Linux Integrity
Thread Index
[
Prev Page
][
Next Page
]
Re: [PATCH] tpm: add vendor flag to command code validation
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v4 6/6] integrity: machine keyring CA configuration
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2 06/11] tpm: Add full HMAC and encrypt/decrypt session handling code
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v6 24/26] powerpc/pseries: Implement secvars for dynamic secure boot
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
Re: [PATCH v6 24/26] powerpc/pseries: Implement secvars for dynamic secure boot
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
Re: [PATCH v6 24/26] powerpc/pseries: Implement secvars for dynamic secure boot
From
: Michael Ellerman <michaele@xxxxxxxxxxx>
Re: [PATCH v6 24/26] powerpc/pseries: Implement secvars for dynamic secure boot
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
Re: [PATCH v6 21/26] powerpc/pseries: Clarify warning when PLPKS password already set
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
Re: [PATCH RFC] tpm: disable hwrng for known-defective AMD RNGs
From
: "Linux regression tracking (Thorsten Leemhuis)" <regressions@xxxxxxxxxxxxx>
Re: [RFC PATCH v9 03/16] ipe: add evaluation loop and introduce 'boot_verified' as a trust provider
From
: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v4 6/6] integrity: machine keyring CA configuration
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH v4 4/6] KEYS: X.509: Parse Key Usage
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH v4 1/6] KEYS: Create static version of public_key_verify_signature
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH v6 24/26] powerpc/pseries: Implement secvars for dynamic secure boot
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v6 24/26] powerpc/pseries: Implement secvars for dynamic secure boot
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v6 23/26] powerpc/pseries: Pass PLPKS password on kexec
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v6 05/26] powerpc/secvar: Warn and error if multiple secvar ops are set
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v6 21/26] powerpc/pseries: Clarify warning when PLPKS password already set
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH] tpm: add vendor flag to command code validation
From
: Julien Gomes <julien@xxxxxxxxxx>
Re: [PATCH ima-evm-utils] Add ima_policy_check.awk and ima_policy_check.test
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5 2/2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v2 06/11] tpm: Add full HMAC and encrypt/decrypt session handling code
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils] Add ima_policy_check.awk and ima_policy_check.test
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH v4 6/6] integrity: machine keyring CA configuration
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v6 01/26] powerpc/pseries: Fix handling of PLPKS object flushing timeout
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v6 20/26] powerpc/pseries: Turn PSERIES_PLPKS into a hidden option
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v6 17/26] powerpc/pseries: Implement signed update for PLPKS objects
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v6 25/26] integrity/powerpc: Improve error handling & reporting when loading certs
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v6 23/26] powerpc/pseries: Pass PLPKS password on kexec
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v6 15/26] powerpc/pseries: Move PLPKS constants to header file
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v6 14/26] powerpc/pseries: Move plpks.h to include directory
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v6 22/26] powerpc/pseries: Add helper to get PLPKS password length
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v6 10/26] powerpc/secvar: Extend sysfs to include config vars
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v6 26/26] integrity/powerpc: Support loading keys from PLPKS
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v6 24/26] powerpc/pseries: Implement secvars for dynamic secure boot
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v6 21/26] powerpc/pseries: Clarify warning when PLPKS password already set
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v6 19/26] powerpc/pseries: Make caller pass buffer to plpks_read_var()
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v6 16/26] powerpc/pseries: Expose PLPKS config values, support additional fields
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v6 18/26] powerpc/pseries: Log hcall return codes for PLPKS debug
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v6 11/26] powerpc/secvar: Allow backend to populate static list of variable names
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v6 13/26] powerpc/secvar: Don't print error on ENOENT when reading variables
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v6 08/26] powerpc/secvar: Handle max object size in the consumer
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v6 04/26] powerpc/secvar: Use u64 in secvar_operations
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v6 05/26] powerpc/secvar: Warn and error if multiple secvar ops are set
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v6 03/26] powerpc/secvar: Fix incorrect return in secvar_sysfs_load()
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v6 12/26] powerpc/secvar: Warn when PAGE_SIZE is smaller than max object size
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v6 02/26] powerpc/pseries: Fix alignment of PLPKS structures and buffers
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v6 07/26] powerpc/secvar: Handle format string in the consumer
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v6 09/26] powerpc/secvar: Clean up init error messages
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v6 00/26] pSeries dynamic secure boot secvar interface + platform keyring loading
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v6 06/26] powerpc/secvar: Use sysfs_emit() instead of sprintf()
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
Re: [PATCH v5 2/2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v5 2/2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v4 4/6] KEYS: X.509: Parse Key Usage
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v4 3/6] KEYS: X.509: Parse Basic Constraints for CA
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v4 2/6] KEYS: Add missing function documentation
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v4 1/6] KEYS: Create static version of public_key_verify_signature
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH RFC] tpm: disable hwrng for known-defective AMD RNGs
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH RFC] tpm: disable hwrng for known-defective AMD RNGs
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] tpm: add vendor flag to command code validation
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v15 01/26] securityfs: rework dentry creation
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v5 2/2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [RFC PATCH v9 06/16] ipe: add LSM hooks on execution and kernel read
From
: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH v9 12/16] fsverity: consume builtin signature via LSM hook
From
: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v7 2/6] ocfs2: Switch to security_inode_init_security()
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v5 2/2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH ima-evm-utils] Add ima_policy_check.awk and ima_policy_check.test
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH RFC] tpm: disable hwrng for known-defective AMD RNGs
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCH RFC] tpm: disable hwrng for known-defective AMD RNGs
From
: "Limonciello, Mario" <mario.limonciello@xxxxxxx>
[PATCH RFC] tpm: disable hwrng for known-defective AMD RNGs
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v5 2/2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [RFC PATCH v9 12/16] fsverity: consume builtin signature via LSM hook
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v4 5/6] KEYS: CA link restriction
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v4 0/6] Add CA enforcement keyring restrictions
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v4 0/6] Add CA enforcement keyring restrictions
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH v4 2/6] KEYS: Add missing function documentation
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v4 4/6] KEYS: X.509: Parse Key Usage
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v4 3/6] KEYS: X.509: Parse Basic Constraints for CA
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH] tpm: add vendor flag to command code validation
From
