Linux Integrity
[Prev Page][Next Page]
- [PATCH v2 1/5] keys: cleanup build time module signing keys
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v2 0/5] ima: kernel build support for loading the kernel module signing key
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v6] TPM fixes
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v6] tpm: fix reference counting for struct tpm_chip
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH RESEND v5] tpm: fix reference counting for struct tpm_chip
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH ima-evm-utils v2] ima-evm-utils: Support SM2 algorithm for sign and verify
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [GIT PULL] TPM DEVICE DRIVER changes for v5.12
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4] tpm: fix reference counting for struct tpm_chip
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v18 00/10] Carry forward IMA measurement log on kexec on ARM64
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH] tpm, tpm_tis: Acquire locality in tpm_tis_gen_interrupt() and tpm_get_timeouts()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RESEND v5] tpm: fix reference counting for struct tpm_chip
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4] tpm: fix reference counting for struct tpm_chip
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] IMA: support for duplicate data measurement
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] IMA: support for duplicate data measurement
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] IMA: support for duplicate data measurement
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] IMA: support for duplicate data measurement
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm, tpm_tis: Acquire locality in tpm_tis_gen_interrupt() and tpm_get_timeouts()
- From: Lukasz Majczak <lma@xxxxxxxxxxxx>
- [PATCH v2] IMA: support for duplicate data measurement
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5] The following sequence of operations results in a refcount warning:
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH RESEND v5] tpm: fix reference counting for struct tpm_chip
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH RESEND v5] TPM fixes
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH v5] The following sequence of operations results in a refcount warning:
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v5] The following sequence of operations results in a refcount warning:
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v5] TPM fixes
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH v4] tpm: fix reference counting for struct tpm_chip
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH v4] tpm: fix reference counting for struct tpm_chip
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH v4] tpm: fix reference counting for struct tpm_chip
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH] tpm, tpm_tis: Acquire locality in tpm_tis_gen_interrupt() and tpm_get_timeouts()
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH v4] tpm: fix reference counting for struct tpm_chip
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH v4] tpm: fix reference counting for struct tpm_chip
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] tpm, tpm_tis: Acquire locality in tpm_tis_gen_interrupt() and tpm_get_timeouts()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- RE: [PATCH v4] tpm: fix reference counting for struct tpm_chip
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH] tpm, tpm_tis: Acquire locality in tpm_tis_gen_interrupt() and tpm_get_timeouts()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm, tpm_tis: Acquire locality in tpm_tis_gen_interrupt() and tpm_get_timeouts()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm, tpm_tis: Acquire locality in tpm_tis_gen_interrupt() and tpm_get_timeouts()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm, tpm_tis: Acquire locality in tpm_tis_gen_interrupt() and tpm_get_timeouts()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4] tpm: fix reference counting for struct tpm_chip
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4] tpm: fix reference counting for struct tpm_chip
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4] tpm: fix reference counting for struct tpm_chip
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm, tpm_tis: Acquire locality in tpm_tis_gen_interrupt() and tpm_get_timeouts()
- From: Lukasz Majczak <lma@xxxxxxxxxxxx>
- [GIT PULL] integrity subsystem updates for v5.12
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4] tpm: fix reference counting for struct tpm_chip
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] tpm, tpm_tis: Acquire locality in tpm_tis_gen_interrupt() and tpm_get_timeouts()
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH] tpm, tpm_tis: Acquire locality in tpm_tis_gen_interrupt() and tpm_get_timeouts()
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH] tpm, tpm_tis: Acquire locality in tpm_tis_gen_interrupt() and tpm_get_timeouts()
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: [PATCH] tpm, tpm_tis: Acquire locality in tpm_tis_gen_interrupt() and tpm_get_timeouts()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4] tpm: fix reference counting for struct tpm_chip
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm, tpm_tis: Acquire locality in tpm_tis_gen_interrupt() and tpm_get_timeouts()
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: TPM returned invalid status
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] tpm, tpm_tis: Acquire locality in tpm_tis_gen_interrupt() and tpm_get_timeouts()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: TPM returned invalid status
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v4] tpm: fix reference counting for struct tpm_chip
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v4] TPM fixes
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH v18 06/11] powerpc: Move ima buffer fields to struct kimage
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v18 05/11] powerpc: Use common of_kexec_alloc_and_setup_fdt()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v18 04/11] arm64: Use common of_kexec_alloc_and_setup_fdt()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v18 03/11] of: Add a common kexec FDT setup function
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v18 02/11] arm64: Rename kexec elf_headers_mem to elf_load_addr
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v18 01/11] powerpc: Rename kexec elfcorehdr_addr to elf_load_addr
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v8 1/4] crypto: Add support for ECDSA signature verification
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v8 4/4] ima: Support EC keys for signature verification
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v8 0/4] Add support for x509 certs with NIST p256 and p192 keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v8 2/4] x509: Detect sm2 keys by their parameters OID
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v8 3/4] x509: Add support for parsing x509 certs with ECDSA keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] integrity/ima: Provide Kconfig option for ima-modsig template
- From: Weiß, Michael <michael.weiss@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] integrity/ima: Provide Kconfig option for ima-modsig template
