Linux Integrity
[Prev Page][Next Page]
- [PATCH v14 23/26] ima: Show owning user namespace's uid and gid when displaying policy
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v14 25/26] ima: Restrict informational audit messages to init_ima_ns
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v14 18/26] integrity: Add optional callback function to integrity_inode_free()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v14 20/26] ima: Remove unused iints from the integrity_iint_cache
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v14 15/26] ima: Implement ima_free_policy_rules() for freeing of an ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v14 08/26] ima: Move IMA securityfs files into ima_namespace or onto stack
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v14 22/26] ima: Introduce securityfs file to activate an IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v14 19/26] ima: Namespace audit status flags
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v14 09/26] ima: Move ima_lsm_policy_notifier into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v14 13/26] userns: Add pointer to ima_namespace to user_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v14 02/26] securityfs: Extend securityfs with namespacing support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v14 04/26] ima: Move arch_policy_entry into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v14 06/26] ima: Move measurement list related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v14 14/26] ima: Implement hierarchical processing of file accesses
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v14 21/26] ima: Setup securityfs for IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v14 00/26] ima: Namespace IMA with audit support in IMA-ns
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v14 16/26] ima: Add functions for creating and freeing of an ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v14 11/26] ima: Define mac_admin_ns_capable() as a wrapper for ns_capable()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v14 24/26] ima: Limit number of policy rules in non-init_ima_ns
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v14 12/26] ima: Only accept AUDIT rules for non-init_ima_ns namespaces for now
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v3 06/15] Add missing EVP_MD_CTX_free() call in calc_evm_hash()
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils 1/4] Don't ignore number of items read
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v3 06/15] Add missing EVP_MD_CTX_free() call in calc_evm_hash()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 0/4] tpm: Preserve TPM measurement log across kexec (ppc64)
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils 1/4] Don't ignore number of items read
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils 2/4] Define and verify the template data length upper bounds
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils 3/4] Sanity check the template data field sizes
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils 4/4] Fix tpm2_pcr_supported() output messages
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v8 0/4] tpm: Preserve TPM measurement log across kexec (ppc64)
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- Re: [PATCH v8 0/4] tpm: Preserve TPM measurement log across kexec (ppc64)
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v8 0/4] tpm: Preserve TPM measurement log across kexec (ppc64)
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils v3 07/15] Disable use of OpenSSL "engine" support
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v3 11/15] Limit configuring OpenSSL engine support
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v3 06/15] Add missing EVP_MD_CTX_free() call in calc_evm_hash()
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH ima-evm-utils 3/4] Sanity check the template data field sizes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils 4/4] Fix tpm2_pcr_supported() output messages
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils 2/4] Define and verify the template data length upper bounds
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils 1/4] Don't ignore number of items read
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils 0/4] misc bug and other fixes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v3 14/15] Build OpenSSL without engine support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v3 15/15] Fix d2i_x509_fp failure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v3 13/15] Compile a newer version of OpenSSL
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v3 12/15] Base sm2/sm3 test on openssl version installed
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v3 11/15] Limit configuring OpenSSL engine support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v3 10/15] Missing template data size lower bounds checking
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v3 09/15] Limit the file hash algorithm name length
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v3 07/15] Disable use of OpenSSL "engine" support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v3 06/15] Add missing EVP_MD_CTX_free() call in calc_evm_hash()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v3 08/15] Fix potential use after free in read_tpm_banks()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v3 03/15] Deprecate IMA signature version 1
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v3 04/15] Replace the low level SHA1 calls when calculating the TPM 1.2 PCRs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v3 05/15] Replace the low level HMAC calls when calculating the EVM HMAC
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v3 02/15] Update configure.ac to address a couple of obsolete warnings
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v3 01/15] travis: update dist=focal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v3 00/15] address deprecated warnings
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2 03/12] Update configure.ac to address a couple of obsolete warnings
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2 02/12] travis: update dist=focal
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2 09/12] Fix potential use after free in read_tpm_banks()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2 11/12] Missing template data size lower bounds checking
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2 10/12] Limit the file hash algorithm name length
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] dt-bindings: tpm: Add schema for TIS I2C devices
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v2 02/10] tpm: Allow PCR 23 to be restricted to kernel-only use
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [EXT] Re: [RFC PATCH HBK: 2/8] hw-bound-key: flag-is_hbk added to the tfm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [EXT] Re: [RFC PATCH HBK: 2/8] hw-bound-key: flag-is_hbk added to the tfm
- From: Varun Sethi <V.Sethi@xxxxxxx>
- [PATCH 0/2] tpm: tsi-i2c: Add compatible strings
- From: Joel Stanley <joel@xxxxxxxxx>
- [PATCH 1/2] dt-bindings: tpm: Add schema for TIS I2C devices
- From: Joel Stanley <joel@xxxxxxxxx>
- [PATCH 2/2] tpm: tis-i2c: Add more compatible strings
- From: Joel Stanley <joel@xxxxxxxxx>
- Re: [EXT] Re: [RFC PATCH HBK: 2/8] hw-bound-key: flag-is_hbk added to the tfm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [EXT] Re: [RFC PATCH HBK: 2/8] hw-bound-key: flag-is_hbk added to the tfm
- From: Varun Sethi <V.Sethi@xxxxxxx>
- Re: [PATCH ima-evm-utils v2] add support for reading per bank TPM 2.0 PCRs via sysfs
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC PATCH v1 4/4] ima: Extend the real PCR12 with tempPCR value.
- From: Denis Semakin <denis.semakin@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v1 4/4] ima: Extend the real PCR12 with tempPCR value.