: Julien Gomes <julien@xxxxxxxxxx>
Re: [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [PATCH v7 2/6] ocfs2: Switch to security_inode_init_security()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH v4 0/6] Add CA enforcement keyring restrictions
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 06/11] tpm: Add full HMAC and encrypt/decrypt session handling code
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [regression] Bug 216989 - since 6.1 systems with AMD Ryzen stutter when fTPM is enabled
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2 06/11] tpm: Add full HMAC and encrypt/decrypt session handling code
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH 2/4] tpm: tegra: Support SPI tpm wait state detect
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [regression] Bug 216989 - since 6.1 systems with AMD Ryzen stutter when fTPM is enabled
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH 0/4] Tegra TPM driver with hw flow control
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [regression] Bug 216989 - since 6.1 systems with AMD Ryzen stutter when fTPM is enabled
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [regression] Bug 216989 - since 6.1 systems with AMD Ryzen stutter when fTPM is enabled
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH -next] tpm: of: fix return value check in tpm_read_log_memory_region()
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH -next] tpm: of: fix return value check in tpm_read_log_memory_region()
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH -next] tpm: of: fix return value check in tpm_read_log_memory_region()
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [RFC PATCH v9 00/16] Integrity Policy Enforcement LSM (IPE)
From
: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH v9 13/16] ipe: enable support for fs-verity as a trust provider
From
: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH v9 10/16] dm-verity: consume root hash digest and signature data via LSM hook
From
: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [regression] Bug 216989 - since 6.1 systems with AMD Ryzen stutter when fTPM is enabled
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH ima-evm-utils v5] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v5] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v5] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH v5 19/25] powerpc/pseries: Make caller pass buffer to plpks_read_var()
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v4 0/6] Add CA enforcement keyring restrictions
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v4 2/6] KEYS: Add missing function documentation
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v4 3/6] KEYS: X.509: Parse Basic Constraints for CA
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v4 6/6] integrity: machine keyring CA configuration
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v4 4/6] KEYS: X.509: Parse Key Usage
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v4 1/6] KEYS: Create static version of public_key_verify_signature
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v4 5/6] KEYS: CA link restriction
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [Patch V2 2/4] tpm: tegra: Support SPI tpm wait state detect
From
: Thierry Reding <thierry.reding@xxxxxxxxx>
[PATCH v15 19/26] ima: Namespace audit status flags
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v15 25/26] ima: Restrict informational audit messages to init_ima_ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v15 24/26] ima: Limit number of policy rules in non-init_ima_ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v15 26/26] ima: Enable IMA namespaces
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v15 17/26] integrity/ima: Define ns_status for storing namespaced iint data
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v15 22/26] ima: Introduce securityfs file to activate an IMA namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v15 23/26] ima: Show owning user namespace's uid and gid when displaying policy
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v15 21/26] ima: Setup securityfs for IMA namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v15 16/26] ima: Add functions for creating and freeing of an ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v15 20/26] ima: Remove unused iints from the integrity_iint_cache
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v15 18/26] integrity: Add optional callback function to integrity_inode_free()
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v15 01/26] securityfs: rework dentry creation
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v15 03/26] ima: Define ima_namespace struct and start moving variables into it
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v15 11/26] ima: Define mac_admin_ns_capable() as a wrapper for ns_capable()
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v15 12/26] ima: Only accept AUDIT rules for non-init_ima_ns namespaces for now
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v15 09/26] ima: Move ima_lsm_policy_notifier into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v15 14/26] ima: Implement hierarchical processing of file accesses
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v15 13/26] userns: Add pointer to ima_namespace to user_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v15 15/26] ima: Implement ima_free_policy_rules() for freeing of an ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v15 07/26] ima: Move some IMA policy and filesystem related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v15 10/26] ima: Switch to lazy lsm policy updates for better performance
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v15 05/26] ima: Move ima_htable into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v15 08/26] ima: Move IMA securityfs files into ima_namespace or onto stack
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v15 02/26] securityfs: Extend securityfs with namespacing support
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v15 00/26] ima: Namespace IMA with audit support in IMA-ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v15 04/26] ima: Move arch_policy_entry into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v15 06/26] ima: Move measurement list related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v5] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [Patch V2 2/4] tpm: tegra: Support SPI tpm wait state detect
From
: Mark Brown <broonie@xxxxxxxxxx>
Re: [Patch V2 2/4] tpm: tegra: Support SPI tpm wait state detect
From
: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
Re: [regression] Bug 216989 - since 6.1 systems with AMD Ryzen stutter when fTPM is enabled
From
: "Linux kernel regression tracking (Thorsten Leemhuis)" <regressions@xxxxxxxxxxxxx>
Re: [Patch V2 2/4] tpm: tegra: Support SPI tpm wait state detect
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [Patch V2 2/4] tpm: tegra: Support SPI tpm wait state detect
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [Patch V2 3/4] spi: dt-bindings: Add Tegra TPM wait polling flag
From
: Rob Herring <robh+dt@xxxxxxxxxx>
Re: [Patch V2 1/4] dt-bindings: tpm: Add compatible for Tegra TPM
From
: Rob Herring <robh+dt@xxxxxxxxxx>
[Patch V2 3/4] spi: dt-bindings: Add Tegra TPM wait polling flag
From
: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
[Patch V2 1/4] dt-bindings: tpm: Add compatible for Tegra TPM
From
: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
[Patch V2 2/4] tpm: tegra: Support SPI tpm wait state detect
From
: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
[Patch V2 4/4] spi: tegra210-quad: Enable TPM wait polling
From
: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
[Patch V2 0/4] Tegra TPM driver with hw flow control
From
: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
[PATCH ima-evm-utils v5] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v4] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH v2 06/11] tpm: Add full HMAC and encrypt/decrypt session handling code
From
: Yujie Liu <yujie.liu@xxxxxxxxx>
Re: [PATCH ima-evm-utils v4] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 2/4] tpm: tegra: Support SPI tpm wait state detect
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH 3/4] spi: dt-bindings: Add Tegra TPM wait polling flag
From
: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
Re: [PATCH 1/4] dt-bindings: tpm: Add compatible for Tegra TPM
From
: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
Re: [PATCH ima-evm-utils v4] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH 4/4] spi: tegra210-quad: Enable TPM wait polling
From
: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
[PATCH 3/4] spi: dt-bindings: Add Tegra TPM wait polling flag
From
: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
