Linux Integrity
[Prev Page][Next Page]
- Re: [PATCH] spi: bcm2835: do not unregister controller in shutdown handler
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH] spi: bcm2835: do not unregister controller in shutdown handler
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH v3] integrity: support including firmware ".platform" keys at build time
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [PATCH] spi: bcm2835: do not unregister controller in shutdown handler
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH] spi: bcm2835: do not unregister controller in shutdown handler
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] spi: bcm2835: do not unregister controller in shutdown handler
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH] spi: bcm2835: do not unregister controller in shutdown handler
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH v3] KEYS: trusted: Fix trusted key backends when building as module
- From: Andreas Rammhold <andreas@xxxxxxxxxxx>
- Re: [PATCH] spi: bcm2835: do not unregister controller in shutdown handler
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH] ima: fix deadlock when traversing "ima_default_rules".
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6] tpm: Add Upgrade/Reduced mode support for TPM2 modules
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v6] tpm: Add Upgrade/Reduced mode support for TPM2 modules
- From: Borys Movchan <borysmn@xxxxxxxx>
- Re: [PATCH v6] tpm: Add Upgrade/Reduced mode support for TPM2 modules
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v6] tpm: Add Upgrade/Reduced mode support for TPM2 modules
- From: Borys Movchan <borysmn@xxxxxxxx>
- DIGLIM demo
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 7/7] ima: Add support for appraisal with digest lists
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 6/7] ima: Skip measurement of files found in DIGLIM hash table
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 5/7] ima: Query metadata digest and retrieve info from its digest lists
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 4/7] ima: Query file digest and retrieve info from its digest lists
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 3/7] ima: Introduce diglim and appraise_diglim policies
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 0/7] ima: Measure and appraise files with DIGLIM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 2/7] ima: Introduce new policy keyword use_diglim
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 1/7] integrity: Change type of IMA rule-related flags to u64
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: Re: [PATCH] tpm: fix potential NULL pointer access in tpm_del_char_device()
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Aw: Re: [PATCH] spi: bcm2835: do not unregister controller in shutdown handler
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH] spi: bcm2835: do not unregister controller in shutdown handler
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH] spi: bcm2835: do not unregister controller in shutdown handler
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH v2] tpm_tis_spi: Add missing SPI ID
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] KEYS: trusted: Fix trusted key backends when building as module
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3] KEYS: trusted: Fix trusted key backends when building as module
- From: Andreas Rammhold <andreas@xxxxxxxxxxx>
- Re: [PATCH v3] KEYS: trusted: Fix trusted key backends when building as module
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3] KEYS: trusted: Fix trusted key backends when building as module
- From: Andreas Rammhold <andreas@xxxxxxxxxxx>
- Re: [PATCH v3] KEYS: trusted: Fix trusted key backends when building as module
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3] KEYS: trusted: Fix trusted key backends when building as module
- From: Andreas Rammhold <andreas@xxxxxxxxxxx>
- [PATCH v29 15/28] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v29 13/28] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v29 12/28] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v29 11/28] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v29 10/28] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v29 05/28] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2] tpm_tis_spi: Add missing SPI ID
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH] tpm: fix potential NULL pointer access in tpm_del_char_device()
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] tpm: fix potential NULL pointer access in tpm_del_char_device()
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH] tpm: fix potential NULL pointer access in tpm_del_char_device()
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] tpm: fix potential NULL pointer access in tpm_del_char_device()
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [bug report] tpm/tpm_i2c_stm_st33: Split tpm_i2c_tpm_st33 in 2 layers (core + phy)
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH] tpm_tis_spi: Add missing SPI ID
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH] tpm_tis_spi: Add missing SPI ID
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] tpm_tis_spi: Add missing SPI ID
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v6 3/3] IMA: Add tests for uid, gid, fowner, and fgroup options
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH ltp v7 1/3] IMA: Move check_policy_writable() to ima_setup.sh and rename it
- From: Alex Henrie <alexh@xxxxxxxxxxx>
- [PATCH ltp v7 3/3] IMA: Add tests for uid, gid, fowner, and fgroup options
- From: Alex Henrie <alexh@xxxxxxxxxxx>
- [PATCH ltp v7 2/3] IMA: Move ima_check to ima_setup.sh
- From: Alex Henrie <alexh@xxxxxxxxxxx>
- Re: [PATCH v6 3/3] IMA: Add tests for uid, gid, fowner, and fgroup options
- From: Alex Henrie <alexh@xxxxxxxxxxx>
- Re: [PATCH v4 02/14] x86/boot: Add setup_indirect support in early_memremap_is_setup_data
- From: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
- Re: [PATCH v4 01/14] x86/boot: Fix memremap of setup_indirect structures
- From: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
- [PATCH v6 3/3] IMA: Add tests for uid, gid, fowner, and fgroup options
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v6 2/3] IMA: Move ima_check to ima_setup.sh
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v6 1/3] IMA: Move check_policy_writable() to ima_setup.sh and rename it
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v6 0/3] IMA: Add tests for uid, gid, fowner, and fgroup options
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH ltp v5 2/3] IMA: Move ima_check to ima_setup.sh
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH ltp v5 2/3] IMA: Move ima_check to ima_setup.sh
- From: Alex Henrie <alexh@xxxxxxxxxxx>
- [PATCH ltp v5 1/3] IMA: Move check_policy_writable to ima_setup.sh and rename it
- From: Alex Henrie <alexh@xxxxxxxxxxx>
- [PATCH ltp v5 3/3] IMA: Add tests for uid, gid, fowner, and fgroup options
- From: Alex Henrie <alexh@xxxxxxxxxxx>
- Re: [PATCH v6 00/13] Enroll kernel keys thru MOK
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm/eventlog: Don't abort tpm_read_log on faulty ACPI config
- From: Morten Linderud <morten@xxxxxxxxxxx>
- Re: [PATCH] tpm/eventlog: Don't abort tpm_read_log on faulty ACPI config
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH ltp v4 3/3] IMA: Add tests for uid, gid, fowner, and fgroup options
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH ltp v4 3/3] IMA: Add tests for uid, gid, fowner, and fgroup options
- From: Alex Henrie <alexh@xxxxxxxxxxx>
- [PATCH ltp v4 2/3] IMA: Move ima_check to ima_setup.sh
- From: Alex Henrie <alexh@xxxxxxxxxxx>
- [PATCH ltp v4 1/3] IMA: Move check_policy_writable to ima_setup.sh and rename it
- From: Alex Henrie <alexh@xxxxxxxxxxx>
- [PATCH] tpm/eventlog: Don't abort tpm_read_log on faulty ACPI config
- From: Morten Linderud <morten@xxxxxxxxxxx>
- Re: [PATCH v2] integrity: support including firmware ".platform" keys at build time
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH] ima: fix deadlock when traversing "ima_default_rules".
