Linux Integrity
[Prev Page][Next Page]
- Re: [PATCH 08/10] PM: hibernate: Mix user key in encrypted hibernate
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 00/10] Encrypted Hibernation
- From: Pavel Machek <pavel@xxxxxx>
- [PATCH 2/2] tpm: Add Field Upgrade mode support for Infineon TPM2 modules
- From: Stefan Mahnke-Hartmann <stefan.mahnke-hartmann@xxxxxxxxxxxx>
- [PATCH 1/2] tpm: Fix buffer access in tpm2_get_tpm_pt()
- From: Stefan Mahnke-Hartmann <stefan.mahnke-hartmann@xxxxxxxxxxxx>
- Re: [PATCH 3/3] ima: Append line feed to ima/binary_runtime_measurements
- From: wangweiyang <wangweiyang2@xxxxxxxxxx>
- Re: [PATCH] tpm: Add check for Failure mode for TPM2 modules
- From: Stefan Mahnke-Hartmann <stefan.mahnke-hartmann@xxxxxxxxxxxx>
- Re: [PATCH v9 6/7] ima: support fs-verity file digest based version 3 signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] ima: Append line feed to ima/binary_runtime_measurements
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: [PATCH 02/32] Introduce flexible array struct memcpy() helpers
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v9 0/7] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Michael Walle <michael@xxxxxxxx>
- [PATCH v9 7/7] MAINTAINERS: add KEYS-TRUSTED-CAAM
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v9 0/7] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v9 2/7] KEYS: trusted: allow use of kernel RNG for key material
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v9 6/7] doc: trusted-encrypted: describe new CAAM trust source
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v9 4/7] crypto: caam - add in-kernel interface for blob generator
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v9 1/7] KEYS: trusted: allow use of TEE as backend without TCG_TPM support
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v9 3/7] crypto: caam - determine whether CAAM supports blob encap/decap
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v9 5/7] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/1] ima: remove the IMA_TEMPLATE Kconfig option
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [PATCH 28/32] selinux: Use mem_to_flex_dup() with xfrm and sidtab
- From: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
- Re: [PATCH v3 00/21] xen: simplify frontend side ring setup
- From: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
- Re: [PATCH 28/32] selinux: Use mem_to_flex_dup() with xfrm and sidtab
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v9 4/7] ima: define a new template field named 'd-ngv2' and templates (repost with fix)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v9 4/7] ima: define a new template field named 'd-ngv2' and templates (repost)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 02/32] Introduce flexible array struct memcpy() helpers
- From: Johannes Berg <johannes@xxxxxxxxxxxxxxxx>
- Re: [PATCH 02/32] Introduce flexible array struct memcpy() helpers
- From: Keith Packard <keithp@xxxxxxxxxx>
- Re: [PATCH 02/32] Introduce flexible array struct memcpy() helpers
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 02/32] Introduce flexible array struct memcpy() helpers
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 28/32] selinux: Use mem_to_flex_dup() with xfrm and sidtab
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v8 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v9 6/7] ima: support fs-verity file digest based version 3 signatures
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] securityfs: Append line feed to /sys/kernel/security/lsm
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 02/32] Introduce flexible array struct memcpy() helpers
- From: Keith Packard <keithp@xxxxxxxxxx>
- Re: [PATCH v8 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: John Ernberg <john.ernberg@xxxxxxxx>
- Question on permissions of runtime and bios measurements files
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH 3/3] ima: Append line feed to ima/binary_runtime_measurements
- From: Wang Weiyang <wangweiyang2@xxxxxxxxxx>
- [PATCH 2/3] evm: Append line feed to /sys/kernel/security/evm
- From: Wang Weiyang <wangweiyang2@xxxxxxxxxx>
- [PATCH 0/3] Append line feed to files in securityfs
- From: Wang Weiyang <wangweiyang2@xxxxxxxxxx>
- [PATCH 1/3] securityfs: Append line feed to /sys/kernel/security/lsm
- From: Wang Weiyang <wangweiyang2@xxxxxxxxxx>
- Re: [PATCH 02/32] Introduce flexible array struct memcpy() helpers
- From: Johannes Berg <johannes@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/1] ima: remove the IMA_TEMPLATE Kconfig option
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v9 6/7] ima: support fs-verity file digest based version 3 signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v9 7/7] fsverity: update the documentation
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v9 5/7] ima: permit fsverity's file digests in the IMA measurement list
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v9 4/7] ima: define a new template field named 'd-ngv2' and templates
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v9 3/7] fs-verity: define a function to return the integrity protected file digest
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v9 1/7] ima: fix 'd-ng' comments and documentation
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v9 0/7] ima: support fs-verity digests and signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v9 2/7] ima: use IMA default hash algorithm for integrity violations
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 00/21] xen: simplify frontend side ring setup
- From: Juergen Gross <jgross@xxxxxxxx>
- [PATCH v3 15/21] xen/tpmfront: use xenbus_setup_ring() and xenbus_teardown_ring()
- From: Juergen Gross <jgross@xxxxxxxx>
- Re: [PATCH 28/32] selinux: Use mem_to_flex_dup() with xfrm and sidtab
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/1] ima: remove the IMA_TEMPLATE Kconfig option
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- [PATCH 00/10] Encrypted Hibernation
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH 01/10] tpm: Add support for in-kernel resetting of PCRs
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH 09/10] PM: hibernate: Verify the digest encryption key
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH 10/10] PM: hibernate: seal the encryption key with a PCR policy
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- Re: [PATCH 28/32] selinux: Use mem_to_flex_dup() with xfrm and sidtab
- From: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
- [PATCH 05/10] security: keys: trusted: Verify creation data
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH 04/10] security: keys: trusted: Allow storage of PCR values in creation data
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH 08/10] PM: hibernate: Mix user key in encrypted hibernate
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH 03/10] security: keys: trusted: Parse out individual components of the key blob
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH 02/10] tpm: Allow PCR 23 to be restricted to kernel-only use
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH 06/10] PM: hibernate: Add kernel-based encryption
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH 07/10] PM: hibernate: Use TPM-backed keys to encrypt image
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- Re: [PATCH 28/32] selinux: Use mem_to_flex_dup() with xfrm and sidtab
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 03/32] flex_array: Add Kunit tests
- From: Daniel Latypov <dlatypov@xxxxxxxxxx>
- Re: [PATCH 03/32] flex_array: Add Kunit tests
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 29/32] xtensa: Use mem_to_flex_dup() with struct property
- From: Rob Herring <robh@xxxxxxxxxx>
- RE: [PATCH 02/32] Introduce flexible array struct memcpy() helpers
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH 02/32] Introduce flexible array struct memcpy() helpers
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 20/32] ASoC: sigmadsp: Use mem_to_flex_dup() with struct sigmadsp_data
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH 12/32] cfg80211: Use mem_to_flex_dup() with struct cfg80211_bss_ies
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 10/32] wcn36xx: Use mem_to_flex_dup() with struct wcn36xx_hal_ind_msg
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2] Carry forward IMA measurement log on kexec on x86_64
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 12/32] cfg80211: Use mem_to_flex_dup() with struct cfg80211_bss_ies