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 1/4] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v8 1/4] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH] integrity/ima: Provide Kconfig option for ima-modsig template
- From: Michael Weiß <michael.weiss@xxxxxxxxxxxxxxxxxxx>
- [PATCH] docs: ABI: testing: ima_policy: Fixed missing bracket
- From: Michael Weiß <michael.weiss@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: TPM returned invalid status
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v18 05/11] powerpc: Use common of_kexec_alloc_and_setup_fdt()
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v18 06/11] powerpc: Move ima buffer fields to struct kimage
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v18 07/11] powerpc: Enable passing IMA log to next kernel on kexec
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v18 08/11] powerpc: Move arch independent ima kexec functions to drivers/of/kexec.c
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v18 10/11] powerpc: Delete unused function delete_fdt_mem_rsv()
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v18 09/11] kexec: Use fdt_appendprop_addrrange() to add ima buffer to FDT
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v18 11/11] arm64: Enable passing IMA log to next kernel on kexec
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v18 04/11] arm64: Use common of_kexec_alloc_and_setup_fdt()
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v18 03/11] of: Add a common kexec FDT setup function
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v18 00/10] Carry forward IMA measurement log on kexec on ARM64
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v18 02/11] arm64: Rename kexec elf_headers_mem to elf_load_addr
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v18 01/11] powerpc: Rename kexec elfcorehdr_addr to elf_load_addr
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5] tpm_tis: Add missing tpm_request/relinquish_locality() calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 5/5] ima: enable loading of build time generated key to .ima keyring
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/5] keys: generate self-signed module signing key using CSR
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/5] keys: cleanup build time module signing keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: TPM V2: kernel panic on linux reboot
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: ibmvtpm: Avoid -EINTR error when IMA talks to TPM
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 1/5] keys: cleanup build time module signing keys
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v17 02/10] of: Add a common kexec FDT setup function
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH] ima-evm-utils: Prevent crash if pcr is invalid
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v17 02/10] of: Add a common kexec FDT setup function
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v17 02/10] of: Add a common kexec FDT setup function
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH] ima-evm-utils: Prevent crash if pcr is invalid
- From: Frank Sorenson <sorenson@xxxxxxxxxx>
- Re: [PATCH v17 02/10] of: Add a common kexec FDT setup function
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3] selinux: measure state and policy capabilities
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] integrity: Make function integrity_add_key() static
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v17 02/10] of: Add a common kexec FDT setup function
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v8 1/4] KEYS: trusted: Add generic trusted keys framework
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v15 3/5] security: keys: trusted: fix TPM2 authorizations
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5] tpm_tis: Add missing tpm_request/relinquish_locality() calls
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5] tpm_tis: Add missing tpm_request/relinquish_locality() calls
- From: Lukasz Majczak <lma@xxxxxxxxxxxx>
- Re: [PATCH v3 2/2] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 2/2] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: TPM returned invalid status
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: TPM returned invalid status
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: ibmvtpm: Avoid -EINTR error when IMA talks to TPM
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 4/5] keys: define build time generated ephemeral kernel CA key
- From: kernel test robot <lkp@xxxxxxxxx>
- AW: TPM V2: kernel panic on linux reboot
- From: "florian.manoel@xxxxxxxxxxx" <florian.manoel@xxxxxxxxxxx>
- Re: [PATCH 4/5] keys: define build time generated ephemeral kernel CA key
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: Fwd: Re: [PATCH v17 02/10] of: Add a common kexec FDT setup function
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: Fwd: Re: [PATCH v17 02/10] of: Add a common kexec FDT setup function
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: Fwd: Re: [PATCH v17 02/10] of: Add a common kexec FDT setup function
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v17 02/10] of: Add a common kexec FDT setup function
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v17 02/10] of: Add a common kexec FDT setup function
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v17 02/10] of: Add a common kexec FDT setup function
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: Fwd: Re: [PATCH v17 02/10] of: Add a common kexec FDT setup function
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: Fwd: Re: [PATCH v17 02/10] of: Add a common kexec FDT setup function
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 4/5] keys: define build time generated ephemeral kernel CA key
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 5/5] ima: enable loading of build time generated key to .ima keyring
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 4/5] keys: define build time generated ephemeral kernel CA key
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 2/5] keys: generate self-signed module signing key using CSR
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 1/5] keys: cleanup build time module signing keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 5/5] ima: enable loading of build time generated key to .ima keyring
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH 4/5] keys: define build time generated ephemeral kernel CA key
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH 3/5] ima: update kernel module signing process during build
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH 2/5] keys: generate self-signed module signing key using CSR
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH 1/5] keys: cleanup build time module signing keys
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH 0/5] ima: kernel build support for loading the kernel module signing key
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [PATCH v7 3/4] x509: Add support for parsing x509 certs with ECDSA keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: Fwd: Re: [PATCH v17 02/10] of: Add a common kexec FDT setup function
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Fwd: Re: [PATCH v17 02/10] of: Add a common kexec FDT setup function
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 3/4] x509: Add support for parsing x509 certs with ECDSA keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Should SKID be used as keyid in IMA signature?
