Linux Integrity
Thread Index
[
Prev Page
][
Next Page
]
[PATCH 1/6] ima-evm-utils: Change env variable TPM_SERVER_TYPE for, tpm_server
From
: Ken Goldman <kgold@xxxxxxxxxxxxx>
[PATCH v5 16/16] test_firmware: Test partial read support
From
: Kees Cook <keescook@xxxxxxxxxxxx>
[PATCH v5 04/16] fs/kernel_read_file: Split into separate source file
From
: Kees Cook <keescook@xxxxxxxxxxxx>
[PATCH v5 03/16] fs/kernel_read_file: Split into separate include file
From
: Kees Cook <keescook@xxxxxxxxxxxx>
[PATCH v5 06/16] fs/kernel_read_file: Switch buffer size arg to size_t
From
: Kees Cook <keescook@xxxxxxxxxxxx>
[PATCH v5 08/16] LSM: Introduce kernel_post_load_data() hook
From
: Kees Cook <keescook@xxxxxxxxxxxx>
[PATCH v5 12/16] IMA: Add support for file reads without contents
From
: Kees Cook <keescook@xxxxxxxxxxxx>
[PATCH v5 07/16] fs/kernel_read_file: Add file_size output argument
From
: Kees Cook <keescook@xxxxxxxxxxxx>
[PATCH v5 11/16] LSM: Add "contents" flag to kernel_read_file hook
From
: Kees Cook <keescook@xxxxxxxxxxxx>
[PATCH v5 09/16] firmware_loader: Use security_post_load_data()
From
: Kees Cook <keescook@xxxxxxxxxxxx>
[PATCH v5 13/16] fs/kernel_file_read: Add "offset" arg for partial reads
From
: Kees Cook <keescook@xxxxxxxxxxxx>
[PATCH v5 10/16] module: Call security_kernel_post_load_data()
From
: Kees Cook <keescook@xxxxxxxxxxxx>
[PATCH v5 15/16] firmware: Add request_partial_firmware_into_buf()
From
: Kees Cook <keescook@xxxxxxxxxxxx>
[PATCH v5 14/16] firmware: Store opt_flags in fw_priv
From
: Kees Cook <keescook@xxxxxxxxxxxx>
[PATCH v5 05/16] fs/kernel_read_file: Remove redundant size argument
From
: Kees Cook <keescook@xxxxxxxxxxxx>
[PATCH v5 00/16] Introduce partial kernel_read_file() support
From
: Kees Cook <keescook@xxxxxxxxxxxx>
[PATCH v5 02/16] fs/kernel_read_file: Remove FIRMWARE_EFI_EMBEDDED enum
From
: Kees Cook <keescook@xxxxxxxxxxxx>
[PATCH v5 01/16] fs/kernel_read_file: Remove FIRMWARE_PREALLOC_BUFFER enum
From
: Kees Cook <keescook@xxxxxxxxxxxx>
[PATCH v1] dm verity: Add support for signature verification with 2nd keyring
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v11 2/3] arch: Wire up trusted_for(2)
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCH v11 2/3] arch: Wire up trusted_for(2)
From
: Tycho Andersen <tycho@tycho.pizza>
Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 0/4] TPM 2.0 fixes in IMA tests
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
[PATCH v2 5/5] Revert "tpm: Revert "tpm_tis_core: Turn on the TPM before probing IRQ's""
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v2 4/5] tpm_tis: fix IRQ probing
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v2 3/5] tpm_tis: Fix interrupts for TIS TPMs without legacy cycles
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v2 2/5] tpm_tis: Clean up locality release
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v2 1/5] tpm_tis: Fix check_locality for correct locality acquisition
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v2 0/5] tpm_tis: fix interrupts (again)
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/4] tpm_tis: Clean up locality release
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v11 0/3] Add trusted_for(2) (was O_MAYEXEC)
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v11 1/3] fs: Add trusted_for(2) syscall implementation and related sysctl
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v11 3/3] selftest/interpreter: Add tests for trusted_for(2) policies
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v11 2/3] arch: Wire up trusted_for(2)
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCH 1/4] tpm_tis: Clean up locality release
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 0/4] TPM 2.0 fixes in IMA tests
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH v4 4/4] ima_tpm.sh: Fix calculating PCR aggregate
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/4] tpm_tis: Clean up locality release
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v4 4/4] ima_tpm.sh: Fix calculating PCR aggregate
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 1/4] tpm_tis: Clean up locality release
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH 1/4] tpm_tis: Clean up locality release
From
: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
Re: [PATCH 1/4] tpm_tis: Clean up locality release
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/4] tpm_tis: Clean up locality release
From
: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH v7 1/4] powerpc: Refactor kexec functions to move arch independent code to kernel
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
[PATCH v7 0/3] Carry forward IMA measurement log on kexec on ARM64
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
[PATCH v7 4/4] arm64: Add IMA kexec buffer to DTB
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
[PATCH v7 2/4] powerpc: Refactor kexec functions to move arch independent code to ima
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
[PATCH v7 3/4] arm64: Store IMA log information in kimage used for kexec
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v4 4/4] ima_tpm.sh: Fix calculating PCR aggregate
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH v4 3/4] ima_tpm.sh: Fix calculating boot aggregate
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH v4 2/4] IMA: Rewrite ima_boot_aggregate.c to new API
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH v4 1/4] IMA: Move get_algorithm_digest(), set_digest_index() to ima_setup.sh
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH v4 0/4] TPM 2.0 fixes in IMA tests
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v13 4/5] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v13 4/5] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v1 0/1] ima: Add test for selinux measurement
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 0/4] TPM 2.0 fixes in IMA tests
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v13 5/5] security: keys: trusted: Make sealed key properly interoperable
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v13 4/5] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v13 3/5] security: keys: trusted: fix TPM2 authorizations
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v2 3/4] ima_tpm.sh: Fix calculating boot aggregate
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH v3 2/4] IMA: Rewrite ima_boot_aggregate.c to new API
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH v3 0/4] TPM 2.0 fixes in IMA tests
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH v13 0/5] TPM 2.0 trusted key rework
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
From
: Hao Wu <hao.wu@xxxxxxxxxx>
Re: [PATCH 05/13] x86: Add early TPM1.2/TPM2.0 interface support for Secure Launch
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH 05/13] x86: Add early TPM1.2/TPM2.0 interface support for Secure Launch
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH 4/4] Revert "tpm: Revert "tpm_tis_core: Turn on the TPM before probing IRQ's""
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH 3/4] tpm_tis: fix IRQ probing
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH 2/4] tpm_tis: Fix interrupts for TIS TPMs without legacy cycles
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH 1/4] tpm_tis: Clean up locality release
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH 1/4] tpm_tis: Clean up locality release
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [Regression] "tpm: Require that all digests are present in TCG_PCR_EVENT2 structures" causes null pointer dereference
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: More interrupt problems with TIS TPM
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] tpm_tis: Add a check for invalid status
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] tpm_tis: Add a check for invalid status
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH 05/13] x86: Add early TPM1.2/TPM2.0 interface support for Secure Launch
From
: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 0/4] TPM 2.0 fixes in IMA tests
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v3 2/2] KEYS: trusted: Reserve TPM for seal and unseal operations
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH v3 2/2] KEYS: trusted: Reserve TPM for seal and unseal operations
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH v3 1/2] KEYS: trusted: Fix incorrect handling of tpm_get_random()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH 4/4] Revert "tpm: Revert "tpm_tis_core: Turn on the TPM before probing IRQ's""
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH 3/4] tpm_tis: fix IRQ probing
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH 2/4] tpm_tis: Fix interrupts for TIS TPMs without legacy cycles
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH 1/4] tpm_tis: Clean up locality release
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH 0/4] tpm_tis: fix interrupts (again)
