Linux Integrity
[Prev Page][Next Page]
- Re: [RFC] Finding the right target branch for patches that span IMA and SeLinux
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Finding the right target branch for patches that span IMA and SeLinux
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 03/34] fs: add mount_setattr()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 01/34] namespace: take lock_mount_hash() directly when changing flags
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 05/34] fs: introduce MOUNT_ATTR_IDMAP
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 06/34] fs: add id translation helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 07/34] capability: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC PATCH 4/4] x86: Add early PCR extend support for Secure Launch
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 3/4] tpm: Conditionally use static buffer in TPM buffer management
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] arm64/ima: add ima_arch support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH 2/4] tpm: Move core definitions and buffer management out of main TPM header
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] arm64/ima: add ima_arch support
- From: Chester Lin <clin@xxxxxxxx>
- Re: [PATCH v3 1/3] efi: generalize efi_get_secureboot
- From: Chester Lin <clin@xxxxxxxx>
- [PATCH v5 0/7] IMA: Infrastructure for measurement of critical kernel data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 1/7] IMA: generalize keyring specific measurement constructs
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 2/7] IMA: update process_buffer_measurement to measure buffer hash
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 4/7] IMA: add policy to measure critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 3/7] IMA: add hook to measure critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 6/7] IMA: add critical_data to the built-in policy rules
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 5/7] IMA: validate supported kernel data sources before measurement
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 7/7] selinux: measure state and hash of the policy using IMA
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 07/34] capability: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 06/34] fs: add id translation helpers
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 05/34] fs: introduce MOUNT_ATTR_IDMAP
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 03/34] fs: add mount_setattr()
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 01/34] namespace: take lock_mount_hash() directly when changing flags
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [RFC] Finding the right target branch for patches that span IMA and SeLinux
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [RFC PATCH 4/4] x86: Add early PCR extend support for Secure Launch
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- [RFC PATCH 3/4] tpm: Conditionally use static buffer in TPM buffer management
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- [RFC PATCH 2/4] tpm: Move core definitions and buffer management out of main TPM header
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- [RFC PATCH 1/4] tpm: Move TPM TIS definitions out of TIS core header
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- [RFC PATCH 0/4] Secure Launch early PCR extend support
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/5] tpm_tis: Clean up locality release
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC] Finding the right target branch for patches that span IMA and SeLinux
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v8 0/4] Carry forward IMA measurement log on kexec on ARM64
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 1/4] powerpc: Refactor kexec functions to move arch independent code to drivers/of
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 2/4] powerpc: Refactor kexec functions to move arch independent code to ima
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 4/4] arm64: Add IMA kexec buffer to DTB
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 3/4] arm64: Store IMA log information in kimage used for kexec
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Finding the right target branch for patches that span IMA and SeLinux
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v2 4/5] tpm_tis: fix IRQ probing
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v2 3/5] tpm_tis: Fix interrupts for TIS TPMs without legacy cycles
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v2 4/5] tpm_tis: fix IRQ probing
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/5] tpm_tis: Clean up locality release
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- Re: [PATCH v2 4/5] tpm_tis: fix IRQ probing
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 3/5] tpm_tis: Fix interrupts for TIS TPMs without legacy cycles
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 2/5] tpm_tis: Clean up locality release
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/5] tpm_tis: Fix check_locality for correct locality acquisition
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 1/3] efi: generalize efi_get_secureboot
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 3/3] arm64/ima: add ima_arch support
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3 2/3] ima: replace arch-specific get_sb_mode() with a common helper ima_get_efi_secureboot()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v4 0/3,RESEND] KEYS, trusted: a bunch of bug fixes
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 33/34] overlayfs: handle idmapped merged mounts
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH v4 1/3,RESEND] KEYS: trusted: Fix incorrect handling of tpm_get_random()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v4 3/3,RESEND] KEYS: trusted: Reserve TPM for seal and unseal operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v4 2/3,RESEND] KEYS: trusted: Fix migratable=1 failing
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v4 0/3,RESEND] KEYS, trusted: a bunch of bug fixes
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: efi: Don't create binary_bios_measurements file for an empty log
- From: Kai-Heng Feng <kai.heng.feng@xxxxxxxxxxxxx>
- [PATCH v3 3/3] arm64/ima: add ima_arch support
- From: Chester Lin <clin@xxxxxxxx>
- [PATCH v3 2/3] ima: replace arch-specific get_sb_mode() with a common helper ima_get_efi_secureboot()
- From: Chester Lin <clin@xxxxxxxx>
- [PATCH v3 1/3] efi: generalize efi_get_secureboot
- From: Chester Lin <clin@xxxxxxxx>
- [PATCH v3 0/3] add ima_arch support for ARM64
- From: Chester Lin <clin@xxxxxxxx>
- Re: [PATCH] tpm: efi: Don't create binary_bios_measurements file for an empty log
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RFC] Finding the right target branch for patches that span IMA and SeLinux
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC] Finding the right target branch for patches that span IMA and SeLinux
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: Stéphane Graber <stgraber@xxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 00/34] fs: idmapped mounts
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 00/34] fs: idmapped mounts
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 00/34] fs: idmapped mounts
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 00/34] fs: idmapped mounts
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: Lennart Poettering <lennart@xxxxxxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- ima-evm-utils: version 1.3.2 released
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 01/34] namespace: take lock_mount_hash() directly when changing flags
