Linux Integrity
[Prev Page][Next Page]
- Re: [PATCH v9 6/9] crypto: Add NIST P384 curve parameters
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v9 0/4] Introduce TEE based Trusted Keys support
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v9 6/9] crypto: Add NIST P384 curve parameters
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 2/9] x509: Detect sm2 keys by their parameters OID
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH] IMA: Allow only ima-buf template for key measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 39/40] xfs: support idmapped mounts
- From: Christoph Hellwig <hch@xxxxxx>
- [GIT PULL] TPM DEVICE DRIVER changes for v5.12-rc2
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] ima: Fix the error code for restoring the PCR value
- From: Li Huafei <lihuafei1@xxxxxxxxxx>
- Re: [PATCH v19 00/13] Carry forward IMA measurement log on kexec on ARM64
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v19 00/13] Carry forward IMA measurement log on kexec on ARM64
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 06/20] ima: Manual replacement of the deprecated strlcpy() with return values
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: Replacing deprecated strlcpy with strscpy ~~~~~~~~~ Replace
- From: Palash Oswal <hello@xxxxxxxxxxxxxxx>
- [PATCH] x86/sgx: Replace section->init_laundry_list with a temp list
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v9 9/9] certs: Add support for using elliptic curve keys for signing modules
- From: yumeng <yumeng18@xxxxxxxxxx>
- Re: [PATCH v9 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 1/4] KEYS: trusted: Add generic trusted keys framework
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] tpm: Remove unintentional dump_stack() call
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 9/9] certs: Add support for using elliptic curve keys for signing modules
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Remove unintentional dump_stack() call
- From: Rikard Falkeborn <rikard.falkeborn@xxxxxxxxx>
- Re: [PATCH v6 39/40] xfs: support idmapped mounts
- From: "Darrick J. Wong" <djwong@xxxxxxxxxx>
- Re: [PATCH v6 39/40] xfs: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 02/11] evm: Load EVM key in ima_load_x509() to avoid appraisal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v9 4/4] MAINTAINERS: Add entry for TEE based Trusted Keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v9 3/4] doc: trusted-encrypted: updates with TEE as a new trust source
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v9 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v9 1/4] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v9 0/4] Introduce TEE based Trusted Keys support
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v9 9/9] certs: Add support for using elliptic curve keys for signing modules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Re: [PATCH] tpm: Add missing check in tpm_inf_recv
- From: dinghao.liu@xxxxxxxxxx
- Re: [PATCH] tpm: Add missing check in tpm_inf_recv
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm/ppi: Constify static struct attribute_group
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] tpm: Remove unintentional dump_stack() call
- [PATCH] tpm: Add missing check in tpm_inf_recv
- From: Dinghao Liu <dinghao.liu@xxxxxxxxxx>
- Re: [PATCH 2/9] tpm: Allow PCR 23 to be restricted to kernel-only use
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v9 9/9] certs: Add support for using elliptic curve keys for signing modules
- From: yumeng <yumeng18@xxxxxxxxxx>
- Re: [PATCH] tpm/ppi: Constify static struct attribute_group
- From: Rikard Falkeborn <rikard.falkeborn@xxxxxxxxx>
- Re: [PATCH 3/3] integrity: Load keys from TPM NV onto IMA keyring
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] integrity: Load keys from TPM NV onto IMA keyring
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] Load keys from TPM2 NV Index on IMA keyring
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] integrity: Allow specifying flags in integrity_load_cert
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] tpm: Add support for reading a TPM NV Index
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2] vio: make remove callback return void
- From: Uwe Kleine-König <uwe@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] tpm: Add support for reading a TPM NV Index
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] Load keys from TPM2 NV Index on IMA keyring
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/3] tpm: Add support for reading a TPM NV Index
- From: Patrick Uiterwijk <patrick@xxxxxxxxxxxxxx>
- [PATCH 3/3] integrity: Load keys from TPM NV onto IMA keyring
- From: Patrick Uiterwijk <patrick@xxxxxxxxxxxxxx>
- [PATCH 0/3] Load keys from TPM2 NV Index on IMA keyring
- From: Patrick Uiterwijk <patrick@xxxxxxxxxxxxxx>
- [PATCH 2/3] integrity: Allow specifying flags in integrity_load_cert
- From: Patrick Uiterwijk <patrick@xxxxxxxxxxxxxx>
- [PATCH v9 7/9] crypto: Add math to support fast NIST P384
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v9 1/9] crypto: Add support for ECDSA signature verification
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v9 8/9] ecdsa: Register NIST P384 and extend test suite
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v9 6/9] crypto: Add NIST P384 curve parameters
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v9 5/9] x509: Add OID for NIST P384 and extend parser for it
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v9 9/9] certs: Add support for using elliptic curve keys for signing modules
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v9 4/9] ima: Support EC keys for signature verification
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v9 3/9] x509: Add support for parsing x509 certs with ECDSA keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v9 2/9] x509: Detect sm2 keys by their parameters OID
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v9 0/9] Add support for x509 certs with NIST P384/256/192 keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] vio: make remove callback return void
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH v2] vio: make remove callback return void
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH 2/9] tpm: Allow PCR 23 to be restricted to kernel-only use
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH 3/9] security: keys: trusted: Parse out individual components of the key blob
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/9] tpm: Allow PCR 23 to be restricted to kernel-only use
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v7] tpm: fix reference counting for struct tpm_chip
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v6] tpm: fix reference counting for struct tpm_chip
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/3] add params and ids to support nist_p384
- From: Saulo Alessandre de Lima <saulo.alessandre@xxxxxxxxx>
- Re: [PATCH v2] vio: make remove callback return void
- From: Anatoly Pugachev <matorola@xxxxxxxxx>
- [PATCH v2] vio: make remove callback return void
- From: Uwe Kleine-König <uwe@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v19 05/13] of: Add a common kexec FDT setup function
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] IMA: Add test for dm-crypt measurement
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v19 05/13] of: Add a common kexec FDT setup function
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v19 04/13] x86: Use ELF fields defined in 'struct kimage'
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v19 04/13] x86: Use ELF fields defined in 'struct kimage'
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v19 03/13] powerpc: Use ELF fields defined in 'struct kimage'
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v19 02/13] arm64: Use ELF fields defined in 'struct kimage'
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v19 01/13] kexec: Move ELF fields to struct kimage
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v3] IMA: support for duplicate measurement records
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] IMA: Add test for dm-crypt measurement
