Linux Integrity
[Prev Page][Next Page]
- Re: [RESEND][RFC][PATCH 2/3] bpf-lsm: Limit values that can be returned by security modules
- From: KP Singh <kpsingh@xxxxxxxxxx>
- [PATCH v2 3/3] char: tpm: cr50: Move i2c locking to request/relinquish locality ops
- From: Jan Dabros <jsd@xxxxxxxxxxxx>
- [PATCH v2 2/3] char: tpm: cr50: Use generic request/relinquish locality ops
- From: Jan Dabros <jsd@xxxxxxxxxxxx>
- [PATCH v2 1/3] char: tpm: Protect tpm_pm_suspend with locks
- From: Jan Dabros <jsd@xxxxxxxxxxxx>
- [PATCH v2 0/3] char: tpm: Adjust cr50_i2c locking mechanism
- From: Jan Dabros <jsd@xxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v4 01/17] Revert "Reset 'errno' after failure to open or access a file"
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH ima-evm-utils v4 01/17] Revert "Reset 'errno' after failure to open or access a file"
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/2] ima: Handle -ESTALE returned by ima_filter_rule_match()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3] ima: Fix a potential NULL pointer access in ima_restore_measurement_list
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: Fix memory leak in __ima_inode_hash()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v4 02/17] log and reset 'errno' after failure to open non-critical files
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: Fix memory leak in __ima_inode_hash()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] char: tpm: cr50: Use generic request/relinquish locality ops
- From: Jan Dąbroś <jsd@xxxxxxxxxxxx>
- Re: [PATCH 1/3] char: tpm: Protect tpm_pm_suspend with locks
- From: Jan Dąbroś <jsd@xxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v4 02/17] log and reset 'errno' after failure to open non-critical files
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v1 4/4] Change condition to free(pub)
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v1 1/4] Fix memory leaks of tpm_bank_info allocations
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v1 2/4] Fix memory leak related to entry.template
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v1 3/4] Add assert to ensure that algo_name in bank is set
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v1 0/4] Fix some issues in evmctl
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH] ima: Fix memory leak in __ima_inode_hash()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3] ima: Fix a potential NULL pointer access in ima_restore_measurement_list
- From: Huaxin Lu <luhuaxin1@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils v4 03/17] Log and reset 'errno' on lsetxattr failure
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: Possible bug or unintended behaviour using bpf_ima_file_hash
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: Possible bug or unintended behaviour using bpf_ima_file_hash
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: Fix a potential null pointer access problem in ima_restore_measurement_list
- From: Huaxin Lu <luhuaxin1@xxxxxxxxxx>
- [PATCH v2] ima: Fix a potential null pointer access problem in ima_restore_measurement_list
- From: Huaxin Lu <luhuaxin1@xxxxxxxxxx>
- Re: Possible bug or unintended behaviour using bpf_ima_file_hash
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/2] ima: Handle -ESTALE returned by ima_filter_rule_match()
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils v4 17/17] Fix d2i_x509_fp failure
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v4 01/17] Revert "Reset 'errno' after failure to open or access a file"
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v4 01/17] Revert "Reset 'errno' after failure to open or access a file"
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: Fix a potential null pointer access problem in ima_restore_measurement_list
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/2] ima: Handle -ESTALE returned by ima_filter_rule_match()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v4 01/17] Revert "Reset 'errno' after failure to open or access a file"
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v4 14/17] Base sm2/sm3 test on openssl version installed
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] efi: Add iMac Pro 2017 to uefi skip cert quirk
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v4 05/17] Update configure.ac to address a couple of obsolete warnings
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v4 15/17] Compile a newer version of OpenSSL
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v4 16/17] Build OpenSSL without engine support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v4 17/17] Fix d2i_x509_fp failure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v4 14/17] Base sm2/sm3 test on openssl version installed
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v4 13/17] Missing template data size lower bounds checking
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v4 10/17] Disable use of OpenSSL "engine" support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v4 12/17] Limit the file hash algorithm name length
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v4 00/17] address deprecated warnings
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v4 06/17] Deprecate IMA signature version 1
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v4 11/17] Fix potential use after free in read_tpm_banks()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v4 09/17] Add missing EVP_MD_CTX_free() call in calc_evm_hash()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v4 08/17] Replace the low level HMAC calls when calculating the EVM HMAC
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v4 01/17] Revert "Reset 'errno' after failure to open or access a file"
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v4 03/17] Log and reset 'errno' on lsetxattr failure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v4 07/17] Replace the low level SHA1 calls when calculating the TPM 1.2 PCRs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v4 04/17] travis: update dist=focal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v4 02/17] log and reset 'errno' after failure to open non-critical files
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] char: tpm: cr50: Use generic request/relinquish locality ops
- From: Tim Van Patten <timvp@xxxxxxxxxx>
- Re: [PATCH 1/3] char: tpm: Protect tpm_pm_suspend with locks
- From: Tim Van Patten <timvp@xxxxxxxxxx>
- Re: [PATCH] efi: Add iMac Pro 2017 to uefi skip cert quirk
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH 1/7] dt-bindings: tpm: Introduce trivial-tpms.yaml
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 4/7] dt-bindings: tpm: Merge existing trivial TPMs to YAML
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH] efi: Add iMac Pro 2017 to uefi skip cert quirk
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 3/3] char: tpm: cr50: Move i2c locking to request/relinquish locality ops
- From: Jan Dabros <jsd@xxxxxxxxxxxx>
- [PATCH 2/3] char: tpm: cr50: Use generic request/relinquish locality ops
- From: Jan Dabros <jsd@xxxxxxxxxxxx>
- [PATCH 1/3] char: tpm: Protect tpm_pm_suspend with locks
- From: Jan Dabros <jsd@xxxxxxxxxxxx>
- [PATCH 0/3] char: tpm: Adjust cr50_i2c locking mechanism
- From: Jan Dabros <jsd@xxxxxxxxxxxx>
- Re: [PATCH] tpm: Avoid function type cast of put_device()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: Avoid function type cast of put_device()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 3/3] tpm: st33zp24: remove pointless checks on probe
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 2/3] tpm: st33zp24: switch to using gpiod API
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 1/3] tpm: st33zp24: drop support for platform data
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 08/11] tpm, tpm: Implement usage counter for locality
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 08/11] tpm, tpm: Implement usage counter for locality
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Possible bug or unintended behaviour using bpf_ima_file_hash
- From: Isaac Matthews <isaac.jmatt@xxxxxxxxx>
- [RFC PATCH v2 4/4] ima: Extend the real PCR12 with tempPCR value.
- From: Denis Semakin <denis.semakin@xxxxxxxxxx>
- [RFC PATCH v2 3/4] ima: Create vpcr file on securityfs.
- From: Denis Semakin <denis.semakin@xxxxxxxxxx>
- [RFC PATCH v2 2/4] ima: Use tpm_chip from init IMA namespace.
- From: Denis Semakin <denis.semakin@xxxxxxxxxx>
- [RFC PATCH v2 1/4] ima: Introduce PCR virtualization for IMA namespace.