- From: liqiong <liqiong@xxxxxxxxxxxx>
- Re: [zohar-integrity:next-integrity-testing 1/1] security/integrity/ima/ima_policy.c:684:25: sparse: sparse: incompatible types in comparison expression (different address spaces):
- From: liqiong <liqiong@xxxxxxxxxxxx>
- Re: [PATCH v6 00/13] Enroll kernel keys thru MOK
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 12/13] integrity: Trust MOK keys if MokListTrustedRT found
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v6 12/13] integrity: Trust MOK keys if MokListTrustedRT found
- From: Peter Jones <pjones@xxxxxxxxxx>
- Re: [zohar-integrity:next-integrity-testing 1/1] security/integrity/ima/ima_policy.c:684:25: sparse: sparse: incompatible types in comparison expression (different address spaces):
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ltp v3 2/2] IMA: Add tests for uid, gid, fowner, and fgroup options
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH ltp v3 1/2] IMA: Move check_policy_writable to ima_setup.sh and rename it
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH ltp v3 2/2] IMA: Add tests for uid, gid, fowner, and fgroup options
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v6 12/13] integrity: Trust MOK keys if MokListTrustedRT found
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v6 00/13] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v6 00/13] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v6 12/13] integrity: Trust MOK keys if MokListTrustedRT found
- From: Peter Jones <pjones@xxxxxxxxxx>
- Re: [PATCH v6 00/13] Enroll kernel keys thru MOK
- From: Peter Jones <pjones@xxxxxxxxxx>
- Re: [PATCH v7 ima-evm-utils 1/2] set default hash algorithm in configuration time
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH v6 03/13] KEYS: CA link restriction
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 00/13] Enroll kernel keys thru MOK
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 00/13] Enroll kernel keys thru MOK
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] integrity: support including firmware ".platform" keys at build time
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v15 6/6] tpm: Add YAML schema for TPM TIS I2C options
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH v2] integrity: support including firmware ".platform" keys at build time
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [zohar-integrity:next-integrity-testing 1/1] security/integrity/ima/ima_policy.c:684:25: sparse: sparse: incompatible types in comparison expression (different address spaces):
- From: liqiong <liqiong@xxxxxxxxxxxx>
- Re: [PATCH v6 03/13] KEYS: CA link restriction
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v6 03/13] KEYS: CA link restriction
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v6 05/13] integrity: add new keyring handler for mok keys
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v6 00/13] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v6 00/13] Enroll kernel keys thru MOK
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [RFC][PATCH 3/9] diglim: LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 4/9] diglim: Tests - LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 1/9] ima: Introduce new hook DIGEST_LIST_CHECK
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 9/9] diglim: Admin guide
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 8/9] diglim: RPM parser
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 7/9] diglim: Digest list uploader
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 6/9] diglim: RPM digest list generator
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 5/9] diglim: Compact digest list generator
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 2/9] diglim: Loader
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 0/9] integrity: Introduce DIGLIM advanced features
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- RE: [PATCH v3 01/13] diglim: Overview
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [zohar-integrity:next-integrity-testing 1/1] security/integrity/ima/ima_policy.c:684:25: sparse: sparse: incompatible types in comparison expression (different address spaces):
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v6 09/13] KEYS: integrity: change link restriction to trust the machine keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v6 11/13] integrity: store reference to machine keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v6 10/13] KEYS: link secondary_trusted_keys to machine trusted keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v6 06/13] KEYS: Rename get_builtin_and_secondary_restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v6 13/13] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v6 04/13] integrity: restrict INTEGRITY_KEYRING_MACHINE to restrict_link_by_ca
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v6 12/13] integrity: Trust MOK keys if MokListTrustedRT found
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v6 08/13] KEYS: Introduce link restriction for machine keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v6 05/13] integrity: add new keyring handler for mok keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v6 02/13] integrity: Do not allow machine keyring updates following init
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v6 03/13] KEYS: CA link restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v6 07/13] KEYS: add a reference to machine keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v6 01/13] integrity: Introduce a Linux keyring called machine
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v6 00/13] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v3 01/13] diglim: Overview
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxx>
- Re: [PATCH v15 1/6] tpm_tis: Fix expected bit handling and send all bytes in one shot without last byte in exception
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v3 13/13] diglim: Tests
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 12/13] diglim: Remote Attestation
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 11/13] diglim: Interfaces - digests_count
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 10/13] diglim: Interfaces - digest_query
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 08/13] diglim: Interfaces - digest_lists_loaded
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 09/13] diglim: Interfaces - digest_list_label
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 07/13] diglim: Interfaces - digest_list_add, digest_list_del
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 06/13] diglim: IMA info
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 05/13] diglim: Parser
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 02/13] diglim: Basic definitions
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 04/13] diglim: Methods
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 03/13] diglim: Objects
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 01/13] diglim: Overview
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 00/13] integrity: Introduce DIGLIM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH ltp v3 2/2] IMA: Add tests for uid, gid, fowner, and fgroup options
- From: Alex Henrie <alexh@xxxxxxxxxxx>
- [PATCH ltp v3 1/2] IMA: Move check_policy_writable to ima_setup.sh and rename it
- From: Alex Henrie <alexh@xxxxxxxxxxx>
- Re: [PATCH v4 0/9] ima-evm-utils: Add support for signing with pkcs11 URIs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 ima-evm-utils 1/2] set default hash algorithm in configuration time
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v15 5/6] tpm: tpm_tis: add tpm_tis_i2c driver
- From: amirmizi6@xxxxxxxxx
- [PATCH v15 1/6] tpm_tis: Fix expected bit handling and send all bytes in one shot without last byte in exception
- From: amirmizi6@xxxxxxxxx
- [PATCH v15 6/6] tpm: Add YAML schema for TPM TIS I2C options
- From: amirmizi6@xxxxxxxxx
- [PATCH v15 2/6] tpm: tpm_tis: Rewrite "tpm_tis_req_canceled()"
- From: amirmizi6@xxxxxxxxx
- [PATCH v15 4/6] tpm: tpm_tis: verify TPM_STS register is valid after locality request
- From: amirmizi6@xxxxxxxxx
- [PATCH v15 3/6] tpm: Handle an exception for TPM Firmware Update mode.
