return codes for PLPKS debug
- From: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
- [PATCH v6 11/26] powerpc/secvar: Allow backend to populate static list of variable names
- From: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
- [PATCH v6 13/26] powerpc/secvar: Don't print error on ENOENT when reading variables
- From: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
- [PATCH v6 08/26] powerpc/secvar: Handle max object size in the consumer
- From: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
- [PATCH v6 04/26] powerpc/secvar: Use u64 in secvar_operations
- From: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
- [PATCH v6 05/26] powerpc/secvar: Warn and error if multiple secvar ops are set
- From: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
- [PATCH v6 03/26] powerpc/secvar: Fix incorrect return in secvar_sysfs_load()
- From: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
- [PATCH v6 12/26] powerpc/secvar: Warn when PAGE_SIZE is smaller than max object size
- From: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
- [PATCH v6 02/26] powerpc/pseries: Fix alignment of PLPKS structures and buffers
- From: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
- [PATCH v6 07/26] powerpc/secvar: Handle format string in the consumer
- From: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
- [PATCH v6 09/26] powerpc/secvar: Clean up init error messages
- From: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
- [PATCH v6 00/26] pSeries dynamic secure boot secvar interface + platform keyring loading
- From: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
- [PATCH v6 06/26] powerpc/secvar: Use sysfs_emit() instead of sprintf()
- From: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 2/2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 4/6] KEYS: X.509: Parse Key Usage
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 3/6] KEYS: X.509: Parse Basic Constraints for CA
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 2/6] KEYS: Add missing function documentation
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 1/6] KEYS: Create static version of public_key_verify_signature
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC] tpm: disable hwrng for known-defective AMD RNGs
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH RFC] tpm: disable hwrng for known-defective AMD RNGs
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: add vendor flag to command code validation
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v15 01/26] securityfs: rework dentry creation
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 2/2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 06/16] ipe: add LSM hooks on execution and kernel read
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 12/16] fsverity: consume builtin signature via LSM hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 2/6] ocfs2: Switch to security_inode_init_security()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 2/2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH ima-evm-utils] Add ima_policy_check.awk and ima_policy_check.test
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH RFC] tpm: disable hwrng for known-defective AMD RNGs
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH RFC] tpm: disable hwrng for known-defective AMD RNGs
- From: "Limonciello, Mario" <mario.limonciello@xxxxxxx>
- [PATCH RFC] tpm: disable hwrng for known-defective AMD RNGs
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v5 2/2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 12/16] fsverity: consume builtin signature via LSM hook
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v4 5/6] KEYS: CA link restriction
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 0/6] Add CA enforcement keyring restrictions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 0/6] Add CA enforcement keyring restrictions
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v4 2/6] KEYS: Add missing function documentation
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 4/6] KEYS: X.509: Parse Key Usage
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 3/6] KEYS: X.509: Parse Basic Constraints for CA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] tpm: add vendor flag to command code validation
- From: Julien Gomes <julien@xxxxxxxxxx>
- Re: [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7 2/6] ocfs2: Switch to security_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/6] Add CA enforcement keyring restrictions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 06/11] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [regression] Bug 216989 - since 6.1 systems with AMD Ryzen stutter when fTPM is enabled
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 06/11] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/4] tpm: tegra: Support SPI tpm wait state detect
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [regression] Bug 216989 - since 6.1 systems with AMD Ryzen stutter when fTPM is enabled
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH 0/4] Tegra TPM driver with hw flow control
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [regression] Bug 216989 - since 6.1 systems with AMD Ryzen stutter when fTPM is enabled
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [regression] Bug 216989 - since 6.1 systems with AMD Ryzen stutter when fTPM is enabled
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH -next] tpm: of: fix return value check in tpm_read_log_memory_region()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH -next] tpm: of: fix return value check in tpm_read_log_memory_region()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH -next] tpm: of: fix return value check in tpm_read_log_memory_region()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v9 00/16] Integrity Policy Enforcement LSM (IPE)
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 13/16] ipe: enable support for fs-verity as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 10/16] dm-verity: consume root hash digest and signature data via LSM hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [regression] Bug 216989 - since 6.1 systems with AMD Ryzen stutter when fTPM is enabled