- From: Dmitriy Gerasimov <d.gerasimov@xxxxxxxxxxxx>
- Recent tpm_tis IRQ handling changes are causing kernel backtraces
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v8 1/4] KEYS: trusted: Add generic trusted keys framework
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v7 3/4] x509: Add support for parsing x509 certs with ECDSA keys
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH ima-evm-utils] ima-evm-utils: ima_sign supports SM2 and SM3 algorithm combination
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH ima-evm-utils v2] ima-evm-utils: Support SM2 algorithm for sign and verify
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v17 10/10] arm64: Enable passing IMA log to next kernel on kexec
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v17 09/10] powerpc: Delete unused function delete_fdt_mem_rsv()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v17 07/10] powerpc: Move arch independent ima kexec functions to drivers/of/kexec.c
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: measure state and policy capabilities
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v17 06/10] powerpc: Enable passing IMA log to next kernel on kexec
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v17 04/10] powerpc: Use common of_kexec_alloc_and_setup_fdt()
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v17 04/10] powerpc: Use common of_kexec_alloc_and_setup_fdt()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: measure state and policy capabilities
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v17 03/10] arm64: Use common of_kexec_alloc_and_setup_fdt()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v17 02/10] of: Add a common kexec FDT setup function
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v17 00/10] Carry forward IMA measurement log on kexec on ARM64
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v17 00/10] Carry forward IMA measurement log on kexec on ARM64
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v17 00/10] Carry forward IMA measurement log on kexec on ARM64
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v17 00/10] Carry forward IMA measurement log on kexec on ARM64
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v17 05/10] powerpc: Move ima buffer fields to struct kimage
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v17 02/10] of: Add a common kexec FDT setup function
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v17 00/10] Carry forward IMA measurement log on kexec on ARM64
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v17 03/10] arm64: Use common of_kexec_alloc_and_setup_fdt()
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v17 02/10] of: Add a common kexec FDT setup function
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v17 05/10] powerpc: Move ima buffer fields to struct kimage
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v17 00/10] Carry forward IMA measurement log on kexec on ARM64
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v8 1/4] KEYS: trusted: Add generic trusted keys framework
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v15 3/5] security: keys: trusted: fix TPM2 authorizations
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v15 3/5] security: keys: trusted: fix TPM2 authorizations
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH v6 4/5] certs: Factor out the blacklist hash creation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v6 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v6 3/5] certs: Make blacklist_vet_description() more strict
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v6 1/5] tools/certs: Add print-cert-tbs-hash.sh
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v6 2/5] certs: Check that builtin blacklist hashes are valid
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v6 0/5] Enable root to update the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH -next] IMA: Make function ima_mok_init() static
- From: Wei Yongjun <weiyongjun1@xxxxxxxxxx>
- [PATCH] tpm: ibmvtpm: Avoid -EINTR error when IMA talks to TPM
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] support for duplicate measurement of integrity critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Persist ima logs to disk
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] IMA: add support to measure duplicate buffer for critical data hook
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] support for duplicate measurement of integrity critical data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] IMA: add policy condition to measure duplicate critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] support for duplicate measurement of integrity critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v17 08/10] kexec: Use fdt_appendprop_addrrange() to add ima buffer to FDT
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v17 05/10] powerpc: Move ima buffer fields to struct kimage
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v17 07/10] powerpc: Move arch independent ima kexec functions to drivers/of/kexec.c
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v17 09/10] powerpc: Delete unused function delete_fdt_mem_rsv()
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v17 10/10] arm64: Enable passing IMA log to next kernel on kexec
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v17 06/10] powerpc: Enable passing IMA log to next kernel on kexec
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v17 01/10] powerpc: Rename kexec elfcorehdr_addr to elf_headers_mem
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v17 03/10] arm64: Use common of_kexec_alloc_and_setup_fdt()
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v17 04/10] powerpc: Use common of_kexec_alloc_and_setup_fdt()
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v17 02/10] of: Add a common kexec FDT setup function
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v17 00/10] Carry forward IMA measurement log on kexec on ARM64
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Persist ima logs to disk
- From: Raphael Gianotti <raphgi@xxxxxxxxxxxxxxxxxxx>
- Re: [ima-evm-utils][PATCH] Limit comparing the calculated PCR value to just a single bank
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils][PATCH] Limit comparing the calculated PCR value to just a single bank
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH v3 2/2] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v2] ima-evm-utils: Improve ima_measurement matching on busy system with >1 banks
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2] ima-evm-utils: Improve ima_measurement matching on busy system with >1 banks
