Linux Integrity
[Prev Page][Next Page]
- Re: [PATCH v3] ima: Avoid blocking in RCU read-side critical section
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] ima: Avoid blocking in RCU read-side critical section
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [linux-next:master] BUILD REGRESSION 6906a84c482f098d31486df8dc98cead21cce2d0
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v3] ima: Avoid blocking in RCU read-side critical section
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] ima: Avoid blocking in RCU read-side critical section
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v7 4/4] optee: probe RPMB device using RPMB subsystem
- From: Jens Wiklander <jens.wiklander@xxxxxxxxxx>
- Re: [PATCH v7 4/4] optee: probe RPMB device using RPMB subsystem
- From: Mikko Rapeli <mikko.rapeli@xxxxxxxxxx>
- Re: [RFC PATCH v2 8/8] clavis: Introduce new LSM called clavis
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH v2 8/8] clavis: Introduce new LSM called clavis
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH] tpm: Add new device/vendor ID 0x50666666
- From: Jett Rink <jettrink@xxxxxxxxxxxx>
- Re: [PATCH v1 1/1] treewide: Align match_string() with sysfs_match_string()
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH] char: tpm: Fix possible memory leak in tpm_bios_measurements_open()
- From: Joe Hattori <joe@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 4/5] keys: asymmetric: Add tpm2_key_rsa
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH v2 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [PATCH v3 0/2] KEYS: add missing MODULE_DESCRIPTION() macros
- From: Jeff Johnson <quic_jjohnson@xxxxxxxxxxx>
- [PATCH v3 1/2] KEYS: trusted: add missing MODULE_DESCRIPTION()
- From: Jeff Johnson <quic_jjohnson@xxxxxxxxxxx>
- [PATCH v3 2/2] KEYS: encrypted: add missing MODULE_DESCRIPTION()
- From: Jeff Johnson <quic_jjohnson@xxxxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: add missing MODULE_DESCRIPTION()
- From: Jeff Johnson <quic_jjohnson@xxxxxxxxxxx>
- Re: [PATCH v9 04/19] x86: Secure Launch Resource Table header file
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v9 04/19] x86: Secure Launch Resource Table header file
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 0/8] Clavis LSM
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH v2 1/8] certs: Introduce ability to link to a system key
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v9 04/19] x86: Secure Launch Resource Table header file
- From: ross.philipson@xxxxxxxxxx
- Re: [GIT PULL] TPM DEVICE DRIVER: tpmdd-next-6.10-rc3
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v1 1/1] treewide: Align match_string() with sysfs_match_string()
- From: AngeloGioacchino Del Regno <angelogioacchino.delregno@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: tpm_crb: Call acpi_put_table() on firmware bug
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH v2] tpm: tpm_crb: Call acpi_put_table() on firmware bug
- From: Joe Hattori <dev@xxxxxxxxxxxx>
- Re: [PATCH v1 1/1] treewide: Align match_string() with sysfs_match_string()
- From: "Gautham R. Shenoy" <gautham.shenoy@xxxxxxx>
- Re: [PATCH v9 04/19] x86: Secure Launch Resource Table header file
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 04/19] x86: Secure Launch Resource Table header file
- From: ross.philipson@xxxxxxxxxx
- [GIT PULL] TPM DEVICE DRIVER: tpmdd-next-6.10-rc3
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 04/19] x86: Secure Launch Resource Table header file
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 04/19] x86: Secure Launch Resource Table header file
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 16/19] tpm: Add ability to set the preferred locality the TPM chip uses
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v9 04/19] x86: Secure Launch Resource Table header file
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v9 16/19] tpm: Add ability to set the preferred locality the TPM chip uses
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 10/19] x86: Secure Launch SMP bringup support
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 09/19] x86: Secure Launch kernel late boot stub
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 08/19] x86: Secure Launch kernel early boot stub
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 04/19] x86: Secure Launch Resource Table header file
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 3/5] crypto: tpm2_key: Introduce a TPM2 key type
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 16/19] tpm: Add ability to set the preferred locality the TPM chip uses
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v9 10/19] x86: Secure Launch SMP bringup support
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v9 09/19] x86: Secure Launch kernel late boot stub
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v9 09/19] x86: Secure Launch kernel late boot stub
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v9 08/19] x86: Secure Launch kernel early boot stub
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v3] ima: Avoid blocking in RCU read-side critical section
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v9 08/19] x86: Secure Launch kernel early boot stub
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v9 08/19] x86: Secure Launch kernel early boot stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v9 05/19] x86: Secure Launch main header file
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH] tpm: tpm_crb: Call acpi_put_table() on firmware bug
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 04/19] x86: Secure Launch Resource Table header file
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v7 4/5] keys: asymmetric: Add tpm2_key_rsa
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 01/19] x86/boot: Place kernel_info at a fixed offset
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v9 17/19] tpm: Add sysfs interface to allow setting and querying the preferred locality
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 16/19] tpm: Add ability to set the preferred locality the TPM chip uses
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 14/19] tpm: Ensure tpm is in known state at startup
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 13/19] tpm: Protect against locality counter underflow
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 10/19] x86: Secure Launch SMP bringup support
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 09/19] x86: Secure Launch kernel late boot stub
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 09/19] x86: Secure Launch kernel late boot stub
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 08/19] x86: Secure Launch kernel early boot stub
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v1 1/1] treewide: Align match_string() with sysfs_match_string()
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 3/5] crypto: tpm2_key: Introduce a TPM2 key type
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v1 1/1] treewide: Align match_string() with sysfs_match_string()
- From: Rodrigo Vivi <rodrigo.vivi@xxxxxxxxx>
- Re: [PATCH v9 05/19] x86: Secure Launch main header file
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 04/19] x86: Secure Launch Resource Table header file
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 01/19] x86/boot: Place kernel_info at a fixed offset
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 1/8] certs: Introduce ability to link to a system key
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 0/8] Clavis LSM
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 08/19] x86: Secure Launch kernel early boot stub
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v9 08/19] x86: Secure Launch kernel early boot stub
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v9 08/19] x86: Secure Launch kernel early boot stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v9 08/19] x86: Secure Launch kernel early boot stub
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v7 3/5] crypto: tpm2_key: Introduce a TPM2 key type
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 19/19] x86: EFI stub DRTM launch support for Secure Launch
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v9 08/19] x86: Secure Launch kernel early boot stub
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v2] KEYS: trusted: add missing MODULE_DESCRIPTION()
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v1 1/1] treewide: Align match_string() with sysfs_match_string()