- From: Denis Semakin <denis.semakin@xxxxxxxxxx>
- [RFC PATCH v2 0/4] Virtualize PCR for Container-IMA
- From: Denis Semakin <denis.semakin@xxxxxxxxxx>
- Re: [PATCH] tpm: Avoid function type cast of put_device()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] tpm: Avoid function type cast of put_device()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [RESEND][RFC][PATCH 3/3] selftests/bpf: Check if return values of LSM programs are allowed
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RESEND][RFC][PATCH 2/3] bpf-lsm: Limit values that can be returned by security modules
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RESEND][RFC][PATCH 1/3] lsm: Clarify documentation of vm_enough_memory hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC][PATCH] bpf: Check xattr name/value pair from bpf_lsm_inode_init_security()
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [bug report] integrity: implement get and set acl hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [bug report] integrity: implement get and set acl hook
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [RFC][PATCH] bpf: Check xattr name/value pair from bpf_lsm_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/2] ima: Handle -ESTALE returned by ima_filter_rule_match()
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [RFC][PATCH] bpf: Check xattr name/value pair from bpf_lsm_inode_init_security()
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC][PATCH] bpf: Check xattr name/value pair from bpf_lsm_inode_init_security()
- From: KP Singh <kpsingh@xxxxxxxxxx>
- [PATCH] efi: Add iMac Pro 2017 to uefi skip cert quirk
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- efi: Add iMac Pro 2017 to uefi skip cert quirk
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- [PATCH v3 2/3] tpm: st33zp24: switch to using gpiod API
- From: Dmitry Torokhov <dmitry.torokhov@xxxxxxxxx>
- [PATCH v3 3/3] tpm: st33zp24: remove pointless checks on probe
- From: Dmitry Torokhov <dmitry.torokhov@xxxxxxxxx>
- [PATCH v3 1/3] tpm: st33zp24: drop support for platform data
- From: Dmitry Torokhov <dmitry.torokhov@xxxxxxxxx>
- Re: [RFC][PATCH] bpf: Check xattr name/value pair from bpf_lsm_inode_init_security()
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- [PATCH v4] evm: Correct inode_init_security hooks behaviors
- From: Nicolas Bouchinet <nicolas.bouchinet@xxxxxxxxxxx>
- Re: [PATCH] evm: Correct inode_init_security hooks behaviors
- From: Nicolas Bouchinet <nicolas.bouchinet@xxxxxxxxxxx>
- Re: [RFC][PATCH] bpf: Check xattr name/value pair from bpf_lsm_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC][PATCH] bpf: Check xattr name/value pair from bpf_lsm_inode_init_security()
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH v3] evm: Correct inode_init_security hooks behaviors
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v3] evm: Correct inode_init_security hooks behaviors
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] evm: Correct inode_init_security hooks behaviors
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] evm: Correct inode_init_security hooks behaviors
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC][PATCH] bpf: Check xattr name/value pair from bpf_lsm_inode_init_security()
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] evm: Correct inode_init_security hooks behaviors
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] evm: Correct inode_init_security hooks behaviors
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3] evm: Correct inode_init_security hooks behaviors
- From: Nicolas Bouchinet <nicolas.bouchinet@xxxxxxxxxxx>
- Re: [PATCH] evm: Correct inode_init_security hooks behaviors
- From: Nicolas Bouchinet <nicolas.bouchinet@xxxxxxxxxxx>
- [PATCH] ima: fix a possible null pointer dereference
- From: Gaosheng Cui <cuigaosheng1@xxxxxxxxxx>
- Re: [RFC][PATCH] bpf: Check xattr name/value pair from bpf_lsm_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC][PATCH] bpf: Check xattr name/value pair from bpf_lsm_inode_init_security()
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH v8 08/11] tpm, tpm: Implement usage counter for locality
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH v8 08/11] tpm, tpm: Implement usage counter for locality
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [RFC][PATCH] bpf: Check xattr name/value pair from bpf_lsm_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] ima: Fix a potential null pointer access problem in ima_restore_measurement_list
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] evm: Correct inode_init_security hooks behaviors
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] evm: Correct inode_init_security hooks behaviors
- From: Nicolas Bouchinet <nicolas.bouchinet@xxxxxxxxxxx>
- Re: [PATCH] evm: Correct inode_init_security hooks behaviors
- From: Nicolas Bouchinet <nicolas.bouchinet@xxxxxxxxxxx>
- Re: Expected appraisal behavior after script modification
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 5/8] ima: use type safe idmapping helpers
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [RFC][PATCH] bpf: Check xattr name/value pair from bpf_lsm_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Expected appraisal behavior after script modification
- From: Ken Williams <ken@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 08/11] PM: hibernate: Use TPM-backed keys to encrypt image
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: Avoid function type cast of put_device()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v6] KEYS: encrypted: fix key instantiation with user-provided data
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v6] KEYS: encrypted: fix key instantiation with user-provided data
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4] KEYS: encrypted: fix key instantiation with user-provided data
- From: Nikolaus Voss <nv@xxxxxxx>
- Re: [PATCH v8 08/11] tpm, tpm: Implement usage counter for locality
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4] KEYS: encrypted: fix key instantiation with user-provided data
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4] KEYS: encrypted: fix key instantiation with user-provided data
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 08/11] tpm, tpm: Implement usage counter for locality
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 11/11] tpm, tpm_tis: Enable interrupt test
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 11/11] tpm, tpm_tis: Enable interrupt test
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 07/11] tpm, tpm_tis: do not check for the active locality in interrupt handler
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 08/11] PM: hibernate: Use TPM-backed keys to encrypt image
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- Re: [PATCH 2/9] security: Move trivial IMA hooks into LSM
- From: "Dr. Greg" <greg@xxxxxxxxxxxx>
- Re: [PATCH] tpm: Avoid function type cast of put_device()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2] evm: Correct inode_init_security hooks behaviors
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2] evm: Correct inode_init_security hooks behaviors
- From: Nicolas Bouchinet <nicolas.bouchinet@xxxxxxxxxxx>
- Re: [PATCH 2/9] security: Move trivial IMA hooks into LSM
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Avoid function type cast of put_device()
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] evm: Correct inode_init_security hooks behaviors
- From: Nicolas Bouchinet <nicolas.bouchinet@xxxxxxxxxxx>
- Re: [PATCH] evm: Correct inode_init_security hooks behaviors
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] evm: Correct inode_init_security hooks behaviors
- From: Nicolas Bouchinet <nicolas.bouchinet@xxxxxxxxxxx>
- Re: [PATCH] evm: Correct inode_init_security hooks behaviors
- From: Nicolas Bouchinet <nicolas.bouchinet@xxxxxxxxxxx>
- Re: [PATCH] evm: Correct inode_init_security hooks behaviors
- From: Nicolas Bouchinet <nicolas.bouchinet@xxxxxxxxxxx>
- [PATCH] tpm: Avoid function type cast of put_device()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [EXT] Re: [PATCH v0 3/8] crypto: hbk flags & info added to the tfm
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH 6/9] fs: Introduce file_to_perms() helper
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [EXT] Re: [PATCH v0 3/8] crypto: hbk flags & info added to the tfm
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] evm: Correct inode_init_security hooks behaviors
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [EXT] Re: [PATCH v0 3/8] crypto: hbk flags & info added to the tfm
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH 0/9] integrity: Move hooks into LSM
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 6/9] fs: Introduce file_to_perms() helper
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] evm: Correct inode_init_security hooks behaviors
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 4/9] ima: Move ima_file_free() into LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] evm: Correct inode_init_security hooks behaviors
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH] evm: Correct inode_init_security hooks behaviors
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] evm: Correct inode_init_security hooks behaviors
- From: Nicolas Bouchinet <nicolas.bouchinet@xxxxxxxxxxx>