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: Jan Lübbe <jlu@xxxxxxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Reviews on v24 of the security module stacking code.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] support for duplicate measurement of integrity critical data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] IMA: add policy condition to measure duplicate critical data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] IMA: add support to measure duplicate buffer for critical data hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] support for duplicate measurement of integrity critical data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ANNOUNCE][CFP] Linux Security Summit 2021
- From: James Morris <jmorris@xxxxxxxxx>
- Re: TPM returned invalid status
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: Jan Lübbe <jlu@xxxxxxxxxxxxxx>
- Re: [PATCH v16 11/12] powerpc: Use OF alloc and free for FDT
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: TPM returned invalid status
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] ima-evm-utils: Improve ima_measurement matching on busy system with >1 banks
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2] tpm_tis_spi_main: set cs_change = 0 when timesout
- From: wanghongzhe <wanghongzhe@xxxxxxxxxx>
- Re: [PATCH 1/1] tpm_tis: handle -EPROBE_DEFER in tpm_tis_plat_probe()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v1] tpm_tis_spi_main: set cs_change = 0 when timesout
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: fix reference counting for struct tpm_chip
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v3 2/2] tpm: in tpm2_del_space check if ops pointer is still valid
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- TPM returned invalid status
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH v3 2/2] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v2 2/2] ima: Free IMA measurement buffer after kexec syscall
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] ima: Free IMA measurement buffer on error
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: fix reference counting for struct tpm_chip
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: fix reference counting for struct tpm_chip
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v3 1/2] tpm: fix reference counting for struct tpm_chip
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v3 1/2] tpm: fix reference counting for struct tpm_chip
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v3 1/2] tpm: fix reference counting for struct tpm_chip
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: fix reference counting for struct tpm_chip
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH 1/1] tpm_tis: handle -EPROBE_DEFER in tpm_tis_plat_probe()
- From: Dirk Gouders <dirk@xxxxxxxxxxx>
- [PATCH 0/1] tpm_tis: handle -EPROBE_DEFER in tpm_tis_plat_probe()
- From: Dirk Gouders <dirk@xxxxxxxxxxx>
- Re: [PATCH v3 2/2] tpm: in tpm2_del_space check if ops pointer is still valid
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] ima: Free IMA measurement buffer on error
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] tpm: in tpm2_del_space check if ops pointer is still valid
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] ima-evm-utils: Improve ima_measurement matching on busy system with >1 banks
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] ima: Free IMA measurement buffer on error
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] ima: Free IMA measurement buffer on error
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v3 1/2] tpm: fix reference counting for struct tpm_chip
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH v7 4/4] ima: Support EC keys for signature verification
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: fix reference counting for struct tpm_chip
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: fix reference counting for struct tpm_chip
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH v3 2/2] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- [PATCH v2] tpm_tis_spi_main: set cs_change = 0 when timesout
- From: wanghongzhe <wanghongzhe@xxxxxxxxxx>
- Re: [PATCH v1] tpm_tis_spi_main: set cs_change = 0 when timesout
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: fix reference counting for struct tpm_chip
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v1] tpm_tis_spi_main: set cs_change = 0 when timesout
- From: wanghongzhe <wanghongzhe@xxxxxxxxxx>
- Re: [PATCH v3 2/2] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm/ppi: Constify static struct attribute_group
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: fix reference counting for struct tpm_chip
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: fix reference counting for struct tpm_chip
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: fix reference counting for struct tpm_chip
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] tpm: in tpm2_del_space check if ops pointer is still valid
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v3 2/2] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v3 1/2] tpm: fix reference counting for struct tpm_chip
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v3 0/2] TPM fixes
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH v16 11/12] powerpc: Use OF alloc and free for FDT
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v16 11/12] powerpc: Use OF alloc and free for FDT
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v16 11/12] powerpc: Use OF alloc and free for FDT
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH] tpm/ppi: Constify static struct attribute_group
- From: Rikard Falkeborn <rikard.falkeborn@xxxxxxxxx>
- [PATCH v16 04/12] powerpc: Use common of_kexec_setup_new_fdt()
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v16 11/12] powerpc: Use OF alloc and free for FDT
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH v16 03/12] arm64: Use common of_kexec_setup_new_fdt()
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 00/12] Carry forward IMA measurement log on kexec on ARM64
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v16 10/12] arm64: Use OF alloc and free functions for FDT
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v2 1/2] ima: Free IMA measurement buffer on error
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/2] ima: Free IMA measurement buffer after kexec syscall
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 02/12] of: Add a common kexec FDT setup function
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 11/12] powerpc: Use OF alloc and free for FDT
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 12/12] arm64: Enable passing IMA log to next kernel on kexec
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 08/12] powerpc: Delete unused function delete_fdt_mem_rsv()
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 09/12] of: Define functions to allocate and free FDT
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 06/12] powerpc: Move arch independent ima kexec functions to drivers/of/kexec.c
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 07/12] kexec: Use fdt_appendprop_addrrange() to add ima buffer to FDT