- From: dwx1040679 <denis.semakin@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 0/4] tpm: Preserve TPM measurement log across kexec (ppc64)
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: TPM: hibernate with IMA PCR 10
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] selftests: tpm2: Implement class desstructor to close file descriptor
- From: R Nageswara Sastry <rnsastry@xxxxxxxxxxxxx>
- [PATCH] selftests: tpm2: Implement class desstructor to close file descriptor
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 2/2] ima: Handle -ESTALE returned by ima_filter_rule_match()
- From: GUO Zihua <guozihua@xxxxxxxxxx>
- [PATCH v4 0/2] ima: Handle -ESTALE returned by ima_filter_rule_match()
- From: GUO Zihua <guozihua@xxxxxxxxxx>
- [PATCH v4 1/2] ima: Simplify ima_lsm_copy_rule
- From: GUO Zihua <guozihua@xxxxxxxxxx>
- Re: [PATCH] tpm: Add flag to use default cancellation policy
- From: Eddie James <eajames@xxxxxxxxxxxxx>
- Re: TPM: hibernate with IMA PCR 10
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 01/10] tpm: Add support for in-kernel resetting of PCRs
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: Add flag to use default cancellation policy
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH ima-evm-utils v2] add support for reading per bank TPM 2.0 PCRs via sysfs
- From: Tergel Myanganbayar <tergel@xxxxxxxxxxxxx>
- Re: TPM: hibernate with IMA PCR 10
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: TPM: hibernate with IMA PCR 10
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- Re: [PATCH v2 02/10] tpm: Allow PCR 23 to be restricted to kernel-only use
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- Re: [PATCH v2 01/10] tpm: Add support for in-kernel resetting of PCRs
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- Re: [PATCH v2 00/10] Encrypted Hibernation
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH] tpm: Add flag to use default cancellation policy
- From: Eddie James <eajames@xxxxxxxxxxxxx>
- Re: [RFC PATCH ima-evm-utils v2 12/12] Limit configuring OpenSSL engine support
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [EXT] Re: [RFC PATCH HBK: 2/8] hw-bound-key: flag-is_hbk added to the tfm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [EXT] Re: [RFC PATCH HBK: 2/8] hw-bound-key: flag-is_hbk added to the tfm
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- RE: [EXT] Re: [RFC PATCH HBK: 0/8] HW BOUND KEY as TRUSTED KEY
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- RE: [EXT] [RFC PATCH HBK: 0/8] HW BOUND KEY as TRUSTED KEY
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- Re: [EXT] [RFC PATCH HBK: 0/8] HW BOUND KEY as TRUSTED KEY
- From: Michael Walle <michael@xxxxxxxx>
- Re: [EXT] Re: [RFC PATCH HBK: 0/8] HW BOUND KEY as TRUSTED KEY
- From: Jan Lübbe <jlu@xxxxxxxxxxxxxx>
- Re: [EXT] [RFC PATCH HBK: 0/8] HW BOUND KEY as TRUSTED KEY
- From: David Gstir <david@xxxxxxxxxxxxx>
- Re: [EXT] Re: [RFC PATCH HBK: 0/8] HW BOUND KEY as TRUSTED KEY
- From: Michael Walle <michael@xxxxxxxx>
- Re: [EXT] Re: [RFC PATCH HBK: 2/8] hw-bound-key: flag-is_hbk added to the tfm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [EXT] Re: [RFC PATCH HBK: 6/8] KEYS: trusted: caam based black key
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- RE: [EXT] Re: [RFC PATCH HBK: 1/8] keys-trusted: new cmd line option added
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- RE: [EXT] Re: [RFC PATCH HBK: 0/8] HW BOUND KEY as TRUSTED KEY
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- RE: [EXT] Re: [RFC PATCH HBK: 0/8] HW BOUND KEY as TRUSTED KEY
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- RE: [EXT] Re: [RFC PATCH HBK: 2/8] hw-bound-key: flag-is_hbk added to the tfm
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- Re: [PATCH v3] ima: Handle -ESTALE returned by ima_filter_rule_match()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2 07/12] Add missing EVP_MD_CTX_free() call in calc_evm_hash()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2 06/12] Replace the low level HMAC calls when calculating the EVM HMAC
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v2 10/12] Limit the file hash algorithm name length
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC PATCH ima-evm-utils v2 12/12] Limit configuring OpenSSL engine support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v2 11/12] Missing template data size lower bounds checking
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v2 02/12] travis: update dist=focal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v2 08/12] Disable use of OpenSSL "engine" support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v2 07/12] Add missing EVP_MD_CTX_free() call in calc_evm_hash()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v2 01/12] travis: use the distro OpenSSL version on jammy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v2 05/12] Replace the low level SHA1 calls when calculating the TPM 1.2 PCRs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v2 09/12] Fix potential use after free in read_tpm_banks()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v2 04/12] Deprecate IMA signature version 1
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v2 00/12] address deprecated warnings
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v2 06/12] Replace the low level HMAC calls when calculating the EVM HMAC
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v2 03/12] Update configure.ac to address a couple of obsolete warnings
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils 02/11] travis: update dist=focal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH HBK: 6/8] KEYS: trusted: caam based black key
- From: Ben Boeckel <me@xxxxxxxxxxxxxx>
- Re: [RFC PATCH HBK: 1/8] keys-trusted: new cmd line option added
- From: Ben Boeckel <me@xxxxxxxxxxxxxx>
- Re: [RFC PATCH HBK: 0/8] HW BOUND KEY as TRUSTED KEY
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH HBK: 0/8] HW BOUND KEY as TRUSTED KEY
- From: Michael Walle <michael@xxxxxxxx>
- Re: [RFC PATCH HBK: 2/8] hw-bound-key: flag-is_hbk added to the tfm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH HBK: 8/8] dm-crypt: consumer-app setting the flag-is_hbk
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [RFC PATCH HBK: 7/8] caam alg: symmetric key ciphers are updated
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [RFC PATCH HBK: 5/8] caam blob-gen: moving blob_priv to caam_drv_private
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [RFC PATCH HBK: 4/8] keys-trusted: re-factored caam based trusted key
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [RFC PATCH HBK: 6/8] KEYS: trusted: caam based black key
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [RFC PATCH HBK: 0/8] HW BOUND KEY as TRUSTED KEY
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [RFC PATCH HBK: 2/8] hw-bound-key: flag-is_hbk added to the tfm
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [RFC PATCH HBK: 1/8] keys-trusted: new cmd line option added
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [RFC PATCH HBK: 3/8] sk_cipher: checking for hw bound operation
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH -next] security: Fix some kernel-doc comments
- From: Yang Li <yang.lee@xxxxxxxxxxxxxxxxx>
- [PATCH -next 4/4] integrity: Use DECLARE_FLEX_ARRAY() helper in integrity.h
- From: Gaosheng Cui <cuigaosheng1@xxxxxxxxxx>
- [PATCH -next 1/4] ima: Use DECLARE_FLEX_ARRAY() helper in ima_modsig
- From: Gaosheng Cui <cuigaosheng1@xxxxxxxxxx>
- [PATCH -next 2/4] ima: Use DECLARE_FLEX_ARRAY() helper in ima_template_entry
- From: Gaosheng Cui <cuigaosheng1@xxxxxxxxxx>
- [PATCH -next 0/4] Use DECLARE_FLEX_ARRAY() helper for ima
- From: Gaosheng Cui <cuigaosheng1@xxxxxxxxxx>
- [PATCH -next 3/4] ima: Use DECLARE_FLEX_ARRAY() helper in ima_policy
- From: Gaosheng Cui <cuigaosheng1@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils] add support for reading per bank TPM 2.0 PCRs via sysfs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils 08/11] Deprecate use of OpenSSL v3 "engine" support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils 08/11] Deprecate use of OpenSSL v3 "engine" support
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] add support for reading per bank TPM 2.0 PCRs via sysfs
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils] add support for reading per bank TPM 2.0 PCRs via sysfs
- From: Tergel Myanganbayar <tergel@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils 02/11] travis: update dist=focal
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils 05/11] Replace the low level SHA1 calls when calculating the TPM 1.2 PCRs
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils 04/11] Deprecate IMA signature version 1
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils 00/11] address deprecated warnings
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils 04/11] Deprecate IMA signature version 1
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils 06/11] Replace the low level HMAC calls when calculating the EVM HMAC