- Re: [PATCH 2/9] security: Move trivial IMA hooks into LSM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [EXT] Re: [PATCH v0 3/8] crypto: hbk flags & info added to the tfm
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 2/9] security: Move trivial IMA hooks into LSM
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 1/9] integrity: Prepare for having "ima" and "evm" available in "integrity" LSM
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v6] KEYS: encrypted: fix key instantiation with user-provided data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/9] security: Move trivial IMA hooks into LSM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/9] integrity: Prepare for having "ima" and "evm" available in "integrity" LSM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/9] security: Move trivial IMA hooks into LSM
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 1/9] integrity: Prepare for having "ima" and "evm" available in "integrity" LSM
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 1/9] integrity: Prepare for having "ima" and "evm" available in "integrity" LSM
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v6] KEYS: encrypted: fix key instantiation with user-provided data
- From: Nikolaus Voss <nikolaus.voss@xxxxxxxxxxxxxxx>
- Re: [PATCH v5] KEYS: encrypted: fix key instantiation with user-provided data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/9] security: Move trivial IMA hooks into LSM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/9] integrity: Prepare for having "ima" and "evm" available in "integrity" LSM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v5] KEYS: encrypted: fix key instantiation with user-provided data
- From: Nikolaus Voss <nv@xxxxxxx>
- Re: [PATCH 3/9] ima: Move xattr hooks into LSM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/2] ima: Handle -ESTALE returned by ima_filter_rule_match()
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [PATCH 4/9] ima: Move ima_file_free() into LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/2] ima: Handle -ESTALE returned by ima_filter_rule_match()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4] KEYS: encrypted: fix key instantiation with user-provided data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 12/30] integrity: implement get and set acl hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 0/9] integrity: Move hooks into LSM
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 4/9] ima: Move ima_file_free() into LSM
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 6/9] fs: Introduce file_to_perms() helper
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 4/9] ima: Move ima_file_free() into LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/9] integrity: Move hooks into LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/9] integrity: Move hooks into LSM
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH 3/9] ima: Move xattr hooks into LSM
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH 4/9] ima: Move ima_file_free() into LSM
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH 5/9] LSM: Introduce inode_post_setattr hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH 6/9] fs: Introduce file_to_perms() helper
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH v5 25/30] evm: remove evm_xattr_acl_change()
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH v5 15/30] acl: add vfs_set_acl()
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH v5 13/30] evm: add post set acl hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH v5 12/30] integrity: implement get and set acl hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH v5 10/30] selinux: implement get, set and remove acl hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH v5 00/30] acl: add vfs posix acl api
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v5 2/2] ima: Handle -ESTALE returned by ima_filter_rule_match()
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [PATCH v8 08/11] tpm, tpm: Implement usage counter for locality
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH] integrity: iint: Optimize integrity_iintcache_init and integrity_inode_free function
- From: Li zeming <zeming@xxxxxxxxxxxx>
- Re: [PATCH v8 08/11] tpm, tpm: Implement usage counter for locality
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH v8 02/11] tpm, tpm_tis: Claim locality before writing TPM_INT_ENABLE register
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v8 09/11] tpm, tpm_tis: Request threaded interrupt handler
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v8 06/11] tpm, tpm_tis: Move interrupt mask checks into own function
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v8 08/11] tpm, tpm: Implement usage counter for locality
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v8 11/11] tpm, tpm_tis: Enable interrupt test
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v8 03/11] tpm, tpm_tis: Disable interrupts if tpm_tis_probe_irq() failed
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v8 01/11] tpm, tpm_tis: Avoid cache incoherency in test for interrupts
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v8 07/11] tpm, tpm_tis: do not check for the active locality in interrupt handler
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v8 00/11] TPM IRQ fixes
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v8 04/11] tpm, tmp_tis: Claim locality before writing interrupt registers
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v8 10/11] tpm, tpm_tis: Claim locality in interrupt handler
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v8 05/11] tpm, tpm_tis: Only handle supported interrupts
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH 1/9] integrity: Prepare for having "ima" and "evm" available in "integrity" LSM
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 1/9] integrity: Prepare for having "ima" and "evm" available in "integrity" LSM
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH] ima: Fix a potential null pointer access problem in ima_restore_measurement_list
- From: <luhuaxin1@xxxxxxxxxx>
- Re: [EXT] Re: [PATCH v0 3/8] crypto: hbk flags & info added to the tfm
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH 1/9] integrity: Prepare for having "ima" and "evm" available in "integrity" LSM
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 1/9] integrity: Prepare for having "ima" and "evm" available in "integrity" LSM
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v4] KEYS: encrypted: fix key instantiation with user-provided data
- From: Nikolaus Voss <nv@xxxxxxx>
- Re: [PATCH v4] KEYS: encrypted: fix key instantiation with user-provided data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4] KEYS: encrypted: fix key instantiation with user-provided data
- From: Nikolaus Voss <nv@xxxxxxx>
- Re: [PATCH v4] KEYS: encrypted: fix key instantiation with user-provided data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 0/9] integrity: Move hooks into LSM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 0/9] integrity: Move hooks into LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 7/9] ima: Move ima_file_check() into LSM
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 9/9] integrity: Move integrity_inode_get() out of global header
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 5/9] LSM: Introduce inode_post_setattr hook
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 8/9] integrity: Move trivial hooks into LSM
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 0/9] integrity: Move hooks into LSM
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 6/9] fs: Introduce file_to_perms() helper
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 4/9] ima: Move ima_file_free() into LSM
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 2/9] security: Move trivial IMA hooks into LSM
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 3/9] ima: Move xattr hooks into LSM
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 1/9] integrity: Prepare for having "ima" and "evm" available in "integrity" LSM
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4] KEYS: encrypted: fix key instantiation with user-provided data
- From: Nikolaus Voss <nv@xxxxxxx>
- [PATCH v3] KEYS: encrypted: fix key instantiation with user-provided data
- From: Nikolaus Voss <nv@xxxxxxx>
- Re: [PATCH v2] KEYS: encrypted: fix key instantiation with user-provided data
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2] KEYS: encrypted: fix key instantiation with user-provided data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2] KEYS: encrypted: fix key instantiation with user-provided data
- From: Nikolaus Voss <nv@xxxxxxx>
- Re: [EXT] Re: [PATCH v0 3/8] crypto: hbk flags & info added to the tfm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v0 7/8] caam alg: symmetric key ciphers are updated
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v0 4/8] sk_cipher: checking for hw bound operation
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v0 3/8] crypto: hbk flags & info added to the tfm
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v0 1/8] hw-bound-key: introducing the generic structure
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v0 1/8] hw-bound-key: introducing the generic structure
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: Is efi_tpm_eventlog_init calling memblock_reserve correctly for the TPM final log?
