Linux Integrity
[Prev Page][Next Page]
- [PATCH v3 2/2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 1/2] lib/mpi: Fix buffer overrun when SG is too long
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [v2 PATCH] lib/mpi: Fix buffer overrun when SG is too long
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] lib/mpi: Fix buffer overrun when SG is too long
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: Question on loading trusted key with keyctl command
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Question on loading trusted key with keyctl command
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: Question on loading trusted key with keyctl command
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Question on loading trusted key with keyctl command
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: Question on loading trusted key with keyctl command
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Question on loading trusted key with keyctl command
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] libimaevm: do not crash if the certificate cannot be read
- From: Alberto Mardegan <photo@xxxxxxxx>
- Re: [PATCH] lib/mpi: Fix buffer overrun when SG is too long
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH] lib/mpi: Fix buffer overrun when SG is too long
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Question on loading trusted key with keyctl command
- From: Sughosh Ganu <sughosh.ganu@xxxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Question on loading trusted key with keyctl command
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: Question on loading trusted key with keyctl command
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Question on loading trusted key with keyctl command
- From: Sughosh Ganu <sughosh.ganu@xxxxxxxxxx>
- Re: [PATCH v2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [PATCH v3 00/10] Add CA enforcement keyring restrictions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] fsverity: don't check builtin signatures when require_signatures=0
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] fsverity: don't check builtin signatures when require_signatures=0
- From: Luca Boccassi <bluca@xxxxxxxxxx>
- Re: [PATCH] fsverity: mark builtin signatures as deprecated
- From: Luca Boccassi <bluca@xxxxxxxxxx>
- Re: [PATCH] fsverity: don't check builtin signatures when require_signatures=0
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] fsverity: mark builtin signatures as deprecated
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] fsverity: mark builtin signatures as deprecated
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3 00/10] Add CA enforcement keyring restrictions
- From: Coiby Xu <coxu@xxxxxxxxxx>
- Re: [PATCH 001/606] tpm: st33zp24: Convert to Convert to i2c's .probe_new()
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [PATCH v3 00/10] Add CA enforcement keyring restrictions
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 00/10] Add CA enforcement keyring restrictions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 00/10] Add CA enforcement keyring restrictions
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v3 00/10] Add CA enforcement keyring restrictions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 00/10] Add CA enforcement keyring restrictions
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH] ima: add check for khdr->buffer_size
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: IMA & tpm_unsealdata with PCR 10
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 04/10] KEYS: X.509: Parse Key Usage
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 03/10] KEYS: X.509: Parse Basic Constraints for CA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- IMA & tpm_unsealdata with PCR 10
- From: Michaël Musset <mickamusset@xxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 07/10] KEYS: X.509: Flag Intermediate CA certs as endorsed
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 00/10] Add CA enforcement keyring restrictions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- [PATCH v3 08/10] integrity: Use root of trust signature restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 06/10] KEYS: Introduce keyring restriction that validates ca trust
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 10/10] integrity: restrict INTEGRITY_KEYRING_MACHINE to restrict_link_by_ca
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 09/10] KEYS: CA link restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 03/10] KEYS: X.509: Parse Basic Constraints for CA
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 02/10] KEYS: Add missing function documentation
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 07/10] KEYS: X.509: Flag Intermediate CA certs as endorsed
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 05/10] KEYS: Introduce a CA endorsed flag
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 00/10] Add CA enforcement keyring restrictions
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 04/10] KEYS: X.509: Parse Key Usage
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 01/10] KEYS: Create static version of public_key_verify_signature
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [GIT PULL] integrity: susbsytem updates for v6.2
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] integrity: susbsytem updates for v6.2
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/6] ocfs2: Switch to security_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/10] Add CA enforcement keyring restrictions
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Firmware bug on ASRock X370/Ryzen 2600 prevents use of TPM device
- From: "Genevieve" <genevieve@sunlashed.garden>
- Re: [PATCH v2 00/10] Add CA enforcement keyring restrictions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for tpmdd-next-v6.2-rc1
- From: pr-tracker-bot@xxxxxxxxxx
- Re: (subset) [PATCH 000/606] i2c: Complete conversion to i2c_probe_new
- From: Robert Foss <robert.foss@xxxxxxxxxx>
- Re: [PATCH v3 0/3] certs: Prevent spurious errors on repeated blacklisting
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- [PATCH] tpm_crb: Add support for CRB devices based on Pluton
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 01/11] tpm: move buffer handling from static inlines to real functions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 03/11] tpm: add cursor based buffer functions for response parsing
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [PATCH 01/11] tpm: move buffer handling from static inlines to real functions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 03/11] tpm: add cursor based buffer functions for response parsing
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 06/11] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/11] tpm: move buffer handling from static inlines to real functions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 06/11] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: Dan Carpenter <error27@xxxxxxxxx>
- Re: [PATCH 01/11] tpm: move buffer handling from static inlines to real functions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] char: tpm: Protect tpm_pm_suspend with locks
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] fsverity: mark builtin signatures as deprecated
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 06/11] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 11/11] Documentation: add tpm-security.rst
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 10/11] tpm: add the null key name as a sysfs export
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 09/11] KEYS: trusted: Add session encryption protection to the seal/unseal path
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 08/11] tpm: add session encryption protection to tpm2_get_random()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 07/11] tpm: add hmac checks to tpm2_pcr_extend()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 06/11] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 05/11] tpm: export the context save and load commands
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 04/11] tpm: add buffer function to point to returned parameters
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 02/11] tpm: add buffer handling for TPM2B types
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 03/11] tpm: add cursor based buffer functions for response parsing
