Linux Integrity
[Prev Page][Next Page]
- Re: [PATCH] tpm: fix ATMEL TPM crash caused by too frequent queries
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH AUTOSEL 5.12 36/80] ima: Don't remove security.ima if file must not be appraised
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.13 38/85] ima: Don't remove security.ima if file must not be appraised
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH] tpm: fix ATMEL TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- [PATCH] ima: add gid support
- From: Alex Henrie <alexh@xxxxxxxxxxx>
- Re: [PATCH] tpm: fix ATMEL TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- Re: [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH] tpm: fix ATMEL TPM crash caused by too frequent queries
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- RE: [PATCH v2 3/3] ima: Add digest and digest_len params to the functions to measure a buffer
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Richard Weinberger <richard@xxxxxx>
- RE: [PATCH v2 2/3] ima: Return int in the functions to measure a buffer
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH] tpm: fix ATMEL TPM crash caused by too frequent queries
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 5/6] crypto: caam - add in-kernel interface for blob generator
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH] tpm: fix ATMEL TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- Re: [PATCH] tpm: fix ATMEL TPM crash caused by too frequent queries
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: fix ATMEL TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- Re: [PATCH] tpm: fix ATMEL TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- Re: [PATCH] tpm: fix ATMEL TPM crash caused by too frequent queries
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 0/2] Add support for ECDSA-signed kernel modules
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] char: tpm: vtpm_proxy: Fix race in init
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] char: tpm: vtpm_proxy: Fix race in init
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: fix ATMEL TPM crash caused by too frequent queries
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils v3] ima-evm-utils: Support SM2 algorithm for sign and verify
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] ima-evm-utils: Support SM2 algorithm for sign and verify
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCH v2 3/3] ima: Add digest and digest_len params to the functions to measure a buffer
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/3] ima: Return int in the functions to measure a buffer
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] ima: Introduce ima_get_current_hash_algo()
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 3/3] ima: Add digest and digest_len params to the functions to measure a buffer
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 2/3] ima: Return int in the functions to measure a buffer
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 0/3] ima: Provide more info about buffer measurement
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 1/3] ima: Introduce ima_get_current_hash_algo()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v7 3/3] ima-evm-utils: Read keyid from the cert appended to the key file
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v7 2/3] ima-evm-utils: Allow manual setting keyid from a cert file
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v7 1/3] ima-evm-utils: Allow manual setting keyid for signing
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v7 0/3] ima-evm-utils: Add --keyid option
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v6 1/3] ima-evm-utils: Allow manual setting keyid for signing
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 1/3] ima-evm-utils: Allow manual setting keyid for signing
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v6 1/3] ima-evm-utils: Allow manual setting keyid for signing
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 1/3] ima-evm-utils: Allow manual setting keyid for signing
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH ima-evm-utils 0/3] libimaevm: Remove digest calculations not supported by IMA
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils 3/3] libimaevm: Remove calculation of a digest over a symbolic link
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils 2/3] libimaevm: Remove calculation of a digest over a directory
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils 1/3] libimaevm: Remove calculation of a digest over a device file
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v6 3/3] ima-evm-utils: Read keyid from the cert appended to the key file
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v8 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 3/3] ima-evm-utils: Read keyid from the cert appended to the key file
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v6 3/3] ima-evm-utils: Read keyid from the cert appended to the key file
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 2/3] ima-evm-utils: Allow manual setting keyid from a cert file
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 1/3] ima-evm-utils: Allow manual setting keyid for signing
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: [PATCH 3/3] ima: Add digest parameter to the functions to measure a buffer
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH 3/3] ima: Add digest parameter to the functions to measure a buffer
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/3] ima: Add digest parameter to the functions to measure a buffer
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 2/3] ima: Return int in the functions to measure a buffer
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 1/3] ima: Introduce ima_get_current_hash_algo()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 0/3] ima: Provide more info about buffer measurement
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: Recent tpm_tis IRQ handling changes are causing kernel backtraces]
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: Recent tpm_tis IRQ handling changes are causing kernel backtraces]
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v2 12/12] iommu: Do not allow IOMMU passthrough with Secure Launch
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v2 12/12] iommu: Do not allow IOMMU passthrough with Secure Launch
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH] char: tpm: vtpm_proxy: Fix race in init
- From: Saubhik Mukherjee <saubhik.mukherjee@xxxxxxxxx>
- [PATCH] char: tpm: vtpm_proxy: Fix race in init
- From: Saubhik Mukherjee <saubhik.mukherjee@xxxxxxxxx>
- Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- [PATCH] tpm: fix ATMEL TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- Re: [PATCH] IMA: remove -Wmissing-prototypes warning
- From: Austin Kim <austindh.kim@xxxxxxxxx>
- Re: Recent tpm_tis IRQ handling changes are causing kernel backtraces]
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v8 0/2] Add support for ECDSA-signed kernel modules
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v8 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v8 2/2] certs: Add support for using elliptic curve keys for signing modules
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] TPM DEVICE DRIVER changes for v5.14
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] TPM DEVICE DRIVER changes for v5.14
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] char: tpm: vtpm_proxy: Fix race in init
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 2/2] certs: Add support for using elliptic curve keys for signing modules
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] certs: Redirect openssl error message to null device
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [GIT PULL] TPM DEVICE DRIVER changes for v5.14
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] certs: Redirect openssl error message to null device
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: Recent tpm_tis IRQ handling changes are causing kernel backtraces]
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: Recent tpm_tis IRQ handling changes are causing kernel backtraces]
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] char: tpm: vtpm_proxy: Fix race in init
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] IMA: remove -Wmissing-prototypes warning
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] IMA: remove -Wmissing-prototypes warning
- From: Austin Kim <austindh.kim@xxxxxxxxx>
- Re: [RFC] ima: check ima-policy's path
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC] ima: check ima-policy's path
- From: Tianxing Zhang <anakinzhang96@xxxxxxxxx>
- Re: [PATCH v6 1/3] ima-evm-utils: Allow manual setting keyid for signing
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [GIT PULL] integrity subsystem updates for v5.14
- From: pr-tracker-bot@xxxxxxxxxx
- /dev/tpmrm0 session handling
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: ima - wait for tpm load
