Linux Integrity
[Prev Page][Next Page]
- Re: [PATCH] tpm: Define TPM2_SPACE_BUFFER_SIZE to replace the use of PAGE_SIZE
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 2/2] tpm: Add support for event log pointer found in TPM2 ACPI table
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: tpm2-space: Resize session and context buffers dynamically
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] ima: move APPRAISE_BOOTPARAM dependency on ARCH_POLICY to runtime
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- [GIT PULL] tpmdd updates for Linux v5.8-rc4
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH 2/2] IMA: Verify IMA buffer passing through the kexec barrier
- From: Lachlan Sneff <t-josne@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] IMA: Verify that the kernel cmdline is passed and measured correctly through the kexec barrier.
- From: Lachlan Sneff <t-josne@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/2] Test cmdline measurement and IMA buffer passing through kexec
- From: Lachlan Sneff <t-josne@xxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] integrity additional change v5.8 (#2)
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v3 1/1] fs: move kernel_read_file* to its own include file
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 11/11] ima: Support additional conditionals in the KEXEC_CMDLINE hook function
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 11/11] ima: Support additional conditionals in the KEXEC_CMDLINE hook function
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH v2 00/11] ima: Fix rule parsing bugs and extend KEXEC_CMDLINE rule support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/1] fs: move kernel_read_file* to its own include file
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH v2 09/11] ima: Move validation of the keyrings conditional into ima_validate_rule()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Require that all digests are present in TCG_PCR_EVENT2 structures
- From: Peter Jones <pjones@xxxxxxxxxx>
- Re: [PATCH] tpm: Require that all digests are present in TCG_PCR_EVENT2 structures
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm_tis: Remove the HID IFX0102
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] tpm: Require that all digests are present in TCG_PCR_EVENT2 structures
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] tpm: Require that all digests are present in TCG_PCR_EVENT2 structures
- From: Peter Jones <pjones@xxxxxxxxxx>
- Re: [PATCH] tpm: Require that all digests are present in TCG_PCR_EVENT2 structures
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] ima: move APPRAISE_BOOTPARAM dependency on ARCH_POLICY to runtime
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH v3 2/2] ima: move APPRAISE_BOOTPARAM dependency on ARCH_POLICY to runtime
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] arch/ima: extend secure boot check to include trusted boot
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH v3 2/2] ima: move APPRAISE_BOOTPARAM dependency on ARCH_POLICY to runtime
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH] ima: Rename internal audit rule functions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [Tee-dev] [PATCHv8 1/3] optee: use uuid for sysfs driver entry
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [Tee-dev] [PATCHv8 1/3] optee: use uuid for sysfs driver entry
- From: Jens Wiklander <jens.wiklander@xxxxxxxxxx>
- [PATCH] ima: Rename internal audit rule functions
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 09/11] ima: Move validation of the keyrings conditional into ima_validate_rule()
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [GIT PULL] integrity additional change v5.8 (#2)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] IMA: Add audit log for failure conditions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: Rename internal audit rule functions
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: possible deadlock in process_measurement (2)
- From: syzbot <syzbot+18a1619cceea30ed45af@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 11/11] ima: Support additional conditionals in the KEXEC_CMDLINE hook function
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 09/11] ima: Move validation of the keyrings conditional into ima_validate_rule()
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 05/11] ima: Fail rule parsing when the KEXEC_CMDLINE hook is combined with an invalid cond
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 06/11] ima: Fail rule parsing when the KEY_CHECK hook is combined with an invalid cond
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 05/11] ima: Fail rule parsing when the KEXEC_CMDLINE hook is combined with an invalid cond
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 06/11] ima: Fail rule parsing when the KEY_CHECK hook is combined with an invalid cond
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 09/11] ima: Move validation of the keyrings conditional into ima_validate_rule()
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 07/11] ima: Shallow copy the args_p member of ima_rule_entry.lsm elements
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 11/11] ima: Support additional conditionals in the KEXEC_CMDLINE hook function
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 10/11] ima: Use the common function to detect LSM conditionals in a rule
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 08/11] ima: Use correct type for the args_p member of ima_rule_entry.lsm elements
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 04/11] ima: Fail rule parsing when buffer hook functions have an invalid action
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 03/11] ima: Free the entire rule if it fails to parse
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 02/11] ima: Free the entire rule when deleting a list of rules
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 01/11] ima: Have the LSM free its audit rule
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 00/11] ima: Fix rule parsing bugs and extend KEXEC_CMDLINE rule support
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] ima: move APPRAISE_BOOTPARAM dependency on ARCH_POLICY to runtime
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] arch/ima: extend secure boot check to include trusted boot
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Define TPM2_SPACE_BUFFER_SIZE to replace the use of PAGE_SIZE
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v8 2/2] tpm: Add support for event log pointer found in TPM2 ACPI table
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v8 1/2] acpi: Extend TPM2 ACPI table with missing log fields
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v8 0/2] tpm2: Make TPM2 logs accessible for non-UEFI firmware
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [Tee-dev] [PATCHv8 1/3] optee: use uuid for sysfs driver entry
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] ima: make appraisal state runtime dependent on secure boot
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH v2] tpm_tis: Remove the HID IFX0102
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] tpm: Define TPM2_SPACE_BUFFER_SIZE to replace the use of PAGE_SIZE
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 2/2] tpm: Add support for event log pointer found in TPM2 ACPI table
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm_tis: Remove the HID IFX0102
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Enabling interrupts in QEMU TPM TIS
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v2] tpm_tis: Remove the HID IFX0102
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Enabling interrupts in QEMU TPM TIS
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: tpm2-space: Resize session and context buffers dynamically
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: tpm2-space: Resize session and context buffers dynamically
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: tpm2-space: Resize session and context buffers dynamically
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: tpm2-space: Resize session and context buffers dynamically
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [Tee-dev] [PATCHv8 1/3] optee: use uuid for sysfs driver entry
- From: Daniel Thompson <daniel.thompson@xxxxxxxxxx>
- Re: [Tee-dev] [PATCHv8 1/3] optee: use uuid for sysfs driver entry
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [Tee-dev] [PATCHv8 1/3] optee: use uuid for sysfs driver entry
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [Tee-dev] [PATCHv8 1/3] optee: use uuid for sysfs driver entry
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [Tee-dev] [PATCHv8 1/3] optee: use uuid for sysfs driver entry
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [Tee-dev] [PATCHv8 1/3] optee: use uuid for sysfs driver entry
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH] ima: AppArmor satisfies the audit rule requirements
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [Tee-dev] [PATCHv8 1/3] optee: use uuid for sysfs driver entry
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: Enabling interrupts in QEMU TPM TIS
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH 12/12] ima: Support additional conditionals in the KEXEC_CMDLINE hook function
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 12/12] ima: Support additional conditionals in the KEXEC_CMDLINE hook function
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Enabling interrupts in QEMU TPM TIS
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 11/12] ima: Use the common function to detect LSM conditionals in a rule
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v12 4/9] tpm: tpm_tis: Add verify_data_integrity handle to tpm_tis_phy_ops
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v12 3/9] tpm: tpm_tis: Add retry in case of protocol failure.