[PATCH 2/4] tpm: tegra: Support SPI tpm wait state detect
From
: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
[PATCH 0/4] Tegra TPM driver with hw flow control
From
: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
[PATCH 1/4] dt-bindings: tpm: Add compatible for Tegra TPM
From
: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
Re: [PATCH ima-evm-utils v4] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH ima-evm-utils v4] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [regression] Bug 216989 - since 6.1 systems with AMD Ryzen stutter when fTPM is enabled
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH v9 00/16] Integrity Policy Enforcement LSM (IPE)
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[regression] Bug 216989 - since 6.1 systems with AMD Ryzen stutter when fTPM is enabled
From
: "Linux kernel regression tracking (Thorsten Leemhuis)" <regressions@xxxxxxxxxxxxx>
Re: [RFC PATCH v9 13/16] ipe: enable support for fs-verity as a trust provider
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [RFC PATCH v9 10/16] dm-verity: consume root hash digest and signature data via LSM hook
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [RFC PATCH v9 16/16] documentation: add ipe documentation
From
: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH v9 13/16] ipe: enable support for fs-verity as a trust provider
From
: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH v9 10/16] dm-verity: consume root hash digest and signature data via LSM hook
From
: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH v9 02/16] ipe: add policy parser
From
: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH v9 05/16] ipe: add userspace interface
From
: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v2] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH ima-evm-utils v3] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v2] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v2] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v2] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v2] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH -next] evm: Use __vfs_setxattr() to update security.evm
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
Re: [PATCH -next] evm: Use __vfs_setxattr() to update security.evm
From
: xiujianfeng <xiujianfeng@xxxxxxxxxx>
Re: [PATCH v5 23/25] powerpc/pseries: Implement secvars for dynamic secure boot
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v2] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v4 22/24] powerpc/pseries: Implement secvars for dynamic secure boot
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
Re: [RFC PATCH v9 00/16] Integrity Policy Enforcement LSM (IPE)
From
: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v2] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [RFC PATCH v9 09/16] block|security: add LSM blob to block_device
From
: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v2] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH ima-evm-utils v2] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH v4 2/2] ima: Introduce MMAP_CHECK_REQPROT hook
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH v4 1/2] ima: Align ima_file_mmap() parameters with mmap_file LSM hook
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH] Fix reading the TPM 2.0 PCRs
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH ima-evm-utils] Fix reading the TPM 2.0 PCRs
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH] Fix reading the TPM 2.0 PCRs
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5 25/25] integrity/powerpc: Support loading keys from PLPKS
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [RFC PATCH v9 07/16] uapi|audit|ipe: add ipe auditing support
From
: Steve Grubb <sgrubb@xxxxxxxxxx>
Re: [PATCH v5 23/25] powerpc/pseries: Implement secvars for dynamic secure boot
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v5 22/25] powerpc/pseries: Pass PLPKS password on kexec
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v5 21/25] powerpc/pseries: Add helper to get PLPKS password length
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v5 20/25] powerpc/pseries: Turn PSERIES_PLPKS into a hidden option
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v5 19/25] powerpc/pseries: Make caller pass buffer to plpks_read_var()
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v5 18/25] powerpc/pseries: Log hcall return codes for PLPKS debug
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v5 17/25] powerpc/pseries: Implement signed update for PLPKS objects
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v5 16/25] powerpc/pseries: Expose PLPKS config values, support additional fields
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v5 15/25] powerpc/pseries: Move PLPKS constants to header file
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH ima-evm-utils v2] Introduce expect_pass_if() and expect_fail_if()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH v5 14/25] powerpc/pseries: Move plpks.h to include directory
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v5 13/25] powerpc/secvar: Don't print error on ENOENT when reading variables
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v5 12/25] powerpc/secvar: Warn when PAGE_SIZE is smaller than max object size
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v5 11/25] powerpc/secvar: Allow backend to populate static list of variable names
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [RFC PATCH v9 03/16] ipe: add evaluation loop and introduce 'boot_verified' as a trust provider
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH v5 10/25] powerpc/secvar: Extend sysfs to include config vars
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v5 09/25] powerpc/secvar: Clean up init error messages
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v5 08/25] powerpc/secvar: Handle max object size in the consumer
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v5 07/25] powerpc/secvar: Handle format string in the consumer
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils] Introduce expect_pass_if() and expect_fail_if()
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5 06/25] powerpc/secvar: Use sysfs_emit() instead of sprintf()
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v5 03/25] powerpc/secvar: Fix incorrect return in secvar_sysfs_load()
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v5 05/25] powerpc/secvar: Warn and error if multiple secvar ops are set
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [RFC PATCH v9 00/16] Integrity Policy Enforcement LSM (IPE)
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [RFC PATCH v9 13/16] ipe: enable support for fs-verity as a trust provider
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [RFC PATCH v9 10/16] dm-verity: consume root hash digest and signature data via LSM hook
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [RFC PATCH v9 07/16] uapi|audit|ipe: add ipe auditing support
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [RFC PATCH v9 06/16] ipe: add LSM hooks on execution and kernel read
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH -next] evm: Use __vfs_setxattr() to update security.evm
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [RFC PATCH v9 02/16] ipe: add policy parser
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [RFC PATCH v9 05/16] ipe: add userspace interface
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [RFC PATCH v9 03/16] ipe: add evaluation loop and introduce 'boot_verified' as a trust provider
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils] Introduce expect_pass_if() and expect_fail_if()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH v4 22/24] powerpc/pseries: Implement secvars for dynamic secure boot
From
: "Nicholas Piggin" <npiggin@xxxxxxxxx>
Re: [RFC PATCH v9 09/16] block|security: add LSM blob to block_device
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
[PATCH v5 05/25] powerpc/secvar: Warn and error if multiple secvar ops are set
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v5 12/25] powerpc/secvar: Warn when PAGE_SIZE is smaller than max object size
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v5 08/25] powerpc/secvar: Handle max object size in the consumer
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v5 19/25] powerpc/pseries: Make caller pass buffer to plpks_read_var()
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v5 07/25] powerpc/secvar: Handle format string in the consumer
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v5 11/25] powerpc/secvar: Allow backend to populate static list of variable names
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v5 16/25] powerpc/pseries: Expose PLPKS config values, support additional fields
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v5 25/25] integrity/powerpc: Support loading keys from PLPKS