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 05/12] powerpc: Move ima buffer fields to struct kimage
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 10/12] arm64: Use OF alloc and free functions for FDT
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 01/12] powerpc: Rename kexec elfcorehdr_addr to elf_headers_mem
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 1/4] crypto: Add support for ECDSA signature verification
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] vio: make remove callback return void
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] ima_evm_utils: Add tests for ECDSA signature checking
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 1/4] crypto: Add support for ECDSA signature verification
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v7 1/4] crypto: Add support for ECDSA signature verification
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/3] tpm: fix reference counting for struct tpm_chip
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC] Persist ima logs to disk
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] ima: Free IMA measurement buffer on error
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] ima: Free IMA measurement buffer after kexec syscall
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH v2 2/3] tpm: Provide a function tpm_chip_free() to free tpm chips
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH v2 1/3] tpm: fix reference counting for struct tpm_chip
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: Jan Lübbe <jlu@xxxxxxxxxxxxxx>
- Re: [PATCH v3] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Lukasz Majczak <lma@xxxxxxxxxxxx>
- Re: [PATCH v3] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Dirk Gouders <dirk@xxxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [RFC] Persist ima logs to disk
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v2 2/3] tpm: Provide a function tpm_chip_free() to free tpm chips
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 3/3] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/3] tpm: fix reference counting for struct tpm_chip
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC] Persist ima logs to disk
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: WARN_ONCE() -> pr_warn_once() in tpm_tis_status()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: WARN_ONCE() -> pr_warn_once() in tpm_tis_status()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: WARN_ONCE() -> pr_warn_once() in tpm_tis_status()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: WARN_ONCE() -> pr_warn_once() in tpm_tis_status()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: WARN_ONCE() -> pr_warn_once() in tpm_tis_status()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2] tpm: WARN_ONCE() -> dev_warn_once() in tpm_tis_status()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2 2/3] tpm: Provide a function tpm_chip_free() to free tpm chips
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v2 1/3] tpm: fix reference counting for struct tpm_chip
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v2 0/3] TPM fixes
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v2 3/3] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH] tpm: WARN_ONCE() -> pr_warn_once() in tpm_tis_status()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: WARN_ONCE() -> pr_warn_once() in tpm_tis_status()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v4] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Lukasz Majczak <lma@xxxxxxxxxxxx>
- Re: [PATCH v3] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Dirk Gouders <dirk@xxxxxxxxxxx>
- Re: [RFC] Persist ima logs to disk
- From: Raphael Gianotti <raphgi@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: WARN_ONCE() -> pr_warn_once() in tpm_tis_status()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] ima_evm_utils: Add tests for ECDSA signature checking
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: WARN_ONCE() -> pr_warn_once() in tpm_tis_status()
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH] tpm: WARN_ONCE() -> pr_warn_once() in tpm_tis_status()
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v3] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH v5 3/3] KEYS: trusted: Reserve TPM for seal and unseal operations
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: WARN_ONCE() -> pr_warn_once() in tpm_tis_status()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 1/2] ima_evm_utils: Fix calculation of keyid for older distros
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 2/2] ima_evm_utils: Add testing with elliptic curves prime192v1 and 256v1
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 0/2] ima_evm_utils: Add tests for ECDSA signature checking
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Lukasz Majczak <lma@xxxxxxxxxxxx>
- Re: [PATCH 2/2] dm crypt: support using trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH] tpm: WARN_ONCE() -> pr_warn_once() in tpm_tis_status()
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] tpm: WARN_ONCE() -> pr_warn_once() in tpm_tis_status()
- Re: [GIT PULL] tpmdd updates for v5.12-rc1
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC] Persist ima logs to disk
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: Jan Lübbe <jlu@xxxxxxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v5 2/4] x509: Detect sm2 keys by their parameters OID
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v5 2/4] x509: Detect sm2 keys by their parameters OID
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/4] x509: Detect sm2 keys by their parameters OID
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v5 2/4] x509: Detect sm2 keys by their parameters OID
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/4] x509: Detect sm2 keys by their parameters OID
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC] Persist ima logs to disk
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v7 0/4] Add support for x509 certs with NIST p256 and p192 keys
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/4] x509: Detect sm2 keys by their parameters OID
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] ima_evm_utils: Add testing with elliptic curves prime192v1 and 256v1
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH] ima_evm_utils: Add testing with elliptic curves prime192v1 and 256v1
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC] Persist ima logs to disk
- From: Raphael Gianotti <raphgi@xxxxxxxxxxxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v15 09/10] arm64: Call kmalloc() to allocate DTB buffer
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v5 0/5] Enable root to update the blacklist keyring
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v5 0/5] Enable root to update the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v5 0/5] Enable root to update the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v7 0/4] Add support for x509 certs with NIST p256 and p192 keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: Jan Lübbe <jlu@xxxxxxxxxxxxxx>