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- [PATCH v7 2/2] certs: Add support for using elliptic curve keys for signing modules
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v7 0/2] Add support for ECDSA-signed kernel modules
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v7 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 1/3] ima-evm-utils: Allow manual setting keyid for signing
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [GIT PULL] TPM DEVICE DRIVER changes for v5.14
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [GIT PULL] TPM DEVICE DRIVER changes for v5.14
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] TPM DEVICE DRIVER changes for v5.14
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [GIT PULL] TPM DEVICE DRIVER changes for v5.14
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] TPM DEVICE DRIVER changes for v5.14
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [GIT PULL] integrity subsystem updates for v5.14
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [GIT PULL] TPM DEVICE DRIVER changes for v5.14
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- RE: [RFC][PATCH 03/12] digest_lists: Basic definitions
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [RFC][PATCH 03/12] digest_lists: Basic definitions
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- RE: [RFC][PATCH 03/12] digest_lists: Basic definitions
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [RFC][PATCH 04/12] digest_lists: Objects
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC][PATCH 03/12] digest_lists: Basic definitions
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- RE: [RFC][PATCH 03/12] digest_lists: Basic definitions
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- RE: [RFC][PATCH 04/12] digest_lists: Objects
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [RFC][PATCH 03/12] digest_lists: Basic definitions
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC][PATCH 03/12] digest_lists: Basic definitions
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [RFC][PATCH 04/12] digest_lists: Objects
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC][PATCH 03/12] digest_lists: Basic definitions
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 1/3] ima-evm-utils: Allow manual setting keyid for signing
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v6 2/3] ima-evm-utils: Allow manual setting keyid from a cert file
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v6 3/3] ima-evm-utils: Read keyid from the cert appended to the key file
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH 0/6] ima-evm-utils: Some cleanups and bugfixes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC][PATCH 01/12] ima: Add digest, algo, measured parameters to ima_measure_critical_data()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC][PATCH 12/12] digest_lists: Tests
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 11/12] digest_lists: Interfaces - digests_count
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 10/12] digest_lists: Interfaces - digest_query
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 08/12] digest_lists: Interfaces - digest_lists_loaded
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 09/12] digest_lists: Interfaces - digest_label
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 05/12] digest_lists: Methods
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 07/12] digest_lists: Interfaces - digest_list_add, digest_list_del
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 06/12] digest_lists: Parser
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 04/12] digest_lists: Objects
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 02/12] digest_lists: Overview
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 01/12] ima: Add digest, algo, measured parameters to ima_measure_critical_data()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 03/12] digest_lists: Basic definitions
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 00/12] Huawei Digest Lists
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH 1/3] crypto: mxs-dcp: Add support for hardware provided keys
- From: Richard Weinberger <richard.weinberger@xxxxxxxxx>
- Re: [PATCH] certs: Redirect openssl error message to null device
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH] certs: Redirect openssl error message to null device
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: mxs-dcp: Add support for hardware provided keys
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 3/3] ima-evm-utils: Read keyid from the cert appended to the key file
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 2/3] ima-evm-utils: Allow manual setting keyid from a cert file
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 1/3] ima-evm-utils: Allow manual setting keyid for signing
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] crypto: mxs-dcp: Add support for hardware provided keys
- From: Richard Weinberger <richard.weinberger@xxxxxxxxx>
- Re: [PATCH 0/3] Add GitHub Actions support
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2] tpm, tpm_tis_spi: Allow to sleep in the interrupt handler
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH 0/3] Add GitHub Actions support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] Add GitHub Actions support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- [GIT PULL] TPM DEVICE DRIVER changes for v5.14
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: Recent tpm_tis IRQ handling changes are causing kernel backtraces
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: Recent tpm_tis IRQ handling changes are causing kernel backtraces
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: Recent tpm_tis IRQ handling changes are causing kernel backtraces
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm, tpm_tis_spi: Allow to sleep in the interrupt handler
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] char: tpm: vtpm_proxy: Fix race in init
- From: Saubhik Mukherjee <saubhik.mukherjee@xxxxxxxxx>
- Re: [PATCH 0/3] Add GitHub Actions support
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH 3/3] CI: Introduce GitHub Actions setup
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH 2/3] CI/openSUSE: Fix tpm_server symlink creation
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH 1/3] CI: Rename travis script directory
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH 0/3] Add GitHub Actions support
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v2 2/6] KEYS: trusted: Allow import from existing key material for development
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v2 6/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v2 3/6] KEYS: trusted: allow users to use kernel RNG for key material
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v2 4/6] KEYS: trusted: allow trust sources to use kernel RNG for key material
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v2 1/6] KEYS: trusted: allow use of TEE as backend without TCG_TPM support
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v2 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v2 5/6] crypto: caam - add in-kernel interface for blob generator
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v2 12/12] iommu: Do not allow IOMMU passthrough with Secure Launch
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [ANNOUNCE][CFP] Linux Security Summit 2021
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v2 12/12] iommu: Do not allow IOMMU passthrough with Secure Launch
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v2 12/12] iommu: Do not allow IOMMU passthrough with Secure Launch
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v2] evm: output EVM digest calculation info
- From: nramas <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] evm: Check xattr size discrepancy between kernel and user
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2] evm: Check xattr size discrepancy between kernel and user
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH] evm: Check xattr size misalignment between kernel and user
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Recent tpm_tis IRQ handling changes are causing kernel backtraces
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH] evm: Check xattr size misalignment between kernel and user
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2] evm: output EVM digest calculation info
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- [PATCH v2] tpm, tpm_tis_spi: Allow to sleep in the interrupt handler
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [integrity:next-integrity-testing 13/13] security/integrity/evm/evm_crypto.c:181:41: warning: format specifies type 'unsigned long' but the argument has type 'unsigned int'
- From: kernel test robot <lkp@xxxxxxxxx>
- [integrity:next-integrity-testing 13/13] <command-line>: warning: format '%lu' expects argument of type 'long unsigned int', but argument 3 has type 'unsigned int'
