Linux Integrity
[Prev Page][Next Page]
- Re: [PATCH v5 07/10] tmp, tmp_tis: Implement usage counter for locality
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [RFC PATCH v8 07/17] ipe: add auditing support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v8 02/17] ipe: add policy parser
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 06/10] tpm, tpm_tis: Only handle supported interrupts in wait_for_tpm_stat()
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH v5 01/10] tpm, tpm_tis: Avoid cache incoherency in test for interrupts
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH v5 05/10] tpm, tpm_tis: Store result of interrupt capability query
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH v5 10/10] tpm, tpm_tis: Enable interrupt test
- From: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
- Re: CKI team seeing boot failures with 5.19 kernels on VMs with tpm device
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for v5.19-rc3
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] tpmdd updates for v5.19-rc3
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm/eventlog: Don't abort tpm_read_log on faulty ACPI address
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 3/3] tpm: Add tpm_tis_i2c backend for tpm_tis_core
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 08/10] tpm, tpm_tis: Request threaded interrupt handler
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 09/10] tpm, tpm_tis: Claim locality in interrupt handler
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 10/10] tpm, tpm_tis: Enable interrupt test
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 06/10] tpm, tpm_tis: Only handle supported interrupts in wait_for_tpm_stat()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 07/10] tmp, tmp_tis: Implement usage counter for locality
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 05/10] tpm, tpm_tis: Store result of interrupt capability query
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 04/10] tpm, tmp_tis: Claim locality before writing interrupt registers
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 03/10] tpm, tpm_tis: Disable interrupts if tpm_tis_probe_irq() failed
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 1/3] initramfs: add file metadata
- From: Eugeniu Rosca <erosca@xxxxxxxxxxxxxx>
- RE: [PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Alexander Lobakin <alexandr.lobakin@xxxxxxxxx>
- Re: [PATCH v5 02/10] tpm, tpm_tis: Claim locality before writing TPM_INT_ENABLE register
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 01/10] tpm, tpm_tis: Avoid cache incoherency in test for interrupts
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Eugeniu Rosca <erosca@xxxxxxxxxxxxxx>
- Re: [PATCH v6 1/3] dt-bindings: trivial-devices: Add Infineon SLB9673 TPM
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v5] x86/kexec: Carry forward IMA measurement log on kexec
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- CKI team seeing boot failures with 5.19 kernels on VMs with tpm device
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [PATCH v5] x86/kexec: Carry forward IMA measurement log on kexec
- From: Jonathan McDowell <noodles@xxxxxx>
- Re: [PATCH v36 13/33] LSM: Use lsmblob in security_cred_getsecid
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH -next] Revert "evm: Fix memleak in init_desc"
- From: xiujianfeng <xiujianfeng@xxxxxxxxxx>
- Re: [PATCH -next] Revert "evm: Fix memleak in init_desc"
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [PATCH v6 3/3] tpm: Add tpm_tis_i2c backend for tpm_tis_core
- From: kernel test robot <lkp@xxxxxxxxx>
- RE: [PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Eugeniu Rosca <erosca@xxxxxxxxxxxxxx>
- Re: [PATCH -next] Revert "evm: Fix memleak in init_desc"
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm/eventlog: Don't abort tpm_read_log on faulty ACPI address
- From: Morten Linderud <morten@xxxxxxxxxxx>
- Re: [PATCH v6 3/3] tpm: Add tpm_tis_i2c backend for tpm_tis_core
- From: Johannes Holland <johannes.holland@xxxxxxxxxxxx>
- [PATCH v5 07/10] tmp, tmp_tis: Implement usage counter for locality
- From: LinoSanfilippo@xxxxxx
- [PATCH v5 10/10] tpm, tpm_tis: Enable interrupt test
- From: LinoSanfilippo@xxxxxx
- [PATCH v5 01/10] tpm, tpm_tis: Avoid cache incoherency in test for interrupts
- From: LinoSanfilippo@xxxxxx
- [PATCH v5 09/10] tpm, tpm_tis: Claim locality in interrupt handler
- From: LinoSanfilippo@xxxxxx
- [PATCH v5 05/10] tpm, tpm_tis: Store result of interrupt capability query
- From: LinoSanfilippo@xxxxxx
- [PATCH v5 06/10] tpm, tpm_tis: Only handle supported interrupts in wait_for_tpm_stat()
- From: LinoSanfilippo@xxxxxx
- [PATCH v5 00/10] TPM IRQ fixes
- From: LinoSanfilippo@xxxxxx
- [PATCH v5 03/10] tpm, tpm_tis: Disable interrupts if tpm_tis_probe_irq() failed
- From: LinoSanfilippo@xxxxxx
- [PATCH v5 02/10] tpm, tpm_tis: Claim locality before writing TPM_INT_ENABLE register
- From: LinoSanfilippo@xxxxxx
- [PATCH v5 08/10] tpm, tpm_tis: Request threaded interrupt handler
- From: LinoSanfilippo@xxxxxx
- [PATCH v5 04/10] tpm, tmp_tis: Claim locality before writing interrupt registers
- From: LinoSanfilippo@xxxxxx
- Re: [PATCH v4] x86/kexec: Carry forward IMA measurement log on kexec
- From: Jonathan McDowell <noodles@xxxxxx>
- Re: [PATCH -next] Revert "evm: Fix memleak in init_desc"
- From: xiujianfeng <xiujianfeng@xxxxxxxxxx>
- Re: [RFC PATCH v8 13/17] fsverity: consume builtin signature via LSM hook
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v36 15/33] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v36 12/33] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v36 13/33] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v36 11/33] LSM: Use lsmblob in security_current_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v36 01/33] integrity: disassociate ima_filter_rule from security_audit_rule
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v12 01/26] securityfs: rework dentry creation
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH -next] ima: Use if/else statement in init_ima()
- From: Xiu Jianfeng <xiujianfeng@xxxxxxxxxx>
- Re: [PATCH v2] tpm/eventlog: Don't abort tpm_read_log on faulty ACPI address
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- RE: [PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Eugeniu Rosca <erosca@xxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm/eventlog: Don't abort tpm_read_log on faulty ACPI address
- From: Morten Linderud <morten@xxxxxxxxxxx>
- Re: [PATCH v6 3/3] tpm: Add tpm_tis_i2c backend for tpm_tis_core
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: Fix memory leak in tpm2_key_encode()
- From: "jarkko@xxxxxxxxxx" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: Fix memory leak in tpm2_key_encode()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: Fix memory leak in tpm2_key_encode()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm/eventlog: Don't abort tpm_read_log on faulty ACPI address
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v8 10/17] block|security: add LSM blob to block_device
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v8 10/17] block|security: add LSM blob to block_device
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v8 00/17] Integrity Policy Enforcement LSM (IPE)
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v8 00/17] Integrity Policy Enforcement LSM (IPE)
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- [RFC PATCH v8 03/17] ipe: add evaluation loop
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v8 05/17] ipe: add LSM hooks on execution and kernel read
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v8 12/17] ipe: add support for dm-verity as a trust provider
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v8 16/17] ipe: kunit tests
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v8 11/17] dm-verity: consume root hash digest and signature data via LSM hook
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v8 13/17] fsverity: consume builtin signature via LSM hook
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v8 09/17] ipe: introduce 'boot_verified' as a trust provider
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v8 17/17] documentation: add ipe documentation
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v8 15/17] scripts: add boot policy generation program
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v8 14/17] ipe: enable support for fs-verity as a trust provider
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v8 02/17] ipe: add policy parser
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v8 08/17] ipe: add permissive toggle
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v8 07/17] ipe: add auditing support
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v8 10/17] block|security: add LSM blob to block_device
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v8 06/17] uapi|audit: add ipe audit message definitions
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v8 04/17] ipe: add userspace interface