- From: Johannes Berg <johannes@xxxxxxxxxxxxxxxx>
- Re: [PATCH 02/32] Introduce flexible array struct memcpy() helpers
- From: Johannes Berg <johannes@xxxxxxxxxxxxxxxx>
- Re: [PATCH v8 3/6] crypto: caam - add in-kernel interface for blob generator
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: Dell XPS 13 9310 2-in-1: tpm tpm0: invalid TPM_STS.x 0xff, dumping stack for forensics
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 10/32] wcn36xx: Use mem_to_flex_dup() with struct wcn36xx_hal_ind_msg
- From: Kalle Valo <kvalo@xxxxxxxxxx>
- Re: [PATCH v8 6/6] MAINTAINERS: add myself as CAAM trusted key maintainer
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v8 6/6] MAINTAINERS: add myself as CAAM trusted key maintainer
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 5/6] doc: trusted-encrypted: describe new CAAM trust source
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [EXT] [PATCH v7 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [EXT] [PATCH v7 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] char: tpm: cr50_i2c: Suppress duplicated error message in .remove()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] char: tpm: cr50_i2c: Drop if with an always false condition
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] char: tpm: cr50_i2c: Suppress duplicated error message in .remove()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 01/32] netlink: Avoid memcpy() across flexible array boundary
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 01/32] netlink: Avoid memcpy() across flexible array boundary
- From: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
- Re: [PATCH 03/32] flex_array: Add Kunit tests
- From: David Gow <davidgow@xxxxxxxxxx>
- [PATCH 30/32] usb: gadget: f_fs: Use mem_to_flex_dup() with struct ffs_buffer
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 31/32] xenbus: Use mem_to_flex_dup() with struct read_buffer
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 27/32] KEYS: Use mem_to_flex_dup() with struct user_key_payload
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 24/32] IB/hfi1: Use mem_to_flex_dup() for struct tid_rb_node
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 32/32] esas2r: Use __mem_to_flex() with struct atto_ioctl
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 28/32] selinux: Use mem_to_flex_dup() with xfrm and sidtab
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 22/32] atags_proc: Use mem_to_flex_dup() with struct buffer
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 20/32] ASoC: sigmadsp: Use mem_to_flex_dup() with struct sigmadsp_data
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 18/32] firewire: Use __mem_to_flex_dup() with struct iso_interrupt_event
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 13/32] mac80211: Use mem_to_flex_dup() with several structs
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 15/32] 802/garp: Use mem_to_flex_dup() with struct garp_attr
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 17/32] net/flow_offload: Use mem_to_flex_dup() with struct flow_action_cookie
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 09/32] p54: Use mem_to_flex_dup() with struct p54_cal_database
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 25/32] Drivers: hv: utils: Use mem_to_flex_dup() with struct cn_msg
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 29/32] xtensa: Use mem_to_flex_dup() with struct property
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 11/32] nl80211: Use mem_to_flex_dup() with struct cfg80211_cqm_config
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 19/32] afs: Use mem_to_flex_dup() with struct afs_acl
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 14/32] af_unix: Use mem_to_flex_dup() with struct unix_address
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 23/32] Bluetooth: Use mem_to_flex_dup() with struct hci_op_configure_data_path
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 21/32] soc: qcom: apr: Use mem_to_flex_dup() with struct apr_rx_buf
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 07/32] iwlwifi: calib: Use mem_to_flex_dup() with struct iwl_calib_result
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 26/32] ima: Use mem_to_flex_dup() with struct modsig
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 12/32] cfg80211: Use mem_to_flex_dup() with struct cfg80211_bss_ies
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 08/32] iwlwifi: mvm: Use mem_to_flex_dup() with struct ieee80211_key_conf
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 06/32] iwlwifi: calib: Prepare to use mem_to_flex_dup()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 05/32] brcmfmac: Use mem_to_flex_dup() with struct brcmf_fweh_queue_item
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 10/32] wcn36xx: Use mem_to_flex_dup() with struct wcn36xx_hal_ind_msg
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 16/32] 802/mrp: Use mem_to_flex_dup() with struct mrp_attr
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 04/32] fortify: Add run-time WARN for cross-field memcpy()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 03/32] flex_array: Add Kunit tests
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 02/32] Introduce flexible array struct memcpy() helpers
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 00/32] Introduce flexible array struct memcpy() helpers
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 01/32] netlink: Avoid memcpy() across flexible array boundary
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Permissions on binary_runtime_measurements and tpm0/binary_bios_measurements
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v8 3/6] crypto: caam - add in-kernel interface for blob generator
- From: Michael Walle <michael@xxxxxxxx>
- Re: [PATCH v2] Carry forward IMA measurement log on kexec on x86_64
- From: Jonathan McDowell <noodles@xxxxxx>
- Re: [RFC v2 04/39] char: impi, tpm: depend on HAS_IOPORT
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [PATCH v8 6/7] ima: support fs-verity file digest based version 3 signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 1/7] ima: fix 'd-ng' comments and documentation
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 6/7] ima: support fs-verity file digest based version 3 signatures
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v8 4/7] ima: define a new template field named 'd-ngv2' and templates
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] Carry forward IMA measurement log on kexec on x86_64
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 7/7] fsverity: update the documentation
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v8 5/7] ima: permit fsverity's file digests in the IMA measurement list
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v8 1/7] ima: fix 'd-ng' comments and documentation
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v8 2/7] ima: use IMA default hash algorithm for integrity violations
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v8 4/7] ima: define a new template field named 'd-ngv2' and templates
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC v2 04/39] char: impi, tpm: depend on HAS_IOPORT
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [RFC v2 04/39] char: impi, tpm: depend on HAS_IOPORT
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [PATCH 05/37] char: impi, tpm: depend on HAS_IOPORT
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH 05/37] char: impi, tpm: depend on HAS_IOPORT
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- [RFC v2 04/39] char: impi, tpm: depend on HAS_IOPORT
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: Dell XPS 13 9310 2-in-1: tpm tpm0: invalid TPM_STS.x 0xff, dumping stack for forensics
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- [PATCH v8 7/7] fsverity: update the documentation
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v8 5/7] ima: permit fsverity's file digests in the IMA measurement list
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v8 3/7] fs-verity: define a function to return the integrity protected file digest
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v8 4/7] ima: define a new template field named 'd-ngv2' and templates
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v8 6/7] ima: support fs-verity file digest based version 3 signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v8 1/7] ima: fix 'd-ng' comments and documentation
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v8 2/7] ima: use IMA default hash algorithm for integrity violations
