Linux Integrity
Thread Index
[
Prev Page
][
Next Page
]
Re: [PATCH v5 03/25] powerpc/secvar: Fix incorrect return in secvar_sysfs_load()
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v5 05/25] powerpc/secvar: Warn and error if multiple secvar ops are set
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [RFC PATCH v9 00/16] Integrity Policy Enforcement LSM (IPE)
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [RFC PATCH v9 13/16] ipe: enable support for fs-verity as a trust provider
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [RFC PATCH v9 10/16] dm-verity: consume root hash digest and signature data via LSM hook
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [RFC PATCH v9 07/16] uapi|audit|ipe: add ipe auditing support
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [RFC PATCH v9 06/16] ipe: add LSM hooks on execution and kernel read
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH -next] evm: Use __vfs_setxattr() to update security.evm
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [RFC PATCH v9 02/16] ipe: add policy parser
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [RFC PATCH v9 05/16] ipe: add userspace interface
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [RFC PATCH v9 03/16] ipe: add evaluation loop and introduce 'boot_verified' as a trust provider
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils] Introduce expect_pass_if() and expect_fail_if()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH v4 22/24] powerpc/pseries: Implement secvars for dynamic secure boot
From
: "Nicholas Piggin" <npiggin@xxxxxxxxx>
Re: [RFC PATCH v9 09/16] block|security: add LSM blob to block_device
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
[PATCH v5 05/25] powerpc/secvar: Warn and error if multiple secvar ops are set
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v5 12/25] powerpc/secvar: Warn when PAGE_SIZE is smaller than max object size
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v5 08/25] powerpc/secvar: Handle max object size in the consumer
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v5 19/25] powerpc/pseries: Make caller pass buffer to plpks_read_var()
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v5 07/25] powerpc/secvar: Handle format string in the consumer
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v5 11/25] powerpc/secvar: Allow backend to populate static list of variable names
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v5 16/25] powerpc/pseries: Expose PLPKS config values, support additional fields
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v5 25/25] integrity/powerpc: Support loading keys from PLPKS
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v5 22/25] powerpc/pseries: Pass PLPKS password on kexec
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v5 15/25] powerpc/pseries: Move PLPKS constants to header file
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v5 17/25] powerpc/pseries: Implement signed update for PLPKS objects
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v5 18/25] powerpc/pseries: Log hcall return codes for PLPKS debug
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v5 06/25] powerpc/secvar: Use sysfs_emit() instead of sprintf()
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v5 00/25] pSeries dynamic secure boot secvar interface + platform keyring loading
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v5 02/25] powerpc/pseries: Fix alignment of PLPKS structures and buffers
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v5 14/25] powerpc/pseries: Move plpks.h to include directory
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v5 13/25] powerpc/secvar: Don't print error on ENOENT when reading variables
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v5 20/25] powerpc/pseries: Turn PSERIES_PLPKS into a hidden option
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v5 10/25] powerpc/secvar: Extend sysfs to include config vars
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v5 23/25] powerpc/pseries: Implement secvars for dynamic secure boot
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v5 04/25] powerpc/secvar: Use u64 in secvar_operations
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v5 21/25] powerpc/pseries: Add helper to get PLPKS password length
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v5 09/25] powerpc/secvar: Clean up init error messages
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v5 01/25] powerpc/pseries: Fix handling of PLPKS object flushing timeout
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v5 24/25] integrity/powerpc: Improve error handling & reporting when loading certs
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v5 03/25] powerpc/secvar: Fix incorrect return in secvar_sysfs_load()
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
Re: [PATCH v4 22/24] powerpc/pseries: Implement secvars for dynamic secure boot
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
Re: [PATCH v4 16/24] powerpc/pseries: Implement signed update for PLPKS objects
From
: Russell Currey <ruscur@xxxxxxxxxx>
Re: [RFC PATCH v9 16/16] documentation: add ipe documentation
From
: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
Re: [PATCH v4 22/24] powerpc/pseries: Implement secvars for dynamic secure boot
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
Re: [PATCH v4 21/24] powerpc/pseries: Pass PLPKS password on kexec
From
: Russell Currey <ruscur@xxxxxxxxxx>
Re: [PATCH -next] evm: call dump_security_xattr() in all cases to remove code duplication
From
: xiujianfeng <xiujianfeng@xxxxxxxxxx>
Re: [PATCH -next] evm: call dump_security_xattr() in all cases to remove code duplication
From
: xiujianfeng <xiujianfeng@xxxxxxxxxx>
[PATCH -next] evm: call dump_security_xattr() in all cases to remove code duplication
From
: Xiu Jianfeng <xiujianfeng@xxxxxxxxxx>
Re: [PATCH v4 24/24] integrity/powerpc: Support loading keys from pseries secvar
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[RFC PATCH v9 10/16] dm-verity: consume root hash digest and signature data via LSM hook
From
: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
[RFC PATCH v9 05/16] ipe: add userspace interface
From
: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
[RFC PATCH v9 08/16] ipe: add permissive toggle
From
: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
[RFC PATCH v9 07/16] uapi|audit|ipe: add ipe auditing support
From
: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
[RFC PATCH v9 03/16] ipe: add evaluation loop and introduce 'boot_verified' as a trust provider
From
: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
[RFC PATCH v9 11/16] ipe: add support for dm-verity as a trust provider
From
: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
[RFC PATCH v9 12/16] fsverity: consume builtin signature via LSM hook
From
: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
[RFC PATCH v9 06/16] ipe: add LSM hooks on execution and kernel read
From
: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
[RFC PATCH v9 16/16] documentation: add ipe documentation
From
: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
[RFC PATCH v9 02/16] ipe: add policy parser
From
: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
[RFC PATCH v9 13/16] ipe: enable support for fs-verity as a trust provider
From
: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
[RFC PATCH v9 15/16] ipe: kunit test for parser
From
: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
[RFC PATCH v9 14/16] scripts: add boot policy generation program
From
: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
[RFC PATCH v9 09/16] block|security: add LSM blob to block_device
From
: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
[RFC PATCH v9 00/16] Integrity Policy Enforcement LSM (IPE)
From
: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
[RFC PATCH v9 04/16] security: add new securityfs delete function
From
: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
[RFC PATCH v9 01/16] security: add ipe lsm
From
: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH -next] evm: call dump_security_xattr() in all cases to remove code duplication
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH -next v2] tpm: of: fix return value check in tpm_read_log_memory_region()
From
: Yang Yingliang <yangyingliang@xxxxxxxxxx>
Re: [PATCH v3 2/2] ima: Introduce MMAP_CHECK_REQPROT hook
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH -next] evm: call dump_security_xattr() in all cases to remove code duplication
From
: xiujianfeng <xiujianfeng@xxxxxxxxxx>
Re: [PATCH v4 16/24] powerpc/pseries: Implement signed update for PLPKS objects
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
Re: [PATCH -next] evm: Use __vfs_setxattr() to update security.evm
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
Re: [PATCH -next] evm: call dump_security_xattr() in all cases to remove code duplication
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 2/2] ima: Introduce MMAP_CHECK_REQPROT hook
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 09/11] KEYS: trusted: Add session encryption protection to the seal/unseal path
From
: Ben Boeckel <me@xxxxxxxxxxxxxx>
[PATCH -next] tpm: of: fix return value check in tpm_read_log_memory_region()
From
: Yang Yingliang <yangyingliang@xxxxxxxxxx>
[PATCH -next] evm: call dump_security_xattr() in all cases to remove code duplication
From
: Xiu Jianfeng <xiujianfeng@xxxxxxxxxx>
Re: [PATCH v4 02/24] powerpc/pseries: Fix alignment of PLPKS structures and buffers
From
: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
Re: [PATCH v4 02/24] powerpc/pseries: Fix alignment of PLPKS structures and buffers
From
: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
RE: [PATCH v4 02/24] powerpc/pseries: Fix alignment of PLPKS structures and buffers
From
: David Laight <David.Laight@xxxxxxxxxx>
Re: [PATCH v5 2/2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[RFC PATCH v1 2/3] ima: ascii_vpcr pseudo-file for sysadmins
From
: Ilya Hanov <ilya.hanov@xxxxxxxxxxxxxxxxxxx>
[RFC PATCH v1 3/3] ima: Use TPM RNG for vPCR.secret if it's presented.