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v8 00/17] Integrity Policy Enforcement LSM (IPE)
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v8 01/17] security: add ipe lsm & initial context creation
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 3/3] tpm: Add tpm_tis_i2c backend for tpm_tis_core
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- [PATCH v6 1/3] dt-bindings: trivial-devices: Add Infineon SLB9673 TPM
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- [PATCH v6 2/3] tpm: Add tpm_tis_verify_crc to the tpm_tis_phy_ops protocol layer
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- [PATCH v6 0/3] tpm_tis_i2c
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for v5.19-rc2-v2
- From: pr-tracker-bot@xxxxxxxxxx
- [PATCH v2] KEYS: trusted: Fix memory leak in tpm2_key_encode()
- From: Jianglei Nie <niejianglei2021@xxxxxxx>
- Re: [PATCH v2] KEYS: trusted: Fix memory leak in tpm2_key_encode()
- From: Jonathan McDowell <noodles@xxxxxx>
- [PATCH v2] KEYS: trusted: Fix memory leak in tpm2_key_encode()
- From: Jianglei Nie <niejianglei2021@xxxxxxx>
- [PATCH v2] tpm/eventlog: Don't abort tpm_read_log on faulty ACPI address
- From: Morten Linderud <morten@xxxxxxxxxxx>
- [GIT PULL] tpmdd updates for v5.19-rc2-v2
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for v5.19-rc2
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [GIT PULL] tpmdd updates for v5.19-rc2
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] security:trusted_tpm2: Fix memory leak in tpm2_key_encode()
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH] security:trusted_tpm2: Fix memory leak in tpm2_key_encode()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: tpm2: Fix migratable logic
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] security:trusted_tpm2: Fix memory leak in tpm2_key_encode()
- From: Jianglei Nie <niejianglei2021@xxxxxxx>
- Re: [PATCH v2] KEYS: trusted: tpm2: Fix migratable logic
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v2] KEYS: trusted: tpm2: Fix migratable logic
- From: david.safford@xxxxxxxxx
- Re: Sending vendor specific commands to spi-nor flash
- From: Paul Barker <paul.barker@xxxxxxxxxxxx>
- Re: [PATCH] security:trusted_tpm2: Fix memory leak in tpm2_key_encode()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 3/3] tpm: Add tpm_tis_i2c backend for tpm_tis_core
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 2/3] tpm: Add tpm_tis_verify_crc to the tpm_tis_phy_ops protocol layer
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] tpm: Add upgrade/reduced mode support for TPM1.2 modules
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] tpm: Add upgrade/reduced mode support for TPM1.2 modules
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] trusted-keys-fix-migratable-logic
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] security:trusted_tpm2: Fix memory leak in tpm2_key_encode()
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH] security:trusted_tpm2: Fix memory leak in tpm2_key_encode()
- From: Jianglei Nie <niejianglei2021@xxxxxxx>
- Re: [PATCH] trusted-keys-fix-migratable-logic
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH -next] evm: Use IS_ENABLED to initialize .enabled
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH -next] evm: Use IS_ENABLED to initialize .enabled
- From: Xiu Jianfeng <xiujianfeng@xxxxxxxxxx>
- Re: [PATCH v4] x86/kexec: Carry forward IMA measurement log on kexec
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v4] x86/kexec: Carry forward IMA measurement log on kexec
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v5 1/3] dt-bindings: trivial-devices: Add two I2C TPM devices
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v4 1/3] dt-bindings: trivial-devices: Add two I2C TPM devices
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v4] x86/kexec: Carry forward IMA measurement log on kexec
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH v5 2/3] tpm: Add tpm_tis_verify_crc to the tpm_tis_phy_ops protocol layer
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- [PATCH v5 3/3] tpm: Add tpm_tis_i2c backend for tpm_tis_core
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- [PATCH v5 1/3] dt-bindings: trivial-devices: Add two I2C TPM devices
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- [PATCH v5 0/3] tpm_tis_i2c
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- [PATCH] trusted-keys-fix-migratable-logic
- From: david.safford@xxxxxxxxx
- [PATCH v3] tpm: Add upgrade/reduced mode support for TPM1.2 modules
- From: Stefan Mahnke-Hartmann <stefan.mahnke-hartmann@xxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Add upgrade/reduced mode support for TPM1.2 modules
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2] tpm: Add upgrade/reduced mode support for TPM1.2 modules
- From: Stefan Mahnke-Hartmann <stefan.mahnke-hartmann@xxxxxxxxxxxx>
- Re: [PATCH v4 1/3] dt-bindings: trivial-devices: Add two I2C TPM devices
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- Re: [PATCH v4 1/3] dt-bindings: trivial-devices: Add two I2C TPM devices
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH] tpm: Add upgrade/reduced mode support for TPM1.2 modules
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: Add check for Failure mode for TPM2 modules
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] tpm: Add upgrade/reduced mode support for TPM1.2 modules
- From: Stefan Mahnke-Hartmann <stefan.mahnke-hartmann@xxxxxxxxxxxx>
- Re: [PATCH] tpm: Add check for Failure mode for TPM2 modules
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v12 21/26] ima: Setup securityfs for IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add check for Failure mode for TPM2 modules
- From: Marten Lindahl <martenli@xxxxxxxx>
- [PATCH AUTOSEL 5.15 107/109] char: tpm: cr50_i2c: Suppress duplicated error message in .remove()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.17 133/135] char: tpm: cr50_i2c: Suppress duplicated error message in .remove()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.18 156/159] char: tpm: cr50_i2c: Suppress duplicated error message in .remove()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v4] x86/kexec: Carry forward IMA measurement log on kexec
- From: Jonathan McDowell <noodles@xxxxxx>
- Re: [PATCH v12 21/26] ima: Setup securityfs for IMA namespace
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v12 16/26] ima: Add functions for creating and freeing of an ima_namespace
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH] tpm: sleep at least <...> ms in tpm_msleep()
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- [PATCH -next] Revert "evm: Fix memleak in init_desc"
- From: Xiu Jianfeng <xiujianfeng@xxxxxxxxxx>
- Re: [PATCH v4 3/3] tpm: Add tpm_tis_i2c backend for tpm_tis_core
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v4 1/3] dt-bindings: trivial-devices: Add two I2C TPM devices
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v3] keys: Use struct_size and size_add helper with alloc
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [PATCH v4 2/3] tpm: Add tpm_tis_verify_crc to the tpm_tis_phy_ops protocol layer
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] keys: Use struct_size and size_add helper with alloc
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v4 3/3] tpm: Add tpm_tis_i2c backend for tpm_tis_core
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- [PATCH v4 2/3] tpm: Add tpm_tis_verify_crc to the tpm_tis_phy_ops protocol layer
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- [PATCH v4 1/3] dt-bindings: trivial-devices: Add two I2C TPM devices
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- [PATCH v4 0/3] tpm_tis_i2c
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- Re: [RESEND] evm: Refector struct evm_xattr
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- [PATCH v3] keys: Use struct_size and size_add helper with alloc
- From: GUO Zihua <guozihua@xxxxxxxxxx>
- Re: [GIT PULL] integrity subsystem updates for v5.19
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] integrity subsystem updates for v5.19
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [GIT PULL] TPM DEVICE DRIVER updates for v5.19-rc1
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v12 03/26] ima: Define ima_namespace struct and start moving variables into it
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v12 03/26] ima: Define ima_namespace struct and start moving variables into it
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v12 03/26] ima: Define ima_namespace struct and start moving variables into it
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v12 11/26] ima: Define mac_admin_ns_capable() as a wrapper for ns_capable()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v12 12/26] ima: Only accept AUDIT rules for non-init_ima_ns namespaces for now
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v12 23/26] ima: Show owning user namespace's uid and gid when displaying policy
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] keys: Use struct_size and size_add helper with alloc
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [PATCH v2] keys: Use struct_size and size_add helper with alloc