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v5 22/25] powerpc/pseries: Pass PLPKS password on kexec
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v5 15/25] powerpc/pseries: Move PLPKS constants to header file
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v5 17/25] powerpc/pseries: Implement signed update for PLPKS objects
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v5 18/25] powerpc/pseries: Log hcall return codes for PLPKS debug
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v5 06/25] powerpc/secvar: Use sysfs_emit() instead of sprintf()
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v5 00/25] pSeries dynamic secure boot secvar interface + platform keyring loading
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v5 02/25] powerpc/pseries: Fix alignment of PLPKS structures and buffers
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v5 14/25] powerpc/pseries: Move plpks.h to include directory
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v5 13/25] powerpc/secvar: Don't print error on ENOENT when reading variables
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v5 20/25] powerpc/pseries: Turn PSERIES_PLPKS into a hidden option
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v5 10/25] powerpc/secvar: Extend sysfs to include config vars
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v5 23/25] powerpc/pseries: Implement secvars for dynamic secure boot
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v5 04/25] powerpc/secvar: Use u64 in secvar_operations
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v5 21/25] powerpc/pseries: Add helper to get PLPKS password length
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v5 09/25] powerpc/secvar: Clean up init error messages
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v5 01/25] powerpc/pseries: Fix handling of PLPKS object flushing timeout
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v5 24/25] integrity/powerpc: Improve error handling & reporting when loading certs
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v5 03/25] powerpc/secvar: Fix incorrect return in secvar_sysfs_load()
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
Re: [PATCH v4 22/24] powerpc/pseries: Implement secvars for dynamic secure boot
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
Re: [PATCH v4 16/24] powerpc/pseries: Implement signed update for PLPKS objects
From
: Russell Currey <ruscur@xxxxxxxxxx>
Re: [RFC PATCH v9 16/16] documentation: add ipe documentation
From
: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
Re: [PATCH v4 22/24] powerpc/pseries: Implement secvars for dynamic secure boot
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
Re: [PATCH v4 21/24] powerpc/pseries: Pass PLPKS password on kexec
From
: Russell Currey <ruscur@xxxxxxxxxx>
Re: [PATCH -next] evm: call dump_security_xattr() in all cases to remove code duplication
From
: xiujianfeng <xiujianfeng@xxxxxxxxxx>
Re: [PATCH -next] evm: call dump_security_xattr() in all cases to remove code duplication
From
: xiujianfeng <xiujianfeng@xxxxxxxxxx>
[PATCH -next] evm: call dump_security_xattr() in all cases to remove code duplication
From
: Xiu Jianfeng <xiujianfeng@xxxxxxxxxx>
Re: [PATCH v4 24/24] integrity/powerpc: Support loading keys from pseries secvar
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[RFC PATCH v9 10/16] dm-verity: consume root hash digest and signature data via LSM hook
From
: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
[RFC PATCH v9 05/16] ipe: add userspace interface
From
: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
[RFC PATCH v9 08/16] ipe: add permissive toggle
From
: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
[RFC PATCH v9 07/16] uapi|audit|ipe: add ipe auditing support
From
: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
[RFC PATCH v9 03/16] ipe: add evaluation loop and introduce 'boot_verified' as a trust provider
From
: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
[RFC PATCH v9 11/16] ipe: add support for dm-verity as a trust provider
From
: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
[RFC PATCH v9 12/16] fsverity: consume builtin signature via LSM hook
From
: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
[RFC PATCH v9 06/16] ipe: add LSM hooks on execution and kernel read
From
: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
[RFC PATCH v9 16/16] documentation: add ipe documentation
From
: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
[RFC PATCH v9 02/16] ipe: add policy parser
From
: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
[RFC PATCH v9 13/16] ipe: enable support for fs-verity as a trust provider
From
: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
[RFC PATCH v9 15/16] ipe: kunit test for parser
From
: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
[RFC PATCH v9 14/16] scripts: add boot policy generation program
From
: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
[RFC PATCH v9 09/16] block|security: add LSM blob to block_device
From
: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
[RFC PATCH v9 00/16] Integrity Policy Enforcement LSM (IPE)
From
: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
[RFC PATCH v9 04/16] security: add new securityfs delete function
From
: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
[RFC PATCH v9 01/16] security: add ipe lsm
From
: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH -next] evm: call dump_security_xattr() in all cases to remove code duplication
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH -next v2] tpm: of: fix return value check in tpm_read_log_memory_region()
From
: Yang Yingliang <yangyingliang@xxxxxxxxxx>
Re: [PATCH v3 2/2] ima: Introduce MMAP_CHECK_REQPROT hook
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH -next] evm: call dump_security_xattr() in all cases to remove code duplication
From
: xiujianfeng <xiujianfeng@xxxxxxxxxx>
Re: [PATCH v4 16/24] powerpc/pseries: Implement signed update for PLPKS objects
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
Re: [PATCH -next] evm: Use __vfs_setxattr() to update security.evm
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
Re: [PATCH -next] evm: call dump_security_xattr() in all cases to remove code duplication
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 2/2] ima: Introduce MMAP_CHECK_REQPROT hook
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 09/11] KEYS: trusted: Add session encryption protection to the seal/unseal path
From
: Ben Boeckel <me@xxxxxxxxxxxxxx>
[PATCH -next] tpm: of: fix return value check in tpm_read_log_memory_region()
From
: Yang Yingliang <yangyingliang@xxxxxxxxxx>
[PATCH -next] evm: call dump_security_xattr() in all cases to remove code duplication
From
: Xiu Jianfeng <xiujianfeng@xxxxxxxxxx>
Re: [PATCH v4 02/24] powerpc/pseries: Fix alignment of PLPKS structures and buffers
From
: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
Re: [PATCH v4 02/24] powerpc/pseries: Fix alignment of PLPKS structures and buffers
From
: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
RE: [PATCH v4 02/24] powerpc/pseries: Fix alignment of PLPKS structures and buffers
From
: David Laight <David.Laight@xxxxxxxxxx>
Re: [PATCH v5 2/2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[RFC PATCH v1 2/3] ima: ascii_vpcr pseudo-file for sysadmins
From
: Ilya Hanov <ilya.hanov@xxxxxxxxxxxxxxxxxxx>
[RFC PATCH v1 3/3] ima: Use TPM RNG for vPCR.secret if it's presented.
From
: Ilya Hanov <ilya.hanov@xxxxxxxxxxxxxxxxxxx>
[RFC PATCH v1 0/3] ima: vPCR debug/security
From
: Ilya Hanov <ilya.hanov@xxxxxxxxxxxxxxxxxxx>
[RFC PATCH v1 1/3] ima: Add a UUID value for each vPCR
From
: Ilya Hanov <ilya.hanov@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH v3 1/2] ima: Align ima_file_mmap() parameters with mmap_file LSM hook
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH v4 02/24] powerpc/pseries: Fix alignment of PLPKS structures and buffers
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [PATCH v3 2/2] tpm: Add reserved memory event log
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3 2/2] tpm: Add reserved memory event log
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[PATCH v3 1/2] tpm: Use managed allocation for bios event log
From
: Eddie James <eajames@xxxxxxxxxxxxx>
[PATCH v3 2/2] tpm: Add reserved memory event log
From
: Eddie James <eajames@xxxxxxxxxxxxx>
[PATCH v3 0/2] tpm: Add reserved memory event log
From
: Eddie James <eajames@xxxxxxxxxxxxx>
Re: [PATCH v3 1/2] ima: Align ima_file_mmap() parameters with mmap_file LSM hook
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
RE: [PATCH v4 02/24] powerpc/pseries: Fix alignment of PLPKS structures and buffers
From
: David Laight <David.Laight@xxxxxxxxxx>
Re: [PATCH v2 1/2] tpm: Use managed allocation for bios event log