From
: Ilya Hanov <ilya.hanov@xxxxxxxxxxxxxxxxxxx>
[RFC PATCH v1 0/3] ima: vPCR debug/security
From
: Ilya Hanov <ilya.hanov@xxxxxxxxxxxxxxxxxxx>
[RFC PATCH v1 1/3] ima: Add a UUID value for each vPCR
From
: Ilya Hanov <ilya.hanov@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH v3 1/2] ima: Align ima_file_mmap() parameters with mmap_file LSM hook
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH v4 02/24] powerpc/pseries: Fix alignment of PLPKS structures and buffers
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [PATCH v3 2/2] tpm: Add reserved memory event log
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3 2/2] tpm: Add reserved memory event log
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[PATCH v3 1/2] tpm: Use managed allocation for bios event log
From
: Eddie James <eajames@xxxxxxxxxxxxx>
[PATCH v3 2/2] tpm: Add reserved memory event log
From
: Eddie James <eajames@xxxxxxxxxxxxx>
[PATCH v3 0/2] tpm: Add reserved memory event log
From
: Eddie James <eajames@xxxxxxxxxxxxx>
Re: [PATCH v3 1/2] ima: Align ima_file_mmap() parameters with mmap_file LSM hook
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
RE: [PATCH v4 02/24] powerpc/pseries: Fix alignment of PLPKS structures and buffers
From
: David Laight <David.Laight@xxxxxxxxxx>
Re: [PATCH v2 1/2] tpm: Use managed allocation for bios event log
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v4 02/24] powerpc/pseries: Fix alignment of PLPKS structures and buffers
From
: Segher Boessenkool <segher@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[PATCH v3 2/2] ima: Introduce MMAP_CHECK_REQPROT hook
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils] Add tests for MMAP_CHECK and MMAP_CHECK_REQPROT hooks
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH v3 1/2] ima: Align ima_file_mmap() parameters with mmap_file LSM hook
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v4 05/11] Add support for creating a new testing environment in functions.sh
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v4 02/11] Add kernel configuration for tests
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH ima-evm-utils v4 09/11] Use in-place built fsverity binary instead of installing it
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v4 11/11] Temporarily remove CONFIG_DEBUG_SG to test portable signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v4 10/11] ci: haveged requires EPEL on CentOS stream:8
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v4 08/11] Adapt fsverity.test to be able to run in a new testing environment
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v4 07/11] Add tests for EVM portable signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v4 06/11] Introduce TST_LIST variable to select a test to execute
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v4 05/11] Add support for creating a new testing environment in functions.sh
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v4 04/11] Pass cleanup function and its arguments to _report_exit_and_cleanup()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v4 03/11] Compile the UML kernel and download it in Github Actions
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v4 02/11] Add kernel configuration for tests
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v4 01/11] Fix error messages and vars in calc_evm_hmac()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v4 00/11] Support testing in new enviroments
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v3 03/11] Compile the UML kernel and download it in Github Actions
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v3 07/11] Add tests for EVM portable signatures
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils] ci: cleanup build.sh test log output
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH ima-evm-utils v3 08/11] Adapt fsverity.test to be able to run in a new testing environment
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils] Experimental fsverity.test related GA CI improvements
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH ima-evm-utils] ci: cleanup build.sh test log output
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[ima-evm-utils PATCH] tests: use new git repo URL for fsverity-utils
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH ima-evm-utils v3 03/11] Compile the UML kernel and download it in Github Actions
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 1/2] tpm: Use managed allocation for bios event log
From
: Eddie James <eajames@xxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v3 06/11] Introduce TST_LIST variable to select a test to execute
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v2 01/11] tpm: move buffer handling from static inlines to real functions
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v3 04/11] Pass cleanup function and its arguments to _report_exit_and_cleanup()
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v3 05/11] Add support for creating a new testing environment in functions.sh
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH v4 02/24] powerpc/pseries: Fix alignment of PLPKS structures and buffers
From
: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
Re: [PATCH v2 06/11] tpm: Add full HMAC and encrypt/decrypt session handling code
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v3 11/11] Temporarily remove CONFIG_DEBUG_SG to test portable signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v3 10/11] ci: haveged requires EPEL on CentOS stream:8
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v3 09/11] Use in-place built fsverity binary instead of installing it
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v3 07/11] Add tests for EVM portable signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v3 08/11] Adapt fsverity.test to be able to run in a new testing environment
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v3 06/11] Introduce TST_LIST variable to select a test to execute
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v3 05/11] Add support for creating a new testing environment in functions.sh
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v3 04/11] Pass cleanup function and its arguments to _report_exit_and_cleanup()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v3 03/11] Compile the UML kernel and download it in Github Actions
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v3 01/11] Fix error messages and vars in calc_evm_hmac()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v3 02/11] Add config for UML kernel
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v3 00/11] Support testing in new enviroments
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH v2 06/11] tpm: Add full HMAC and encrypt/decrypt session handling code
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v4 21/24] powerpc/pseries: Pass PLPKS password on kexec
From
: Michael Ellerman <michaele@xxxxxxxxxxx>
Re: [PATCH v4 24/24] integrity/powerpc: Support loading keys from pseries secvar
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v4 24/24] integrity/powerpc: Support loading keys from pseries secvar
From
: Russell Currey <ruscur@xxxxxxxxxx>
Re: [PATCH v4 24/24] integrity/powerpc: Support loading keys from pseries secvar
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
Re: [PATCH v2 06/11] tpm: Add full HMAC and encrypt/decrypt session handling code
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v2 06/11] tpm: Add full HMAC and encrypt/decrypt session handling code
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v2 01/11] tpm: move buffer handling from static inlines to real functions
From
: kernel test robot <lkp@xxxxxxxxx>
[PATCH v2 11/11] Documentation: add tpm-security.rst
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v2 10/11] tpm: add the null key name as a sysfs export
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v2 09/11] KEYS: trusted: Add session encryption protection to the seal/unseal path
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v2 08/11] tpm: add session encryption protection to tpm2_get_random()
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v2 07/11] tpm: add hmac checks to tpm2_pcr_extend()