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils 03/11] Update configure.ac to address a couple of obsolete warnings
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils 11/11] Missing template data size lower bounds checking
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils 05/11] Replace the low level SHA1 calls when calculating the TPM 1.2 PCRs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils 08/11] Deprecate use of OpenSSL v3 "engine" support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils 09/11] Fix potential use after free in read_tpm_banks()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils 02/11] travis: update dist=focal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils 01/11] travis: use the distro OpenSSL version on jammy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils 07/11] Add missing EVP_MD_CTX_free() call in calc_evm_hash()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils 10/11] Limit the file hash algorithm name length
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 2/4] tpm: of: Make of-tree specific function commonly available
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v8 3/4] of: kexec: Refactor IMA buffer related functions to make them reusable
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v8 1/4] drivers: of: kexec ima: Support 32-bit platforms
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v8 4/4] tpm/kexec: Duplicate TPM measurement log in of-tree for kexec
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v8 0/4] tpm: Preserve TPM measurement log across kexec (ppc64)
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v8 2/4] tpm: of: Make of-tree specific function commonly available
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC PATCH ima-evm-utils 04/11] Deprecate IMA signature version 1
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 00/10] Encrypted Hibernation
- From: "Limonciello, Mario" <mario.limonciello@xxxxxxx>
- Re: [RFC PATCH ima-evm-utils 04/11] Deprecate IMA signature version 1
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH ima-evm-utils 08/11] Deprecate use of OpenSSL 3 "engine" support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH ima-evm-utils 08/11] Deprecate use of OpenSSL 3 "engine" support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: TPM: hibernate with IMA PCR 10
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH ima-evm-utils 08/11] Deprecate use of OpenSSL 3 "engine" support
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [RFC PATCH ima-evm-utils 08/11] Deprecate use of OpenSSL 3 "engine" support
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [RFC PATCH ima-evm-utils 11/11] Missing template data size lower bounds checking
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [RFC PATCH ima-evm-utils 10/11] Limit the file hash algorithm name length
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [RFC PATCH ima-evm-utils 09/11] Fix potential use after free in read_tpm_banks()
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [RFC PATCH ima-evm-utils 07/11] Add missing EVP_MD_CTX_free() call in calc_evm_hash()
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [RFC PATCH ima-evm-utils 06/11] Replace the low level HMAC calls when calculating the EVM HMAC
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [RFC PATCH ima-evm-utils 05/11] Replace the low level SHA1 calls when calculating the TPM 1.2 PCRs
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v3] ima: Handle -ESTALE returned by ima_filter_rule_match()
- From: GUO Zihua <guozihua@xxxxxxxxxx>
- Re: [PATCH] ima: Handle -ESTALE returned by ima_filter_rule_match()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: Handle -ESTALE returned by ima_filter_rule_match()
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [RFC PATCH ima-evm-utils 04/11] Deprecate IMA signature version 1
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC PATCH ima-evm-utils 04/11] Deprecate IMA signature version 1
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [RFC PATCH ima-evm-utils 08/11] Deprecate use of OpenSSL 3 "engine" support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH ima-evm-utils 03/11] Update configure.ac to address a couple of obsolete warnings
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [RFC PATCH ima-evm-utils 01/11] travis: use the distro OpenSSL version on jammy
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [RFC PATCH ima-evm-utils 02/11] travis: update dist=focal
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH] ima: Handle -ESTALE returned by ima_filter_rule_match()
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [PATCH v7 05/10] tpm, tpm_tis: Only handle supported interrupts
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [RFC PATCH ima-evm-utils 08/11] Deprecate use of OpenSSL 3 "engine" support
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH] ima: Handle -ESTALE returned by ima_filter_rule_match()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC PATCH ima-evm-utils 07/11] Add missing EVP_MD_CTX_free() call in calc_evm_hash()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC PATCH ima-evm-utils 06/11] Replace the low level HMAC calls when calculating the EVM HMAC
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC PATCH ima-evm-utils 11/11] Missing template data size lower bounds checking
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC PATCH ima-evm-utils 10/11] Limit the file hash algorithm name length
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC PATCH ima-evm-utils 08/11] Deprecate use of OpenSSL 3 "engine" support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC PATCH ima-evm-utils 09/11] Fix potential use after free in read_tpm_banks()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC PATCH ima-evm-utils 03/11] Update configure.ac to address a couple of obsolete warnings
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC PATCH ima-evm-utils 04/11] Deprecate IMA signature version 1
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC PATCH ima-evm-utils 02/11] travis: update dist=focal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC PATCH ima-evm-utils 05/11] Replace the low level SHA1 calls when calculating the TPM 1.2 PCRs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC PATCH ima-evm-utils 01/11] travis: use the distro OpenSSL version on jammy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC PATCH ima-evm-utils 00/11] address deprecated warnings
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 ima-evm-utils 2/3] Sign an fs-verity file digest
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: TPM: hibernate with IMA PCR 10
- From: Matthew Garrett <mgarrett@xxxxxxxxxxx>
- TPM: hibernate with IMA PCR 10
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [RFC PATCH v1 4/4] ima: Extend the real PCR12 with tempPCR value.
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH v7 05/10] tpm, tpm_tis: Only handle supported interrupts
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH] ima: Handle -ESTALE returned by ima_filter_rule_match()
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [PATCH v7 05/10] tpm, tpm_tis: Only handle supported interrupts
- From: Jason Andryuk <jandryuk@xxxxxxxxx>
- Re: [PATCH] char: move from strlcpy with unused retval to strscpy
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: tis_i2c: Fix sanity check interrupt enable mask
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: tis_i2c: Fix sanity check interrupt enable mask
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: tpm2_createprim blocked for more than 122 seconds
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 02/10] tpm: Allow PCR 23 to be restricted to kernel-only use
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 01/10] tpm: Add support for in-kernel resetting of PCRs
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] ima: Handle -ESTALE returned by ima_filter_rule_match()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] iversion: update comments with info about atime updates
- From: "NeilBrown" <neilb@xxxxxxx>
- [RFC PATCH v1 4/4] ima: Extend the real PCR12 with tempPCR value.
- From: Denis Semakin <denis.semakin@xxxxxxxxxx>
- [RFC PATCH v1 3/4] ima: Create vpcr file on securityfs.
- From: Denis Semakin <denis.semakin@xxxxxxxxxx>
- [RFC PATCH v1 2/4] ima: Use tpm_chip from init IMA namespace.
- From: Denis Semakin <denis.semakin@xxxxxxxxxx>
- [RFC PATCH v1 1/4] ima: Introduce PCR virtualization for IMA namespace.
- From: Denis Semakin <denis.semakin@xxxxxxxxxx>
- Re: [PATCH v2 04/10] security: keys: trusted: Allow storage of PCR values in creation data
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [RFC PATCH v1 4/4] ima: Extend the real PCR12 with tempPCR value.
- From: Denis Semakin <denis.semakin@xxxxxxxxxx>
- [RFC PATCH v1 3/4] ima: Create vpcr file on securityfs.
- From: Denis Semakin <denis.semakin@xxxxxxxxxx>
- [RFC PATCH v1 2/4] ima: Use tpm_chip from init IMA namespace.
- From: Denis Semakin <denis.semakin@xxxxxxxxxx>
- [RFC PATCH v1 1/4] ima: Introduce PCR virtualization for IMA namespace.