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 00/11] add integrity and security to TPM2 transactions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 01/11] tpm: move buffer handling from static inlines to real functions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/10] Add CA enforcement keyring restrictions
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asymmetric: Make a copy of sig and digest in vmalloced stack
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asymmetric: Make a copy of sig and digest in vmalloced stack
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: (subset) [PATCH 000/606] i2c: Complete conversion to i2c_probe_new
- From: Robert Foss <robert.foss@xxxxxxxxxx>
- Re: [PATCH v2 00/10] Add CA enforcement keyring restrictions
- From: Coiby Xu <coxu@xxxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [RFC] IMA LSM based rule race condition issue on 4.19 LTS
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [PATCH] KEYS: asymmetric: Make a copy of sig and digest in vmalloced stack
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] fsverity: mark builtin signatures as deprecated
- From: Luca Boccassi <bluca@xxxxxxxxxx>
- Re: [PATCH] fsverity: mark builtin signatures as deprecated
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] fsverity: don't check builtin signatures when require_signatures=0
- From: Luca Boccassi <bluca@xxxxxxxxxx>
- Re: [PATCH] fsverity: mark builtin signatures as deprecated
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] KEYS: asymmetric: Make a copy of sig and digest in vmalloced stack
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [GIT PULL] tpmdd updates for tpmdd-next-v6.2-rc1
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RESEND PATCH v3] tpm: st33zp24: remove pointless checks on probe
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] char: tpm: Protect tpm_pm_suspend with locks
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH] fsverity: mark builtin signatures as deprecated
- From: Luca Boccassi <bluca@xxxxxxxxxx>
- Re: [PATCH v3] char: tpm: Protect tpm_pm_suspend with locks
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/2] evm: Alloc evm_digest in evm_verify_hmac() if CONFIG_VMAP_STACK=y
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 02/10] KEYS: Add missing function documentation
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH] fsverity: mark builtin signatures as deprecated
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] fsverity: don't check builtin signatures when require_signatures=0
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 1/2] evm: Alloc evm_digest in evm_verify_hmac() if CONFIG_VMAP_STACK=y
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 00/11] Encrypted Hibernation
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- Re: [PATCH v2 01/10] KEYS: Create static version of public_key_verify_signature
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v2 03/10] KEYS: X.509: Parse Basic Constraints for CA
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v2 00/10] Add CA enforcement keyring restrictions
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v2 10/10] integrity: restrict INTEGRITY_KEYRING_MACHINE to restrict_link_by_ca
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v2 04/10] KEYS: X.509: Parse Key Usage
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v2 09/10] KEYS: CA link restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v2 01/10] KEYS: Create static version of public_key_verify_signature
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v2 08/10] integrity: Use root of trust signature restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v2 07/10] KEYS: X.509: Flag Intermediate CA certs as endorsed
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v2 06/10] KEYS: Introduce keyring restriction that validates ca trust
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v2 05/10] KEYS: Introduce a CA endorsed flag
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v2 02/10] KEYS: Add missing function documentation
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH] public_key: Add a comment to public_key_signature struct definition
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RESEND PATCH v3] tpm: st33zp24: remove pointless checks on probe
- From: Dmitry Torokhov <dmitry.torokhov@xxxxxxxxx>
- Re: [PATCH v5 04/11] security: keys: trusted: Include TPM2 creation data
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] Experimental fsverity.test related GA CI improvements
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] Experimental fsverity.test related GA CI improvements
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] Experimental fsverity.test related GA CI improvements
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] evm: Alloc evm_digest in evm_verify_hmac() if CONFIG_VMAP_STACK=y
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] tpm/tpm_crb: Fix error message in __crb_relinquish_locality()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/1] tpm/tpm_crb: Fix error message in __crb_relinquish_locality()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] char: tpm: Protect tpm_pm_suspend with locks
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v3] char: tpm: Protect tpm_pm_suspend with locks
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] char: tpm: Protect tpm_pm_suspend with locks
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 13/14] tpm, tpm_tis: startup chip before testing for interrupts
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 13/14] tpm, tpm_tis: startup chip before testing for interrupts
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm/tpm_ftpm_tee: Fix error handling in ftpm_mod_init()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 1/3] certs: log hash value on blacklist error
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] char: tpm: Protect tpm_pm_suspend with locks
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v5 04/11] security: keys: trusted: Include TPM2 creation data
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] evm: Alloc evm_digest in evm_verify_hmac() if CONFIG_VMAP_STACK=y
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3] char: tpm: Protect tpm_pm_suspend with locks
- From: Jan Dąbroś <jsd@xxxxxxxxxxxx>
- Re: [PATCH v3] char: tpm: Protect tpm_pm_suspend with locks
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v3] char: tpm: Protect tpm_pm_suspend with locks
- From: Thorsten Leemhuis <regressions@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] evm: Alloc evm_digest in evm_verify_hmac() if CONFIG_VMAP_STACK=y
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
- From: "Dr. Greg" <greg@xxxxxxxxxxxx>
- Re: [PATCH v2 1/2] evm: Alloc evm_digest in evm_verify_hmac() if CONFIG_VMAP_STACK=y
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 1/2] evm: Alloc evm_digest in evm_verify_hmac() if CONFIG_VMAP_STACK=y
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] ima: Alloc ima_max_digest_data in xattr_verify() if CONFIG_VMAP_STACK=y
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 1/2] evm: Alloc evm_digest in evm_verify_hmac() if CONFIG_VMAP_STACK=y
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v7 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v7 6/6] evm: Support multiple LSMs providing an xattr
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v7 3/6] security: Remove security_old_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v7 2/6] ocfs2: Switch to security_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v7 5/6] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v7 1/6] reiserfs: Switch to security_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v7 0/6] evm: Do HMAC of multiple per LSM xattrs for new inodes
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v2 2/2] ima: Alloc ima_max_digest_data in xattr_verify() if CONFIG_VMAP_STACK=y
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v2 1/2] evm: Alloc evm_digest in evm_verify_hmac() if CONFIG_VMAP_STACK=y
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v2 0/2] ima/evm: Ensure digest to verify is in linear mapping area
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH] tpm/ppi: use sysfs_emit() to instead of scnprintf()
- From: <ye.xingchen@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils] Experimental fsverity.test related GA CI improvements