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v2 06/11] tpm: Add full HMAC and encrypt/decrypt session handling code
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v2 05/11] tpm: export the context save and load commands
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v2 04/11] tpm: add buffer function to point to returned parameters
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v2 03/11] tpm: add cursor based buffer functions for response parsing
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v2 02/11] tpm: add buffer handling for TPM2B types
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v2 01/11] tpm: move buffer handling from static inlines to real functions
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v2 00/11] add integrity and security to TPM2 transactions
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v4 23/24] integrity/powerpc: Improve error handling & reporting when loading certs
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v4 24/24] integrity/powerpc: Support loading keys from pseries secvar
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
From
: "Dr. Greg" <greg@xxxxxxxxxxxx>
Re: [PATCH v4 24/24] integrity/powerpc: Support loading keys from pseries secvar
From
: "Nicholas Piggin" <npiggin@xxxxxxxxx>
Re: [PATCH v4 22/24] powerpc/pseries: Implement secvars for dynamic secure boot
From
: "Nicholas Piggin" <npiggin@xxxxxxxxx>
Re: [PATCH v4 21/24] powerpc/pseries: Pass PLPKS password on kexec
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
Re: [PATCH v4 21/24] powerpc/pseries: Pass PLPKS password on kexec
From
: "Nicholas Piggin" <npiggin@xxxxxxxxx>
Re: [PATCH v4 19/24] powerpc/pseries: Turn PSERIES_PLPKS into a hidden option
From
: "Nicholas Piggin" <npiggin@xxxxxxxxx>
Re: [PATCH v4 16/24] powerpc/pseries: Implement signed update for PLPKS objects
From
: "Nicholas Piggin" <npiggin@xxxxxxxxx>
Re: [PATCH v2] security: Restore passing final prot to ima_file_mmap()
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [PATCH ima-evm-utils v2 6/9] Add tests for EVM portable signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v2 6/9] Add tests for EVM portable signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v2 6/9] Add tests for EVM portable signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v2 6/9] Add tests for EVM portable signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2] security: Restore passing final prot to ima_file_mmap()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH] ima: fix error handling logic when file measurement failed
From
: Matt Bobrowski <mattbobrowski@xxxxxxxxxx>
Re: [PATCH] ima: fix error handling logic when file measurement failed
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] ima: return IMA digest value only when IMA_COLLECTED flag is set
From
: Matt Bobrowski <mattbobrowski@xxxxxxxxxx>
Re: [PATCH] ima: fix error handling logic when file measurement failed
From
: Matt Bobrowski <mattbobrowski@xxxxxxxxxx>
Re: [PATCH v2] security: Restore passing final prot to ima_file_mmap()
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 2/2] tpm: Add reserved memory event log
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[ANNOUNCE] Linux Security Summit North Americ (LSS-NA) CfP
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH v2 2/2] tpm: Add reserved memory event log
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2 1/2] tpm: Use managed allocation for bios event log
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2] tpm: Allow system suspend to continue when TPM suspend fails
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2] tpm: Allow system suspend to continue when TPM suspend fails
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH 001/606] tpm: st33zp24: Convert to Convert to i2c's .probe_new()
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2] security: Restore passing final prot to ima_file_mmap()
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH] public_key: Add a comment to public_key_signature struct definition
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH] public_key: Add a comment to public_key_signature struct definition
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH] public_key: Add a comment to public_key_signature struct definition
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v5 1/2] lib/mpi: Fix buffer overrun when SG is too long
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH v4 07/24] powerpc/secvar: Handle max object size in the consumer
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v4 12/24] powerpc/secvar: Don't print error on ENOENT when reading variables
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v4 18/24] powerpc/pseries: Make caller pass buffer to plpks_read_var()
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v4 23/24] integrity/powerpc: Improve error handling & reporting when loading certs
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v4 13/24] powerpc/pseries: Move plpks.h to include directory
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v4 11/24] powerpc/secvar: Warn when PAGE_SIZE is smaller than max object size
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v4 09/24] powerpc/secvar: Extend sysfs to include config vars
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v4 24/24] integrity/powerpc: Support loading keys from pseries secvar
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v4 21/24] powerpc/pseries: Pass PLPKS password on kexec
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v4 17/24] powerpc/pseries: Log hcall return codes for PLPKS debug
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v4 22/24] powerpc/pseries: Implement secvars for dynamic secure boot
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v4 06/24] powerpc/secvar: Handle format string in the consumer
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v4 05/24] powerpc/secvar: Use sysfs_emit() instead of sprintf()
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v4 16/24] powerpc/pseries: Implement signed update for PLPKS objects
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v4 00/24] pSeries dynamic secure boot secvar interface + platform keyring loading
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v4 14/24] powerpc/pseries: Move PLPKS constants to header file
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v4 10/24] powerpc/secvar: Allow backend to populate static list of variable names
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v4 20/24] powerpc/pseries: Add helpers to get PLPKS password
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v4 08/24] powerpc/secvar: Clean up init error messages
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v4 15/24] powerpc/pseries: Expose PLPKS config values, support additional fields
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v4 19/24] powerpc/pseries: Turn PSERIES_PLPKS into a hidden option
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v4 01/24] powerpc/pseries: Fix handling of PLPKS object flushing timeout
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v4 03/24] powerpc/secvar: Use u64 in secvar_operations
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v4 02/24] powerpc/pseries: Fix alignment of PLPKS structures and buffers
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v4 04/24] powerpc/secvar: Warn and error if multiple secvar ops are set
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
Re: [PATCH v3 08/24] powerpc/secvar: Allow backend to populate static list of variable names
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
Re: [PATCH v3 04/24] powerpc/secvar: Handle format string in the consumer
From
: Russell Currey <ruscur@xxxxxxxxxx>
Re: [PATCH v3 05/24] powerpc/secvar: Handle max object size in the consumer
From
: Greg Joyce <gjoyce@xxxxxxxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v2 8/9] Use in-place built fsverity binary instead of installing it
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 04/24] powerpc/secvar: Handle format string in the consumer
From
: "Nicholas Piggin" <npiggin@xxxxxxxxx>
Re: [PATCH v3 13/24] powerpc/pseries: Fix handling of PLPKS object flushing timeout
From
: "Nicholas Piggin" <npiggin@xxxxxxxxx>