- From: Denis Semakin <denis.semakin@xxxxxxxxxx>
- [RFC PATCH v1 0/4] Virtualize PCR for Container-IMA
- From: Denis Semakin <denis.semakin@xxxxxxxxxx>
- Re: [PATCH] iversion: update comments with info about atime updates
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH] iversion: update comments with info about atime updates
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH v2 04/10] security: keys: trusted: Allow storage of PCR values in creation data
- From: Ben Boeckel <me@xxxxxxxxxxxxxx>
- Re: [PATCH] ima: Handle -ESTALE returned by ima_filter_rule_match()
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [PATCH] ima: Handle -ESTALE returned by ima_filter_rule_match()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] iversion: update comments with info about atime updates
- From: Trond Myklebust <trondmy@xxxxxxxxxxxxxxx>
- Re: [PATCH] iversion: update comments with info about atime updates
- From: "NeilBrown" <neilb@xxxxxxx>
- Re: [PATCH] iversion: update comments with info about atime updates
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH] iversion: update comments with info about atime updates
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- [PATCH v2 10/10] PM: hibernate: seal the encryption key with a PCR policy
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH v2 08/10] PM: hibernate: Mix user key in encrypted hibernate
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH v2 09/10] PM: hibernate: Verify the digest encryption key
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH v2 07/10] PM: hibernate: Use TPM-backed keys to encrypt image
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH v2 06/10] PM: hibernate: Add kernel-based encryption
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH v2 05/10] security: keys: trusted: Verify creation data
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH v2 04/10] security: keys: trusted: Allow storage of PCR values in creation data
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH v2 03/10] security: keys: trusted: Include TPM2 creation data
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH v2 02/10] tpm: Allow PCR 23 to be restricted to kernel-only use
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH v2 01/10] tpm: Add support for in-kernel resetting of PCRs
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH v2 00/10] Encrypted Hibernation
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- Re: [PATCH] iversion: update comments with info about atime updates
- From: "NeilBrown" <neilb@xxxxxxx>
- [PATCH v2] ima: Handle -ESTALE returned by ima_filter_rule_match()
- From: GUO Zihua <guozihua@xxxxxxxxxx>
- Re: [PATCH] ima: Handle -ESTALE returned by ima_filter_rule_match()
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [PATCH] ima: Handle -ESTALE returned by ima_filter_rule_match()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] iversion: update comments with info about atime updates
- From: "NeilBrown" <neilb@xxxxxxx>
- Re: [PATCH] iversion: update comments with info about atime updates
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH] iversion: update comments with info about atime updates
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH] ima: Handle -ESTALE returned by ima_filter_rule_match()
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [PATCH v2] xfs: don't bump the i_version on an atime update in xfs_vn_update_time
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH] iversion: update comments with info about atime updates
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH] iversion: update comments with info about atime updates
- From: Trond Myklebust <trondmy@xxxxxxxxxxxxxxx>
- Re: [PATCH] iversion: update comments with info about atime updates
- From: "NeilBrown" <neilb@xxxxxxx>
- Re: [PATCH] iversion: update comments with info about atime updates
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH v7 6/6] tpm/kexec: Duplicate TPM measurement log in of-tree for kexec
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH] iversion: update comments with info about atime updates
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] iversion: update comments with info about atime updates
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH] iversion: update comments with info about atime updates
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: Handle -ESTALE returned by ima_filter_rule_match()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: fix blocking of security.ima xattrs of unsupported algorithms
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH] ima: fix blocking of security.ima xattrs of unsupported algorithms
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2] xfs: don't bump the i_version on an atime update in xfs_vn_update_time
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- [PATCH] iversion: update comments with info about atime updates
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH] xfs: don't bump the i_version on an atime update in xfs_vn_update_time
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH] xfs: don't bump the i_version on an atime update in xfs_vn_update_time
- From: "NeilBrown" <neilb@xxxxxxx>
- Re: [PATCH] ext4: fix i_version handling in ext4
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- [PATCH] ext4: fix i_version handling in ext4
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- [PATCH] xfs: don't bump the i_version on an atime update in xfs_vn_update_time
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH] ima: Handle -ESTALE returned by ima_filter_rule_match()
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- [PATCH] char: move from strlcpy with unused retval to strscpy
- From: Wolfram Sang <wsa+renesas@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] ima: Handle -ESTALE returned by ima_filter_rule_match()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] ima: Handle -ESTALE returned by ima_filter_rule_match()
- From: GUO Zihua <guozihua@xxxxxxxxxx>
- Re: Race conditioned discovered between ima_match_rules and ima_update_lsm_update_rules
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: Bug in ima_inode_setxattr()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Race conditioned discovered between ima_match_rules and ima_update_lsm_update_rules
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] tpm: tis_i2c: Fix sanity check interrupt enable mask
- From: Eddie James <eajames@xxxxxxxxxxxxx>
- Re: Race conditioned discovered between ima_match_rules and ima_update_lsm_update_rules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Bug in ima_inode_setxattr()
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: Race conditioned discovered between ima_match_rules and ima_update_lsm_update_rules
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: Race conditioned discovered between ima_match_rules and ima_update_lsm_update_rules
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: tpm2_createprim blocked for more than 122 seconds
- From: Anatol Pomozov <anatol.pomozov@xxxxxxxxx>
- Re: tpm2_createprim blocked for more than 122 seconds
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- tpm2_createprim blocked for more than 122 seconds
- From: Anatol Pomozov <anatol.pomozov@xxxxxxxxx>
- Re: Race conditioned discovered between ima_match_rules and ima_update_lsm_update_rules
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v7 0/6] tpm: Preserve TPM measurement log across kexec (ppc64)
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v7 0/6] tpm: Preserve TPM measurement log across kexec (ppc64)
- From: Coiby Xu <coxu@xxxxxxxxxx>
- Re: [PATCH v7 0/6] tpm: Preserve TPM measurement log across kexec (ppc64)
- From: Coiby Xu <coxu@xxxxxxxxxx>
- Re: [PATCH v7 4/6] tpm: of: Make of-tree specific function commonly available
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 4/6] tpm: of: Make of-tree specific function commonly available
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: Race conditioned discovered between ima_match_rules and ima_update_lsm_update_rules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: fix potential race condition in suspend/resume
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 3/6] x86/kexec: Carry forward IMA measurement log on kexec
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [PATCH v7 3/6] x86/kexec: Carry forward IMA measurement log on kexec
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v7 3/6] x86/kexec: Carry forward IMA measurement log on kexec
- From: Borislav Petkov <bp@xxxxxxx>
- [PATCH v7 4/6] tpm: of: Make of-tree specific function commonly available
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v7 1/6] of: check previous kernel's ima-kexec-buffer against memory bounds
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v7 2/6] drivers: of: kexec ima: Support 32-bit platforms
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v7 5/6] of: kexec: Refactor IMA buffer related functions to make them reusable
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v7 0/6] tpm: Preserve TPM measurement log across kexec (ppc64)
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v7 6/6] tpm/kexec: Duplicate TPM measurement log in of-tree for kexec
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v7 3/6] x86/kexec: Carry forward IMA measurement log on kexec
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: fix potential race condition in suspend/resume
- From: Sven van Ashbrook <svenva@xxxxxxxxxxxx>
- Re: [PATCH 0/6] i2c: Make remove callback return void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH] tpm: fix potential race condition in suspend/resume
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] tpm: fix potential race condition in suspend/resume