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH ima-evm-utils] Experimental fsverity.test related GA CI improvements
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v6 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
- From: "Dr. Greg" <greg@xxxxxxxxxxxx>
- Re: [PATCH] ima: Make a copy of sig and digest in asymmetric_verify()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] ima: Make a copy of sig and digest in asymmetric_verify()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: Make a copy of sig and digest in asymmetric_verify()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5] evm: Correct inode_init_security hooks behaviors
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5] evm: Correct inode_init_security hooks behaviors
- From: Nicolas Bouchinet <nicolas.bouchinet@xxxxxxxxxxx>
- Re: [PATCH] ima: Fix hash dependency to correct algorithm
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/6] ocfs2: Switch to security_inode_init_security()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5] evm: Correct inode_init_security hooks behaviors
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5] evm: Correct inode_init_security hooks behaviors
- From: Nicolas Bouchinet <nicolas.bouchinet@xxxxxxxxxxx>
- Re: [PATCH v5] evm: Correct inode_init_security hooks behaviors
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] fsverity: simplify fsverity_get_digest()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5] evm: Correct inode_init_security hooks behaviors
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] fsverity: simplify fsverity_get_digest()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] fsverity: simplify fsverity_get_digest()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- RE: [PATCH 1/1] tpm/tpm_crb: Fix error message in __crb_relinquish_locality()
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- [PATCH v3] char: tpm: Protect tpm_pm_suspend with locks
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v2 1/3] char: tpm: Protect tpm_pm_suspend with locks
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v2 1/3] char: tpm: Protect tpm_pm_suspend with locks
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [REGRESSION] suspend to ram fails in 6.1 due to tpm errors
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH] lockdown: kexec_file: prevent unsigned kernel image when KEXEC_SIG not enabled
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] char: tpm: Protect tpm_pm_suspend with locks
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH v2 1/3] char: tpm: Protect tpm_pm_suspend with locks
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v2 1/3] char: tpm: Protect tpm_pm_suspend with locks
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [REGRESSION] suspend to ram fails in 6.1 due to tpm errors
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [REGRESSION] suspend to ram fails in 6.1 due to tpm errors
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH v11 13/14] tpm, tpm_tis: startup chip before testing for interrupts
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [REGRESSION] suspend to ram fails in 6.1 due to tpm errors
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [REGRESSION] suspend to ram fails in 6.1 due to tpm errors
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH] tpm/tpm_ftpm_tee: Fix error handling in ftpm_mod_init()
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- Re: [PATCH v3 1/3] certs: log hash value on blacklist error
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- Re: [PATCH v11 09/14] tpm, tpm: Implement usage counter for locality
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 04/14] tpm, tpm_tis: Do not skip reset of original interrupt vector
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm/tpm_ftpm_tee: Fix error handling in ftpm_mod_init()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 005/606] tpm: tis_i2c: Convert to i2c's .probe_new()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 003/606] tpm: tpm_i2c_infineon: Convert to i2c's .probe_new()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 004/606] tpm: tpm_i2c_nuvoton: Convert to i2c's .probe_new()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 002/606] tpm: tpm_i2c_atmel: Convert to i2c's .probe_new()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 001/606] tpm: st33zp24: Convert to Convert to i2c's .probe_new()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 2/3] KEYS: Add key_create()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 1/3] certs: log hash value on blacklist error
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 3/3] tpm: tpm_tis: Add the missed acpi_put_table() to fix memory leak
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 2/3] tpm: tpm_crb: Add the missed acpi_put_table() to fix memory leak
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/3] tpm: acpi: Call acpi_put_table() to fix memory leak
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] tpm/tpm_crb: Fix error message in __crb_relinquish_locality()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 01/11] tpm: Add support for in-kernel resetting of PCRs
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 01/11] tpm: Add support for in-kernel resetting of PCRs
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm: Add flag to use default cancellation policy
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 000/606] i2c: Complete conversion to i2c_probe_new
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxx>
- [PATCH] tpm_crb: Remove a useless include
- From: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
- Re: [PATCH] tpm: tis_i2c: Fix sanity check interrupt enable mask
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v5] evm: Correct inode_init_security hooks behaviors
- From: Nicolas Bouchinet <nicolas.bouchinet@xxxxxxxxxxx>
- [PATCH] ima: Fix hash dependency to correct algorithm
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v11 11/14] tpm, tpm_tis: Claim locality in interrupt handler
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v11 14/14] tpm, tpm_tis: Enable interrupt test
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v11 09/14] tpm, tpm: Implement usage counter for locality
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v11 08/14] tpm, tpm_tis: do not check for the active locality in interrupt handler
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v11 06/14] tpm, tpm_tis: Only handle supported interrupts
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v11 13/14] tpm, tpm_tis: startup chip before testing for interrupts
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v11 01/14] tpm, tpm_tis: Avoid cache incoherency in test for interrupts
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v11 00/14] TPM IRQ fixes
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v11 04/14] tpm, tpm_tis: Do not skip reset of original interrupt vector
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v11 03/14] tpm, tpm_tis: Disable interrupts if tpm_tis_probe_irq() failed
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v11 12/14] tpm, tpm_tis: Claim locality when interrupts are reenabled on resume
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v11 05/14] tpm, tpm_tis: Claim locality before writing interrupt registers
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v11 07/14] tpm, tpm_tis: Move interrupt mask checks into own function
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v11 02/14] tpm, tpm_tis: Claim locality before writing TPM_INT_ENABLE register
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v11 10/14] tpm, tpm_tis: Request threaded interrupt handler
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH v10 04/14] tpm, tpm_tis: Do not skip reset of original interrupt vector
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH v6 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/6] ocfs2: Switch to security_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 04/14] tpm, tpm_tis: Do not skip reset of original interrupt vector
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] tpm/tpm_ftpm_tee: Fix error handling in ftpm_mod_init()
- From: Yuan Can <yuancan@xxxxxxxxxx>
- Re: [PATCH v6 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 05/14] tpm, tpm_tis: Claim locality before writing interrupt registers
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v10 12/14] tpm, tpm_tis: Claim locality when interrupts are reenabled on resume