Re: [PATCH v3 16/24] powerpc/pseries: Implement signed update for PLPKS objects
From
: "Nicholas Piggin" <npiggin@xxxxxxxxx>
Re: [PATCH v3 08/24] powerpc/secvar: Allow backend to populate static list of variable names
From
: "Nicholas Piggin" <npiggin@xxxxxxxxx>
Re: [PATCH v3 04/24] powerpc/secvar: Handle format string in the consumer
From
: "Nicholas Piggin" <npiggin@xxxxxxxxx>
Re: [PATCH v3 02/24] powerpc/secvar: WARN_ON_ONCE() if multiple secvar ops are set
From
: "Nicholas Piggin" <npiggin@xxxxxxxxx>
Re: [PATCH -next] evm: Use __vfs_setxattr() to update security.evm
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH -next] evm: Support small xattr in dump_security_xattr()
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 2/2] tpm: Add reserved memory event log
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v2 2/2] tpm: Add reserved memory event log
From
: Eddie James <eajames@xxxxxxxxxxxxx>
Re: [PATCH v2 2/2] tpm: Add reserved memory event log
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v3 22/24] powerpc/pseries: Implement secvars for dynamic secure boot
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v3 21/24] powerpc/pseries: Pass PLPKS password on kexec
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v3 21/24] powerpc/pseries: Pass PLPKS password on kexec
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v3 07/24] powerpc/secvar: Extend sysfs to include config vars
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v3 23/24] integrity/powerpc: Improve error handling & reporting when loading certs
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v3 00/24] pSeries dynamic secure boot secvar interface + platform keyring loading
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v3 13/24] powerpc/pseries: Fix handling of PLPKS object flushing timeout
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v3 08/24] powerpc/secvar: Allow backend to populate static list of variable names
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v3 01/24] powerpc/secvar: Use u64 in secvar_operations
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v3 03/24] powerpc/secvar: Use sysfs_emit() instead of sprintf()
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v3 02/24] powerpc/secvar: WARN_ON_ONCE() if multiple secvar ops are set
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v3 06/24] powerpc/secvar: Clean up init error messages
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v3 04/24] powerpc/secvar: Handle format string in the consumer
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v3 11/24] powerpc/pseries: Move plpks.h to include directory
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v3 16/24] powerpc/pseries: Implement signed update for PLPKS objects
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v3 05/24] powerpc/secvar: Handle max object size in the consumer
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v3 09/24] powerpc/secvar: Warn when PAGE_SIZE is smaller than max object size
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v3 22/24] powerpc/pseries: Implement secvars for dynamic secure boot
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v3 14/24] powerpc/pseries: Fix alignment of PLPKS structures and buffers
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v3 10/24] powerpc/secvar: Don't print error on ENOENT when reading variables
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v3 24/24] integrity/powerpc: Support loading keys from pseries secvar
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v3 20/24] powerpc/pseries: Add helpers to get PLPKS password
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v3 17/24] powerpc/pseries: Log hcall return codes for PLPKS debug
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v3 12/24] powerpc/pseries: Move PLPKS constants to header file
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v3 15/24] powerpc/pseries: Expose PLPKS config values, support additional fields
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v3 18/24] powerpc/pseries: Make caller pass buffer to plpks_read_var()
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
[PATCH v3 19/24] powerpc/pseries: Turn PSERIES_PLPKS into a hidden option
From
: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [PATCH] tpm: Add reserved memory event log
From
: Eddie James <eajames@xxxxxxxxxxxxx>
Re: [PATCH v2] tpm: Allow system suspend to continue when TPM suspend fails
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v2] tpm: Allow system suspend to continue when TPM suspend fails
From
: Vlastimil Babka <vbabka@xxxxxxx>
Re: [PATCH v2] tpm: Allow system suspend to continue when TPM suspend fails
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v5 1/2] lib/mpi: Fix buffer overrun when SG is too long
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v5 1/2] lib/mpi: Fix buffer overrun when SG is too long
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH v2] tpm: Allow system suspend to continue when TPM suspend fails
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] tpm: Add reserved memory event log
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH V2] tpm_crb: Add support for CRB devices based on Pluton
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
From
: Matthew Garrett <mgarrett@xxxxxxxxxxx>
Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
[PATCH v2 1/2] tpm: Use managed allocation for bios event log
From
: Eddie James <eajames@xxxxxxxxxxxxx>
[PATCH v2 2/2] tpm: Add reserved memory event log
From
: Eddie James <eajames@xxxxxxxxxxxxx>
[PATCH v2 0/2] tpm: Add reserved memory event log
From
: Eddie James <eajames@xxxxxxxxxxxxx>
Re: [PATCH v2] security: Restore passing final prot to ima_file_mmap()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH v7 0/6] evm: Do HMAC of multiple per LSM xattrs for new inodes
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH v2] security: Restore passing final prot to ima_file_mmap()
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v7 2/6] ocfs2: Switch to security_inode_init_security()
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v7 0/6] evm: Do HMAC of multiple per LSM xattrs for new inodes
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v2 8/9] Use in-place built fsverity binary instead of installing it
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v2 8/9] Use in-place built fsverity binary instead of installing it
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v2 8/9] Use in-place built fsverity binary instead of installing it
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v2 8/9] Use in-place built fsverity binary instead of installing it
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v2 9/9] ci: haveged requires EPEL on CentOS stream:8
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v2 6/9] Add tests for EVM portable signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v2 5/9] Introduce TST_LIST variable to select a test to execute
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v2 6/9] Add tests for EVM portable signatures
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v2 4/9] Add support for UML in functions.sh
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v2 4/9] Add support for UML in functions.sh
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v2 0/9] Support testing with UML kernel
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v2 2/9] Add config for UML kernel
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v2 1/9] Fix error messages and mdlen init in calc_evm_hmac()
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v2] security: Restore passing final prot to ima_file_mmap()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v2 9/9] ci: haveged requires EPEL on CentOS stream:8
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v2 8/9] Use in-place built fsverity binary instead of installing it
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v2 7/9] Adapt fsverity.test to work with UML kernel
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v2 6/9] Add tests for EVM portable signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v2 4/9] Add support for UML in functions.sh