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH v1 1/1] treewide: Align match_string() with sysfs_match_string()
- From: Andi Shyti <andi.shyti@xxxxxxxxxx>
- Re: [PATCH v1 1/1] treewide: Align match_string() with sysfs_match_string()
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v1 1/1] treewide: Align match_string() with sysfs_match_string()
- From: Sakari Ailus <sakari.ailus@xxxxxxxxxxxxxxx>
- Re: [PATCH v1 1/1] treewide: Align match_string() with sysfs_match_string()
- From: Wolfram Sang <wsa+renesas@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 1/1] treewide: Align match_string() with sysfs_match_string()
- From: Vinod Koul <vkoul@xxxxxxxxxx>
- Re: [PATCH v1 1/1] treewide: Align match_string() with sysfs_match_string()
- From: Jani Nikula <jani.nikula@xxxxxxxxxxxxxxx>
- Re: [PATCH v1 1/1] treewide: Align match_string() with sysfs_match_string()
- From: Heiko Stübner <heiko@xxxxxxxxx>
- Re: [PATCH v1 1/1] treewide: Align match_string() with sysfs_match_string()
- From: Daniel Bristot de Oliveira <bristot@xxxxxxxxxx>
- Re: [PATCH v1 1/1] treewide: Align match_string() with sysfs_match_string()
- From: Zhihao Cheng <chengzhihao1@xxxxxxxxxx>
- Re: [PATCH v1 1/1] treewide: Align match_string() with sysfs_match_string()
- From: Damien Le Moal <dlemoal@xxxxxxxxxx>
- Re: [PATCH v1 1/1] treewide: Align match_string() with sysfs_match_string()
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- [PATCH v1 1/1] treewide: Align match_string() with sysfs_match_string()
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] ima: Avoid blocking in RCU read-side critical section
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v19 15/20] fsverity: expose verified fsverity built-in signatures to LSMs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] tpm: tpm_crb: Call acpi_put_table() on firmware bug
- From: Joe Hattori <dev@xxxxxxxxxxxx>
- Re: [PATCH v19 12/20] dm verity: expose root hash digest and signature data to LSMs
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v19 11/20] block,lsm: add LSM blob and new LSM hooks for block device
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v19 15/20] fsverity: expose verified fsverity built-in signatures to LSMs
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v9 08/19] x86: Secure Launch kernel early boot stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v19 15/20] fsverity: expose verified fsverity built-in signatures to LSMs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: [PATCH v9 08/19] x86: Secure Launch kernel early boot stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v9 08/19] x86: Secure Launch kernel early boot stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v9 19/19] x86: EFI stub DRTM launch support for Secure Launch
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v9 08/19] x86: Secure Launch kernel early boot stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] crypto: sm2 - Remove sm2 algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v9 18/19] x86: Secure Launch late initcall platform module
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 16/19] tpm: Add ability to set the preferred locality the TPM chip uses
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 15/19] tpm: Make locality requests return consistent values
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 14/19] tpm: Ensure tpm is in known state at startup
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 11/19] kexec: Secure Launch kexec SEXIT support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 13/19] tpm: Protect against locality counter underflow
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 09/19] x86: Secure Launch kernel late boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 17/19] tpm: Add sysfs interface to allow setting and querying the preferred locality
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 12/19] reboot: Secure Launch SEXIT support on reboot paths
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 10/19] x86: Secure Launch SMP bringup support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 07/19] x86: Add early SHA-256 support for Secure Launch early measurements
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 02/19] Documentation/x86: Secure Launch kernel documentation
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 05/19] x86: Secure Launch main header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 08/19] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 01/19] x86/boot: Place kernel_info at a fixed offset
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 00/19] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 04/19] x86: Secure Launch Resource Table header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 19/19] x86: EFI stub DRTM launch support for Secure Launch
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v9 03/19] x86: Secure Launch Kconfig
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v7 4/5] keys: asymmetric: Add tpm2_key_rsa
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v19 15/20] fsverity: expose verified fsverity built-in signatures to LSMs
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH v2 8/8] clavis: Introduce new LSM called clavis
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v2 7/8] clavis: Introduce a new key type called clavis_key_acl
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v2 0/8] Clavis LSM
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v2 6/8] keys: Add ability to track intended usage of the public key
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v2 3/8] efi: Make clavis boot param persist across kexec
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v2 5/8] keys: Add new verification type (VERIFYING_CLAVIS_SIGNATURE)
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v2 2/8] clavis: Introduce a new system keyring called clavis
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v2 1/8] certs: Introduce ability to link to a system key
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC PATCH v2 4/8] clavis: Prevent clavis boot param from changing during kexec
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v7 3/5] crypto: tpm2_key: Introduce a TPM2 key type
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v19 15/20] fsverity: expose verified fsverity built-in signatures to LSMs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2] KEYS: trusted: add missing MODULE_DESCRIPTION()
- From: Jeff Johnson <quic_jjohnson@xxxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: add MODULE_DESCRIPTION()
- From: Jeff Johnson <quic_jjohnson@xxxxxxxxxxx>
- Re: [PATCH] ima: fix wrong zero-assignment during securityfs dentry remove
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v19 15/20] fsverity: expose verified fsverity built-in signatures to LSMs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v19 15/20] fsverity: expose verified fsverity built-in signatures to LSMs
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v19 13/20] ipe: add support for dm-verity as a trust provider
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v19 15/20] fsverity: expose verified fsverity built-in signatures to LSMs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v19 13/20] ipe: add support for dm-verity as a trust provider
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: add MODULE_DESCRIPTION()
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v19 13/20] ipe: add support for dm-verity as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v19 15/20] fsverity: expose verified fsverity built-in signatures to LSMs
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v19 15/20] fsverity: expose verified fsverity built-in signatures to LSMs
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v19 15/20] fsverity: expose verified fsverity built-in signatures to LSMs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v19 15/20] fsverity: expose verified fsverity built-in signatures to LSMs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v19 13/20] ipe: add support for dm-verity as a trust provider
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] KEYS: trusted: add MODULE_DESCRIPTION()
- From: Jeff Johnson <quic_jjohnson@xxxxxxxxxxx>
- [PATCH] ima: fix wrong zero-assignment during securityfs dentry remove
- From: Enrico Bravi <enrico.bravi@xxxxxxxxx>
- Re: [PATCH v7 4/5] keys: asymmetric: Add tpm2_key_rsa
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH] tpm: Remove illict WARN's from tpm2-sessions.c