- From: amirmizi6@xxxxxxxxx
- [PATCH v15 0/6] Add tpm i2c ptp driver
- From: amirmizi6@xxxxxxxxx
- Re: [ANNOUNCE][CFP] Linux Security Summit 2021
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Aw: Re: [PATCH] tpm: fix potential NULL pointer access in tpm_del_char_device()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v4 8/9] tests: Extend sign_verify test with pkcs11-specific test
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v4 9/9] tests: Get the packages for pkcs11 testing on the CI/CD system
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v4 7/9] tests: Import softhsm_setup script to enable pkcs11 test case
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v4 6/9] libimaevm: Add support for pkcs11 private keys for signing a v2 hash
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v4 5/9] evmctl: use the pkcs11 engine for pkcs11: prefixed URIs
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v4 4/9] evmctl: Define and use an ENGINE field in libimaevm_params
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v4 3/9] evmctl: Implement function for setting up an OpenSSL engine
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v4 1/9] evmctl: Implement support for EVMCTL_KEY_PASSWORD environment variable
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v4 2/9] evmctl: Handle failure to initialize the openssl engine
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v4 0/9] ima-evm-utils: Add support for signing with pkcs11 URIs
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v14 2/7] tpm: tpm_tis: Fix expected bit handling and send all bytes in one shot without last byte in exception
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v14 1/7] tpm: Make read{16, 32}() and write32() in tpm_tis_phy_ops optional
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Aw: Re: [PATCH] tpm: fix potential NULL pointer access in tpm_del_char_device()
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH v2 1/1] tpm/tpm_i2c_infineon: Fix init endian vendor check
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: fix potential NULL pointer access in tpm_del_char_device()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] integrity: support including firmware ".platform" keys at build time
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/1] tpm/tpm_i2c_infineon: Fix init endian vendor check
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH ima-evm-utils v4] evmctl: Use secure heap for private keys and passwords
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v4] evmctl: Use secure heap for private keys and passwords
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 9/9] tests: Get the packages for pkcs11 testing on the CI/CD system
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 8/9] tests: Extend sign_verify test with pkcs11-specific test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 7/9] tests: Import softhsm_setup script to enable pkcs11 test case
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 3/9] evmctl: Implement function for setting up an OpenSSL engine
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] ima-evm-utils: Add support for signing with pkcs11 URIs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] tpm/tpm_i2c_infineon: Fix init endian vendor check
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH v14 2/7] tpm: tpm_tis: Fix expected bit handling and send all bytes in one shot without last byte in exception
- From: amirmizi6@xxxxxxxxx
- [PATCH v14 3/7] tpm: tpm_tis: Rewrite "tpm_tis_req_canceled()"
- From: amirmizi6@xxxxxxxxx
- [PATCH v14 1/7] tpm: Make read{16, 32}() and write32() in tpm_tis_phy_ops optional
- From: amirmizi6@xxxxxxxxx
- [PATCH v14 7/7] \tpm: Add YAML schema for TPM TIS I2C options
- From: amirmizi6@xxxxxxxxx
- [PATCH v14 6/7] tpm: tpm_tis: add tpm_tis_i2c driver
- From: amirmizi6@xxxxxxxxx
- [PATCH v14 5/7] tpm: tpm_tis: verify TPM_STS register is valid after locality request
- From: amirmizi6@xxxxxxxxx
- [PATCH v14 4/7] tpm: Handle an exception for TPM Firmware Update mode.
- From: amirmizi6@xxxxxxxxx
- [PATCH v14 0/7] Add tpm i2c ptp driver
- From: amirmizi6@xxxxxxxxx
- Re: [PATCH v2 1/1] tpm/tpm_i2c_infineon: Fix init endian vendor check
- From: Florian Eckert <fe@xxxxxxxxxx>
- Re: [PATCH v2 1/1] tpm/tpm_i2c_infineon: Fix init endian vendor check
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] tpm/tpm_i2c_infineon: Fix init endian vendor check
- From: Florian Eckert <fe@xxxxxxxxxx>
- [PATCH v2 1/1] tpm/tpm_i2c_infineon: Fix init endian vendor check
- From: Florian Eckert <fe@xxxxxxxxxx>
- Re: [PATCH ltp v2] IMA: Add tests for uid, gid, fowner, and fgroup options
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v3] KEYS: trusted: Fix trusted key backends when building as module
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH] integrity: support including firmware ".platform" keys at build time
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v6 1/1] NAX LSM: Add initial support
- From: Igor Zhbanov <izh1979@xxxxxxxxx>
- [PATCH v6 0/1] NAX (No Anonymous Execution) LSM
- From: Igor Zhbanov <izh1979@xxxxxxxxx>
- Re: [PATCH] integrity: support including firmware ".platform" keys at build time
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] integrity: support including firmware ".platform" keys at build time
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH ima-evm-utils v4] evmctl: Use secure heap for private keys and passwords
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v7 ima-evm-utils 2/2] make SHA-256 the default hash algorithm
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- [PATCH v7 ima-evm-utils 1/2] set default hash algorithm in configuration time
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- [PATCH v7 ima-evm-utils 0/2] make default hash algorithm dynamic
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils v4] evmctl: Use secure heap for private keys and passwords
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH] tpm: fix potential NULL pointer access in tpm_del_char_device()
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH] integrity: support including firmware ".platform" keys at build time
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH ltp v2] IMA: Add tests for uid, gid, fowner, and fgroup options
- From: Alex Henrie <alexh@xxxxxxxxxxx>
- [PATCH v6 ima-evm-utils 1/2] set default hash algorithm in configuration time
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH v5 ima-evm-utils 1/2] set default hash algorithm in configuration time
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils v4] evmctl: Use secure heap for private keys and passwords
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ltp] IMA: Add tests for uid, gid, fowner, and fgroup options
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH ltp] IMA: Add tests for uid, gid, fowner, and fgroup options
- From: Alex Henrie <alexh@xxxxxxxxxxx>
- Re: [PATCH v5 ima-evm-utils 1/2] set default hash algorithm in configuration time
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ltp] IMA: Add tests for uid, gid, fowner, and fgroup options
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v5 07/12] KEYS: Introduce link restriction to include builtin, secondary and machine keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 04/12] integrity: restrict INTEGRITY_KEYRING_MACHINE to restrict_link_by_ca
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 07/12] KEYS: Introduce link restriction to include builtin, secondary and machine keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v5 04/12] integrity: restrict INTEGRITY_KEYRING_MACHINE to restrict_link_by_ca
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v5 01/12] integrity: Introduce a Linux keyring called machine
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v6] tpm: fix Atmel TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- Re: [PATCH v5 08/12] KEYS: integrity: change link restriction to trust the machine keyring
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 07/12] KEYS: Introduce link restriction to include builtin, secondary and machine keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 04/12] integrity: restrict INTEGRITY_KEYRING_MACHINE to restrict_link_by_ca