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 2/4] IMA: Rewrite ima_boot_aggregate.c to new API
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 3/4] ima_tpm.sh: Fix calculating boot aggregate
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 4/4] ima_tpm.sh: Fix calculating PCR aggregate
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [Regression] "tpm: Require that all digests are present in TCG_PCR_EVENT2 structures" causes null pointer dereference
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 03/13] x86: Add early SHA support for Secure Launch early measurements
From
: Jason Andryuk <jandryuk@xxxxxxxxx>
[PATCH v3 1/4] IMA: Move get_algorithm_digest(), set_digest_index() to ima_setup.sh
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH v3 4/4] ima_tpm.sh: Fix calculating PCR aggregate
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH v3 3/4] ima_tpm.sh: Fix calculating boot aggregate
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH v3 2/4] IMA: Rewrite ima_boot_aggregate.c to new API
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH v3 0/4] TPM 2.0 fixes in IMA tests
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH 07/13] x86: Secure Launch kernel early boot stub
From
: Arvind Sankar <nivedita@xxxxxxxxxxxx>
Re: [PATCH 07/13] x86: Secure Launch kernel early boot stub
From
: Ross Philipson <ross.philipson@xxxxxxxxxx>
Re: [PATCH v2 3/4] ima_tpm.sh: Fix calculating boot aggregate
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 3/4] ima_tpm.sh: Fix calculating boot aggregate
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH 1/1] selinux: Measure state and hash of policy using IMA
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v1 0/1] ima: Add test for selinux measurement
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
From
: Hao Wu <hao.wu@xxxxxxxxxx>
More interrupt problems with TIS TPM
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: Fwd: How to extract linux kernel version information from a kernel image?
From
: Raphael Gianotti <raphgi@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH] tpm: only export stand alone version of flush context command
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] tpm_tis: Add a check for invalid status
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
From
: Hao Wu <hao.wu@xxxxxxxxxx>
Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH v1 1/1] ima: Add test for selinux measurement
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
[PATCH v1 0/1] ima: Add test for selinux measurement
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] tpm_tis: Add a check for invalid status
From
: Jason Gunthorpe <jgg@xxxxxxxx>
Re: [PATCH] tpm: only export stand alone version of flush context command
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [Regression] "tpm: Require that all digests are present in TCG_PCR_EVENT2 structures" causes null pointer dereference
From
: "Kenneth R. Crudup" <kenny@xxxxxxxxx>
Re: [PATCH] tpm: only export stand alone version of flush context command
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH] tpm_tis: Add a check for invalid status
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
From
: Hao Wu <hao.wu@xxxxxxxxxx>
Re: [PATCH] tpm: only export stand alone version of flush context command
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 2/2] KEYS: trusted: Reserve TPM for seal and unseal operations
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [Regression] "tpm: Require that all digests are present in TCG_PCR_EVENT2 structures" causes null pointer dereference
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] tpm: only export stand alone version of flush context command
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] tpm: only export stand alone version of flush context command
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH 1/1] selinux: Measure state and hash of policy using IMA
From
: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
Re: [Regression] "tpm: Require that all digests are present in TCG_PCR_EVENT2 structures" causes null pointer dereference
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [Regression] "tpm: Require that all digests are present in TCG_PCR_EVENT2 structures" causes null pointer dereference
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v2 2/2] KEYS: trusted: Reserve TPM for seal and unseal operations
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH v2 1/2] KEYS: trusted: Fix incorrect handling of tpm_get_random()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH 1/2] KEYS: trusted: Fix incorrect handling of tpm_get_random()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] tpm: only export stand alone version of flush context command
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH] tpm: of: avoid __va() translation for event log address
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [Regression] "tpm: Require that all digests are present in TCG_PCR_EVENT2 structures" causes null pointer dereference
From
: Kai-Heng Feng <kai.heng.feng@xxxxxxxxxxxxx>
Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [Regression] "tpm: Require that all digests are present in TCG_PCR_EVENT2 structures" causes null pointer dereference
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH 2/2] KEYS: trusted: Reserve TPM for seal and unseal operations
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH 1/2] KEYS: trusted: Fix incorrect handling of tpm_get_random()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[Regression] "tpm: Require that all digests are present in TCG_PCR_EVENT2 structures" causes null pointer dereference
From
: Kai-Heng Feng <kai.heng.feng@xxxxxxxxxxxxx>
Re: [PATCH] tpm: only export stand alone version of flush context command
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] tpm: only export stand alone version of flush context command
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] tpm: only export stand alone version of flush context command
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] tpm: of: avoid __va() translation for event log address
From
: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
Re: [PATCH] tpm: of: avoid __va() translation for event log address
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
From
: Hao Wu <hao.wu@xxxxxxxxxx>
Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
From
: Hao Wu <hao.wu@xxxxxxxxxx>
Re: [PATCH 2/2] tpm: Revert "tpm_tis_core: Turn on the TPM before probing IRQ's"
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH v2 1/2] IMA: generalize key measurement tests
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v2 0/2] IMA: Add test for dm-crypt measurement
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v2 2/2] IMA: Add test for dm-crypt measurement
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] tpm: only export stand alone version of flush context command
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH] tpm: only export stand alone version of flush context command
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
From
: Hao Wu <hao.wu@xxxxxxxxxx>
Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
From
: Hao Wu <hao.wu@xxxxxxxxxx>
Re: [PATCH 00/13] x86: Trenchboot secure dynamic launch Linux kernel support
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v13 3/5] security: keys: trusted: fix TPM2 authorizations
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] tpm: of: avoid __va() translation for event log address
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH] tpm: only export stand alone version of flush context command
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/2] tpm: Revert "tpm_tis_core: Turn on the TPM before probing IRQ's"
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
From
: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
From
: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
From
: Hao Wu <hao.wu@xxxxxxxxxx>
Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH] Fix Atmel TPM crash caused by too frequent queries
From
: Hao Wu <hao.wu@xxxxxxxxxx>
[PATCH 1/1] selinux: Measure state and hash of policy using IMA
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
[PATCH v2 0/1] selinux: Measure state and hash of policy using IMA
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
From
: Arvind Sankar <nivedita@xxxxxxxxxxxx>
[PATCH v3 2/3] IMA: Support measurement of generic data during early
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
[PATCH v3 1/3] IMA: Generalize early boot measurement of asymmetric keys
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
[PATCH v3 3/3] IMA: Support early boot measurement of critical data
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
[PATCH v3 0/3] IMA: Generalize early boot data measurement
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v13 4/5] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
From
: kernel test robot <lkp@xxxxxxxxx>
Re: Fwd: How to extract linux kernel version information from a kernel image?