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] KEYS: trusted: Change -EINVAL to -E2BIG
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: Ping: [PATCH] tpm_tis: don't flush never initialized work
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: Ping: [PATCH] tpm_tis: don't flush never initialized work
- From: Jan Beulich <jbeulich@xxxxxxxx>
- Re: Ping: [PATCH] tpm_tis: don't flush never initialized work
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 2/5] KEYS: trusted: Change -EINVAL to -E2BIG
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Ping: [PATCH] tpm_tis: don't flush never initialized work
- From: Jan Beulich <jbeulich@xxxxxxxx>
- Re: [PATCH v7 2/5] KEYS: trusted: Change -EINVAL to -E2BIG
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v7 1/5] crypto: rsa-pkcs1pad: export rsa1_asn_lookup()
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 5/5] keys: asymmetric: Add tpm2_key_ecdsa
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 1/5] crypto: rsa-pkcs1pad: export rsa1_asn_lookup()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v7 5/5] keys: asymmetric: Add tpm2_key_ecdsa
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v7 5/5] keys: asymmetric: Add tpm2_key_ecdsa
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 5/5] keys: asymmetric: Add tpm2_key_ecdsa
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH v7 5/5] keys: asymmetric: Add tpm2_key_ecdsa
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v7 4/5] keys: asymmetric: Add tpm2_key_rsa
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v7 3/5] crypto: tpm2_key: Introduce a TPM2 key type
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v7 2/5] KEYS: trusted: Change -EINVAL to -E2BIG
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v7 1/5] crypto: rsa-pkcs1pad: export rsa1_asn_lookup()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v7 0/5] KEYS: asymmetric: tpm2_key_{rsa,ecdsa}
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] TPM DEVICE DRIVER: tpmdd-next-6.10-rc2
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] TPM DEVICE DRIVER: tpmdd-next-6.10-rc2
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH 3/3] tpm: Enable TCG_TPM2_HMAC by default only for X86_64
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2] tpm: Rename TPM2_OA_TMPL to TPM2_OA_NULL_KEY and make it local
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] tpm: Rename TPM2_OA_TMPL to TPM2_OA_NULL_KEY and make it local
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 1/6] tpm: Open code tpm_buf_parameters()
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH v6 6/6] keys: asymmetric: Add tpm2_key_ecdsa
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v6 5/6] keys: asymmetric: Add tpm2_key_rsa
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v6 4/6] crypto: tpm2_key: Introduce a TPM2 key type
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v6 3/6] KEYS: trusted: Change -EINVAL to -E2BIG
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v6 2/6] crypto: rsa-pkcs1pad: export rsa1_asn_lookup()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v6 1/6] tpm: Open code tpm_buf_parameters()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v6 0/6] KEYS: asymmetric: tpm2_key_{rsa,ecdsa}
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: Disable TCG_TPM2_HMAC by default
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: Disable TCG_TPM2_HMAC by default
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: Disable TCG_TPM2_HMAC by default
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] tpm: Disable TCG_TPM2_HMAC by default
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: Disable TCG_TPM2_HMAC by default
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] tpm: Disable TCG_TPM2_HMAC by default
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: Disable TCG_TPM2_HMAC by default
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: Disable TCG_TPM2_HMAC by default
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH AUTOSEL 6.6 02/16] ima: Fix use-after-free on a dentry's dname.name
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.8 03/20] ima: Fix use-after-free on a dentry's dname.name
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.9 04/23] ima: Fix use-after-free on a dentry's dname.name
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: Disable TCG_TPM2_HMAC by default
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: Disable TCG_TPM2_HMAC by default
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: Disable TCG_TPM2_HMAC by default
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: Disable TCG_TPM2_HMAC by default
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/6] tpm: consolidate TPM to crypto hash algorithm conversion
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: Open code tpm_buf_parameters()
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] lib/oid_registry: add ability to ASN.1 encode OIDs
- From: Ben Boeckel <me@xxxxxxxxxxxxxx>
- Re: [PATCH 1/6] tpm: consolidate TPM to crypto hash algorithm conversion
- From: Ben Boeckel <me@xxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Open code tpm_buf_parameters()
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- [PATCH] tpm: Open code tpm_buf_parameters()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] KEYS: trusted_tpm2: Only check options->keyhandle for ASN.1
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] KEYS: trusted_tpm2: Only check options->keyhandle for ASN.1
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] KEYS: trusted_tpm2: Only check options->keyhandle for ASN.1
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v19 12/20] dm verity: expose root hash digest and signature data to LSMs
- From: Mikulas Patocka <mpatocka@xxxxxxxxxx>
- [PATCH v19 19/20] Documentation: add ipe documentation
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v19 11/20] block,lsm: add LSM blob and new LSM hooks for block device
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v19 08/20] ipe: add userspace interface
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v19 16/20] ipe: enable support for fs-verity as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v19 13/20] ipe: add support for dm-verity as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v19 14/20] security: add security_inode_setintegrity() hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v19 18/20] ipe: kunit test for parser
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v19 17/20] scripts: add boot policy generation program
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v19 09/20] uapi|audit|ipe: add ipe auditing support
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v19 20/20] MAINTAINERS: ipe: add ipe maintainer information
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v19 15/20] fsverity: expose verified fsverity built-in signatures to LSMs
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v19 12/20] dm verity: expose root hash digest and signature data to LSMs
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v19 10/20] ipe: add permissive toggle
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v19 07/20] security: add new securityfs delete function
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v19 06/20] ipe: introduce 'boot_verified' as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v19 05/20] initramfs|security: Add a security hook to do_populate_rootfs()
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v19 02/20] ipe: add policy parser
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v19 00/20] Integrity Policy Enforcement LSM (IPE)
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v19 01/20] security: add ipe lsm
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v19 04/20] ipe: add LSM hooks on execution and kernel read
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v19 03/20] ipe: add evaluation loop
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] lib/oid_registry: add ability to ASN.1 encode OIDs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] lib/oid_registry: add ability to ASN.1 encode OIDs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] lib/oid_registry: add ability to ASN.1 encode OIDs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/6] tpm: consolidate TPM to crypto hash algorithm conversion
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/6] tpm: consolidate TPM to crypto hash algorithm conversion