- From: Sven van Ashbrook <svenva@xxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for v5.20
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: Race conditioned discovered between ima_match_rules and ima_update_lsm_update_rules
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v8 07/17] ipe: add auditing support
- From: Tyler Hicks <code@xxxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for v5.20
- From: Kalle Valo <kvalo@xxxxxxxxxx>
- Re: Race conditioned discovered between ima_match_rules and ima_update_lsm_update_rules
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Race conditioned discovered between ima_match_rules and ima_update_lsm_update_rules
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [PATCH 00/10] Encrypted Hibernation
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for v5.20
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH] tpm/ppi: fix return type in tpm_show_ppi_response()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for v5.20
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for v5.20
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 1/1] efi: Correct Macmini capitalisation in uefi cert quirk
- From: Orlando Chamberlain <redecorating@xxxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for v5.20
- From: Kalle Valo <kvalo@xxxxxxxxxx>
- Re: [PATCH 00/10] Encrypted Hibernation
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for v5.20
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] tpm/ppi: fix return type in tpm_show_ppi_response()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for v5.20
- From: Kalle Valo <kvalo@xxxxxxxxxx>
- Re: [PATCH 00/10] Encrypted Hibernation
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [GIT PULL] tpmdd updates for v5.20
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 04/10] security: keys: trusted: Allow storage of PCR values in creation data
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- Re: [PATCH 08/10] PM: hibernate: Mix user key in encrypted hibernate
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- Re: [PATCH 04/10] security: keys: trusted: Allow storage of PCR values in creation data
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 09/10] PM: hibernate: Verify the digest encryption key
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 08/10] PM: hibernate: Mix user key in encrypted hibernate
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [GIT PULL] integrity subsystem updates for v6.0
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] integrity subsystem updates for v6.0
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 00/10] Encrypted Hibernation
- From: Matthew Garrett <mgarrett@xxxxxxxxxxx>
- Re: [PATCH 00/10] Encrypted Hibernation
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- Re: [PATCH v4] tpm: Add check for Failure mode for TPM2 modules
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 07/10] tmp, tmp_tis: Implement usage counter for locality
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v4] tpm: Add check for Failure mode for TPM2 modules
- From: Mårten Lindahl <marten.lindahl@xxxxxxxx>
- Re: [PATCH v3] tpm: Add check for Failure mode for TPM2 modules
- From: Marten Lindahl <martenli@xxxxxxxx>
- Re: [PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Rob Landley <rob@xxxxxxxxxxx>
- Re: [PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Jim Baxter <jim_baxter@xxxxxxxxxx>
- Re: [PATCH v7 07/10] tmp, tmp_tis: Implement usage counter for locality
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH v7 07/10] tmp, tmp_tis: Implement usage counter for locality
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [RFC PATCH v2 7/7] ima: Support measurement of kexec initramfs components
- From: Jonathan McDowell <noodles@xxxxxx>
- [RFC PATCH v2 6/7] HACK: Allow the use of generic decompress with gzip outside __init
- From: Jonathan McDowell <noodles@xxxxxx>
- [RFC PATCH v2 5/7] lib/cpio: Add a parse-only option that doesn't extract any files
- From: Jonathan McDowell <noodles@xxxxxx>
- [RFC PATCH v2 4/7] lib/cpio: Allow use outside of initramfs creation
- From: Jonathan McDowell <noodles@xxxxxx>
- [RFC PATCH v2 3/7] lib/cpio: use non __init filesystem related functions
- From: Jonathan McDowell <noodles@xxxxxx>
- [RFC PATCH v2 2/7] lib/cpio: Improve error handling
- From: Jonathan McDowell <noodles@xxxxxx>
- [RFC PATCH v2 1/7] initramfs: Move cpio handling routines into lib/
- From: Jonathan McDowell <noodles@xxxxxx>
- [RFC PATCH v2 0/7] ima: Support measurement of kexec initramfs components
- From: Jonathan McDowell <noodles@xxxxxx>
- Re: [PATCH v7 07/10] tmp, tmp_tis: Implement usage counter for locality
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] KEYS: trusted: Fix memory leak in tpm2_key_encode()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 4/6] tpm: of: Make of-tree specific function commonly available
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 07/10] tmp, tmp_tis: Implement usage counter for locality
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v3] KEYS: trusted: Fix memory leak in tpm2_key_encode()
- From: Jianglei Nie <niejianglei2021@xxxxxxx>
- Re: keyrings, key usage, and trust models
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- keyrings, key usage, and trust models
- From: Elaine Palmer <erpalmerny@xxxxxxxxx>
- [PATCH v2 0/1] lockdown: Fix kexec lockdown bypass with ima policy
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v2 1/1] lockdown: Fix kexec lockdown bypass with ima policy
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH] lockdown: Fix kexec lockdown bypass with ima policy
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 6/6] tpm/kexec: Duplicate TPM measurement log in of-tree for kexec
- From: Nageswara R Sastry <nasastry@xxxxxxxxxx>
- Re: [PATCH v6 5/6] of: kexec: Refactor IMA buffer related functions to make them reusable
- From: Nageswara R Sastry <nasastry@xxxxxxxxxx>
- Re: [PATCH v6 4/6] tpm: of: Make of-tree specific function commonly available
- From: Nageswara R Sastry <nasastry@xxxxxxxxxx>
- Re: [PATCH v6 3/6] x86/kexec: Carry forward IMA measurement log on kexec
- From: Nageswara R Sastry <nasastry@xxxxxxxxxx>
- Re: [PATCH v6 2/6] drivers: of: kexec ima: Support 32-bit platforms
- From: Nageswara R Sastry <nasastry@xxxxxxxxxx>
- Re: [PATCH v6 1/6] of: check previous kernel's ima-kexec-buffer against memory bounds
- From: Nageswara R Sastry <nasastry@xxxxxxxxxx>
- RE: [PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH AUTOSEL 5.4 01/16] Revert "evm: Fix memleak in init_desc"
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.10 01/25] Revert "evm: Fix memleak in init_desc"
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.15 01/42] Revert "evm: Fix memleak in init_desc"
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.18 01/54] Revert "evm: Fix memleak in init_desc"
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH] lockdown: Fix kexec lockdown bypass with ima policy
- From: John Haxby <john.haxby@xxxxxxxxxx>
- [PATCH] lockdown: Fix kexec lockdown bypass with ima policy
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Rob Landley <rob@xxxxxxxxxxx>
- RE: [PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Rob Landley <rob@xxxxxxxxxxx>
- Re: [PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Rob Landley <rob@xxxxxxxxxxx>
- Re: [PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Rob Landley <rob@xxxxxxxxxxx>
- RE: [PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH 1/1] ci/alpine.sh: Install bash
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Jim Baxter <jim_baxter@xxxxxxxxxx>
- Re: [PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Jim Baxter <jim_baxter@xxxxxxxxxx>
- RE: [PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH 0/6] i2c: Make remove callback return void
- From: Krzysztof Hałasa <khalasa@xxxxxxx>
- Re: [PATCH 0/6] i2c: Make remove callback return void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH v5 4/6] tpm: of: Make of-tree specific function commonly available
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v7 07/10] tmp, tmp_tis: Implement usage counter for locality
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 1/1] ci/alpine.sh: Install bash
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [GIT PULL] integrity: subsystem fixes for v5.19
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v6 5/6] of: kexec: Refactor IMA buffer related functions to make them reusable
- From: Rob Herring <robh@xxxxxxxxxx>
- [GIT PULL] integrity: subsystem fixes for v5.19
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 0/4] unify the keyrings of arm64 and s390 with x86 to verify kexec'ed kernel signature
- From: Coiby Xu <coxu@xxxxxxxxxx>
- [PATCH v10 3/4] arm64: kexec_file: use more system keyrings to verify kernel image signature
- From: Coiby Xu <coxu@xxxxxxxxxx>
- [PATCH v10 4/4] kexec, KEYS, s390: Make use of built-in and secondary keyring for signature verification
- From: Coiby Xu <coxu@xxxxxxxxxx>
- [PATCH v10 2/4] kexec, KEYS: make the code in bzImage64_verify_sig generic
- From: Coiby Xu <coxu@xxxxxxxxxx>
- [PATCH v10 1/4] kexec: clean up arch_kexec_kernel_verify_sig
- From: Coiby Xu <coxu@xxxxxxxxxx>
- [PATCH v10 0/4] unify the keyrings of arm64 and s390 with x86 to verify kexec'ed kernel signature
- From: Coiby Xu <coxu@xxxxxxxxxx>
- Re: [PATCH v2] ima: force signature verification when CONFIG_KEXEC_SIG is configured
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2] ima: force signature verification when CONFIG_KEXEC_SIG is configured
- From: Coiby Xu <coxu@xxxxxxxxxx>
- [zohar-integrity:next-integrity-testing 4/6] security/integrity/ima/ima_efi.c:72:25: error: implicit declaration of function 'set_kexec_sig_enforced'; did you mean 'set_module_sig_enforced'?