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH linux rebase] ima: add gid support
- From: Alex Henrie <alexh@xxxxxxxxxxx>
- [PATCH ltp] IMA: Add tests for uid, gid, fowner, and fgroup options
- From: Alex Henrie <alexh@xxxxxxxxxxx>
- Re: [PATCH v5 01/12] integrity: Introduce a Linux keyring called machine
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6] tpm: fix Atmel TPM crash caused by too frequent queries
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: Check for integer overflow in tpm2_map_response_body()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 12/12] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 01/12] integrity: Introduce a Linux keyring called machine
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 04/12] integrity: restrict INTEGRITY_KEYRING_MACHINE to restrict_link_by_ca
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 02/12] integrity: Do not allow machine keyring updates following init
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 00/12] Enroll kernel keys thru MOK
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 00/12] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH] ima: add gid support
- From: Alex Henrie <alexh@xxxxxxxxxxx>
- [PATCH v3 8/9] tests: Extend sign_verify test with pkcs11-specific test
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 7/9] tests: Import softhsm_setup script to enable pkcs11 test case
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 9/9] tests: Get the packages for pkcs11 testing on the CI/CD system
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 3/9] evmctl: Implement function for setting up an OpenSSL engine
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 0/9] ima-evm-utils: Add support for signing with pkcs11 URIs
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 4/9] evmctl: Define and use an ENGINE field in libimaevm_params
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 6/9] libimaevm: Add support for pkcs11 private keys for signing a v2 hash
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 5/9] evmctl: use the pkcs11 engine for pkcs11: prefixed URIs
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 2/9] evmctl: Handle failure to initialize the openssl engine
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 1/9] evmctl: Implement support for EVMCTL_KEY_PASSWORD environment variable
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 00/12] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v5 00/12] Enroll kernel keys thru MOK
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 00/12] Enroll kernel keys thru MOK
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] tpm/tpm_i2c_infineon: Fix init endian vendor check
- From: Florian Eckert <fe@xxxxxxxxxx>
- Re: [PATCH] tpm/tpm_i2c_infineon: Fix init endian vendor check
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH v6] tpm: fix Atmel TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- Re: [PATCH v6] tpm: fix Atmel TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- [PATCH v6] tpm: fix Atmel TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- Re: [PATCH v5] tpm: fix Atmel TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- [PATCH] tpm: Check for integer overflow in tpm2_map_response_body()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH v5] tpm: fix Atmel TPM crash caused by too frequent queries
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v5 12/12] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v5 09/12] KEYS: link secondary_trusted_keys to machine trusted keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v5 02/12] integrity: Do not allow machine keyring updates following init
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v5 06/12] KEYS: add a reference to machine keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v5 11/12] integrity: Trust MOK keys if MokListTrustedRT found
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v5 01/12] integrity: Introduce a Linux keyring called machine
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v5 08/12] KEYS: integrity: change link restriction to trust the machine keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v5 10/12] integrity: store reference to machine keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v5 05/12] integrity: add new keyring handler for mok keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v5 00/12] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v5 03/12] KEYS: CA link restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v5 07/12] KEYS: Introduce link restriction to include builtin, secondary and machine keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v5 04/12] integrity: restrict INTEGRITY_KEYRING_MACHINE to restrict_link_by_ca
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils v4] evmctl: Use secure heap for private keys and passwords
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v4] evmctl: Use secure heap for private keys and passwords
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v5] tpm: fix Atmel TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils v4] evmctl: Use secure heap for private keys and passwords
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v4] tpm: fix Atmel TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- Re: [PATCH v4] tpm: fix Atmel TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- [PATCH ima-evm-utils v4] evmctl: Use secure heap for private keys and passwords
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v2 1/8] evmctl: Implement support for EVMCTL_KEY_PASSWORD environment variable
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v2 8/8] tests: Get the packages for pkcs11 testing on the CI/CD system
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2 7/8] tests: Extend sign_verify test with pkcs11-specific test
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2 8/8] tests: Get the packages for pkcs11 testing on the CI/CD system
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 7/8] tests: Extend sign_verify test with pkcs11-specific test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 5/8] evmctl: Setup the pkcs11 engine if key has pkcs11: prefix
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 4/8] evmctl: Extend libimaevm_params with ENGINE field and use it
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 6/8] libimaevm: Add support for pkcs11 private keys for signing a v2 hash
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/8] evmctl: Move code setting up engine to own funtion
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/8] evmctl: Handle engine initialization properly
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/8] ima-evm-utils: Add support for signing with pkcs11 URIs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [GIT PULL] integrity subsystem updates for v5.15
- From: pr-tracker-bot@xxxxxxxxxx
- [PATCH v5 ima-evm-utils 2/2] make SHA-256 the default hash algorithm
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- [PATCH v5 ima-evm-utils 1/2] set default hash algorithm in configuration time
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- [PATCH v5 ima-evm-utils 0/2] make default hash algorithm dynamic
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: add gid support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- IMA namespaces
- From: Denis Semakin <0xsemakin@xxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] ima: add gid support
- From: Alex Henrie <alexh@xxxxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- [GIT PULL] integrity subsystem updates for v5.15
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 1/1] NAX LSM: Add initial support
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Re: [PATCH v5 1/1] NAX LSM: Add initial support
- From: J Freyensee <why2jjj.linux@xxxxxxxxx>
- Re: [GIT PULL] TPM DEVICE DRIVER changes for v5.15
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v4 14/14] tpm: Allow locality 2 to be set when initializing the TPM for Secure Launch
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v2 1/8] evmctl: Implement support for EVMCTL_KEY_PASSWORD environment variable
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] ima: fix deadlock when traversing "ima_default_rules".