From
: "Kayaalp, Mehmet" <Mehmet.Kayaalp@xxxxxxx>
Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
From
: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
From
: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 00/13] x86: Trenchboot secure dynamic launch Linux kernel support
From
: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 07/13] x86: Secure Launch kernel early boot stub
From
: Arvind Sankar <nivedita@xxxxxxxxxxxx>
[PATCH v2 4/4] ima_tpm.sh: Fix calculating PCR aggregate
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH v2 3/4] ima_tpm.sh: Fix calculating boot aggregate
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH v2 2/4] IMA: Rewrite ima_boot_aggregate.c to new API
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH v2 1/4] IMA: Move get_algorithm_digest(), set_digest_index() to ima_setup.sh
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH v2 0/4] TPM 2.0 fixes in IMA tests
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH 3/4] ima_tpm.sh: Fix calculating boot aggregate
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH 4/4] ima_tpm.sh: Fix calculating PCR aggregate
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH 3/4] ima_tpm.sh: Fix calculating boot aggregate
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH 2/4] IMA: Rewrite ima_boot_aggregate.c to new API
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH 1/4] IMA: Move get_algorithm_digest(), set_digest_index() to ima_setup.sh
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH 0/4] TPM 2.0 fixes in IMA tests
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH v13 3/5] security: keys: trusted: fix TPM2 authorizations
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 01/13] x86: Secure Launch Kconfig
From
: Ross Philipson <ross.philipson@xxxxxxxxxx>
Re: [PATCH 07/13] x86: Secure Launch kernel early boot stub
From
: Ross Philipson <ross.philipson@xxxxxxxxxx>
Re: [PATCH] lib/mpi: Fix unused variable warnings
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
Re: [PATCH] tpm: of: avoid __va() translation for event log address
From
: Jason Gunthorpe <jgg@xxxxxxxx>
Re: [PATCH] tpm: of: avoid __va() translation for event log address
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCH] lib/mpi: Fix unused variable warnings
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
[PATCH] lib/mpi: Fix unused variable warnings
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v7 00/10] crpyto: introduce OSCCA certificate and SM2 asymmetric algorithm
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v13 3/5] security: keys: trusted: fix TPM2 authorizations
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] tpm: of: avoid __va() translation for event log address
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH] tpm: of: avoid __va() translation for event log address
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] tpm: of: avoid __va() translation for event log address
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH 05/13] x86: Add early TPM1.2/TPM2.0 interface support for Secure Launch
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH 00/13] x86: Trenchboot secure dynamic launch Linux kernel support
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH 01/13] x86: Secure Launch Kconfig
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
From
: Arvind Sankar <nivedita@xxxxxxxxxxxx>
Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
From
: Pavel Machek <pavel@xxxxxx>
Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
From
: Pavel Machek <pavel@xxxxxx>
Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
From
: Florian Weimer <fw@xxxxxxxxxxxxx>
Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
From
: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
Fwd: How to extract linux kernel version information from a kernel image?
From
: Raphael Gianotti <raphgi@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 07/13] x86: Secure Launch kernel early boot stub
From
: Arvind Sankar <nivedita@xxxxxxxxxxxx>
Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v10 1/3] fs: Add trusted_for(2) syscall implementation and related sysctl
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v10 3/3] selftest/interpreter: Add tests for trusted_for(2) policies
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v10 2/3] arch: Wire up trusted_for(2)
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v10 0/3] Add trusted_for(2) (was O_MAYEXEC)
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH 00/13] x86: Trenchboot secure dynamic launch Linux kernel support
From
: Ross Philipson <ross.philipson@xxxxxxxxxx>
[PATCH 08/13] x86: Secure Launch kernel late boot stub
From
: Ross Philipson <ross.philipson@xxxxxxxxxx>
[PATCH 02/13] x86: Secure Launch main header file
From
: Ross Philipson <ross.philipson@xxxxxxxxxx>
[PATCH 01/13] x86: Secure Launch Kconfig
From
: Ross Philipson <ross.philipson@xxxxxxxxxx>
[PATCH 07/13] x86: Secure Launch kernel early boot stub
From
: Ross Philipson <ross.philipson@xxxxxxxxxx>
[PATCH 11/13] kexec: Secure Launch kexec SEXIT support
From
: Ross Philipson <ross.philipson@xxxxxxxxxx>
[PATCH 06/13] x86: Add early general TPM interface support for Secure Launch
From
: Ross Philipson <ross.philipson@xxxxxxxxxx>
[PATCH 13/13] tpm: Allow locality 2 to be set when initializing the TPM for Secure Launch
From
: Ross Philipson <ross.philipson@xxxxxxxxxx>
[PATCH 03/13] x86: Add early SHA support for Secure Launch early measurements
From
: Ross Philipson <ross.philipson@xxxxxxxxxx>
[PATCH 04/13] x86: Add early TPM TIS/CRB interface support for Secure Launch
From
: Ross Philipson <ross.philipson@xxxxxxxxxx>
[PATCH 12/13] reboot: Secure Launch SEXIT support on reboot paths
From
: Ross Philipson <ross.philipson@xxxxxxxxxx>
[PATCH 10/13] x86: Secure Launch adding event log securityfs
From
: Ross Philipson <ross.philipson@xxxxxxxxxx>
[PATCH 09/13] x86: Secure Launch SMP bringup support
From
: Ross Philipson <ross.philipson@xxxxxxxxxx>
[PATCH 05/13] x86: Add early TPM1.2/TPM2.0 interface support for Secure Launch
From
: Ross Philipson <ross.philipson@xxxxxxxxxx>
Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
From
: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
From
: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
From
: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
From
: Pavel Machek <pavel@xxxxxx>
Re: [PATCH v6 0/3] Carry forward IMA measurement log on kexec on ARM64
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
From
: Arvind Sankar <nivedita@xxxxxxxxxxxx>
Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
From
: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
[PATCH v4 3/6] IMA: update process_buffer_measurement to measure buffer hash
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v4 5/6] IMA: add hook to measure critical data from kernel components
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v4 1/6] IMA: generalize keyring specific measurement constructs
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v4 6/6] IMA: validate supported kernel data sources before measurement
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v4 0/6] IMA: Infrastructure for measurement of critical kernel data
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v4 4/6] IMA: add policy to measure critical data from kernel components
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v4 2/6] IMA: conditionally allow empty rule data
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
From
: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
From
: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
From
: Arvind Sankar <nivedita@xxxxxxxxxxxx>
Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
From
: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
From
: Solar Designer <solar@xxxxxxxxxxxx>
Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
From
: Solar Designer <solar@xxxxxxxxxxxx>
Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
From
: Andy Lutomirski <luto@xxxxxxxxxx>
Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
From
: Solar Designer <solar@xxxxxxxxxxxx>
Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
From
: Pavel Machek <pavel@xxxxxx>
Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
From
: Florian Weimer <fweimer@xxxxxxxxxx>
Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
From
: Solar Designer <solar@xxxxxxxxxxxx>
Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
From
: Solar Designer <solar@xxxxxxxxxxxx>
Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
From
: Arvind Sankar <nivedita@xxxxxxxxxxxx>
Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