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v8 0/7] ima: support fs-verity digests and signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Dell XPS 13 9310 2-in-1: tpm tpm0: invalid TPM_STS.x 0xff, dumping stack for forensics
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: [PATCH] integrity: Allow ima_appraise bootparam to be set when SB is enabled
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v8 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v8 4/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v8 6/6] MAINTAINERS: add myself as CAAM trusted key maintainer
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v8 5/6] doc: trusted-encrypted: describe new CAAM trust source
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v8 3/6] crypto: caam - add in-kernel interface for blob generator
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v8 1/6] KEYS: trusted: allow use of TEE as backend without TCG_TPM support
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v8 2/6] KEYS: trusted: allow use of kernel RNG for key material
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [EXT] [PATCH v7 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- RE: [EXT] [PATCH v7 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- Re: [PATCH] Carry forward IMA measurement log on kexec on x86_64
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] Carry forward IMA measurement log on kexec on x86_64
- From: Jonathan McDowell <noodles@xxxxxx>
- [PATCH v2 13/19] xen/tpmfront: use xenbus_setup_ring() and xenbus_teardown_ring()
- From: Juergen Gross <jgross@xxxxxxxx>
- [PATCH v2 00/19] xen: simplify frontend side ring setup
- From: Juergen Gross <jgross@xxxxxxxx>
- Re: [PATCH v7 4/5] ima: support fs-verity file digest based version 3 signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 3/5] ima: permit fsverity's file digests in the IMA measurement list
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 2/5] ima: define a new template field named 'd-ngv2' and templates
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] integrity: Allow ima_appraise bootparam to be set when SB is enabled
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] integrity: Allow ima_appraise bootparam to be set when SB is enabled
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH] integrity: Allow ima_appraise bootparam to be set when SB is enabled
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] Carry forward IMA measurement log on kexec on x86_64
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2] Carry forward IMA measurement log on kexec on x86_64
- From: Jonathan McDowell <noodles@xxxxxx>
- Re: [PATCH] Carry forward IMA measurement log on kexec on x86_64
- From: Jonathan McDowell <noodles@xxxxxx>
- Re: [PATCH] Carry forward IMA measurement log on kexec on x86_64
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] Carry forward IMA measurement log on kexec on x86_64
- From: Jonathan McDowell <noodles@xxxxxx>
- Re: [PATCH] char: tpm: cr50_i2c: Drop if with an always false condition
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH] char: tpm: cr50_i2c: Suppress duplicated error message in .remove()
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH] char: tpm: cr50_i2c: Drop if with an always false condition
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] integrity: Allow ima_appraise bootparam to be set when SB is enabled
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH] char: tpm: cr50_i2c: Drop if with an always false condition
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH] Carry forward IMA measurement log on kexec on x86_64
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add check for Failure mode for TPM2 modules
- From: Marten Lindahl <martenli@xxxxxxxx>
- Re: [PATCH] tpm: Add check for Failure mode for TPM2 modules
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 0/4] Fixes for TPM interrupt handling
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- tpm tpm0: invalid TPM_STS.x 0xff, dumping stack for forensics
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH] tpm: Add check for Failure mode for TPM2 modules
- From: Mårten Lindahl <marten.lindahl@xxxxxxxx>
- Re: [PATCH v3 0/4] Fixes for TPM interrupt handling
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH 1/2] clk-bcm2835: use subsys_initcall for the clock driver when IMA is enabled
- From: Alberto Solavagione <albertosolavagione30@xxxxxxxxx>
- [PATCH v7 RESEND] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- [PATCH] Carry forward IMA measurement log on kexec on x86_64
- From: Jonathan McDowell <noodles@xxxxxx>
- Re: [PATCH v7 3/5] certs: Make blacklist_vet_description() more strict
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] integrity: Fix sparse warnings in keyring_handler
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v7 3/5] certs: Make blacklist_vet_description() more strict
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v2] tpm: cr50: Add new device/vendor ID 0x504a6666
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm: cr50: Add new device/vendor ID 0x504a6666
- From: Jes Klinke <jbk@xxxxxxxxxx>
- Re: [PATCH v7 3/5] certs: Make blacklist_vet_description() more strict
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 3/5] certs: Make blacklist_vet_description() more strict
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [GIT PULL] TPM DEVICE DRIVER updates for tpmdd-next-v5.18-rc4
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 3/5] certs: Make blacklist_vet_description() more strict
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v35 05/29] IMA: avoid label collisions with stacked LSMs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v35 05/29] IMA: avoid label collisions with stacked LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v35 05/29] IMA: avoid label collisions with stacked LSMs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 2/2] tpm_tis_spi_main: Force probe routine to run synchronously with driver and device registration when IMA is enabled
- From: Scovotto Davide <scovottodavide@xxxxxxxxx>
- [PATCH 12/18] xen/tpmfront: use xenbus_setup_ring() and xenbus_teardown_ring()
- From: Juergen Gross <jgross@xxxxxxxx>
- [PATCH 00/18] xen: simplify frontend side ring setup
- From: Juergen Gross <jgross@xxxxxxxx>
- [PATCH v12 01/26] securityfs: rework dentry creation
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 23/26] ima: Show owning user namespace's uid and gid when displaying policy
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 25/26] ima: Restrict informational audit messages to init_ima_ns
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 17/26] integrity/ima: Define ns_status for storing namespaced iint data
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 08/26] ima: Move IMA securityfs files into ima_namespace or onto stack
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 18/26] integrity: Add optional callback function to integrity_inode_free()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 03/26] ima: Define ima_namespace struct and start moving variables into it
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 06/26] ima: Move measurement list related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 10/26] ima: Switch to lazy lsm policy updates for better performance
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 05/26] ima: Move ima_htable into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 14/26] ima: Implement hierarchical processing of file accesses
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 00/26] ima: Namespace IMA with audit support in IMA-ns
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 19/26] ima: Namespace audit status flags
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 02/26] securityfs: Extend securityfs with namespacing support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 21/26] ima: Setup securityfs for IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 16/26] ima: Add functions for creating and freeing of an ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 11/26] ima: Define mac_admin_ns_capable() as a wrapper for ns_capable()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 04/26] ima: Move arch_policy_entry into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 20/26] ima: Remove unused iints from the integrity_iint_cache
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 12/26] ima: Only accept AUDIT rules for non-init_ima_ns namespaces for now