- Re: [PATCH v7 0/4] Add support for x509 certs with NIST p256 and p192 keys
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v7 0/4] Add support for x509 certs with NIST p256 and p192 keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v7 0/4] Add support for x509 certs with NIST p256 and p192 keys
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: Jan Lübbe <jlu@xxxxxxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: Jan Lübbe <jlu@xxxxxxxxxxxxxx>
- [PATCH v7 3/4] x509: Add support for parsing x509 certs with ECDSA keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v7 4/4] ima: Support EC keys for signature verification
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v7 2/4] x509: Detect sm2 keys by their parameters OID
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v7 1/4] crypto: Add support for ECDSA signature verification
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v7 0/4] Add support for x509 certs with NIST p256 and p192 keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/4] x509: Detect sm2 keys by their parameters OID
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/4] x509: Detect sm2 keys by their parameters OID
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v5 2/4] x509: Detect sm2 keys by their parameters OID
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/4] x509: Detect sm2 keys by their parameters OID
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v5 4/4] ima: Support EC keys for signature verification
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v5 0/5] Enable root to update the blacklist keyring
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v6 1/4] crypto: Add support for ECDSA signature verification
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v6 2/4] x509: Detect sm2 keys by their parameters OID
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] ima-evm-utils: ima_sign supports SM2 and SM3 algorithm combination
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for v5.12-rc1
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 2/4] x509: Detect sm2 keys by their parameters OID
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 4/4] ima: Support EC keys for signature verification
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] ima-evm-utils: ima_sign supports SM2 and SM3 algorithm combination
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 1/4] crypto: Add support for ECDSA signature verification
- From: yumeng <yumeng18@xxxxxxxxxx>
- [PATCH v6 1/4] crypto: Add support for ECDSA signature verification
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v6 4/4] ima: Support EC keys for signature verification
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v6 2/4] x509: Detect sm2 keys by their parameters OID
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v6 3/4] x509: Add support for parsing x509 certs with ECDSA keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v6 0/4] Add support for x509 certs with NIST p256 and p192 keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] ima-evm-utils: ima_sign supports SM2 and SM3 algorithm combination
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] ima-evm-utils: ima_sign supports SM2 and SM3 algorithm combination
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] ima-evm-utils: ima_sign supports SM2 and SM3 algorithm combination
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v5 1/3] KEYS: trusted: Fix incorrect handling of tpm_get_random()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 3/3] KEYS: trusted: Reserve TPM for seal and unseal operations
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: Jan Lübbe <jlu@xxxxxxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/3] KEYS: trusted: Fix migratable=1 failing
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Dirk Gouders <dirk@xxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- [PATCH ima-evm-utils] ima-evm-utils: ima_sign supports SM2 and SM3 algorithm combination
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH v5 3/3] KEYS: trusted: Reserve TPM for seal and unseal operations
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 3/3] KEYS: trusted: Reserve TPM for seal and unseal operations
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm: ibmvtpm: fix error return code in tpm_ibmvtpm_probe()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 0/5] Enable root to update the blacklist keyring
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 00/10] Enable root to update the blacklist keyring
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for v5.12-rc1
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for v5.12-rc1
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for v5.12-rc1
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v15 4/5] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v15 4/5] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 3/3] IMA: add support to measure duplicate buffer for critical data hook
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/3] IMA: update functions to read allow_dup policy condition
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/3] IMA: add policy condition to measure duplicate critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/3] support for duplicate measurement of integrity critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: TPM V2: kernel panic on linux reboot
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 1/4] crypto: Add support for ECDSA signature verification
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] vio: make remove callback return void
- From: Lijun Pan <lijunp213@xxxxxxxxx>
- Re: [PATCH] vio: make remove callback return void
- From: Tyrel Datwyler <tyreld@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: ibmvtpm: fix error return code in tpm_ibmvtpm_probe()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: ibmvtpm: fix error return code in tpm_ibmvtpm_probe()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2] selinux: measure state and policy capabilities
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for v5.12-rc1
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [GIT PULL] tpmdd updates for v5.12-rc1
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v5 3/3] KEYS: trusted: Reserve TPM for seal and unseal operations
- [PATCH v5 2/3] KEYS: trusted: Fix migratable=1 failing
- [PATCH v5 1/3] KEYS: trusted: Fix incorrect handling of tpm_get_random()
- [PATCH v5 0/3] KEYS, trusted: a bunch of bug fixes
- Re: [PATCH] vio: make remove callback return void
- From: Uwe Kleine-König <uwe@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/10] Enable root to update the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v4 00/10] Enable root to update the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v2] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Migration to trusted keys: sealing user-provided key?