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [EXT] Re: [PATCH v0 3/8] crypto: hbk flags & info added to the tfm
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- RE: [EXT] Re: [PATCH v0 3/8] crypto: hbk flags & info added to the tfm
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- RE: [EXT] Re: [PATCH v0 3/8] crypto: hbk flags & info added to the tfm
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- Re: [EXT] Re: [PATCH v0 3/8] crypto: hbk flags & info added to the tfm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [EXT] [PATCH v0 3/8] crypto: hbk flags & info added to the tfm
- From: David Gstir <david@xxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for Linux v6.1-rc1
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [EXT] Re: [PATCH v0 3/8] crypto: hbk flags & info added to the tfm
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- RE: [EXT] Re: [PATCH v0 3/8] crypto: hbk flags & info added to the tfm
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- Re: [PATCH v7 07/10] tmp, tmp_tis: Implement usage counter for locality
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- User question / Policy file
- From: Ken Williams <ken@xxxxxxxxxxxxxxx>
- Is efi_tpm_eventlog_init calling memblock_reserve correctly for the TPM final log?
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v0 3/8] crypto: hbk flags & info added to the tfm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v0 6/8] KEYS: trusted: caam based black key
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH v0 6/8] KEYS: trusted: caam based black key
- From: Ben Boeckel <me@xxxxxxxxxxxxxx>
- Re: [PATCH v0 2/8] keys-trusted: new cmd line option added
- From: Ben Boeckel <me@xxxxxxxxxxxxxx>
- [PATCH v0 8/8] dm-crypt: consumer-app setting the flag-is_hbk
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH v0 7/8] caam alg: symmetric key ciphers are updated
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH v0 6/8] KEYS: trusted: caam based black key
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH v0 4/8] sk_cipher: checking for hw bound operation
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH v0 2/8] keys-trusted: new cmd line option added
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH v0 3/8] crypto: hbk flags & info added to the tfm
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH v0 5/8] keys-trusted: re-factored caam based trusted key
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH v0 1/8] hw-bound-key: introducing the generic structure
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH v0 0/8] Hardware Bound key added to Trusted Key-Ring
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- Re: [PATCH] tpm/eventlog: Don't abort tpm_read_log on faulty ACPI config
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] KEYS: encrypted: fix key instantiation with user-provided data
- From: Nikolaus Voss <nv@xxxxxxx>
- Re: [PATCH] tpm/eventlog: Don't abort tpm_read_log on faulty ACPI config
- From: Morten Linderud <morten@xxxxxxxxxxx>
- Re: [PATCH v2 3/3] tpm: tis-i2c: Add more compatible strings
- From: Joel Stanley <joel@xxxxxxxxx>
- Re: [PATCH v2 3/3] tpm: tis-i2c: Add more compatible strings
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm/eventlog: Don't abort tpm_read_log on faulty ACPI config
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm/eventlog: Don't abort tpm_read_log on faulty ACPI address
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/3] tpm: st33zp24: drop support for platform data
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/3] tpm: st33zp24: drop support for platform data
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [GIT PULL] tpmdd updates for Linux v6.1-rc1
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 3/3] tpm: tis-i2c: Add more compatible strings
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- Re: [PATCH 3/7] dt-bindings: tpm: Add previously undocumented properties
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- Re: [PATCH 1/7] dt-bindings: tpm: Introduce trivial-tpms.yaml
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- Re: [PATCH 4/7] dt-bindings: tpm: Merge existing trivial TPMs to YAML
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- Re: [PATCH 2/7] dt-bindings: tpm: Improve documentation of compatibles
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- Re: [PATCH v5 2/2] ima: Handle -ESTALE returned by ima_filter_rule_match()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 13/30] evm: add post set acl hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [GIT PULL] integrity: susbsytem updates for v6.1
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] integrity: susbsytem updates for v6.1
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm/eventlog: Don't abort tpm_read_log on faulty ACPI address
- From: Morten Linderud <morten@xxxxxxxxxxx>
- Re: [PATCH v2] tpm/eventlog: Don't abort tpm_read_log on faulty ACPI address
- From: Erkki Eilonen <erkki@xxxxxxxxxxxx>
- [PATCH v2 3/3] tpm: st33zp24: remove pointless checks on probe
- From: Dmitry Torokhov <dmitry.torokhov@xxxxxxxxx>
- [PATCH v2 2/3] tpm: st33zp24: switch to using gpiod API
- From: Dmitry Torokhov <dmitry.torokhov@xxxxxxxxx>
- [PATCH v2 1/3] tpm: st33zp24: drop support for platform data
- From: Dmitry Torokhov <dmitry.torokhov@xxxxxxxxx>
- Re: [PATCH 3/3] tpm: st33zp24: remove pointless checks on probe
- From: Dmitry Torokhov <dmitry.torokhov@xxxxxxxxx>
- Re: [PATCH 1/3] tpm: st33zp24: drop support for platform data
- From: Dmitry Torokhov <dmitry.torokhov@xxxxxxxxx>
- Re: [PATCH 3/7] dt-bindings: tpm: Add previously undocumented properties
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- Re: [PATCH 1/7] dt-bindings: tpm: Introduce trivial-tpms.yaml
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- Re: [PATCH 0/7] Clean up TPM compatibles
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- Re: [PATCH 2/7] dt-bindings: tpm: Improve documentation of compatibles
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 4/7] dt-bindings: tpm: Merge existing trivial TPMs to YAML
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH] tpm: Add flag to use default cancellation policy
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 3/3] tpm: tis-i2c: Add more compatible strings
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 08/11] PM: hibernate: Use TPM-backed keys to encrypt image
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 07/11] PM: hibernate: Add kernel-based encryption
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 01/11] tpm: Add support for in-kernel resetting of PCRs
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 3/3] tpm: st33zp24: remove pointless checks on probe
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/3] tpm: st33zp24: switch to using gpiod API
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: st33zp24: drop support for platform data
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCHv2 RESEND] efi: Correct Macmini DMI match in uefi cert quirk
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 1/7] dt-bindings: tpm: Introduce trivial-tpms.yaml
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- [PATCH 7/7] tpm: Add missing compatibles to drivers
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- [PATCH 4/7] dt-bindings: tpm: Merge existing trivial TPMs to YAML
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- [PATCH 6/7] dt-bindings: tpm: Add fallbacks for all TCG-compliant TPM variants
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- [PATCH 3/7] dt-bindings: tpm: Add previously undocumented properties
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- [PATCH 5/7] dt-bindings: tpm: Document previously undocumented compatibles
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- [PATCH 0/7] Clean up TPM compatibles
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- [PATCH 2/7] dt-bindings: tpm: Improve documentation of compatibles
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- Re: [PATCH v2 2/3] dt-bindings: tpm: Add schema for TIS I2C devices
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v2 1/3] dt-bindings: trivial-devices: Remove Infineon SLB9673 TPM
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v2 3/3] tpm: tis-i2c: Add more compatible strings
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v4 12/30] integrity: implement get and set acl hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 13/30] evm: add post set acl hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 13/30] evm: add post set acl hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v4 10/30] selinux: implement get, set and remove acl hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v3 12/29] integrity: implement get and set acl hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v4 12/30] integrity: implement get and set acl hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v4 12/30] integrity: implement get and set acl hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 13/30] evm: add post set acl hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 13/30] evm: add post set acl hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 12/29] integrity: implement get and set acl hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 10/30] selinux: implement get, set and remove acl hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 12/30] integrity: implement get and set acl hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v4 25/30] evm: remove evm_xattr_acl_change()