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3] IMA: support for duplicate measurement records
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2 1/2] ima: Free IMA measurement buffer on error
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH] IMA: Add test for selinux measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 2/2] IMA: Add test for dm-crypt measurement
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v3 1/2] IMA: Generalize key measurement tests
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v3 0/2] IMA: Add test for dm-crypt measurement
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2 1/2] IMA: generalize key measurement tests
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH] IMA: Add test for selinux measurement
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH] IMA: Add test for selinux measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] IMA: Check for ima-buf template is not required for keys tests
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] IMA: Add test for selinux measurement
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH] IMA: Check for ima-buf template is not required for keys tests
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH] IMA: Check for ima-buf template is not required for keys tests
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] IMA: Check for ima-buf template is not required for keys tests
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH] docs: ABI: testing: ima_policy: Fixed missing bracket
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [PATCH v2 1/3] add params and ids to support nist_p384
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] IMA: generalize key measurement tests
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/3] adds math to support nist_p384 fast and changes routines to pass forward ecc_curve
- From: Saulo Alessandre <saulo.alessandre@xxxxxxxxx>
- [PATCH v2 3/3] adds nist_p384 register and unregister to support nist_p384 and tests
- From: Saulo Alessandre <saulo.alessandre@xxxxxxxxx>
- [PATCH v2 1/3] add params and ids to support nist_p384
- From: Saulo Alessandre <saulo.alessandre@xxxxxxxxx>
- Re: [PATCH v6 0/5] Enable root to update the blacklist keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH 00/20] Manual replacement of all strlcpy in favor of strscpy
- From: Shuah Khan <skhan@xxxxxxxxxxxxxxxxxxx>
- [PATCH 06/20] ima: Manual replacement of the deprecated strlcpy() with return values
- From: Romain Perier <romain.perier@xxxxxxxxx>
- [PATCH 00/20] Manual replacement of all strlcpy in favor of strscpy
- From: Romain Perier <romain.perier@xxxxxxxxx>
- Re: [PATCH] certs: Add support for using elliptic curve keys for signing modules
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 3/9] security: keys: trusted: Parse out individual components of the key blob
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH 5/9] security: keys: trusted: Allow storage of PCR values in creation data
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH 7/9] pm: hibernate: Optionally use TPM-backed keys to protect image integrity
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v2] IMA: support for duplicate data measurement
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] IMA: Add test for selinux measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH] IMA: Check for ima-buf template is not required for keys tests
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v18 03/11] of: Add a common kexec FDT setup function
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v18 03/11] of: Add a common kexec FDT setup function
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [GIT PULL] TPM DEVICE DRIVER changes for v5.12
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [GIT PULL] integrity subsystem updates for v5.12
- From: pr-tracker-bot@xxxxxxxxxx
- [PATCH 1/4] tpm: Use a threaded interrupt handler
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH 3/4] tpm: Fix test for interrupts
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH 4/4] tpm: Only enable supported irqs
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH 2/4] tpm: get locality before writing to TPM chip
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH 0/4] Fixes for TPM interrupt handling
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v7] tpm: fix reference counting for struct tpm_chip
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v7] TPM fixes
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH 5/9] security: keys: trusted: Allow storage of PCR values in creation data
- From: Ben Boeckel <me@xxxxxxxxxxxxxx>
- [PATCH v19 06/13] arm64: Use common of_kexec_alloc_and_setup_fdt()
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v19 05/13] of: Add a common kexec FDT setup function
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v19 07/13] powerpc: Use common of_kexec_alloc_and_setup_fdt()
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v19 10/13] powerpc: Move arch independent ima kexec functions to drivers/of/kexec.c
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v19 09/13] powerpc: Enable passing IMA log to next kernel on kexec
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v19 08/13] powerpc: Move ima buffer fields to struct kimage
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v19 11/13] kexec: Use fdt_appendprop_addrrange() to add ima buffer to FDT
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v19 13/13] arm64: Enable passing IMA log to next kernel on kexec
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v19 12/13] powerpc: Delete unused function delete_fdt_mem_rsv()
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v19 02/13] arm64: Use ELF fields defined in 'struct kimage'
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v19 04/13] x86: Use ELF fields defined in 'struct kimage'
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v19 03/13] powerpc: Use ELF fields defined in 'struct kimage'
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v19 00/13] Carry forward IMA measurement log on kexec on ARM64
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v19 01/13] kexec: Move ELF fields to struct kimage
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6] tpm: fix reference counting for struct tpm_chip
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 0/5] Enable root to update the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v6] tpm: fix reference counting for struct tpm_chip
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH 2/2] tpm, tpm_tis: Decorate tpm_tis_gen_interrupt() with request_locality()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 5/9] security: keys: trusted: Allow storage of PCR values in creation data
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 4/9] security: keys: trusted: Store the handle of a loaded key
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 3/9] security: keys: trusted: Parse out individual components of the key blob
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/9] tpm: Allow PCR 23 to be restricted to kernel-only use
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/9] tpm: Add support for in-kernel resetting of PCRs
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v15 0/5] TPM 2.0 trusted key rework
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 1/2] tpm, tpm_tis: Decorate tpm_get_timeouts() with request_locality()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 7/9] pm: hibernate: Optionally use TPM-backed keys to protect image integrity
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH 5/9] security: keys: trusted: Allow storage of PCR values in creation data
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH 6/9] pm: hibernate: Optionally store and verify a hash of the image
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH 9/9] pm: hibernate: seal the encryption key with a PCR policy
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH 8/9] pm: hibernate: Verify the digest encryption key
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH 7/9] pm: hibernate: Optionally use TPM-backed keys to protect image integrity