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 3/3] lib: asn1_encode: remove obsolete asn1_encode_oid
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/3] KEYS: trusted: use encode_OID for OID encoding
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] lib/oid_registry: add ability to ASN.1 encode OIDs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 0/6] Add policy to sealed keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH 6/6] KEYS: trusted: add support for TPM keys with signed policy
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 5/6] KEYS: trusted: implement counter/timer policy
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 4/6] KEYS: trusted: add ability to specify arbitrary policy
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 3/6] KEYS: trusted: add PCR policy to TPM2 keys
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 2/6] tpm: add policy sessions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/6] tpm: consolidate TPM to crypto hash algorithm conversion
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 0/6] Add policy to sealed keys
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 3/3] lib: asn1_encode: remove obsolete asn1_encode_oid
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 2/3] KEYS: trusted: use encode_OID for OID encoding
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/3] lib/oid_registry: add ability to ASN.1 encode OIDs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 0/3] replace asn1_encode_oid with encode_OID
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/5] KEYS: asymmetric: tpm2_key_rsa
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 5/5] keys: asymmetric: ASYMMETRIC_TPM2_KEY_RSA_SUBTYPE
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 5/5] keys: asymmetric: ASYMMETRIC_TPM2_KEY_RSA_SUBTYPE
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 5/5] keys: asymmetric: ASYMMETRIC_TPM2_KEY_RSA_SUBTYPE
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH v5 5/5] keys: asymmetric: ASYMMETRIC_TPM2_KEY_RSA_SUBTYPE
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v5 4/5] tpm: tpm2_key: Extend parser to TPM_LoadableKey
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v5 3/5] KEYS: trusted: Move tpm2_key_decode() to the TPM driver
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v5 2/5] KEYS: trusted: Change -EINVAL to -E2BIG
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v5 1/5] crypto: rsa-pkcs1pad: export rsa1_asn_lookup()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v5 0/5] KEYS: asymmetric: tpm2_key_rsa
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RESEND] KEYS: trusted: Use ASN.1 encoded OID
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH RESEND] KEYS: trusted: Use ASN.1 encoded OID
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RESEND] KEYS: trusted: Use ASN.1 encoded OID
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH RESEND] KEYS: trusted: Use ASN.1 encoded OID
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH RESEND] KEYS: trusted: Use ASN.1 encoded OID
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RESEND] KEYS: trusted: Use ASN.1 encoded OID
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH RESEND] KEYS: trusted: Use ASN.1 encoded OID
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] KEYS: trusted: Use ASN.1 encoded OID
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] KEYS: trusted: Use ASN.1 encoded OID
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH v3] KEYS: trusted: Use ASN.1 encoded OID
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: Use ASN.1 encoded OID
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: Use ASN.1 encoded OID
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: Use ASN.1 encoded OID
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH RESEND] KEYS: trusted: Use ASN.1 encoded OID
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: Use ASN.1 encoded OID
- From: Ben Boeckel <me@xxxxxxxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: Use ASN.1 encoded OID
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH RESEND] KEYS: trusted: Use ASN.1 encoded OID
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: Use ASN.1 encoded OID
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH v2] KEYS: trusted: Use ASN.1 encoded OID
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH RESEND] KEYS: trusted: Use ASN.1 encoded OID
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: Use ASN.1 encoded OID
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH] KEYS: trusted: Use ASN.1 encoded OID
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] ima: fix deadlock when traversing "ima_default_rules".
- From: Greg KH <greg@xxxxxxxxx>
- Re: [v3 PATCH] hwrng: core - Remove add_early_randomness
- From: Torsten Duwe <duwe@xxxxxx>
- Re: [v3 PATCH] hwrng: core - Remove add_early_randomness
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [v3 PATCH] hwrng: core - Remove add_early_randomness
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [v3 PATCH] hwrng: core - Remove add_early_randomness
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [v3 PATCH] hwrng: core - Remove add_early_randomness
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: Disable TCG_TPM2_HMAC by default
- From: Vitor Soares <ivitro@xxxxxxxxx>
- Re: [v3 PATCH] hwrng: core - Remove add_early_randomness
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [v3 PATCH] hwrng: core - Remove add_early_randomness
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [v3 PATCH] hwrng: core - Remove add_early_randomness
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [v3 PATCH] hwrng: core - Remove add_early_randomness
- From: Nícolas F. R. A. Prado <nfraprado@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] tpm: Disable TCG_TPM2_HMAC by default
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: Disable TCG_TPM2_HMAC by default
- From: Vitor Soares <ivitro@xxxxxxxxx>
- Re: [PATCH 1/3] tpm: Disable TCG_TPM2_HMAC by default
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: Disable TCG_TPM2_HMAC by default
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] tpm: Disable TCG_TPM2_HMAC by default
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: Disable TCG_TPM2_HMAC by default
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: Disable TCG_TPM2_HMAC by default
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] tpm: Disable TCG_TPM2_HMAC by default
- From: Vitor Soares <ivitro@xxxxxxxxx>
- Re: [PATCH 1/3] tpm: Disable TCG_TPM2_HMAC by default
- From: Vitor Soares <ivitro@xxxxxxxxx>
- Re: [PATCH v2] tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: Disable TCG_TPM2_HMAC by default
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [v3 PATCH] hwrng: core - Remove add_early_randomness
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: Disable TCG_TPM2_HMAC by default
- From: Vitor Soares <ivitro@xxxxxxxxx>
- [v3 PATCH] hwrng: core - Remove add_early_randomness
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer
- From: "Matthew R. Ochs" <mochs@xxxxxxxxxx>
- [PATCH v4 5/5] keys: asymmetric: ASYMMETRIC_TPM2_KEY_RSA_SUBTYPE
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v4 4/5] tpm: tpm2_key: Extend parser to TPM_LoadableKey
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v4 3/5] KEYS: trusted: Move tpm2_key_decode() to the TPM driver
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v4 2/5] KEYS: trusted: Change -EINVAL to -E2BIG
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v4 1/5] crypto: rsa-pkcs1pad: export rsa1_asn_lookup()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v4 0/5] KEYS: asymmetric: tpm2_key_rsa
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 4/6] KEYS: trusted: Move tpm2_key_decode() to the TPM driver
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 4/6] KEYS: trusted: Move tpm2_key_decode() to the TPM driver
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 4/6] KEYS: trusted: Move tpm2_key_decode() to the TPM driver
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 4/6] KEYS: trusted: Move tpm2_key_decode() to the TPM driver
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/6] KEYS: trusted: Move tpm2_key_decode() to the TPM driver
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v18 12/21] dm: add finalize hook to target_type
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/6] KEYS: trusted: Move tpm2_key_decode() to the TPM driver
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [v2 PATCH] crypto: api - Do not load modules if called by async probing