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v4 00/10] Enable root to update the blacklist keyring
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH v2] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Lukasz Majczak <lma@xxxxxxxxxxxx>
- Re: [PATCH v15 0/5] TPM 2.0 trusted key rework
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: Bug: TPM returned invalid status
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v15 09/10] arm64: Call kmalloc() to allocate DTB buffer
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH v15 09/10] arm64: Call kmalloc() to allocate DTB buffer
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v15 09/10] arm64: Call kmalloc() to allocate DTB buffer
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v15 09/10] arm64: Call kmalloc() to allocate DTB buffer
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v15 10/10] arm64: Add IMA log information in kimage used for kexec
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v15 09/10] arm64: Call kmalloc() to allocate DTB buffer
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: measure state and policy capabilities
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v15 10/10] arm64: Add IMA log information in kimage used for kexec
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH] vio: make remove callback return void
- From: Uwe Kleine-König <uwe@xxxxxxxxxxxxxxxxx>
- [PATCH v15 5/5] security: keys: trusted: Make sealed key properly interoperable
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v15 4/5] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v15 3/5] security: keys: trusted: fix TPM2 authorizations
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v15 2/5] oid_registry: Add TCG defined OIDS for TPM keys
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v15 1/5] lib: add ASN.1 encoder
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v15 0/5] TPM 2.0 trusted key rework
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v15 09/10] arm64: Call kmalloc() to allocate DTB buffer
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v15 10/10] arm64: Add IMA log information in kimage used for kexec
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v15 10/10] arm64: Add IMA log information in kimage used for kexec
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: Bug: TPM returned invalid status
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v15 10/10] arm64: Add IMA log information in kimage used for kexec
- From: Will Deacon <will@xxxxxxxxxx>
- Re: Bug: TPM returned invalid status
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v15 09/10] arm64: Call kmalloc() to allocate DTB buffer
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: Bug: TPM returned invalid status
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v15 10/10] arm64: Add IMA log information in kimage used for kexec
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v15 10/10] arm64: Add IMA log information in kimage used for kexec
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v15 09/10] arm64: Call kmalloc() to allocate DTB buffer
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH 3/4] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- AW: TPM V2: kernel panic on linux reboot
- From: "florian.manoel@xxxxxxxxxxx" <florian.manoel@xxxxxxxxxxx>
- Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 00/40] idmapped mounts
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v6 23/40] exec: handle idmapped mounts
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [PATCH v24 10/25] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4] IMA: Measure kernel version in early boot
- From: Raphael Gianotti <raphgi@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
- From: "Tj (Elloe Linux)" <ml.linux@elloe.vision>
- [PATCH v24 15/25] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v24 11/25] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2] tpm: ibmvtpm: fix error return code in tpm_ibmvtpm_probe()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3] IMA: Measure kernel version in early boot
- From: Raphael Gianotti <raphgi@xxxxxxxxxxxxxxxxxxx>
- [PATCH v24 05/25] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v24 13/25] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v24 12/25] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3] IMA: Measure kernel version in early boot
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
- From: Łukasz Majczak <lma@xxxxxxxxxxxx>
- Re: [PATCH 3/4] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 23/40] exec: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v6 23/40] exec: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH v6 23/40] exec: handle idmapped mounts
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v6 23/40] exec: handle idmapped mounts
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Bug: TPM returned invalid status
- From: "Tj (Elloe Linux)" <ml.linux@elloe.vision>
- Re: [PATCH v6 05/39] namei: make permission helpers idmapped mount aware
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v6 05/39] namei: make permission helpers idmapped mount aware
- From: "J. Bruce Fields" <bfields@xxxxxxxxxxxx>
- Re: [PATCH] selinux: measure state and policy capabilities
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH v2] IMA: Measure kernel version in early boot
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: include a consumer of the new IMA critical data hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 05/39] namei: make permission helpers idmapped mount aware
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
- From: Lukasz Majczak <lma@xxxxxxxxxxxx>
- [PATCH v2] IMA: Measure kernel version in early boot
- From: Raphael Gianotti <raphgi@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] ima: Free IMA measurement buffer after kexec syscall
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] ima: Free IMA measurement buffer on error
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v6 05/39] namei: make permission helpers idmapped mount aware
- From: bfields@xxxxxxxxxxxx (J. Bruce Fields)
- Re: [PATCH] selinux: measure state and policy capabilities
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: include a consumer of the new IMA critical data hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] dm crypt: support using trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/2] dm crypt: support using trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 20/40] init: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v6 16/40] open: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH 2/2] dm crypt: support using trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 35/40] fs: introduce MOUNT_ATTR_IDMAP
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v6 35/40] fs: introduce MOUNT_ATTR_IDMAP
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v6 15/40] open: handle idmapped mounts in do_truncate()
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 2/2] dm crypt: support using trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v6 28/40] overlayfs: do not mount on top of idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 27/40] ecryptfs: do not mount on top of idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 23/40] exec: handle idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 21/40] ioctl: handle idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 19/40] fcntl: handle idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 18/40] utimes: handle idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 17/40] af_unix: handle idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 16/40] open: handle idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 12/40] namei: handle idmapped mounts in may_*() helpers
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 11/40] stat: handle idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 10/40] commoncap: handle idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 09/40] xattr: handle idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 06/40] inode: make init and permission helpers idmapped mount aware
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 05/39] namei: make permission helpers idmapped mount aware
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 04/40] capability: handle idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 03/40] fs: add file and path permissions helpers
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH] selinux: measure state and policy capabilities
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 05/39] namei: make permission helpers idmapped mount aware
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 2/2] ima: Free IMA measurement buffer after kexec syscall
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] ima: Free IMA measurement buffer on error
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] ima: Free IMA measurement buffer after kexec syscall
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] ima: Free IMA measurement buffer on error