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] tpm_tis: Hold locality open during probe
- From: Jason Andryuk <jandryuk@xxxxxxxxx>
- [zohar-integrity:next-integrity-testing 4/6] security/integrity/ima/ima_efi.c:72:4: error: call to undeclared function 'set_kexec_sig_enforced'; ISO C99 and later do not support implicit function declarations
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v6 4/6] tpm: of: Make of-tree specific function commonly available
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] ima: force signature verification when CONFIG_KEXEC_SIG is configured
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] ima/evm: Fix potential memory leak in ima_init_crypto()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] ima: force signature verification when CONFIG_KEXEC_SIG is configured
- From: Coiby Xu <coxu@xxxxxxxxxx>
- [PATCH v2] ima/evm: Fix potential memory leak in ima_init_crypto()
- From: Jianglei Nie <niejianglei2021@xxxxxxx>
- Re: [PATCH v6 5/6] of: kexec: Refactor IMA buffer related functions to make them reusable
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 4/6] tpm: of: Make of-tree specific function commonly available
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 07/10] tmp, tmp_tis: Implement usage counter for locality
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH v7 07/10] tmp, tmp_tis: Implement usage counter for locality
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH v7 07/10] tmp, tmp_tis: Implement usage counter for locality
- From: Jason Andryuk <jandryuk@xxxxxxxxx>
- Re: [PATCH] tpm_tis: Hold locality open during probe
- From: Jason Andryuk <jandryuk@xxxxxxxxx>
- Re: [PATCH] ima/evm: Fix potential memory leak in ima_init_crypto()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] ima/evm: Fix potential memory leak in ima_init_crypto()
- From: Jianglei Nie <niejianglei2021@xxxxxxx>
- Re: [PATCH v5 4/6] tpm: of: Make of-tree specific function commonly available
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2] tpm: eventlog: Fix section mismatch for DEBUG_SECTION_MISMATCH
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: Hold locality open during probe
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] tpm: Add check for Failure mode for TPM2 modules
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 07/10] tmp, tmp_tis: Implement usage counter for locality
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH V2] tpm: eventlog: Fix section mismatch for DEBUG_SECTION_MISMATCH
- From: Huacai Chen <chenhuacai@xxxxxxxxxxx>
- Re: [PATCH] tpm: eventlog: Fix section mismatch for DEBUG_SECTION_MISMATCH
- From: Huacai Chen <chenhuacai@xxxxxxxxx>
- Re: [PATCH] tpm: eventlog: Fix section mismatch for DEBUG_SECTION_MISMATCH
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH -next] tpm: fix platform_no_drv_owner.cocci warning
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 3/5] tpm: of: Make of-tree specific function commonly available
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH 0/7] ima: Support measurement of kexec initramfs components
- From: Jonathan McDowell <noodles@xxxxxx>
- Re: [RFC PATCH 0/7] ima: Support measurement of kexec initramfs components
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC PATCH 2/7] lib/cpio: Improve error handling
- From: Jonathan McDowell <noodles@xxxxxx>
- [RFC PATCH 3/7] lib/cpio: use non __init filesystem related functions
- From: Jonathan McDowell <noodles@xxxxxx>
- [RFC PATCH 5/7] lib/cpio: Add a parse-only option that doesn't extract any files
- From: Jonathan McDowell <noodles@xxxxxx>
- [RFC PATCH 4/7] lib/cpio: Allow use outside of initramfs creation
- From: Jonathan McDowell <noodles@xxxxxx>
- [RFC PATCH 6/7] HACK: Allow the use of generic decompress with gzip outside __init
- From: Jonathan McDowell <noodles@xxxxxx>
- [RFC PATCH 7/7] ima: Support measurement of kexec initramfs components
- From: Jonathan McDowell <noodles@xxxxxx>
- [RFC PATCH 0/7] ima: Support measurement of kexec initramfs components
- From: Jonathan McDowell <noodles@xxxxxx>
- [RFC PATCH 1/7] initramfs: Move cpio handling routines into lib/
- From: Jonathan McDowell <noodles@xxxxxx>
- Re: [linux-next:master] BUILD REGRESSION 088b9c375534d905a4d337c78db3b3bfbb52c4a0
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH -next] evm: Use IS_ENABLED to initialize .enabled
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 0/4] unify the keyrings of arm64 and s390 with x86 to verify kexec'ed kernel signature
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] ima: Fix a potential integer overflow in ima_appraise_measurement
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v6 4/6] tpm: of: Make of-tree specific function commonly available
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v6 1/6] of: check previous kernel's ima-kexec-buffer against memory bounds
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v6 2/6] drivers: of: kexec ima: Support 32-bit platforms
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v6 6/6] tpm/kexec: Duplicate TPM measurement log in of-tree for kexec
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v6 0/6] tpm: Preserve TPM measurement log across kexec (ppc64)
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v6 5/6] of: kexec: Refactor IMA buffer related functions to make them reusable
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v6 3/6] x86/kexec: Carry forward IMA measurement log on kexec
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 5/6] of: kexec: Refactor IMA buffer related functions to make them reusable
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v13 08/26] ima: Move IMA securityfs files into ima_namespace or onto stack
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v13 15/26] ima: Implement ima_free_policy_rules() for freeing of an ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v13 23/26] ima: Show owning user namespace's uid and gid when displaying policy
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v13 10/26] ima: Switch to lazy lsm policy updates for better performance
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v13 21/26] ima: Setup securityfs for IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v13 06/26] ima: Move measurement list related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v13 00/26] ima: Namespace IMA with audit support in IMA-ns
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v13 22/26] ima: Introduce securityfs file to activate an IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v13 07/26] ima: Move some IMA policy and filesystem related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v13 18/26] integrity: Add optional callback function to integrity_inode_free()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v13 04/26] ima: Move arch_policy_entry into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v13 16/26] ima: Add functions for creating and freeing of an ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v13 01/26] securityfs: rework dentry creation
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v13 02/26] securityfs: Extend securityfs with namespacing support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v13 09/26] ima: Move ima_lsm_policy_notifier into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v13 17/26] integrity/ima: Define ns_status for storing namespaced iint data
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v13 11/26] ima: Define mac_admin_ns_capable() as a wrapper for ns_capable()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v13 05/26] ima: Move ima_htable into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v13 19/26] ima: Namespace audit status flags
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v13 03/26] ima: Define ima_namespace struct and start moving variables into it
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v13 12/26] ima: Only accept AUDIT rules for non-init_ima_ns namespaces for now
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v13 25/26] ima: Restrict informational audit messages to init_ima_ns
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v13 24/26] ima: Limit number of policy rules in non-init_ima_ns
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v13 14/26] ima: Implement hierarchical processing of file accesses
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v13 26/26] ima: Enable IMA namespaces
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v13 13/26] userns: Add pointer to ima_namespace to user_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v13 20/26] ima: Remove unused iints from the integrity_iint_cache
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 5/6] of: kexec: Refactor IMA buffer related functions to make them reusable
- From: Jonathan McDowell <noodles@xxxxxx>
- Re: [PATCH v12 02/26] securityfs: Extend securityfs with namespacing support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v9 0/4] unify the keyrings of arm64 and s390 with x86 to verify kexec'ed kernel signature
- From: Coiby Xu <coxu@xxxxxxxxxx>
- Re: [PATCH v12 13/26] userns: Add pointer to ima_namespace to user_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v12 04/26] ima: Move arch_policy_entry into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [linux-next:master] BUILD REGRESSION 088b9c375534d905a4d337c78db3b3bfbb52c4a0
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Hold locality open during probe
- From: Jason Andryuk <jandryuk@xxxxxxxxx>
- Re: [linux-next:master] BUILD REGRESSION 088b9c375534d905a4d337c78db3b3bfbb52c4a0
- From: "Chen, Rong A" <rong.a.chen@xxxxxxxxx>