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 26/26] ima: Enable IMA namespaces
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 13/26] userns: Add pointer to ima_namespace to user_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 22/26] ima: Introduce securityfs file to activate an IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 07/26] ima: Move some IMA policy and filesystem related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 24/26] ima: Limit number of policy rules in non-init_ima_ns
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 09/26] ima: Move ima_lsm_policy_notifier into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 15/26] ima: Implement ima_free_policy_rules() for freeing of an ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: cr50: Add new device/vendor ID 0x504a6666
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: [GIT PULL] TPM DEVICE DRIVER updates for tpmdd-next-v5.18-rc4
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v7 3/5] certs: Make blacklist_vet_description() more strict
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v2] tpm: cr50: Add new device/vendor ID 0x504a6666
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 0/4] Fixes for TPM interrupt handling
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 0/4] Fixes for TPM interrupt handling
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [GIT PULL] TPM DEVICE DRIVER updates for tpmdd-next-v5.18-rc4
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: cr50: Add new device/vendor ID 0x504a6666
- From: Jes Klinke <jbk@xxxxxxxxxx>
- [PATCH v2] tpm: cr50: Add new device/vendor ID 0x504a6666
- From: "Jes B. Klinke" <jbk@xxxxxxxxxxxx>
- Re: [PATCH v35 05/29] IMA: avoid label collisions with stacked LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v35 13/29] LSM: Use lsmblob in security_cred_getsecid
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v35 13/29] LSM: Use lsmblob in security_cred_getsecid
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v35 13/29] LSM: Use lsmblob in security_cred_getsecid
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v35 15/29] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 12/29] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 13/29] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v35 11/29] LSM: Use lsmblob in security_current_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v7 3/6] crypto: caam - add in-kernel interface for blob generator
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v7 4/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 3/6] crypto: caam - add in-kernel interface for blob generator
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v34 13/29] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 15/29] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 12/29] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 11/29] LSM: Use lsmblob in security_current_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v7 2/6] KEYS: trusted: allow use of kernel RNG for key material
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v7 6/6] MAINTAINERS: add myself as CAAM trusted key maintainer
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v7 4/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v7 3/6] crypto: caam - add in-kernel interface for blob generator
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v7 1/6] KEYS: trusted: allow use of TEE as backend without TCG_TPM support
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v7 5/6] doc: trusted-encrypted: describe new CAAM trust source
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v7 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [EXT] [PATCH v6 3/4] crypto: caam - add in-kernel interface for blob generator
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [EXT] [PATCH v6 4/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v7] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH v6] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH v6] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 4/7] KEYS: Introduce a builtin root of trust key flag
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] char: tpm: Prepare cleanup of powerpc's asm/prom.h
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH v2] char: tpm: Prepare cleanup of powerpc's asm/prom.h
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH v6] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH v5] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH 4/7] KEYS: Introduce a builtin root of trust key flag
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH 4/7] KEYS: Introduce a builtin root of trust key flag
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: cr50: Add new device/vendor ID 0x504a6666
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 4/7] KEYS: Introduce a builtin root of trust key flag
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH] tpm: cr50: Add new device/vendor ID 0x504a6666
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: [PATCH v5] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/5] tpm: add functions to set and unset the tpm chips reset state
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: cr50: Add new device/vendor ID 0x504a6666
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: cr50: Add new device/vendor ID 0x504a6666
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] ima: simplify if-if to if-else
- From: Yihao Han <hanyihao@xxxxxxxx>
- [PATCH v5] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH v4 RESEND] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH v4 RESEND] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4 RESEND] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- [PATCH v4] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH v3 RESEND] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH v3 RESEND] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH v3 RESEND] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 RESEND] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH v3 RESEND] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 4/7] KEYS: Introduce a builtin root of trust key flag
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/4] tpm: Add tpm_tis_i2c backend for tpm_tis_core
- From: Johannes Holland <johannes.holland@xxxxxxxxxxxx>
- Re: [PATCH 1/5] tpm: add functions to set and unset the tpm chips reset state
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH 4/4] tpm: Add YAML schema for the TPM TIS I2C options
- From: Johannes Holland <johannes.holland@xxxxxxxxxxxx>
- Re: [PATCH 4/4] tpm: Add YAML schema for the TPM TIS I2C options
- From: Johannes Holland <johannes.holland@xxxxxxxxxxxx>
- Re: [PATCH 5/5] tpm: tpm_tis_spi_slb_9670: implement set_reset and unset_reset functions
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH 5/5] tpm: tpm_tis_spi_slb_9670: implement set_reset and unset_reset functions
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH 1/5] tpm: add functions to set and unset the tpm chips reset state
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH v3 RESEND] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
- From: Aditya Garg <gargaditya08@xxxxxxxx>
- Re: [PATCH 1/5] tpm: add functions to set and unset the tpm chips reset state
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH 4/7] KEYS: Introduce a builtin root of trust key flag
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH 4/7] KEYS: Introduce a builtin root of trust key flag
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 4/7] KEYS: Introduce a builtin root of trust key flag
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH 4/7] KEYS: Introduce a builtin root of trust key flag
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/7] KEYS: X.509: Parse Basic Constraints for CA
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH 4/7] KEYS: Introduce a builtin root of trust key flag
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH 0/7] Add CA enforcement keyring restrictions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 4/7] KEYS: Introduce a builtin root of trust key flag
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/7] KEYS: X.509: Parse Key Usage
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/7] KEYS: X.509: Parse Basic Constraints for CA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v34 13/29] LSM: Use lsmblob in security_cred_getsecid
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v34 11/29] LSM: Use lsmblob in security_current_getsecid