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [PATCH v2] keys: Use struct_size and size_add helper with alloc
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 2/2] tpm: Add tpm_tis_verify_crc to the tpm_tis_phy_ops protocol layer
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: Add tpm_tis_i2c backend for tpm_tis_core
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: increase timeout for kselftests
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] keys: Use struct_size and size_add helper with alloc
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [GIT PULL] TPM DEVICE DRIVER updates for v5.19-rc1
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: Add tpm_tis_i2c backend for tpm_tis_core
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: Add tpm_tis_i2c backend for tpm_tis_core
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- Re: [PATCH v12 13/26] userns: Add pointer to ima_namespace to user_namespace
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v12 13/26] userns: Add pointer to ima_namespace to user_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v12 13/26] userns: Add pointer to ima_namespace to user_namespace
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v12 13/26] userns: Add pointer to ima_namespace to user_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: Sending vendor specific commands to spi-nor flash
- From: Michael Walle <michael@xxxxxxxx>
- Re: [PATCH v12 13/26] userns: Add pointer to ima_namespace to user_namespace
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: Add tpm_tis_i2c backend for tpm_tis_core
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: Add tpm_tis_i2c backend for tpm_tis_core
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: Add tpm_tis_i2c backend for tpm_tis_core
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- [PATCH v2] keys: Use struct_size and size_add helper with alloc
- From: GUO Zihua <guozihua@xxxxxxxxxx>
- Re: [PATCH v12 15/26] ima: Implement ima_free_policy_rules() for freeing of an ima_namespace
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v12 14/26] ima: Implement hierarchical processing of file accesses
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v3 ima-evm-utils 3/3] Verify an fs-verity file digest based signature
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3 ima-evm-utils 2/3] Sign an fs-verity file digest
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3 ima-evm-utils 1/3] Reset 'errno' after failure to open or access a file
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v12 13/26] userns: Add pointer to ima_namespace to user_namespace
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v12 23/26] ima: Show owning user namespace's uid and gid when displaying policy
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v12 12/26] ima: Only accept AUDIT rules for non-init_ima_ns namespaces for now
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v12 11/26] ima: Define mac_admin_ns_capable() as a wrapper for ns_capable()
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v12 10/26] ima: Switch to lazy lsm policy updates for better performance
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: Add tpm_tis_i2c backend for tpm_tis_core
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v12 09/26] ima: Move ima_lsm_policy_notifier into ima_namespace
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v12 02/26] securityfs: Extend securityfs with namespacing support
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v12 02/26] securityfs: Extend securityfs with namespacing support
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v12 08/26] ima: Move IMA securityfs files into ima_namespace or onto stack
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v12 04/26] ima: Move arch_policy_entry into ima_namespace
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v12 07/26] ima: Move some IMA policy and filesystem related variables into ima_namespace
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v12 06/26] ima: Move measurement list related variables into ima_namespace
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v12 05/26] ima: Move ima_htable into ima_namespace
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v12 04/26] ima: Move arch_policy_entry into ima_namespace
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v12 03/26] ima: Define ima_namespace struct and start moving variables into it
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v12 02/26] securityfs: Extend securityfs with namespacing support
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v1 1/5] drivers: of: kexec ima: Support 32-bit platforms
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH v3 1/2] tpm: Add tpm_tis_i2c backend for tpm_tis_core
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- [PATCH v3 2/2] tpm: Add tpm_tis_verify_crc to the tpm_tis_phy_ops protocol layer
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- [PATCH v3 0/2] tpm_tis_i2c
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- [PATCH v3 ima-evm-utils 1/3] Reset 'errno' after failure to open or access a file
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 ima-evm-utils 0/3] fs-verity file signature support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 ima-evm-utils 3/3] Verify an fs-verity file digest based signature
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 ima-evm-utils 2/3] Sign an fs-verity file digest
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v1 0/5] Support kexec_file on 32-bit RISC-V
- From: Palmer Dabbelt <palmer@xxxxxxxxxxxx>
- [PATCH v1 4/5] RISC-V: purgatory: Use XLEN-length loads to support rv32
- From: Palmer Dabbelt <palmer@xxxxxxxxxxxx>
- [PATCH v1 5/5] RISC-V: Allow kexec_file() on 32-bit platforms
- From: Palmer Dabbelt <palmer@xxxxxxxxxxxx>
- [PATCH v1 2/5] ima: Fix a build issue on 32-bit platforms
- From: Palmer Dabbelt <palmer@xxxxxxxxxxxx>
- [PATCH v1 3/5] RISC-V: kexec: Use Elf64 on 64-bit targets
- From: Palmer Dabbelt <palmer@xxxxxxxxxxxx>
- [PATCH v1 1/5] drivers: of: kexec ima: Support 32-bit platforms
- From: Palmer Dabbelt <palmer@xxxxxxxxxxxx>
- [PATCH 3/3] dm ima: add documentation target update event
- From: Thore Sommer <public@xxxxxxxx>
- [PATCH 2/3] dm verity: add support for IMA target update event
- From: Thore Sommer <public@xxxxxxxx>
- [PATCH 1/3] dm ima: allow targets to remeasure their table entry
- From: Thore Sommer <public@xxxxxxxx>
- [PATCH 0/3] dm ima: allow targets to remeasure their state
- From: Thore Sommer <public@xxxxxxxx>
- Re: [PATCH] tpm: increase timeout for kselftests
- From: Stefan Mahnke-Hartmann <stefan.mahnke-hartmann@xxxxxxxxxxxx>
- Re: [PATCH] keys: Use struct_size and size_add helper with alloc
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [PATCH v10 0/7] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: Question on permissions of runtime and bios measurements files
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH] keys: Use struct_size and size_add helper with alloc
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 4/4] kexec, KEYS, s390: Make use of built-in and secondary keyring for signature verification
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: [PATCH v8 4/4] kexec, KEYS, s390: Make use of built-in and secondary keyring for signature verification
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v8 4/4] kexec, KEYS, s390: Make use of built-in and secondary keyring for signature verification
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] keys: Use struct_size and size_add helper with alloc
- From: GUO Zihua <guozihua@xxxxxxxxxx>
- Re: [PATCH] tpm: sleep at least <...> ms in tpm_msleep()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: sleep at least <...> ms in tpm_msleep()
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 5/6] tpm, tpm_tis: Move irq test from tpm_tis_send() to tpm_tis_probe_irq_single()
- From: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
- [ANNOUNCE][CFP] Linux Security Summit Europe 2022
- From: "Reshetova, Elena" <elena.reshetova@xxxxxxxxx>
- Re: [PATCH v10 0/7] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 15/21] xen/tpmfront: use xenbus_setup_ring() and xenbus_teardown_ring()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4] x86/kexec: Carry forward IMA measurement log on kexec
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4] x86/kexec: Carry forward IMA measurement log on kexec
- From: Jonathan McDowell <noodles@xxxxxx>
- Re: [PATCH v3 15/21] xen/tpmfront: use xenbus_setup_ring() and xenbus_teardown_ring()
- From: Juergen Gross <jgross@xxxxxxxx>
- [PATCH v2] evm: Refector struct evm_xattr
- From: GUO Zihua <guozihua@xxxxxxxxxx>
- Re: [RESEND] evm: Refector struct evm_xattr
- From: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
- Re: [PATCH v10 0/7] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v10 2/7] KEYS: trusted: allow use of kernel RNG for key material