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 2/6] ocfs2: Switch to security_inode_init_security()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 0/6] evm: Do HMAC of multiple per LSM xattrs for new inodes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v6 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v6 0/6] evm: Do HMAC of multiple per LSM xattrs for new inodes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v6 2/6] ocfs2: Switch to security_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 3/6] security: Remove security_old_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 5/6] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 0/6] evm: Do HMAC of multiple per LSM xattrs for new inodes
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 6/6] evm: Support multiple LSMs providing an xattr
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 1/6] reiserfs: Switch to security_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] ima: Make a copy of sig and digest in asymmetric_verify()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] ima: Make a copy of sig and digest in asymmetric_verify()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: Make a copy of sig and digest in asymmetric_verify()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/6] reiserfs: Switch to security_inode_init_security()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 0/6] evm: Prepare for moving to the LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 0/6] evm: Prepare for moving to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/6] evm: Prepare for moving to the LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v5 6/6] evm: Support multiple LSMs providing an xattr
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 2/6] ocfs2: Switch to security_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 5/6] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 1/6] reiserfs: Switch to security_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 3/6] security: Remove security_old_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 0/6] evm: Prepare for moving to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/5] reiserfs: Add missing calls to reiserfs_security_free()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 000/606] i2c: Complete conversion to i2c_probe_new
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH] ima: Make a copy of sig and digest in asymmetric_verify()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 000/606] i2c: Complete conversion to i2c_probe_new
- From: Jonathan Cameron <jic23@xxxxxxxxxx>
- RE: [PATCH 1/1] tpm/tpm_crb: Fix error message in __crb_relinquish_locality()
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/5] security: Rewrite security_old_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/5] reiserfs: Add missing calls to reiserfs_security_free()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] lockdown: kexec_file: prevent unsigned kernel image when KEXEC_SIG not enabled
- From: Coiby Xu <coxu@xxxxxxxxxx>
- [PATCH v2] lockdown: kexec_file: prevent unsigned kernel image when KEXEC_SIG not enabled
- From: Coiby Xu <coxu@xxxxxxxxxx>
- Re: [PATCH v4 2/5] security: Rewrite security_old_inode_init_security()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 1/5] reiserfs: Add missing calls to reiserfs_security_free()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 3/5] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/5] security: Rewrite security_old_inode_init_security()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] lockdown: kexec_file: prevent unsigned kernel image when KEXEC_SIG not enabled
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: Make a copy of sig and digest in asymmetric_verify()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 3/5] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 000/606] i2c: Complete conversion to i2c_probe_new
- From: Lee Jones <lee@xxxxxxxxxx>
- Re: [PATCH v4 2/5] security: Rewrite security_old_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v4] evm: Correct inode_init_security hooks behaviors
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH] lockdown: kexec_file: prevent unsigned kernel image when KEXEC_SIG not enabled
- From: Coiby Xu <coxu@xxxxxxxxxx>
- Re: [PATCH 000/606] i2c: Complete conversion to i2c_probe_new
- From: Sebastian Reichel <sebastian.reichel@xxxxxxxxxxxxx>
- [PATCH v10 13/14] tpm, tpm_tis: startup chip before testing for interrupts
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v10 10/14] tpm, tpm_tis: Request threaded interrupt handler
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v10 14/14] tpm, tpm_tis: Enable interrupt test
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v10 11/14] tpm, tpm_tis: Claim locality in interrupt handler
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v10 09/14] tpm, tpm: Implement usage counter for locality
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v10 06/14] tpm, tpm_tis: Only handle supported interrupts
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v10 05/14] tpm, tpm_tis: Claim locality before writing interrupt registers
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v10 02/14] tpm, tpm_tis: Claim locality before writing TPM_INT_ENABLE register
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v10 04/14] tpm, tpm_tis: Do not skip reset of original interrupt vector
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v10 12/14] tpm, tpm_tis: Claim locality when interrupts are reenabled on resume
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v10 01/14] tpm, tpm_tis: Avoid cache incoherency in test for interrupts
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v10 07/14] tpm, tpm_tis: Move interrupt mask checks into own function
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v10 08/14] tpm, tpm_tis: do not check for the active locality in interrupt handler
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v10 00/14] TPM IRQ fixes
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v10 03/14] tpm, tpm_tis: Disable interrupts if tpm_tis_probe_irq() failed
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH 000/606] i2c: Complete conversion to i2c_probe_new
- From: Wolfram Sang <wsa@xxxxxxxxxx>
- [PATCH] tpm: ibmvtpm: free irq on the error path in tpm_ibmvtpm_probe()
- From: Gaosheng Cui <cuigaosheng1@xxxxxxxxxx>
- Re: [PATCH 000/606] i2c: Complete conversion to i2c_probe_new
- From: patchwork-bot+chrome-platform@xxxxxxxxxx
- Re: [PATCH 000/606] i2c: Complete conversion to i2c_probe_new
- From: patchwork-bot+chrome-platform@xxxxxxxxxx
- [PATCH 000/606] i2c: Complete conversion to i2c_probe_new
- From: Uwe Kleine-König <uwe@xxxxxxxxxxxxxxxxx>
- [PATCH 002/606] tpm: tpm_i2c_atmel: Convert to i2c's .probe_new()
- From: Uwe Kleine-König <uwe@xxxxxxxxxxxxxxxxx>
- [PATCH 001/606] tpm: st33zp24: Convert to Convert to i2c's .probe_new()
- From: Uwe Kleine-König <uwe@xxxxxxxxxxxxxxxxx>
- [PATCH 004/606] tpm: tpm_i2c_nuvoton: Convert to i2c's .probe_new()
- From: Uwe Kleine-König <uwe@xxxxxxxxxxxxxxxxx>
- [PATCH 005/606] tpm: tis_i2c: Convert to i2c's .probe_new()
- From: Uwe Kleine-König <uwe@xxxxxxxxxxxxxxxxx>
- [PATCH 003/606] tpm: tpm_i2c_infineon: Convert to i2c's .probe_new()
- From: Uwe Kleine-König <uwe@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 3/5] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 3/5] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 3/5] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 4/5] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 3/5] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 4/5] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4] evm: Correct inode_init_security hooks behaviors
- From: Nicolas Bouchinet <nicolas.bouchinet@xxxxxxxxxxx>
- Re: [PATCH v4] evm: Correct inode_init_security hooks behaviors
- From: Nicolas Bouchinet <nicolas.bouchinet@xxxxxxxxxxx>
- Re: [PATCH v2 2/3] char: tpm: cr50: Use generic request/relinquish locality ops
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH v4 3/5] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 4/5] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 3/5] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/5] security: Rewrite security_old_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 3/3] certs: don't try to update blacklist keys
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- [PATCH v3 0/3] certs: Prevent spurious errors on repeated blacklisting