- From: Nícolas F. R. A. Prado <nfraprado@xxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 4/6] KEYS: trusted: Move tpm2_key_decode() to the TPM driver
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] KEYS-TRUSTED: keys-trusted-next-6.10-rc1-part2
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH] tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer
- From: Matt Ochs <mochs@xxxxxxxxxx>
- Re: [PATCH] tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH] tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer
- From: "Matthew R. Ochs" <mochs@xxxxxxxxxx>
- [PATCH v3 5/5] keys: asymmetric: ASYMMETRIC_TPM2_KEY_RSA_SUBTYPE
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v3 4/5] tpm: tpm2_key: Extend parser to TPM_LoadableKey
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v3 3/5] KEYS: trusted: Move tpm2_key_decode() to the TPM driver
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v3 2/5] lib: Expand asn1_encode_integer() to variable size integers
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v3 1/5] crypto: rsa-pkcs1pad: export rsa1_asn_lookup()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v3 0/5] KEYS: asymmetric: tpm2_key_rsa
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: enable HMAC encryption for only x86-64 and aarch64
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: enable HMAC encryption for only x86-64 and aarch64
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: enable HMAC encryption for only x86-64 and aarch64
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: enable HMAC encryption for only x86-64 and aarch64
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: enable HMAC encryption for only x86-64 and aarch64
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: enable HMAC encryption for only x86-64 and aarch64
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: enable HMAC encryption for only x86-64 and aarch64
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: enable HMAC encryption for only x86-64 and aarch64
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] tpm: Disable TCG_TPM2_HMAC by default
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: Disable TCG_TPM2_HMAC by default
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH] tpm: enable HMAC encryption for only x86-64 and aarch64
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: Disable TCG_TPM2_HMAC by default
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: Disable TCG_TPM2_HMAC by default
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [EXTERNAL] [PATCH v2 6/6] keys: asymmetric: ASYMMETRIC_TPM2_KEY_RSA_SUBTYPE
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- RE: [EXTERNAL] [PATCH v2 6/6] keys: asymmetric: ASYMMETRIC_TPM2_KEY_RSA_SUBTYPE
- From: Bharat Bhushan <bbhushan2@xxxxxxxxxxx>
- Re: [EXTERNAL] [PATCH v2 5/6] tpm: tpm2_key: Extend parser to TPM_LoadableKey
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: Disable TCG_TPM2_HMAC by default
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: Disable TCG_TPM2_HMAC by default
- From: Vitor Soares <ivitro@xxxxxxxxx>
- Re: [EXTERNAL] [PATCH v2 2/6] lib: Expand asn1_encode_integer() to variable size integers
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- RE: [EXTERNAL] [PATCH v2 5/6] tpm: tpm2_key: Extend parser to TPM_LoadableKey
- From: Bharat Bhushan <bbhushan2@xxxxxxxxxxx>
- RE: [EXTERNAL] [PATCH v2 2/6] lib: Expand asn1_encode_integer() to variable size integers
- From: Bharat Bhushan <bbhushan2@xxxxxxxxxxx>
- [PATCH v2 6/6] keys: asymmetric: ASYMMETRIC_TPM2_KEY_RSA_SUBTYPE
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2 5/6] tpm: tpm2_key: Extend parser to TPM_LoadableKey
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2 4/6] KEYS: trusted: Move tpm2_key_decode() to the TPM driver
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2 3/6] tpm: Export tpm2_load_context()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2 2/6] lib: Expand asn1_encode_integer() to variable size integers
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2 1/6] crypto: rsa-pkcs1pad: export rsa1_asn_lookup()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2 0/6] KEYS: asymmetric: tpm2_key_rsa
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [v2 PATCH] crypto: api - Do not load modules if called by async probing
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/6] KEYS: asymmetric: tpm2_key_rsa
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [GIT PULL] KEYS-TRUSTED: keys-trusted-next-6.10-rc1-part2
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 0/6] KEYS: asymmetric: tpm2_key_rsa
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH v2 2/2] KEYS: trusted: Do not use WARN when encode fails
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2 1/2] KEYS: trusted: Fix memory leak in tpm2_key_encode()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2 0/2] KEYS: trusted: bug fixes for v6.10-rc2
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 6/6] keys: asymmetric: ASYMMETRIC_TPM2_KEY_RSA_SUBTYPE
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 5/6] tpm: tpm2_key: Extend parser to TPM_LoadableKey
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 4/6] KEYS: trusted: Move tpm2_key_decode() to the TPM driver
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 3/6] tpm: Export tpm2_load_context()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 2/6] lib: Expand asn1_encode_integer() to variable size integers
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 1/6] crypto: rsa-pkcs1pad: export rsa1_asn_lookup()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 0/6] KEYS: asymmetric: tpm2_key_rsa
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] crypto: api - Do not load modules until algapi is ready
- From: Nícolas F. R. A. Prado <nfraprado@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Disable TCG_TPM2_HMAC by default
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] dm-integrity: set discard_granularity to logical block size
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Disable TCG_TPM2_HMAC by default
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] dm-integrity: set discard_granularity to logical block size
- From: Mikulas Patocka <mpatocka@xxxxxxxxxx>
- Re: [PATCH v18 12/21] dm: add finalize hook to target_type
- From: Mikulas Patocka <mpatocka@xxxxxxxxxx>
- [PATCH 3/3] KEYS: trusted: Do not use WARN when encode fails
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 2/3] KEYS: trusted: Fix memory leak in tpm2_key_encode()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 1/3] tpm: Disable TCG_TPM2_HMAC by default
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 0/3] KEYS: trusted: bug fixes
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC v2 0/5] Asymmetric TPM2 key type
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] crypto: api - Do not load modules until algapi is ready
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH RFC v2 5/5] keys: asymmetric: ASYMMETRIC_TPM2_KEY_RSA_SUBTYPE
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH RFC v2 4/5] KEYS: trusted: Migrate tpm2_key_{encode,decode}() to TPM driver
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH RFC v2 3/5] KEYS: trusted: Do not use WARN when encode fails
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH RFC v2 2/5] tpm: export tpm2_load_context()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH RFC v2 1/5] crypto: rsa-pkcs1pad: export rsa1_asn_lookup()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH RFC v2 0/5] Asymmetric TPM2 key type
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH RFC 5/5] keys: asymmetric: ASYMMETRIC_TPM2_KEY_RSA_SUBTYPE
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH RFC 4/5] KEYS: trusted: Migrate tpm2_key_{encode,decode}() to TPM driver
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH RFC 3/5] KEYS: trusted: Do not use WARN when encode fails
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH RFC 2/5] tpm: export tpm2_load_context()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH RFC 1/5] crypto: rsa-pkcs1pad: export rsa1_asn_lookup()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH RFC 0/5] Asymmetric TPM2 key type
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] crypto: api - Do not load modules until algapi is ready
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] crypto: api - Do not load modules until algapi is ready
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] crypto: api - Do not load modules until algapi is ready