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 06/34] fs: add id translation helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 07/34] capability: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 09/34] inode: add idmapped mount aware init and permission helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 00/34] fs: idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 08/34] namei: add idmapped mount aware permission helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 03/34] fs: add mount_setattr()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 12/34] xattr: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 15/34] stat: add mapped_generic_fillattr()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 14/34] commoncap: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 30/34] ext4: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 33/34] overlayfs: handle idmapped merged mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 29/34] ima: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 26/34] fs: add helpers for idmap mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 34/34] fat: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 21/34] open: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 16/34] namei: handle idmapped mounts in may_*() helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 27/34] apparmor: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 32/34] overlayfs: handle idmapped lower directories
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 17/34] namei: introduce struct renamedata
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 20/34] open: handle idmapped mounts in do_truncate()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 28/34] audit: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 23/34] utimes: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 24/34] would_dump: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 18/34] namei: prepare for idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 19/34] namei: add lookup helpers with idmapped mounts aware permission checking
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 25/34] exec: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 31/34] expfs: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 22/34] af_unix: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 13/34] selftests: add idmapped mounts xattr selftest
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 10/34] attr: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 04/34] tests: add mount_setattr() selftests
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 11/34] acl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 05/34] fs: introduce MOUNT_ATTR_IDMAP
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 02/34] namespace: only take read lock in do_reconfigure_mnt()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- evmctl argument parsing, HMAC algorithm, HMAC replacement
- From: "Ahmed, Safayet (GE Research, US)" <Safayet.Ahmed@xxxxxx>
- [PATCH] tpm: efi: Don't create binary_bios_measurements file for an empty log
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: efi: Don't create binary_bios_measurements file for an empty log
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: efi: Don't create binary_bios_measurements file for an empty log
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: ima-evm-utils: version 1.3.2 released
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils] boot_aggregate.test: Skip if CONFIG_IMA not enabled
- From: Petr Vorel <petr.vorel@xxxxxxxxx>
- Re: [PATCH ima-evm-utils] boot_aggregate.test: Skip if CONFIG_IMA not enabled
- From: Mikhail Novosyolov <m.novosyolov@xxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] boot_aggregate.test: Skip if CONFIG_IMA not enabled
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] boot_aggregate.test: Skip if CONFIG_IMA not enabled
- From: Mikhail Novosyolov <m.novosyolov@xxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] boot_aggregate.test: Skip if CONFIG_IMA not enabled
- From: Mikhail Novosyolov <m.novosyolov@xxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] boot_aggregate.test: Skip if CONFIG_IMA not enabled
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [RESEND PATCH v11 0/3] Add trusted_for(2) (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v4 0/6] IMA: Infrastructure for measurement of critical kernel data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils] boot_aggregate.test: Skip if CONFIG_IMA not enabled
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] tpm_tis_core: Add the error log when the chip startup failed
- From: Tian Tao <tiantao6@xxxxxxxxxxxxx>
- Re: [Regression] "tpm: Require that all digests are present in TCG_PCR_EVENT2 structures" causes null pointer dereference
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] security: remove unneeded break
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 1/4] powerpc: Refactor kexec functions to move arch independent code to kernel
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [RFC PATCH 00/30] ima: Introduce IMA namespace
- From: "Dr. Greg" <greg@xxxxxxxxxxxx>
- Re: [PATCH v4 0/6] IMA: Infrastructure for measurement of critical kernel data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 4/5] tpm_tis: fix IRQ probing
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 3/5] tpm_tis: Fix interrupts for TIS TPMs without legacy cycles
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 2/5] tpm_tis: Clean up locality release
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/5] tpm_tis: Fix check_locality for correct locality acquisition
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] IMA: Measure kernel version in early boot
- From: Raphael Gianotti <raphgi@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 5/6] IMA: add hook to measure critical data from kernel components
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 4/6] IMA: add policy to measure critical data from kernel components
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/6] IMA: conditionally allow empty rule data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/6] IMA: generalize keyring specific measurement constructs
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3] dm verity: Add support for signature verification with 2nd keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v2] dm verity: Add support for signature verification with 2nd keyring
- From: Mike Snitzer <snitzer@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils] boot_aggregate.test: Skip if CONFIG_IMA not enabled
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] dm verity: Add support for signature verification with 2nd keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v7 1/4] powerpc: Refactor kexec functions to move arch independent code to kernel
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v4 5/6] IMA: add hook to measure critical data from kernel components
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 4/6] IMA: add policy to measure critical data from kernel components
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/6] IMA: conditionally allow empty rule data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/6] IMA: generalize keyring specific measurement constructs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 1/4] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH 07/13] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: Measuring kernel modules with IMA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 1/4] powerpc: Refactor kexec functions to move arch independent code to kernel
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 2/4] powerpc: Refactor kexec functions to move arch independent code to ima
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 07/13] x86: Secure Launch kernel early boot stub
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH 07/13] x86: Secure Launch kernel early boot stub
- From: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
- Re: [PATCH v7 1/4] KEYS: trusted: Add generic trusted keys framework
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [Regression] "tpm: Require that all digests are present in TCG_PCR_EVENT2 structures" causes null pointer dereference
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 1/4] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v7 2/4] powerpc: Refactor kexec functions to move arch independent code to ima