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v4 5/6] tpm, tpm_tis: Move irq test from tpm_tis_send() to tpm_tis_probe_irq_single()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [RESEND] evm: Refector struct evm_xattr
- From: GUO Zihua <guozihua@xxxxxxxxxx>
- Re: [PATCH v10 0/7] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 ima-evm-utils 2/3] Sign an fs-verity file digest
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v10 2/7] KEYS: trusted: allow use of kernel RNG for key material
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 5/6] tpm, tpm_tis: Move irq test from tpm_tis_send() to tpm_tis_probe_irq_single()
- From: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
- Re: [PATCH v10 2/7] KEYS: trusted: allow use of kernel RNG for key material
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v10 2/7] KEYS: trusted: allow use of kernel RNG for key material
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v4 1/6] tpm, tpm_tis_spi: Request threaded irq
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v10 2/7] KEYS: trusted: allow use of kernel RNG for key material
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 2/7] KEYS: trusted: allow use of kernel RNG for key material
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v10 2/7] KEYS: trusted: allow use of kernel RNG for key material
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v10 2/7] KEYS: trusted: allow use of kernel RNG for key material
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v10 2/7] KEYS: trusted: allow use of kernel RNG for key material
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v10 2/7] KEYS: trusted: allow use of kernel RNG for key material
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v10 2/7] KEYS: trusted: allow use of kernel RNG for key material
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v10 2/7] KEYS: trusted: allow use of kernel RNG for key material
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH 00/10] Encrypted Hibernation
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- Re: [PATCH v10 2/7] KEYS: trusted: allow use of kernel RNG for key material
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v4] x86/kexec: Carry forward IMA measurement log on kexec
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/7] KEYS: trusted: allow use of kernel RNG for key material
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH 00/10] Encrypted Hibernation
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: [PATCH v10 2/7] KEYS: trusted: allow use of kernel RNG for key material
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 0/7] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- RE: [EXT] [PATCH v10 3/7] crypto: caam - determine whether CAAM supports blob encap/decap
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- [PATCH -next] evm: Refector struct evm_xattr
- From: GUO Zihua <guozihua@xxxxxxxxxx>
- Re: [PATCH] evm: Clean up some variables
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 5/6] tpm, tpm_tis: Move irq test from tpm_tis_send() to tpm_tis_probe_irq_single()
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH v4 2/6] tpm, tpm_tis: Claim and release locality only once
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH v4 1/6] tpm, tpm_tis_spi: Request threaded irq
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH v2 1/2] tpm: Fix buffer access in tpm2_get_tpm_pt()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v10 0/7] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 2/2] tpm: Add field upgrade mode support for Infineon TPM2 modules
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: sleep at least <...> ms in tpm_msleep()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: sleep at least <...> ms in tpm_msleep()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 5/6] tpm, tpm_tis: Move irq test from tpm_tis_send() to tpm_tis_probe_irq_single()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] evm: Clean up some variables
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v4] x86/kexec: Carry forward IMA measurement log on kexec
- From: Jonathan McDowell <noodles@xxxxxx>
- Re: [PATCH] evm: Clean up some variables
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH v4 1/6] tpm, tpm_tis_spi: Request threaded irq
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 2/6] tpm, tpm_tis: Claim and release locality only once
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] evm: Clean up some variables
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v4] x86/kexec: Carry forward IMA measurement log on kexec
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 19/32] afs: Use mem_to_flex_dup() with struct afs_acl
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v10 2/7] KEYS: trusted: allow use of kernel RNG for key material
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v10 5/7] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v10 1/7] KEYS: trusted: allow use of TEE as backend without TCG_TPM support
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v10 7/7] MAINTAINERS: add KEYS-TRUSTED-CAAM
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v10 6/7] doc: trusted-encrypted: describe new CAAM trust source
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v10 4/7] crypto: caam - add in-kernel interface for blob generator
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v10 3/7] crypto: caam - determine whether CAAM supports blob encap/decap
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v10 0/7] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v2 ima-evm-utils 3/3] Verify an fs-verity file digest based signature
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 1/2] tpm: Fix buffer access in tpm2_get_tpm_pt()
- From: Stefan Mahnke-Hartmann <stefan.mahnke-hartmann@xxxxxxxxxxxx>
- [PATCH v2 2/2] tpm: Add field upgrade mode support for Infineon TPM2 modules
- From: Stefan Mahnke-Hartmann <stefan.mahnke-hartmann@xxxxxxxxxxxx>
- Re: [PATCH v2 ima-evm-utils 2/3] Sign an fs-verity file digest
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 7/7] fsverity: update the documentation
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 ima-evm-utils 1/3] initialize errno in cmd_sign_hash()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 ima-evm-utils 2/3] Sign an fs-verity file digest
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 00/32] Introduce flexible array struct memcpy() helpers
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 19/32] afs: Use mem_to_flex_dup() with struct afs_acl
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v2 ima-evm-utils 1/3] initialize errno in cmd_sign_hash()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 ima-evm-utils 2/3] Sign an fs-verity file digest
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 ima-evm-utils 3/3] Verify an fs-verity file digest based signature
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 ima-evm-utils 1/3] initialize errno in cmd_sign_hash()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: sleep at least <...> ms in tpm_msleep()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4] x86/kexec: Carry forward IMA measurement log on kexec
- From: Jonathan McDowell <noodles@xxxxxx>
- Re: [PATCH] tpm: sleep at least <...> ms in tpm_msleep()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: sleep at least <...> ms in tpm_msleep()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] evm: Return INTEGRITY_PASS for enum integrity_status value '0'
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [EXT] [PATCH v9 3/7] crypto: caam - determine whether CAAM supports blob encap/decap
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH v9 7/7] fsverity: update the documentation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3] x86/kexec: Carry forward IMA measurement log on kexec
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: sleep at least <...> ms in tpm_msleep()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 6/6] tpm, tpm_tis: Only enable supported IRQs
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH v4 5/6] tpm, tpm_tis: Move irq test from tpm_tis_send() to tpm_tis_probe_irq_single()
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH v4 4/6] tpm, tpm_tis: avoid CPU cache incoherency in irq test
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH v4 2/6] tpm, tpm_tis: Claim and release locality only once
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH v4 1/6] tpm, tpm_tis_spi: Request threaded irq
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH v3] x86/kexec: Carry forward IMA measurement log on kexec
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3] x86/kexec: Carry forward IMA measurement log on kexec
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3] x86/kexec: Carry forward IMA measurement log on kexec
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 7/7] MAINTAINERS: add KEYS-TRUSTED-CAAM
- From: Michael Walle <michael@xxxxxxxx>
- Re: [PATCH v9 7/7] MAINTAINERS: add KEYS-TRUSTED-CAAM
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: sleep at least <...> ms in tpm_msleep()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: increase timeout for kselftests