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v34 11/29] LSM: Use lsmblob in security_current_getsecid
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v3 0/1] ima: fix boot command line issue
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- [PATCH v34 15/29] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 13/29] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 12/29] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 11/29] LSM: Use lsmblob in security_current_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/1] ima: remove the IMA_TEMPLATE Kconfig option
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/5] tpm: add functions to set and unset the tpm chips reset state
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v3 0/1] ima: fix boot command line issue
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 0/5] Support TPM Reset GPIO
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH 3/5] tpm: tpm_tis: get optionally defined reset gpio
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH 4/5] tpm: tpm_tis: make functions available for external linkage
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH 5/5] tpm: tpm_tis_spi_slb_9670: implement set_reset and unset_reset functions
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH 2/5] dt-bindings: tpm: document reset gpio property
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH 1/5] tpm: add functions to set and unset the tpm chips reset state
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH] tpm: cr50: Add new device/vendor ID 0x504a6666
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: cr50: Add new device/vendor ID 0x504a6666
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/4] tpm: Add tpm_tis_i2c backend for tpm_tis_core
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] ima: remove the IMA_TEMPLATE Kconfig option
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- [PATCH v3 0/1] ima: fix boot command line issue
- From: GUO Zihua <guozihua@xxxxxxxxxx>
- [PATCH v3 1/1] ima: remove the IMA_TEMPLATE Kconfig option
- From: GUO Zihua <guozihua@xxxxxxxxxx>
- Re: [PATCH 6/7] KEYS: X.509: Flag Intermediate CA certs as built in
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 0/7] Add CA enforcement keyring restrictions
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH 0/7] Add CA enforcement keyring restrictions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 5/7] KEYS: Introduce sig restriction that validates root of trust
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] ima: remove template "ima" as the compiled default
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- [PATCH 4/7] KEYS: Introduce a builtin root of trust key flag
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v2] ima: remove the IMA_TEMPLATE Kconfig option
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 3/7] KEYS: X.509: Parse Key Usage
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH 2/7] KEYS: X.509: Parse Basic Constraints for CA
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH 1/7] KEYS: Create static version of public_key_verify_signature
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH 5/7] KEYS: Introduce sig restriction that validates root of trust
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH 0/7] Add CA enforcement keyring restrictions
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- RE: [POC][USER SPACE][PATCH] Introduce LSM to protect pinned objects
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 0/1] ima: fix boot command line issue
- From: GUO Zihua <guozihua@xxxxxxxxxx>
- [PATCH v2 1/1] ima: remove the IMA_TEMPLATE Kconfig option
- From: GUO Zihua <guozihua@xxxxxxxxxx>
- [PATCH 6/7] KEYS: X.509: Flag Intermediate CA certs as built in
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v2] ima: remove the IMA_TEMPLATE Kconfig option
- From: GUO Zihua <guozihua@xxxxxxxxxx>
- [PATCH v2] ima: remove the IMA_TEMPLATE Kconfig option
- From: GUO Zihua <guozihua@xxxxxxxxxx>
- [PATCH 7/7] integrity: Use root of trust signature restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- RE: [PATCH 00/18] bpf: Secure and authenticated preloading of eBPF programs
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v7 3/5] ima: permit fsverity's file digests in the IMA measurement list
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 00/18] bpf: Secure and authenticated preloading of eBPF programs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v7 2/5] ima: define a new template field named 'd-ngv2' and templates
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v7 5/5] fsverity: update the documentation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 00/18] bpf: Secure and authenticated preloading of eBPF programs
- From: KP Singh <kpsingh@xxxxxxxxxx>
- Re: [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [POC][USER SPACE][PATCH] Introduce LSM to protect pinned objects
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 00/18] bpf: Secure and authenticated preloading of eBPF programs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v7 4/5] ima: support fs-verity file digest based version 3 signatures
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] tpm: cr50: Add new device/vendor ID 0x504a6666
- From: "Jes B. Klinke" <jbk@xxxxxxxxxxxx>
- [POC][USER SPACE][PATCH] Introduce LSM to protect pinned objects
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH] ima: remove redundant initialization of pointer 'file'.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 5.15 235/913] KEYS: trusted: Avoid calling null function trusted_key_exit
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.16 0248/1017] KEYS: trusted: Avoid calling null function trusted_key_exit
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.17 0255/1126] KEYS: trusted: Avoid calling null function trusted_key_exit
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] drivers/char/tpm: Google TPM, additional DID:VID
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: PATCH: Google security chip, additional DID:VID
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 00/18] bpf: Secure and authenticated preloading of eBPF programs
- From: KP Singh <kpsingh@xxxxxxxxxx>
- Re: PATCH: Google security chip, additional DID:VID
- From: Jes Klinke <jbk@xxxxxxxxxx>
- [PATCH] drivers/char/tpm: Google TPM, additional DID:VID
- From: Jes Klinke <jbk@xxxxxxxxxx>
- Re: [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: PATCH: Google security chip, additional DID:VID
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- PATCH: Google security chip, additional DID:VID
- From: Jes Klinke <jbk@xxxxxxxxxx>
- Re: [PATCH 00/18] bpf: Secure and authenticated preloading of eBPF programs
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/4] tpm: Add YAML schema for the TPM TIS I2C options
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 4/4] tpm: Add YAML schema for the TPM TIS I2C options
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] ima: remove template "ima" as the compiled default
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- RE: [PATCH 00/18] bpf: Secure and authenticated preloading of eBPF programs
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- RE: [PATCH 00/18] bpf: Secure and authenticated preloading of eBPF programs
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH 3/4] tpm: Implement command and response retry in tpm_tis_core
- From: Johannes Holland <johannes.holland@xxxxxxxxxxxx>
- [PATCH 4/4] tpm: Add YAML schema for the TPM TIS I2C options
- From: Johannes Holland <johannes.holland@xxxxxxxxxxxx>
- [PATCH 2/4] tpm: Add tpm_tis_verify_crc to the tpm_tis_phy_ops protocol layer
- From: Johannes Holland <johannes.holland@xxxxxxxxxxxx>
- [PATCH 1/4] tpm: Add tpm_tis_i2c backend for tpm_tis_core
- From: Johannes Holland <johannes.holland@xxxxxxxxxxxx>
- Re: [PATCH 00/18] bpf: Secure and authenticated preloading of eBPF programs
- From: Djalal Harouni <tixxdz@xxxxxxxxx>
- Re: [PATCH 05/18] bpf-preload: Generate static variables
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH] char: tpm: Prepare cleanup of powerpc's asm/prom.h
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] char: tpm: Prepare cleanup of powerpc's asm/prom.h
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH 00/18] bpf: Secure and authenticated preloading of eBPF programs
- From: KP Singh <kpsingh@xxxxxxxxxx>
- Re: [PATCH 00/18] bpf: Secure and authenticated preloading of eBPF programs
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: Progress about SM2-with-SM3 signature support for PKCS #7.