From
: Pavel Machek <pavel@xxxxxx>
Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
From
: Pavel Machek <pavel@xxxxxx>
Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
From
: Arvind Sankar <nivedita@xxxxxxxxxxxx>
Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
From
: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
[PATCH v2 3/4] [RFC] arm64/trampfd: Provide support for the trampoline file descriptor
From
: madvenka@xxxxxxxxxxxxxxxxxxx
[PATCH v2 4/4] [RFC] arm/trampfd: Provide support for the trampoline file descriptor
From
: madvenka@xxxxxxxxxxxxxxxxxxx
[PATCH v2 2/4] [RFC] x86/trampfd: Provide support for the trampoline file descriptor
From
: madvenka@xxxxxxxxxxxxxxxxxxx
[PATCH v2 1/4] [RFC] fs/trampfd: Implement the trampoline file descriptor API
From
: madvenka@xxxxxxxxxxxxxxxxxxx
[PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
From
: madvenka@xxxxxxxxxxxxxxxxxxx
Re: [PATCH v12 4/5] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v12 4/5] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
From
: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
[PATCH] tpm: of: avoid __va() translation for event log address
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v13 3/3] security: keys: trusted: implement counter/timer policy
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v13 2/3] security: keys: trusted: add ability to specify arbitrary policy
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v13 1/3] security: keys: trusted: add PCR policy to TPM2 keys
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v13 0/3] Trusted Key policy for TPM 2.0
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v13 5/5] security: keys: trusted: Make sealed key properly interoperable
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v13 4/5] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v13 3/5] security: keys: trusted: fix TPM2 authorizations
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v13 2/5] oid_registry: Add TCG defined OIDS for TPM keys
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v13 1/5] lib: add ASN.1 encoder
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v13 0/5] TPM 2.0 trusted key rework
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v12 4/5] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Measuring an adapter card firmware update into TPM PCRs
From
: Ken Goldman <kgold@xxxxxxxxxxxxx>
[PATCH -next] tpm/st33zp24: simplify the return expression of st33zp24_spi_probe()
From
: Qinglang Miao <miaoqinglang@xxxxxxxxxx>
[PATCH ima-evm-utils 1/1] help: Add missing new line for --ignore-violations
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH -next] tpm/st33zp24/i2c: simplify the return expression of st33zp24_i2c_remove
From
: Liu Shixin <liushixin2@xxxxxxxxxx>
Re: [PATCH v12 4/5] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
From
: kernel test robot <lkp@xxxxxxxxx>
[PATCH v12 3/3] security: keys: trusted: implement counter/timer policy
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v12 2/3] security: keys: trusted: add ability to specify arbitrary policy
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v12 1/3] security: keys: trusted: add PCR policy to TPM2 keys
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v12 0/3] Trusted Key policy for TPM 2.0
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v12 5/5] security: keys: trusted: Make sealed key properly interoperable
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v12 4/5] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v12 3/5] security: keys: trusted: fix TPM2 authorizations
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v12 2/5] oid_registry: Add TCG defined OIDS for TPM keys
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v12 1/5] lib: add ASN.1 encoder
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v12 0/5] TPM 2.0 trusted key rework
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v7 06/10] crypto: testmgr - Fix potential memory leak in test_akcipher_one()
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
[PATCH v7 07/10] crypto: sm2 - add SM2 test vectors to testmgr
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
[PATCH v7 08/10] X.509: support OSCCA certificate parse
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
[PATCH v7 04/10] crypto: sm2 - introduce OSCCA SM2 asymmetric cipher algorithm
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
[PATCH v7 09/10] X.509: support OSCCA SM2-with-SM3 certificate verification
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
[PATCH v7 05/10] crypto: testmgr - support test with different ciphertext per encryption
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
[PATCH v7 01/10] crypto: sm3 - export crypto_sm3_final function
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
[PATCH v7 10/10] integrity: Asymmetric digsig supports SM2-with-SM3 algorithm
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
[PATCH v7 03/10] lib/mpi: Introduce ec implementation to MPI library
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
[PATCH v7 02/10] lib/mpi: Extend the MPI library
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
[PATCH v7 00/10] crpyto: introduce OSCCA certificate and SM2 asymmetric algorithm
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
Re: [PATCH v11 1/3] security: keys: trusted: add PCR policy to TPM2 keys
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v6 1/4] KEYS: trusted: Add generic trusted keys framework
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: LSM that blocks execution of the code from the anonymous pages
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: LSM that blocks execution of the code from the anonymous pages
From
: Igor Zhbanov <i.zhbanov@xxxxxxxxxxxx>
Re: LSM that blocks execution of the code from the anonymous pages
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 07/12] evm: Introduce EVM_RESET_STATUS atomic flag
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
RE: [PATCH v2 07/12] evm: Introduce EVM_RESET_STATUS atomic flag
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v11 4/5] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
RE: [PATCH v2 11/12] ima: Introduce template field evmsig and write to field sig as fallback
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v6 1/4] KEYS: trusted: Add generic trusted keys framework
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v6 1/4] KEYS: trusted: Add generic trusted keys framework
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v2 11/12] ima: Introduce template field evmsig and write to field sig as fallback
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v6 0/4] Introduce TEE based Trusted Keys support
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
[PATCH v6 3/4] doc: trusted-encrypted: updates with TEE as a new trust source
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
[PATCH v6 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
[PATCH v6 4/4] MAINTAINERS: Add entry for TEE based Trusted Keys
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
[PATCH v6 1/4] KEYS: trusted: Add generic trusted keys framework
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
From
: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
From
: Florian Weimer <fw@xxxxxxxxxxxxx>
Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
From
: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 11/12] ima: Introduce template field evmsig and write to field sig as fallback
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 00/12] IMA/EVM fixes
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v11 3/5] security: keys: trusted: fix TPM2 authorizations
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v2 09/12] evm: Allow setxattr() and setattr() if metadata digest won't change
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 07/12] evm: Introduce EVM_RESET_STATUS atomic flag
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 08/12] evm: Allow xattr/attr operations for portable signatures if check fails
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
From
: Florian Weimer <fw@xxxxxxxxxxxxx>
Re: [PATCH v1] tpm: use %*ph to print small buffer
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v2 00/12] IMA/EVM fixes
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 04/12] evm: Execute evm_inode_init_security() only when the HMAC key is loaded
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v11 4/5] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v11 3/5] security: keys: trusted: fix TPM2 authorizations