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/2] tpm: Add Field Upgrade mode support for Infineon TPM2 modules
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm: Fix buffer access in tpm2_get_tpm_pt()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 5/6] tpm, tpm_tis: Move irq test from tpm_tis_send() to tpm_tis_probe_irq_single()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 6/6] tpm, tpm_tis: Only enable supported IRQs
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 4/6] tpm, tpm_tis: avoid CPU cache incoherency in irq test
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [EXT] [PATCH v9 3/7] crypto: caam - determine whether CAAM supports blob encap/decap
- From: Michael Walle <michael@xxxxxxxx>
- Re: [PATCH v9 0/7] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Michael Walle <michael@xxxxxxxx>
- Re: [PATCH v4 2/6] tpm, tpm_tis: Claim and release locality only once
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 1/6] tpm, tpm_tis_spi: Request threaded irq
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 7/7] MAINTAINERS: add KEYS-TRUSTED-CAAM
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v9 0/7] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v8 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [EXT] [PATCH v9 3/7] crypto: caam - determine whether CAAM supports blob encap/decap
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [EXT] [PATCH v9 3/7] crypto: caam - determine whether CAAM supports blob encap/decap
- From: Michael Walle <michael@xxxxxxxx>
- [PATCH v3] x86/kexec: Carry forward IMA measurement log on kexec
- From: Jonathan McDowell <noodles@xxxxxx>
- Re: [EXT] [PATCH v9 3/7] crypto: caam - determine whether CAAM supports blob encap/decap
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [EXT] [PATCH v9 3/7] crypto: caam - determine whether CAAM supports blob encap/decap
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [EXT] [PATCH v9 3/7] crypto: caam - determine whether CAAM supports blob encap/decap
- From: Michael Walle <michael@xxxxxxxx>
- RE: [EXT] [PATCH v9 3/7] crypto: caam - determine whether CAAM supports blob encap/decap
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- Re: [PATCH v12 01/26] securityfs: rework dentry creation
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v12 01/26] securityfs: rework dentry creation
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v12 01/26] securityfs: rework dentry creation
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 08/10] PM: hibernate: Mix user key in encrypted hibernate
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- Re: [PATCH v12 01/26] securityfs: rework dentry creation
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v12 01/26] securityfs: rework dentry creation
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v12 01/26] securityfs: rework dentry creation
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v12 01/26] securityfs: rework dentry creation
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 08/10] PM: hibernate: Mix user key in encrypted hibernate
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH] tpm: increase timeout for kselftests
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- [PATCH] tpm: sleep at least <...> ms in tpm_msleep()
- From: Johannes Holland <johannes.holland@xxxxxxxxxxxx>
- [PATCH] tpm: increase timeout for kselftests
- From: Johannes Holland <johannes.holland@xxxxxxxxxxxx>
- Re: [PATCH v2] Carry forward IMA measurement log on kexec on x86_64
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v12 01/26] securityfs: rework dentry creation
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v12 01/26] securityfs: rework dentry creation
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v12 01/26] securityfs: rework dentry creation
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v12 01/26] securityfs: rework dentry creation
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v2] Carry forward IMA measurement log on kexec on x86_64
- From: Jonathan McDowell <noodles@xxxxxx>
- Re: [PATCH v12 01/26] securityfs: rework dentry creation
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v12 01/26] securityfs: rework dentry creation
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v2] Carry forward IMA measurement log on kexec on x86_64
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2] Carry forward IMA measurement log on kexec on x86_64
- From: Jonathan McDowell <noodles@xxxxxx>
- Re: [PATCH v2] Carry forward IMA measurement log on kexec on x86_64
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2] Carry forward IMA measurement log on kexec on x86_64
- From: Jonathan McDowell <noodles@xxxxxx>
- Re: [RFC PATCH 1/3] dm ima: allow targets to remeasure their table entry
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 08/10] PM: hibernate: Mix user key in encrypted hibernate
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- Re: [PATCH 00/10] Encrypted Hibernation
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- Re: [PATCH] tpm: Add check for Failure mode for TPM2 modules
- From: Marten Lindahl <martenli@xxxxxxxx>
- Re: [PATCH v3 00/21] xen: simplify frontend side ring setup
- From: Oleksandr <olekstysh@xxxxxxxxx>
- Re: [EXT] [PATCH v9 3/7] crypto: caam - determine whether CAAM supports blob encap/decap
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] tpm: Add Field Upgrade mode support for Infineon TPM2 modules
- From: Stefan Mahnke-Hartmann <stefan.mahnke-hartmann@xxxxxxxxxxxx>
- RE: [EXT] [PATCH v9 3/7] crypto: caam - determine whether CAAM supports blob encap/decap
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- Re: [PATCH 1/2] tpm: Fix buffer access in tpm2_get_tpm_pt()
- From: Stefan Mahnke-Hartmann <stefan.mahnke-hartmann@xxxxxxxxxxxx>
- Re: [PATCH v2] Carry forward IMA measurement log on kexec on x86_64
- From: Boris Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2] Carry forward IMA measurement log on kexec on x86_64
- From: Jonathan McDowell <noodles@xxxxxx>
- Re: [RFC PATCH 1/3] dm ima: allow targets to remeasure their table entry
- From: Thore Sommer <public@xxxxxxxx>
- Re: [RFC PATCH 2/3] dm verity: add support for IMA target update event
- From: Thore Sommer <public@xxxxxxxx>
- Re: [RFC PATCH 0/3] dm ima: allow targets to remeasure their state
- From: Thore Sommer <public@xxxxxxxx>
- [PATCH v4 3/6] tpm, tpm_tis: enable irq test
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v4 5/6] tpm, tpm_tis: Move irq test from tpm_tis_send() to tpm_tis_probe_irq_single()
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v4 4/6] tpm, tpm_tis: avoid CPU cache incoherency in irq test
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v4 0/6] TPM irq fixes
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v4 6/6] tpm, tpm_tis: Only enable supported IRQs
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v4 2/6] tpm, tpm_tis: Claim and release locality only once
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v4 1/6] tpm, tpm_tis_spi: Request threaded irq
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH v8 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: John Ernberg <john.ernberg@xxxxxxxx>
- Re: [PATCH v2 3/4] tpm: Implement command and response retry in tpm_tis_core
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 2/4] tpm: Add tpm_tis_verify_crc to the tpm_tis_phy_ops protocol layer
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/4] tpm: Add tpm_tis_i2c backend for tpm_tis_core
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/2] tpm: Add Field Upgrade mode support for Infineon TPM2 modules
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm: Fix buffer access in tpm2_get_tpm_pt()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 7/7] MAINTAINERS: add KEYS-TRUSTED-CAAM
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 7/7] MAINTAINERS: add KEYS-TRUSTED-CAAM
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/4] tpm: Add tpm_tis_i2c backend for tpm_tis_core
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v2 4/4] dt-bindings: doc/devicetree/bindings/security/tpm: Move tpm-i2c.txt to YAML
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v3 15/21] xen/tpmfront: use xenbus_setup_ring() and xenbus_teardown_ring()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH 2/3] dm verity: add support for IMA target update event
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/3] dm ima: allow targets to remeasure their table entry
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/3] dm ima: allow targets to remeasure their state
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 4/4] dt-bindings: doc/devicetree/bindings/security/tpm: Move tpm-i2c.txt to YAML
- From: Johannes Holland <johannes.holland@xxxxxxxxxxxx>
- [PATCH v2 3/4] tpm: Implement command and response retry in tpm_tis_core
- From: Johannes Holland <johannes.holland@xxxxxxxxxxxx>
- [PATCH v2 2/4] tpm: Add tpm_tis_verify_crc to the tpm_tis_phy_ops protocol layer
- From: Johannes Holland <johannes.holland@xxxxxxxxxxxx>
- [PATCH v2 1/4] tpm: Add tpm_tis_i2c backend for tpm_tis_core