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 12/12] iommu: Do not allow IOMMU passthrough with Secure Launch
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCH] fs: Return raw xattr for security.* if there is size disagreement with LSMs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] fs: Return raw xattr for security.* if there is size disagreement with LSMs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- RE: [PATCH] fs: Return raw xattr for security.* if there is size disagreement with LSMs
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 07/12] x86: Secure Launch SMP bringup support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v2 01/12] x86/boot: Place kernel_info at a fixed offset
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v2 02/12] x86: Secure Launch Kconfig
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v2 00/12] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v2 03/12] x86: Secure Launch main header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v2 05/12] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v2 10/12] x86: Secure Launch late initcall platform module
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v2 04/12] x86: Add early SHA support for Secure Launch early measurements
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v2 12/12] iommu: Do not allow IOMMU passthrough with Secure Launch
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v2 09/12] reboot: Secure Launch SEXIT support on reboot paths
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v2 06/12] x86: Secure Launch kernel late boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v2 11/12] tpm: Allow locality 2 to be set when initializing the TPM for Secure Launch
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v2 08/12] kexec: Secure Launch kexec SEXIT support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH] fs: Return raw xattr for security.* if there is size disagreement with LSMs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 4/4] certs: Adjustment due to 'Check whether openssl tool is available'
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] fs: Return raw xattr for security.* if there is size disagreement with LSMs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- RE: [PATCH] fs: Return raw xattr for security.* if there is size disagreement with LSMs
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH] fs: Return raw xattr for security.* if there is size disagreement with LSMs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: [PATCH] fs: Return raw xattr for security.* if there is size disagreement with LSMs
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH 2/2] tpm: Fix crash on tmprm release
- From: Vincent Whitchurch <vincent.whitchurch@xxxxxxxx>
- Re: [PATCH 1/2] tpm: Fix tpmrm reference counting
- From: Vincent Whitchurch <vincent.whitchurch@xxxxxxxx>
- Re: [PATCH 1/2] tpm: Fix tpmrm reference counting
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v19 05/13] of: Add a common kexec FDT setup function
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH] tpm2_load_command leaks memory
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH] tpm2_load_command leaks memory
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] fs: Return raw xattr for security.* if there is size disagreement with LSMs
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH] fs: Return raw xattr for security.* if there is size disagreement with LSMs
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v19 05/13] of: Add a common kexec FDT setup function
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v19 05/13] of: Add a common kexec FDT setup function
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH] tpm, tpm_tis: Acquire locality in tpm_tis_gen_interrupt() and tpm_get_timeouts()
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH v19 05/13] of: Add a common kexec FDT setup function
- From: nramas <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/8] tee: Improve support for kexec and kdump
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [PATCH v19 05/13] of: Add a common kexec FDT setup function
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: Recent tpm_tis IRQ handling changes are causing kernel backtraces
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v5 0/8] tee: Improve support for kexec and kdump
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 4/4] certs: Adjustment due to 'Check whether openssl tool is available'
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] tpm: Fix crash on tmprm release
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 4/4] certs: Adjustment due to 'Check whether openssl tool is available'
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 0/4] Add support for ECDSA-signed kernel modules
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 7/8] tpm_ftpm_tee: Free and unregister TEE shared memory during kexec
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: Recent tpm_tis IRQ handling changes are causing kernel backtraces
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm, tpm_tis: Acquire locality in tpm_tis_gen_interrupt() and tpm_get_timeouts()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v19 05/13] of: Add a common kexec FDT setup function
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH] tpm, tpm_tis: Acquire locality in tpm_tis_gen_interrupt() and tpm_get_timeouts()
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH 2/2] tpm: Fix crash on tmprm release
- From: Vincent Whitchurch <vincent.whitchurch@xxxxxxxx>
- [PATCH 1/2] tpm: Fix tpmrm reference counting
- From: Vincent Whitchurch <vincent.whitchurch@xxxxxxxx>
- Re: [PATCH v5 0/8] tee: Improve support for kexec and kdump
- From: Jens Wiklander <jens.wiklander@xxxxxxxxxx>
- Re: [PATCH v5 6/8] tee: Correct inappropriate usage of TEE_SHM_DMA_BUF flag
- From: Jens Wiklander <jens.wiklander@xxxxxxxxxx>
- Re: [PATCH v5 4/8] optee: Clear stale cache entries during initialization
- From: Jens Wiklander <jens.wiklander@xxxxxxxxxx>
- Re: [PATCH v5 0/8] tee: Improve support for kexec and kdump
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/8] tee: Improve support for kexec and kdump
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v5 8/8] firmware: tee_bnxt: Release TEE shm, session, and context during kexec
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 7/8] tpm_ftpm_tee: Free and unregister TEE shared memory during kexec
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 6/8] tee: Correct inappropriate usage of TEE_SHM_DMA_BUF flag
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 5/8] tee: add tee_shm_alloc_kernel_buf()
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 4/8] optee: Clear stale cache entries during initialization
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 3/8] optee: fix tee out of memory failure seen during kexec reboot
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 2/8] optee: Refuse to load the driver under the kdump kernel
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 1/8] optee: Fix memory leak when failing to register shm pages
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 0/8] tee: Improve support for kexec and kdump
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm, tpm_tis: Acquire locality in tpm_tis_gen_interrupt() and tpm_get_timeouts()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 0/3] DCP as trusted keys backend
- From: Richard Weinberger <richard@xxxxxx>
- [PATCH 2/3] KEYS: trusted: Introduce support for NXP DCP-based trusted keys
- From: Richard Weinberger <richard@xxxxxx>
- [PATCH 1/3] crypto: mxs-dcp: Add support for hardware provided keys
- From: Richard Weinberger <richard@xxxxxx>
- [PATCH 3/3] doc: trusted-encrypted: add DCP as new trust source
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCH v6 4/4] certs: Adjustment due to 'Check whether openssl tool is available'
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v6 4/4] certs: Adjustment due to 'Check whether openssl tool is available'
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 0/4] Add support for ECDSA-signed kernel modules
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 0/4] Add support for ECDSA-signed kernel modules
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v6 0/4] Add support for ECDSA-signed kernel modules
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 4/8] optee: Clear stale cache entries during initialization
- From: Jens Wiklander <jens.wiklander@xxxxxxxxxx>
- Re: [PATCH v4 4/8] optee: Clear stale cache entries during initialization
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: Recent tpm_tis IRQ handling changes are causing kernel backtraces
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v4 4/8] optee: Clear stale cache entries during initialization
- From: Jens Wiklander <jens.wiklander@xxxxxxxxxx>
- Re: [PATCH v4 3/8] optee: fix tee out of memory failure seen during kexec reboot