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 18/22] tpm: add session encryption protection to tpm2_get_random()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] tpm: Disable TCG_TPM2_HMAC by default
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: SLB9670 TPM module crash
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: SLB9670 TPM module crash
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- SLB9670 TPM module crash
- From: Parthiban <parthiban@xxxxxxxxxxx>
- Re: [PATCH] crypto: api - Do not load modules until algapi is ready
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 18/22] tpm: add session encryption protection to tpm2_get_random()
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH] crypto: api - Do not load modules until algapi is ready
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 18/22] tpm: add session encryption protection to tpm2_get_random()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v18 12/21] dm: add finalize hook to target_type
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 18/22] tpm: add session encryption protection to tpm2_get_random()
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 18/22] tpm: add session encryption protection to tpm2_get_random()
- From: Nícolas F. R. A. Prado <nfraprado@xxxxxxxxxxxxx>
- Re: tpm_tis_spi takes minutes to probe
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: tpm_tis_spi takes minutes to probe
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- tpm_tis_spi takes minutes to probe
- From: Vitor Soares <ivitro@xxxxxxxxx>
- Re: [PATCH v8 18/22] tpm: add session encryption protection to tpm2_get_random()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 18/22] tpm: add session encryption protection to tpm2_get_random()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v8 18/22] tpm: add session encryption protection to tpm2_get_random()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 18/22] tpm: add session encryption protection to tpm2_get_random()
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 18/22] tpm: add session encryption protection to tpm2_get_random()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v8 18/22] tpm: add session encryption protection to tpm2_get_random()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 18/22] tpm: add session encryption protection to tpm2_get_random()
- From: Nícolas F. R. A. Prado <nfraprado@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2 4/4] tsm: Allow for extending and reading configured RTMRs
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- Re: [PATCH v2] crypto: rsa-pkcs1pad: export rsa1_asn_lookup()
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] crypto: rsa-pkcs1pad: export rsa1_asn_lookup()
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] integrity: subsystem updates for v6.10
- From: pr-tracker-bot@xxxxxxxxxx
- [PATCH v2] crypto: rsa-pkcs1pad: export rsa1_asn_lookup()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] crypto: rsa-pkcs1pad: export rsa1_asn_lookup()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH 2/2] KEYS: implement derived keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH 2/2] KEYS: implement derived keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [GIT PULL] integrity: subsystem updates for v6.10
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [ima-evm-utils PATCH 0/2] Fix issue with tests and provider on Ubuntu 24.04
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] KEYS: implement derived keys
- From: Ignat Korchagin <ignat@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] KEYS: implement derived keys
- From: Ignat Korchagin <ignat@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] KEYS: implement derived keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH 2/2] KEYS: implement derived keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH 2/2] KEYS: implement derived keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH 1/2] tpm: add some algorithm and constant definitions from the TPM spec
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH 1/2] tpm: add some algorithm and constant definitions from the TPM spec
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v18 16/21] fsverity: expose verified fsverity built-in signatures to LSMs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v18 20/21] Documentation: add ipe documentation
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [ima-evm-utils PATCH 2/2] tests: Use EVMCTL_ENGINE to set engine or provider for test case
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH 1/2] evmctl: Replace OSS_PROVIDER_load with OSSL_PROVIDER_try_load (Ubuntu)
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH 0/2] Fix issue with tests and provider on Ubuntu 24.04
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/2] TPM derived keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH 0/2] TPM derived keys
- From: Ignat Korchagin <ignat@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/2] TPM derived keys
- From: Ignat Korchagin <ignat@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/2] TPM derived keys
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/2] TPM derived keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH 0/2] TPM derived keys
- From: Ignat Korchagin <ignat@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/2] TPM derived keys
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/2] TPM derived keys
- From: Ignat Korchagin <ignat@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/2] TPM derived keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH 0/2] TPM derived keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH 0/2] TPM derived keys
- From: Ignat Korchagin <ignat@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/2] TPM derived keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH 0/2] TPM derived keys
- From: Ignat Korchagin <ignat@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/2] TPM derived keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH 0/2] TPM derived keys
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/2] TPM derived keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH 0/2] TPM derived keys
- From: Ignat Korchagin <ignat@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/2] TPM derived keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH 0/2] TPM derived keys
- From: Ignat Korchagin <ignat@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/2] TPM derived keys
- From: Ignat Korchagin <ignat@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 4/4] tsm: Allow for extending and reading configured RTMRs
- From: Samuel Ortiz <sameo@xxxxxxxxxxxx>
- [PATCH v2] KEYS: trusted: Do not use WARN when encode fails
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH 0/2] TPM derived keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH 0/2] TPM derived keys
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] x86: um: vdso: Disable UBSAN instrumentation
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] KEYS: trusted: Do not use WARN when encode fails
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] keys changes for v6.10-rc1
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [GIT PULL] TPM DEVICE DRIVER: tpmdd-next-6.10-rc1
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [GIT PULL] trusted keys changes for v6.10-rc1
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [RFC PATCH 0/2] TPM derived keys
- From: Ignat Korchagin <ignat@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/2] TPM derived keys
- From: Ignat Korchagin <ignat@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 4/4] tsm: Allow for extending and reading configured RTMRs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] arch/x86/um: Disable UBSAN sanitization
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v2] x86: um: vdso: Disable UBSAN instrumentation
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] arch/x86/um: Disable UBSAN sanitization
- From: Johannes Berg <johannes@xxxxxxxxxxxxxxxx>
- Re: [PATCH] arch/x86/um: Disable UBSAN sanitization
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] arch/x86/um: Disable UBSAN sanitization
- From: Johannes Berg <johannes@xxxxxxxxxxxxxxxx>
- Re: [PATCH] arch/x86/um: Disable UBSAN sanitization
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] arch/x86/um: Disable UBSAN sanitization
- From: Johannes Berg <johannes@xxxxxxxxxxxxxxxx>
- [PATCH] arch/x86/um: Disable UBSAN sanitization