- From: Johannes Holland <johannes.holland@xxxxxxxxxxxx>
- Re: [PATCH 08/10] PM: hibernate: Mix user key in encrypted hibernate
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 00/10] Encrypted Hibernation
- From: Pavel Machek <pavel@xxxxxx>
- [PATCH 2/2] tpm: Add Field Upgrade mode support for Infineon TPM2 modules
- From: Stefan Mahnke-Hartmann <stefan.mahnke-hartmann@xxxxxxxxxxxx>
- [PATCH 1/2] tpm: Fix buffer access in tpm2_get_tpm_pt()
- From: Stefan Mahnke-Hartmann <stefan.mahnke-hartmann@xxxxxxxxxxxx>
- Re: [PATCH 3/3] ima: Append line feed to ima/binary_runtime_measurements
- From: wangweiyang <wangweiyang2@xxxxxxxxxx>
- Re: [PATCH] tpm: Add check for Failure mode for TPM2 modules
- From: Stefan Mahnke-Hartmann <stefan.mahnke-hartmann@xxxxxxxxxxxx>
- Re: [PATCH v9 6/7] ima: support fs-verity file digest based version 3 signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] ima: Append line feed to ima/binary_runtime_measurements
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: [PATCH 02/32] Introduce flexible array struct memcpy() helpers
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v9 0/7] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Michael Walle <michael@xxxxxxxx>
- [PATCH v9 7/7] MAINTAINERS: add KEYS-TRUSTED-CAAM
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v9 0/7] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v9 2/7] KEYS: trusted: allow use of kernel RNG for key material
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v9 6/7] doc: trusted-encrypted: describe new CAAM trust source
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v9 4/7] crypto: caam - add in-kernel interface for blob generator
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v9 1/7] KEYS: trusted: allow use of TEE as backend without TCG_TPM support
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v9 3/7] crypto: caam - determine whether CAAM supports blob encap/decap
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v9 5/7] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/1] ima: remove the IMA_TEMPLATE Kconfig option
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [PATCH 28/32] selinux: Use mem_to_flex_dup() with xfrm and sidtab
- From: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
- Re: [PATCH v3 00/21] xen: simplify frontend side ring setup
- From: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
- Re: [PATCH 28/32] selinux: Use mem_to_flex_dup() with xfrm and sidtab
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v9 4/7] ima: define a new template field named 'd-ngv2' and templates (repost with fix)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v9 4/7] ima: define a new template field named 'd-ngv2' and templates (repost)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 02/32] Introduce flexible array struct memcpy() helpers
- From: Johannes Berg <johannes@xxxxxxxxxxxxxxxx>
- Re: [PATCH 02/32] Introduce flexible array struct memcpy() helpers
- From: Keith Packard <keithp@xxxxxxxxxx>
- Re: [PATCH 02/32] Introduce flexible array struct memcpy() helpers
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 02/32] Introduce flexible array struct memcpy() helpers
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 28/32] selinux: Use mem_to_flex_dup() with xfrm and sidtab
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v8 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v9 6/7] ima: support fs-verity file digest based version 3 signatures
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] securityfs: Append line feed to /sys/kernel/security/lsm
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 02/32] Introduce flexible array struct memcpy() helpers
- From: Keith Packard <keithp@xxxxxxxxxx>
- Re: [PATCH v8 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: John Ernberg <john.ernberg@xxxxxxxx>
- Question on permissions of runtime and bios measurements files
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 3/3] ima: Append line feed to ima/binary_runtime_measurements
- From: Wang Weiyang <wangweiyang2@xxxxxxxxxx>
- [PATCH 2/3] evm: Append line feed to /sys/kernel/security/evm
- From: Wang Weiyang <wangweiyang2@xxxxxxxxxx>
- [PATCH 0/3] Append line feed to files in securityfs
- From: Wang Weiyang <wangweiyang2@xxxxxxxxxx>
- [PATCH 1/3] securityfs: Append line feed to /sys/kernel/security/lsm
- From: Wang Weiyang <wangweiyang2@xxxxxxxxxx>
- Re: [PATCH 02/32] Introduce flexible array struct memcpy() helpers
- From: Johannes Berg <johannes@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/1] ima: remove the IMA_TEMPLATE Kconfig option
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v9 6/7] ima: support fs-verity file digest based version 3 signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v9 7/7] fsverity: update the documentation
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v9 5/7] ima: permit fsverity's file digests in the IMA measurement list
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v9 4/7] ima: define a new template field named 'd-ngv2' and templates
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v9 3/7] fs-verity: define a function to return the integrity protected file digest
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v9 1/7] ima: fix 'd-ng' comments and documentation
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v9 0/7] ima: support fs-verity digests and signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v9 2/7] ima: use IMA default hash algorithm for integrity violations
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 00/21] xen: simplify frontend side ring setup
- From: Juergen Gross <jgross@xxxxxxxx>
- [PATCH v3 15/21] xen/tpmfront: use xenbus_setup_ring() and xenbus_teardown_ring()
- From: Juergen Gross <jgross@xxxxxxxx>
- Re: [PATCH 28/32] selinux: Use mem_to_flex_dup() with xfrm and sidtab
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/1] ima: remove the IMA_TEMPLATE Kconfig option
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- [PATCH 00/10] Encrypted Hibernation
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH 01/10] tpm: Add support for in-kernel resetting of PCRs
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH 09/10] PM: hibernate: Verify the digest encryption key
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH 10/10] PM: hibernate: seal the encryption key with a PCR policy
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- Re: [PATCH 28/32] selinux: Use mem_to_flex_dup() with xfrm and sidtab
- From: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
- [PATCH 05/10] security: keys: trusted: Verify creation data
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH 04/10] security: keys: trusted: Allow storage of PCR values in creation data
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH 08/10] PM: hibernate: Mix user key in encrypted hibernate
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH 03/10] security: keys: trusted: Parse out individual components of the key blob
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH 02/10] tpm: Allow PCR 23 to be restricted to kernel-only use
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH 06/10] PM: hibernate: Add kernel-based encryption
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH 07/10] PM: hibernate: Use TPM-backed keys to encrypt image
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- Re: [PATCH 28/32] selinux: Use mem_to_flex_dup() with xfrm and sidtab
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 03/32] flex_array: Add Kunit tests
- From: Daniel Latypov <dlatypov@xxxxxxxxxx>
- Re: [PATCH 03/32] flex_array: Add Kunit tests
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 29/32] xtensa: Use mem_to_flex_dup() with struct property
- From: Rob Herring <robh@xxxxxxxxxx>
- RE: [PATCH 02/32] Introduce flexible array struct memcpy() helpers
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH 02/32] Introduce flexible array struct memcpy() helpers
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 20/32] ASoC: sigmadsp: Use mem_to_flex_dup() with struct sigmadsp_data
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH 12/32] cfg80211: Use mem_to_flex_dup() with struct cfg80211_bss_ies
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 10/32] wcn36xx: Use mem_to_flex_dup() with struct wcn36xx_hal_ind_msg
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2] Carry forward IMA measurement log on kexec on x86_64
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 12/32] cfg80211: Use mem_to_flex_dup() with struct cfg80211_bss_ies
- From: Johannes Berg <johannes@xxxxxxxxxxxxxxxx>
- Re: [PATCH 02/32] Introduce flexible array struct memcpy() helpers
- From: Johannes Berg <johannes@xxxxxxxxxxxxxxxx>
- Re: [PATCH v8 3/6] crypto: caam - add in-kernel interface for blob generator
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: Dell XPS 13 9310 2-in-1: tpm tpm0: invalid TPM_STS.x 0xff, dumping stack for forensics
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 10/32] wcn36xx: Use mem_to_flex_dup() with struct wcn36xx_hal_ind_msg
- From: Kalle Valo <kvalo@xxxxxxxxxx>