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v4 02/24] powerpc/pseries: Fix alignment of PLPKS structures and buffers
From
: Segher Boessenkool <segher@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[PATCH v3 2/2] ima: Introduce MMAP_CHECK_REQPROT hook
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH v3 1/2] ima: Align ima_file_mmap() parameters with mmap_file LSM hook
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v4 05/11] Add support for creating a new testing environment in functions.sh
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v4 02/11] Add kernel configuration for tests
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH ima-evm-utils v4 09/11] Use in-place built fsverity binary instead of installing it
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v4 11/11] Temporarily remove CONFIG_DEBUG_SG to test portable signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v4 10/11] ci: haveged requires EPEL on CentOS stream:8
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v4 08/11] Adapt fsverity.test to be able to run in a new testing environment
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v4 07/11] Add tests for EVM portable signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v4 06/11] Introduce TST_LIST variable to select a test to execute
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v4 05/11] Add support for creating a new testing environment in functions.sh
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v4 04/11] Pass cleanup function and its arguments to _report_exit_and_cleanup()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v4 03/11] Compile the UML kernel and download it in Github Actions
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v4 02/11] Add kernel configuration for tests
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v4 01/11] Fix error messages and vars in calc_evm_hmac()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v4 00/11] Support testing in new enviroments
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v3 03/11] Compile the UML kernel and download it in Github Actions
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v3 07/11] Add tests for EVM portable signatures
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils] ci: cleanup build.sh test log output
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH ima-evm-utils v3 08/11] Adapt fsverity.test to be able to run in a new testing environment
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils] Experimental fsverity.test related GA CI improvements
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH ima-evm-utils] ci: cleanup build.sh test log output
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[ima-evm-utils PATCH] tests: use new git repo URL for fsverity-utils
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH ima-evm-utils v3 03/11] Compile the UML kernel and download it in Github Actions
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 1/2] tpm: Use managed allocation for bios event log
From
: Eddie James <eajames@xxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v3 06/11] Introduce TST_LIST variable to select a test to execute
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v2 01/11] tpm: move buffer handling from static inlines to real functions
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v3 04/11] Pass cleanup function and its arguments to _report_exit_and_cleanup()
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v3 05/11] Add support for creating a new testing environment in functions.sh
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH v4 02/24] powerpc/pseries: Fix alignment of PLPKS structures and buffers
From
: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
Re: [PATCH v2 06/11] tpm: Add full HMAC and encrypt/decrypt session handling code
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v3 11/11] Temporarily remove CONFIG_DEBUG_SG to test portable signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v3 10/11] ci: haveged requires EPEL on CentOS stream:8
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v3 09/11] Use in-place built fsverity binary instead of installing it
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v3 07/11] Add tests for EVM portable signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v3 08/11] Adapt fsverity.test to be able to run in a new testing environment
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v3 06/11] Introduce TST_LIST variable to select a test to execute
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v3 05/11] Add support for creating a new testing environment in functions.sh
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v3 04/11] Pass cleanup function and its arguments to _report_exit_and_cleanup()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v3 03/11] Compile the UML kernel and download it in Github Actions
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v3 01/11] Fix error messages and vars in calc_evm_hmac()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v3 02/11] Add config for UML kernel
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v3 00/11] Support testing in new enviroments
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH v2 06/11] tpm: Add full HMAC and encrypt/decrypt session handling code
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v4 21/24] powerpc/pseries: Pass PLPKS password on kexec
From
: Michael Ellerman <michaele@xxxxxxxxxxx>
Re: [PATCH v4 24/24] integrity/powerpc: Support loading keys from pseries secvar
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v4 24/24] integrity/powerpc: Support loading keys from pseries secvar
From
: Russell Currey <ruscur@xxxxxxxxxx>
Re: [PATCH v4 24/24] integrity/powerpc: Support loading keys from pseries secvar
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
Re: [PATCH v2 06/11] tpm: Add full HMAC and encrypt/decrypt session handling code
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v2 06/11] tpm: Add full HMAC and encrypt/decrypt session handling code
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v2 01/11] tpm: move buffer handling from static inlines to real functions
From
: kernel test robot <lkp@xxxxxxxxx>
[PATCH v2 11/11] Documentation: add tpm-security.rst
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v2 10/11] tpm: add the null key name as a sysfs export
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v2 09/11] KEYS: trusted: Add session encryption protection to the seal/unseal path
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v2 08/11] tpm: add session encryption protection to tpm2_get_random()
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v2 07/11] tpm: add hmac checks to tpm2_pcr_extend()
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v2 06/11] tpm: Add full HMAC and encrypt/decrypt session handling code
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v2 05/11] tpm: export the context save and load commands
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v2 04/11] tpm: add buffer function to point to returned parameters
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v2 03/11] tpm: add cursor based buffer functions for response parsing
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v2 02/11] tpm: add buffer handling for TPM2B types
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v2 01/11] tpm: move buffer handling from static inlines to real functions
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v2 00/11] add integrity and security to TPM2 transactions
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v4 23/24] integrity/powerpc: Improve error handling & reporting when loading certs
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v4 24/24] integrity/powerpc: Support loading keys from pseries secvar
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
From
: "Dr. Greg" <greg@xxxxxxxxxxxx>
Re: [PATCH v4 24/24] integrity/powerpc: Support loading keys from pseries secvar
From
: "Nicholas Piggin" <npiggin@xxxxxxxxx>
Re: [PATCH v4 22/24] powerpc/pseries: Implement secvars for dynamic secure boot
From
: "Nicholas Piggin" <npiggin@xxxxxxxxx>
Re: [PATCH v4 21/24] powerpc/pseries: Pass PLPKS password on kexec
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
Re: [PATCH v4 21/24] powerpc/pseries: Pass PLPKS password on kexec
From
: "Nicholas Piggin" <npiggin@xxxxxxxxx>
Re: [PATCH v4 19/24] powerpc/pseries: Turn PSERIES_PLPKS into a hidden option
From
: "Nicholas Piggin" <npiggin@xxxxxxxxx>
Re: [PATCH v4 16/24] powerpc/pseries: Implement signed update for PLPKS objects
From
: "Nicholas Piggin" <npiggin@xxxxxxxxx>
Re: [PATCH v2] security: Restore passing final prot to ima_file_mmap()