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 04/10] certs: Fix blacklist flag type confusion
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 05/10] certs: Replace K{U,G}IDT_INIT() with GLOBAL_ROOT_{U,G}ID
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 03/10] certs: Fix blacklisted hexadecimal hash string check
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 07/10] certs/blacklist: fix kernel doc interface issue
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 06/10] certs: Make blacklist_vet_description() more strict
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 08/10] certs: Factor out the blacklist hash creation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Jerome Forissier <jerome@xxxxxxxxxxxxx>
- [PATCH v4 01/10] tools/certs: Add print-cert-tbs-hash.sh
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 10/10] certs: Allow root user to append signed hashes to the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 09/10] PKCS#7: Fix missing include
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 00/10] Enable root to update the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 02/10] certs: Check that builtin blacklist hashes are valid
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v6 00/40] idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 02/40] fs: add id translation helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 01/40] mount: attach mappings to mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 03/40] fs: add file and path permissions helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 04/40] capability: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 09/40] xattr: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 06/40] inode: make init and permission helpers idmapped mount aware
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 07/40] attr: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 16/40] open: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 15/40] open: handle idmapped mounts in do_truncate()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v6 30/40] mount: make {lock,unlock}_mount_hash() static
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 12/40] namei: handle idmapped mounts in may_*() helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 13/40] namei: introduce struct renamedata
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 08/10] certs: Check that builtin blacklist hashes are valid
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v6 38/40] ext4: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 20/40] init: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v6 26/39] ima: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 33/40] fs: add attr_flags_to_mnt_flags helper
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 28/40] overlayfs: do not mount on top of idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 31/40] namespace: only take read lock in do_reconfigure_mnt()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 25/40] apparmor: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 21/40] ioctl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 39/40] xfs: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 34/40] fs: add mount_setattr()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 23/40] exec: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 22/40] would_dump: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 35/40] fs: introduce MOUNT_ATTR_IDMAP
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 29/40] namespace: take lock_mount_hash() directly when changing flags
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 36/40] tests: add mount_setattr() selftests
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 37/40] fat: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 32/40] fs: split out functions to hold writers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 27/40] ecryptfs: do not mount on top of idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 18/40] utimes: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 19/40] fcntl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 14/40] namei: prepare for idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 17/40] af_unix: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 11/40] stat: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 10/40] commoncap: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 08/40] acl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 08/10] certs: Check that builtin blacklist hashes are valid
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Jerome Forissier <jerome@xxxxxxxxxxxxx>
- Re: [PATCH v3 02/10] certs: Fix blacklisted hexadecimal hash string check
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 04/10] certs: Fix blacklist flag type confusion
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 05/10] certs: Replace K{U,G}IDT_INIT() with GLOBAL_ROOT_{U,G}ID
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 08/10] certs: Check that builtin blacklist hashes are valid
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] doc: trusted-encrypted: updates with TEE as a new trust source (update)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] doc: trusted-encrypted: updates with TEE as a new trust source (update)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v3 02/10] certs: Fix blacklisted hexadecimal hash string check
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3 05/10] certs: Replace K{U,G}IDT_INIT() with GLOBAL_ROOT_{U,G}ID
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3 06/10] certs: Make blacklist_vet_description() more strict
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3 09/10] certs: Allow root user to append signed hashes to the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v5 15/42] fs: add file_user_ns() helper
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 08/10] certs: Check that builtin blacklist hashes are valid
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3 04/10] certs: Fix blacklist flag type confusion
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v3 09/10] certs: Allow root user to append signed hashes to the blacklist keyring
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 08/10] certs: Check that builtin blacklist hashes are valid
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 05/10] certs: Replace K{U,G}IDT_INIT() with GLOBAL_ROOT_{U,G}ID
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 06/10] certs: Make blacklist_vet_description() more strict
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm/tpm_tis: Fix variable reset during IRQ probing
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 04/10] certs: Fix blacklist flag type confusion
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 03/10] PKCS#7: Fix missing include
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 02/10] certs: Fix blacklisted hexadecimal hash string check
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 01/10] certs/blacklist: fix kernel doc interface issue
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 05/13] x86: Add early TPM1.2/TPM2.0 interface support for Secure Launch
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 13/42] attr: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 11/42] namei: make permission helpers idmapped mount aware
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 23/42] open: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 18/42] stat: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 17/42] commoncap: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 15/42] fs: add file_user_ns() helper
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 24/42] af_unix: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 32/42] fs: make helpers idmap mount aware
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 40/42] fs: introduce MOUNT_ATTR_IDMAP
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v5 15/42] fs: add file_user_ns() helper
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v5 23/42] open: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v5 40/42] fs: introduce MOUNT_ATTR_IDMAP
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 30/42] would_dump: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 31/42] exec: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 29/42] ioctl: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 27/42] notify: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 26/42] fcntl: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 25/42] utimes: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 22/42] open: handle idmapped mounts in do_truncate()
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 21/42] namei: prepare for idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 20/42] namei: introduce struct renamedata
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 19/42] namei: handle idmapped mounts in may_*() helpers
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]