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 14/14] tpm: Allow locality 2 to be set when initializing the TPM for Secure Launch
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH v4 08/14] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v4 13/14] x86: Secure Launch late initcall platform module
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v4 09/14] x86: Secure Launch kernel late boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v4 14/14] tpm: Allow locality 2 to be set when initializing the TPM for Secure Launch
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v4 01/14] x86/boot: Fix memremap of setup_indirect structures
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v4 06/14] x86: Secure Launch main header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v4 02/14] x86/boot: Add setup_indirect support in early_memremap_is_setup_data
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v4 00/14] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v4 07/14] x86: Add early SHA support for Secure Launch early measurements
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v4 12/14] reboot: Secure Launch SEXIT support on reboot paths
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v4 11/14] kexec: Secure Launch kexec SEXIT support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v4 10/14] x86: Secure Launch SMP bringup support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v4 04/14] Documentation/x86: Secure Launch kernel documentation
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v4 05/14] x86: Secure Launch Kconfig
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v4 03/14] x86/boot: Place kernel_info at a fixed offset
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH] ima: fix deadlock when traversing "ima_default_rules".
- From: liqiong <liqiong@xxxxxxxxxxxx>
- Re: [PATCH] ima: fix deadlock within RCU list of ima_rules
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Re: [PATCH] ima: fix deadlock within RCU list of ima_rules
- From: liqiong <liqiong@xxxxxxxxxxxx>
- Re: [PATCH] ima: fix deadlock within RCU list of ima_rules
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Re: [PATCH] ima: fix deadlock within RCU list of ima_rules
- From: liqiong <liqiong@xxxxxxxxxxxx>
- Re: [PATCH v4] tpm: fix Atmel TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- Re: [PATCH v4] tpm: fix Atmel TPM crash caused by too frequent queries
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm: tis: Kconfig: Add helper dependency on COMPILE_TEST
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v13 7/7] tpm: Add YAML schema for TPM TIS I2C options
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v13 6/7] tpm: tpm_tis: add tpm_tis_i2c driver
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v13 5/7] tpm: tpm_tis: verify TPM_STS register is valid after locality request
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v13 4/7] tpm: Handle an exception for TPM Firmware Update mode.
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v13 3/7] tpm: tpm_tis: Rewrite "tpm_tis_req_canceled()"
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v13 2/7] tpm: tpm_tis: Fix expected bit handling and send all bytes in one shot without last byte in exception
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxx>
- Re: [PATCH v13 1/7] tpm: Make read{16, 32}() and write32() in tpm_tis_phy_ops optional
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxx>
- Re: [PATCH v4 ima-evm-utils 1/2] set default hash algorithm in configuration time
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH v13 7/7] tpm: Add YAML schema for TPM TIS I2C options
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH v13 7/7] tpm: Add YAML schema for TPM TIS I2C options
- From: amirmizi6@xxxxxxxxx
- [PATCH v13 0/7] Add tpm i2c ptp driver
- From: amirmizi6@xxxxxxxxx
- [PATCH v13 6/7] tpm: tpm_tis: add tpm_tis_i2c driver
- From: amirmizi6@xxxxxxxxx
- [PATCH v13 2/7] tpm: tpm_tis: Fix expected bit handling and send all bytes in one shot without last byte in exception
- From: amirmizi6@xxxxxxxxx
- [PATCH v13 1/7] tpm: Make read{16, 32}() and write32() in tpm_tis_phy_ops optional
- From: amirmizi6@xxxxxxxxx
- [PATCH v13 3/7] tpm: tpm_tis: Rewrite "tpm_tis_req_canceled()"
- From: amirmizi6@xxxxxxxxx
- [PATCH v13 5/7] tpm: tpm_tis: verify TPM_STS register is valid after locality request
- From: amirmizi6@xxxxxxxxx
- [PATCH v13 4/7] tpm: Handle an exception for TPM Firmware Update mode.
- From: amirmizi6@xxxxxxxxx
- Re: [PATCH] ima: fix deadlock within RCU list of ima_rules
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Re: [PATCH] ima: fix deadlock within RCU list of ima_rules
- From: liqiong <liqiong@xxxxxxxxxxxx>
- Re: [PATCH v4] tpm: fix Atmel TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- [PATCH v2] tpm: tis: Kconfig: Add helper dependency on COMPILE_TEST
- From: Cai Huoqing <caihuoqing@xxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: tis: Kconfig: Add helper dependency on COMPILE_TEST
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 ima-evm-utils 1/2] set default hash algorithm in configuration time
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v3] Use secure heap for private keys and passwords
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v3] Use secure heap for private keys and passwords
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH] ima: fix deadlock within RCU list of ima_rules
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Re: [PATCH] ima: fix deadlock within RCU list of ima_rules
- From: liqiong <liqiong@xxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v3] Use secure heap for private keys and passwords
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH] ima: fix deadlock within RCU list of ima_rules
- From: liqiong <liqiong@xxxxxxxxxxxx>
- [PATCH] tpm: tis: Kconfig: Add helper dependency on COMPILE_TEST
- From: Cai Huoqing <caihuoqing@xxxxxxxxx>
- Re: [PATCH v3 00/14] x86: Trenchboot secure dynamic launch Linux kernel support
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Tim Harvey <tharvey@xxxxxxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: fix deadlock within "ima_match_policy" function.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: fix deadlock within "ima_match_policy" function.
- From: liqiong <liqiong@xxxxxxxxxxxx>
- Re: [PATCH] ima: fix deadlock within "ima_match_policy" function.
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Writes to /proc/self/mem and file_mprotect() LSM hook
- From: Igor Zhbanov <izh1979@xxxxxxxxx>
- [PATCH] ima: fix deadlock within "ima_match_policy" function.
- From: liqiong <liqiong@xxxxxxxxxxxx>
- Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH linux-next] char:tpm: fix boolreturn.cocci warnings
- From: CGEL <cgel.zte@xxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v3] Use secure heap for private keys and passwords
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Tim Harvey <tharvey@xxxxxxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [GIT PULL] TPM DEVICE DRIVER changes for v5.15
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 0/6] updates to device mapper target measurement using ima
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v3] Use secure heap for private keys and passwords
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v3] Use secure heap for private keys and passwords
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH] ima: fix infinite loop within "ima_match_policy" function.
- From: liqiong <liqiong@xxxxxxxxxxxx>
- Re: [PATCH] ima: fix infinite loop within "ima_match_policy" function.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: fix infinite loop within "ima_match_policy" function.
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Re: [PATCH] ima: fix infinite loop within "ima_match_policy" function.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: fix infinite loop within "ima_match_policy" function.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: fix infinite loop within "ima_match_policy" function.
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Re: [PATCH] ima: fix infinite loop within "ima_match_policy" function.
- From: liqiong <liqiong@xxxxxxxxxxxx>
- Re: [PATCH] ima: fix infinite loop within "ima_match_policy" function.