- From: Jens Wiklander <jens.wiklander@xxxxxxxxxx>
- Re: [PATCH v4 3/8] optee: fix tee out of memory failure seen during kexec reboot
- From: Jens Wiklander <jens.wiklander@xxxxxxxxxx>
- Re: [PATCH v4 6/8] tee: Support kernel shm registration without dma-buf backing
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v4 6/8] tee: Support kernel shm registration without dma-buf backing
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 6/8] tee: Support kernel shm registration without dma-buf backing
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH 1/2] ima: Fix warning: no previous prototype for function 'ima_add_kexec_buffer'
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 6/8] tee: Support kernel shm registration without dma-buf backing
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 6/8] tee: Support kernel shm registration without dma-buf backing
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 3/8] optee: fix tee out of memory failure seen during kexec reboot
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Size mismatch between vfs_getxattr_alloc() and vfs_getxattr()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v4 3/8] optee: fix tee out of memory failure seen during kexec reboot
- From: Jens Wiklander <jens.wiklander@xxxxxxxxxx>
- Re: [PATCH v4 2/8] optee: Refuse to load the driver under the kdump kernel
- From: Jens Wiklander <jens.wiklander@xxxxxxxxxx>
- Re: [PATCH v4 1/8] optee: Fix memory leak when failing to register shm pages
- From: Jens Wiklander <jens.wiklander@xxxxxxxxxx>
- Re: [PATCH v4 6/8] tee: Support kernel shm registration without dma-buf backing
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH 2/2] ima: Fix warning: no previous prototype for function 'ima_post_key_create_or_update'
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v27 15/25] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v27 13/25] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v27 12/25] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v27 11/25] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v27 10/25] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v27 05/25] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 8/8] firmware: tee_bnxt: Release TEE shm, session, and context during kexec
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 7/8] tpm_ftpm_tee: Free and unregister TEE shared memory during kexec
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 6/8] tee: Support kernel shm registration without dma-buf backing
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 5/8] tee: add tee_shm_alloc_kernel_buf()
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 4/8] optee: Clear stale cache entries during initialization
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 3/8] optee: fix tee out of memory failure seen during kexec reboot
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 2/8] optee: Refuse to load the driver under the kdump kernel
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 1/8] optee: Fix memory leak when failing to register shm pages
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 0/8] tee: Improve support for kexec and kdump
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 5/7] tee: Support shm registration without dma-buf backing
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 5/7] tee: Support shm registration without dma-buf backing
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: ima - wait for tpm load
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] ima: Fix warning: no previous prototype for function 'ima_post_key_create_or_update'
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 1/2] ima: Fix warning: no previous prototype for function 'ima_add_kexec_buffer'
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH 2/2] ima: Fix warning: no previous prototype for function 'ima_post_key_create_or_update'
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] ima: Fix warning: no previous prototype for function 'ima_add_kexec_buffer'
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: ima - wait for tpm load
- From: "Jorge Ramirez-Ortiz, Foundries" <jorge@xxxxxxxxxxxx>
- Re: ima - wait for tpm load
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm, tpm_tis: Acquire locality in tpm_tis_gen_interrupt() and tpm_get_timeouts()
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH v6 0/4] Add support for ECDSA-signed kernel modules
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v6 3/4] certs: Add support for using elliptic curve keys for signing modules
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v6 2/4] certs: Check whether openssl tool is available
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v6 1/4] certs: Trigger creation of RSA module signing key if it's not an RSA key
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v6 0/4] Add support for ECDSA-signed kernel modules
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v6 4/4] certs: Adjustment due to 'Check whether openssl tool is available'
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] tpm, tpm_tis: Acquire locality in tpm_tis_gen_interrupt() and tpm_get_timeouts()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 5/7] tee: Support shm registration without dma-buf backing
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v5 0/2] Add support for ECDSA-signed kernel modules
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] tpm, tpm_tis: Acquire locality in tpm_tis_gen_interrupt() and tpm_get_timeouts()
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH] tpm2_load_command leaks memory
- From: Dhiraj Shah <find.dhiraj@xxxxxxxxx>
- Re: [PATCH v5 0/2] Add support for ECDSA-signed kernel modules
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 5/7] tee: Support shm registration without dma-buf backing
- From: Jens Wiklander <jens.wiklander@xxxxxxxxxx>
- Re: [PATCH v3 5/7] tee: Support shm registration without dma-buf backing
- From: Allen Pais <apais@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 5/7] tee: Support shm registration without dma-buf backing
- From: Jens Wiklander <jens.wiklander@xxxxxxxxxx>
- Re: [PATCH v3 5/7] tee: Support shm registration without dma-buf backing
- From: Jens Wiklander <jens.wiklander@xxxxxxxxxx>
- ima - wait for tpm load
- From: "Jorge Ramirez-Ortiz, Foundries" <jorge@xxxxxxxxxxxx>
- Re: [PATCH v3] tpm: Replace WARN_ONCE() with dev_err_once() in tpm_tis_status()
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH v5 0/2] Add support for ECDSA-signed kernel modules
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3 5/7] tee: Support shm registration without dma-buf backing
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 5/7] tee: Support shm registration without dma-buf backing
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3] tpm: Replace WARN_ONCE() with dev_err_once() in tpm_tis_status()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 0/2] Add support for ECDSA-signed kernel modules
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm, tpm_tis: Acquire locality in tpm_tis_gen_interrupt() and tpm_get_timeouts()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/1] tpm_tis: Use DEFINE_RES_MEM() to simplify code
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 5/7] tee: Support shm registration without dma-buf backing
- From: Jens Wiklander <jens.wiklander@xxxxxxxxxx>
- Re: [PATCH v3 5/7] tee: Support shm registration without dma-buf backing
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v3 5/7] tee: Support shm registration without dma-buf backing
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 5/7] tee: Support shm registration without dma-buf backing
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v3 7/7] firmware: tee_bnxt: Release shm, session, and context during kexec
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 6/7] tpm_ftpm_tee: Free and unregister dynamic shared memory during kexec
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 5/7] tee: Support shm registration without dma-buf backing
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 4/7] optee: Clear stale cache entries during initialization
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 3/7] optee: fix tee out of memory failure seen during kexec reboot
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 2/7] optee: Refuse to load the driver under the kdump kernel
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 1/7] optee: Fix memory leak when failing to register shm pages
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 0/7] tee: Improve support for kexec and kdump
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH][next] ima: Fix fall-through warning for Clang
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 2/2] evm: output EVM digest calculation info
- From: nramas <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] ima: differentiate between EVM failures in the audit log