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [PATCH ima-evm-utils v2 6/9] Add tests for EVM portable signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v2 6/9] Add tests for EVM portable signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v2 6/9] Add tests for EVM portable signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v2 6/9] Add tests for EVM portable signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2] security: Restore passing final prot to ima_file_mmap()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH] ima: fix error handling logic when file measurement failed
From
: Matt Bobrowski <mattbobrowski@xxxxxxxxxx>
Re: [PATCH] ima: fix error handling logic when file measurement failed
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] ima: return IMA digest value only when IMA_COLLECTED flag is set
From
: Matt Bobrowski <mattbobrowski@xxxxxxxxxx>
Re: [PATCH] ima: fix error handling logic when file measurement failed
From
: Matt Bobrowski <mattbobrowski@xxxxxxxxxx>
Re: [PATCH v2] security: Restore passing final prot to ima_file_mmap()
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 2/2] tpm: Add reserved memory event log
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[ANNOUNCE] Linux Security Summit North Americ (LSS-NA) CfP
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH v2 2/2] tpm: Add reserved memory event log
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2 1/2] tpm: Use managed allocation for bios event log
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2] tpm: Allow system suspend to continue when TPM suspend fails
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2] tpm: Allow system suspend to continue when TPM suspend fails
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH 001/606] tpm: st33zp24: Convert to Convert to i2c's .probe_new()
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2] security: Restore passing final prot to ima_file_mmap()
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH] public_key: Add a comment to public_key_signature struct definition
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH] public_key: Add a comment to public_key_signature struct definition
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH] public_key: Add a comment to public_key_signature struct definition
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v5 1/2] lib/mpi: Fix buffer overrun when SG is too long
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH v4 07/24] powerpc/secvar: Handle max object size in the consumer
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v4 12/24] powerpc/secvar: Don't print error on ENOENT when reading variables
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v4 18/24] powerpc/pseries: Make caller pass buffer to plpks_read_var()
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v4 23/24] integrity/powerpc: Improve error handling & reporting when loading certs
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v4 13/24] powerpc/pseries: Move plpks.h to include directory
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v4 11/24] powerpc/secvar: Warn when PAGE_SIZE is smaller than max object size
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v4 09/24] powerpc/secvar: Extend sysfs to include config vars
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v4 24/24] integrity/powerpc: Support loading keys from pseries secvar
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v4 21/24] powerpc/pseries: Pass PLPKS password on kexec
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v4 17/24] powerpc/pseries: Log hcall return codes for PLPKS debug
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v4 22/24] powerpc/pseries: Implement secvars for dynamic secure boot
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v4 06/24] powerpc/secvar: Handle format string in the consumer
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v4 05/24] powerpc/secvar: Use sysfs_emit() instead of sprintf()
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v4 16/24] powerpc/pseries: Implement signed update for PLPKS objects
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v4 00/24] pSeries dynamic secure boot secvar interface + platform keyring loading
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v4 14/24] powerpc/pseries: Move PLPKS constants to header file
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v4 10/24] powerpc/secvar: Allow backend to populate static list of variable names
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v4 20/24] powerpc/pseries: Add helpers to get PLPKS password
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v4 08/24] powerpc/secvar: Clean up init error messages
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v4 15/24] powerpc/pseries: Expose PLPKS config values, support additional fields
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v4 19/24] powerpc/pseries: Turn PSERIES_PLPKS into a hidden option
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v4 01/24] powerpc/pseries: Fix handling of PLPKS object flushing timeout
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v4 03/24] powerpc/secvar: Use u64 in secvar_operations
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v4 02/24] powerpc/pseries: Fix alignment of PLPKS structures and buffers
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v4 04/24] powerpc/secvar: Warn and error if multiple secvar ops are set
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
Re: [PATCH v3 08/24] powerpc/secvar: Allow backend to populate static list of variable names
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
Re: [PATCH v3 04/24] powerpc/secvar: Handle format string in the consumer
From
: Russell Currey <ruscur@xxxxxxxxxx>
Re: [PATCH v3 05/24] powerpc/secvar: Handle max object size in the consumer
From
: Greg Joyce <gjoyce@xxxxxxxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v2 8/9] Use in-place built fsverity binary instead of installing it
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 04/24] powerpc/secvar: Handle format string in the consumer
From
: "Nicholas Piggin" <npiggin@xxxxxxxxx>
Re: [PATCH v3 13/24] powerpc/pseries: Fix handling of PLPKS object flushing timeout
From
: "Nicholas Piggin" <npiggin@xxxxxxxxx>
Re: [PATCH v3 16/24] powerpc/pseries: Implement signed update for PLPKS objects
From
: "Nicholas Piggin" <npiggin@xxxxxxxxx>
Re: [PATCH v3 08/24] powerpc/secvar: Allow backend to populate static list of variable names
From
: "Nicholas Piggin" <npiggin@xxxxxxxxx>
Re: [PATCH v3 04/24] powerpc/secvar: Handle format string in the consumer
From
: "Nicholas Piggin" <npiggin@xxxxxxxxx>
Re: [PATCH v3 02/24] powerpc/secvar: WARN_ON_ONCE() if multiple secvar ops are set
From
: "Nicholas Piggin" <npiggin@xxxxxxxxx>
Re: [PATCH -next] evm: Use __vfs_setxattr() to update security.evm
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH -next] evm: Support small xattr in dump_security_xattr()
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 2/2] tpm: Add reserved memory event log
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v2 2/2] tpm: Add reserved memory event log
From
: Eddie James <eajames@xxxxxxxxxxxxx>
Re: [PATCH v2 2/2] tpm: Add reserved memory event log
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v3 22/24] powerpc/pseries: Implement secvars for dynamic secure boot
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v3 21/24] powerpc/pseries: Pass PLPKS password on kexec
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v3 21/24] powerpc/pseries: Pass PLPKS password on kexec
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v3 07/24] powerpc/secvar: Extend sysfs to include config vars
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v3 23/24] integrity/powerpc: Improve error handling & reporting when loading certs
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v3 00/24] pSeries dynamic secure boot secvar interface + platform keyring loading
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v3 13/24] powerpc/pseries: Fix handling of PLPKS object flushing timeout
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v3 08/24] powerpc/secvar: Allow backend to populate static list of variable names
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v3 01/24] powerpc/secvar: Use u64 in secvar_operations
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v3 03/24] powerpc/secvar: Use sysfs_emit() instead of sprintf()
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v3 02/24] powerpc/secvar: WARN_ON_ONCE() if multiple secvar ops are set
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v3 06/24] powerpc/secvar: Clean up init error messages
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v3 04/24] powerpc/secvar: Handle format string in the consumer
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v3 11/24] powerpc/pseries: Move plpks.h to include directory
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v3 16/24] powerpc/pseries: Implement signed update for PLPKS objects