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 1/4] KEYS: trusted: Add generic trusted keys framework
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 1/4] powerpc: Refactor kexec functions to move arch independent code to kernel
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 2/4] powerpc: Refactor kexec functions to move arch independent code to ima
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 1/4] powerpc: Refactor kexec functions to move arch independent code to kernel
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [Regression] "tpm: Require that all digests are present in TCG_PCR_EVENT2 structures" causes null pointer dereference
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] security: remove unneeded break
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 2/4] powerpc: Refactor kexec functions to move arch independent code to ima
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 1/4] powerpc: Refactor kexec functions to move arch independent code to kernel
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC] treewide: cleanup unreachable breaks
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] boot_aggregate.test: Skip if CONFIG_IMA not enabled
- From: Petr Vorel <petr.vorel@xxxxxxxxx>
- Re: [RFC] treewide: cleanup unreachable breaks
- From: Tom Rix <trix@xxxxxxxxxx>
- Re: [RFC] treewide: cleanup unreachable breaks
- From: Tom Rix <trix@xxxxxxxxxx>
- Re: [Ocfs2-devel] [RFC] treewide: cleanup unreachable breaks
- From: John Haxby <john.haxby@xxxxxxxxxx>
- Re: [PATCH] file2bin: Pass the right values to size and count parameters for fread()
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH] security: remove unneeded break
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v2 3/5] tpm_tis: Fix interrupts for TIS TPMs without legacy cycles
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v2 4/5] tpm_tis: fix IRQ probing
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v2 5/5] Revert "tpm: Revert "tpm_tis_core: Turn on the TPM before probing IRQ's""
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v2 2/5] tpm_tis: Clean up locality release
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v2 1/5] tpm_tis: Fix check_locality for correct locality acquisition
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils] boot_aggregate.test: Skip if CONFIG_IMA not enabled
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC] treewide: cleanup unreachable breaks
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] file2bin: Pass the right values to size and count parameters for fread()
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 5/5] Revert "tpm: Revert "tpm_tis_core: Turn on the TPM before probing IRQ's""
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] file2bin: Pass the right values to size and count parameters for fread()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] file2bin: Pass the right values to size and count parameters for fread()
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] file2bin: Pass the right values to size and count parameters for fread()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] file2bin: Pass the right values to size and count parameters for fread()
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2 5/5] Revert "tpm: Revert "tpm_tis_core: Turn on the TPM before probing IRQ's""
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [ima-evm-utils][PATCH] file2bin: Pass the right values to size and count parameters for fread()
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH ima-evm-utils] boot_aggregate.test: Skip if CONFIG_IMA not enabled
- From: Petr Vorel <petr.vorel@xxxxxxxxx>
- [PATCH] file2bin: Pass the right values to size and count parameters for fread()
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] treewide: cleanup unreachable breaks
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH 07/13] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH] security: remove unneeded break
- [PATCH v4 1/2] dm-devel: collect target data and submit to IMA to measure
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 2/2] dm-crypt: collect data and submit to DM to measure
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 0/2] dm-devel:dm-crypt: infrastructure for measurement of DM target data using IMA
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 07/13] x86: Secure Launch kernel early boot stub
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH 07/13] x86: Secure Launch kernel early boot stub
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [RESEND PATCH v11 2/3] arch: Wire up trusted_for(2)
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [RESEND PATCH v11 2/3] arch: Wire up trusted_for(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RESEND PATCH v11 3/3] selftest/interpreter: Add tests for trusted_for(2) policies
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RESEND PATCH v11 1/3] fs: Add trusted_for(2) syscall implementation and related sysctl
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RESEND PATCH v11 0/3] Add trusted_for(2) (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Measuring kernel modules with IMA
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 07/13] x86: Secure Launch kernel early boot stub
- From: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
- Re: [PATCH 07/13] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- RE: [RFC PATCH 00/30] ima: Introduce IMA namespace
- From: Krzysztof Struczynski <krzysztof.struczynski@xxxxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxx>
- Re: [PATCH] tpm_tis: Disable interrupts on ThinkPad T490s
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxx>
- Re: [PATCH] tpm_tis: Disable interrupts on ThinkPad T490s
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [Ocfs2-devel] [RFC] treewide: cleanup unreachable breaks
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [Ocfs2-devel] [RFC] treewide: cleanup unreachable breaks
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [Ocfs2-devel] [RFC] treewide: cleanup unreachable breaks
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [Ocfs2-devel] [RFC] treewide: cleanup unreachable breaks
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [Ocfs2-devel] [RFC] treewide: cleanup unreachable breaks
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [RFC] treewide: cleanup unreachable breaks
- From: Tom Rix <trix@xxxxxxxxxx>
- Re: [RFC] treewide: cleanup unreachable breaks
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [RFC] treewide: cleanup unreachable breaks
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC] treewide: cleanup unreachable breaks
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [Cocci] [RFC] treewide: cleanup unreachable breaks
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [Cocci] [RFC] treewide: cleanup unreachable breaks
- From: Julia Lawall <julia.lawall@xxxxxxxx>
- Re: [RFC] treewide: cleanup unreachable breaks
- From: Joe Perches <joe@xxxxxxxxxxx>
- [RFC] treewide: cleanup unreachable breaks
- Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- Re: [PATCH 07/13] x86: Secure Launch kernel early boot stub
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- [ima-evm-utils][PATCH 3/3] travis: properly kill the software TPM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils][PATCH 2/3] travis: rename the software tpm variables
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils][PATCH 1/3] travis: retry sending tssstartup
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils][PATCH 0/3] travis: misc software TPM changes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] dm verity: Add support for signature verification with 2nd keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v2] dm verity: Add support for signature verification with 2nd keyring
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH v2] dm verity: Add support for signature verification with 2nd keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v2] dm verity: Add support for signature verification with 2nd keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Disable interrupts on ThinkPad T490s