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 2/2] evm: output EVM digest calculation info
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 0/2] EVM: add some debugging info
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: [PATCH v3 0/6] evm: Prepare for moving to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 2/5] ima: Set correct casting types
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 3/5] ima/evm: Fix type mismatch
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 5/5] ima: Pass NULL instead of 0 to ima_get_action() in ima_file_mprotect()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 4/5] ima: Include header defining ima_post_key_create_or_update()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 1/5] doc: Fix warning in Documentation/security/IMA-templates.rst
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH][next] ima: Fix fall-through warning for Clang
- From: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
- RE: [integrity:next-integrity-testing 5/9] security/integrity/ima/ima_template_lib.c:616:22: sparse: sparse: incorrect type in assignment (different base types)
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- RE: [integrity:next-integrity-testing 5/9] security/integrity/ima/ima_template_lib.c:616:22: sparse: sparse: incorrect type in assignment (different base types)
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [integrity:next-integrity-testing 5/9] security/integrity/ima/ima_template_lib.c:616:22: sparse: sparse: incorrect type in assignment (different base types)
- From: kernel test robot <lkp@xxxxxxxxx>
- [integrity:next-integrity-testing 4/9] security/integrity/ima/ima_template_lib.c:571:28: sparse: sparse: incorrect type in assignment (different base types)
- From: kernel test robot <lkp@xxxxxxxxx>
- [integrity:next-integrity-testing 3/9] security/integrity/ima/ima_template_lib.c:100:44: sparse: sparse: cast to restricted __le16
- From: kernel test robot <lkp@xxxxxxxxx>
- RE: [RFC PATCH 1/2] ima: differentiate between EVM failures in the audit log
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [RFC PATCH 2/2] evm: output EVM digest calculation info needed for debugging
- From: nramas <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] evm: output EVM digest calculation info needed for debugging
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] evm: output EVM digest calculation info needed for debugging
- From: nramas <nramas@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH 2/2] evm: output EVM digest calculation info needed for debugging
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC PATCH 1/2] ima: differentiate between EVM failures in the audit log
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC PATCH 0/2] EVM: add some debugging info
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RESEND][PATCH v2 6/7] ima: Define new template evm-sig
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RESEND][PATCH v2 6/7] ima: Define new template evm-sig
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v2 6/7] ima: Define new template evm-sig
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 0/2] Add support for ECDSA-signed kernel modules
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] tpm, tpm_tis: Acquire locality in tpm_tis_gen_interrupt() and tpm_get_timeouts()
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH v2 0/1] tpm_tis: Use DEFINE_RES_MEM() to simplify code
- From: Zhen Lei <thunder.leizhen@xxxxxxxxxx>
- [PATCH v2 1/1] tpm_tis: Use DEFINE_RES_MEM() to simplify code
- From: Zhen Lei <thunder.leizhen@xxxxxxxxxx>
- Re: [PATCH v5 0/2] Add support for ECDSA-signed kernel modules
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/1] tpm_tis: Use DEFINE_RES_MEM() to simplify code
- From: "Leizhen (ThunderTown)" <thunder.leizhen@xxxxxxxxxx>
- Re: [PATCH 1/1] tpm_tis: Use DEFINE_RES_MEM() to simplify code
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm, tpm_tis: Acquire locality in tpm_tis_gen_interrupt() and tpm_get_timeouts()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v5 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v5 2/2] certs: Add support for using elliptic curve keys for signing modules
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v5 0/2] Add support for ECDSA-signed kernel modules
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] tpm_tis: Use DEFINE_RES_MEM() to simplify code
- From: "Leizhen (ThunderTown)" <thunder.leizhen@xxxxxxxxxx>
- Re: [PATCH] tpm, tpm_tis: Acquire locality in tpm_tis_gen_interrupt() and tpm_get_timeouts()
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: Recent tpm_tis IRQ handling changes are causing kernel backtraces
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: Recent tpm_tis IRQ handling changes are causing kernel backtraces
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH -next] tpm: fix some doc warnings in tpm1-cmd.c
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/1] tpm_tis: Use DEFINE_RES_MEM() to simplify code
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm: Replace WARN_ONCE() with dev_err_once() in tpm_tis_status()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: Replace WARN_ONCE() with dev_err_once() in tpm_tis_status()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RESEND][PATCH v2 5/7] ima: Define new template fields xattrnames, xattrlengths and xattrvalues
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Recent tpm_tis IRQ handling changes are causing kernel backtraces
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [RFC PATCH 0/3] Add additional MOK vars
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH -next] tpm: fix some doc warnings in tpm1-cmd.c
- From: Yang Yingliang <yangyingliang@xxxxxxxxxx>
- [PATCH v5 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v5 2/2] certs: Add support for using elliptic curve keys for signing modules
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v5 0/2] Add support for ECDSA-signed kernel modules
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RESEND][PATCH v2 5/7] ima: Define new template fields xattrnames, xattrlengths and xattrvalues
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 1/1] tpm_tis: Use DEFINE_RES_MEM() to simplify code
- From: Zhen Lei <thunder.leizhen@xxxxxxxxxx>
- [integrity:next-integrity-testing 18/20] security/integrity/ima/ima_template_lib.c:623:5: warning: no previous prototype for 'ima_eventinodexattrs_init_common'
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v4 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] certs: Add support for using elliptic curve keys for signing modules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/7] ima: Add template fields to verify EVM portable signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/7] crypto: fix a memory leak in sm2
- From: hongbo li <herbert.tencent@xxxxxxxxx>
- Good tests for IMA/EVM
- From: Denis Semakin <0xsemakin@xxxxxxxxx>
- Re: Recent tpm_tis IRQ handling changes are causing kernel backtraces
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v2] tpm: Replace WARN_ONCE() with dev_err_once() in tpm_tis_status()
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH] tpm_tis_spi: add missing SPI device ID entries
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2] tpm: Replace WARN_ONCE() with dev_err_once() in tpm_tis_status()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: Replace WARN_ONCE() with dev_err_once() in tpm_tis_status()
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Replace WARN_ONCE() with dev_err_once() in tpm_tis_status()
- From: Greg KH <greg@xxxxxxxxx>
- [PATCH] tpm: Replace WARN_ONCE() with dev_err_once() in tpm_tis_status()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm_tis_spi: add missing SPI device ID entries
- From: Peter Robinson <pbrobinson@xxxxxxxxx>
- Re: [PATCH] tpm_tis_spi: add missing SPI device ID entries
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v2 2/7] ima: Define new template fields iuid and igid
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 7/7] evm: Don't return an error in evm_write_xattrs() if audit is not enabled
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 6/7] ima: Define new template evm-sig
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 5/7] ima: Define new template fields xattrnames, xattrlengths and xattrvalues
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 4/7] evm: Verify portable signatures against all protected xattrs
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 3/7] ima: Define new template field imode
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 2/7] ima: Define new template fields iuid and igid
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 0/7] ima: Add template fields to verify EVM portable signatures
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 1/7] ima: Add ima_show_template_uint() template library function
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v2 1/7] crypto: fix a memory leak in sm2