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- [PATCH v3 1/3] certs: log hash value on blacklist error
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- [PATCH v3 2/3] KEYS: Add key_create()
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- Re: [PATCH v4 3/5] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 3/5] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 3/5] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 4/5] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 3/5] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 5/5] evm: Support multiple LSMs providing an xattr
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 3/5] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/5] security: Rewrite security_old_inode_init_security()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 1/3] tpm: acpi: Call acpi_put_table() to fix memory leak
- From: Hanjun Guo <guohanjun@xxxxxxxxxx>
- [PATCH v2 2/3] tpm: tpm_crb: Add the missed acpi_put_table() to fix memory leak
- From: Hanjun Guo <guohanjun@xxxxxxxxxx>
- [PATCH v2 3/3] tpm: tpm_tis: Add the missed acpi_put_table() to fix memory leak
- From: Hanjun Guo <guohanjun@xxxxxxxxxx>
- [PATCH v2 0/3] ACPI table release for TPM drivers
- From: Hanjun Guo <guohanjun@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: acpi: Call acpi_put_table() to fix memory leak
- From: Hanjun Guo <guohanjun@xxxxxxxxxx>
- Re: [PATCH v4 1/5] reiserfs: Add missing calls to reiserfs_security_free()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: Fix misuse of dereference of pointer in template_desc_init_fields()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] integrity: Fix memory leakage in keyring allocation error path
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v1 0/4] Fix some issues in evmctl
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: tee: Make registered shm dependency explicit
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: tee: Make registered shm dependency explicit
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 2/3] KEYS: Add key_create()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] certs: Prevent spurious errors on repeated blacklisting
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 3/3] certs: don't try to update blacklist keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/3] certs: log more information on blacklist error
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 3/3] tpm: tpm_tis: Add the missed acpi_put_table() to fix memory leak
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/3] tpm: tpm_crb: Add the missed acpi_put_table() to fix memory leak
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: acpi: Call acpi_put_table() to fix memory leak
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH ima-evm-utils] Save ima-evm-utils sourceforge wiki
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [RFC PATCH ima-evm-utils] Save ima-evm-utils sourceforge wiki
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH ima-evm-utils] Save ima-evm-utils sourceforge wiki
- From: Petr Vorel <pvorel@xxxxxxx>
- [RFC PATCH ima-evm-utils] Save ima-evm-utils sourceforge wiki
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 04/11] security: keys: trusted: Include TPM2 creation data
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH v5 04/11] security: keys: trusted: Include TPM2 creation data
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH v5 04/11] security: keys: trusted: Include TPM2 creation data
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH v5 04/11] security: keys: trusted: Include TPM2 creation data
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [RFC PATCH ima-evm-utils] tests: add fsverity measurement test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 12/12] tpm, tpm_tis: Enable interrupt test
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- RE: [PATCH] ima: Fix misuse of dereference of pointer in template_desc_init_fields()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v5 04/11] security: keys: trusted: Include TPM2 creation data
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/2] ima: Handle -ESTALE returned by ima_filter_rule_match()
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [PATCH v2] tpm: Add flag to use default cancellation policy
- From: Joel Stanley <joel@xxxxxxxxx>
- Re: [PATCH] tpm: tis_i2c: Fix sanity check interrupt enable mask
- From: Joel Stanley <joel@xxxxxxxxx>
- Re: [PATCH v5 11/11] PM: hibernate: seal the encryption key with a PCR policy
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v5 10/11] PM: hibernate: Verify the digest encryption key
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v5 09/11] PM: hibernate: Mix user key in encrypted hibernate
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v5 08/11] PM: hibernate: Use TPM-backed keys to encrypt image
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v5 07/11] PM: hibernate: Add kernel-based encryption
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v5 06/11] security: keys: trusted: Verify creation data
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v5 05/11] security: keys: trusted: Allow storage of PCR values in creation data
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils v4 01/17] Revert "Reset 'errno' after failure to open or access a file"
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 04/11] security: keys: trusted: Include TPM2 creation data
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v5 01/11] tpm: Add support for in-kernel resetting of PCRs
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- RE: [PATCH 1/1] tpm/tpm_crb: Fix error message in __crb_relinquish_locality()
- From: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
- [PATCH] ima: Fix misuse of dereference of pointer in template_desc_init_fields()
- From: Xiu Jianfeng <xiujianfeng@xxxxxxxxxx>
- [PATCH v5 09/11] PM: hibernate: Mix user key in encrypted hibernate
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH v5 10/11] PM: hibernate: Verify the digest encryption key
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH v5 11/11] PM: hibernate: seal the encryption key with a PCR policy
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH v5 08/11] PM: hibernate: Use TPM-backed keys to encrypt image
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH v5 07/11] PM: hibernate: Add kernel-based encryption
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH v5 05/11] security: keys: trusted: Allow storage of PCR values in creation data
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH v5 06/11] security: keys: trusted: Verify creation data
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH v5 04/11] security: keys: trusted: Include TPM2 creation data
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH v5 02/11] tpm: Export and rename tpm2_find_and_validate_cc()
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH v5 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH v5 01/11] tpm: Add support for in-kernel resetting of PCRs
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH v5 00/11] Encrypted Hibernation
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- Re: [PATCH v4 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH 1/1] tpm/tpm_crb: Fix error message in __crb_relinquish_locality()
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v8 0/4] tpm: Preserve TPM measurement log across kexec (ppc64)
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2] integrity: Fix memory leakage in keyring allocation error path
- From: GUO Zihua <guozihua@xxxxxxxxxx>
- Re: [PATCH v8 0/4] tpm: Preserve TPM measurement log across kexec (ppc64)
- From: Coiby Xu <coxu@xxxxxxxxxx>
- Re: [PATCH v4 09/11] PM: hibernate: Mix user key in encrypted hibernate
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- Invalid TPM_STS.x ... dumping stack for forensics... tpm_try_transmit: send(): error -62
- From: Martin Maurer <referme@xxxxxx>
- Re: [PATCH v4 09/11] PM: hibernate: Mix user key in encrypted hibernate
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v8 16/17] integrity: Trust MOK keys if MokListTrustedRT found
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v8 16/17] integrity: Trust MOK keys if MokListTrustedRT found
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v9 00/12] TPM IRQ fixes
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v9 08/12] tpm, tpm: Implement usage counter for locality