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 06/12] ima: Fail rule parsing when the KEXEC_CMDLINE hook is combined with an invalid cond
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 05/12] ima: Fail rule parsing when buffer hook functions have an invalid action
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v7 2/2] tpm: Add support for event log pointer found in TPM2 ACPI table
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v7 1/2] acpi: Extend TPM2 ACPI table with missing log fields
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v7 0/2] tpm2: Make TPM2 logs accessible for non-UEFI firmware
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: tpm2-space: Resize session and context buffers dynamically
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v6 2/2] tpm: Add support for event log pointer found in TPM2 ACPI table
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: tpm2-space: Resize session and context buffers dynamically
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v2] tpm: tpm2-space: Resize session and context buffers dynamically
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v6 1/2] acpi: Extend TPM2 ACPI table with missing log fields
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Enabling interrupts in QEMU TPM TIS
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: tpm2-space: Resize session and context buffers dynamically
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: tpm2-space: Resize session and context buffers dynamically
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm_tis: Remove the HID IFX0102
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 09/12] ima: Use correct type for the args_p member of ima_rule_entry.lsm elements
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm_tis: Remove the HID IFX0102
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH 08/12] ima: Shallow copy the args_p member of ima_rule_entry.lsm elements
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 03/12] ima: Free the entire rule when deleting a list of rules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 03/12] ima: Free the entire rule when deleting a list of rules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 03/12] ima: Free the entire rule when deleting a list of rules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm_tis: Remove the HID IFX0102
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 10/12] ima: Move validation of the keyrings conditional into ima_validate_rule()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 02/12] ima: Create a function to free a rule entry
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 02/12] ima: Create a function to free a rule entry
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 10/12] ima: Move validation of the keyrings conditional into ima_validate_rule()
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/12] ima: Have the LSM free its audit rule
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 02/12] ima: Create a function to free a rule entry
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] IMA: Add audit log for failure conditions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Enabling interrupts in QEMU TPM TIS
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Enabling interrupts in QEMU TPM TIS
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v12 4/9] tpm: tpm_tis: Add verify_data_integrity handle to tpm_tis_phy_ops
- From: amirmizi6@xxxxxxxxx
- [PATCH v12 5/9] tpm: tpm_tis: Rewrite "tpm_tis_req_canceled()"
- From: amirmizi6@xxxxxxxxx
- [PATCH v12 7/9] tpm: tpm_tis: verify TPM_STS register is valid after locality request
- From: amirmizi6@xxxxxxxxx
- [PATCH v12 2/9] tpm: tpm_tis: Fix expected bit handling and send all bytes in one shot without last byte in exception
- From: amirmizi6@xxxxxxxxx
- [PATCH v12 9/9] tpm: tpm_tis: add tpm_tis_i2c driver
- From: amirmizi6@xxxxxxxxx
- [PATCH v12 6/9] tpm: Handle an exception for TPM Firmware Update mode.
- From: amirmizi6@xxxxxxxxx
- [PATCH v12 3/9] tpm: tpm_tis: Add retry in case of protocol failure.