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Progress about SM2-with-SM3 signature support for PKCS #7.
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- [PATCH 2/5] integrity: Remove redundant assignments
- From: Michal Orzel <michalorzel.eng@xxxxxxxxx>
- Re: [PATCH] char: tpm: cr50_i2c: Drop if with an always false condition
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- RE: [PATCH 00/18] bpf: Secure and authenticated preloading of eBPF programs
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH 00/18] bpf: Secure and authenticated preloading of eBPF programs
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3 0/4] Fixes for TPM interrupt handling
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 0/4] Fixes for TPM interrupt handling
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- RE: [PATCH 05/18] bpf-preload: Generate static variables
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v8 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
- From: David Howells <dhowells@xxxxxxxxxx>
- RE: [PATCH 05/18] bpf-preload: Generate static variables
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- RE: [PATCH 00/18] bpf: Secure and authenticated preloading of eBPF programs
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH 05/18] bpf-preload: Generate static variables
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH 00/18] bpf: Secure and authenticated preloading of eBPF programs
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH 16/18] bpf-preload: Do kernel mount to ensure that pinned objects don't disappear
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 14/18] bpf-preload: Switch to new preload registration method
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 14/18] bpf-preload: Switch to new preload registration method
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 16/18] bpf-preload: Do kernel mount to ensure that pinned objects don't disappear
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH 17/18] bpf-preload/selftests: Add test for automatic generation of preload methods
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 18/18] bpf-preload/selftests: Preload a test eBPF program and check pinned objects
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 16/18] bpf-preload: Do kernel mount to ensure that pinned objects don't disappear
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 15/18] bpf-preload: Generate code of kernel module to preload
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 13/18] bpf-preload: Move pinned links and maps to a dedicated directory in bpffs
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 10/18] bpf-preload: Generate bpf_preload_ops
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 12/18] bpf-preload: Implement new registration method for preloading eBPF programs
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 11/18] bpf-preload: Store multiple bpf_preload_ops structures in a linked list
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 14/18] bpf-preload: Switch to new preload registration method
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 07/18] bpf-preload: Generate preload()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 08/18] bpf-preload: Generate load_skel()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 09/18] bpf-preload: Generate code to pin non-internal maps
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 06/18] bpf-preload: Generate free_objs_and_skel()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 05/18] bpf-preload: Generate static variables
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 02/18] bpf-preload: Move bpf_preload.h to include/linux
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 01/18] bpf: Export bpf_link_inc()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 00/18] bpf: Secure and authenticated preloading of eBPF programs
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 03/18] bpf-preload: Generalize object pinning from the kernel
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 04/18] bpf-preload: Export and call bpf_obj_do_pin_kernel()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v7 1/5] fs-verity: define a function to return the integrity protected file digest
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 2/5] ima: define a new template field named 'd-ngv2' and templates
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: [EXT] [PATCH v6 4/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- RE: [EXT] [PATCH v6 3/4] crypto: caam - add in-kernel interface for blob generator
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- Re: [PATCH v7 2/5] ima: define a new template field named 'd-ngv2' and templates
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [PATCH v7 1/5] fs-verity: define a function to return the integrity protected file digest
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [PATCH v3 0/4] Fixes for TPM interrupt handling
- From: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
- Re: [PATCH v3 0/4] Fixes for TPM interrupt handling
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v7 3/5] ima: permit fsverity's file digests in the IMA measurement list
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v7 2/5] ima: define a new template field named 'd-ngv2' and templates
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v7 5/5] fsverity: update the documentation
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v7 1/5] fs-verity: define a function to return the integrity protected file digest
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v7 4/5] ima: support fs-verity file digest based version 3 signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v7 0/5] ima: support fs-verity digests and signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 5.16 14/37] tpm: Fix error handling in async work
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.15 03/37] tpm: Fix error handling in async work
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.17 01/39] tpm: Fix error handling in async work
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.10 07/38] tpm: Fix error handling in async work
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.4 06/29] tpm: Fix error handling in async work
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 4/5] ima: support fs-verity file digest based version 3 signatures
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2] tpm: Fix regression in tpm_tis_synquacer.c
- From: Johannes Holland <johannes.holland@xxxxxxxxxxxx>
- Re: [PATCH v3 0/4] Fixes for TPM interrupt handling
- From: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
- Re: [PATCH v6 4/5] ima: support fs-verity file digest based version 3 signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/4] Fixes for TPM interrupt handling
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 0/4] Fixes for TPM interrupt handling
- From: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] travis: include CentOS stream 8
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] travis: include CentOS stream 8
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [LTP] [PATCH v4] syscalls/keyctl09: test encrypted keys with provided decrypted data.
- From: Cyril Hrubis <chrubis@xxxxxxx>
- Re: [EXT] [PATCH v6 3/4] crypto: caam - add in-kernel interface for blob generator
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- RE: [EXT] [PATCH v6 3/4] crypto: caam - add in-kernel interface for blob generator
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- Re: [PATCH] ima: remove template "ima" as the compiled default
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- [PATCH ima-evm-utils] travis: include CentOS stream 8
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [LTP] [PATCH v4] syscalls/keyctl09: test encrypted keys with provided decrypted data.