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v2 3/9] Compile the UML kernel and download it in Github Actions
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v2 5/9] Introduce TST_LIST variable to select a test to execute
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v2 2/9] Add config for UML kernel
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v2 1/9] Fix error messages and mdlen init in calc_evm_hmac()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v2 0/9] Support testing with UML kernel
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: Seal/Unseal trusted keys against PCR policy
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] security: Restore passing final prot to ima_file_mmap()
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: Seal/Unseal trusted keys against PCR policy
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: Seal/Unseal trusted keys against PCR policy
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: Seal/Unseal trusted keys against PCR policy
From
: Sughosh Ganu <sughosh.ganu@xxxxxxxxxx>
Re: [PATCH v2] security: Restore passing final prot to ima_file_mmap()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
From
: Vlastimil Babka <vbabka@xxxxxxx>
Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [PATCH ima-evm-utils 3/8] Compile the UML kernel and download it in Github Actions
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils 3/8] Compile the UML kernel and download it in Github Actions
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v6 0/3] ima: Fix IMA mishandling of LSM based rule during
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v7 0/3] ima: Fix IMA mishandling of LSM based rule during
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v7 2/6] ocfs2: Switch to security_inode_init_security()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH v7 0/3] ima: Fix IMA mishandling of LSM based rule during
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
[PATCH ima-evm-utils 8/8] Use in-place built fsverity binary instead of installing it
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils 4/8] Add support for UML in functions.sh
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils 7/8] Adapt fsverity.test to work with UML kernel
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils 2/8] Add config for UML kernel
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils 1/8] Fix error messages and mdlen init in calc_evm_hmac()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils 0/8] Support testing with UML kernel
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils 6/8] Add tests for EVM portable signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils 3/8] Compile the UML kernel and download it in Github Actions
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH ima-evm-utils 5/8] Introduce TST_LIST variable to select a test to execute
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v2] tpm: Allow system suspend to continue when TPM suspend fails
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH] libimaevm: do not crash if the certificate cannot be read
From
: Alberto Mardegan <a.mardegan@xxxxxx>
Re: Seal/Unseal trusted keys against PCR policy
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: Seal/Unseal trusted keys against PCR policy
From
: Ken Goldman <kgold@xxxxxxxxxxxxx>
Re: Seal/Unseal trusted keys against PCR policy
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] tpm: Allow system suspend to continue when TPM suspend fails
From
: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
Re: Seal/Unseal trusted keys against PCR policy
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: Seal/Unseal trusted keys against PCR policy
From
: Ken Goldman <kgold@xxxxxxxxxxxxx>
Re: [PATCH] ima: fix ima_delete_rules() kernel-doc warning
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH] KEYS: trusted: tpm2: use correct function name in kernel-doc
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v2] security: Restore passing final prot to ima_file_mmap()
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v2] tpm: Allow system suspend to continue when TPM suspend fails
From
: Luigi Semenzato <semenzato@xxxxxxxxxxxx>
Re: [PATCH v2] tpm: Allow system suspend to continue when TPM suspend fails
From
: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 001/606] tpm: st33zp24: Convert to Convert to i2c's .probe_new()
From
: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
Re: [PATCH v2] tpm: Allow system suspend to continue when TPM suspend fails
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v2] tpm: Allow system suspend to continue when TPM suspend fails
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v5 1/2] lib/mpi: Fix buffer overrun when SG is too long
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
[PATCH v2] tpm: Allow system suspend to continue when TPM suspend fails
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH v7 3/3] ima: Handle -ESTALE returned by ima_filter_rule_match()
From
: GUO Zihua <guozihua@xxxxxxxxxx>
[PATCH v7 1/3] LSM: switch to blocking policy update notifiers
From
: GUO Zihua <guozihua@xxxxxxxxxx>
[PATCH v7 0/3] ima: Fix IMA mishandling of LSM based rule during
From
: GUO Zihua <guozihua@xxxxxxxxxx>
[PATCH v7 2/3] ima: use the lsm policy update notifier
From
: GUO Zihua <guozihua@xxxxxxxxxx>
Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] tpm: Disable hwrng for TPM 1 if PM_SLEEP is enabled
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH] tpm: Disable hwrng for TPM 1 if PM_SLEEP is enabled
From
: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v6 2/3] ima: use the lsm policy update notifier
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH] tpm: Disable hwrng for TPM 1 if PM_SLEEP is enabled
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH] tpm: Disable hwrng for TPM 1 if PM_SLEEP is enabled
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
From
: Vlastimil Babka <vbabka@xxxxxxx>
Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
From
: Thorsten Leemhuis <regressions@xxxxxxxxxxxxx>
Re: [PATCH v6 0/3] ima: Fix IMA mishandling of LSM based rule during
From
: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
[PATCH v6 2/3] ima: use the lsm policy update notifier
From
: GUO Zihua <guozihua@xxxxxxxxxx>
[PATCH v6 3/3] ima: Handle -ESTALE returned by ima_filter_rule_match()
From
: GUO Zihua <guozihua@xxxxxxxxxx>
[PATCH v6 1/3] LSM: switch to blocking policy update notifiers
From
: GUO Zihua <guozihua@xxxxxxxxxx>
[PATCH v6 0/3] ima: Fix IMA mishandling of LSM based rule during
From
: GUO Zihua <guozihua@xxxxxxxxxx>
[PATCH v5 3/3] ima: Handle -ESTALE returned by ima_filter_rule_match()
From
: GUO Zihua <guozihua@xxxxxxxxxx>
[PATCH v5 2/3] ima: use the lsm policy update notifier
From
: GUO Zihua <guozihua@xxxxxxxxxx>
[PATCH v5 1/3] LSM: switch to blocking policy update notifiers
From
: GUO Zihua <guozihua@xxxxxxxxxx>
[PATCH v5 0/3] ima: Fix IMA mishandling of LSM based rule during
From
: GUO Zihua <guozihua@xxxxxxxxxx>
Re: [PATCH v4 0/3] ima: Fix IMA mishandling of LSM based rule during
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
Re: [PATCH v3 03/10] KEYS: X.509: Parse Basic Constraints for CA
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 04/10] KEYS: X.509: Parse Key Usage
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH v3 03/10] KEYS: X.509: Parse Basic Constraints for CA
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: Stable backport request
From
: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 03/10] KEYS: X.509: Parse Basic Constraints for CA
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3 09/10] KEYS: CA link restriction
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3 09/10] KEYS: CA link restriction
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3 05/10] KEYS: Introduce a CA endorsed flag
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3 04/10] KEYS: X.509: Parse Key Usage
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3 03/10] KEYS: X.509: Parse Basic Constraints for CA
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3 02/10] KEYS: Add missing function documentation
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3 01/10] KEYS: Create static version of public_key_verify_signature