- From: amirmizi6@xxxxxxxxx
- [PATCH v12 8/9] tpm: Add YAML schema for TPM TIS I2C options
- From: amirmizi6@xxxxxxxxx
- [PATCH v12 1/9] tpm: Make read{16, 32}() and write32() in tpm_tis_phy_ops optional
- From: amirmizi6@xxxxxxxxx
- [PATCH v12 0/9] Add tpm i2c ptp driver
- From: amirmizi6@xxxxxxxxx
- Re: [Tee-dev] [PATCHv8 1/3] optee: use uuid for sysfs driver entry
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [Tee-dev] [PATCHv8 1/3] optee: use uuid for sysfs driver entry
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- [PATCH v6 0/2] tpm2: Make TPM2 logs accessible for non-UEFI firmware
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 2/2] tpm: Add support for event log pointer found in TPM2 ACPI table
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 1/2] acpi: Extend TPM2 ACPI table with missing log fields
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: tpm2-space: Resize session and context buffers dynamically
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: tpm2-space: Resize session and context buffers dynamically
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 1/2] acpi: Extend TPM2 ACPI table with missing log fields
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm_tis: Remove the HID IFX0102
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [PATCH v2] tpm: tpm2-space: Resize session and context buffers dynamically
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: tpm2-space: Resize session and context buffers dynamically
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH] tpm: tpm2-space: Resize session and context buffers dynamically
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/2] acpi: Extend TPM2 ACPI table with missing log fields
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/2] acpi: Extend TPM2 ACPI table with missing log fields
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/2] acpi: Extend TPM2 ACPI table with missing log fields
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v2] tpm_tis: Remove the HID IFX0102
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Remove the HID IFX0102
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/2] acpi: Extend TPM2 ACPI table with missing log fields
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 1/2] acpi: Extend TPM2 ACPI table with missing log fields
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH] tpm_tis: Remove the HID IFX0102
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] ima-evm-utils: skip test for discrete TPM 1.2 and exec'd as normal user
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- [PATCH v2] ima-evm-utils: skip test for discrete TPM 1.2 and exec'd as normal user
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH] ima-evm-utils: skip test for discrete TPM 1.2 and exec'd as normal user
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH] ima-evm-utils: skip test for discrete TPM 1.2 and exec'd as normal user
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima-evm-utils: tests: fix finding the "boot_aggregate" value
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH v3] ima_evm_utils: extended calc_bootaggr to PCRs 8 - 9
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- [PATCH v3] ima_evm_utils: extended calc_bootaggr to PCRs 8 - 9
- From: Maurizio Drocco <maurizio.drocco@xxxxxxx>
- Re: [PATCH v2] ima_evm_utils: extended calc_bootaggr to PCRs 8 - 9
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- [PATCH] ima_evm_utils: extended calc_bootaggr to PCRs 8 - 9
- From: Maurizio Drocco <maurizio.drocco@xxxxxxx>
- [PATCH] ima-evm-utils: skip test for discrete TPM 1.2 and exec'd as normal user
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH v2] ima_evm_utils: extended calc_bootaggr to PCRs 8 - 9
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] IMA: Add audit log for failure conditions
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [Tee-dev] [PATCHv8 1/3] optee: use uuid for sysfs driver entry
- From: Jerome Forissier <jerome@xxxxxxxxxxxxx>
- Re: [Tee-dev] [PATCHv8 1/3] optee: use uuid for sysfs driver entry
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [Tee-dev] [PATCHv8 1/3] optee: use uuid for sysfs driver entry
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [Tee-dev] [PATCHv8 1/3] optee: use uuid for sysfs driver entry
- From: Jens Wiklander <jens.wiklander@xxxxxxxxxx>
- Re: [PATCH v3 1/1] fs: move kernel_read_file* to its own include file
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH] ima-evm-utils: tests: fix finding the "boot_aggregate" value
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] integrity: Add errno field in audit message
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] ima: AppArmor satisfies the audit rule requirements
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/12] ima: Have the LSM free its audit rule
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 0/2] ima: make appraisal state runtime dependent on secure boot
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- [PATCH v3 2/2] ima: move APPRAISE_BOOTPARAM dependency on ARCH_POLICY to runtime
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- [PATCH v3 1/2] arch/ima: extend secure boot check to include trusted boot
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH v3 2/2] IMA: Add audit log for failure conditions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4] ima: extend boot_aggregate with kernel measurements
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH v2] ima_evm_utils: extended calc_bootaggr to PCRs 8 - 9
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- [PATCH v2] ima_evm_utils: extended calc_bootaggr to PCRs 8 - 9
- From: Maurizio Drocco <maurizio.drocco@xxxxxxx>
- [PATCH v4] ima: extend boot_aggregate with kernel measurements
- From: Maurizio Drocco <maurizio.drocco@xxxxxxx>
- Re: [PATCH] ima: extend boot_aggregate with kernel measurements
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v5 0/2] tpm2: Make TPM2 logs accessible for non-UEFI firmware
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 1/2] acpi: Extend TPM2 ACPI table with missing log fields
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 2/2] tpm: Add support for event log pointer found in TPM2 ACPI table
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] acpi: Extend TPM2 ACPI table with missing log fields
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 01/12] ima: Have the LSM free its audit rule
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis_spi: Prefer async probe
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/8] oid_registry: Add TCG defined OIDS for TPM keys
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Stalled /dev/tpmr0 when context size increases to support RSA 3072 bit keys
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] acpi: Extend TPM2 ACPI table with missing log fields
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] acpi: Extend TPM2 ACPI table with missing log fields
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] acpi: Extend TPM2 ACPI table with missing log fields
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 01/12] ima: Have the LSM free its audit rule
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCHv8 0/3] optee: register drivers on optee bus
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCHv2] tpm: ibmvtpm: Wait for ready buffer before probing for TPM2 attributes
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 7/8] security: keys: trusted: add ability to specify arbitrary policy
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH 04/12] ima: Free the entire rule if it fails to parse
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH 07/12] ima: Fail rule parsing when the KEY_CHECK hook is combined with an invalid cond
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH 06/12] ima: Fail rule parsing when the KEXEC_CMDLINE hook is combined with an invalid cond
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH 03/12] ima: Free the entire rule when deleting a list of rules
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH 08/12] ima: Shallow copy the args_p member of ima_rule_entry.lsm elements
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH 09/12] ima: Use correct type for the args_p member of ima_rule_entry.lsm elements
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH 10/12] ima: Move validation of the keyrings conditional into ima_validate_rule()
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH 11/12] ima: Use the common function to detect LSM conditionals in a rule
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH 12/12] ima: Support additional conditionals in the KEXEC_CMDLINE hook function
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH 05/12] ima: Fail rule parsing when buffer hook functions have an invalid action
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH 02/12] ima: Create a function to free a rule entry
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH 01/12] ima: Have the LSM free its audit rule
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH 00/12] ima: Fix rule parsing bugs and extend KEXEC_CMDLINE rule support
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH] ima: extend boot_aggregate with kernel measurements
- From: Maurizio Drocco <maurizio.drocco@xxxxxxx>
- Re: [PATCH v3 1/2] integrity: Add errno field in audit message
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 2/8] oid_registry: Add TCG defined OIDS for TPM keys
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v11 3/8] tpm: tpm_tis: Add retry in case of protocol failure or data integrity (on I2C only) failure.