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: Disable interrupts on ThinkPad T490s
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [GIT PULL] integrity subsystem updates for v5.10
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH] tpm_tis: Disable interrupts on ThinkPad T490s
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: Disable interrupts on ThinkPad T490s
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [PATCH] tpm_tis: Disable interrupts on ThinkPad T490s
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH 07/13] x86: Secure Launch kernel early boot stub
- From: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
- Re: [PATCH v2] dm verity: Add support for signature verification with 2nd keyring
- From: Mike Snitzer <snitzer@xxxxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v2] dm verity: Add support for signature verification with 2nd keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v2] MAINTAINERS: jarkko.sakkinen@xxxxxxxxxxxxxxx -> jarkko@xxxxxxxxxx
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] ima-evm-utils: Change env variable TPM_SERVER_TYPE for tpm_server
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] ima-evm-utils: Change env variable TPM_SERVER_TYPE for tpm_server
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] ima-evm-utils: Change env variable TPM_SERVER_TYPE for tpm_server
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] efi: add secure boot get helper
- From: Chester Lin <clin@xxxxxxxx>
- Re: [PATCH v2] ima: defer arch_ima_get_secureboot() call to IMA init time
- From: Chester Lin <clin@xxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v2 1/5] ima-evm-utils: Change env variable TPM_SERVER_TYPE for tpm_server
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] ima-evm-utils: Change env variable TPM_SERVER_TYPE for tpm_server
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] ima-evm-utils: Change env variable TPM_SERVER_TYPE for tpm_server
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: WARN_ONCE triggered: tpm_tis: Add a check for invalid status
- From: Dirk Gouders <dirk@xxxxxxxxxxx>
- RE: QUEMU and TPM2 device emulation
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- RE: QUEMU and TPM2 device emulation
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: WARN_ONCE triggered: tpm_tis: Add a check for invalid status
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- WARN_ONCE triggered: tpm_tis: Add a check for invalid status
- From: Dirk Gouders <dirk@xxxxxxxxxxx>
- [GIT PULL] integrity subsystem updates for v5.10
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: QUEMU and TPM2 device emulation
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: QUEMU and TPM2 device emulation
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- QUEMU and TPM2 device emulation
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v2 1/2] efi: add secure boot get helper
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] ima: defer arch_ima_get_secureboot() call to IMA init time
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] efi: add secure boot get helper
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 1/2] efi: add secure boot get helper
- From: Chester Lin <clin@xxxxxxxx>
- [PATCH v2 2/2] arm64/ima: add ima_arch support
- From: Chester Lin <clin@xxxxxxxx>
- [PATCH v2 1/2] efi: add secure boot get helper
- From: Chester Lin <clin@xxxxxxxx>
- [PATCH v2 0/2] add ima_arch support for ARM64
- From: Chester Lin <clin@xxxxxxxx>
- Re: [PATCH v2] ima: defer arch_ima_get_secureboot() call to IMA init time
- From: Chester Lin <clin@xxxxxxxx>
- Re: [PATCH v7 1/4] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v7 4/4] MAINTAINERS: Add entry for TEE based Trusted Keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v2] ima: defer arch_ima_get_secureboot() call to IMA init time
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: jarkko.sakkinen@xxxxxxxxxxxxxxx -> jarkko@xxxxxxxxxx
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: jarkko.sakkinen@xxxxxxxxxxxxxxx -> jarkko@xxxxxxxxxx
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [integrity:next-integrity-testing 13/13] security/integrity/ima/ima_appraise.c:21:62: error: expected ')' before numeric constant
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [integrity:next-integrity-testing 13/13] security/integrity/ima/ima_appraise.c:21:62: error: expected ')' before numeric constant
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [integrity:next-integrity-testing 13/13] security/integrity/ima/ima_appraise.c:21:62: error: expected ')' before numeric constant
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2] ima: defer arch_ima_get_secureboot() call to IMA init time
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH][V2] ima: Fix sizeof mismatches
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- Re: [PATCH v2] ima: defer arch_ima_get_secureboot() call to IMA init time
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: Fix sizeof mismatches
- From: Colin Ian King <colin.king@xxxxxxxxxxxxx>
- Re: [PATCH] ima: Fix sizeof mismatches
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: jarkko.sakkinen@xxxxxxxxxxxxxxx -> jarkko@xxxxxxxxxx
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [Regression] "tpm: Require that all digests are present in TCG_PCR_EVENT2 structures" causes null pointer dereference
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [Regression] "tpm: Require that all digests are present in TCG_PCR_EVENT2 structures" causes null pointer dereference
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 4/4] MAINTAINERS: Add entry for TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 1/4] KEYS: trusted: Add generic trusted keys framework
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 4/4] MAINTAINERS: Add entry for TEE based Trusted Keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v7 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v7 1/4] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH] MAINTAINERS: jarkko.sakkinen@xxxxxxxxxxxxxxx -> jarkko@xxxxxxxxxx
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v1] dm verity: Add support for signature verification with 2nd keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v2] ima: defer arch_ima_get_secureboot() call to IMA init time
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] ima: defer arch_ima_get_secureboot() call to IMA init time
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v4 3/3] KEYS: trusted: Reserve TPM for seal and unseal operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v4 2/3] KEYS: trusted: Fix migratable=1 failing
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v4 1/3] KEYS: trusted: Fix incorrect handling of tpm_get_random()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v4 0/3] KEYS, trusted: a bunch of bug fixes
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] KEYS: trusted: Reserve TPM for seal and unseal operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 4/4] MAINTAINERS: Add entry for TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 1/4] KEYS: trusted: Add generic trusted keys framework
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] KEYS: trusted: Reserve TPM for seal and unseal operations
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v3 3/3] KEYS: trusted: Reserve TPM for seal and unseal operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v3 2/3] KEYS: trusted: Fix migratable=1 failing
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v3 1/3] KEYS: trusted: Fix incorrect handling of tpm_get_random()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v3 0/3] KEYS, trusted: a bunch of bug fixes
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v1] dm verity: Add support for signature verification with 2nd keyring
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v2 5/5] ima-evm-utils: Expand the INSTALL instructions.