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH ima-evm-utils v5] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v5] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v5] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 19/25] powerpc/pseries: Make caller pass buffer to plpks_read_var()
- From: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
- [PATCH v4 0/6] Add CA enforcement keyring restrictions
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v4 2/6] KEYS: Add missing function documentation
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v4 3/6] KEYS: X.509: Parse Basic Constraints for CA
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v4 6/6] integrity: machine keyring CA configuration
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v4 4/6] KEYS: X.509: Parse Key Usage
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v4 1/6] KEYS: Create static version of public_key_verify_signature
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v4 5/6] KEYS: CA link restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [Patch V2 2/4] tpm: tegra: Support SPI tpm wait state detect
- From: Thierry Reding <thierry.reding@xxxxxxxxx>
- [PATCH v15 19/26] ima: Namespace audit status flags
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v15 25/26] ima: Restrict informational audit messages to init_ima_ns
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v15 24/26] ima: Limit number of policy rules in non-init_ima_ns
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v15 26/26] ima: Enable IMA namespaces
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v15 17/26] integrity/ima: Define ns_status for storing namespaced iint data
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v15 22/26] ima: Introduce securityfs file to activate an IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v15 23/26] ima: Show owning user namespace's uid and gid when displaying policy
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v15 21/26] ima: Setup securityfs for IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v15 16/26] ima: Add functions for creating and freeing of an ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v15 20/26] ima: Remove unused iints from the integrity_iint_cache
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v15 18/26] integrity: Add optional callback function to integrity_inode_free()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v15 01/26] securityfs: rework dentry creation
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v15 03/26] ima: Define ima_namespace struct and start moving variables into it
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v15 11/26] ima: Define mac_admin_ns_capable() as a wrapper for ns_capable()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v15 12/26] ima: Only accept AUDIT rules for non-init_ima_ns namespaces for now
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v15 09/26] ima: Move ima_lsm_policy_notifier into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v15 14/26] ima: Implement hierarchical processing of file accesses
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v15 13/26] userns: Add pointer to ima_namespace to user_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v15 15/26] ima: Implement ima_free_policy_rules() for freeing of an ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v15 07/26] ima: Move some IMA policy and filesystem related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v15 10/26] ima: Switch to lazy lsm policy updates for better performance
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v15 05/26] ima: Move ima_htable into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v15 08/26] ima: Move IMA securityfs files into ima_namespace or onto stack
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v15 02/26] securityfs: Extend securityfs with namespacing support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v15 00/26] ima: Namespace IMA with audit support in IMA-ns
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v15 04/26] ima: Move arch_policy_entry into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v15 06/26] ima: Move measurement list related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v5] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [Patch V2 2/4] tpm: tegra: Support SPI tpm wait state detect
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [Patch V2 2/4] tpm: tegra: Support SPI tpm wait state detect
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: [regression] Bug 216989 - since 6.1 systems with AMD Ryzen stutter when fTPM is enabled
- From: "Linux kernel regression tracking (Thorsten Leemhuis)" <regressions@xxxxxxxxxxxxx>
- Re: [Patch V2 2/4] tpm: tegra: Support SPI tpm wait state detect
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [Patch V2 2/4] tpm: tegra: Support SPI tpm wait state detect
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [Patch V2 3/4] spi: dt-bindings: Add Tegra TPM wait polling flag
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- Re: [Patch V2 1/4] dt-bindings: tpm: Add compatible for Tegra TPM
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- [Patch V2 3/4] spi: dt-bindings: Add Tegra TPM wait polling flag
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V2 1/4] dt-bindings: tpm: Add compatible for Tegra TPM
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V2 2/4] tpm: tegra: Support SPI tpm wait state detect
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V2 4/4] spi: tegra210-quad: Enable TPM wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V2 0/4] Tegra TPM driver with hw flow control
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [PATCH ima-evm-utils v5] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v4] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 06/11] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: Yujie Liu <yujie.liu@xxxxxxxxx>