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH 4/9] security: keys: trusted: Store the handle of a loaded key
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH 2/9] tpm: Allow PCR 23 to be restricted to kernel-only use
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH 3/9] security: keys: trusted: Parse out individual components of the key blob
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH 1/9] tpm: Add support for in-kernel resetting of PCRs
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH 0/9] Enable hibernation when Lockdown is enabled
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [PATCH 1/3] add params and ids to support nist_p384
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] add mathematic to support fast nist_p384 and change routines to pass forward ecc_curve
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] add nist_p384 register and unregister to support nist_p384
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 3/3] add nist_p384 register and unregister to support nist_p384
- From: Saulo Alessandre <saulo.alessandre@xxxxxxxxx>
- [PATCH 2/3] add mathematic to support fast nist_p384 and change routines to pass forward ecc_curve
- From: Saulo Alessandre <saulo.alessandre@xxxxxxxxx>
- [PATCH 1/3] add params and ids to support nist_p384
- From: Saulo Alessandre <saulo.alessandre@xxxxxxxxx>
- [PATCH 1/3] add params and ids to support nist_p384
- From: Saulo Alessandre <saulo.alessandre@xxxxxxxxx>
- Re: [PATCH] of: error: 'const struct kimage' has no member named 'arch'
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v15 0/5] TPM 2.0 trusted key rework
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v15 0/5] TPM 2.0 trusted key rework
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] of: error: 'const struct kimage' has no member named 'arch'
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH] of: error: 'const struct kimage' has no member named 'arch'
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] of: error: 'const struct kimage' has no member named 'arch'
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH] ima: Replacing deprecated strlcpy with strscpy ~~~~~~~~~ Replace
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] of: error: 'const struct kimage' has no member named 'arch'
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] certs: Add support for using elliptic curve keys for signing modules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] certs: Add support for using elliptic curve keys for signing modules
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/5] keys: define build time generated ephemeral kernel CA key
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/5] ima: update kernel module signing process during build
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/5] keys: generate self-signed module signing key using CSR
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] keys: cleanup build time module signing keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2 5/5] ima: enable loading of build time generated key on .ima keyring
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] of: error: 'const struct kimage' has no member named 'arch'
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] of: error: 'const struct kimage' has no member named 'arch'
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH] of: error: 'const struct kimage' has no member named 'arch'
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v6] tpm: fix reference counting for struct tpm_chip
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v6] tpm: fix reference counting for struct tpm_chip
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RESEND v5] tpm: fix reference counting for struct tpm_chip
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] ima: Replacing deprecated strlcpy with strscpy
- From: Palash Oswal <hello@xxxxxxxxxxxxxxx>
- Re: [PATCH v4] tpm: fix reference counting for struct tpm_chip
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] of: error: 'const struct kimage' has no member named 'arch'
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] of: error: 'const struct kimage' has no member named 'arch'
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v3] IMA: support for duplicate measurement records
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] of: error: 'const struct kimage' has no member named 'arch'
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] of: error: 'const struct kimage' has no member named 'arch'
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 5/5] ima: enable loading of build time generated key on .ima keyring
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] of: error: 'const struct kimage' has no member named 'arch'
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] IMA: support for duplicate data measurement
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/5] keys: generate self-signed module signing key using CSR
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 4/5] keys: define build time generated ephemeral kernel CA key
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v2 5/5] ima: enable loading of build time generated key on .ima keyring
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v2 3/5] ima: update kernel module signing process during build
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v2 2/5] keys: generate self-signed module signing key using CSR
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v2 1/5] keys: cleanup build time module signing keys
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v2 0/5] ima: kernel build support for loading the kernel module signing key
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v6] TPM fixes
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v6] tpm: fix reference counting for struct tpm_chip
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH RESEND v5] tpm: fix reference counting for struct tpm_chip
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH ima-evm-utils v2] ima-evm-utils: Support SM2 algorithm for sign and verify
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [GIT PULL] TPM DEVICE DRIVER changes for v5.12
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4] tpm: fix reference counting for struct tpm_chip
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v18 00/10] Carry forward IMA measurement log on kexec on ARM64
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH] tpm, tpm_tis: Acquire locality in tpm_tis_gen_interrupt() and tpm_get_timeouts()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RESEND v5] tpm: fix reference counting for struct tpm_chip
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4] tpm: fix reference counting for struct tpm_chip
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] IMA: support for duplicate data measurement
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] IMA: support for duplicate data measurement
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] IMA: support for duplicate data measurement
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] IMA: support for duplicate data measurement
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm, tpm_tis: Acquire locality in tpm_tis_gen_interrupt() and tpm_get_timeouts()
- From: Lukasz Majczak <lma@xxxxxxxxxxxx>
- [PATCH v2] IMA: support for duplicate data measurement
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5] The following sequence of operations results in a refcount warning:
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH RESEND v5] tpm: fix reference counting for struct tpm_chip
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH RESEND v5] TPM fixes
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH v5] The following sequence of operations results in a refcount warning:
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v5] The following sequence of operations results in a refcount warning:
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v5] TPM fixes
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH v4] tpm: fix reference counting for struct tpm_chip
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH v4] tpm: fix reference counting for struct tpm_chip