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v11 3/8] tpm: tpm_tis: Add retry in case of protocol failure or data integrity (on I2C only) failure.
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v11 2/8] tpm: tpm_tis: Fix expected bit handling and send all bytes in one shot without last byte in exception
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v11 0/8] Add tpm i2c ptp driver
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH 3/3] selftests: tpm: Use /bin/sh instead of /bin/bash
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH 2/3] selftests: tpm: Use 'test -e' instead of 'test -f'
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH 1/3] Revert "tpm: selftest: cleanup after unseal with wrong auth/policy test"
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] ima: move APPRAISE_BOOTPARAM dependency on ARCH_POLICY to runtime
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH] ima_evm_utils: extended calc_bootaggr to PCRs 8 - 9
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] ima: move APPRAISE_BOOTPARAM dependency on ARCH_POLICY to runtime
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] ima: move APPRAISE_BOOTPARAM dependency on ARCH_POLICY to runtime
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH v2] ima: move APPRAISE_BOOTPARAM dependency on ARCH_POLICY to runtime
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v2] ima: move APPRAISE_BOOTPARAM dependency on ARCH_POLICY to runtime
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- [PATCH] Revert "tpm: selftest: cleanup after unseal with wrong auth/policy test"
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis_spi: Prefer async probe
- From: Doug Anderson <dianders@xxxxxxxxxxxx>
- Re: [PATCH 3/8] oid_registry: Add TCG defined OIDS for TPM keys
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [V2 PATCH 2/3] dt-bindings: chosen: Document ima-kexec-buffer
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [V2 PATCH 1/3] Refactoring powerpc code for carrying over IMA measurement logs, to move non architecture specific code to security/ima.
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH 3/8] oid_registry: Add TCG defined OIDS for TPM keys
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [PATCH 3/8] oid_registry: Add TCG defined OIDS for TPM keys
- From: "Wiseman, Monty (GE Research, US)" <monty.wiseman@xxxxxx>
- [PATCH] tpm_tis_spi: Prefer async probe
- From: Douglas Anderson <dianders@xxxxxxxxxxxx>
- Re: Stalled /dev/tpmr0 when context size increases to support RSA 3072 bit keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [Tee-dev] [PATCHv8 1/3] optee: use uuid for sysfs driver entry
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] acpi: Extend TPM2 ACPI table with missing log fields
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: [PATCH v3] acpi: Extend TPM2 ACPI table with missing log fields
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [LTP v2 1/1] ima_tpm.sh: Fix for calculating boot aggregate
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [LTP v2 1/1] ima_tpm.sh: Fix for calculating boot aggregate
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [LTP v2 1/1] ima_tpm.sh: Fix for calculating boot aggregate
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [LTP v2 1/1] ima_tpm.sh: Fix for calculating boot aggregate
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [LTP v2 1/1] ima_tpm.sh: Fix for calculating boot aggregate
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [Tee-dev] [PATCHv8 1/3] optee: use uuid for sysfs driver entry
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [LTP v2 1/1] ima_tpm.sh: Fix for calculating boot aggregate
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [kbuild-all] security/integrity/ima/ima_crypto.c:575:12: warning: stack frame size of 1152 bytes in function 'ima_calc_field_array_hash_tfm'
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCHv2] tpm: ibmvtpm: Wait for ready buffer before probing for TPM2 attributes
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [PATCHv2] tpm: ibmvtpm: Wait for ready buffer before probing for TPM2 attributes
- From: David Gibson <david@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v3 2/2] IMA: Add audit log for failure conditions
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 1/2] integrity: Add errno field in audit message
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH] ima_evm_utils: extended calc_bootaggr to PCRs 8 - 9
- From: Maurizio Drocco <maurizio.drocco@xxxxxxx>
- [PATCH] extend IMA boot_aggregate with kernel measurements
- From: Maurizio Drocco <maurizio.drocco@xxxxxxx>
- Re: [PATCH v10 7/8] security: keys: trusted: add ability to specify arbitrary policy
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] ima: move APPRAISE_BOOTPARAM dependency on ARCH_POLICY to runtime
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH v10 2/8] oid_registry: Add TCG defined OIDS for TPM keys
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [Tee-dev] [PATCHv8 1/3] optee: use uuid for sysfs driver entry