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v2 2/4] [RFC] x86/trampfd: Provide support for the trampoline file descriptor
From
: madvenka@xxxxxxxxxxxxxxxxxxx
[PATCH v2 3/4] [RFC] arm64/trampfd: Provide support for the trampoline file descriptor
From
: madvenka@xxxxxxxxxxxxxxxxxxx
[PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
From
: madvenka@xxxxxxxxxxxxxxxxxxx
[PATCH v2 4/4] [RFC] arm/trampfd: Provide support for the trampoline file descriptor
From
: madvenka@xxxxxxxxxxxxxxxxxxx
Re: intel_iommu=on breaks resume from suspend on several Thinkpad models
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v11 4/5] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
From
: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
[PATCH v2 1/4] [RFC] fs/trampfd: Implement the trampoline file descriptor API
From
: madvenka@xxxxxxxxxxxxxxxxxxx
Re: [PATCH v11 4/5] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
From
: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
Re: [PATCH] ima: Use kmemdup rather than kmalloc+memcpy
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [RFC PATCH v9 2/3] arch: Wire up introspect_access(2)
From
: Arnd Bergmann <arnd@xxxxxxxx>
Re: I'm getting panic()s in tpm2_bios_measurements_start()- but don't know why
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v1] tpm: use %*ph to print small buffer
From
: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v1] tpm: use %*ph to print small buffer
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v11 3/5] security: keys: trusted: fix TPM2 authorizations
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
From
: Hao Wu <hao.wu@xxxxxxxxxx>
Re: [PATCH v11 1/3] security: keys: trusted: add PCR policy to TPM2 keys
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: I'm getting panic()s in tpm2_bios_measurements_start()- but don't know why
From
: "Kenneth R. Crudup" <kenny@xxxxxxxxx>
RE: [RFC PATCH 00/30] ima: Introduce IMA namespace
From
: Krzysztof Struczynski <krzysztof.struczynski@xxxxxxxxxx>
Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
RE: [RFC PATCH 00/30] ima: Introduce IMA namespace
From
: Krzysztof Struczynski <krzysztof.struczynski@xxxxxxxxxx>
Re: [RFC PATCH v9 0/3] Add introspect_access(2) (was O_MAYEXEC)
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCH v1] tpm: use %*ph to print small buffer
From
: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
Re: [PATCH 1/6] efistub: pass uefi secureboot flag via fdt params
From
: Chester Lin <clin@xxxxxxxx>
Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
From
: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
[PATCH] Fix Atmel TPM crash caused by too frequent queries
From
: Hao Wu <hao.wu@xxxxxxxxxx>
Re: [PATCH 2/2] ima-evm-utils: Add test for sigfile reading
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v11 4/5] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v11 4/5] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [Bug Report] Kernel 4.14+ TPM Driver Bug for Atmel TPM Chip
From
: Hao Wu <hao.wu@xxxxxxxxxx>
Re: [Bug Report] Kernel 4.14+ TPM Driver Bug for Atmel TPM Chip
From
: Hao Wu <hao.wu@xxxxxxxxxx>
Re: Potential IMA Signing Bug
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
I'm getting panic()s in tpm2_bios_measurements_start()- but don't know why
From
: "Kenneth R. Crudup" <kenny@xxxxxxxxx>
Re: Potential IMA Signing Bug
From
: Alexander Gaidis <alexander_gaidis@xxxxxxxxx>
[PATCH 2/2] ima-evm-utils: Add test for sigfile reading
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH 1/2] ima-evm-utils: Fix reading of sigfile
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v11 3/3] security: keys: trusted: implement counter/timer policy
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v11 2/3] security: keys: trusted: add ability to specify arbitrary policy
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v11 1/3] security: keys: trusted: add PCR policy to TPM2 keys
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v11 0/3] Trusted Key policy for TPM 2.0
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v11 0/3] Trusted Key policy for TPM 2.0
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v11 5/5] security: keys: trusted: Make sealed key properly interoperable
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v11 4/5] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v11 3/5] security: keys: trusted: fix TPM2 authorizations
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v11 2/5] oid_registry: Add TCG defined OIDS for TPM keys
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v11 1/5] lib: add ASN.1 encoder
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v11 0/5] TPM 2.0 trusted key rework
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [Bug Report] Kernel 4.14+ TPM Driver Bug for Atmel TPM Chip
From
: hamza@xxxxxxx
Re: [Bug Report] Kernel 4.14+ TPM Driver Bug for Atmel TPM Chip
From
: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
Re: [Bug Report] Kernel 4.14+ TPM Driver Bug for Atmel TPM Chip
From
: Hao Wu <hao.wu@xxxxxxxxxx>
Re: [Bug Report] Kernel 4.14+ TPM Driver Bug for Atmel TPM Chip
From
: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
Re: [PATCH v6 3/3] arm64: Add IMA kexec buffer to DTB
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
Re: [PATCH v6 1/3] powerpc: Refactor kexec functions to move arch independent code to IMA
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
Re: [RFC PATCH v9 0/3] Add introspect_access(2) (was O_MAYEXEC)
From
: James Morris <jmorris@xxxxxxxxx>
Re: [RFC PATCH v8 0/3] Add support for AT_INTERPRETED (was O_MAYEXEC)
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH v3 2/2] dm-crypt: collect data and submit to DM to measure
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [Bug Report] Kernel 4.14+ TPM Driver Bug for Atmel TPM Chip
From
: Ken Goldman <kgold@xxxxxxxxxxxxx>
Re: [PATCH v3 3/4] ima: limit secure boot feedback scope for appraise
From
: Bruno Meneguele <bmeneg@xxxxxxxxxx>
Re: [RFC PATCH v9 0/3] Add introspect_access(2) (was O_MAYEXEC)
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCH v3 5/6] IMA: add hook to measure critical data from kernel components
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 4/6] IMA: add policy to measure critical data from kernel components
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/6] efistub: pass uefi secureboot flag via fdt params
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
Re: [PATCH v3 3/4] ima: limit secure boot feedback scope for appraise
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 3/6] IMA: update process_buffer_measurement to measure buffer hash
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH v9 0/3] Add introspect_access(2) (was O_MAYEXEC)
From
: Igor Zhbanov <i.zhbanov@xxxxxxxxxxxx>
Re: [PATCH v3 2/6] IMA: change process_buffer_measurement return type from void to int
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 1/6] IMA: generalize keyring specific measurement constructs
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: Potential IMA Signing Bug
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH RESEND v4 0/1] add sysfs exports for TPM 2 PCR registers
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH RESEND v4 0/1] add sysfs exports for TPM 2 PCR registers
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [Bug Report] Kernel 4.14+ TPM Driver Bug for Atmel TPM Chip
From
: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH v9 0/3] Add introspect_access(2) (was O_MAYEXEC)
From
: Matthew Wilcox <willy@xxxxxxxxxxxxx>
Re: [RFC PATCH v9 0/3] Add introspect_access(2) (was O_MAYEXEC)
From
: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH v9 0/3] Add introspect_access(2) (was O_MAYEXEC)
From
: Matthew Wilcox <willy@xxxxxxxxxxxxx>
Re: [RFC PATCH v9 0/3] Add introspect_access(2) (was O_MAYEXEC)
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [RFC PATCH v9 0/3] Add introspect_access(2) (was O_MAYEXEC)
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [RFC PATCH v9 0/3] Add introspect_access(2) (was O_MAYEXEC)
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [RFC PATCH v9 0/3] Add introspect_access(2) (was O_MAYEXEC)
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [RFC PATCH v9 0/3] Add introspect_access(2) (was O_MAYEXEC)
From
: Matthew Wilcox <willy@xxxxxxxxxxxxx>
[RFC PATCH v9 0/3] Add introspect_access(2) (was O_MAYEXEC)
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [RFC PATCH v8 0/3] Add support for AT_INTERPRETED (was O_MAYEXEC)
From
: Thibaut Sautereau <thibaut.sautereau@xxxxxxxxxxx>
Re: [PATCH] IMA: Add test for dm-crypt measurement
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH] IMA: Add test for dm-crypt measurement