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH v4 15/30] acl: add vfs_set_acl()
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH v4 13/30] evm: add post set acl hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH v4 00/30] acl: add vfs posix acl api
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH v4 12/30] integrity: implement get and set acl hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH v4 10/30] selinux: implement get, set and remove acl hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCHv2 RESEND] efi: Correct Macmini DMI match in uefi cert quirk
- From: Orlando Chamberlain <redecorating@xxxxxxxxxxxxxx>
- Re: [PATCH v3 14/29] acl: add vfs_set_acl()
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v3 14/29] acl: add vfs_set_acl()
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v3 14/29] acl: add vfs_set_acl()
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH] KEYS: encrypted: fix key instantiation with user-provided data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 24/29] evm: remove evm_xattr_acl_change()
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH v3 14/29] acl: add vfs_set_acl()
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH v3 12/29] integrity: implement get and set acl hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH v3 13/29] evm: add post set acl hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH v3 00/29] acl: add vfs posix acl api
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH v3 10/29] selinux: implement get, set and remove acl hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v5 2/2] ima: Handle -ESTALE returned by ima_filter_rule_match()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 18/30] evm: simplify evm_xattr_acl_change()
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH] KEYS: encrypted: fix key instantiation with user-provided data
- From: Nikolaus Voss <nv@xxxxxxx>
- Re: [PATCH] KEYS: encrypted: fix key instantiation with user-provided data
- From: Nikolaus Voss <nv@xxxxxxx>
- Re: TPM: hibernate with IMA PCR 10
- From: Jonathan McDowell <noodles@xxxxxxxx>
- Re: keyrings, key usage, and trust models
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH] tpm: Add flag to use default cancellation policy
- From: Joel Stanley <joel@xxxxxxxxx>
- [PATCH v2 3/3] tpm: tis-i2c: Add more compatible strings
- From: Joel Stanley <joel@xxxxxxxxx>
- [PATCH v2 2/3] dt-bindings: tpm: Add schema for TIS I2C devices
- From: Joel Stanley <joel@xxxxxxxxx>
- [PATCH v2 1/3] dt-bindings: trivial-devices: Remove Infineon SLB9673 TPM
- From: Joel Stanley <joel@xxxxxxxxx>
- [PATCH v2 0/3] tpm: tsi-i2c: Add compatible strings
- From: Joel Stanley <joel@xxxxxxxxx>
- Re: [GIT PULL] linux-tpmdd updates for v6.0-rc1
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [GIT PULL] linux-tpmdd updates for v6.0-rc1
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 00/30] acl: add vfs posix acl api
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/30] acl: add vfs posix acl api
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 18/30] evm: simplify evm_xattr_acl_change()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 15/30] evm: add post set acl hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 13/30] evm: implement set acl hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 11/30] selinux: implement set acl hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v38 21/39] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 18/39] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 19/39] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 17/39] LSM: Use lsmblob in security_current_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v38 07/39] integrity: disassociate ima_filter_rule from security_audit_rule
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 05/11] security: keys: trusted: Allow storage of PCR values in creation data
- From: Ben Boeckel <me@xxxxxxxxxxxxxx>
- [PATCH v3 08/11] PM: hibernate: Use TPM-backed keys to encrypt image
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH v3 11/11] PM: hibernate: seal the encryption key with a PCR policy
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH v3 09/11] PM: hibernate: Mix user key in encrypted hibernate
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH v3 07/11] PM: hibernate: Add kernel-based encryption
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH v3 06/11] security: keys: trusted: Verify creation data
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH v3 04/11] security: keys: trusted: Include TPM2 creation data
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH v3 10/11] PM: hibernate: Verify the digest encryption key
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH v3 05/11] security: keys: trusted: Allow storage of PCR values in creation data
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH v3 01/11] tpm: Add support for in-kernel resetting of PCRs
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH v3 00/11] Encrypted Hibernation
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH v3 02/11] tpm: Export and rename tpm2_find_and_validate_cc()
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH v3 03/11] tpm: Allow PCR 23 to be restricted to kernel-only use
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- Re: TPM: hibernate with IMA PCR 10
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- Re: [PATCH v2 00/30] acl: add vfs posix acl api
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/30] acl: add vfs posix acl api
- From: Seth Forshee <sforshee@xxxxxxxxxx>
- Re: [PATCH v2 00/30] acl: add vfs posix acl api
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/30] acl: add vfs posix acl api
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 00/30] acl: add vfs posix acl api
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH 10/29] selinux: implement set acl hook
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v2 00/30] acl: add vfs posix acl api
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 10/29] selinux: implement set acl hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2 13/30] evm: implement set acl hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH v2 18/30] evm: simplify evm_xattr_acl_change()
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH v2 15/30] evm: add post set acl hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH v2 11/30] selinux: implement set acl hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH v2 00/30] acl: add vfs posix acl api
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH 3/3] ima_setup.sh: Use tst_supported_fs instead of df
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 10/29] selinux: implement set acl hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH 3/3] tpm: st33zp24: remove pointless checks on probe
- From: Dmitry Torokhov <dmitry.torokhov@xxxxxxxxx>
- [PATCH 2/3] tpm: st33zp24: switch to using gpiod API
- From: Dmitry Torokhov <dmitry.torokhov@xxxxxxxxx>
- [PATCH 1/3] tpm: st33zp24: drop support for platform data
- From: Dmitry Torokhov <dmitry.torokhov@xxxxxxxxx>
- Re: [PATCH v5 2/2] ima: Handle -ESTALE returned by ima_filter_rule_match()
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [PATCH v2 07/10] PM: hibernate: Use TPM-backed keys to encrypt image
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 05/10] security: keys: trusted: Verify creation data
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- Re: [PATCH v2 03/10] security: keys: trusted: Include TPM2 creation data
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- Re: [PATCH v2 07/10] PM: hibernate: Use TPM-backed keys to encrypt image
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- Re: [PATCH -next 1/4] ima: Use DECLARE_FLEX_ARRAY() helper in ima_modsig
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 10/29] selinux: implement set acl hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 00/29] acl: add vfs posix acl api
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 00/29] acl: add vfs posix acl api
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 10/29] selinux: implement set acl hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH 10/29] selinux: implement set acl hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: TPM: hibernate with IMA PCR 10