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis_spi: add missing SPI device ID entries
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH v4] IMA: support for duplicate measurement records
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis_spi: add missing SPI device ID entries
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: Recent tpm_tis IRQ handling changes are causing kernel backtraces
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH] tpm_tis_spi: add missing SPI device ID entries
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: Recent tpm_tis IRQ handling changes are causing kernel backtraces
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2 7/7] crypto: add eddsa test vector
- From: Hongbo Li <herbert.tencent@xxxxxxxxx>
- [PATCH v2 6/7] crypto: ed25519 cert verification
- From: Hongbo Li <herbert.tencent@xxxxxxxxx>
- [PATCH v2 5/7] crypto: move common code in sm2 to ec_mpi.c and ec_mpi.h
- From: Hongbo Li <herbert.tencent@xxxxxxxxx>
- [PATCH v2 4/7] x509: add support for eddsa
- From: Hongbo Li <herbert.tencent@xxxxxxxxx>
- [PATCH v2 3/7] lib/mpi: export some common function
- From: Hongbo Li <herbert.tencent@xxxxxxxxx>
- [PATCH v2 2/7] lib/mpi: use kcalloc in mpi_resize
- From: Hongbo Li <herbert.tencent@xxxxxxxxx>
- [PATCH v2 1/7] crypto: fix a memory leak in sm2
- From: Hongbo Li <herbert.tencent@xxxxxxxxx>
- [PATCH v2 0/7] crypto: add eddsa support for x509
- From: Hongbo Li <herbert.tencent@xxxxxxxxx>
- RE: EVM gives no_label error due to security_kernfs_init_security
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: EVM gives no_label error due to security_kernfs_init_security
- From: Bighead Wang <ex200208049@xxxxxxxxx>
- Re: Recent tpm_tis IRQ handling changes are causing kernel backtraces
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v3] ima-evm-utils: Support SM2 algorithm for sign and verify
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH ima-evm-utils v3] ima-evm-utils: Support SM2 algorithm for sign and verify
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v3] ima-evm-utils: Support SM2 algorithm for sign and verify
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2] ima-evm-utils: Support SM2 algorithm for sign and verify
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] tpm2: add longer timeout for verify signature command
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4] tpm2: add longer timeout for verify signature command
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [ANNOUNCE][CFP] Linux Security Summit 2021
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH v4] add longer timeout for verify signature command
- From: amirmizi6@xxxxxxxxx
- [PATCH v4] tpm2: add longer timeout for verify signature command
- From: amirmizi6@xxxxxxxxx
- RE: EVM gives no_label error due to security_kernfs_init_security
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- EVM gives no_label error due to security_kernfs_init_security
- From: Bighead Wang <ex200208049@xxxxxxxxx>
- [PATCH v2 1/1] doc: add draft RFC for TPM Key format
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/1] draft RFC for TPM key format
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] tpm2: add longer timeout for verify signature command
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 6/7] ima: Introduce template field evmxattrs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 5/7] evm: Verify portable signatures against all protected xattrs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 0/1] draft RFC for TPM key format
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/3] Add additional MOK vars
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/3] Add additional MOK vars
- From: "Dr. Greg" <greg@xxxxxxxxxxxx>
- Re: [PATCH 0/1] draft RFC for TPM key format
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/3] Add additional MOK vars
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v3] tpm2: add longer timeout for verify signature command
- From: amirmizi6@xxxxxxxxx
- [PATCH v3] add longer timeout for verify signature command
- From: amirmizi6@xxxxxxxxx
- Re: [PATCH 0/1] draft RFC for TPM key format
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 0/4] Trusted Key policy for TPM 2.0
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/4] security: keys: trusted: add ability to specify arbitrary policy
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/4] security: keys: trusted: add PCR policy to TPM2 keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 1/1] doc: add draft RFC for TPM Key format
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 0/1] draft RFC for TPM key format
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v26 15/25] LSM: Ensure the correct LSM context releaser
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 0/4] Trusted Key policy for TPM 2.0
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v7 00/12] evm: Improve usability of portable signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] Trusted Key policy for TPM 2.0
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] Trusted Key policy for TPM 2.0
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] Trusted Key policy for TPM 2.0
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] Trusted Key policy for TPM 2.0
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] Trusted Key policy for TPM 2.0
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] Trusted Key policy for TPM 2.0
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/3] Add additional MOK vars
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 00/16] Rid W=1 warnings from Char
- From: Lee Jones <lee.jones@xxxxxxxxxx>
- Re: [PATCH 00/16] Rid W=1 warnings from Char
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/16] Rid W=1 warnings from Char
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/16] Rid W=1 warnings from Char
- From: Lee Jones <lee.jones@xxxxxxxxxx>
- RE: [PATCH v7 00/12] evm: Improve usability of portable signatures
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v3] char: tpm: move to use request_irq by IRQF_NO_AUTOEN flag
- From: "tiantao (H)" <tiantao6@xxxxxxxxxx>
- [PATCH 4/4] security: keys: trusted: implement authorization policy
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 3/4] security: keys: trusted: implement counter/timer policy
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 2/4] security: keys: trusted: add ability to specify arbitrary policy
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/4] security: keys: trusted: add PCR policy to TPM2 keys
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 0/4] Trusted Key policy for TPM 2.0
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/3] Add additional MOK vars
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v4] IMA: support for duplicate measurement records
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 00/12] evm: Improve usability of portable signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 08/16] char: tpm: tpm_ftpm_tee: Fix a couple of kernel-doc misdemeanours
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 07/16] char: tpm: tpm1-cmd: Fix a couple of misnamed functions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm2: add longer timeout for verify signature command
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] char: tpm: move to use request_irq by IRQF_NO_AUTOEN flag
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH 1/3] keys: Add ability to trust the platform keyring
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 00/16] Rid W=1 warnings from Char
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 08/16] char: tpm: tpm_ftpm_tee: Fix a couple of kernel-doc misdemeanours
- From: Lee Jones <lee.jones@xxxxxxxxxx>
- [PATCH 07/16] char: tpm: tpm1-cmd: Fix a couple of misnamed functions
- From: Lee Jones <lee.jones@xxxxxxxxxx>
- [PATCH 00/16] Rid W=1 warnings from Char
- From: Lee Jones <lee.jones@xxxxxxxxxx>
- Re: [RFC PATCH 0/3] Add additional MOK vars
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: [PATCH 3/7] ima: Introduce template fields mntuidmap and mntgidmap
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH 3/7] ima: Introduce template fields mntuidmap and mntgidmap
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 3/7] ima: Introduce template fields mntuidmap and mntgidmap
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 7/7] evm: Don't return an error in evm_write_xattrs() if audit is not enabled
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 6/7] ima: Introduce template field evmxattrs
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 5/7] evm: Verify portable signatures against all protected xattrs
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 0/7] ima: Add template fields to verify EVM portable signatures
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 4/7] ima: Introduce template field imode
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 3/7] ima: Introduce template fields mntuidmap and mntgidmap