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Potential IMA Signing Bug
From
: Alexander Gaidis <alexander_gaidis@xxxxxxxxx>
[PATCH] ima: Use kmemdup rather than kmalloc+memcpy
From
: Alex Dewar <alex.dewar90@xxxxxxxxx>
Re: [RFC PATCH v8 0/3] Add support for AT_INTERPRETED (was O_MAYEXEC)
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [RFC PATCH v8 0/3] Add support for AT_INTERPRETED (was O_MAYEXEC)
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCH v4] docs: trusted-encrypted.rst: update parameters for command examples
From
: Jonathan Corbet <corbet@xxxxxxx>
Re: [RFC PATCH v8 0/3] Add support for AT_INTERPRETED (was O_MAYEXEC)
From
: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH v8 0/3] Add support for AT_INTERPRETED (was O_MAYEXEC)
From
: Matthew Wilcox <willy@xxxxxxxxxxxxx>
Re: [RFC PATCH 00/30] ima: Introduce IMA namespace
From
: "Dr. Greg" <greg@xxxxxxxxxxxx>
Re: [RFC PATCH v8 0/3] Add support for AT_INTERPRETED (was O_MAYEXEC)
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCH RESEND v4 0/1] add sysfs exports for TPM 2 PCR registers
From
: Greg KH <greg@xxxxxxxxx>
[PATCH v6 1/3] powerpc: Refactor kexec functions to move arch independent code to IMA
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
[PATCH v6 3/3] arm64: Add IMA kexec buffer to DTB
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
[PATCH v6 2/3] arm64: Store IMA log information in kimage used for kexec
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
[PATCH v6 0/3] Carry forward IMA measurement log on kexec on ARM64
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH v8 1/3] fs: Introduce AT_INTERPRETED flag for faccessat2(2)
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [RFC PATCH v8 1/3] fs: Introduce AT_INTERPRETED flag for faccessat2(2)
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [RFC PATCH v8 1/3] fs: Introduce AT_INTERPRETED flag for faccessat2(2)
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [RFC PATCH v8 1/3] fs: Introduce AT_INTERPRETED flag for faccessat2(2)
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] SELinux: Measure state and hash of policy using IMA
From
: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
Re: [PATCH] SELinux: Measure state and hash of policy using IMA
From
: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
Re: [PATCH] SELinux: Measure state and hash of policy using IMA
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH v8 0/3] Add support for AT_INTERPRETED (was O_MAYEXEC)
From
: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH v8 1/3] fs: Introduce AT_INTERPRETED flag for faccessat2(2)
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH RESEND v4 0/1] add sysfs exports for TPM 2 PCR registers
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH RESEND v4 0/1] add sysfs exports for TPM 2 PCR registers
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] SELinux: Measure state and hash of policy using IMA
From
: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
Re: [PATCH RESEND v4 1/1] tpm: add sysfs exports for all banks of PCR registers
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [RFC PATCH v8 1/3] fs: Introduce AT_INTERPRETED flag for faccessat2(2)
From
: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
Re: [RFC PATCH 00/30] ima: Introduce IMA namespace
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [RFC PATCH v8 1/3] fs: Introduce AT_INTERPRETED flag for faccessat2(2)
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [RFC PATCH v8 1/3] fs: Introduce AT_INTERPRETED flag for faccessat2(2)
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [RFC PATCH v8 1/3] fs: Introduce AT_INTERPRETED flag for faccessat2(2)
From
: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
Re: [RFC PATCH v8 1/3] fs: Introduce AT_INTERPRETED flag for faccessat2(2)
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [RFC PATCH v8 1/3] fs: Introduce AT_INTERPRETED flag for faccessat2(2)
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCH] SELinux: Measure state and hash of policy using IMA
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
[RFC PATCH v8 3/3] selftest/interpreter: Add tests for AT_INTERPRETED enforcing
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[RFC PATCH v8 1/3] fs: Introduce AT_INTERPRETED flag for faccessat2(2)
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[RFC PATCH v8 2/3] fs,doc: Enable to configure exec checks for AT_INTERPRETED
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[RFC PATCH v8 0/3] Add support for AT_INTERPRETED (was O_MAYEXEC)
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCH RESEND v4 0/1] add sysfs exports for TPM 2 PCR registers
From
: Greg KH <greg@xxxxxxxxx>
Re: [PATCH] SELinux: Measure state and hash of policy using IMA
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] SELinux: Measure state and hash of policy using IMA
From
: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
Re: [PATCH RESEND v4 0/1] add sysfs exports for TPM 2 PCR registers
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH] SELinux: Measure state and hash of policy using IMA
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH RESEND v4 1/1] tpm: add sysfs exports for all banks of PCR registers
From
: Greg KH <greg@xxxxxxxxx>
Re: [PATCH RESEND v4 0/1] add sysfs exports for TPM 2 PCR registers
From
: Greg KH <greg@xxxxxxxxx>
Re: [PATCH v2 04/12] evm: Execute evm_inode_init_security() only when the HMAC key is loaded
From
: Sasha Levin <sashal@xxxxxxxxxx>
Re: [PATCH v2 01/12] ima: Don't ignore errors from crypto_shash_update()
From
: Sasha Levin <sashal@xxxxxxxxxx>
Re: [PATCH RESEND v4 0/1] add sysfs exports for TPM 2 PCR registers
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH RESEND v4 1/1] tpm: add sysfs exports for all banks of PCR registers
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH RESEND v4 1/1] tpm: add sysfs exports for all banks of PCR registers
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH RESEND v4 1/1] tpm: add sysfs exports for all banks of PCR registers
From
: Greg KH <greg@xxxxxxxxx>
Re: [PATCH RESEND v4 0/1] add sysfs exports for TPM 2 PCR registers
From
: Greg KH <greg@xxxxxxxxx>
intel_iommu=on breaks resume from suspend on several Thinkpad models
From
: Ronan Jouchet <ronan.jouchet@xxxxxxxxx>
[PATCH RESEND v4 1/1] tpm: add sysfs exports for all banks of PCR registers
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH RESEND v4 0/1] add sysfs exports for TPM 2 PCR registers
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH 00/30] ima: Introduce IMA namespace
From
: "Dr. Greg" <greg@xxxxxxxxxxxx>
Re: [PATCH v20 14/23] LSM: Ensure the correct LSM context releaser
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v20 12/23] IMA: Change internal interfaces to use lsmblobs
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v20 10/23] LSM: Use lsmblob in security_inode_getsecid
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v20 09/23] LSM: Use lsmblob in security_task_getsecid
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
[PATCH v3 3/4] ima: limit secure boot feedback scope for appraise
From
: Bruno Meneguele <bmeneg@xxxxxxxxxx>
Re: [PATCH v2 3/4] ima: limit secure boot feedback scope for appraise
From
: Bruno Meneguele <bmeneg@xxxxxxxxxx>
Re: [PATCH v2 3/4] ima: limit secure boot feedback scope for appraise
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v2 4/4] integrity: prompt keyring name for unknown key request
From
: Bruno Meneguele <bmeneg@xxxxxxxxxx>
[PATCH v2 3/4] ima: limit secure boot feedback scope for appraise
From
: Bruno Meneguele <bmeneg@xxxxxxxxxx>
[PATCH v2 2/4] integrity: invalid kernel parameters feedback
From
: Bruno Meneguele <bmeneg@xxxxxxxxxx>
[PATCH v2 1/4] ima: add check for enforced appraise option
From
: Bruno Meneguele <bmeneg@xxxxxxxxxx>
[PATCH v2 0/4] integrity: improve user feedback for invalid bootparams
From
: Bruno Meneguele <bmeneg@xxxxxxxxxx>
Re: [PATCH 3/4] ima: limit secure boot feedback scope for appraise
From
: Bruno Meneguele <bmeneg@xxxxxxxxxx>
Re: [RFC PATCH 00/30] ima: Introduce IMA namespace
From
: "Dr. Greg" <greg@xxxxxxxxxxxx>
Re: [PATCH] tpm_tis: work around status register bug in STMicroelectronics TPM
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH 5/6] arm64/ima: add ima arch support
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v2 10/12] ima: Allow imasig requirement to be satisfied by EVM portable signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v2 12/12] ima: Don't remove security.ima if file must not be appraised
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v2 11/12] ima: Introduce template field evmsig and write to field sig as fallback