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH v4] tpm: fix reference counting for struct tpm_chip
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH] tpm, tpm_tis: Acquire locality in tpm_tis_gen_interrupt() and tpm_get_timeouts()
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH v4] tpm: fix reference counting for struct tpm_chip
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH v4] tpm: fix reference counting for struct tpm_chip
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] tpm, tpm_tis: Acquire locality in tpm_tis_gen_interrupt() and tpm_get_timeouts()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- RE: [PATCH v4] tpm: fix reference counting for struct tpm_chip
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH] tpm, tpm_tis: Acquire locality in tpm_tis_gen_interrupt() and tpm_get_timeouts()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm, tpm_tis: Acquire locality in tpm_tis_gen_interrupt() and tpm_get_timeouts()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm, tpm_tis: Acquire locality in tpm_tis_gen_interrupt() and tpm_get_timeouts()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm, tpm_tis: Acquire locality in tpm_tis_gen_interrupt() and tpm_get_timeouts()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4] tpm: fix reference counting for struct tpm_chip
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4] tpm: fix reference counting for struct tpm_chip
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4] tpm: fix reference counting for struct tpm_chip
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm, tpm_tis: Acquire locality in tpm_tis_gen_interrupt() and tpm_get_timeouts()
- From: Lukasz Majczak <lma@xxxxxxxxxxxx>
- [GIT PULL] integrity subsystem updates for v5.12
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4] tpm: fix reference counting for struct tpm_chip
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] tpm, tpm_tis: Acquire locality in tpm_tis_gen_interrupt() and tpm_get_timeouts()
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH] tpm, tpm_tis: Acquire locality in tpm_tis_gen_interrupt() and tpm_get_timeouts()
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH] tpm, tpm_tis: Acquire locality in tpm_tis_gen_interrupt() and tpm_get_timeouts()
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: [PATCH] tpm, tpm_tis: Acquire locality in tpm_tis_gen_interrupt() and tpm_get_timeouts()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4] tpm: fix reference counting for struct tpm_chip
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm, tpm_tis: Acquire locality in tpm_tis_gen_interrupt() and tpm_get_timeouts()
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: TPM returned invalid status
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] tpm, tpm_tis: Acquire locality in tpm_tis_gen_interrupt() and tpm_get_timeouts()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: TPM returned invalid status
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v4] tpm: fix reference counting for struct tpm_chip
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v4] TPM fixes
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH v18 06/11] powerpc: Move ima buffer fields to struct kimage
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v18 05/11] powerpc: Use common of_kexec_alloc_and_setup_fdt()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v18 04/11] arm64: Use common of_kexec_alloc_and_setup_fdt()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v18 03/11] of: Add a common kexec FDT setup function
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v18 02/11] arm64: Rename kexec elf_headers_mem to elf_load_addr
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v18 01/11] powerpc: Rename kexec elfcorehdr_addr to elf_load_addr
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v8 1/4] crypto: Add support for ECDSA signature verification
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v8 4/4] ima: Support EC keys for signature verification
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v8 0/4] Add support for x509 certs with NIST p256 and p192 keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v8 2/4] x509: Detect sm2 keys by their parameters OID
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v8 3/4] x509: Add support for parsing x509 certs with ECDSA keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] integrity/ima: Provide Kconfig option for ima-modsig template
- From: Weiß, Michael <michael.weiss@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] integrity/ima: Provide Kconfig option for ima-modsig template
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 1/4] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v8 1/4] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH] integrity/ima: Provide Kconfig option for ima-modsig template
- From: Michael Weiß <michael.weiss@xxxxxxxxxxxxxxxxxxx>
- [PATCH] docs: ABI: testing: ima_policy: Fixed missing bracket
- From: Michael Weiß <michael.weiss@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: TPM returned invalid status
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v18 05/11] powerpc: Use common of_kexec_alloc_and_setup_fdt()
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v18 06/11] powerpc: Move ima buffer fields to struct kimage
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v18 07/11] powerpc: Enable passing IMA log to next kernel on kexec
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v18 08/11] powerpc: Move arch independent ima kexec functions to drivers/of/kexec.c
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v18 10/11] powerpc: Delete unused function delete_fdt_mem_rsv()
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v18 09/11] kexec: Use fdt_appendprop_addrrange() to add ima buffer to FDT
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v18 11/11] arm64: Enable passing IMA log to next kernel on kexec
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v18 04/11] arm64: Use common of_kexec_alloc_and_setup_fdt()
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v18 03/11] of: Add a common kexec FDT setup function
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v18 00/10] Carry forward IMA measurement log on kexec on ARM64
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v18 02/11] arm64: Rename kexec elf_headers_mem to elf_load_addr
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v18 01/11] powerpc: Rename kexec elfcorehdr_addr to elf_load_addr
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5] tpm_tis: Add missing tpm_request/relinquish_locality() calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 5/5] ima: enable loading of build time generated key to .ima keyring
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/5] keys: generate self-signed module signing key using CSR
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/5] keys: cleanup build time module signing keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: TPM V2: kernel panic on linux reboot
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: ibmvtpm: Avoid -EINTR error when IMA talks to TPM
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 1/5] keys: cleanup build time module signing keys
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v17 02/10] of: Add a common kexec FDT setup function
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH] ima-evm-utils: Prevent crash if pcr is invalid
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v17 02/10] of: Add a common kexec FDT setup function
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v17 02/10] of: Add a common kexec FDT setup function
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH] ima-evm-utils: Prevent crash if pcr is invalid
- From: Frank Sorenson <sorenson@xxxxxxxxxx>
- Re: [PATCH v17 02/10] of: Add a common kexec FDT setup function
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3] selinux: measure state and policy capabilities
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] integrity: Make function integrity_add_key() static
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v17 02/10] of: Add a common kexec FDT setup function