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] cmd_ima_bootaggr: Fix for systems without TPM 2.0
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH] ima_evm_utils: emit the per TPM PCR bank "boot_aggregate" values
- From: Petr Vorel <pvorel@xxxxxxx>
- [RFC PATCH ima-evm-utils 3/3] logging: Print also LOG_INFO messages
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH ima-evm-utils 2/3] Don't run tsspcrread on systems without TPM
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH ima-evm-utils] cmd_ima_bootaggr: Fix for systems without TPM 2.0
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils] cmd_ima_bootaggr: Fix for systems without TPM 2.0
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 2/2] integrity: Add errno field in audit message
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] integrity: Add errno field in audit message
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] integrity: Add errno field in audit message
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 11/11] ima: Remove semicolon at the end of ima_get_binary_runtime_size()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 09/11] ima: Don't remove security.ima if file must not be appraised
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 08/11] ima: Allow imasig requirement to be satisfied by EVM portable signatures
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 10/11] ima: Don't ignore errors from crypto_shash_update()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 07/11] evm: Set IMA_CHANGE_XATTR/ATTR bit if EVM_ALLOW_METADATA_WRITES is set
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 06/11] evm: Allow setxattr() and setattr() if metadata digest won't change
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 02/11] evm: Load EVM key in ima_load_x509() to avoid appraisal
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 05/11] evm: Allow xattr/attr operations for portable signatures if check fails
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 04/11] evm: Check size of security.evm before using it
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 03/11] evm: Refuse EVM_ALLOW_METADATA_WRITES only if the HMAC key is loaded
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 01/11] evm: Execute evm_inode_init_security() only when the HMAC key is loaded
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCHv9 1/3] optee: use uuid for sysfs driver entry
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- [PATCHv9 3/3] tpm_ftpm_tee: register driver on TEE bus
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- [PATCHv9 2/3] optee: enable support for multi-stage bus enumeration
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- [PATCHv9 0/3] optee: register drivers on optee bus
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- [PATCH v11 4/8] tpm: tpm_tis: Rewrite "tpm_tis_req_canceled()"
- From: amirmizi6@xxxxxxxxx
- [PATCH v11 3/8] tpm: tpm_tis: Add retry in case of protocol failure or data integrity (on I2C only) failure.
- From: amirmizi6@xxxxxxxxx
- [PATCH v11 1/8] tpm: Make read{16, 32}() and write32() in tpm_tis_phy_ops optional
- From: amirmizi6@xxxxxxxxx
- [PATCH v11 2/8] tpm: tpm_tis: Fix expected bit handling and send all bytes in one shot without last byte in exception
- From: amirmizi6@xxxxxxxxx
- [PATCH v11 5/8] tpm: Handle an exception for TPM Firmware Update mode.
- From: amirmizi6@xxxxxxxxx
- [PATCH v11 8/8] tpm: tpm_tis: add tpm_tis_i2c driver
- From: amirmizi6@xxxxxxxxx
- [PATCH v11 6/8] tpm: tpm_tis: verify TPM_STS register is valid after locality request
- From: amirmizi6@xxxxxxxxx
- [PATCH v11 7/8] tpm: Add YAML schema for TPM TIS I2C options
- From: amirmizi6@xxxxxxxxx
- [PATCH v11 0/8] Add tpm i2c ptp driver
- From: amirmizi6@xxxxxxxxx
- RE: [PATCH] extend IMA boot_aggregate with kernel measurements
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCHv8 0/3] optee: register drivers on optee bus
- From: Jens Wiklander <jens.wiklander@xxxxxxxxxx>
- Re: [PATCHv8 0/3] optee: register drivers on optee bus
- From: Jens Wiklander <jens.wiklander@xxxxxxxxxx>
- Re: [Tee-dev] [PATCHv8 1/3] optee: use uuid for sysfs driver entry
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- Re: [PATCH v5 1/4] KEYS: trusted: Add generic trusted keys framework
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/8] oid_registry: Add TCG defined OIDS for TPM keys
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 7/8] security: keys: trusted: add ability to specify arbitrary policy
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [V2 PATCH 3/3] Add support for arm64 to carry over IMA measurement logs
- From: Prakhar Srivastava <prsriva@xxxxxxxxxxxxxxxxxxx>
- [V2 PATCH 2/3] dt-bindings: chosen: Document ima-kexec-buffer
- From: Prakhar Srivastava <prsriva@xxxxxxxxxxxxxxxxxxx>
- [V2 PATCH 1/3] Refactoring powerpc code for carrying over IMA measurement logs, to move non architecture specific code to security/ima.