- From: 李力琼 <liqiong@xxxxxxxxxxxx>
- Re: [PATCH] ima: fix infinite loop within "ima_match_policy" function.
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Re: [PATCH] ima: fix infinite loop within "ima_match_policy" function.
- From: 李力琼 <liqiong@xxxxxxxxxxxx>
- Re: [PATCH] IMA: reject unknown hash algorithms in ima_get_hash_algo
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] IMA: reject unknown hash algorithms in ima_get_hash_algo
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- [PATCH] IMA: reject unknown hash algorithms in ima_get_hash_algo
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- [PATCH ima-evm-utils v3] Use secure heap for private keys and passwords
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v5] tpm: Add Upgrade/Reduced mode support for TPM2 modules
- From: Borys Movchan <borysmn@xxxxxxxx>
- [PATCH v5 1/1] NAX LSM: Add initial support
- From: Igor Zhbanov <izh1979@xxxxxxxxx>
- [PATCH v5 0/1] NAX (No Anonymous Execution) LSM
- From: Igor Zhbanov <izh1979@xxxxxxxxx>
- Re: [PATCH v4 1/1] NAX LSM: Add initial support
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v4 ima-evm-utils 2/2] make SHA-256 the default hash algorithm
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- [PATCH v4 ima-evm-utils 1/2] set default hash algorithm in configuration time
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- [PATCH v4 ima-evm-utils 0/2] make default hash algorithm dynamic
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH v3 ima-evm-utils 1/2] set default hash algorithm in configuration time
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- [PATCH v3 ima-evm-utils 2/2] make SHA-256 the default hash algorithm
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- [PATCH v3 ima-evm-utils 1/2] set default hash algorithm in configuration time
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- [PATCH v3 ima-evm-utils 0/2] make default hash algorithm dynamic
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Tim Harvey <tharvey@xxxxxxxxxxxxx>
- Re: [PATCH] IMA: set a default value for unknown digsig algorithms
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Tim Harvey <tharvey@xxxxxxxxxxxxx>
- Re: [PATCH 0/6] updates to device mapper target measurement using ima
- From: Mike Snitzer <snitzer@xxxxxxxxxx>
- Re: [PATCH] ima: fix infinite loop within "ima_match_policy" function.
- From: liqiong <liqiong@xxxxxxxxxxxx>
- Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH] ima: fix infinite loop within "ima_match_policy" function.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Tim Harvey <tharvey@xxxxxxxxxxxxx>
- Re: [PATCH] IMA: set a default value for unknown digsig algorithms
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 1/1] NAX LSM: Add initial support
- From: Igor Zhbanov <izh1979@xxxxxxxxx>
- [PATCH v4 0/1] NAX (No Anonymous Execution) LSM
- From: Igor Zhbanov <izh1979@xxxxxxxxx>
- Re: [PATCH v3 0/1] NAX (No Anonymous Execution) LSM
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Re: [PATCH] ima: fix infinite loop within "ima_match_policy" function.
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2] Use secure heap for private keys and passwords
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- [PATCH] IMA: set a default value for unknown digsig algorithms
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Re: [PATCH] ima: fix infinite loop within "ima_match_policy" function.
- From: 李力琼 <liqiong@xxxxxxxxxxxx>
- Re: [PATCH v3 1/1] NAX LSM: Add initial support
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2] Use secure heap for private keys and passwords
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v3 1/1] NAX LSM: Add initial support
- From: Igor Zhbanov <izh1979@xxxxxxxxx>
- [PATCH v3 0/1] NAX (No Anonymous Execution) LSM
- From: Igor Zhbanov <izh1979@xxxxxxxxx>
- Re: [PATCH ima-evm-utils v2] Use secure heap for private keys and passwords
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2] Use secure heap for private keys and passwords
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2] Use secure heap for private keys and passwords
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2] Use secure heap for private keys and passwords
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2] Use secure heap for private keys and passwords
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: fix infinite loop within "ima_match_policy" function.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2] Use secure heap for private keys and passwords
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2] Use secure heap for private keys and passwords
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2] Use secure heap for private keys and passwords
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2] Use secure heap for private keys and passwords
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [syzbot] UBSAN: array-index-out-of-bounds in ima_inode_setxattr
- From: syzbot <syzbot+e8bafe7b82c739eaf153@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH] ima: fix infinite loop within "ima_match_policy" function.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: fix infinite loop within "ima_match_policy" function.
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Re: [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] ima: fix infinite loop within "ima_match_policy" function.
- From: liqiong <liqiong@xxxxxxxxxxxx>
- [PATCH ima-evm-utils v2] Use secure heap for private keys and passwords
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v4 12/12] integrity: Only use mok keyring when uefi_check_trust_mok_keys is true
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v4 11/12] integrity: Trust MOK keys if MokListTrustedRT found
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v4 10/12] integrity: store reference to mok keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v4 09/12] KEYS: link secondary_trusted_keys to mok trusted keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v4 02/12] integrity: Do not allow mok keyring updates following init
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v4 04/12] integrity: restrict INTEGRITY_KEYRING_MOK to restrict_link_by_ca
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v4 08/12] KEYS: integrity: change link restriction to trust the mok keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v4 01/12] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v4 05/12] integrity: add new keyring handler for mok keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v4 03/12] KEYS: CA link restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v4 07/12] KEYS: Introduce link restriction to include builtin, secondary and mok keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v4 06/12] KEYS: add a reference to mok keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v4 00/12] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils] Improve memory handling for private keys and passwords
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] Improve memory handling for private keys and passwords
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/1] ima: check control characters in policy file path
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v2 ima-evm-utils] libimaevm: make SHA-256 the default hash algorithm
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v2 ima-evm-utils] libimaevm: make SHA-256 the default hash algorithm
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] NAX LSM: Add initial support support
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Re: [PATCH v2 ima-evm-utils] libimaevm: make SHA-256 the default hash algorithm
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Re: [PATCH v8 6/6] IMA: prevent SETXATTR_CHECK policy rules with unavailable algorithms
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Re: [PATCH v8 6/6] IMA: prevent SETXATTR_CHECK policy rules with unavailable algorithms
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 ima-evm-utils] libimaevm: make SHA-256 the default hash algorithm
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- [PATCH] libimaevm: make SHA-256 the default hash algorithm
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- [PATCH v2 1/1] NAX LSM: Add initial support support
- From: Igor Zhbanov <izh1979@xxxxxxxxx>
- [PATCH v2 0/1] NAX (No Anonymous Execution) LSM
- From: Igor Zhbanov <izh1979@xxxxxxxxx>
- [PATCH v2 ima-evm-utils] evmctl: fix memory leak in get_password
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- [PATCH v2 ima-evm-utils] evmctl: fix memory leak in get_password
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils] evmctl: fix memory leak in get_password
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH v3 14/14] tpm: Allow locality 2 to be set when initializing the TPM for Secure Launch