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v9 12/12] tpm, tpm_tis: Enable interrupt test
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v9 02/12] tpm, tpm_tis: Claim locality before writing TPM_INT_ENABLE register
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v9 10/12] tpm, tpm_tis: Claim locality in interrupt handler
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v9 07/12] tpm, tpm_tis: do not check for the active locality in interrupt handler
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v9 05/12] tpm, tpm_tis: Only handle supported interrupts
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v9 04/12] tpm, tmp_tis: Claim locality before writing interrupt registers
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v9 09/12] tpm, tpm_tis: Request threaded interrupt handler
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v9 06/12] tpm, tpm_tis: Move interrupt mask checks into own function
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v9 11/12] tpm, tpm_tis: Claim locality when interrupts are reenabled on resume
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v9 03/12] tpm, tpm_tis: Disable interrupts if tpm_tis_probe_irq() failed
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v9 01/12] tpm, tpm_tis: Avoid cache incoherency in test for interrupts
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH v8 16/17] integrity: Trust MOK keys if MokListTrustedRT found
- From: Morten Linderud <morten@xxxxxxxxxxx>
- Re: [PATCH v8 16/17] integrity: Trust MOK keys if MokListTrustedRT found
- From: Morten Linderud <morten@xxxxxxxxxxx>
- Re: [PATCH v8 16/17] integrity: Trust MOK keys if MokListTrustedRT found
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: tee: Make registered shm dependency explicit
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH] KEYS: trusted: tee: Make registered shm dependency explicit
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v4 5/5] evm: Support multiple LSMs providing an xattr
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 3/5] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 2/5] security: Rewrite security_old_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 4/5] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 1/5] reiserfs: Add missing calls to reiserfs_security_free()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 0/5] evm: Prepare for moving to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 16/17] integrity: Trust MOK keys if MokListTrustedRT found
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v8 16/17] integrity: Trust MOK keys if MokListTrustedRT found
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v4 09/11] PM: hibernate: Mix user key in encrypted hibernate
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- Re: [PATCH v4 04/11] security: keys: trusted: Include TPM2 creation data
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- Re: [PATCH v4 10/11] PM: hibernate: Verify the digest encryption key
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- Re: [PATCH v4 07/11] PM: hibernate: Add kernel-based encryption
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- Re: [PATCH v8 16/17] integrity: Trust MOK keys if MokListTrustedRT found
- From: Morten Linderud <morten@xxxxxxxxxxx>
- Re: [PATCH] certs: Prevent spurious errors on repeated blacklisting
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH 0/7] Add CA enforcement keyring restrictions
- From: Elaine Palmer <erpalmer@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/7] Add CA enforcement keyring restrictions
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH] integrity: Free key restriction when keyring allocation fails
- From: GUO Zihua <guozihua@xxxxxxxxxx>
- [PATCH 3/3] tpm: tpm_tis: Add the missed acpi_put_table() to fix memory leak
- From: Hanjun Guo <guohanjun@xxxxxxxxxx>
- [PATCH 2/3] tpm: tpm_crb: Add the missed acpi_put_table() to fix memory leak
- From: Hanjun Guo <guohanjun@xxxxxxxxxx>
- [PATCH 1/3] tpm: acpi: Call acpi_put_table() to fix memory leak
- From: Hanjun Guo <guohanjun@xxxxxxxxxx>
- [PATCH 0/3] ACPI table release for TPM drivers
- From: Hanjun Guo <guohanjun@xxxxxxxxxx>
- [PATCH v2 2/3] KEYS: Add key_create()
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- [PATCH v2 0/3] certs: Prevent spurious errors on repeated blacklisting
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- [PATCH v2 3/3] certs: don't try to update blacklist keys
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- [PATCH v2 1/3] certs: log more information on blacklist error
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- Re: [PATCH 0/7] Add CA enforcement keyring restrictions
- From: Elaine Palmer <erpalmerny@xxxxxxxxx>
- Re: [PATCH v4 04/11] security: keys: trusted: Include TPM2 creation data
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- Re: [PATCH] certs: Prevent spurious errors on repeated blacklisting
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v4 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH v2] tpm: Add flag to use default cancellation policy
- From: Eddie James <eajames@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] char: tpm: cr50: Move i2c locking to request/relinquish locality ops
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] certs: Prevent spurious errors on repeated blacklisting
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] char: tpm: Protect tpm_pm_suspend with locks
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] certs: Prevent spurious errors on repeated blacklisting
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RESEND][RFC][PATCH 2/3] bpf-lsm: Limit values that can be returned by security modules
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 08/11] tpm, tpm: Implement usage counter for locality
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RESEND][RFC][PATCH 2/3] bpf-lsm: Limit values that can be returned by security modules
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH] certs: Prevent spurious errors on repeated blacklisting
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- Re: [PATCH] certs: Prevent spurious errors on repeated blacklisting
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RESEND][RFC][PATCH 2/3] bpf-lsm: Limit values that can be returned by security modules
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v4] evm: Correct inode_init_security hooks behaviors
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v5 02/17] log and reset 'errno' after failure to open non-critical files
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 07/11] PM: hibernate: Add kernel-based encryption
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 02/11] tpm: Export and rename tpm2_find_and_validate_cc()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 3/3] char: tpm: cr50: Move i2c locking to request/relinquish locality ops
- From: Jan Dąbroś <jsd@xxxxxxxxxxxx>
- Re: [PATCH v2 2/3] char: tpm: cr50: Use generic request/relinquish locality ops
- From: Jan Dąbroś <jsd@xxxxxxxxxxxx>
- Re: [PATCH v2 3/3] char: tpm: cr50: Move i2c locking to request/relinquish locality ops
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 2/3] char: tpm: cr50: Use generic request/relinquish locality ops
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/3] char: tpm: Protect tpm_pm_suspend with locks
- From: Jan Dąbroś <jsd@xxxxxxxxxxxx>
- [PATCH] integrity: iint: Remove unnecessary (void*) conversions
- From: Li zeming <zeming@xxxxxxxxxxxx>
- Re: [PATCH v2 1/3] char: tpm: Protect tpm_pm_suspend with locks
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4] evm: Correct inode_init_security hooks behaviors
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RESEND][RFC][PATCH 2/3] bpf-lsm: Limit values that can be returned by security modules
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH ima-evm-utils v5 01/17] Revert "Reset 'errno' after failure to open or access a file"
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH ima-evm-utils v5 02/17] log and reset 'errno' after failure to open non-critical files
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH ima-evm-utils v5 01/17] Revert "Reset 'errno' after failure to open or access a file"
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 0/7] Add CA enforcement keyring restrictions
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [External] Re: [BUG] blacklist: Problem blacklisting hash (-13) during boot
- From: Mark Pearson <markpearson@xxxxxxxxxx>