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v8 1/4] KEYS: trusted: Add generic trusted keys framework
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v15 3/5] security: keys: trusted: fix TPM2 authorizations
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5] tpm_tis: Add missing tpm_request/relinquish_locality() calls
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5] tpm_tis: Add missing tpm_request/relinquish_locality() calls
- From: Lukasz Majczak <lma@xxxxxxxxxxxx>
- Re: [PATCH v3 2/2] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 2/2] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: TPM returned invalid status
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: TPM returned invalid status
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: ibmvtpm: Avoid -EINTR error when IMA talks to TPM
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 4/5] keys: define build time generated ephemeral kernel CA key
- From: kernel test robot <lkp@xxxxxxxxx>
- AW: TPM V2: kernel panic on linux reboot
- From: "florian.manoel@xxxxxxxxxxx" <florian.manoel@xxxxxxxxxxx>
- Re: [PATCH 4/5] keys: define build time generated ephemeral kernel CA key
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: Fwd: Re: [PATCH v17 02/10] of: Add a common kexec FDT setup function
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: Fwd: Re: [PATCH v17 02/10] of: Add a common kexec FDT setup function
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: Fwd: Re: [PATCH v17 02/10] of: Add a common kexec FDT setup function
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v17 02/10] of: Add a common kexec FDT setup function
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v17 02/10] of: Add a common kexec FDT setup function
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v17 02/10] of: Add a common kexec FDT setup function
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: Fwd: Re: [PATCH v17 02/10] of: Add a common kexec FDT setup function
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: Fwd: Re: [PATCH v17 02/10] of: Add a common kexec FDT setup function
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 4/5] keys: define build time generated ephemeral kernel CA key
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 5/5] ima: enable loading of build time generated key to .ima keyring
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 4/5] keys: define build time generated ephemeral kernel CA key
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 2/5] keys: generate self-signed module signing key using CSR
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 1/5] keys: cleanup build time module signing keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 5/5] ima: enable loading of build time generated key to .ima keyring
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH 4/5] keys: define build time generated ephemeral kernel CA key
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH 3/5] ima: update kernel module signing process during build
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH 2/5] keys: generate self-signed module signing key using CSR
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH 1/5] keys: cleanup build time module signing keys
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH 0/5] ima: kernel build support for loading the kernel module signing key
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [PATCH v7 3/4] x509: Add support for parsing x509 certs with ECDSA keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: Fwd: Re: [PATCH v17 02/10] of: Add a common kexec FDT setup function
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Fwd: Re: [PATCH v17 02/10] of: Add a common kexec FDT setup function
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 3/4] x509: Add support for parsing x509 certs with ECDSA keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Should SKID be used as keyid in IMA signature?
- From: Dmitriy Gerasimov <d.gerasimov@xxxxxxxxxxxx>
- Recent tpm_tis IRQ handling changes are causing kernel backtraces
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v8 1/4] KEYS: trusted: Add generic trusted keys framework
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v7 3/4] x509: Add support for parsing x509 certs with ECDSA keys
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH ima-evm-utils] ima-evm-utils: ima_sign supports SM2 and SM3 algorithm combination
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH ima-evm-utils v2] ima-evm-utils: Support SM2 algorithm for sign and verify
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v17 10/10] arm64: Enable passing IMA log to next kernel on kexec
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v17 09/10] powerpc: Delete unused function delete_fdt_mem_rsv()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v17 07/10] powerpc: Move arch independent ima kexec functions to drivers/of/kexec.c
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: measure state and policy capabilities
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v17 06/10] powerpc: Enable passing IMA log to next kernel on kexec
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v17 04/10] powerpc: Use common of_kexec_alloc_and_setup_fdt()
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v17 04/10] powerpc: Use common of_kexec_alloc_and_setup_fdt()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: measure state and policy capabilities
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v17 03/10] arm64: Use common of_kexec_alloc_and_setup_fdt()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v17 02/10] of: Add a common kexec FDT setup function
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v17 00/10] Carry forward IMA measurement log on kexec on ARM64
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v17 00/10] Carry forward IMA measurement log on kexec on ARM64
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v17 00/10] Carry forward IMA measurement log on kexec on ARM64
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v17 00/10] Carry forward IMA measurement log on kexec on ARM64
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v17 05/10] powerpc: Move ima buffer fields to struct kimage
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v17 02/10] of: Add a common kexec FDT setup function
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v17 00/10] Carry forward IMA measurement log on kexec on ARM64
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v17 03/10] arm64: Use common of_kexec_alloc_and_setup_fdt()
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v17 02/10] of: Add a common kexec FDT setup function
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v17 05/10] powerpc: Move ima buffer fields to struct kimage
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v17 00/10] Carry forward IMA measurement log on kexec on ARM64
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v8 1/4] KEYS: trusted: Add generic trusted keys framework
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v15 3/5] security: keys: trusted: fix TPM2 authorizations
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v15 3/5] security: keys: trusted: fix TPM2 authorizations
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH v6 4/5] certs: Factor out the blacklist hash creation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v6 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v6 3/5] certs: Make blacklist_vet_description() more strict
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v6 1/5] tools/certs: Add print-cert-tbs-hash.sh
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v6 2/5] certs: Check that builtin blacklist hashes are valid
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v6 0/5] Enable root to update the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH -next] IMA: Make function ima_mok_init() static
- From: Wei Yongjun <weiyongjun1@xxxxxxxxxx>
- [PATCH] tpm: ibmvtpm: Avoid -EINTR error when IMA talks to TPM
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] support for duplicate measurement of integrity critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Persist ima logs to disk