- Re: [PATCH ima-evm-utils v4] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/4] tpm: tegra: Support SPI tpm wait state detect
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 3/4] spi: dt-bindings: Add Tegra TPM wait polling flag
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH 1/4] dt-bindings: tpm: Add compatible for Tegra TPM
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils v4] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 4/4] spi: tegra210-quad: Enable TPM wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [PATCH 3/4] spi: dt-bindings: Add Tegra TPM wait polling flag
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [PATCH 2/4] tpm: tegra: Support SPI tpm wait state detect
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [PATCH 0/4] Tegra TPM driver with hw flow control
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [PATCH 1/4] dt-bindings: tpm: Add compatible for Tegra TPM
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils v4] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v4] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [regression] Bug 216989 - since 6.1 systems with AMD Ryzen stutter when fTPM is enabled
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 00/16] Integrity Policy Enforcement LSM (IPE)
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [regression] Bug 216989 - since 6.1 systems with AMD Ryzen stutter when fTPM is enabled
- From: "Linux kernel regression tracking (Thorsten Leemhuis)" <regressions@xxxxxxxxxxxxx>
- Re: [RFC PATCH v9 13/16] ipe: enable support for fs-verity as a trust provider
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 10/16] dm-verity: consume root hash digest and signature data via LSM hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 16/16] documentation: add ipe documentation
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 13/16] ipe: enable support for fs-verity as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 10/16] dm-verity: consume root hash digest and signature data via LSM hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 02/16] ipe: add policy parser
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 05/16] ipe: add userspace interface
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v3] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH -next] evm: Use __vfs_setxattr() to update security.evm
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [PATCH -next] evm: Use __vfs_setxattr() to update security.evm
- From: xiujianfeng <xiujianfeng@xxxxxxxxxx>
- Re: [PATCH v5 23/25] powerpc/pseries: Implement secvars for dynamic secure boot
- From: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 22/24] powerpc/pseries: Implement secvars for dynamic secure boot
- From: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
- Re: [RFC PATCH v9 00/16] Integrity Policy Enforcement LSM (IPE)
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v9 09/16] block|security: add LSM blob to block_device
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v2] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 2/2] ima: Introduce MMAP_CHECK_REQPROT hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 1/2] ima: Align ima_file_mmap() parameters with mmap_file LSM hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] Fix reading the TPM 2.0 PCRs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils] Fix reading the TPM 2.0 PCRs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] Fix reading the TPM 2.0 PCRs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 25/25] integrity/powerpc: Support loading keys from PLPKS
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC PATCH v9 07/16] uapi|audit|ipe: add ipe auditing support
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH v5 23/25] powerpc/pseries: Implement secvars for dynamic secure boot
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 22/25] powerpc/pseries: Pass PLPKS password on kexec
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 21/25] powerpc/pseries: Add helper to get PLPKS password length
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 20/25] powerpc/pseries: Turn PSERIES_PLPKS into a hidden option
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 19/25] powerpc/pseries: Make caller pass buffer to plpks_read_var()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 18/25] powerpc/pseries: Log hcall return codes for PLPKS debug
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 17/25] powerpc/pseries: Implement signed update for PLPKS objects
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 16/25] powerpc/pseries: Expose PLPKS config values, support additional fields
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 15/25] powerpc/pseries: Move PLPKS constants to header file
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v2] Introduce expect_pass_if() and expect_fail_if()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 14/25] powerpc/pseries: Move plpks.h to include directory
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 13/25] powerpc/secvar: Don't print error on ENOENT when reading variables
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 12/25] powerpc/secvar: Warn when PAGE_SIZE is smaller than max object size
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 11/25] powerpc/secvar: Allow backend to populate static list of variable names
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC PATCH v9 03/16] ipe: add evaluation loop and introduce 'boot_verified' as a trust provider
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 10/25] powerpc/secvar: Extend sysfs to include config vars
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 09/25] powerpc/secvar: Clean up init error messages
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 08/25] powerpc/secvar: Handle max object size in the consumer
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 07/25] powerpc/secvar: Handle format string in the consumer
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]