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
From
: Johannes Altmanninger <aclopte@xxxxxxxxx>
[PATCH v4 3/3] ima: Handle -ESTALE returned by ima_filter_rule_match()
From
: GUO Zihua <guozihua@xxxxxxxxxx>
[PATCH v4 2/3] ima: use the lsm policy update notifier
From
: GUO Zihua <guozihua@xxxxxxxxxx>
[PATCH v4 1/3] LSM: switch to blocking policy update notifiers
From
: GUO Zihua <guozihua@xxxxxxxxxx>
[PATCH v4 0/3] ima: Fix IMA mishandling of LSM based rule during
From
: GUO Zihua <guozihua@xxxxxxxxxx>
[PATCH v3 3/3] ima: Handle -ESTALE returned by ima_filter_rule_match()
From
: GUO Zihua <guozihua@xxxxxxxxxx>
[PATCH v3 2/3] ima: use the lsm policy update notifier
From
: GUO Zihua <guozihua@xxxxxxxxxx>
[PATCH v3 0/3] ima: Fix IMA mishandling of LSM based rule during
From
: GUO Zihua <guozihua@xxxxxxxxxx>
[PATCH v3 1/3] LSM: switch to blocking policy update notifiers
From
: GUO Zihua <guozihua@xxxxxxxxxx>
[PATCH] ima: return IMA digest value only when IMA_COLLECTED flag is set
From
: Matt Bobrowski <mattbobrowski@xxxxxxxxxx>
[PATCH] ima: fix error handling logic when file measurement failed
From
: Matt Bobrowski <mattbobrowski@xxxxxxxxxx>
Re: [PATCH v2 1/2] ima: use the lsm policy update notifier
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
From
: Matthew Garrett <mgarrett@xxxxxxxxxxx>
Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
From
: Matthew Garrett <mgarrett@xxxxxxxxxxx>
Re: [PATCH v2 1/2] ima: use the lsm policy update notifier
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: ima: zeroed out digest values
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH] tpm: Add reserved memory event log
From
: Eddie James <eajames@xxxxxxxxxxxxx>
Re: [PATCH v3 1/2] lockdown: kexec_file: prevent unsigned kernel image when KEXEC_SIG not enabled
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 2/2] selftests/kexec: enable lockdown tests
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
ima: zeroed out digest values
From
: Matt Bobrowski <mattbobrowski@xxxxxxxxxx>
[PATCH v2 1/2] ima: use the lsm policy update notifier
From
: GUO Zihua <guozihua@xxxxxxxxxx>
[PATCH v2 2/2] ima: Handle -ESTALE returned by ima_filter_rule_match()
From
: GUO Zihua <guozihua@xxxxxxxxxx>
[PATCH v2 0/2] ima: Fix IMA mishandling of LSM based rule during
From
: GUO Zihua <guozihua@xxxxxxxxxx>
[PATCH] KEYS: trusted: tpm2: use correct function name in kernel-doc
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
[PATCH] ima: fix ima_delete_rules() kernel-doc warning
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
Re: [PATCH] libimaevm: do not crash if the certificate cannot be read
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [RFC][PATCH 1/2] ima: created new ima template ima-dep-cgn for OCI containers attestation
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
RE: [PATCH v5 1/2] lib/mpi: Fix buffer overrun when SG is too long
From
: David Laight <David.Laight@xxxxxxxxxx>
[PATCH V2] tpm_crb: Add support for CRB devices based on Pluton
From
: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
Re: [PATCH 001/606] tpm: st33zp24: Convert to Convert to i2c's .probe_new()
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v5 1/2] lib/mpi: Fix buffer overrun when SG is too long
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
RE: [PATCH v5 1/2] lib/mpi: Fix buffer overrun when SG is too long
From
: David Laight <David.Laight@xxxxxxxxxx>
Re: [PATCH] ima: Handle error code from security_audit_rule_match
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
Re: [PATCH] lockdown: kexec_file: prevent unsigned kernel image when KEXEC_SIG not enabled
From
: Coiby Xu <coxu@xxxxxxxxxx>
[PATCH v3 2/2] selftests/kexec: enable lockdown tests
From
: Coiby Xu <coxu@xxxxxxxxxx>
[PATCH v3 1/2] lockdown: kexec_file: prevent unsigned kernel image when KEXEC_SIG not enabled
From
: Coiby Xu <coxu@xxxxxxxxxx>
Re: [PATCH 2/2] ima: Handle -ESTALE returned by ima_filter_rule_match()
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
Re: [PATCH v5 2/2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v5 1/2] lib/mpi: Fix buffer overrun when SG is too long
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: Seal/Unseal trusted keys against PCR policy
From
: Sughosh Ganu <sughosh.ganu@xxxxxxxxxx>
Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: Seal/Unseal trusted keys against PCR policy
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: Seal/Unseal trusted keys against PCR policy
From
: Sughosh Ganu <sughosh.ganu@xxxxxxxxxx>
[REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
From
: Vlastimil Babka <vbabka@xxxxxxx>
Re: [RFC PATCH v2] ima: fix possible memory leak in cache allocating for namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH -next] evm: Use __vfs_setxattr() to update security.evm
From
: Xiu Jianfeng <xiujianfeng@xxxxxxxxxx>
Re: Seal/Unseal trusted keys against PCR policy
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v5 2/2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH v5 0/2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH v5 1/2] lib/mpi: Fix buffer overrun when SG is too long
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH] tpm_crb: Add support for CRB devices based on Pluton
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH 2/2] ima: Handle -ESTALE returned by ima_filter_rule_match()
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] ima: Handle error code from security_audit_rule_match
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v4 2/2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH v4 2/2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH v4 1/2] lib/mpi: Fix buffer overrun when SG is too long
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH 2/2] ima: Handle -ESTALE returned by ima_filter_rule_match()
From
: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
Seal/Unseal trusted keys against PCR policy
From
: Sughosh Ganu <sughosh.ganu@xxxxxxxxxx>
[PATCH 2/2] ima: Handle -ESTALE returned by ima_filter_rule_match()
From
: GUO Zihua <guozihua@xxxxxxxxxx>
[PATCH 1/2] ima: use the lsm policy update notifier
From
: GUO Zihua <guozihua@xxxxxxxxxx>
[PATCH 0/2] ima: Fix IMA mishandling of LSM based rule during
From
: GUO Zihua <guozihua@xxxxxxxxxx>
[PATCH] ima: Handle error code from security_audit_rule_match
From
: GUO Zihua <guozihua@xxxxxxxxxx>
Re: [PATCH 03/11] tpm: add cursor based buffer functions for response parsing
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH 01/11] tpm: move buffer handling from static inlines to real functions
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[PATCH -next] evm: Support small xattr in dump_security_xattr()
From
: Xiu Jianfeng <xiujianfeng@xxxxxxxxxx>
[RFC PATCH v2] ima: fix possible memory leak in cache allocating for namespace
From
: Denis Semakin <denis.semakin@xxxxxxxxxx>
[RFC][PATCH 2/2] ima: created new ima template ima-cgpath for Kubernates' pods attestation
From
: Enrico Bravi <enrico.bravi@xxxxxxxxx>
[RFC][PATCH 1/2] ima: created new ima template ima-dep-cgn for OCI containers attestation
From
: Enrico Bravi <enrico.bravi@xxxxxxxxx>
Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
[PATCH v1 1/1] ima: fix possible memory leak in cache allocating for namespace
From
: Denis Semakin <denis.semakin@xxxxxxxxxx>
[PATCH v1 1/1] ima: fix possible memory leak in cache allocating for namespace
From
: Denis Semakin <denis.semakin@xxxxxxxxxx>
Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
Re: [PATCH v3 00/10] Add CA enforcement keyring restrictions
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 00/10] Add CA enforcement keyring restrictions
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH v3 00/10] Add CA enforcement keyring restrictions
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 00/10] Add CA enforcement keyring restrictions
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
Re: [v2 PATCH] lib/mpi: Fix buffer overrun when SG is too long
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 00/10] Add CA enforcement keyring restrictions
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 00/10] Add CA enforcement keyring restrictions
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [v2 PATCH] lib/mpi: Fix buffer overrun when SG is too long