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] IMA: add support to measure duplicate buffer for critical data hook
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] support for duplicate measurement of integrity critical data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] IMA: add policy condition to measure duplicate critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] support for duplicate measurement of integrity critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v17 08/10] kexec: Use fdt_appendprop_addrrange() to add ima buffer to FDT
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v17 05/10] powerpc: Move ima buffer fields to struct kimage
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v17 07/10] powerpc: Move arch independent ima kexec functions to drivers/of/kexec.c
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v17 09/10] powerpc: Delete unused function delete_fdt_mem_rsv()
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v17 10/10] arm64: Enable passing IMA log to next kernel on kexec
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v17 06/10] powerpc: Enable passing IMA log to next kernel on kexec
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v17 01/10] powerpc: Rename kexec elfcorehdr_addr to elf_headers_mem
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v17 03/10] arm64: Use common of_kexec_alloc_and_setup_fdt()
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v17 04/10] powerpc: Use common of_kexec_alloc_and_setup_fdt()
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v17 02/10] of: Add a common kexec FDT setup function
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v17 00/10] Carry forward IMA measurement log on kexec on ARM64
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Persist ima logs to disk
- From: Raphael Gianotti <raphgi@xxxxxxxxxxxxxxxxxxx>
- Re: [ima-evm-utils][PATCH] Limit comparing the calculated PCR value to just a single bank
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils][PATCH] Limit comparing the calculated PCR value to just a single bank
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH v3 2/2] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v2] ima-evm-utils: Improve ima_measurement matching on busy system with >1 banks
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2] ima-evm-utils: Improve ima_measurement matching on busy system with >1 banks
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: Jan Lübbe <jlu@xxxxxxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Reviews on v24 of the security module stacking code.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] support for duplicate measurement of integrity critical data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] IMA: add policy condition to measure duplicate critical data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] IMA: add support to measure duplicate buffer for critical data hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] support for duplicate measurement of integrity critical data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ANNOUNCE][CFP] Linux Security Summit 2021
- From: James Morris <jmorris@xxxxxxxxx>
- Re: TPM returned invalid status
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: Jan Lübbe <jlu@xxxxxxxxxxxxxx>
- Re: [PATCH v16 11/12] powerpc: Use OF alloc and free for FDT
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: TPM returned invalid status
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] ima-evm-utils: Improve ima_measurement matching on busy system with >1 banks
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2] tpm_tis_spi_main: set cs_change = 0 when timesout
- From: wanghongzhe <wanghongzhe@xxxxxxxxxx>
- Re: [PATCH 1/1] tpm_tis: handle -EPROBE_DEFER in tpm_tis_plat_probe()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v1] tpm_tis_spi_main: set cs_change = 0 when timesout
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: fix reference counting for struct tpm_chip
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v3 2/2] tpm: in tpm2_del_space check if ops pointer is still valid
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- TPM returned invalid status
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH v3 2/2] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v2 2/2] ima: Free IMA measurement buffer after kexec syscall
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] ima: Free IMA measurement buffer on error
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: fix reference counting for struct tpm_chip
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: fix reference counting for struct tpm_chip
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v3 1/2] tpm: fix reference counting for struct tpm_chip
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v3 1/2] tpm: fix reference counting for struct tpm_chip
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v3 1/2] tpm: fix reference counting for struct tpm_chip
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: fix reference counting for struct tpm_chip
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH 1/1] tpm_tis: handle -EPROBE_DEFER in tpm_tis_plat_probe()
- From: Dirk Gouders <dirk@xxxxxxxxxxx>
- [PATCH 0/1] tpm_tis: handle -EPROBE_DEFER in tpm_tis_plat_probe()
- From: Dirk Gouders <dirk@xxxxxxxxxxx>
- Re: [PATCH v3 2/2] tpm: in tpm2_del_space check if ops pointer is still valid
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] ima: Free IMA measurement buffer on error
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] tpm: in tpm2_del_space check if ops pointer is still valid
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] ima-evm-utils: Improve ima_measurement matching on busy system with >1 banks
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] ima: Free IMA measurement buffer on error
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] ima: Free IMA measurement buffer on error
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v3 1/2] tpm: fix reference counting for struct tpm_chip
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH v7 4/4] ima: Support EC keys for signature verification
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: fix reference counting for struct tpm_chip
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: fix reference counting for struct tpm_chip
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH v3 2/2] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- [PATCH v2] tpm_tis_spi_main: set cs_change = 0 when timesout
- From: wanghongzhe <wanghongzhe@xxxxxxxxxx>
- Re: [PATCH v1] tpm_tis_spi_main: set cs_change = 0 when timesout
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: fix reference counting for struct tpm_chip
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v1] tpm_tis_spi_main: set cs_change = 0 when timesout
- From: wanghongzhe <wanghongzhe@xxxxxxxxxx>
- Re: [PATCH v3 2/2] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm/ppi: Constify static struct attribute_group
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: fix reference counting for struct tpm_chip
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: fix reference counting for struct tpm_chip
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: fix reference counting for struct tpm_chip
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] tpm: in tpm2_del_space check if ops pointer is still valid
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v3 2/2] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v3 1/2] tpm: fix reference counting for struct tpm_chip
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v3 0/2] TPM fixes
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH v16 11/12] powerpc: Use OF alloc and free for FDT
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v16 11/12] powerpc: Use OF alloc and free for FDT
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v16 11/12] powerpc: Use OF alloc and free for FDT
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH] tpm/ppi: Constify static struct attribute_group
- From: Rikard Falkeborn <rikard.falkeborn@xxxxxxxxx>