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v2 05/12] evm: Load EVM key in ima_load_x509() to avoid appraisal
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v2 07/12] evm: Introduce EVM_RESET_STATUS atomic flag
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v2 08/12] evm: Allow xattr/attr operations for portable signatures if check fails
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v2 06/12] evm: Refuse EVM_ALLOW_METADATA_WRITES only if the HMAC key is loaded
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v2 09/12] evm: Allow setxattr() and setattr() if metadata digest won't change
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v2 02/12] ima: Remove semicolon at the end of ima_get_binary_runtime_size()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v2 00/12] IMA/EVM fixes
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v2 01/12] ima: Don't ignore errors from crypto_shash_update()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v2 03/12] evm: Check size of security.evm before using it
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v2 04/12] evm: Execute evm_inode_init_security() only when the HMAC key is loaded
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 1/6] efistub: pass uefi secureboot flag via fdt params
From
: Chester Lin <clin@xxxxxxxx>
[PATCH 2/6] efi/arm: a helper to parse secure boot param in fdt params
From
: Chester Lin <clin@xxxxxxxx>
[PATCH 6/6] docs/arm: add the description of uefi-secure-boot param
From
: Chester Lin <clin@xxxxxxxx>
[PATCH 5/6] arm64/ima: add ima arch support
From
: Chester Lin <clin@xxxxxxxx>
[PATCH 4/6] efi/arm: check secure boot status in efi init
From
: Chester Lin <clin@xxxxxxxx>
[PATCH 3/6] efi: add secure boot flag
From
: Chester Lin <clin@xxxxxxxx>
[PATCH 0/6] add ima_arch support for ARM64
From
: Chester Lin <clin@xxxxxxxx>
Re: [PATCH v5 3/3] arm64: Add IMA kexec buffer to DTB
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v5 3/3] arm64: Add IMA kexec buffer to DTB
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
Re: [PATCH v5 2/3] arm64: Store IMA log information in kimage used for kexec
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
Re: [PATCH v5 1/3] powerpc: Refactor kexec functions to move arch independent code to IMA
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
Re: tpm:warn(2.0): out of memory for object contexts
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: tpm:warn(2.0): out of memory for object contexts
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
LSM that blocks execution of the code from the anonymous pages
From
: Igor Zhbanov <i.zhbanov@xxxxxxxxxxxx>
tpm:warn(2.0): out of memory for object contexts
From
: William Roberts <bill.c.roberts@xxxxxxxxx>
Re: [RFC PATCH 00/30] ima: Introduce IMA namespace
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [RFC PATCH 00/30] ima: Introduce IMA namespace
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 01/11] evm: Execute evm_inode_init_security() only when the HMAC key is loaded
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
RE: [PATCH 01/11] evm: Execute evm_inode_init_security() only when the HMAC key is loaded
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [RFC] ima: export the measurement list when needed
From
: Janne Karhunen <janne.karhunen@xxxxxxxxx>
Re: [RFC] ima: export the measurement list when needed
From
: Raphael Gianotti <raphgi@xxxxxxxxxxxxxxxxxxx>
[PATCH v5 1/3] powerpc: Refactor kexec functions to move arch independent code to IMA
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
[PATCH v5 3/3] arm64: Add IMA kexec buffer to DTB
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
[PATCH v5 2/3] arm64: Store IMA log information in kimage used for kexec
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
[PATCH v5 0/3] Carry forward IMA measurement log on kexec on ARM64
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
From
: Mark Rutland <mark.rutland@xxxxxxx>
Re: [PATCH 07/11] evm: Set IMA_CHANGE_XATTR/ATTR bit if EVM_ALLOW_METADATA_WRITES is set
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 07/11] evm: Set IMA_CHANGE_XATTR/ATTR bit if EVM_ALLOW_METADATA_WRITES is set
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
RE: [PATCH 07/11] evm: Set IMA_CHANGE_XATTR/ATTR bit if EVM_ALLOW_METADATA_WRITES is set
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
RE: [PATCH 07/11] evm: Set IMA_CHANGE_XATTR/ATTR bit if EVM_ALLOW_METADATA_WRITES is set
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [RFC] ima: export the measurement list when needed
From
: Janne Karhunen <janne.karhunen@xxxxxxxxx>
Re: [PATCH] IMA: Add test for dm-crypt measurement
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH 03/11] evm: Refuse EVM_ALLOW_METADATA_WRITES only if the HMAC key is loaded
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 02/11] evm: Load EVM key in ima_load_x509() to avoid appraisal
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 5/6] IMA: add hook to measure critical data from kernel components
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 4/6] IMA: add policy to measure critical data from kernel components
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 3/6] IMA: update process_buffer_measurement to measure buffer hash
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [RFC] ima: export the measurement list when needed
From
: Raphael Gianotti <raphgi@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] SELinux: Measure state and hash of policy using IMA
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] SELinux: Measure state and hash of policy using IMA
From
: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
Re: [PATCH] tpm_tis: work around status register bug in STMicroelectronics TPM
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v3 1/6] IMA: generalize keyring specific measurement constructs
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 2/6] IMA: change process_buffer_measurement return type from void to int
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 2/2] dm-crypt: collect data and submit to DM to measure
From
: Milan Broz <gmazyland@xxxxxxxxx>
Re: [LTP v4 4/5] IMA: Add a test to verify measurement of certificate imported into a keyring
From
: Petr Vorel <pvorel@xxxxxxx>
RE: [PATCH 02/11] evm: Load EVM key in ima_load_x509() to avoid appraisal
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
RE: [PATCH 06/11] evm: Allow setxattr() and setattr() if metadata digest won't change
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
RE: [PATCH 03/11] evm: Refuse EVM_ALLOW_METADATA_WRITES only if the HMAC key is loaded
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
ping//Re: [PATCH] security: fix some spelling mistakes in the comments by codespell
From
: Xiaoming Ni <nixiaoming@xxxxxxxxxx>
RE: IMA policy based on AppArmor profiles
From
: "Magalhaes, Guilherme (Brazil R&D-CL)" <guilherme.magalhaes@xxxxxxx>
[PATCH] IMA: Add test for dm-crypt measurement
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] tpm_tis: work around status register bug in STMicroelectronics TPM
From
: Jason Andryuk <jandryuk@xxxxxxxxx>
Re: [PATCH] tpm_tis: work around status register bug in STMicroelectronics TPM
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v4 5/5] arm64: Add IMA kexec buffer to DTB
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
Re: [PATCH v4 4/5] arm64: Store IMA log information in kimage used for kexec
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v3 2/2] dm-crypt: collect data and submit to DM to measure
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v3 1/2] dm-devel: collect target data and submit to IMA to measure
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v3 0/2] dm-devel:dm-crypt: infrastructure for measurement of DM target data using IMA
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v4 2/5] powerpc: Use libfdt functions to fetch IMA buffer properties
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v4 1/5] powerpc: Refactor kexec functions to move arch independent code to IMA
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v4 1/5] powerpc: Refactor kexec functions to move arch independent code to IMA
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
[PATCH v2 2/3] IMA: Support measurement of generic data during early boot
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
[PATCH v2 1/3] IMA: Generalize early boot measurement of asymmetric keys
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
[PATCH v2 0/3] IMA: Generalize early boot data measurement