- Re: [PATCH v8 6/6] MAINTAINERS: add myself as CAAM trusted key maintainer
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v8 6/6] MAINTAINERS: add myself as CAAM trusted key maintainer
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 5/6] doc: trusted-encrypted: describe new CAAM trust source
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [EXT] [PATCH v7 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [EXT] [PATCH v7 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] char: tpm: cr50_i2c: Suppress duplicated error message in .remove()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] char: tpm: cr50_i2c: Drop if with an always false condition
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] char: tpm: cr50_i2c: Suppress duplicated error message in .remove()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 01/32] netlink: Avoid memcpy() across flexible array boundary
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 01/32] netlink: Avoid memcpy() across flexible array boundary
- From: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
- Re: [PATCH 03/32] flex_array: Add Kunit tests
- From: David Gow <davidgow@xxxxxxxxxx>
- [PATCH 30/32] usb: gadget: f_fs: Use mem_to_flex_dup() with struct ffs_buffer
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 31/32] xenbus: Use mem_to_flex_dup() with struct read_buffer
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 27/32] KEYS: Use mem_to_flex_dup() with struct user_key_payload
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 24/32] IB/hfi1: Use mem_to_flex_dup() for struct tid_rb_node
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 32/32] esas2r: Use __mem_to_flex() with struct atto_ioctl
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 28/32] selinux: Use mem_to_flex_dup() with xfrm and sidtab
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 22/32] atags_proc: Use mem_to_flex_dup() with struct buffer
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 20/32] ASoC: sigmadsp: Use mem_to_flex_dup() with struct sigmadsp_data
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 18/32] firewire: Use __mem_to_flex_dup() with struct iso_interrupt_event
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 13/32] mac80211: Use mem_to_flex_dup() with several structs
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 15/32] 802/garp: Use mem_to_flex_dup() with struct garp_attr
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 17/32] net/flow_offload: Use mem_to_flex_dup() with struct flow_action_cookie
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 09/32] p54: Use mem_to_flex_dup() with struct p54_cal_database
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 25/32] Drivers: hv: utils: Use mem_to_flex_dup() with struct cn_msg
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 29/32] xtensa: Use mem_to_flex_dup() with struct property
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 11/32] nl80211: Use mem_to_flex_dup() with struct cfg80211_cqm_config
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 19/32] afs: Use mem_to_flex_dup() with struct afs_acl
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 14/32] af_unix: Use mem_to_flex_dup() with struct unix_address
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 23/32] Bluetooth: Use mem_to_flex_dup() with struct hci_op_configure_data_path
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 21/32] soc: qcom: apr: Use mem_to_flex_dup() with struct apr_rx_buf
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 07/32] iwlwifi: calib: Use mem_to_flex_dup() with struct iwl_calib_result
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 26/32] ima: Use mem_to_flex_dup() with struct modsig
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 12/32] cfg80211: Use mem_to_flex_dup() with struct cfg80211_bss_ies
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 08/32] iwlwifi: mvm: Use mem_to_flex_dup() with struct ieee80211_key_conf
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 06/32] iwlwifi: calib: Prepare to use mem_to_flex_dup()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 05/32] brcmfmac: Use mem_to_flex_dup() with struct brcmf_fweh_queue_item
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 10/32] wcn36xx: Use mem_to_flex_dup() with struct wcn36xx_hal_ind_msg
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 16/32] 802/mrp: Use mem_to_flex_dup() with struct mrp_attr
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 04/32] fortify: Add run-time WARN for cross-field memcpy()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 03/32] flex_array: Add Kunit tests
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 02/32] Introduce flexible array struct memcpy() helpers
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 00/32] Introduce flexible array struct memcpy() helpers
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 01/32] netlink: Avoid memcpy() across flexible array boundary
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Permissions on binary_runtime_measurements and tpm0/binary_bios_measurements
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v8 3/6] crypto: caam - add in-kernel interface for blob generator
- From: Michael Walle <michael@xxxxxxxx>
- Re: [PATCH v2] Carry forward IMA measurement log on kexec on x86_64
- From: Jonathan McDowell <noodles@xxxxxx>
- Re: [RFC v2 04/39] char: impi, tpm: depend on HAS_IOPORT
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [PATCH v8 6/7] ima: support fs-verity file digest based version 3 signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 1/7] ima: fix 'd-ng' comments and documentation
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 6/7] ima: support fs-verity file digest based version 3 signatures
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v8 4/7] ima: define a new template field named 'd-ngv2' and templates
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] Carry forward IMA measurement log on kexec on x86_64
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 7/7] fsverity: update the documentation
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v8 5/7] ima: permit fsverity's file digests in the IMA measurement list
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v8 1/7] ima: fix 'd-ng' comments and documentation
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v8 2/7] ima: use IMA default hash algorithm for integrity violations
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v8 4/7] ima: define a new template field named 'd-ngv2' and templates
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC v2 04/39] char: impi, tpm: depend on HAS_IOPORT
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [RFC v2 04/39] char: impi, tpm: depend on HAS_IOPORT
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [PATCH 05/37] char: impi, tpm: depend on HAS_IOPORT
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH 05/37] char: impi, tpm: depend on HAS_IOPORT
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- [RFC v2 04/39] char: impi, tpm: depend on HAS_IOPORT
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: Dell XPS 13 9310 2-in-1: tpm tpm0: invalid TPM_STS.x 0xff, dumping stack for forensics
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- [PATCH v8 7/7] fsverity: update the documentation
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v8 5/7] ima: permit fsverity's file digests in the IMA measurement list
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v8 3/7] fs-verity: define a function to return the integrity protected file digest
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v8 4/7] ima: define a new template field named 'd-ngv2' and templates
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v8 6/7] ima: support fs-verity file digest based version 3 signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v8 1/7] ima: fix 'd-ng' comments and documentation
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v8 2/7] ima: use IMA default hash algorithm for integrity violations
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v8 0/7] ima: support fs-verity digests and signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Dell XPS 13 9310 2-in-1: tpm tpm0: invalid TPM_STS.x 0xff, dumping stack for forensics
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: [PATCH] integrity: Allow ima_appraise bootparam to be set when SB is enabled
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v8 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v8 4/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v8 6/6] MAINTAINERS: add myself as CAAM trusted key maintainer
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v8 5/6] doc: trusted-encrypted: describe new CAAM trust source
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v8 3/6] crypto: caam - add in-kernel interface for blob generator
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v8 1/6] KEYS: trusted: allow use of TEE as backend without TCG_TPM support
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v8 2/6] KEYS: trusted: allow use of kernel RNG for key material