- From: Petr Vorel <pvorel@xxxxxxx>
- [no subject]
- [PATCH v2 1/1] ci/GitHub: Remove CentOS 8
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 1/1] ci: Remove CentOS 8
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 1/1] ci: Remove CentOS 8
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 1/1] ci: Remove CentOS 8
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v1] tpm: Fix regression in tpm_tis_synquacer.c
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/1] ci: Remove CentOS 8
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 1/1] ci: Remove CentOS 8
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v1] tpm: Fix regression in tpm_tis_synquacer.c
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- [PATCH v1] tpm: Fix regression in tpm_tis_synquacer.c
- From: Johannes Holland <johannes.holland@xxxxxxxxxxxx>
- Re: [EXT] [PATCH v6 3/4] crypto: caam - add in-kernel interface for blob generator
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v6 4/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [EXT] [PATCH v6 3/4] crypto: caam - add in-kernel interface for blob generator
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v6 4/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- RE: [EXT] [PATCH v6 3/4] crypto: caam - add in-kernel interface for blob generator
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- Re: [GIT PULL] integrity: subsystem fixes for v5.18
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v4] tpm: Remove read16/read32/write32 calls from tpm_tis_phy_ops
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v6 2/5] ima: define a new template field named 'd-ngv2' and templates
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v6 3/5] ima: permit fsverity's file digests in the IMA measurement list
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 2/5] ima: define a new template field named 'd-ngv2' and templates
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Re: [GIT PULL] TPM DEVICE DRIVER updates for v5.18
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] integrity: subsystem fixes for v5.18
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v6 4/5] ima: support fs-verity file digest based version 3 signatures
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v6 3/5] ima: permit fsverity's file digests in the IMA measurement list
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v6 5/5] fsverity: update the documentation
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 2/5] ima: define a new template field named 'd-ngv2' and templates
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v4] tpm: Remove read16/read32/write32 calls from tpm_tis_phy_ops
- From: Johannes Holland <johannes.holland@xxxxxxxxxxxx>
- [PATCH] ima: remove template "ima" as the compiled default
- From: GUO Zihua <guozihua@xxxxxxxxxx>
- Re: [PATCH v11 0/4] integrity: support including firmware ".platform" keys at build time
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] tpm: Remove read16/read32/write32 calls from tpm_tis_phy_ops
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH -next] tpm: ibmvtpm: Correct the return value in tpm_ibmvtpm_probe()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH -next] tpm: ibmvtpm: Correct the return value in tpm_ibmvtpm_probe()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm/tpm_ftpm_tee: Return true/false (not 1/0) from bool functions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v12 1/4] certs: export load_certificate_list() to be used outside certs/
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 4/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [ANNOUNCE][CFP] Linux Security Summit North America 2022
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v11 0/4] integrity: support including firmware ".platform" keys at build time
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 5/5] fsverity: update the documentation
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v6 5/5] fsverity: update the documentation
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v6 4/5] ima: support fs-verity file digest based version 3 signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v6 3/5] ima: permit fsverity's file digests in the IMA measurement list
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v6 1/5] fs-verity: define a function to return the integrity protected file digest
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v6 2/5] ima: define a new template field named 'd-ngv2' and templates
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v6 0/5] ima: support fs-verity digests and signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3] tpm: Remove read16/read32/write32 calls from tpm_tis_phy_ops
- From: Johannes Holland <johannes.holland@xxxxxxxxxxxx>
- Re: [PATCH -next] tpm: ibmvtpm: Correct the return value in tpm_ibmvtpm_probe()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH -next] tpm: ibmvtpm: Correct the return value in tpm_ibmvtpm_probe()
- From: Xiu Jianfeng <xiujianfeng@xxxxxxxxxx>
- [PATCH] tpm/tpm_ftpm_tee: Return true/false (not 1/0) from bool functions
- From: Haowen Bai <baihaowen@xxxxxxxxx>
- Re: [LTP] [PATCH v4] syscalls/keyctl09: test encrypted keys with provided decrypted data.
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v5 5/8] ima: permit fsverity's file digests in the IMA measurement list
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 7/8] ima: support fs-verity file digest based version 3 signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Make implementation of read16/read32/write32 optional
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 0/4] integrity: support including firmware ".platform" keys at build time
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: Fix memory leak in tpmm_chip_alloc
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: Fix memory leak in tpmm_chip_alloc
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH -next] char: tpm: cr50: Fix tpm_cr50_i2c_probe() kernel-doc comment
- From: Yang Li <yang.lee@xxxxxxxxxxxxxxxxx>
- Re: [LTP] [PATCH v4] syscalls/keyctl09: test encrypted keys with provided decrypted data.
- From: Yael Tzur <yaelt@xxxxxxxxxx>
- Re: [PATCH v5 4/5] crypto: caam - add in-kernel interface for blob generator
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v6 2/4] KEYS: trusted: allow use of kernel RNG for key material
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v6 3/4] crypto: caam - add in-kernel interface for blob generator
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v6 4/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v6 1/4] KEYS: trusted: allow use of TEE as backend without TCG_TPM support
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v6 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v2] tpm: Make implementation of read16/read32/write32 optional
- From: Johannes Holland <johannes.holland@xxxxxxxxxxxx>
- Re: [PATCH] tpm: Fix memory leak in tpmm_chip_alloc
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [PATCH] tpm: Fix memory leak in tpmm_chip_alloc
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [PATCH] tpm: Fix memory leak in tpmm_chip_alloc
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [EXT] Re: [PATCH v5 4/5] crypto: caam - add in-kernel interface for blob generator
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v12 3/4] Revert "certs: move scripts/extract-cert to certs/"
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v11 0/4] integrity: support including firmware ".platform" keys at build time
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Fix memory leak in tpmm_chip_alloc
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- [GIT PULL] TPM DEVICE DRIVER updates for v5.18
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxx>
- Re: [GIT PULL] TPM DEVICE DRIVER updates for v5.18
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [GIT PULL] TPM DEVICE DRIVER updates for v5.18
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v33 13/29] LSM: Use lsmblob in security_cred_getsecid
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v12 0/4] integrity: support including firmware ".platform" keys at build time
- From: Nageswara Sastry <rnsastry@xxxxxxxxxxxxx>
- [PATCH v12 0/4] integrity: support including firmware ".platform" keys at build time
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v12 4/4] integrity: support including firmware ".platform" keys at build time
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v12 2/4] integrity: make integrity_keyring_from_id() non-static
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v12 1/4] certs: export load_certificate_list() to be used outside certs/
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v12 3/4] Revert "certs: move scripts/extract-cert to certs/"
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [PATCH v11 0/4] integrity: support including firmware ".platform" keys at build time
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 0/4] integrity: support including firmware ".platform" keys at build time
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 0/4] integrity: support including firmware ".platform" keys at build time
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH] tpm: Fix memory leak in tpmm_chip_alloc
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/2] xen/grant-table: remove readonly parameter from functions
- From: Jan Beulich <jbeulich@xxxxxxxx>
- [PATCH 2/2] xen/grant-table: remove readonly parameter from functions
- From: Juergen Gross <jgross@xxxxxxxx>
- [PATCH 0/2] xen/grant-table: do some cleanup