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 2/2] ima: Handle -ESTALE returned by ima_filter_rule_match()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH 00/29] acl: add vfs posix acl api
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [RFC PATCH 00/29] acl: add vfs posix acl api
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH 10/29] selinux: implement set acl hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH 10/29] selinux: implement set acl hook
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [RFC PATCH 00/29] acl: add vfs posix acl api
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v5 2/2] ima: Handle -ESTALE returned by ima_filter_rule_match()
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [RFC PATCH 00/29] acl: add vfs posix acl api
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 00/29] acl: add vfs posix acl api
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RFC PATCH 00/29] acl: add vfs posix acl api
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 00/29] acl: add vfs posix acl api
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 00/29] acl: add vfs posix acl api
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 10/29] selinux: implement set acl hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 00/29] acl: add vfs posix acl api
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 00/29] acl: add vfs posix acl api
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [RFC PATCH 00/29] acl: add vfs posix acl api
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH 14/29] evm: add post set acl hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH 12/29] evm: implement set acl hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH 17/29] evm: simplify evm_xattr_acl_change()
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH 10/29] selinux: implement set acl hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v5 2/2] ima: Handle -ESTALE returned by ima_filter_rule_match()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: TPM: hibernate with IMA PCR 10
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 02/10] tpm: Allow PCR 23 to be restricted to kernel-only use
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- Re: [PATCH v2 00/10] Encrypted Hibernation
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v2 02/10] tpm: Allow PCR 23 to be restricted to kernel-only use
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 02/10] tpm: Allow PCR 23 to be restricted to kernel-only use
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] selftest: tpm2: Add Client.__del__() to close /dev/tpm* handle
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] KEYS: encrypted: fix key instantiation with user-provided data
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 02/10] tpm: Allow PCR 23 to be restricted to kernel-only use
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH v5 2/2] ima: Handle -ESTALE returned by ima_filter_rule_match()
- From: GUO Zihua <guozihua@xxxxxxxxxx>
- [PATCH v5 0/2] ima: Handle -ESTALE returned by ima_filter_rule_match()
- From: GUO Zihua <guozihua@xxxxxxxxxx>
- [PATCH v5 1/2] ima: Simplify ima_lsm_copy_rule
- From: GUO Zihua <guozihua@xxxxxxxxxx>
- Re: [PATCH] KEYS: encrypted: fix key instantiation with user-provided data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] ima: Handle -ESTALE returned by ima_filter_rule_match()
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- RE: [EXT] Re: [RFC PATCH HBK: 2/8] hw-bound-key: flag-is_hbk added to the tfm
- From: Varun Sethi <V.Sethi@xxxxxxx>
- Re: [PATCH] KEYS: encrypted: fix key instantiation with user-provided data
- From: Nikolaus Voss <nv@xxxxxxx>
- Re: [PATCH v2 10/10] PM: hibernate: seal the encryption key with a PCR policy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 07/10] PM: hibernate: Use TPM-backed keys to encrypt image
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 06/10] PM: hibernate: Add kernel-based encryption
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 05/10] security: keys: trusted: Verify creation data
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 03/10] security: keys: trusted: Include TPM2 creation data
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] KEYS: encrypted: fix key instantiation with user-provided data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 00/10] Encrypted Hibernation
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v14 00/26] ima: Namespace IMA with audit support in IMA-ns
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2 00/10] Encrypted Hibernation
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- Re: [PATCH] KEYS: encrypted: fix key instantiation with user-provided data
- From: Nikolaus Voss <nv@xxxxxxx>
- Re: [PATCH] KEYS: encrypted: fix key instantiation with user-provided data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2] selftest: tpm2: Add Client.__del__() to close /dev/tpm* handle
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] selftests: tpm2: Implement class desstructor to close file descriptor
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2 00/10] Encrypted Hibernation
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH] KEYS: encrypted: fix key instantiation with user-provided data
- From: Nikolaus Voss <nv@xxxxxxx>
- Re: [PATCH] KEYS: encrypted: fix key instantiation with user-provided data
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 02/10] tpm: Allow PCR 23 to be restricted to kernel-only use
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: TPM: hibernate with IMA PCR 10
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] selftests: tpm2: Implement class desstructor to close file descriptor
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 2/2] ima: Handle -ESTALE returned by ima_filter_rule_match()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/2] ima: Simplify ima_lsm_copy_rule
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] KEYS: encrypted: fix key instantiation with user-provided data
- From: Nikolaus Voss <nv@xxxxxxx>
- Re: User questions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: User questions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: User questions
- From: Ken Williams <ken@xxxxxxxxxxxxxxx>
- Re: User questions
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCHv2 1/1] efi: Correct Macmini DMI match in uefi cert quirk
- From: Orlando Chamberlain <redecorating@xxxxxxxxxxxxxx>
- Re: [PATCH v14 00/26] ima: Namespace IMA with audit support in IMA-ns
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: User questions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v14 00/26] ima: Namespace IMA with audit support in IMA-ns
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v3 06/15] Add missing EVP_MD_CTX_free() call in calc_evm_hash()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v14 00/26] ima: Namespace IMA with audit support in IMA-ns
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- User questions
- From: Ken Williams <ken@xxxxxxxxxxxxxxx>
- Re: [PATCH v14 00/26] ima: Namespace IMA with audit support in IMA-ns
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v14 01/26] securityfs: rework dentry creation
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v14 03/26] ima: Define ima_namespace struct and start moving variables into it
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v14 05/26] ima: Move ima_htable into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v14 26/26] ima: Enable IMA namespaces
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v14 17/26] integrity/ima: Define ns_status for storing namespaced iint data
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v14 07/26] ima: Move some IMA policy and filesystem related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v14 10/26] ima: Switch to lazy lsm policy updates for better performance
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v14 23/26] ima: Show owning user namespace's uid and gid when displaying policy
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v14 25/26] ima: Restrict informational audit messages to init_ima_ns
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v14 18/26] integrity: Add optional callback function to integrity_inode_free()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v14 20/26] ima: Remove unused iints from the integrity_iint_cache
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v14 15/26] ima: Implement ima_free_policy_rules() for freeing of an ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v14 08/26] ima: Move IMA securityfs files into ima_namespace or onto stack
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v14 22/26] ima: Introduce securityfs file to activate an IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v14 19/26] ima: Namespace audit status flags