- From: Prakhar Srivastava <prsriva@xxxxxxxxxxxxxxxxxxx>
- [V2 PATCH 0/3] Adding support for carrying IMA measurement logs
- From: Prakhar Srivastava <prsriva@xxxxxxxxxxxxxxxxxxx>
- Re: [Tee-dev] [PATCHv8 1/3] optee: use uuid for sysfs driver entry
- From: Jerome Forissier <jerome@xxxxxxxxxxxxx>
- Re: [PATCH v5 1/4] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [Tee-dev] [PATCHv8 1/3] optee: use uuid for sysfs driver entry
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [Tee-dev] [PATCHv8 1/3] optee: use uuid for sysfs driver entry
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v10 7/8] security: keys: trusted: add ability to specify arbitrary policy
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/8] oid_registry: Add TCG defined OIDS for TPM keys
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 5/8] security: keys: trusted: Make sealed key properly interoperable
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 6/8] security: keys: trusted: add PCR policy to TPM2 keys
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 7/8] security: keys: trusted: add ability to specify arbitrary policy
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCHv8 0/3] optee: register drivers on optee bus
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Stalled /dev/tpmr0 when context size increases to support RSA 3072 bit keys
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: extra chip->ops check on error path in tpm_tis_core_init
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/4] KEYS: trusted: Add generic trusted keys framework
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/3] mm, treewide: Rename kzfree() to kfree_sensitive()
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH] tpm: Require that all digests are present in TCG_PCR_EVENT2 structures
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm/st33zp24: fix spelling mistake "drescription" -> "description"
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis_core: Disable broken IRQ handling code
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] integrity: Add errno field in audit message
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [LTP v2 1/1] ima_tpm.sh: Fix for calculating boot aggregate
- From: Maurizio Drocco <mdrocco@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/8] oid_registry: Add TCG defined OIDS for TPM keys
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v4 0/3] mm, treewide: Rename kzfree() to kfree_sensitive()
- From: Denis Efremov <efremov@xxxxxxxxx>
- Re: [PATCH 2/2] integrity: Add errno field in audit message
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [Tee-dev] [PATCHv8 1/3] optee: use uuid for sysfs driver entry
- From: Jerome Forissier <jerome@xxxxxxxxxxxxx>
- Re: [LTP v2 1/1] ima_tpm.sh: Fix for calculating boot aggregate
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- [PATCH 1/2] IMA: pass error code in result parameter to integrity_audit_msg()
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] integrity: Add errno field in audit message
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [v1 PATCH 2/2] Add Documentation regarding the ima-kexec-buffer node in the chosen node documentation
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH] IMA: Add audit log for failure conditions
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [Tee-dev] [PATCHv8 1/3] optee: use uuid for sysfs driver entry
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- Re: [LTP v2 1/1] ima_tpm.sh: Fix for calculating boot aggregate
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- [PATCH v3 1/1] fs: move kernel_read_file* to its own include file
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: Stalled /dev/tpmr0 when context size increases to support RSA 3072 bit keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] fs: move kernel_read_file* to its own include file
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 1/1] fs: move kernel_read_file* to its own include file
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [Tee-dev] [PATCHv8 1/3] optee: use uuid for sysfs driver entry
- From: Jerome Forissier <jerome@xxxxxxxxxxxxx>
- Re: [PATCHv8 0/3] optee: register drivers on optee bus
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- Re: [PATCHv8 1/3] optee: use uuid for sysfs driver entry
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- Re: [PATCHv8 1/3] optee: use uuid for sysfs driver entry
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v4 0/3] mm, treewide: Rename kzfree() to kfree_sensitive()
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [PATCH v4 0/3] mm, treewide: Rename kzfree() to kfree_sensitive()
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v4 0/3] mm, treewide: Rename kzfree() to kfree_sensitive()
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [PATCH v4 0/3] mm, treewide: Rename kzfree() to kfree_sensitive()
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v4 0/3] mm, treewide: Rename kzfree() to kfree_sensitive()
- From: Jo -l <joel.voyer@xxxxxxxxx>
- Re: [PATCH v4 0/3] mm, treewide: Rename kzfree() to kfree_sensitive()
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [PATCHv8 1/3] optee: use uuid for sysfs driver entry
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- Re: [PATCHv8 1/3] optee: use uuid for sysfs driver entry
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH] fs: move kernel_read_file* to its own include file
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH] fs: move kernel_read_file* to its own include file
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH] fs: move kernel_read_file* to its own include file
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: extra chip->ops check on error path in tpm_tis_core_init
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: extra chip->ops check on error path in tpm_tis_core_init
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [LTP v2 1/1] ima_tpm.sh: Fix for calculating boot aggregate
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v10 3/8] tpm: tpm_tis: Add retry in case of protocol failure or data integrity (on I2C only) failure.
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/8] tpm: tpm_tis: Fix expected bit handling and send all bytes in one shot without last byte in exception
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v2] tpm/st33zp24: fix spelling mistake "drescription" -> "description"
- From: Binbin Zhou <zhoubinbin@xxxxxxxxxxxxx>
- Re: [PATCH v10 2/8] tpm: tpm_tis: Fix expected bit handling and send all bytes in one shot without last byte in exception
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 1/8] tpm: Make read{16, 32}() and write32() in tpm_tis_phy_ops optional
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/3] mm, treewide: Rename kzfree() to kfree_sensitive()
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v4 0/3] mm, treewide: Rename kzfree() to kfree_sensitive()
- From: David Sterba <dsterba@xxxxxxx>
- Re: [LTP v2 1/1] ima_tpm.sh: Fix for calculating boot aggregate
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Stalled /dev/tpmr0 when context size increases to support RSA 3072 bit keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v4 0/3] mm, treewide: Rename kzfree() to kfree_sensitive()
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: ibmvtpm: Wait for ready buffer before probing for TPM2 attributes
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm/st33zp24: fix spelling mistake "drescription" -> "description"
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm/st33zp24: fix spelling mistake "drescription" -> "description"
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCHv8 3/3] tpm_ftpm_tee: register driver on TEE bus
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCHv8 2/3] optee: enable support for multi-stage bus enumeration
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCHv8 0/3] optee: register drivers on optee bus
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCHv8 1/3] optee: use uuid for sysfs driver entry
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCHv8 0/3] optee: register drivers on optee bus
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis_spi: Don't send anything during flow control
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] integrity: Add errno field in audit message
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCHv6 1/3] optee: use uuid for sysfs driver entry