- From: Juergen Gross <jgross@xxxxxxxx>
- Re: [PATCH v33 13/29] LSM: Use lsmblob in security_cred_getsecid
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v33 13/29] LSM: Use lsmblob in security_cred_getsecid
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v11 3/4] certs: conditionally build extract-cert if platform keyring is enabled
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v11 0/4] integrity: support including firmware ".platform" keys at build time
- From: Nageswara Sastry <rnsastry@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] bpf-lsm: Extend interoperability with IMA
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- [PATCH v33 15/29] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 13/29] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 12/29] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 11/29] LSM: Use lsmblob in security_current_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 2/4] integrity: make integrity_keyring_from_id() non-static
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v11 1/4] certs: export load_certificate_list() to be used outside certs/
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v11 4/4] integrity: support including firmware ".platform" keys at build time
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v11 0/4] integrity: support including firmware ".platform" keys at build time
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v11 3/4] certs: conditionally build extract-cert if platform keyring is enabled
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [GIT PULL] TPM DEVICE DRIVER updates for v5.18
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] tpm: Fix memory leak in tpmm_chip_alloc
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [GIT PULL] TPM DEVICE DRIVER updates for v5.18
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [LSF/MM/BPF TOPIC] DIGLIM eBPF
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v8 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] TPM DEVICE DRIVER updates for v5.18
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] TPM DEVICE DRIVER updates for v5.18
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v8 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v8 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [GIT PULL] TPM DEVICE DRIVER updates for v5.18
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v8 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v10 3/3] integrity: support including firmware ".platform" keys at build time
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: use try_get_ops() in tpm-space.c
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v10 3/3] integrity: support including firmware ".platform" keys at build time
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] tpm: use try_get_ops() in tpm-space.c
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] bpf-lsm: Extend interoperability with IMA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Rework open/close/shutdown to avoid races
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm: Rework open/close/shutdown to avoid races
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm: Rework open/close/shutdown to avoid races
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] tpm: use try_get_ops() in tpm-space.c
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Rework open/close/shutdown to avoid races
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: Fix memory leak in tpmm_chip_alloc
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 0/9] bpf-lsm: Extend interoperability with IMA
- From: KP Singh <kpsingh@xxxxxxxxxx>
- Re: [PATCH v10 3/3] integrity: support including firmware ".platform" keys at build time
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v10 3/3] integrity: support including firmware ".platform" keys at build time
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] tpm: Fix memory leak in tpmm_chip_alloc
- From: GUO Zihua <guozihua@xxxxxxxxxx>
- RE: [PATCH v3 0/9] bpf-lsm: Extend interoperability with IMA
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- RE: [EXT] [PATCH v5 5/5] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Pankaj Gupta <pankaj.gupta@xxxxxxx>
- Re: [PATCH v3 0/9] bpf-lsm: Extend interoperability with IMA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v10 3/3] integrity: support including firmware ".platform" keys at build time
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v10 2/3] integrity: make integrity_keyring_from_id() non-static
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v10 1/3] certs: export load_certificate_list() to be used outside certs/
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v10 0/3] integrity: support including firmware ".platform" keys at build time
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/9] ima: Always return a file measurement in ima_file_hash()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/9] ima: Fix documentation-related warnings in ima_main.c
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] bpf-lsm: Extend interoperability with IMA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 0/3] integrity: support including firmware ".platform" keys at build time
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 0/3] integrity: support including firmware ".platform" keys at build time
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] KEYS: asymmetric: enforce that sig algo matches key algo
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 0/3] integrity: support including firmware ".platform" keys at build time
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 0/3] integrity: support including firmware ".platform" keys at build time
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 1/1] tpm: fix reference counting for struct tpm_chip
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 1/1] tpm: fix reference counting for struct tpm_chip
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 0/3] integrity: support including firmware ".platform" keys at build time
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/2] KEYS: asymmetric: enforce that sig algo matches key algo
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v9 1/1] tpm: fix reference counting for struct tpm_chip
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v9 3/3] integrity: support including firmware ".platform" keys at build time
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v9 1/3] certs: export load_certificate_list() to be used outside certs/
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v9 2/3] integrity: make integrity_keyring_from_id() non-static
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v9 0/3] integrity: support including firmware ".platform" keys at build time
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [PATCH v9 1/1] tpm: fix reference counting for struct tpm_chip
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v9 1/1] tpm: fix reference counting for struct tpm_chip
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 1/1] tpm: fix reference counting for struct tpm_chip
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 0/9] bpf-lsm: Extend interoperability with IMA
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH v3 0/9] bpf-lsm: Extend interoperability with IMA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] bpf-lsm: Extend interoperability with IMA
- From: KP Singh <kpsingh@xxxxxxxxxx>
- Re: [PATCH v3 0/9] bpf-lsm: Extend interoperability with IMA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] bpf-lsm: Extend interoperability with IMA
- From: KP Singh <kpsingh@xxxxxxxxxx>
- Re: [PATCH v3 0/9] bpf-lsm: Extend interoperability with IMA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [LTP] [PATCH v4] syscalls/keyctl09: test encrypted keys with provided decrypted data.
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [LTP] [PATCH v4] syscalls/keyctl09: test encrypted keys with provided decrypted data.
- From: Cyril Hrubis <chrubis@xxxxxxx>
- Re: [LTP] [PATCH v4] syscalls/keyctl09: test encrypted keys with provided decrypted data.
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [LTP] [PATCH v4] syscalls/keyctl09: test encrypted keys with provided decrypted data.
- From: Cyril Hrubis <chrubis@xxxxxxx>
- RE: [PATCH v3 0/9] bpf-lsm: Extend interoperability with IMA
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [LTP] [PATCH v4] syscalls/keyctl09: test encrypted keys with provided decrypted data.
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 2/2] tpm: Fix crash on tmprm release
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v11 26/27] ima: Restrict informational audit messages to init_ima_ns
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v3 0/9] bpf-lsm: Extend interoperability with IMA
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [LTP] [PATCH v4] syscalls/keyctl09: test encrypted keys with provided decrypted data.
- From: Yael Tzur <yaelt@xxxxxxxxxx>
- [LitExtension] Thank You For Registering For The "Change To Grow" Program
- From: LitExtension Contact Form <noreply@xxxxxxxxxxxxxxxx>
- Re: [PATCH v11 23/27] ima: Introduce securityfs file to activate an IMA namespace
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [LTP] [PATCH v4] syscalls/keyctl09: test encrypted keys with provided decrypted data.
- From: Cyril Hrubis <chrubis@xxxxxxx>
- [PATCH v11 22/27] ima: Setup securityfs for IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v11 14/27] userns: Add pointer to ima_namespace to user_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]