- From: Ken Goldman <kgoldman@xxxxxxxxxx>
- [PATCH v2 4/5] ima-evm-utils: Correct spelling errors
- From: Ken Goldman <kgoldman@xxxxxxxxxx>
- [PATCH v2 3/5] ima-evm-utils: Change tpm2_pcr_read() to use C code
- From: Ken Goldman <kgoldman@xxxxxxxxxx>
- [PATCH v2 2/5] ima-evm-utils: Change PCR iterater from int to uint32_t
- From: Ken Goldman <kgoldman@xxxxxxxxxx>
- [PATCH v2 1/5] ima-evm-utils: Change env variable TPM_SERVER_TYPE for tpm_server
- From: Ken Goldman <kgoldman@xxxxxxxxxx>
- [PATCH v2 0/5] Updates to use IBM TSS C API rather than command line tools
- From: Ken Goldman <kgoldman@xxxxxxxxxx>
- Re: [PATCH] ima: defer arch_ima_get_secureboot() call to IMA init time
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v21 13/23] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v21 11/23] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v21 10/23] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v21 09/23] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v21 08/23] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for v5.10
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH] ima: Fix sizeof mismatches
- From: Colin Ian King <colin.king@xxxxxxxxxxxxx>
- Re: [PATCH] ima: Fix sizeof mismatches
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH] ima: Fix sizeof mismatches
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] ima: defer arch_ima_get_secureboot() call to IMA init time
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 1/6] efistub: pass uefi secureboot flag via fdt params
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Does selinux rule needed for .ima keyring access - integrity: Request for unknown key 'id:87deb3bf' err -13
- From: rishi gupta <gupt21@xxxxxxxxx>
- Re: [PATCH v2 2/3] KEYS: trusted: Reserve TPM for seal and unseal operations
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH RFC PKS/Trusted keys 2/2] keys/trusted: protect trusted keys using PKS
- From: ira.weiny@xxxxxxxxx
- [PATCH RFC PKS/Trusted keys 1/2] vmalloc: Add vmalloc_pks() call
- From: ira.weiny@xxxxxxxxx
- [PATCH RFC PKS/Trusted keys 0/2] trusted keys: Add PKS protection to trusted keys
- From: ira.weiny@xxxxxxxxx
- Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [Regression] "tpm: Require that all digests are present in TCG_PCR_EVENT2 structures" causes null pointer dereference
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH 5/5] ima-evm-utils: Expand the INSTALL instructions.
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- [PATCH 4/5] ima-evm-utils: Correct spelling errors
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- [PATCH 3/5] ima-evm-utils: Change tpm2_pcr_read() to use C code
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- [PATCH 2/5] ima-evm-utils: Change PCR iterater from int to uint32_t
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- [PATCH 1/5] ima-evm-utils: Change env variable TPM_SERVER_TYPE for, tpm_server
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- [PATCH 0/5] Updates to use IBM TSS C API rather than command line tools
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH v1] dm verity: Add support for signature verification with 2nd keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [Regression] "tpm: Require that all digests are present in TCG_PCR_EVENT2 structures" causes null pointer dereference
- From: Kai-Heng Feng <kai.heng.feng@xxxxxxxxxxxxx>
- Re: [PATCH] ima: Fix sizeof mismatches
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH] ima: Fix sizeof mismatches
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- RE: [PATCH] ima: Fix sizeof mismatches
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH 3/6] ima-evm-utils: When using the IBM TSS, link in its library
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH] ima: Fix sizeof mismatches
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- [PATCH v7 4/4] MAINTAINERS: Add entry for TEE based Trusted Keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v7 3/4] doc: trusted-encrypted: updates with TEE as a new trust source
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v7 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v7 1/4] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v7 0/4] Introduce TEE based Trusted Keys support
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH 3/6] ima-evm-utils: When using the IBM TSS, link in its library
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/4] TPM 2.0 fixes in IMA tests
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH 3/6] ima-evm-utils: When using the IBM TSS, link in its library
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH v5 10/16] module: Call security_kernel_post_load_data()
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v5 11/16] LSM: Add "contents" flag to kernel_read_file hook
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v5 04/16] fs/kernel_read_file: Split into separate source file
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v5 01/16] fs/kernel_read_file: Remove FIRMWARE_PREALLOC_BUFFER enum
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v3 0/4] TPM 2.0 fixes in IMA tests
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/4] TPM 2.0 fixes in IMA tests
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/6] ima-evm-utils: When using the IBM TSS, link in its library
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH 1/1] travis: Fix Tumbleweed installation
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v3 0/4] TPM 2.0 fixes in IMA tests
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2 2/5] tpm_tis: Clean up locality release
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] tpm_tis: Fix check_locality for correct locality acquisition
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH 6/6] ima-evm-utils: Expand the INSTALL instructions.