- Re: [BUG] blacklist: Problem blacklisting hash (-13) during boot
- From: Thomas Weißschuh <thomas@xxxxxxxx>
- Re: [PATCH v4 10/11] PM: hibernate: Verify the digest encryption key
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 09/11] PM: hibernate: Mix user key in encrypted hibernate
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 08/11] PM: hibernate: Use TPM-backed keys to encrypt image
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 07/11] PM: hibernate: Add kernel-based encryption
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 06/11] security: keys: trusted: Verify creation data
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 05/11] security: keys: trusted: Allow storage of PCR values in creation data
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 04/11] security: keys: trusted: Include TPM2 creation data
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v5 10/17] Disable use of OpenSSL "engine" support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v4 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 02/11] tpm: Export and rename tpm2_find_and_validate_cc()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [BUG] blacklist: Problem blacklisting hash (-13) during boot
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v8 08/11] tpm, tpm: Implement usage counter for locality
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [RESEND][RFC][PATCH 2/3] bpf-lsm: Limit values that can be returned by security modules
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v4] evm: Correct inode_init_security hooks behaviors
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/7] Add CA enforcement keyring restrictions
- From: Coiby Xu <coxu@xxxxxxxxxx>
- [PATCH] ima: Make a copy of sig and digest in asymmetric_verify()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v4 01/17] Revert "Reset 'errno' after failure to open or access a file"
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH 1/3] char: tpm: Protect tpm_pm_suspend with locks
- From: Tim Van Patten <timvp@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils v5 02/17] log and reset 'errno' after failure to open non-critical files
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v5 02/17] log and reset 'errno' after failure to open non-critical files
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v5 02/17] log and reset 'errno' after failure to open non-critical files
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v5 01/17] Revert "Reset 'errno' after failure to open or access a file"
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v5 15/17] Compile a newer version of OpenSSL
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v5 17/17] Make sure the key file is a regular file
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v1 0/4] Fix some issues in evmctl
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v4 01/17] Revert "Reset 'errno' after failure to open or access a file"
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v5 16/17] Build OpenSSL without engine support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v5 17/17] Make sure the key file is a regular file
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v5 15/17] Compile a newer version of OpenSSL
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v5 14/17] Base sm2/sm3 test on openssl version installed
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v5 12/17] Limit the file hash algorithm name length
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v5 10/17] Disable use of OpenSSL "engine" support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v5 11/17] Fix potential use after free in read_tpm_banks()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v5 13/17] Missing template data size lower bounds checking
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v5 09/17] Add missing EVP_MD_CTX_free() call in calc_evm_hash()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v5 08/17] Replace the low level HMAC calls when calculating the EVM HMAC
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v5 07/17] Replace the low level SHA1 calls when calculating the TPM 1.2 PCRs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v5 05/17] Update configure.ac to address a couple of obsolete warnings
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v5 06/17] Deprecate IMA signature version 1
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v5 00/17] address deprecated warnings
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v5 04/17] travis: update dist=focal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v5 03/17] Log and reset 'errno' on lsetxattr failure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v5 01/17] Revert "Reset 'errno' after failure to open or access a file"
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v5 02/17] log and reset 'errno' after failure to open non-critical files
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4 11/11] PM: hibernate: seal the encryption key with a PCR policy
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH v4 06/11] security: keys: trusted: Verify creation data
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH v4 10/11] PM: hibernate: Verify the digest encryption key
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH v4 08/11] PM: hibernate: Use TPM-backed keys to encrypt image
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH v4 07/11] PM: hibernate: Add kernel-based encryption
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH v4 09/11] PM: hibernate: Mix user key in encrypted hibernate
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH v4 05/11] security: keys: trusted: Allow storage of PCR values in creation data
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH v4 04/11] security: keys: trusted: Include TPM2 creation data
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH v4 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH v4 02/11] tpm: Export and rename tpm2_find_and_validate_cc()
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH v4 01/11] tpm: Add support for in-kernel resetting of PCRs
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH v4 00/11] Encrypted Hibernation
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- Re: [PATCH v4] evm: Correct inode_init_security hooks behaviors
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RESEND][RFC][PATCH 1/3] lsm: Clarify documentation of vm_enough_memory hook
- From: KP Singh <kpsingh@xxxxxxxxxx>
- Re: [RESEND][RFC][PATCH 2/3] bpf-lsm: Limit values that can be returned by security modules
- From: KP Singh <kpsingh@xxxxxxxxxx>
- [PATCH v2 3/3] char: tpm: cr50: Move i2c locking to request/relinquish locality ops
- From: Jan Dabros <jsd@xxxxxxxxxxxx>
- [PATCH v2 2/3] char: tpm: cr50: Use generic request/relinquish locality ops
- From: Jan Dabros <jsd@xxxxxxxxxxxx>
- [PATCH v2 1/3] char: tpm: Protect tpm_pm_suspend with locks
- From: Jan Dabros <jsd@xxxxxxxxxxxx>
- [PATCH v2 0/3] char: tpm: Adjust cr50_i2c locking mechanism
- From: Jan Dabros <jsd@xxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v4 01/17] Revert "Reset 'errno' after failure to open or access a file"
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH ima-evm-utils v4 01/17] Revert "Reset 'errno' after failure to open or access a file"
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/2] ima: Handle -ESTALE returned by ima_filter_rule_match()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3] ima: Fix a potential NULL pointer access in ima_restore_measurement_list
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: Fix memory leak in __ima_inode_hash()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v4 02/17] log and reset 'errno' after failure to open non-critical files
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: Fix memory leak in __ima_inode_hash()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] char: tpm: cr50: Use generic request/relinquish locality ops
- From: Jan Dąbroś <jsd@xxxxxxxxxxxx>
- Re: [PATCH 1/3] char: tpm: Protect tpm_pm_suspend with locks
- From: Jan Dąbroś <jsd@xxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v4 02/17] log and reset 'errno' after failure to open non-critical files
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v1 4/4] Change condition to free(pub)
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v1 1/4] Fix memory leaks of tpm_bank_info allocations
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v1 2/4] Fix memory leak related to entry.template