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 4/4] tsm: Allow for extending and reading configured RTMRs
- From: Samuel Ortiz <sameo@xxxxxxxxxxxx>
- Re: [PATCH] integrity: Update comment for load_moklist_certs()
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH] integrity: Update comment for load_moklist_certs()
- From: Yusong Gao <a869920004@xxxxxxxxx>
- Re: [RFC PATCH v2 4/4] tsm: Allow for extending and reading configured RTMRs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] ima: Avoid blocking in RCU read-side critical section
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [GIT PULL] TPM DEVICE DRIVER: tpmdd-next-6.10-rc1
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [GIT PULL] TPM DEVICE DRIVER: tpmdd-next-6.10-rc1
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v18 12/21] dm: add finalize hook to target_type
- From: Mikulas Patocka <mpatocka@xxxxxxxxxx>
- [GIT PULL] trusted keys changes for v6.10-rc1
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [GIT PULL] keys changes for v6.10-rc1
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 5/8] ima: kexec: move IMA log copy from kexec load to execute
- From: Petr Tesařík <petr@xxxxxxxxxxx>
- Re: [PATCH v18 12/21] dm: add finalize hook to target_type
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v18 12/21] dm: add finalize hook to target_type
- From: Mikulas Patocka <mpatocka@xxxxxxxxxx>
- Re: [PATCH] ima: Avoid blocking in RCU read-side critical section
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] ima: Avoid blocking in RCU read-side critical section
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] ima: Avoid blocking in RCU read-side critical section
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: Avoid blocking in RCU read-side critical section
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] ima: fix deadlock when traversing "ima_default_rules".
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [PATCH] ima: fix deadlock when traversing "ima_default_rules".
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [PATCH v3] ima: Avoid blocking in RCU read-side critical section
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] ima: Use sequence number to wait for policy updates
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: fix deadlock when traversing "ima_default_rules".
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] ima: fix deadlock when traversing "ima_default_rules".
- From: GUO Zihua <guozihua@xxxxxxxxxx>
- Re: [RFC][PATCH] ima: Use sequence number to wait for policy updates
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH] ima: Use sequence number to wait for policy updates
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3] ima: Avoid blocking in RCU read-side critical section
- From: GUO Zihua <guozihua@xxxxxxxxxx>
- Re: [RFC PATCH v2 0/2] ima: Fix detection of read/write violations on stacked filesystems
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v18 20/21] Documentation: add ipe documentation
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH v18 20/21] Documentation: add ipe documentation
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/2] TPM derived keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH 0/2] TPM derived keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH 0/2] TPM derived keys
- From: Ben Boeckel <me@xxxxxxxxxxxxxx>
- Re: [PATCH v18 20/21] Documentation: add ipe documentation
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [RFC PATCH 0/2] TPM derived keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [EXT] [PATCH v8 6/6] docs: trusted-encrypted: add DCP as new trust source
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 00/22] add integrity and security to TPM2 transactions
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH v18 20/21] Documentation: add ipe documentation
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v18 21/21] MAINTAINERS: ipe: add ipe maintainer information
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v18 18/21] scripts: add boot policy generation program
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v18 17/21] ipe: enable support for fs-verity as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v18 19/21] ipe: kunit test for parser
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v18 13/21] dm verity: expose root hash digest and signature data to LSMs
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v18 15/21] security: add security_inode_setintegrity() hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v18 14/21] ipe: add support for dm-verity as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v18 09/21] uapi|audit|ipe: add ipe auditing support
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v18 16/21] fsverity: expose verified fsverity built-in signatures to LSMs
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v18 12/21] dm: add finalize hook to target_type
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v18 08/21] ipe: add userspace interface
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v18 07/21] security: add new securityfs delete function
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v18 10/21] ipe: add permissive toggle
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v18 11/21] block,lsm: add LSM blob and new LSM hooks for block device
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v18 06/21] ipe: introduce 'boot_verified' as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v18 05/21] initramfs|security: Add a security hook to do_populate_rootfs()
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v18 00/21] Integrity Policy Enforcement LSM (IPE)
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v18 01/21] security: add ipe lsm
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v18 02/21] ipe: add policy parser
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v18 04/21] ipe: add LSM hooks on execution and kernel read
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v18 03/21] ipe: add evaluation loop
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH 2/2] KEYS: implement derived keys
- From: Ignat Korchagin <ignat@xxxxxxxxxxxxxx>
- [RFC PATCH 1/2] tpm: add some algorithm and constant definitions from the TPM spec
- From: Ignat Korchagin <ignat@xxxxxxxxxxxxxx>
- [RFC PATCH 0/2] TPM derived keys
- From: Ignat Korchagin <ignat@xxxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH v2 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: "Svahn, Kai" <kai.svahn@xxxxxxxxxxxxxxx>
- Re: [RFC 2/2] ima: Fix detection of read/write violations on stacked filesystems
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] ima: Avoid blocking in RCU read-side critical section
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 00/22] add integrity and security to TPM2 transactions
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 00/22] add integrity and security to TPM2 transactions
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 00/22] add integrity and security to TPM2 transactions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 00/22] add integrity and security to TPM2 transactions
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 00/22] add integrity and security to TPM2 transactions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 00/22] add integrity and security to TPM2 transactions
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v8 00/22] add integrity and security to TPM2 transactions
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 14/22] tpm: Add HMAC session start and end functions
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [EXT] [PATCH v8 6/6] docs: trusted-encrypted: add DCP as new trust source
- From: David Gstir <david@xxxxxxxxxxxxx>
- RE: [EXT] [PATCH v8 6/6] docs: trusted-encrypted: add DCP as new trust source
- From: Kshitiz Varshney <kshitiz.varshney@xxxxxxx>
- Re: [PATCH v8 00/22] add integrity and security to TPM2 transactions
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v8 00/22] add integrity and security to TPM2 transactions
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 22/22] tpm: disable the TPM if NULL name changes
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 22/22] tpm: disable the TPM if NULL name changes
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 16/22] tpm: Add the rest of the session HMAC API
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 15/22] tpm: Add HMAC session name/handle append
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 14/22] tpm: Add HMAC session start and end functions