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v3 2/2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v3 00/10] Add CA enforcement keyring restrictions
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: Stable backport request
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 00/10] Add CA enforcement keyring restrictions
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: Stable backport request
From
: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
Stable backport request
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v2] security: Restore passing final prot to ima_file_mmap()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH] security: Restore passing final prot to ima_file_mmap()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
[PATCH v3 2/2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH v3 1/2] lib/mpi: Fix buffer overrun when SG is too long
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[v2 PATCH] lib/mpi: Fix buffer overrun when SG is too long
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] lib/mpi: Fix buffer overrun when SG is too long
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: Question on loading trusted key with keyctl command
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: Question on loading trusted key with keyctl command
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: Question on loading trusted key with keyctl command
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: Question on loading trusted key with keyctl command
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: Question on loading trusted key with keyctl command
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: Question on loading trusted key with keyctl command
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH] libimaevm: do not crash if the certificate cannot be read
From
: Alberto Mardegan <photo@xxxxxxxx>
Re: [PATCH] lib/mpi: Fix buffer overrun when SG is too long
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[PATCH] lib/mpi: Fix buffer overrun when SG is too long
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: Question on loading trusted key with keyctl command
From
: Sughosh Ganu <sughosh.ganu@xxxxxxxxxx>
Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: Question on loading trusted key with keyctl command
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: Question on loading trusted key with keyctl command
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Question on loading trusted key with keyctl command
From
: Sughosh Ganu <sughosh.ganu@xxxxxxxxxx>
Re: [PATCH v2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
Re: [PATCH v3 00/10] Add CA enforcement keyring restrictions
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] fsverity: don't check builtin signatures when require_signatures=0
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH] fsverity: don't check builtin signatures when require_signatures=0
From
: Luca Boccassi <bluca@xxxxxxxxxx>
Re: [PATCH] fsverity: mark builtin signatures as deprecated
From
: Luca Boccassi <bluca@xxxxxxxxxx>
Re: [PATCH] fsverity: don't check builtin signatures when require_signatures=0
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH] fsverity: mark builtin signatures as deprecated
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH] fsverity: mark builtin signatures as deprecated
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v3 00/10] Add CA enforcement keyring restrictions
From
: Coiby Xu <coxu@xxxxxxxxxx>
Re: [PATCH 001/606] tpm: st33zp24: Convert to Convert to i2c's .probe_new()
From
: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
Re: [PATCH v3 00/10] Add CA enforcement keyring restrictions
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v3 00/10] Add CA enforcement keyring restrictions
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 00/10] Add CA enforcement keyring restrictions
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH v3 00/10] Add CA enforcement keyring restrictions
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 00/10] Add CA enforcement keyring restrictions
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH] ima: add check for khdr->buffer_size
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
Re: IMA & tpm_unsealdata with PCR 10
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH v3 04/10] KEYS: X.509: Parse Key Usage
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 03/10] KEYS: X.509: Parse Basic Constraints for CA
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
IMA & tpm_unsealdata with PCR 10
From
: Michaël Musset <mickamusset@xxxxxxxxx>
Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 07/10] KEYS: X.509: Flag Intermediate CA certs as endorsed
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 00/10] Add CA enforcement keyring restrictions
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
[PATCH v3 08/10] integrity: Use root of trust signature restriction
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v3 06/10] KEYS: Introduce keyring restriction that validates ca trust
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v3 10/10] integrity: restrict INTEGRITY_KEYRING_MACHINE to restrict_link_by_ca
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v3 09/10] KEYS: CA link restriction
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v3 03/10] KEYS: X.509: Parse Basic Constraints for CA
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v3 02/10] KEYS: Add missing function documentation
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v3 07/10] KEYS: X.509: Flag Intermediate CA certs as endorsed
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v3 05/10] KEYS: Introduce a CA endorsed flag
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v3 00/10] Add CA enforcement keyring restrictions
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v3 04/10] KEYS: X.509: Parse Key Usage
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v3 01/10] KEYS: Create static version of public_key_verify_signature
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [GIT PULL] integrity: susbsytem updates for v6.2
From
: pr-tracker-bot@xxxxxxxxxx
[GIT PULL] integrity: susbsytem updates for v6.2
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5 2/6] ocfs2: Switch to security_inode_init_security()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH v2 00/10] Add CA enforcement keyring restrictions
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Firmware bug on ASRock X370/Ryzen 2600 prevents use of TPM device
From
: "Genevieve" <genevieve@sunlashed.garden>
Re: [PATCH v2 00/10] Add CA enforcement keyring restrictions
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [GIT PULL] tpmdd updates for tpmdd-next-v6.2-rc1
From
: pr-tracker-bot@xxxxxxxxxx
Re: (subset) [PATCH 000/606] i2c: Complete conversion to i2c_probe_new
From
: Robert Foss <robert.foss@xxxxxxxxxx>
Re: [PATCH v3 0/3] certs: Prevent spurious errors on repeated blacklisting
From
: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
[PATCH] tpm_crb: Add support for CRB devices based on Pluton
From
: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
Re: [PATCH v2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH 01/11] tpm: move buffer handling from static inlines to real functions
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 03/11] tpm: add cursor based buffer functions for response parsing
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
Re: [PATCH 01/11] tpm: move buffer handling from static inlines to real functions
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH 03/11] tpm: add cursor based buffer functions for response parsing
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH 06/11] tpm: Add full HMAC and encrypt/decrypt session handling code
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 01/11] tpm: move buffer handling from static inlines to real functions
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 06/11] tpm: Add full HMAC and encrypt/decrypt session handling code
From
: Dan Carpenter <error27@xxxxxxxxx>
Re: [PATCH 01/11] tpm: move buffer handling from static inlines to real functions