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v14 09/26] ima: Move ima_lsm_policy_notifier into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v14 13/26] userns: Add pointer to ima_namespace to user_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v14 02/26] securityfs: Extend securityfs with namespacing support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v14 04/26] ima: Move arch_policy_entry into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v14 06/26] ima: Move measurement list related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v14 14/26] ima: Implement hierarchical processing of file accesses
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v14 21/26] ima: Setup securityfs for IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v14 00/26] ima: Namespace IMA with audit support in IMA-ns
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v14 16/26] ima: Add functions for creating and freeing of an ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v14 11/26] ima: Define mac_admin_ns_capable() as a wrapper for ns_capable()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v14 24/26] ima: Limit number of policy rules in non-init_ima_ns
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v14 12/26] ima: Only accept AUDIT rules for non-init_ima_ns namespaces for now
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v3 06/15] Add missing EVP_MD_CTX_free() call in calc_evm_hash()
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils 1/4] Don't ignore number of items read
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v3 06/15] Add missing EVP_MD_CTX_free() call in calc_evm_hash()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 0/4] tpm: Preserve TPM measurement log across kexec (ppc64)
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils 1/4] Don't ignore number of items read
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils 2/4] Define and verify the template data length upper bounds
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils 3/4] Sanity check the template data field sizes
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils 4/4] Fix tpm2_pcr_supported() output messages
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v8 0/4] tpm: Preserve TPM measurement log across kexec (ppc64)
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- Re: [PATCH v8 0/4] tpm: Preserve TPM measurement log across kexec (ppc64)
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v8 0/4] tpm: Preserve TPM measurement log across kexec (ppc64)
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils v3 07/15] Disable use of OpenSSL "engine" support
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v3 11/15] Limit configuring OpenSSL engine support
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v3 06/15] Add missing EVP_MD_CTX_free() call in calc_evm_hash()
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH ima-evm-utils 3/4] Sanity check the template data field sizes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils 4/4] Fix tpm2_pcr_supported() output messages
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils 2/4] Define and verify the template data length upper bounds
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils 1/4] Don't ignore number of items read
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils 0/4] misc bug and other fixes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v3 14/15] Build OpenSSL without engine support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v3 15/15] Fix d2i_x509_fp failure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v3 13/15] Compile a newer version of OpenSSL
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v3 12/15] Base sm2/sm3 test on openssl version installed
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v3 11/15] Limit configuring OpenSSL engine support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v3 10/15] Missing template data size lower bounds checking
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v3 09/15] Limit the file hash algorithm name length
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v3 07/15] Disable use of OpenSSL "engine" support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v3 06/15] Add missing EVP_MD_CTX_free() call in calc_evm_hash()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v3 08/15] Fix potential use after free in read_tpm_banks()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v3 03/15] Deprecate IMA signature version 1
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v3 04/15] Replace the low level SHA1 calls when calculating the TPM 1.2 PCRs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v3 05/15] Replace the low level HMAC calls when calculating the EVM HMAC
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v3 02/15] Update configure.ac to address a couple of obsolete warnings
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v3 01/15] travis: update dist=focal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v3 00/15] address deprecated warnings
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2 03/12] Update configure.ac to address a couple of obsolete warnings
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2 02/12] travis: update dist=focal
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2 09/12] Fix potential use after free in read_tpm_banks()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2 11/12] Missing template data size lower bounds checking
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2 10/12] Limit the file hash algorithm name length
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] dt-bindings: tpm: Add schema for TIS I2C devices
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v2 02/10] tpm: Allow PCR 23 to be restricted to kernel-only use
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [EXT] Re: [RFC PATCH HBK: 2/8] hw-bound-key: flag-is_hbk added to the tfm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [EXT] Re: [RFC PATCH HBK: 2/8] hw-bound-key: flag-is_hbk added to the tfm
- From: Varun Sethi <V.Sethi@xxxxxxx>
- [PATCH 0/2] tpm: tsi-i2c: Add compatible strings
- From: Joel Stanley <joel@xxxxxxxxx>
- [PATCH 1/2] dt-bindings: tpm: Add schema for TIS I2C devices
- From: Joel Stanley <joel@xxxxxxxxx>
- [PATCH 2/2] tpm: tis-i2c: Add more compatible strings
- From: Joel Stanley <joel@xxxxxxxxx>
- Re: [EXT] Re: [RFC PATCH HBK: 2/8] hw-bound-key: flag-is_hbk added to the tfm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [EXT] Re: [RFC PATCH HBK: 2/8] hw-bound-key: flag-is_hbk added to the tfm
- From: Varun Sethi <V.Sethi@xxxxxxx>
- Re: [PATCH ima-evm-utils v2] add support for reading per bank TPM 2.0 PCRs via sysfs
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC PATCH v1 4/4] ima: Extend the real PCR12 with tempPCR value.
- From: Denis Semakin <denis.semakin@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v1 4/4] ima: Extend the real PCR12 with tempPCR value.
- From: dwx1040679 <denis.semakin@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 0/4] tpm: Preserve TPM measurement log across kexec (ppc64)
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: TPM: hibernate with IMA PCR 10
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] selftests: tpm2: Implement class desstructor to close file descriptor
- From: R Nageswara Sastry <rnsastry@xxxxxxxxxxxxx>
- [PATCH] selftests: tpm2: Implement class desstructor to close file descriptor
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 2/2] ima: Handle -ESTALE returned by ima_filter_rule_match()
- From: GUO Zihua <guozihua@xxxxxxxxxx>
- [PATCH v4 0/2] ima: Handle -ESTALE returned by ima_filter_rule_match()
- From: GUO Zihua <guozihua@xxxxxxxxxx>
- [PATCH v4 1/2] ima: Simplify ima_lsm_copy_rule
- From: GUO Zihua <guozihua@xxxxxxxxxx>
- Re: [PATCH] tpm: Add flag to use default cancellation policy
- From: Eddie James <eajames@xxxxxxxxxxxxx>
- Re: TPM: hibernate with IMA PCR 10
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 01/10] tpm: Add support for in-kernel resetting of PCRs
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: Add flag to use default cancellation policy
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH ima-evm-utils v2] add support for reading per bank TPM 2.0 PCRs via sysfs
- From: Tergel Myanganbayar <tergel@xxxxxxxxxxxxx>
- Re: TPM: hibernate with IMA PCR 10
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: TPM: hibernate with IMA PCR 10
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- Re: [PATCH v2 02/10] tpm: Allow PCR 23 to be restricted to kernel-only use
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- Re: [PATCH v2 01/10] tpm: Add support for in-kernel resetting of PCRs
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- Re: [PATCH v2 00/10] Encrypted Hibernation
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH] tpm: Add flag to use default cancellation policy
- From: Eddie James <eajames@xxxxxxxxxxxxx>