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 13/22] tpm: Add TCG mandated Key Derivation Functions (KDFs)
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 12/22] tpm: Add NULL primary creation
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 00/22] add integrity and security to TPM2 transactions
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 00/22] add integrity and security to TPM2 transactions
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH v8 22/22] tpm: disable the TPM if NULL name changes
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v8 21/22] Documentation: add tpm-security.rst
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v8 20/22] tpm: add the null key name as a sysfs export
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v8 19/22] KEYS: trusted: Add session encryption protection to the seal/unseal path
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v8 18/22] tpm: add session encryption protection to tpm2_get_random()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v8 17/22] tpm: add hmac checks to tpm2_pcr_extend()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v8 16/22] tpm: Add the rest of the session HMAC API
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v8 15/22] tpm: Add HMAC session name/handle append
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v8 14/22] tpm: Add HMAC session start and end functions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v8 13/22] tpm: Add TCG mandated Key Derivation Functions (KDFs)
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v8 12/22] tpm: Add NULL primary creation
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v8 11/22] tpm: export the context save and load commands
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v8 10/22] tpm: add buffer function to point to returned parameters
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v8 09/22] crypto: lib - implement library version of AES in CFB mode
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v8 08/22] KEYS: trusted: tpm2: Use struct tpm_buf for sized buffers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v8 06/22] tpm: TPM2B formatted buffers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v8 07/22] tpm: Add tpm_buf_read_{u8,u16,u32}
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v8 05/22] tpm: Store the length of the tpm_buf data separately.
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v8 04/22] tpm: Update struct tpm_buf documentation comments
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v8 03/22] tpm: Move buffer handling from static inlines to real functions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v8 02/22] tpm: Remove tpm_send()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v8 01/22] tpm: Remove unused tpm_buf_tag()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v8 00/22] add integrity and security to TPM2 transactions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 15/21] tpm: Add the rest of the session HMAC API
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 14/21] tpm: Add HMAC session name/handle append
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 13/21] tpm: Add HMAC session start and end functions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 12/21] tpm: Add NULL primary creation
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH ima-evm-utils] First try to get keyid from cert then fall back to calculating
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [EXT] [PATCH v8 6/6] docs: trusted-encrypted: add DCP as new trust source
- From: David Gstir <david@xxxxxxxxxxxxx>
- Re: [PATCH v2] ima: Avoid blocking in RCU read-side critical section
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2] ima: Avoid blocking in RCU read-side critical section
- From: GUO Zihua <guozihua@xxxxxxxxxx>
- Re: [RFC PATCH v2 0/2] ima: Fix detection of read/write violations on stacked filesystems
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [RFC PATCH v2 0/2] ima: Fix detection of read/write violations on stacked filesystems
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: Mikko Rapeli <mikko.rapeli@xxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 0/2] ima: Fix detection of read/write violations on stacked filesystems
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v17 13/21] dm verity: consume root hash digest and expose signature data via LSM hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: Lennart Poettering <mzxreary@xxxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: Mikko Rapeli <mikko.rapeli@xxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: Lennart Poettering <mzxreary@xxxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/2] ima: Fix detection of read/write violations on stacked filesystems
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [RFC PATCH v2 0/2] ima: Fix detection of read/write violations on stacked filesystems
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: Lennart Poettering <mzxreary@xxxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: Lennart Poettering <mzxreary@xxxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: Mikko Rapeli <mikko.rapeli@xxxxxxxxxx>
- Re: [PATCH v4 01/71] tpm: Switch to new Intel CPU model defines
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 01/71] tpm: Switch to new Intel CPU model defines
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v17 20/21] Documentation: add ipe documentation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v17 17/21] ipe: enable support for fs-verity as a trust provider
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v17 20/21] Documentation: add ipe documentation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v17 13/21] dm verity: consume root hash digest and expose signature data via LSM hook
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v17 17/21] ipe: enable support for fs-verity as a trust provider
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v17 16/21] fsverity: expose verified fsverity built-in signatures to LSMs
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 01/71] tpm: Switch to new Intel CPU model defines
- From: Tony Luck <tony.luck@xxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3] MAINTAINERS: Update URL's for KEYS/KEYRINGS_INTEGRITY and TPM DEVICE DRIVER
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] char: tpm: Keep TPM_INF_IO_PORT define for HAS_IOPORT=n
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 0/2] ima: Fix detection of read/write violations on stacked filesystems
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [RFC PATCH v2 0/2] ima: Fix detection of read/write violations on stacked filesystems
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC 2/2] ima: Fix detection of read/write violations on stacked filesystems
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [RFC PATCH v2 0/2] ima: Fix detection of read/write violations on stacked filesystems
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 33/34] drivers: remove incorrect of_match_ptr/ACPI_PTR annotations
- From: Peter Rosin <peda@xxxxxxxxxx>
- Re: [PATCH 33/34] drivers: remove incorrect of_match_ptr/ACPI_PTR annotations
- From: Xu Yilun <yilun.xu@xxxxxxxxxxxxxxx>
- Re: [PATCH] ima: Avoid blocking in RCU read-side critical section
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [RFC PATCH v2 0/2] ima: Fix detection of read/write violations on stacked filesystems
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [RFC PATCH v2 1/2] ovl: Define D_REAL_FILEDATA for d_real to return dentry with data
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [RFC PATCH v2 2/2] ima: Fix detection of read/write violations on stacked filesystems
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- [RFC PATCH v2 2/2] ima: Fix detection of read/write violations on stacked filesystems
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC PATCH v2 0/2] ima: Fix detection of read/write violations on stacked filesystems
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC PATCH v2 1/2] ovl: Define D_REAL_FILEDATA for d_real to return dentry with data
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: Mikko Rapeli <mikko.rapeli@xxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH] efi: expose TPM event log to userspace via sysfs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] char: tpm: Keep TPM_INF_IO_PORT define for HAS_IOPORT=n
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]