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- [PATCH 5/6] ima-evm-utils: Correct spelling errors
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- [PATCH 4/6] ima-evm-utils: Change tpm2_pcr_read() to use C code
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- [PATCH 3/6] ima-evm-utils: When using the IBM TSS, link in its library
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- [PATCH 2/6] ima-evm-utils: Change PCR iterater from int to uint32_t
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/5] tpm_tis: Fix interrupts for TIS TPMs without legacy cycles
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/5] tpm_tis: Clean up locality release
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] tpm_tis: Fix check_locality for correct locality acquisition
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/5] tpm_tis: Clean up locality release
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/5] tpm_tis: Clean up locality release
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/5] tpm_tis: fix IRQ probing
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] tpm_tis: Fix check_locality for correct locality acquisition
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v2 3/3] KEYS: trusted: Fix migratable=1 failing
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v2 2/3] KEYS: trusted: Reserve TPM for seal and unseal operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v2 1/3] KEYS: trusted: Fix incorrect handling of tpm_get_random()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v2 0/3] A bunch of trusted keys fixes
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] KEYS: trusted: Reserve TPM for seal and unseal operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] KEYS: trusted: Reserve TPM for seal and unseal operations
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 2/3] KEYS: trusted: Reserve TPM for seal and unseal operations
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 1/6] efistub: pass uefi secureboot flag via fdt params
- From: Chester Lin <clin@xxxxxxxx>
- [PATCH 1/3] KEYS: trusted: Fix incorrect handling of tpm_get_random()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH 3/3] KEYS: trusted: Fix migratable=1 failing
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH 2/3] KEYS: trusted: Reserve TPM for seal and unseal operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH 0/3] A bunch of trusted keys fixes
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [GIT PULL] tpmdd updates for v5.10
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH 1/6] ima-evm-utils: Change env variable TPM_SERVER_TYPE for, tpm_server
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- [PATCH v5 16/16] test_firmware: Test partial read support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 04/16] fs/kernel_read_file: Split into separate source file
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 03/16] fs/kernel_read_file: Split into separate include file
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 06/16] fs/kernel_read_file: Switch buffer size arg to size_t
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 08/16] LSM: Introduce kernel_post_load_data() hook
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 12/16] IMA: Add support for file reads without contents
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 07/16] fs/kernel_read_file: Add file_size output argument
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 11/16] LSM: Add "contents" flag to kernel_read_file hook
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 09/16] firmware_loader: Use security_post_load_data()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 13/16] fs/kernel_file_read: Add "offset" arg for partial reads
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 10/16] module: Call security_kernel_post_load_data()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 15/16] firmware: Add request_partial_firmware_into_buf()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 14/16] firmware: Store opt_flags in fw_priv
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 05/16] fs/kernel_read_file: Remove redundant size argument
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 00/16] Introduce partial kernel_read_file() support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 02/16] fs/kernel_read_file: Remove FIRMWARE_EFI_EMBEDDED enum
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 01/16] fs/kernel_read_file: Remove FIRMWARE_PREALLOC_BUFFER enum
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v1] dm verity: Add support for signature verification with 2nd keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v11 2/3] arch: Wire up trusted_for(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v11 2/3] arch: Wire up trusted_for(2)
- From: Tycho Andersen <tycho@tycho.pizza>
- Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/4] TPM 2.0 fixes in IMA tests
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 5/5] Revert "tpm: Revert "tpm_tis_core: Turn on the TPM before probing IRQ's""
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v2 4/5] tpm_tis: fix IRQ probing
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v2 3/5] tpm_tis: Fix interrupts for TIS TPMs without legacy cycles
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/5] tpm_tis: Clean up locality release
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v2 1/5] tpm_tis: Fix check_locality for correct locality acquisition
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] tpm_tis: Clean up locality release
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v11 0/3] Add trusted_for(2) (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v11 1/3] fs: Add trusted_for(2) syscall implementation and related sysctl
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v11 3/3] selftest/interpreter: Add tests for trusted_for(2) policies
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v11 2/3] arch: Wire up trusted_for(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH 1/4] tpm_tis: Clean up locality release
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/4] TPM 2.0 fixes in IMA tests
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v4 4/4] ima_tpm.sh: Fix calculating PCR aggregate
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] tpm_tis: Clean up locality release
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 4/4] ima_tpm.sh: Fix calculating PCR aggregate
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/4] tpm_tis: Clean up locality release