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v1 3/4] Add assert to ensure that algo_name in bank is set
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v1 0/4] Fix some issues in evmctl
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH] ima: Fix memory leak in __ima_inode_hash()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3] ima: Fix a potential NULL pointer access in ima_restore_measurement_list
- From: Huaxin Lu <luhuaxin1@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils v4 03/17] Log and reset 'errno' on lsetxattr failure
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: Possible bug or unintended behaviour using bpf_ima_file_hash
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: Possible bug or unintended behaviour using bpf_ima_file_hash
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: Fix a potential null pointer access problem in ima_restore_measurement_list
- From: Huaxin Lu <luhuaxin1@xxxxxxxxxx>
- [PATCH v2] ima: Fix a potential null pointer access problem in ima_restore_measurement_list
- From: Huaxin Lu <luhuaxin1@xxxxxxxxxx>
- Re: Possible bug or unintended behaviour using bpf_ima_file_hash
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/2] ima: Handle -ESTALE returned by ima_filter_rule_match()
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils v4 17/17] Fix d2i_x509_fp failure
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v4 01/17] Revert "Reset 'errno' after failure to open or access a file"
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v4 01/17] Revert "Reset 'errno' after failure to open or access a file"
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: Fix a potential null pointer access problem in ima_restore_measurement_list
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/2] ima: Handle -ESTALE returned by ima_filter_rule_match()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v4 01/17] Revert "Reset 'errno' after failure to open or access a file"
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v4 14/17] Base sm2/sm3 test on openssl version installed
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] efi: Add iMac Pro 2017 to uefi skip cert quirk
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v4 05/17] Update configure.ac to address a couple of obsolete warnings
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v4 15/17] Compile a newer version of OpenSSL
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v4 16/17] Build OpenSSL without engine support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v4 17/17] Fix d2i_x509_fp failure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v4 14/17] Base sm2/sm3 test on openssl version installed
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v4 13/17] Missing template data size lower bounds checking
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v4 10/17] Disable use of OpenSSL "engine" support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v4 12/17] Limit the file hash algorithm name length
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v4 00/17] address deprecated warnings
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v4 06/17] Deprecate IMA signature version 1
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v4 11/17] Fix potential use after free in read_tpm_banks()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v4 09/17] Add missing EVP_MD_CTX_free() call in calc_evm_hash()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v4 08/17] Replace the low level HMAC calls when calculating the EVM HMAC
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v4 01/17] Revert "Reset 'errno' after failure to open or access a file"
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v4 03/17] Log and reset 'errno' on lsetxattr failure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v4 07/17] Replace the low level SHA1 calls when calculating the TPM 1.2 PCRs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v4 04/17] travis: update dist=focal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v4 02/17] log and reset 'errno' after failure to open non-critical files
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] char: tpm: cr50: Use generic request/relinquish locality ops
- From: Tim Van Patten <timvp@xxxxxxxxxx>
- Re: [PATCH 1/3] char: tpm: Protect tpm_pm_suspend with locks
- From: Tim Van Patten <timvp@xxxxxxxxxx>
- Re: [PATCH] efi: Add iMac Pro 2017 to uefi skip cert quirk
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH 1/7] dt-bindings: tpm: Introduce trivial-tpms.yaml
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 4/7] dt-bindings: tpm: Merge existing trivial TPMs to YAML
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH] efi: Add iMac Pro 2017 to uefi skip cert quirk
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 3/3] char: tpm: cr50: Move i2c locking to request/relinquish locality ops
- From: Jan Dabros <jsd@xxxxxxxxxxxx>
- [PATCH 2/3] char: tpm: cr50: Use generic request/relinquish locality ops
- From: Jan Dabros <jsd@xxxxxxxxxxxx>
- [PATCH 1/3] char: tpm: Protect tpm_pm_suspend with locks
- From: Jan Dabros <jsd@xxxxxxxxxxxx>
- [PATCH 0/3] char: tpm: Adjust cr50_i2c locking mechanism
- From: Jan Dabros <jsd@xxxxxxxxxxxx>
- Re: [PATCH] tpm: Avoid function type cast of put_device()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: Avoid function type cast of put_device()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 3/3] tpm: st33zp24: remove pointless checks on probe
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 2/3] tpm: st33zp24: switch to using gpiod API
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 1/3] tpm: st33zp24: drop support for platform data
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 08/11] tpm, tpm: Implement usage counter for locality
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 08/11] tpm, tpm: Implement usage counter for locality
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Possible bug or unintended behaviour using bpf_ima_file_hash
- From: Isaac Matthews <isaac.jmatt@xxxxxxxxx>
- [RFC PATCH v2 4/4] ima: Extend the real PCR12 with tempPCR value.
- From: Denis Semakin <denis.semakin@xxxxxxxxxx>
- [RFC PATCH v2 3/4] ima: Create vpcr file on securityfs.
- From: Denis Semakin <denis.semakin@xxxxxxxxxx>
- [RFC PATCH v2 2/4] ima: Use tpm_chip from init IMA namespace.
- From: Denis Semakin <denis.semakin@xxxxxxxxxx>
- [RFC PATCH v2 1/4] ima: Introduce PCR virtualization for IMA namespace.
- From: Denis Semakin <denis.semakin@xxxxxxxxxx>
- [RFC PATCH v2 0/4] Virtualize PCR for Container-IMA
- From: Denis Semakin <denis.semakin@xxxxxxxxxx>
- Re: [PATCH] tpm: Avoid function type cast of put_device()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] tpm: Avoid function type cast of put_device()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [RESEND][RFC][PATCH 3/3] selftests/bpf: Check if return values of LSM programs are allowed
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RESEND][RFC][PATCH 2/3] bpf-lsm: Limit values that can be returned by security modules
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RESEND][RFC][PATCH 1/3] lsm: Clarify documentation of vm_enough_memory hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC][PATCH] bpf: Check xattr name/value pair from bpf_lsm_inode_init_security()
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [bug report] integrity: implement get and set acl hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [bug report] integrity: implement get and set acl hook
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [RFC][PATCH] bpf: Check xattr name/value pair from bpf_lsm_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/2] ima: Handle -ESTALE returned by ima_filter_rule_match()
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [RFC][PATCH] bpf: Check xattr name/value pair from bpf_lsm_inode_init_security()
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC][PATCH] bpf: Check xattr name/value pair from bpf_lsm_inode_init_security()
- From: KP Singh <kpsingh@xxxxxxxxxx>
- [PATCH] efi: Add iMac Pro 2017 to uefi skip cert quirk
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- efi: Add iMac Pro 2017 to uefi skip cert quirk
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- [PATCH v3 2/3] tpm: st33zp24: switch to using gpiod API
- From: Dmitry Torokhov <dmitry.torokhov@xxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]