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
[PATCH v2 3/3] IMA: Support early boot measurement of critical data
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [LTP v4 4/5] IMA: Add a test to verify measurement of certificate imported into a keyring
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [LTP v4 4/5] IMA: Add a test to verify measurement of certificate imported into a keyring
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [LTP v4 4/5] IMA: Add a test to verify measurement of certificate imported into a keyring
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [LTP v4 4/5] IMA: Add a test to verify measurement of certificate imported into a keyring
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [LTP v4 4/5] IMA: Add a test to verify measurement of certificate imported into a keyring
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [LTP v4 4/5] IMA: Add a test to verify measurement of certificate imported into a keyring
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [LTP v4 4/5] IMA: Add a test to verify measurement of certificate imported into a keyring
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH v3 3/6] IMA: update process_buffer_measurement to measure buffer hash
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v3 2/6] IMA: change process_buffer_measurement return type from void to int
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v3 0/6] IMA: Infrastructure for measurement of critical kernel data
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v3 6/6] IMA: validate supported kernel data sources before measurement
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v3 1/6] IMA: generalize keyring specific measurement constructs
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v3 5/6] IMA: add hook to measure critical data from kernel components
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[PATCH v3 4/6] IMA: add policy to measure critical data from kernel components
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v4 1/5] powerpc: Refactor kexec functions to move arch independent code to IMA
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
Re: [PATCH v4 3/5] IMA: Refactor do_get_kexec_buffer() to call of_ functions directly
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
Re: [PATCH v4 2/5] powerpc: Use libfdt functions to fetch IMA buffer properties
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
Re: [LTP v4 4/5] IMA: Add a test to verify measurement of certificate imported into a keyring
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v4 1/5] powerpc: Refactor kexec functions to move arch independent code to IMA
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
Re: [LTP v4 4/5] IMA: Add a test to verify measurement of certificate imported into a keyring
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [LTP v4 4/5] IMA: Add a test to verify measurement of certificate imported into a keyring
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] tpm_tis: work around status register bug in STMicroelectronics TPM
From
: Jason Andryuk <jandryuk@xxxxxxxxx>
Re: IMA metadata format to support fs-verity
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [LTP v4 4/5] IMA: Add a test to verify measurement of certificate imported into a keyring
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [LTP v4 4/5] IMA: Add a test to verify measurement of certificate imported into a keyring
From
: Petr Vorel <pvorel@xxxxxxx>
Re: IMA metadata format to support fs-verity
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: IMA metadata format to support fs-verity
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: IMA metadata format to support fs-verity
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [LTP v4 4/5] IMA: Add a test to verify measurement of certificate imported into a keyring
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: IMA metadata format to support fs-verity
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: IMA metadata format to support fs-verity
From
: Chuck Lever <chuck.lever@xxxxxxxxxx>
Re: IMA metadata format to support fs-verity
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: IMA metadata format to support fs-verity
From
: Chuck Lever <chuck.lever@xxxxxxxxxx>
Re: IMA metadata format to support fs-verity
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
IMA metadata format to support fs-verity
From
: Chuck Lever <chuck.lever@xxxxxxxxxx>
Re: [PATCH v2 0/2] ima: Fix keyrings race condition and other key related bugs
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
[PATCH v20 14/23] LSM: Ensure the correct LSM context releaser
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v20 12/23] IMA: Change internal interfaces to use lsmblobs
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v20 11/23] LSM: Use lsmblob in security_cred_getsecid
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v20 10/23] LSM: Use lsmblob in security_inode_getsecid
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v20 09/23] LSM: Use lsmblob in security_task_getsecid
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [RFC] ima: export the measurement list when needed
From
: Janne Karhunen <janne.karhunen@xxxxxxxxx>
Re: [RFC] ima: export the measurement list when needed
From
: Janne Karhunen <janne.karhunen@xxxxxxxxx>
Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] SELinux: Measure state and hash of policy using IMA
From
: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
Re: [RFC] ima: export the measurement list when needed
From
: Janne Karhunen <janne.karhunen@xxxxxxxxx>
Re: [PATCH v2 2/3] IMA: add policy to support measuring critical data from kernel components
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] SELinux: Measure state and hash of policy using IMA
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 2/3] IMA: add policy to support measuring critical data from kernel components
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] IMA: Handle early boot data measurement
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] IMA: Handle early boot data measurement
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] IMA: Handle early boot data measurement
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] IMA: Handle early boot data measurement
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] IMA: Handle early boot data measurement
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 2/3] IMA: add policy to support measuring critical data from kernel components
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] IMA: Handle early boot data measurement
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] IMA: Handle early boot data measurement
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v2 2/3] IMA: add policy to support measuring critical data from kernel components
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] SELinux: Measure state and hash of policy using IMA
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
From
: Jason Gunthorpe <jgg@xxxxxxxxxx>
Re: [PATCH] SELinux: Measure state and hash of policy using IMA
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
[PATCH] ima: use kmemdup() rather than kmalloc+memcpy
From
: Alex Dewar <alex.dewar90@xxxxxxxxx>
Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 4/4] integrity: prompt keyring name for unknown key request
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 2/4] integrity: invalid kernel parameters feedback
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 3/4] ima: limit secure boot feedback scope for appraise
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] SELinux: Measure state and hash of policy using IMA
From
: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] SELinux: Measure state and hash of policy using IMA
From
: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
Re: [PATCH v2 0/2] ima: Fix keyrings race condition and other key related bugs
From
: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 0/2] ima: Fix keyrings race condition and other key related bugs
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] SELinux: Measure state and hash of policy using IMA
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 01/11] evm: Execute evm_inode_init_security() only when the HMAC key is loaded
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [LTP v4 1/5] IMA/ima_keys.sh: Fix policy content check usage
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [LTP v4 1/5] IMA/ima_keys.sh: Fix policy content check usage
From
: Petr Vorel <pvorel@xxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]