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] tpm_tis: Clean up locality release
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH 1/4] tpm_tis: Clean up locality release
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] tpm_tis: Clean up locality release
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v7 1/4] powerpc: Refactor kexec functions to move arch independent code to kernel
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 0/3] Carry forward IMA measurement log on kexec on ARM64
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 4/4] arm64: Add IMA kexec buffer to DTB
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 2/4] powerpc: Refactor kexec functions to move arch independent code to ima
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 3/4] arm64: Store IMA log information in kimage used for kexec
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v4 4/4] ima_tpm.sh: Fix calculating PCR aggregate
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v4 3/4] ima_tpm.sh: Fix calculating boot aggregate
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v4 2/4] IMA: Rewrite ima_boot_aggregate.c to new API
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v4 1/4] IMA: Move get_algorithm_digest(), set_digest_index() to ima_setup.sh
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v4 0/4] TPM 2.0 fixes in IMA tests
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v13 4/5] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v13 4/5] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/1] ima: Add test for selinux measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/4] TPM 2.0 fixes in IMA tests
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v13 5/5] security: keys: trusted: Make sealed key properly interoperable
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v13 4/5] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v13 3/5] security: keys: trusted: fix TPM2 authorizations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] ima_tpm.sh: Fix calculating boot aggregate
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v3 2/4] IMA: Rewrite ima_boot_aggregate.c to new API
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v3 0/4] TPM 2.0 fixes in IMA tests
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v13 0/5] TPM 2.0 trusted key rework
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- Re: [PATCH 05/13] x86: Add early TPM1.2/TPM2.0 interface support for Secure Launch
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 05/13] x86: Add early TPM1.2/TPM2.0 interface support for Secure Launch
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 4/4] Revert "tpm: Revert "tpm_tis_core: Turn on the TPM before probing IRQ's""
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] tpm_tis: fix IRQ probing
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/4] tpm_tis: Fix interrupts for TIS TPMs without legacy cycles
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] tpm_tis: Clean up locality release
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] tpm_tis: Clean up locality release
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [Regression] "tpm: Require that all digests are present in TCG_PCR_EVENT2 structures" causes null pointer dereference
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: More interrupt problems with TIS TPM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add a check for invalid status
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add a check for invalid status
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 05/13] x86: Add early TPM1.2/TPM2.0 interface support for Secure Launch
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/4] TPM 2.0 fixes in IMA tests
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] KEYS: trusted: Reserve TPM for seal and unseal operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v3 2/2] KEYS: trusted: Reserve TPM for seal and unseal operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v3 1/2] KEYS: trusted: Fix incorrect handling of tpm_get_random()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH 4/4] Revert "tpm: Revert "tpm_tis_core: Turn on the TPM before probing IRQ's""
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 3/4] tpm_tis: fix IRQ probing
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 2/4] tpm_tis: Fix interrupts for TIS TPMs without legacy cycles
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/4] tpm_tis: Clean up locality release
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 0/4] tpm_tis: fix interrupts (again)
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/4] IMA: Rewrite ima_boot_aggregate.c to new API
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 3/4] ima_tpm.sh: Fix calculating boot aggregate
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 4/4] ima_tpm.sh: Fix calculating PCR aggregate
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [Regression] "tpm: Require that all digests are present in TCG_PCR_EVENT2 structures" causes null pointer dereference
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 03/13] x86: Add early SHA support for Secure Launch early measurements
- From: Jason Andryuk <jandryuk@xxxxxxxxx>
- [PATCH v3 1/4] IMA: Move get_algorithm_digest(), set_digest_index() to ima_setup.sh
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v3 4/4] ima_tpm.sh: Fix calculating PCR aggregate
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v3 3/4] ima_tpm.sh: Fix calculating boot aggregate
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v3 2/4] IMA: Rewrite ima_boot_aggregate.c to new API
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v3 0/4] TPM 2.0 fixes in IMA tests
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 07/13] x86: Secure Launch kernel early boot stub
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH 07/13] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v2 3/4] ima_tpm.sh: Fix calculating boot aggregate
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] ima_tpm.sh: Fix calculating boot aggregate
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 1/1] selinux: Measure state and hash of policy using IMA
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/1] ima: Add test for selinux measurement
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- More interrupt problems with TIS TPM
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: Fwd: How to extract linux kernel version information from a kernel image?