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v3 02/14] x86/boot: Add missing handling of setup_indirect structures
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 3/6] IMA: add support to restrict the hash algorithms used for file appraisal
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- [PATCH v8 5/6] IMA: introduce a new policy option func=SETXATTR_CHECK
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- [PATCH v8 4/6] IMA: add a policy option to restrict xattr hash algorithms on appraisal
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- [PATCH v8 2/6] IMA: block writes of the security.ima xattr with unsupported algorithms
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- [PATCH v8 0/6] IMA: restrict the accepted digest algorithms for the security.ima xattr
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- [PATCH v8 6/6] IMA: prevent SETXATTR_CHECK policy rules with unavailable algorithms
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- [PATCH v8 1/6] IMA: remove the dependency on CRYPTO_MD5
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Re: [PATCH 1/1] NAX LSM: Add initial support support
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Re: [PATCH 1/1] NAX LSM: Add initial support support
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Re: [PATCH v5] tpm: Add Upgrade/Reduced mode support for TPM2 modules
- From: Borys Movchan <borysmn@xxxxxxxx>
- [PATCH v4] tpm: fix Atmel TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- Re: [PATCH 1/1] NAX LSM: Add initial support support
- From: Igor Zhbanov <izh1979@xxxxxxxxx>
- Re: [PATCH 0/1] ima: check control characters in policy path
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/1] ima: check control characters in policy file path
- From: Tianxing Zhang <anakinzhang96@xxxxxxxxx>
- [PATCH 0/1] ima: check control characters in policy path
- From: Tianxing Zhang <anakinzhang96@xxxxxxxxx>
- [PATCH 6/6] dm ima: update dm documentation for ima measurement support
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5/6] dm ima: update dm target attributes for ima measurements
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4/6] dm ima: add a warning in dm_init if duplicate ima events are not measured
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/6] dm ima: prefix ima event name related to device mapper with dm_
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/6] dm ima: add version info to dm related events in ima log
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/6] dm ima: prefix dm table hashes in ima log with hash algorithm
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/6] updates to device mapper target measurement using ima
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] Improve memory handling for private keys and passwords
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] NAX LSM: Add initial support support
- From: Igor Zhbanov <izh1979@xxxxxxxxx>
- Re: [PATCH v3 01/14] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 4/5] IMA: add a policy option to restrict xattr hash algorithms on appraisal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] NAX LSM: Add initial support support
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Re: [PATCH 1/1] NAX LSM: Add initial support support
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Re: [PATCH 1/1] NAX LSM: Add initial support support
- From: Igor Zhbanov <izh1979@xxxxxxxxx>
- Re: [PATCH 1/1] NAX LSM: Add initial support support
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Re: [PATCH v7 4/5] IMA: add a policy option to restrict xattr hash algorithms on appraisal
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Re: [PATCH v3 01/14] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 01/14] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v3 01/14] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v3 10/14] KEYS: change link restriction for secondary to also trust mok
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 10/14] KEYS: change link restriction for secondary to also trust mok
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v3 04/14] integrity: add add_to_mok_keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils] Improve memory handling for private keys and passwords
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v3 01/14] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils] Improve memory handling for private keys and passwords
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH 1/1] NAX LSM: Add initial support support
- From: Igor Zhbanov <izh1979@xxxxxxxxx>
- Re: [PATCH v4 2/2] tpm: ibmvtpm: Rename tpm_process_cmd to tpm_status and define flag
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 10/14] KEYS: change link restriction for secondary to also trust mok
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 04/14] integrity: add add_to_mok_keyring
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 01/14] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 4/5] IMA: add a policy option to restrict xattr hash algorithms on appraisal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] NAX LSM: Add initial support support
- From: Igor Zhbanov <izh1979@xxxxxxxxx>
- Re: [PATCH 1/1] NAX LSM: Add initial support support
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Re: [PATCH v7 4/5] IMA: add a policy option to restrict xattr hash algorithms on appraisal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 4/5] IMA: add a policy option to restrict xattr hash algorithms on appraisal
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- [PATCH v3 12/14] integrity: Do not allow mok keyring updates following init
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 14/14] integrity: change ima link restriction to include mok keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 13/14] integrity: store reference to mok keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 02/14] KEYS: CA link restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 06/14] integrity: accessor function to get trust_moklist
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 10/14] KEYS: change link restriction for secondary to also trust mok
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 11/14] KEYS: link secondary_trusted_keys to mok trusted keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 04/14] integrity: add add_to_mok_keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 03/14] integrity: Trust MOK keys if MokListTrustedRT found
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 01/14] integrity: Introduce a Linux keyring for the Machine Owner Key (MOK)
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 00/14] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 09/14] KEYS: Introduce link restriction to include builtin, secondary and mok keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 08/14] KEYS: add a reference to mok keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 05/14] integrity: restrict INTEGRITY_KEYRING_MOK to restrict_link_by_ca
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3 07/14] integrity: add new keyring handler for mok keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 0/5] IMA: restrict the accepted digest algorithms for the security.ima xattr
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH v7 0/5] IMA: restrict the accepted digest algorithms for the security.ima xattr
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH v7 0/5] IMA: restrict the accepted digest algorithms for the security.ima xattr
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] evmctl: fix memory leak in get_password
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] evmctl: fix memory leak in get_password
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils] evmctl: fix memory leak in get_password
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils] evmctl: fix memory leak in get_password
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH v7 4/5] IMA: add a policy option to restrict xattr hash algorithms on appraisal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] evmctl: fix memory leak in get_password
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] tpm: ibmvtpm: Rename tpm_process_cmd to tpm_status and define flag
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v7 5/5] IMA: introduce a new policy option func=SETXATTR_CHECK
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- [PATCH v7 3/5] IMA: add support to restrict the hash algorithms used for file appraisal
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- [PATCH v7 2/5] IMA: block writes of the security.ima xattr with unsupported algorithms
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- [PATCH v7 4/5] IMA: add a policy option to restrict xattr hash algorithms on appraisal
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- [PATCH v7 1/5] IMA: remove the dependency on CRYPTO_MD5