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 2/7] ima: Introduce template fields iuid and igid
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 1/7] ima: Add ima_show_template_uint() template library function
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- RE: [RESEND][PATCH 05/12] evm: Introduce evm_hmac_disabled() to safely ignore verification errors
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RESEND][PATCH 05/12] evm: Introduce evm_hmac_disabled() to safely ignore verification errors
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [RFC PATCH 0/3] Add additional MOK vars
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH 0/3] Add additional MOK vars
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2] add longer timeout for verify signature command
- From: amirmizi6@xxxxxxxxx
- [PATCH v2] tpm2: add longer timeout for verify signature command
- From: amirmizi6@xxxxxxxxx
- Re: [RFC PATCH 0/3] Add additional MOK vars
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v3] char: tpm: move to use request_irq by IRQF_NO_AUTOEN flag
- From: Tian Tao <tiantao6@xxxxxxxxxxxxx>
- Re: [RESEND PATCH v2 1/1] char: tpm: move to use request_irq by IRQF_NO_AUTOEN flag
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [RFC PATCH 2/3] keys: Trust platform keyring if MokTrustPlatform found
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH 3/3] ima: Enable IMA SB Policy if MokIMAPolicy found
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH 1/3] keys: Add ability to trust the platform keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH 0/3] Add additional MOK vars
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Changes for module stacking in Linux integrity
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [RESEND PATCH v2 1/1] char: tpm: move to use request_irq by IRQF_NO_AUTOEN flag
- From: Tian Tao <tiantao6@xxxxxxxxxxxxx>
- Re: [PATCH v2 00/40] Use ASCII subset instead of UTF-8 alternate symbols
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v2 00/40] Use ASCII subset instead of UTF-8 alternate symbols
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH v2 00/40] Use ASCII subset instead of UTF-8 alternate symbols
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v2 00/40] Use ASCII subset instead of UTF-8 alternate symbols
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v7 12/12] ima: Don't remove security.ima if file must not be appraised
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v7 11/12] ima: Introduce template field evmsig and write to field sig as fallback
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v7 10/12] ima: Allow imasig requirement to be satisfied by EVM portable signatures
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v7 09/12] evm: Deprecate EVM_ALLOW_METADATA_WRITES
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v7 07/12] evm: Pass user namespace to set/remove xattr hooks
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v7 08/12] evm: Allow setxattr() and setattr() for unmodified metadata
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v7 06/12] evm: Allow xattr/attr operations for portable signatures
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v7 05/12] evm: Introduce evm_hmac_disabled() to safely ignore verification errors
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v7 04/12] evm: Introduce evm_revalidate_status()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v7 03/12] evm: Refuse EVM_ALLOW_METADATA_WRITES only if an HMAC key is loaded
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v7 01/12] evm: Execute evm_inode_init_security() only when an HMAC key is loaded
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v7 02/12] evm: Load EVM key in ima_load_x509() to avoid appraisal
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v7 00/12] evm: Improve usability of portable signatures
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v2 00/40] Use ASCII subset instead of UTF-8 alternate symbols
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH v2 00/40] Use ASCII subset instead of UTF-8 alternate symbols
- From: Edward Cree <ecree.xilinx@xxxxxxxxx>
- Re: [PATCH v2 00/40] Use ASCII subset instead of UTF-8 alternate symbols
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v2 00/40] Use ASCII subset instead of UTF-8 alternate symbols
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v26 15/25] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v26 13/25] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v26 12/25] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v26 11/25] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v26 10/25] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v26 05/25] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [GIT PULL] TPM DEVICE DRIVER changes for v5.13-rc2
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] TPM DEVICE DRIVER changes for v5.13-rc2
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/1] tpm: fix error return code in tpm2_get_cc_attrs_tbl()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 00/40] Use ASCII subset instead of UTF-8 alternate symbols
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v2 00/40] Use ASCII subset instead of UTF-8 alternate symbols
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v2 00/40] Use ASCII subset instead of UTF-8 alternate symbols
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH v2 00/40] Use ASCII subset instead of UTF-8 alternate symbols
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- [PATCH v2 0/1] tpm: fix error return code in tpm2_get_cc_attrs_tbl()
- From: Zhen Lei <thunder.leizhen@xxxxxxxxxx>
- [PATCH v2 1/1] tpm: fix error return code in tpm2_get_cc_attrs_tbl()
- From: Zhen Lei <thunder.leizhen@xxxxxxxxxx>
- [PATCH v2 23/40] docs: security: keys: trusted-encrypted.rst: Use ASCII subset instead of UTF-8 alternate symbols
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH v2 00/40] Use ASCII subset instead of UTF-8 alternate symbols
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- RE: [PATCH v6 10/11] ima: Introduce template field evmsig and write to field sig as fallback
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH 1/1] tpm: fix error return code in tpm2_get_cc_attrs_tbl()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm_tis_spi: set default probe function if device id not match
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/1] tpm: fix error return code in tpm2_get_cc_attrs_tbl()
- From: "Leizhen (ThunderTown)" <thunder.leizhen@xxxxxxxxxx>
- Re: [PATCH] tpm_tis_spi: set default probe function if device id not match
- From: 乱石 <zhangliguang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] trusted-keys: match tpm_get_ops on all return paths
- From: Ben Boeckel <me@xxxxxxxxxxxxxx>
- Re: Recent tpm_tis IRQ handling changes are causing kernel backtraces
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/1] trusted-keys: match tpm_get_ops on all return paths
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/1] trusted-keys: match tpm_get_ops on all return paths
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Extend locality handling to TPM2 in tpm_tis_gen_interrupt()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 10/11] ima: Introduce template field evmsig and write to field sig as fallback
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 08/11] evm: Allow setxattr() and setattr() for unmodified metadata
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 03/11] evm: Refuse EVM_ALLOW_METADATA_WRITES only if an HMAC key is loaded
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: [PATCH v6 08/11] evm: Allow setxattr() and setattr() for unmodified metadata
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v6 08/11] evm: Allow setxattr() and setattr() for unmodified metadata
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: [PATCH v6 08/11] evm: Allow setxattr() and setattr() for unmodified metadata
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- RE: [PATCH v6 03/11] evm: Refuse EVM_ALLOW_METADATA_WRITES only if an HMAC key is loaded
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v6 08/11] evm: Allow setxattr() and setattr() for unmodified metadata
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RESEND][PATCH v6 05/11] evm: Introduce evm_hmac_disabled() to safely ignore verification errors
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 04/11] evm: Introduce evm_status_revalidate()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 03/11] evm: Refuse EVM_ALLOW_METADATA_WRITES only if an HMAC key is loaded
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v6 3/3] ima-evm-utils: Read keyid from the cert appended to the key file
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v6 2/3] ima-evm-utils: Allow manual setting keyid from a cert file
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v6 1/3] ima-evm-utils: Allow manual setting keyid for signing
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v6 0/3] ima-evm-utils: Add --keyid option