- From: Raphael Gianotti <raphgi@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: only export stand alone version of flush context command
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add a check for invalid status
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v1 1/1] ima: Add test for selinux measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v1 0/1] ima: Add test for selinux measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add a check for invalid status
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] tpm: only export stand alone version of flush context command
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [Regression] "tpm: Require that all digests are present in TCG_PCR_EVENT2 structures" causes null pointer dereference
- From: "Kenneth R. Crudup" <kenny@xxxxxxxxx>
- Re: [PATCH] tpm: only export stand alone version of flush context command
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH] tpm_tis: Add a check for invalid status
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- Re: [PATCH] tpm: only export stand alone version of flush context command
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] KEYS: trusted: Reserve TPM for seal and unseal operations
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [Regression] "tpm: Require that all digests are present in TCG_PCR_EVENT2 structures" causes null pointer dereference
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: only export stand alone version of flush context command
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: only export stand alone version of flush context command
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] selinux: Measure state and hash of policy using IMA
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [Regression] "tpm: Require that all digests are present in TCG_PCR_EVENT2 structures" causes null pointer dereference
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [Regression] "tpm: Require that all digests are present in TCG_PCR_EVENT2 structures" causes null pointer dereference
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2 2/2] KEYS: trusted: Reserve TPM for seal and unseal operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v2 1/2] KEYS: trusted: Fix incorrect handling of tpm_get_random()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] KEYS: trusted: Fix incorrect handling of tpm_get_random()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: only export stand alone version of flush context command
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: of: avoid __va() translation for event log address
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [Regression] "tpm: Require that all digests are present in TCG_PCR_EVENT2 structures" causes null pointer dereference
- From: Kai-Heng Feng <kai.heng.feng@xxxxxxxxxxxxx>
- Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [Regression] "tpm: Require that all digests are present in TCG_PCR_EVENT2 structures" causes null pointer dereference
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH 2/2] KEYS: trusted: Reserve TPM for seal and unseal operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH 1/2] KEYS: trusted: Fix incorrect handling of tpm_get_random()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [Regression] "tpm: Require that all digests are present in TCG_PCR_EVENT2 structures" causes null pointer dereference
- From: Kai-Heng Feng <kai.heng.feng@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: only export stand alone version of flush context command
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: only export stand alone version of flush context command
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: only export stand alone version of flush context command
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: of: avoid __va() translation for event log address
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH] tpm: of: avoid __va() translation for event log address
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- Re: [PATCH 2/2] tpm: Revert "tpm_tis_core: Turn on the TPM before probing IRQ's"
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v2 1/2] IMA: generalize key measurement tests
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/2] IMA: Add test for dm-crypt measurement
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/2] IMA: Add test for dm-crypt measurement
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: only export stand alone version of flush context command
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: only export stand alone version of flush context command
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- Re: [PATCH 00/13] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v13 3/5] security: keys: trusted: fix TPM2 authorizations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: of: avoid __va() translation for event log address
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH] tpm: only export stand alone version of flush context command
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] tpm: Revert "tpm_tis_core: Turn on the TPM before probing IRQ's"
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- [PATCH 1/1] selinux: Measure state and hash of policy using IMA
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/1] selinux: Measure state and hash of policy using IMA
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- [PATCH v3 2/3] IMA: Support measurement of generic data during early
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 1/3] IMA: Generalize early boot measurement of asymmetric keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 3/3] IMA: Support early boot measurement of critical data
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 0/3] IMA: Generalize early boot data measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v13 4/5] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: Fwd: How to extract linux kernel version information from a kernel image?
- From: "Kayaalp, Mehmet" <Mehmet.Kayaalp@xxxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/13] x86: Trenchboot secure dynamic launch Linux kernel support
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 07/13] x86: Secure Launch kernel early boot stub
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- [PATCH v2 4/4] ima_tpm.sh: Fix calculating PCR aggregate
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v2 3/4] ima_tpm.sh: Fix calculating boot aggregate
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v2 2/4] IMA: Rewrite ima_boot_aggregate.c to new API
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v2 1/4] IMA: Move get_algorithm_digest(), set_digest_index() to ima_setup.sh
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v2 0/4] TPM 2.0 fixes in IMA tests
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 3/4] ima_tpm.sh: Fix calculating boot aggregate
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH 4/4] ima_tpm.sh: Fix calculating PCR aggregate
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH 3/4] ima_tpm.sh: Fix calculating boot aggregate
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH 2/4] IMA: Rewrite ima_boot_aggregate.c to new API
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH 1/4] IMA: Move get_algorithm_digest(), set_digest_index() to ima_setup.sh
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH 0/4] TPM 2.0 fixes in IMA tests
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v13 3/5] security: keys: trusted: fix TPM2 authorizations
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/13] x86: Secure Launch Kconfig
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH 07/13] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH] lib/mpi: Fix unused variable warnings
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: of: avoid __va() translation for event log address
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] tpm: of: avoid __va() translation for event log address
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH] lib/mpi: Fix unused variable warnings
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH] lib/mpi: Fix unused variable warnings
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 00/10] crpyto: introduce OSCCA certificate and SM2 asymmetric algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v13 3/5] security: keys: trusted: fix TPM2 authorizations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: of: avoid __va() translation for event log address
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] tpm: of: avoid __va() translation for event log address
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: of: avoid __va() translation for event log address
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 05/13] x86: Add early TPM1.2/TPM2.0 interface support for Secure Launch
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 00/13] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 01/13] x86: Secure Launch Kconfig
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Fwd: How to extract linux kernel version information from a kernel image?
- From: Raphael Gianotti <raphgi@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 07/13] x86: Secure Launch kernel early boot stub
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v10 1/3] fs: Add trusted_for(2) syscall implementation and related sysctl
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v10 3/3] selftest/interpreter: Add tests for trusted_for(2) policies
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v10 2/3] arch: Wire up trusted_for(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v10 0/3] Add trusted_for(2) (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH 00/13] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH 08/13] x86: Secure Launch kernel late boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH 02/13] x86: Secure Launch main header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH 01/13] x86: Secure Launch Kconfig
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH 07/13] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH 11/13] kexec: Secure Launch kexec SEXIT support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]