- [PATCH v16 04/12] powerpc: Use common of_kexec_setup_new_fdt()
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v16 11/12] powerpc: Use OF alloc and free for FDT
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH v16 03/12] arm64: Use common of_kexec_setup_new_fdt()
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 00/12] Carry forward IMA measurement log on kexec on ARM64
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v16 10/12] arm64: Use OF alloc and free functions for FDT
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v2 1/2] ima: Free IMA measurement buffer on error
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/2] ima: Free IMA measurement buffer after kexec syscall
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 02/12] of: Add a common kexec FDT setup function
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 11/12] powerpc: Use OF alloc and free for FDT
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 12/12] arm64: Enable passing IMA log to next kernel on kexec
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 08/12] powerpc: Delete unused function delete_fdt_mem_rsv()
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 09/12] of: Define functions to allocate and free FDT
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 06/12] powerpc: Move arch independent ima kexec functions to drivers/of/kexec.c
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 07/12] kexec: Use fdt_appendprop_addrrange() to add ima buffer to FDT
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 05/12] powerpc: Move ima buffer fields to struct kimage
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 10/12] arm64: Use OF alloc and free functions for FDT
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 01/12] powerpc: Rename kexec elfcorehdr_addr to elf_headers_mem
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 1/4] crypto: Add support for ECDSA signature verification
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] vio: make remove callback return void
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] ima_evm_utils: Add tests for ECDSA signature checking
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 1/4] crypto: Add support for ECDSA signature verification
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v7 1/4] crypto: Add support for ECDSA signature verification
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/3] tpm: fix reference counting for struct tpm_chip
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC] Persist ima logs to disk
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] ima: Free IMA measurement buffer on error
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] ima: Free IMA measurement buffer after kexec syscall
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH v2 2/3] tpm: Provide a function tpm_chip_free() to free tpm chips
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH v2 1/3] tpm: fix reference counting for struct tpm_chip
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: Jan Lübbe <jlu@xxxxxxxxxxxxxx>
- Re: [PATCH v3] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Lukasz Majczak <lma@xxxxxxxxxxxx>
- Re: [PATCH v3] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Dirk Gouders <dirk@xxxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [RFC] Persist ima logs to disk
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v2 2/3] tpm: Provide a function tpm_chip_free() to free tpm chips
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 3/3] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/3] tpm: fix reference counting for struct tpm_chip
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC] Persist ima logs to disk
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: WARN_ONCE() -> pr_warn_once() in tpm_tis_status()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: WARN_ONCE() -> pr_warn_once() in tpm_tis_status()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: WARN_ONCE() -> pr_warn_once() in tpm_tis_status()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: WARN_ONCE() -> pr_warn_once() in tpm_tis_status()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: WARN_ONCE() -> pr_warn_once() in tpm_tis_status()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2] tpm: WARN_ONCE() -> dev_warn_once() in tpm_tis_status()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2 2/3] tpm: Provide a function tpm_chip_free() to free tpm chips
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v2 1/3] tpm: fix reference counting for struct tpm_chip
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v2 0/3] TPM fixes
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v2 3/3] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH] tpm: WARN_ONCE() -> pr_warn_once() in tpm_tis_status()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: WARN_ONCE() -> pr_warn_once() in tpm_tis_status()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v4] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Lukasz Majczak <lma@xxxxxxxxxxxx>
- Re: [PATCH v3] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Dirk Gouders <dirk@xxxxxxxxxxx>
- Re: [RFC] Persist ima logs to disk
- From: Raphael Gianotti <raphgi@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: WARN_ONCE() -> pr_warn_once() in tpm_tis_status()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] ima_evm_utils: Add tests for ECDSA signature checking
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: WARN_ONCE() -> pr_warn_once() in tpm_tis_status()
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH] tpm: WARN_ONCE() -> pr_warn_once() in tpm_tis_status()
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v3] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH v5 3/3] KEYS: trusted: Reserve TPM for seal and unseal operations
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: WARN_ONCE() -> pr_warn_once() in tpm_tis_status()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 1/2] ima_evm_utils: Fix calculation of keyid for older distros
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 2/2] ima_evm_utils: Add testing with elliptic curves prime192v1 and 256v1
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 0/2] ima_evm_utils: Add tests for ECDSA signature checking
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Lukasz Majczak <lma@xxxxxxxxxxxx>
- Re: [PATCH 2/2] dm crypt: support using trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH] tpm: WARN_ONCE() -> pr_warn_once() in tpm_tis_status()
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] tpm: WARN_ONCE() -> pr_warn_once() in tpm_tis_status()
- Re: [GIT PULL] tpmdd updates for v5.12-rc1
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC] Persist ima logs to disk
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: Jan Lübbe <jlu@xxxxxxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v5 2/4] x509: Detect sm2 keys by their parameters OID
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v5 2/4] x509: Detect sm2 keys by their parameters OID
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/4] x509: Detect sm2 keys by their parameters OID
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v5 2/4] x509: Detect sm2 keys by their parameters OID
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/4] x509: Detect sm2 keys by their parameters OID
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC] Persist ima logs to disk
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v7 0/4] Add support for x509 certs with NIST p256 and p192 keys
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/4] x509: Detect sm2 keys by their parameters OID
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] ima_evm_utils: Add testing with elliptic curves prime192v1 and 256v1
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH] ima_evm_utils: Add testing with elliptic curves prime192v1 and 256v1
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC] Persist ima logs to disk
- From: Raphael Gianotti <raphgi@xxxxxxxxxxxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v15 09/10] arm64: Call kmalloc() to allocate DTB buffer
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v5 0/5] Enable root to update the blacklist keyring