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v3 05/24] powerpc/secvar: Handle max object size in the consumer
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v3 09/24] powerpc/secvar: Warn when PAGE_SIZE is smaller than max object size
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v3 22/24] powerpc/pseries: Implement secvars for dynamic secure boot
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v3 14/24] powerpc/pseries: Fix alignment of PLPKS structures and buffers
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v3 10/24] powerpc/secvar: Don't print error on ENOENT when reading variables
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v3 24/24] integrity/powerpc: Support loading keys from pseries secvar
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v3 20/24] powerpc/pseries: Add helpers to get PLPKS password
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v3 17/24] powerpc/pseries: Log hcall return codes for PLPKS debug
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v3 12/24] powerpc/pseries: Move PLPKS constants to header file
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v3 15/24] powerpc/pseries: Expose PLPKS config values, support additional fields
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v3 18/24] powerpc/pseries: Make caller pass buffer to plpks_read_var()
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v3 19/24] powerpc/pseries: Turn PSERIES_PLPKS into a hidden option
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [PATCH] tpm: Add reserved memory event log
From
: Eddie James <eajames@xxxxxxxxxxxxx>
Re: [PATCH v2] tpm: Allow system suspend to continue when TPM suspend fails
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v2] tpm: Allow system suspend to continue when TPM suspend fails
From
: Vlastimil Babka <vbabka@xxxxxxx>
Re: [PATCH v2] tpm: Allow system suspend to continue when TPM suspend fails
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v5 1/2] lib/mpi: Fix buffer overrun when SG is too long
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v5 1/2] lib/mpi: Fix buffer overrun when SG is too long
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH v2] tpm: Allow system suspend to continue when TPM suspend fails
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] tpm: Add reserved memory event log
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH V2] tpm_crb: Add support for CRB devices based on Pluton
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
From
: Matthew Garrett <mgarrett@xxxxxxxxxxx>
Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
[PATCH v2 1/2] tpm: Use managed allocation for bios event log
From
: Eddie James <eajames@xxxxxxxxxxxxx>
[PATCH v2 2/2] tpm: Add reserved memory event log
From
: Eddie James <eajames@xxxxxxxxxxxxx>
[PATCH v2 0/2] tpm: Add reserved memory event log
From
: Eddie James <eajames@xxxxxxxxxxxxx>
Re: [PATCH v2] security: Restore passing final prot to ima_file_mmap()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH v7 0/6] evm: Do HMAC of multiple per LSM xattrs for new inodes
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH v2] security: Restore passing final prot to ima_file_mmap()
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v7 2/6] ocfs2: Switch to security_inode_init_security()
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v7 0/6] evm: Do HMAC of multiple per LSM xattrs for new inodes
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v2 8/9] Use in-place built fsverity binary instead of installing it
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v2 8/9] Use in-place built fsverity binary instead of installing it
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v2 8/9] Use in-place built fsverity binary instead of installing it
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v2 8/9] Use in-place built fsverity binary instead of installing it
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v2 9/9] ci: haveged requires EPEL on CentOS stream:8
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v2 6/9] Add tests for EVM portable signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v2 5/9] Introduce TST_LIST variable to select a test to execute
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v2 6/9] Add tests for EVM portable signatures
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v2 4/9] Add support for UML in functions.sh
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v2 4/9] Add support for UML in functions.sh
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v2 0/9] Support testing with UML kernel
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v2 2/9] Add config for UML kernel
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v2 1/9] Fix error messages and mdlen init in calc_evm_hmac()
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v2] security: Restore passing final prot to ima_file_mmap()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v2 9/9] ci: haveged requires EPEL on CentOS stream:8
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v2 8/9] Use in-place built fsverity binary instead of installing it
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v2 7/9] Adapt fsverity.test to work with UML kernel
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v2 6/9] Add tests for EVM portable signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v2 4/9] Add support for UML in functions.sh
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v2 3/9] Compile the UML kernel and download it in Github Actions
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v2 5/9] Introduce TST_LIST variable to select a test to execute
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v2 2/9] Add config for UML kernel
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v2 1/9] Fix error messages and mdlen init in calc_evm_hmac()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v2 0/9] Support testing with UML kernel
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: Seal/Unseal trusted keys against PCR policy
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] security: Restore passing final prot to ima_file_mmap()
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: Seal/Unseal trusted keys against PCR policy
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: Seal/Unseal trusted keys against PCR policy
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: Seal/Unseal trusted keys against PCR policy
From
: Sughosh Ganu <sughosh.ganu@xxxxxxxxxx>
Re: [PATCH v2] security: Restore passing final prot to ima_file_mmap()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
From
: Vlastimil Babka <vbabka@xxxxxxx>
Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [PATCH ima-evm-utils 3/8] Compile the UML kernel and download it in Github Actions
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils 3/8] Compile the UML kernel and download it in Github Actions
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v6 0/3] ima: Fix IMA mishandling of LSM based rule during
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v7 0/3] ima: Fix IMA mishandling of LSM based rule during
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v7 2/6] ocfs2: Switch to security_inode_init_security()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH v7 0/3] ima: Fix IMA mishandling of LSM based rule during
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
[PATCH ima-evm-utils 8/8] Use in-place built fsverity binary instead of installing it
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils 4/8] Add support for UML in functions.sh
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils 7/8] Adapt fsverity.test to work with UML kernel
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils 2/8] Add config for UML kernel
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils 1/8] Fix error messages and mdlen init in calc_evm_hmac()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils 0/8] Support testing with UML kernel
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils 6/8] Add tests for EVM portable signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils 3/8] Compile the UML kernel and download it in Github Actions
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils 5/8] Introduce TST_LIST variable to select a test to execute
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v2] tpm: Allow system suspend to continue when TPM suspend fails
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH] libimaevm: do not crash if the certificate cannot be read
From
: Alberto Mardegan <a.mardegan@xxxxxx>
Re: Seal/Unseal trusted keys against PCR policy
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: Seal/Unseal trusted keys against PCR policy
From
: Ken Goldman <kgold@xxxxxxxxxxxxx>
Re: Seal/Unseal trusted keys against PCR policy
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] tpm: Allow system suspend to continue when TPM suspend fails