- Re: [RFC PATCH ima-evm-utils v2 12/12] Limit configuring OpenSSL engine support
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [EXT] Re: [RFC PATCH HBK: 2/8] hw-bound-key: flag-is_hbk added to the tfm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [EXT] Re: [RFC PATCH HBK: 2/8] hw-bound-key: flag-is_hbk added to the tfm
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- RE: [EXT] Re: [RFC PATCH HBK: 0/8] HW BOUND KEY as TRUSTED KEY
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- RE: [EXT] [RFC PATCH HBK: 0/8] HW BOUND KEY as TRUSTED KEY
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- Re: [EXT] [RFC PATCH HBK: 0/8] HW BOUND KEY as TRUSTED KEY
- From: Michael Walle <michael@xxxxxxxx>
- Re: [EXT] Re: [RFC PATCH HBK: 0/8] HW BOUND KEY as TRUSTED KEY
- From: Jan Lübbe <jlu@xxxxxxxxxxxxxx>
- Re: [EXT] [RFC PATCH HBK: 0/8] HW BOUND KEY as TRUSTED KEY
- From: David Gstir <david@xxxxxxxxxxxxx>
- Re: [EXT] Re: [RFC PATCH HBK: 0/8] HW BOUND KEY as TRUSTED KEY
- From: Michael Walle <michael@xxxxxxxx>
- Re: [EXT] Re: [RFC PATCH HBK: 2/8] hw-bound-key: flag-is_hbk added to the tfm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- RE: [EXT] Re: [RFC PATCH HBK: 6/8] KEYS: trusted: caam based black key
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- RE: [EXT] Re: [RFC PATCH HBK: 1/8] keys-trusted: new cmd line option added
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- RE: [EXT] Re: [RFC PATCH HBK: 0/8] HW BOUND KEY as TRUSTED KEY
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- RE: [EXT] Re: [RFC PATCH HBK: 0/8] HW BOUND KEY as TRUSTED KEY
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- RE: [EXT] Re: [RFC PATCH HBK: 2/8] hw-bound-key: flag-is_hbk added to the tfm
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- Re: [PATCH v3] ima: Handle -ESTALE returned by ima_filter_rule_match()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2 07/12] Add missing EVP_MD_CTX_free() call in calc_evm_hash()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2 06/12] Replace the low level HMAC calls when calculating the EVM HMAC
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v2 10/12] Limit the file hash algorithm name length
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC PATCH ima-evm-utils v2 12/12] Limit configuring OpenSSL engine support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v2 11/12] Missing template data size lower bounds checking
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v2 02/12] travis: update dist=focal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v2 08/12] Disable use of OpenSSL "engine" support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v2 07/12] Add missing EVP_MD_CTX_free() call in calc_evm_hash()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v2 01/12] travis: use the distro OpenSSL version on jammy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v2 05/12] Replace the low level SHA1 calls when calculating the TPM 1.2 PCRs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v2 09/12] Fix potential use after free in read_tpm_banks()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v2 04/12] Deprecate IMA signature version 1
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v2 00/12] address deprecated warnings
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v2 06/12] Replace the low level HMAC calls when calculating the EVM HMAC
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v2 03/12] Update configure.ac to address a couple of obsolete warnings
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils 02/11] travis: update dist=focal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH HBK: 6/8] KEYS: trusted: caam based black key
- From: Ben Boeckel <me@xxxxxxxxxxxxxx>
- Re: [RFC PATCH HBK: 1/8] keys-trusted: new cmd line option added
- From: Ben Boeckel <me@xxxxxxxxxxxxxx>
- Re: [RFC PATCH HBK: 0/8] HW BOUND KEY as TRUSTED KEY
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH HBK: 0/8] HW BOUND KEY as TRUSTED KEY
- From: Michael Walle <michael@xxxxxxxx>
- Re: [RFC PATCH HBK: 2/8] hw-bound-key: flag-is_hbk added to the tfm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH HBK: 8/8] dm-crypt: consumer-app setting the flag-is_hbk
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [RFC PATCH HBK: 7/8] caam alg: symmetric key ciphers are updated
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [RFC PATCH HBK: 5/8] caam blob-gen: moving blob_priv to caam_drv_private
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [RFC PATCH HBK: 4/8] keys-trusted: re-factored caam based trusted key
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [RFC PATCH HBK: 6/8] KEYS: trusted: caam based black key
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [RFC PATCH HBK: 0/8] HW BOUND KEY as TRUSTED KEY
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [RFC PATCH HBK: 2/8] hw-bound-key: flag-is_hbk added to the tfm
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [RFC PATCH HBK: 1/8] keys-trusted: new cmd line option added
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [RFC PATCH HBK: 3/8] sk_cipher: checking for hw bound operation
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH -next] security: Fix some kernel-doc comments
- From: Yang Li <yang.lee@xxxxxxxxxxxxxxxxx>
- [PATCH -next 4/4] integrity: Use DECLARE_FLEX_ARRAY() helper in integrity.h
- From: Gaosheng Cui <cuigaosheng1@xxxxxxxxxx>
- [PATCH -next 1/4] ima: Use DECLARE_FLEX_ARRAY() helper in ima_modsig
- From: Gaosheng Cui <cuigaosheng1@xxxxxxxxxx>
- [PATCH -next 2/4] ima: Use DECLARE_FLEX_ARRAY() helper in ima_template_entry
- From: Gaosheng Cui <cuigaosheng1@xxxxxxxxxx>
- [PATCH -next 0/4] Use DECLARE_FLEX_ARRAY() helper for ima
- From: Gaosheng Cui <cuigaosheng1@xxxxxxxxxx>
- [PATCH -next 3/4] ima: Use DECLARE_FLEX_ARRAY() helper in ima_policy
- From: Gaosheng Cui <cuigaosheng1@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils] add support for reading per bank TPM 2.0 PCRs via sysfs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils 08/11] Deprecate use of OpenSSL v3 "engine" support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils 08/11] Deprecate use of OpenSSL v3 "engine" support
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] add support for reading per bank TPM 2.0 PCRs via sysfs
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils] add support for reading per bank TPM 2.0 PCRs via sysfs
- From: Tergel Myanganbayar <tergel@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils 02/11] travis: update dist=focal
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils 05/11] Replace the low level SHA1 calls when calculating the TPM 1.2 PCRs
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils 04/11] Deprecate IMA signature version 1
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils 00/11] address deprecated warnings
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils 04/11] Deprecate IMA signature version 1
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils 06/11] Replace the low level HMAC calls when calculating the EVM HMAC
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils 03/11] Update configure.ac to address a couple of obsolete warnings
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils 11/11] Missing template data size lower bounds checking
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils 05/11] Replace the low level SHA1 calls when calculating the TPM 1.2 PCRs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils 08/11] Deprecate use of OpenSSL v3 "engine" support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils 09/11] Fix potential use after free in read_tpm_banks()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils 02/11] travis: update dist=focal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils 01/11] travis: use the distro OpenSSL version on jammy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils 07/11] Add missing EVP_MD_CTX_free() call in calc_evm_hash()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils 10/11] Limit the file hash algorithm name length
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 2/4] tpm: of: Make of-tree specific function commonly available
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v8 3/4] of: kexec: Refactor IMA buffer related functions to make them reusable
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v8 1/4] drivers: of: kexec ima: Support 32-bit platforms
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v8 4/4] tpm/kexec: Duplicate TPM measurement log in of-tree for kexec
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v8 0/4] tpm: Preserve TPM measurement log across kexec (ppc64)
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v8 2/4] tpm: of: Make of-tree specific function commonly available
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC PATCH ima-evm-utils 04/11] Deprecate IMA signature version 1
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]