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [EXT] [PATCH v7 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- RE: [EXT] [PATCH v7 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- Re: [PATCH] Carry forward IMA measurement log on kexec on x86_64
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] Carry forward IMA measurement log on kexec on x86_64
- From: Jonathan McDowell <noodles@xxxxxx>
- [PATCH v2 13/19] xen/tpmfront: use xenbus_setup_ring() and xenbus_teardown_ring()
- From: Juergen Gross <jgross@xxxxxxxx>
- [PATCH v2 00/19] xen: simplify frontend side ring setup
- From: Juergen Gross <jgross@xxxxxxxx>
- Re: [PATCH v7 4/5] ima: support fs-verity file digest based version 3 signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 3/5] ima: permit fsverity's file digests in the IMA measurement list
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 2/5] ima: define a new template field named 'd-ngv2' and templates
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] integrity: Allow ima_appraise bootparam to be set when SB is enabled
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] integrity: Allow ima_appraise bootparam to be set when SB is enabled
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH] integrity: Allow ima_appraise bootparam to be set when SB is enabled
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] Carry forward IMA measurement log on kexec on x86_64
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2] Carry forward IMA measurement log on kexec on x86_64
- From: Jonathan McDowell <noodles@xxxxxx>
- Re: [PATCH] Carry forward IMA measurement log on kexec on x86_64
- From: Jonathan McDowell <noodles@xxxxxx>
- Re: [PATCH] Carry forward IMA measurement log on kexec on x86_64
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] Carry forward IMA measurement log on kexec on x86_64
- From: Jonathan McDowell <noodles@xxxxxx>
- Re: [PATCH] char: tpm: cr50_i2c: Drop if with an always false condition
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH] char: tpm: cr50_i2c: Suppress duplicated error message in .remove()
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH] char: tpm: cr50_i2c: Drop if with an always false condition
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] integrity: Allow ima_appraise bootparam to be set when SB is enabled
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH] char: tpm: cr50_i2c: Drop if with an always false condition
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH] Carry forward IMA measurement log on kexec on x86_64
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add check for Failure mode for TPM2 modules
- From: Marten Lindahl <martenli@xxxxxxxx>
- Re: [PATCH] tpm: Add check for Failure mode for TPM2 modules
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 0/4] Fixes for TPM interrupt handling
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- tpm tpm0: invalid TPM_STS.x 0xff, dumping stack for forensics
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH] tpm: Add check for Failure mode for TPM2 modules
- From: Mårten Lindahl <marten.lindahl@xxxxxxxx>
- Re: [PATCH v3 0/4] Fixes for TPM interrupt handling
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH 1/2] clk-bcm2835: use subsys_initcall for the clock driver when IMA is enabled
- From: Alberto Solavagione <albertosolavagione30@xxxxxxxxx>
- [PATCH v7 RESEND] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- [PATCH] Carry forward IMA measurement log on kexec on x86_64
- From: Jonathan McDowell <noodles@xxxxxx>
- Re: [PATCH v7 3/5] certs: Make blacklist_vet_description() more strict
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] integrity: Fix sparse warnings in keyring_handler
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v7 3/5] certs: Make blacklist_vet_description() more strict
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v2] tpm: cr50: Add new device/vendor ID 0x504a6666
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm: cr50: Add new device/vendor ID 0x504a6666
- From: Jes Klinke <jbk@xxxxxxxxxx>
- Re: [PATCH v7 3/5] certs: Make blacklist_vet_description() more strict
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 3/5] certs: Make blacklist_vet_description() more strict
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [GIT PULL] TPM DEVICE DRIVER updates for tpmdd-next-v5.18-rc4
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 3/5] certs: Make blacklist_vet_description() more strict
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v35 05/29] IMA: avoid label collisions with stacked LSMs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v35 05/29] IMA: avoid label collisions with stacked LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v35 05/29] IMA: avoid label collisions with stacked LSMs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 2/2] tpm_tis_spi_main: Force probe routine to run synchronously with driver and device registration when IMA is enabled
- From: Scovotto Davide <scovottodavide@xxxxxxxxx>
- [PATCH 12/18] xen/tpmfront: use xenbus_setup_ring() and xenbus_teardown_ring()
- From: Juergen Gross <jgross@xxxxxxxx>
- [PATCH 00/18] xen: simplify frontend side ring setup
- From: Juergen Gross <jgross@xxxxxxxx>
- [PATCH v12 01/26] securityfs: rework dentry creation
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 23/26] ima: Show owning user namespace's uid and gid when displaying policy
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 25/26] ima: Restrict informational audit messages to init_ima_ns
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 17/26] integrity/ima: Define ns_status for storing namespaced iint data
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 08/26] ima: Move IMA securityfs files into ima_namespace or onto stack
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 18/26] integrity: Add optional callback function to integrity_inode_free()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 03/26] ima: Define ima_namespace struct and start moving variables into it
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 06/26] ima: Move measurement list related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 10/26] ima: Switch to lazy lsm policy updates for better performance
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 05/26] ima: Move ima_htable into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 14/26] ima: Implement hierarchical processing of file accesses
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 00/26] ima: Namespace IMA with audit support in IMA-ns
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 19/26] ima: Namespace audit status flags
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 02/26] securityfs: Extend securityfs with namespacing support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 21/26] ima: Setup securityfs for IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 16/26] ima: Add functions for creating and freeing of an ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 11/26] ima: Define mac_admin_ns_capable() as a wrapper for ns_capable()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 04/26] ima: Move arch_policy_entry into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 20/26] ima: Remove unused iints from the integrity_iint_cache
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 12/26] ima: Only accept AUDIT rules for non-init_ima_ns namespaces for now
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 26/26] ima: Enable IMA namespaces
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 13/26] userns: Add pointer to ima_namespace to user_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 22/26] ima: Introduce securityfs file to activate an IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 07/26] ima: Move some IMA policy and filesystem related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 24/26] ima: Limit number of policy rules in non-init_ima_ns
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 09/26] ima: Move ima_lsm_policy_notifier into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 15/26] ima: Implement ima_free_policy_rules() for freeing of an ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: cr50: Add new device/vendor ID 0x504a6666
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: [GIT PULL] TPM DEVICE DRIVER updates for tpmdd-next-v5.18-rc4
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v7 3/5] certs: Make blacklist_vet_description() more strict
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v2] tpm: cr50: Add new device/vendor ID 0x504a6666
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 0/4] Fixes for TPM interrupt handling
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 0/4] Fixes for TPM interrupt handling
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [GIT PULL] TPM DEVICE DRIVER updates for tpmdd-next-v5.18-rc4
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: cr50: Add new device/vendor ID 0x504a6666
- From: Jes Klinke <jbk@xxxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]