- Re: [linux-next:master] BUILD REGRESSION 088b9c375534d905a4d337c78db3b3bfbb52c4a0
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Hold locality open during probe
- From: "chenjun (AM)" <chenjun102@xxxxxxxxxx>
- [linux-next:master] BUILD REGRESSION 088b9c375534d905a4d337c78db3b3bfbb52c4a0
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v5 6/6] tpm/kexec: Duplicate TPM measurement log in of-tree for kexec
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] ima/evm: Fix potential memory leak in ima_init_crypto()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [syzbot] possible deadlock in mnt_want_write (2)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] tpm_tis: Hold locality open during probe
- From: Jason Andryuk <jandryuk@xxxxxxxxx>
- [PATCH v5 5/6] of: kexec: Refactor IMA buffer related functions to make them reusable
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v5 3/6] x86/kexec: Carry forward IMA measurement log on kexec
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v5 1/6] of: check previous kernel's ima-kexec-buffer against memory bounds
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v5 6/6] tpm/kexec: Duplicate TPM measurement log in of-tree for kexec
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v5 4/6] tpm: of: Make of-tree specific function commonly available
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v5 0/6] tpm: Preserve TPM measurement log across kexec (ppc64)
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v5 2/6] drivers: of: kexec ima: Support 32-bit platforms
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v4 4/5] of: kexec: Refactor IMA buffer related functions to make them reusable
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v9 0/4] unify the keyrings of arm64 and s390 with x86 to verify kexec'ed kernel signature
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 4/5] of: kexec: Refactor IMA buffer related functions to make them reusable
- From: Jonathan McDowell <noodles@xxxxxx>
- Re: [PATCH v9 0/4] unify the keyrings of arm64 and s390 with x86 to verify kexec'ed kernel signature
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v9 0/4] unify the keyrings of arm64 and s390 with x86 to verify kexec'ed kernel signature
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 6/6] i2c: Make remove callback return void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH 6/6] i2c: Make remove callback return void
- From: Vladimir Oltean <olteanv@xxxxxxxxx>
- Re: [PATCH] ima: Fix a potential integer overflow in ima_appraise_measurement
- From: Huaxin Lu <luhuaxin1@xxxxxxxxxx>
- Re: [PATCH v4 4/5] of: kexec: Refactor IMA buffer related functions to make them reusable
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] ima: fix violation measurement list record
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2] ima: fix violation measurement list record
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3] tpm: Add check for Failure mode for TPM2 modules
- From: Mårten Lindahl <marten.lindahl@xxxxxxxx>
- Re: [PATCH v2] tpm: Add check for Failure mode for TPM2 modules
- From: Marten Lindahl <martenli@xxxxxxxx>
- Re: [syzbot] possible deadlock in mnt_want_write (2)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 6/6] i2c: Make remove callback return void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH 6/6] i2c: Make remove callback return void
- From: Jean Delvare <jdelvare@xxxxxxx>
- [PATCH v2] ima: Fix a potential integer overflow in ima_appraise_measurement
- From: <luhuaxin1@xxxxxxxxxx>
- Re: [PATCH] ima: Fix a potential integer overflow in ima_appraise_measurement
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- [PATCH] ima: Fix a potential integer overflow in ima_appraise_measurement
- From: <luhuaxin1@xxxxxxxxxx>
- Re: [PATCH v7 07/10] tmp, tmp_tis: Implement usage counter for locality
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH 0/6] i2c: Make remove callback return void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH v7] x86/kexec: Carry forward IMA measurement log on kexec
- From: Baoquan He <bhe@xxxxxxxxxx>
- [PATCH v9 4/4] kexec, KEYS, s390: Make use of built-in and secondary keyring for signature verification
- From: Coiby Xu <coxu@xxxxxxxxxx>
- [PATCH v9 3/4] arm64: kexec_file: use more system keyrings to verify kernel image signature
- From: Coiby Xu <coxu@xxxxxxxxxx>
- [PATCH v9 2/4] kexec, KEYS: make the code in bzImage64_verify_sig generic
- From: Coiby Xu <coxu@xxxxxxxxxx>
- [PATCH v9 1/4] kexec: clean up arch_kexec_kernel_verify_sig
- From: Coiby Xu <coxu@xxxxxxxxxx>
- [PATCH v9 0/4] unify the keyrings of arm64 and s390 with x86 to verify kexec'ed kernel signature
- From: Coiby Xu <coxu@xxxxxxxxxx>
- [PATCH] ima/evm: Fix potential memory leak in ima_init_crypto()
- From: Jianglei Nie <niejianglei2021@xxxxxxx>
- Re: [syzbot] possible deadlock in mnt_want_write (2)
- From: syzbot <syzbot+b42fe626038981fb7bfa@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH] tpm: eventlog: Fix section mismatch for DEBUG_SECTION_MISMATCH
- From: Huacai Chen <chenhuacai@xxxxxxxxxxx>
- Re: [linux-next:master] BUILD REGRESSION 6cc11d2a1759275b856e464265823d94aabd5eaf
- From: Roman Gushchin <roman.gushchin@xxxxxxxxx>
- Re: [PATCH] ima: fix violation measurement list record
- From: Jonathan McDowell <noodles@xxxxxxxx>
- Re: [PATCH] ima: fix violation measurement list record
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] ima: fix violation measurement list record
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH -next] tpm: fix platform_no_drv_owner.cocci warning
- From: Yang Li <yang.lee@xxxxxxxxxxxxxxxxx>
- [PATCH v4 3/5] tpm: of: Make of-tree specific function commonly available
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v4 0/5] tpm: Preserve TPM measurement log across kexec (ppc64)
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v4 5/5] tpm/kexec: Duplicate TPM measurement log in of-tree for kexec
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v4 1/5] of: check previous kernel's ima-kexec-buffer against memory bounds
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v4 2/5] drivers: of: kexec ima: Support 32-bit platforms
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v4 4/5] of: kexec: Refactor IMA buffer related functions to make them reusable
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v7 07/10] tmp, tmp_tis: Implement usage counter for locality
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 08/10] tpm, tpm_tis: Request threaded interrupt handler
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 07/10] tmp, tmp_tis: Implement usage counter for locality
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 06/10] tpm, tpm_tis: Move interrupt mask checks into own function
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/3] tpm: of: Move of-tree specific code from tpm driver into of driver
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 05/10] tpm, tpm_tis: Only handle supported interrupts
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 3/3] gen_init_cpio: add support for file metadata
- From: Eugeniu Rosca <erosca@xxxxxxxxxxxxxx>
- RE: [PATCH v4 3/3] gen_init_cpio: add support for file metadata
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH] ima: Defer query for iversion until it is needed
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] Support kexec_file on 32-bit RISC-V
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/5] ima: Fix a build issue on 32-bit platforms
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] drivers: of: kexec ima: Support 32-bit platforms
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] drivers: of: kexec ima: Support 32-bit platforms
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7] x86/kexec: Carry forward IMA measurement log on kexec
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v7] x86/kexec: Carry forward IMA measurement log on kexec
- From: Jonathan McDowell <noodles@xxxxxx>
- [PATCH] ima: Defer query for iversion until it is needed
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v7 09/10] tpm, tpm_tis: Claim locality in interrupt handler
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v7 10/10] tpm, tpm_tis: Enable interrupt test
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v7 08/10] tpm, tpm_tis: Request threaded interrupt handler
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v7 02/10] tpm, tpm_tis: Claim locality before writing TPM_INT_ENABLE register
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v7 07/10] tmp, tmp_tis: Implement usage counter for locality
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v7 05/10] tpm, tpm_tis: Only handle supported interrupts
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v7 06/10] tpm, tpm_tis: Move interrupt mask checks into own function
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v7 04/10] tpm, tmp_tis: Claim locality before writing interrupt registers
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v7 01/10] tpm, tpm_tis: Avoid cache incoherency in test for interrupts
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v7 03/10] tpm, tpm_tis: Disable interrupts if tpm_tis_probe_irq() failed
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v7 00/10] TPM IRQ fixes
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH 6/6] i2c: Make remove callback return void
- From: Luca Ceresoli <luca@xxxxxxxxxxxxxxxx>
- Re: [PATCH] of: Correctly annotate IMA kexec buffer functions
- From: Jonathan McDowell <noodles@xxxxxx>
- Re: [PATCH 6/6] i2c: Make remove callback return void
- From: Maximilian Luz <luzmaximilian@xxxxxxxxx>