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCHv6 1/3] optee: use uuid for sysfs driver entry
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/3] mm, treewide: Rename kzfree() to kfree_sensitive()
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH 1/2] integrity: Add errno field in audit message
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 0/3] mm, treewide: Rename kzfree() to kfree_sensitive()
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v4 0/3] mm, treewide: Rename kzfree() to kfree_sensitive()
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH v4 0/3] mm, treewide: Rename kzfree() to kfree_sensitive()
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH v5 2/2] mm, treewide: Rename kzfree() to kfree_sensitive()
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH] extend IMA boot_aggregate with kernel measurements
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/2] mm, treewide: Rename kzfree() to kfree_sensitive()
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] ima_evm_utils: tests: boot_aggregate.test spans PCRs 0-9
- From: Maurizio Drocco <maurizio.drocco@xxxxxxx>
- RE: [PATCH] extend IMA boot_aggregate with kernel measurements
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH] ima_evm_utils: extended calc_bootaggr to PCRs 8 - 9
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] integrity: Add result field in audit message
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH 1/2] integrity: Add errno field in audit message
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 0/2] mm, treewide: Rename kzfree() to kfree_sensitive()
- From: Waiman Long <longman@xxxxxxxxxx>
- [PATCH v5 1/2] mm/slab: Use memzero_explicit() in kzfree()
- From: Waiman Long <longman@xxxxxxxxxx>
- [PATCH v5 2/2] mm, treewide: Rename kzfree() to kfree_sensitive()
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH v9 1/8] fs: introduce kernel_pread_file* support
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- [PATCH v10 8/8] security: keys: trusted: implement counter/timer policy
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v10 7/8] security: keys: trusted: add ability to specify arbitrary policy
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/3] mm/slab: Use memzero_explicit() in kzfree()
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH v10 6/8] security: keys: trusted: add PCR policy to TPM2 keys
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v10 5/8] security: keys: trusted: Make sealed key properly interoperable
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v10 4/8] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v10 3/8] security: keys: trusted: fix TPM2 authorizations
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v10 2/8] oid_registry: Add TCG defined OIDS for TPM keys
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v10 1/8] lib: add ASN.1 encoder
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v10 0/8] TPM 2.0 trusted keys with attached policy
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v10 0/8] TPM 2.0 trusted keys with attached policy
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] integrity: Add errno field in audit message
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- [PATCH] ima_evm_utils: extended calc_bootaggr to PCRs 8 - 9
- From: Maurizio Drocco <maurizio.drocco@xxxxxxx>
- Re: [PATCH 1/2] integrity: Add errno field in audit message
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH] tpm: Require that all digests are present in TCG_PCR_EVENT2 structures
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/3] mm, treewide: Rename kzfree() to kfree_sensitive()
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH v4 3/3] btrfs: Use kfree() in btrfs_ioctl_get_subvol_info()
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH v4 3/3] btrfs: Use kfree() in btrfs_ioctl_get_subvol_info()
- From: David Sterba <dsterba@xxxxxxx>
- Two questions about IMA
- From: "Zhao, Shirley" <shirley.zhao@xxxxxxxxx>
- Re: [PATCH v4 2/3] mm, treewide: Rename kzfree() to kfree_sensitive()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH v5 1/4] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v4 1/3] mm/slab: Use memzero_explicit() in kzfree()
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH v4 1/3] mm/slab: Use memzero_explicit() in kzfree()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH] tpm: Require that all digests are present in TCG_PCR_EVENT2 structures
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [RESEND PATCH] tpm/st33zp24: fix spelling mistake "drescription" -> "description"
- From: Binbin Zhou <zhoubinbin@xxxxxxxxxxxxx>
- Re: [PATCH 4/5] LSM: Define SELinux function to measure security state
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCHv8 0/3] optee: register drivers on optee bus
- From: Jens Wiklander <jens.wiklander@xxxxxxxxxx>
- Re: [PATCH] tpm_tis_core: Disable broken IRQ handling code
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v9 1/8] fs: introduce kernel_pread_file* support
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/3] mm/slab: Use memzero_explicit() in kzfree()
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [PATCH v4 1/3] mm/slab: Use memzero_explicit() in kzfree()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 3/3] btrfs: Use kfree() in btrfs_ioctl_get_subvol_info()
- From: Waiman Long <longman@xxxxxxxxxx>
- [PATCH v4 2/3] mm, treewide: Rename kzfree() to kfree_sensitive()
- From: Waiman Long <longman@xxxxxxxxxx>
- [PATCH v4 1/3] mm/slab: Use memzero_explicit() in kzfree()
- From: Waiman Long <longman@xxxxxxxxxx>
- [PATCH v4 0/3] mm, treewide: Rename kzfree() to kfree_sensitive()
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH 4/5] LSM: Define SELinux function to measure security state
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] tpm: Require that all digests are present in TCG_PCR_EVENT2 structures
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/5] LSM: Define SELinux function to measure security state
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] integrity: Add errno field in audit message
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] integrity: Add result field in audit message
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] integrity: Add errno field in audit message
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH] tpm_tis_core: Disable broken IRQ handling code
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 4/5] LSM: Define SELinux function to measure security state
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [LTP v2 1/1] ima_tpm.sh: Fix for calculating boot aggregate
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [LTP v2 1/1] ima_tpm.sh: Fix for calculating boot aggregate
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- [PATCH v9 3/8] test_firmware: add partial read support for request_firmware_into_buf
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- [PATCH v9 2/8] firmware: add request_partial_firmware_into_buf
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- [PATCH v9 1/8] fs: introduce kernel_pread_file* support
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- [PATCH v9 8/8] ima: add FIRMWARE_PARTIAL_READ support
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- [PATCH v9 7/8] MAINTAINERS: bcm-vk: add maintainer for Broadcom VK Driver
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- [PATCH v9 5/8] bcm-vk: add bcm_vk UAPI
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- [PATCH v9 4/8] firmware: test partial file reads of request_partial_firmware_into_buf
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- [PATCH v9 0/8] firmware: add request_partial_firmware_into_buf
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [LTP v2 1/1] ima_tpm.sh: Fix for calculating boot aggregate
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH 1/2] mm, treewide: Rename kzfree() to kfree_sensitive()
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH v5 1/4] KEYS: trusted: Add generic trusted keys framework
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] mm, treewide: Rename kzfree() to kfree_sensitive()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [PATCH] ima_evm_utils: emit the per TPM PCR bank "boot_aggregate" values
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 4/5] LSM: Define SELinux function to measure security state