From
: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
Re: Seal/Unseal trusted keys against PCR policy
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: Seal/Unseal trusted keys against PCR policy
From
: Ken Goldman <kgold@xxxxxxxxxxxxx>
Re: [PATCH] ima: fix ima_delete_rules() kernel-doc warning
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH] KEYS: trusted: tpm2: use correct function name in kernel-doc
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v2] security: Restore passing final prot to ima_file_mmap()
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v2] tpm: Allow system suspend to continue when TPM suspend fails
From
: Luigi Semenzato <semenzato@xxxxxxxxxxxx>
Re: [PATCH v2] tpm: Allow system suspend to continue when TPM suspend fails
From
: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 001/606] tpm: st33zp24: Convert to Convert to i2c's .probe_new()
From
: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
Re: [PATCH v2] tpm: Allow system suspend to continue when TPM suspend fails
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v2] tpm: Allow system suspend to continue when TPM suspend fails
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v5 1/2] lib/mpi: Fix buffer overrun when SG is too long
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[PATCH v2] tpm: Allow system suspend to continue when TPM suspend fails
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH v7 3/3] ima: Handle -ESTALE returned by ima_filter_rule_match()
From
: GUO Zihua <guozihua@xxxxxxxxxx>
[PATCH v7 1/3] LSM: switch to blocking policy update notifiers
From
: GUO Zihua <guozihua@xxxxxxxxxx>
[PATCH v7 0/3] ima: Fix IMA mishandling of LSM based rule during
From
: GUO Zihua <guozihua@xxxxxxxxxx>
[PATCH v7 2/3] ima: use the lsm policy update notifier
From
: GUO Zihua <guozihua@xxxxxxxxxx>
Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] tpm: Disable hwrng for TPM 1 if PM_SLEEP is enabled
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH] tpm: Disable hwrng for TPM 1 if PM_SLEEP is enabled
From
: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v6 2/3] ima: use the lsm policy update notifier
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH] tpm: Disable hwrng for TPM 1 if PM_SLEEP is enabled
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH] tpm: Disable hwrng for TPM 1 if PM_SLEEP is enabled
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
From
: Vlastimil Babka <vbabka@xxxxxxx>
Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
From
: Thorsten Leemhuis <regressions@xxxxxxxxxxxxx>
Re: [PATCH v6 0/3] ima: Fix IMA mishandling of LSM based rule during
From
: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
[PATCH v6 2/3] ima: use the lsm policy update notifier
From
: GUO Zihua <guozihua@xxxxxxxxxx>
[PATCH v6 3/3] ima: Handle -ESTALE returned by ima_filter_rule_match()
From
: GUO Zihua <guozihua@xxxxxxxxxx>
[PATCH v6 1/3] LSM: switch to blocking policy update notifiers
From
: GUO Zihua <guozihua@xxxxxxxxxx>
[PATCH v6 0/3] ima: Fix IMA mishandling of LSM based rule during
From
: GUO Zihua <guozihua@xxxxxxxxxx>
[PATCH v5 3/3] ima: Handle -ESTALE returned by ima_filter_rule_match()
From
: GUO Zihua <guozihua@xxxxxxxxxx>
[PATCH v5 2/3] ima: use the lsm policy update notifier
From
: GUO Zihua <guozihua@xxxxxxxxxx>
[PATCH v5 1/3] LSM: switch to blocking policy update notifiers
From
: GUO Zihua <guozihua@xxxxxxxxxx>
[PATCH v5 0/3] ima: Fix IMA mishandling of LSM based rule during
From
: GUO Zihua <guozihua@xxxxxxxxxx>
Re: [PATCH v4 0/3] ima: Fix IMA mishandling of LSM based rule during
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
Re: [PATCH v3 03/10] KEYS: X.509: Parse Basic Constraints for CA
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 04/10] KEYS: X.509: Parse Key Usage
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH v3 03/10] KEYS: X.509: Parse Basic Constraints for CA
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: Stable backport request
From
: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 03/10] KEYS: X.509: Parse Basic Constraints for CA
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3 09/10] KEYS: CA link restriction
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3 09/10] KEYS: CA link restriction
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3 05/10] KEYS: Introduce a CA endorsed flag
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3 04/10] KEYS: X.509: Parse Key Usage
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3 03/10] KEYS: X.509: Parse Basic Constraints for CA
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3 02/10] KEYS: Add missing function documentation
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3 01/10] KEYS: Create static version of public_key_verify_signature
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
From
: Johannes Altmanninger <aclopte@xxxxxxxxx>
[PATCH v4 3/3] ima: Handle -ESTALE returned by ima_filter_rule_match()
From
: GUO Zihua <guozihua@xxxxxxxxxx>
[PATCH v4 2/3] ima: use the lsm policy update notifier
From
: GUO Zihua <guozihua@xxxxxxxxxx>
[PATCH v4 1/3] LSM: switch to blocking policy update notifiers
From
: GUO Zihua <guozihua@xxxxxxxxxx>
[PATCH v4 0/3] ima: Fix IMA mishandling of LSM based rule during
From
: GUO Zihua <guozihua@xxxxxxxxxx>
[PATCH v3 3/3] ima: Handle -ESTALE returned by ima_filter_rule_match()
From
: GUO Zihua <guozihua@xxxxxxxxxx>
[PATCH v3 2/3] ima: use the lsm policy update notifier
From
: GUO Zihua <guozihua@xxxxxxxxxx>
[PATCH v3 0/3] ima: Fix IMA mishandling of LSM based rule during
From
: GUO Zihua <guozihua@xxxxxxxxxx>
[PATCH v3 1/3] LSM: switch to blocking policy update notifiers
From
: GUO Zihua <guozihua@xxxxxxxxxx>
[PATCH] ima: return IMA digest value only when IMA_COLLECTED flag is set
From
: Matt Bobrowski <mattbobrowski@xxxxxxxxxx>
[PATCH] ima: fix error handling logic when file measurement failed
From
: Matt Bobrowski <mattbobrowski@xxxxxxxxxx>
Re: [PATCH v2 1/2] ima: use the lsm policy update notifier
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
From
: Matthew Garrett <mgarrett@xxxxxxxxxxx>
Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
From
: Matthew Garrett <mgarrett@xxxxxxxxxxx>
Re: [PATCH v2 1/2] ima: use the lsm policy update notifier
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: ima: zeroed out digest values
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH] tpm: Add reserved memory event log
From
: Eddie James <eajames@xxxxxxxxxxxxx>
Re: [PATCH v3 1/2] lockdown: kexec_file: prevent unsigned kernel image when KEXEC_SIG not enabled
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 2/2] selftests/kexec: enable lockdown tests
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
ima: zeroed out digest values
From
: Matt Bobrowski <mattbobrowski@xxxxxxxxxx>
[PATCH v2 1/2] ima: use the lsm policy update notifier
From
: GUO Zihua <guozihua@xxxxxxxxxx>
[PATCH v2 2/2] ima: Handle -ESTALE returned by ima_filter_rule_match()
From
: GUO Zihua <guozihua@xxxxxxxxxx>
[PATCH v2 0/2] ima: Fix IMA mishandling of LSM based rule during
From
: GUO Zihua <guozihua@xxxxxxxxxx>
[PATCH] KEYS: trusted: tpm2: use correct function name in kernel-doc
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
[PATCH] ima: fix ima_delete_rules() kernel-doc warning
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
Re: [PATCH] libimaevm: do not crash if the certificate cannot be read
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [RFC][PATCH 1/2] ima: created new ima template ima-dep-cgn for OCI containers attestation
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
RE: [PATCH v5 1/2] lib/mpi: Fix buffer overrun when SG is too long
From
: David Laight <David.Laight@xxxxxxxxxx>
[PATCH V2] tpm_crb: Add support for CRB devices based on Pluton
From
: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
Re: [PATCH 001/606] tpm: st33zp24: Convert to Convert to i2c's .probe_new()
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v5 1/2] lib/mpi: Fix buffer overrun when SG is too long
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
RE: [PATCH v5 1/2] lib/mpi: Fix buffer overrun when SG is too long
From
: David Laight <David.Laight@xxxxxxxxxx>
Re: [PATCH] ima: Handle error code from security_audit_rule_match
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
Re: [PATCH] lockdown: kexec_file: prevent unsigned kernel image when KEXEC_SIG not enabled
From
: Coiby Xu <coxu@xxxxxxxxxx>
[PATCH v3 2/2] selftests/kexec: enable lockdown tests
From
: Coiby Xu <coxu@xxxxxxxxxx>
[PATCH v3 1/2] lockdown: kexec_file: prevent unsigned kernel image when KEXEC_SIG not enabled
From
: Coiby Xu <coxu@xxxxxxxxxx>
Re: [PATCH 2/2] ima: Handle -ESTALE returned by ima_filter_rule_match()
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
Re: [PATCH v5 2/2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]