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH 00/53] Get rid of UTF-8 chars that can be mapped as ASCII
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH 00/53] Get rid of UTF-8 chars that can be mapped as ASCII
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH 00/53] Get rid of UTF-8 chars that can be mapped as ASCII
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH 00/53] Get rid of UTF-8 chars that can be mapped as ASCII
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: Recent tpm_tis IRQ handling changes are causing kernel backtraces
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v2 1/1] trusted-keys: match tpm_get_ops on all return paths
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Extend locality handling to TPM2 in tpm_tis_gen_interrupt()
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH 00/53] Get rid of UTF-8 chars that can be mapped as ASCII
- From: Adam Borowski <kilobyte@xxxxxxxxxx>
- Re: [PATCH v2 1/1] trusted-keys: match tpm_get_ops on all return paths
- From: Ben Boeckel <me@xxxxxxxxxxxxxx>
- Re: [PATCH 00/53] Get rid of UTF-8 chars that can be mapped as ASCII
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- [PATCH v4] IMA: support for duplicate measurement records
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1] tpm2: add longer timeout for verify signature command
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 1/3] ima_keys.sh: Check policy only once
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: Recent tpm_tis IRQ handling changes are causing kernel backtraces
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 0/3] ima-evm-utils: Implement function to only create IMA signature
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 00/53] Get rid of UTF-8 chars that can be mapped as ASCII
- From: Edward Cree <ecree.xilinx@xxxxxxxxx>
- Re: [PATCH v4 1/3] ima_keys.sh: Check policy only once
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v1] tpm2: add longer timeout for verify signature command
- From: amirmizi6@xxxxxxxxx
- [PATCH v1] add longer timeout for verify signature command
- From: amirmizi6@xxxxxxxxx
- Re: [PATCH 00/53] Get rid of UTF-8 chars that can be mapped as ASCII
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH 00/53] Get rid of UTF-8 chars that can be mapped as ASCII
- From: Edward Cree <ecree.xilinx@xxxxxxxxx>
- Re: [PATCH 00/53] Get rid of UTF-8 chars that can be mapped as ASCII
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH 00/53] Get rid of UTF-8 chars that can be mapped as ASCII
- From: Ben Boeckel <me@xxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] ima-evm-utils: Implement function to only create IMA signature
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 00/53] Get rid of UTF-8 chars that can be mapped as ASCII
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH 00/53] Get rid of UTF-8 chars that can be mapped as ASCII
- From: Edward Cree <ecree.xilinx@xxxxxxxxx>
- [PATCH 1/2] tpm, tpm_tis: Extend locality handling to TPM2 in tpm_tis_gen_interrupt()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 2/2] tpm, tpm_tis: Reserve locality in tpm_tis_resume()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 00/53] Get rid of UTF-8 chars that can be mapped as ASCII
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [syzbot] possible deadlock in process_measurement (3)
- From: syzbot <syzbot+ccfcdc8958f74084f16d@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/53] Get rid of UTF-8 chars that can be mapped as ASCII
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH 00/53] Get rid of UTF-8 chars that can be mapped as ASCII
- From: Thorsten Leemhuis <linux@xxxxxxxxxxxxx>
- Re: [PATCH 00/53] Get rid of UTF-8 chars that can be mapped as ASCII
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH 00/53] Get rid of UTF-8 chars that can be mapped as ASCII
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 00/53] Get rid of UTF-8 chars that can be mapped as ASCII
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- [PATCH 32/53] docs: security: keys: trusted-encrypted.rst: avoid using UTF-8 chars
- From: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
- Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis_spi: set default probe function if device id not match
- From: 乱石 <zhangliguang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] tpm: fix error return code in tpm2_get_cc_attrs_tbl()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm_tis_spi: set default probe function if device id not match
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- Re: Recent tpm_tis IRQ handling changes are causing kernel backtraces
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 1/1] tpm: fix error return code in tpm2_get_cc_attrs_tbl()
- From: Zhen Lei <thunder.leizhen@xxxxxxxxxx>
- Re: [PATCH] tpm_tis_spi: set default probe function if device id not match
- From: 乱石 <zhangliguang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis_spi: set default probe function if device id not match
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v4 3/3] IMA: Add test for dm-crypt measurement
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v4 2/3] IMA: Generalize key measurement tests
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v4 1/3] ima_keys.sh: Check policy only once
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v4 0/3] IMA: Add test for dm-crypt measurement
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH] tpm_tis_spi: set default probe function if device id not match
- From: Liguang Zhang <zhangliguang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/3] ima-evm-utils: Add --keyid option
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RESEND][PATCH v6 05/11] evm: Introduce evm_hmac_disabled() to safely ignore verification errors
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v5 0/3] ima-evm-utils: Add --keyid option
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v5 2/3] ima-evm-utils: Allow manual setting keyid from a cert file
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 0/3] ima-evm-utils: Add --keyid option
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] IMA: Add test for dm-crypt measurement
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v5 3/3] ima-evm-utils: Read keyid from the cert appended to the key file
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v5 2/3] ima-evm-utils: Allow manual setting keyid from a cert file
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v5 1/3] ima-evm-utils: Allow manual setting keyid for signing
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v5 0/3] ima-evm-utils: Add --keyid option
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v4 2/3] ima-evm-utils: Allow manual setting keyid from a cert file
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v4 2/3] ima-evm-utils: Allow manual setting keyid from a cert file
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v4 3/3] ima-evm-utils: Read keyid from the cert appended to the key file
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/3] ima-evm-utils: Allow manual setting keyid from a cert file
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/4] tpm: Simplify locality handling
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 1/4] tpm: Use a threaded interrupt handler
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/3] ima-evm-utils: Allow manual setting keyid for signing
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v4 2/3] ima-evm-utils: Allow manual setting keyid from a cert file
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v4 2/3] ima-evm-utils: Allow manual setting keyid from a cert file
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v4 3/3] ima-evm-utils: Read keyid from the cert appended to the key file
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v4 3/3] ima-evm-utils: Read keyid from the cert appended to the key file
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v4 3/3] ima-evm-utils: Read keyid from the cert appended to the key file
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/3] ima-evm-utils: Allow manual setting keyid from a cert file
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 6/9] pm: hibernate: Optionally store and verify a hash of the image
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- Re: [PATCH 0/9] Enable hibernation when Lockdown is enabled
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [PATCH v6 11/11] ima: Don't remove security.ima if file must not be appraised
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v6 10/11] ima: Introduce template field evmsig and write to field sig as fallback
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v6 09/11] ima: Allow imasig requirement to be satisfied by EVM portable signatures
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v6 08/11] evm: Allow setxattr() and setattr() for unmodified metadata
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]