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- [PATCH v7 0/5] IMA: restrict the accepted digest algorithms for the security.ima xattr
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 ima-evm-utils 3/3] Create alternative tpm2_pcr_read() that uses IBM TSS
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/4] crypto: caam - add in-kernel interface for blob generator
- From: David Gstir <david@xxxxxxxxxxxxx>
- Re: [PATCH 3/4] crypto: caam - add in-kernel interface for blob generator
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] tpm: ibmvtpm: Rename tpm_process_cmd to tpm_status and define flag
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 2/2] tpm: ibmvtpm: Rename tpm_process_cmd to tpm_status and define flag
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH ima-evm-utils] evmctl: fix memory leak in get_password
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 2/2] tpm: ibmvtpm: Rename tpm_process_cmd to tpm_status and define flag
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5] tpm: Add Upgrade/Reduced mode support for TPM2 modules
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3 00/14] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 14/14] tpm: Allow locality 2 to be set when initializing the TPM for Secure Launch
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 02/14] x86/boot: Add missing handling of setup_indirect structures
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2 4/8] evmctl: Extend libimaevm_params with ENGINE field and use it
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 1/8] evmctl: Implement support for EVMCTL_KEY_PASSWORD environment variable
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 8/8] tests: Get the packages for pkcs11 testing on the CI/CD system
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 6/8] libimaevm: Add support for pkcs11 private keys for signing a v2 hash
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 5/8] evmctl: Setup the pkcs11 engine if key has pkcs11: prefix
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 7/8] tests: Extend sign_verify test with pkcs11-specific test
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 3/8] evmctl: Move code setting up engine to own funtion
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/8] evmctl: Handle engine initialization properly
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/8] ima-evm-utils: Add support for signing with pkcs11 URIs
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: David Gstir <david@xxxxxxxxxxxxx>
- Re: [PATCH 3/4] crypto: caam - add in-kernel interface for blob generator
- From: David Gstir <david@xxxxxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v6 3/5] IMA: add support to restrict the hash algorithms used for file appraisal
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Re: [PATCH v6 2/5] IMA: block writes of the security.ima xattr with unsupported algorithms
- From: THOBY Simon <Simon.THOBY@xxxxxxxxxx>
- Re: [PATCH v4 1/2] tpm: ibmvtpm: Avoid error message when process gets signal while waiting
- From: Nageswara Sastry <rnsastry@xxxxxxxxxxxxx>
- Re: [PATCH 2/4] KEYS: trusted: allow trust sources to use kernel RNG for key material
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH 1/1] NAX LSM: Add initial support support
- From: J Freyensee <why2jjj.linux@xxxxxxxxx>
- Re: [PATCH v6 2/5] IMA: block writes of the security.ima xattr with unsupported algorithms
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v6 1/5] IMA: remove the dependency on CRYPTO_MD5
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 1/2] tpm: ibmvtpm: Avoid error message when process gets signal while waiting
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 2/2] tpm: ibmvtpm: Rename tpm_process_cmd to tpm_status and define flag
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 0/2] ibmvtpm: Avoid error message when process gets signal while waiting
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/4] libimaevm: Add support for pkcs11 private keys for signing a v2 hash
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v6 5/5] IMA: introduce a new policy option func=SETXATTR_CHECK
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 4/5] IMA: add a policy option to restrict xattr hash algorithms on appraisal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4] tpm: Add Upgrade/Reduced mode support for TPM2 modules
- From: Borys Movchan <borysmn@xxxxxxxx>
- [PATCH v5] tpm: Add Upgrade/Reduced mode support for TPM2 modules
- From: Borys Movchan <borysmn@xxxxxxxx>
- Re: [PATCH v6 3/5] IMA: add support to restrict the hash algorithms used for file appraisal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 13/14] x86: Secure Launch late initcall platform module
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v3 08/14] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v3 07/14] x86: Add early SHA support for Secure Launch early measurements
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v3 06/14] x86: Secure Launch main header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v3 12/14] reboot: Secure Launch SEXIT support on reboot paths
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v3 09/14] x86: Secure Launch kernel late boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v3 14/14] tpm: Allow locality 2 to be set when initializing the TPM for Secure Launch
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v3 03/14] x86/boot: Place kernel_info at a fixed offset
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v3 05/14] x86: Secure Launch Kconfig
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v3 04/14] Documentation/x86: Secure Launch kernel documentation
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v3 00/14] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v3 01/14] x86/boot: Fix memremap of setup_indirect structures
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v3 11/14] kexec: Secure Launch kexec SEXIT support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v3 02/14] x86/boot: Add missing handling of setup_indirect structures
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v3 10/14] x86: Secure Launch SMP bringup support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH 2/4] libimaevm: Add support for pkcs11 private keys for signing a v2 hash
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 2/4] libimaevm: Add support for pkcs11 private keys for signing a v2 hash
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH 4/4] tests: Get the packages for pkcs11 testing on the CI/CD system
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH 0/4] ima-evm-utils: Add support for signing with pkcs11 URIs
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/4] evmctl: Implement support for EVMCTL_KEY_PASSWORD environment variable
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH 3/4] tests: Extend sign_verify test with pkcs11 specific test
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 2/5] IMA: block writes of the security.ima xattr with unsupported algorithms
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH 2/4] KEYS: trusted: allow trust sources to use kernel RNG for key material
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] fscrypt: support trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/4] KEYS: trusted: allow trust sources to use kernel RNG for key material
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v4] tpm: Add Upgrade/Reduced mode support for TPM2 modules
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: ibmvtpm: Rename tpm_process_cmd to tpm_status and define flag
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC v2 10/12] KEYS: link system_trusted_keys to mok_trusted_keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH RFC v2 10/12] KEYS: link system_trusted_keys to mok_trusted_keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v2] fscrypt: support trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v2 10/12] KEYS: link system_trusted_keys to mok_trusted_keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v3] tpm: Add Upgrade/Reduced mode support for TPM2 modules
- From: Borys Movchan <borysmn@xxxxxxxx>
- [PATCH v4] tpm: Add Upgrade/Reduced mode support for TPM2 modules
- From: Borys Movchan <borysmn@xxxxxxxx>
- Re: [PATCH v3 1/2] tpm: ibmvtpm: Rename tpm_process_cmd to tpm_status and define flag
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: ibmvtpm: Rename tpm_process_cmd to tpm_status and define flag
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v1 0/4] keys: introduce key_extract_material helper
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v2 10/12] KEYS: link system_trusted_keys to mok_trusted_keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH RFC v2 10/12] KEYS: link system_trusted_keys to mok_trusted_keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]