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3] char: tpm: Protect tpm_pm_suspend with locks
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] fsverity: mark builtin signatures as deprecated
From
: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH 06/11] tpm: Add full HMAC and encrypt/decrypt session handling code
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH 11/11] Documentation: add tpm-security.rst
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH 10/11] tpm: add the null key name as a sysfs export
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH 09/11] KEYS: trusted: Add session encryption protection to the seal/unseal path
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH 08/11] tpm: add session encryption protection to tpm2_get_random()
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH 07/11] tpm: add hmac checks to tpm2_pcr_extend()
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH 06/11] tpm: Add full HMAC and encrypt/decrypt session handling code
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH 05/11] tpm: export the context save and load commands
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH 04/11] tpm: add buffer function to point to returned parameters
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH 02/11] tpm: add buffer handling for TPM2B types
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH 03/11] tpm: add cursor based buffer functions for response parsing
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH 00/11] add integrity and security to TPM2 transactions
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH 01/11] tpm: move buffer handling from static inlines to real functions
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 00/10] Add CA enforcement keyring restrictions
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH] KEYS: asymmetric: Make a copy of sig and digest in vmalloced stack
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH] KEYS: asymmetric: Make a copy of sig and digest in vmalloced stack
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: (subset) [PATCH 000/606] i2c: Complete conversion to i2c_probe_new
From
: Robert Foss <robert.foss@xxxxxxxxxx>
Re: [PATCH v2 00/10] Add CA enforcement keyring restrictions
From
: Coiby Xu <coxu@xxxxxxxxxx>
Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
From
: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
From
: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
From
: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
From
: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
From
: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
[RFC] IMA LSM based rule race condition issue on 4.19 LTS
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
Re: [PATCH] KEYS: asymmetric: Make a copy of sig and digest in vmalloced stack
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH] fsverity: mark builtin signatures as deprecated
From
: Luca Boccassi <bluca@xxxxxxxxxx>
Re: [PATCH] fsverity: mark builtin signatures as deprecated
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH] fsverity: don't check builtin signatures when require_signatures=0
From
: Luca Boccassi <bluca@xxxxxxxxxx>
Re: [PATCH] fsverity: mark builtin signatures as deprecated
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
[PATCH] KEYS: asymmetric: Make a copy of sig and digest in vmalloced stack
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[GIT PULL] tpmdd updates for tpmdd-next-v6.2-rc1
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [RESEND PATCH v3] tpm: st33zp24: remove pointless checks on probe
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3] char: tpm: Protect tpm_pm_suspend with locks
From
: Vlastimil Babka <vbabka@xxxxxxx>
Re: [PATCH] fsverity: mark builtin signatures as deprecated
From
: Luca Boccassi <bluca@xxxxxxxxxx>
Re: [PATCH v3] char: tpm: Protect tpm_pm_suspend with locks
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2 1/2] evm: Alloc evm_digest in evm_verify_hmac() if CONFIG_VMAP_STACK=y
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH v2 02/10] KEYS: Add missing function documentation
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH] fsverity: mark builtin signatures as deprecated
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH] fsverity: don't check builtin signatures when require_signatures=0
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v2 1/2] evm: Alloc evm_digest in evm_verify_hmac() if CONFIG_VMAP_STACK=y
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5 00/11] Encrypted Hibernation
From
: Evan Green <evgreen@xxxxxxxxxxxx>
Re: [PATCH v2 01/10] KEYS: Create static version of public_key_verify_signature
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH v2 03/10] KEYS: X.509: Parse Basic Constraints for CA
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v2 00/10] Add CA enforcement keyring restrictions
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v2 10/10] integrity: restrict INTEGRITY_KEYRING_MACHINE to restrict_link_by_ca
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v2 04/10] KEYS: X.509: Parse Key Usage
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v2 09/10] KEYS: CA link restriction
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v2 01/10] KEYS: Create static version of public_key_verify_signature
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v2 08/10] integrity: Use root of trust signature restriction
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v2 07/10] KEYS: X.509: Flag Intermediate CA certs as endorsed
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v2 06/10] KEYS: Introduce keyring restriction that validates ca trust
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v2 05/10] KEYS: Introduce a CA endorsed flag
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v2 02/10] KEYS: Add missing function documentation
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH] public_key: Add a comment to public_key_signature struct definition
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[RESEND PATCH v3] tpm: st33zp24: remove pointless checks on probe
From
: Dmitry Torokhov <dmitry.torokhov@xxxxxxxxx>
Re: [PATCH v5 04/11] security: keys: trusted: Include TPM2 creation data
From
: Evan Green <evgreen@xxxxxxxxxxxx>
Re: [PATCH ima-evm-utils] Experimental fsverity.test related GA CI improvements
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils] Experimental fsverity.test related GA CI improvements
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH ima-evm-utils] Experimental fsverity.test related GA CI improvements
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 1/2] evm: Alloc evm_digest in evm_verify_hmac() if CONFIG_VMAP_STACK=y
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
Re: [PATCH 1/1] tpm/tpm_crb: Fix error message in __crb_relinquish_locality()
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH 1/1] tpm/tpm_crb: Fix error message in __crb_relinquish_locality()
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3] char: tpm: Protect tpm_pm_suspend with locks
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v3] char: tpm: Protect tpm_pm_suspend with locks
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3] char: tpm: Protect tpm_pm_suspend with locks
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v11 13/14] tpm, tpm_tis: startup chip before testing for interrupts
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v11 13/14] tpm, tpm_tis: startup chip before testing for interrupts
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] tpm/tpm_ftpm_tee: Fix error handling in ftpm_mod_init()
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3 1/3] certs: log hash value on blacklist error
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3] char: tpm: Protect tpm_pm_suspend with locks
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v5 04/11] security: keys: trusted: Include TPM2 creation data
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [PATCH v2 1/2] evm: Alloc evm_digest in evm_verify_hmac() if CONFIG_VMAP_STACK=y
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v3] char: tpm: Protect tpm_pm_suspend with locks
From
: Jan Dąbroś <jsd@xxxxxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]