- Re: [PATCH v2 1/3] tpm: of: Move of-tree specific code from tpm driver into of driver
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] of: Correctly annotate IMA kexec buffer functions
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 6/6] i2c: Make remove callback return void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH 6/6] i2c: Make remove callback return void
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- [PATCH] of: Correctly annotate IMA kexec buffer functions
- From: Jonathan McDowell <noodles@xxxxxx>
- Re: [PATCH v6 5/9] tpm, tpm_tis: Only handle supported interrupts
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH 6/6] i2c: Make remove callback return void
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH 6/6] i2c: Make remove callback return void
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH 6/6] i2c: Make remove callback return void
- From: Heikki Krogerus <heikki.krogerus@xxxxxxxxxxxxxxx>
- Re: [PATCH 6/6] i2c: Make remove callback return void
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH 6/6] i2c: Make remove callback return void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH -next] evm: Use IS_ENABLED to initialize .enabled
- From: xiujianfeng <xiujianfeng@xxxxxxxxxx>
- Re: [PATCH v2 1/3] tpm: of: Move of-tree specific code from tpm driver into of driver
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 0/3] tpm: Preserve TPM measurement log across kexec (ppc64)
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 0/3] tpm: Preserve TPM measurement log across kexec (ppc64)
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 1/3] tpm: of: Make of-tree specific function commonly available
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 3/3] tpm/kexec: Duplicate TPM measurement log in of-tree for kexec
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 2/3] of: kexec: Refactor IMA buffer related functions to make them reusable
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] tpm/kexec: Duplicate TPM measurement log in of-tree for kexec
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 1/3] tpm: of: Move of-tree specific code from tpm driver into of driver
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] tpm: Preserve TPM measurement log across kexec
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v37 15/33] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v37 12/33] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v37 13/33] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v37 11/33] LSM: Use lsmblob in security_current_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v37 01/33] integrity: disassociate ima_filter_rule from security_audit_rule
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v6 5/9] tpm, tpm_tis: Only handle supported interrupts
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/3] tpm: of: Move of-tree specific code from tpm driver into of driver
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v2 0/3] tpm: Preserve TPM measurement log across kexec
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH -next] evm: Use IS_ENABLED to initialize .enabled
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 5/9] tpm, tpm_tis: Only handle supported interrupts
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH v6 5/9] tpm, tpm_tis: Only handle supported interrupts
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 5/9] tpm, tpm_tis: Only handle supported interrupts
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 1/9] tpm, tpm_tis: Avoid cache incoherency in test for interrupts
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm: Add check for Failure mode for TPM2 modules
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: increase timeout for kselftests
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: CKI team seeing boot failures with 5.19 kernels on VMs with tpm device
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 10/10] tpm, tpm_tis: Enable interrupt test
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2 4/5] RISC-V: purgatory: Use XLEN-length loads to support rv32
- From: Palmer Dabbelt <palmer@xxxxxxxxxxxx>
- [PATCH v2 3/5] RISC-V: kexec: Use Elf64 on 64-bit targets
- From: Palmer Dabbelt <palmer@xxxxxxxxxxxx>
- [PATCH v2 5/5] RISC-V: Allow kexec_file() on 32-bit platforms
- From: Palmer Dabbelt <palmer@xxxxxxxxxxxx>
- [PATCH v2 2/5] ima: Fix a build issue on 32-bit platforms
- From: Palmer Dabbelt <palmer@xxxxxxxxxxxx>
- [PATCH v2 0/5] Support kexec_file on 32-bit RISC-V
- From: Palmer Dabbelt <palmer@xxxxxxxxxxxx>
- [PATCH v2 1/5] drivers: of: kexec ima: Support 32-bit platforms
- From: Palmer Dabbelt <palmer@xxxxxxxxxxxx>
- efi_tpm_eventlog_init question
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v6 9/9] tpm, tpm_tis: Enable interrupt test
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH -next] evm: Use IS_ENABLED to initialize .enabled
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v6 9/9] tpm, tpm_tis: Enable interrupt test
- From: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
- Re: [PATCH -next] evm: Use IS_ENABLED to initialize .enabled
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v6 6/9] tmp, tmp_tis: Implement usage counter for locality
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v6 9/9] tpm, tpm_tis: Enable interrupt test
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v6 0/9] TPM IRQ fixes
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v6 5/9] tpm, tpm_tis: Only handle supported interrupts
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v6 3/9] tpm, tpm_tis: Disable interrupts if tpm_tis_probe_irq() failed
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v6 1/9] tpm, tpm_tis: Avoid cache incoherency in test for interrupts
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v6 4/9] tpm, tmp_tis: Claim locality before writing interrupt registers
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v6 2/9] tpm, tpm_tis: Claim locality before writing TPM_INT_ENABLE register
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v6 8/9] tpm, tpm_tis: Claim locality in interrupt handler
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v6 7/9] tpm, tpm_tis: Request threaded interrupt handler
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH -next] evm: Use IS_ENABLED to initialize .enabled
- From: xiujianfeng <xiujianfeng@xxxxxxxxxx>
- Re: [PATCH] tpm: sleep at least <...> ms in tpm_msleep()
- From: Stefan Mahnke-Hartmann <stefan.mahnke-hartmann@xxxxxxxxxxxx>
- [PATCH v2] tpm: Add check for Failure mode for TPM2 modules
- From: Mårten Lindahl <marten.lindahl@xxxxxxxx>
- Re: [PATCH] tpm: Add check for Failure mode for TPM2 modules
- From: Marten Lindahl <martenli@xxxxxxxx>
- Re: [PATCH] tpm: increase timeout for kselftests
- From: Stefan Mahnke-Hartmann <stefan.mahnke-hartmann@xxxxxxxxxxxx>
- Re: Sending vendor specific commands to spi-nor flash
- From: Paul Barker <paul.barker@xxxxxxxxxxxx>
- Re: [PATCH v4 ima-evm-utils 2/3] Sign an fs-verity file digest
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: CKI team seeing boot failures with 5.19 kernels on VMs with tpm device
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH 1/1] ci/ubuntu: impish -> jammy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4 ima-evm-utils 3/3] Verify an fs-verity file digest based signature
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4 ima-evm-utils 2/3] Sign an fs-verity file digest
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4 ima-evm-utils 0/3] fs-verity file signature support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4 ima-evm-utils 1/3] Reset 'errno' after failure to open or access a file
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 1/1] ci/ubuntu: impish -> jammy
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH -next v2] ima: Refactor hash algo compatibility check
- From: GUO Zihua <guozihua@xxxxxxxxxx>
- [PATCH -next] ima: Refactor hash algo compatibility check
- From: GUO Zihua <guozihua@xxxxxxxxxx>
- Re: [PATCH v2 3/3] tpm/kexec: Duplicate TPM measurement log in of-tree for kexec
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 00/10] Encrypted Hibernation
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH v2 1/3] tpm: of: Move of-tree specific code from tpm driver into of driver
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 3/3] tpm/kexec: Duplicate TPM measurement log in of-tree for kexec
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 2/3] of: kexec: Refactor IMA buffer related functions to make them reusable
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 0/3] tpm: Preserve TPM measurement log across kexec
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v6] x86/kexec: Carry forward IMA measurement log on kexec
- From: Jonathan McDowell <noodles@xxxxxx>
- Re: [PATCH v4 3/3] gen_init_cpio: add support for file metadata
- From: Eugeniu Rosca <erosca@xxxxxxxxxxxxxx>
- Re: [PATCH v4 3/3] gen_init_cpio: add support for file metadata
- From: Eugeniu Rosca <erosca@xxxxxxxxxxxxxx>
- Re: [PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Eugeniu Rosca <erosca@xxxxxxxxxxxxxx>
- Re: [PATCH v5 10/10] tpm, tpm_tis: Enable interrupt test
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH v5 10/10] tpm, tpm_tis: Enable interrupt test
- From: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
- Re: [PATCH v5 10/10] tpm, tpm_tis: Enable interrupt test
- From: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
- Re: [PATCH v5] x86/kexec: Carry forward IMA measurement log on kexec
- From: Baoquan He <bhe@xxxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]