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v5 0/5] Enable root to update the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v5 0/5] Enable root to update the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v7 0/4] Add support for x509 certs with NIST p256 and p192 keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: Jan Lübbe <jlu@xxxxxxxxxxxxxx>
- Re: [PATCH v7 0/4] Add support for x509 certs with NIST p256 and p192 keys
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v7 0/4] Add support for x509 certs with NIST p256 and p192 keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v7 0/4] Add support for x509 certs with NIST p256 and p192 keys
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: Jan Lübbe <jlu@xxxxxxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: Jan Lübbe <jlu@xxxxxxxxxxxxxx>
- [PATCH v7 3/4] x509: Add support for parsing x509 certs with ECDSA keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v7 4/4] ima: Support EC keys for signature verification
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v7 2/4] x509: Detect sm2 keys by their parameters OID
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v7 1/4] crypto: Add support for ECDSA signature verification
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v7 0/4] Add support for x509 certs with NIST p256 and p192 keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/4] x509: Detect sm2 keys by their parameters OID
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/4] x509: Detect sm2 keys by their parameters OID
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v5 2/4] x509: Detect sm2 keys by their parameters OID
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/4] x509: Detect sm2 keys by their parameters OID
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v5 4/4] ima: Support EC keys for signature verification
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v5 0/5] Enable root to update the blacklist keyring
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v6 1/4] crypto: Add support for ECDSA signature verification
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v6 2/4] x509: Detect sm2 keys by their parameters OID
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] ima-evm-utils: ima_sign supports SM2 and SM3 algorithm combination
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for v5.12-rc1
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 2/4] x509: Detect sm2 keys by their parameters OID
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 4/4] ima: Support EC keys for signature verification
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] ima-evm-utils: ima_sign supports SM2 and SM3 algorithm combination
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 1/4] crypto: Add support for ECDSA signature verification
- From: yumeng <yumeng18@xxxxxxxxxx>
- [PATCH v6 1/4] crypto: Add support for ECDSA signature verification
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v6 4/4] ima: Support EC keys for signature verification
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v6 2/4] x509: Detect sm2 keys by their parameters OID
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v6 3/4] x509: Add support for parsing x509 certs with ECDSA keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v6 0/4] Add support for x509 certs with NIST p256 and p192 keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] ima-evm-utils: ima_sign supports SM2 and SM3 algorithm combination
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] ima-evm-utils: ima_sign supports SM2 and SM3 algorithm combination
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] ima-evm-utils: ima_sign supports SM2 and SM3 algorithm combination
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v5 1/3] KEYS: trusted: Fix incorrect handling of tpm_get_random()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 3/3] KEYS: trusted: Reserve TPM for seal and unseal operations
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: Jan Lübbe <jlu@xxxxxxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/3] KEYS: trusted: Fix migratable=1 failing
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Dirk Gouders <dirk@xxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- [PATCH ima-evm-utils] ima-evm-utils: ima_sign supports SM2 and SM3 algorithm combination
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH v5 3/3] KEYS: trusted: Reserve TPM for seal and unseal operations
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 3/3] KEYS: trusted: Reserve TPM for seal and unseal operations
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm: ibmvtpm: fix error return code in tpm_ibmvtpm_probe()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 0/5] Enable root to update the blacklist keyring
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 00/10] Enable root to update the blacklist keyring
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for v5.12-rc1
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for v5.12-rc1
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for v5.12-rc1
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v15 4/5] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v15 4/5] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 3/3] IMA: add support to measure duplicate buffer for critical data hook
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/3] IMA: update functions to read allow_dup policy condition
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/3] IMA: add policy condition to measure duplicate critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/3] support for duplicate measurement of integrity critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: TPM V2: kernel panic on linux reboot
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 1/4] crypto: Add support for ECDSA signature verification
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] vio: make remove callback return void
- From: Lijun Pan <lijunp213@xxxxxxxxx>
- Re: [PATCH] vio: make remove callback return void
- From: Tyrel Datwyler <tyreld@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: ibmvtpm: fix error return code in tpm_ibmvtpm_probe()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: ibmvtpm: fix error return code in tpm_ibmvtpm_probe()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2] selinux: measure state and policy capabilities
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for v5.12-rc1
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [GIT PULL] tpmdd updates for v5.12-rc1
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v5 3/3] KEYS: trusted: Reserve TPM for seal and unseal operations
- [PATCH v5 2/3] KEYS: trusted: Fix migratable=1 failing
- [PATCH v5 1/3] KEYS: trusted: Fix incorrect handling of tpm_get_random()
- [PATCH v5 0/3] KEYS, trusted: a bunch of bug fixes
- Re: [PATCH] vio: make remove callback return void
- From: Uwe Kleine-König <uwe@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/10] Enable root to update the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v4 00/10] Enable root to update the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v2] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Migration to trusted keys: sealing user-provided key?
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v4 00/10] Enable root to update the blacklist keyring
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH v2] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Lukasz Majczak <lma@xxxxxxxxxxxx>
- Re: [PATCH v15 0/5] TPM 2.0 trusted key rework
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: Bug: TPM returned invalid status
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v15 09/10] arm64: Call kmalloc() to allocate DTB buffer
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH v15 09/10] arm64: Call kmalloc() to allocate DTB buffer
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v15 09/10] arm64: Call kmalloc() to allocate DTB buffer
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v15 09/10] arm64: Call kmalloc() to allocate DTB buffer
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]