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 4/5] LSM: Define SELinux function to measure security state
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 4/5] LSM: Define SELinux function to measure security state
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5/5] LSM: Define workqueue for measuring security module state
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 5/5] LSM: Define workqueue for measuring security module state
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 5/5] LSM: Define workqueue for measuring security module state
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCHv8 0/3] optee: register drivers on optee bus
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- Re: [PATCH 5/5] LSM: Define workqueue for measuring security module state
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 4/5] LSM: Define SELinux function to measure security state
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 4/5] LSM: Define SELinux function to measure security state
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] tpm_tis: extra chip->ops check on error path in tpm_tis_core_init
- From: Vasily Averin <vvs@xxxxxxxxxxxxx>
- [PATCH 3/5] LSM: Add security_state function pointer in lsm_info struct
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5/5] LSM: Define workqueue for measuring security module state
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4/5] LSM: Define SELinux function to measure security state
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/5] IMA: Add LSM_STATE func to measure LSM data
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/5] LSM: Measure security module state
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/5] IMA: Define an IMA hook to measure LSM data
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/2] IMA: Add audit log for failure conditions
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 1/2] integrity: Add result field in audit message
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] IMA: Add audit log for failure conditions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] integrity: Add errno field in audit message
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] integrity: Add errno field in audit message
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] extend IMA boot_aggregate with kernel measurements
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- [GIT PULL] integrity bug fix v5.8 (#1)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: [PATCH] extend IMA boot_aggregate with kernel measurements
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH] extend IMA boot_aggregate with kernel measurements
- From: Maurizio Drocco <maurizio.drocco@xxxxxxx>
- Re: [PATCH] extend IMA boot_aggregate with kernel measurements
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] IMA: Add a test to verify measurment of keys
- From: Lachlan Sneff <t-josne@xxxxxxxxxxxxxxxxxxx>
- [PATCH] extend IMA boot_aggregate with kernel measurements
- From: Maurizio Drocco <maurizio.drocco@xxxxxxx>
- Re: [PATCH 2/2] IMA: Add a test to verify importing a certificate into keyring
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 1/2] IMA: Add a test to verify measurment of keys
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH] ima: fix mprotect checking
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH] ima: fix mprotect checking
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] integrity: Add errno field in audit message
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] integrity: Add errno field in audit message
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] integrity: Add errno field in audit message
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 2/2] IMA: Add audit log for failure conditions
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] integrity: Add errno field in audit message
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] IMA: Add a test to verify importing a certificate into keyring
- From: Lachlan Sneff <t-josne@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] IMA: Add a test to verify measurment of keys
- From: Lachlan Sneff <t-josne@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 3/8] test_firmware: add partial read support for request_firmware_into_buf
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- [PATCH v8 5/8] bcm-vk: add bcm_vk UAPI
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- [PATCH v8 4/8] firmware: test partial file reads of request_firmware_into_buf
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- [PATCH v8 8/8] ima: add FIRMWARE_PARTIAL_READ support
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- [PATCH v8 7/8] MAINTAINERS: bcm-vk: add maintainer for Broadcom VK Driver
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- [PATCH v8 1/8] fs: introduce kernel_pread_file* support
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- [PATCH v8 2/8] firmware: add offset to request_firmware_into_buf
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- [PATCH v8 0/8] firmware: add request_partial_firmware_into_buf
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH v7 1/8] fs: introduce kernel_pread_file* support
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH v3] IMA: Add audit log for failure conditions
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] IMA: Add audit log for failure conditions
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH v3] IMA: Add audit log for failure conditions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3] IMA: Add audit log for failure conditions
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH v3] IMA: Add audit log for failure conditions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3] IMA: Add audit log for failure conditions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3] IMA: Add audit log for failure conditions
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] IMA: Add audit log for failure conditions
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH v3] IMA: Add audit log for failure conditions
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] IMA: Add audit log for failure conditions
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH v7 2/8] firmware: add offset to request_firmware_into_buf
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v7 1/8] fs: introduce kernel_pread_file* support
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v3] IMA: Add audit log for failure conditions
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH AUTOSEL 5.6 083/606] evm: Check also if *tfm is an error pointer in init_desc()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.6 084/606] ima: Fix return value of ima_write_policy()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.6 095/606] evm: Fix a small race in init_desc()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.6 082/606] ima: Set file->f_mode instead of file->f_flags in ima_calc_file_hash()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v7 1/8] fs: introduce kernel_pread_file* support
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- [PATCH v3] IMA: Add audit log for failure conditions
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] IMA: Add audit log for failure conditions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v7 1/8] fs: introduce kernel_pread_file* support
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v7 1/8] fs: introduce kernel_pread_file* support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 1/8] fs: introduce kernel_pread_file* support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 1/8] fs: introduce kernel_pread_file* support
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH] ima: Remove __init annotation from ima_pcrread()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 1/8] fs: introduce kernel_pread_file* support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: Remove __init annotation from ima_pcrread()
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [v1 PATCH 1/2] Refactoring carrying over IMA measuremnet logs over Kexec.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] IMA: Add audit log for failure conditions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [v1 PATCH 1/2] Refactoring carrying over IMA measuremnet logs over Kexec.
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [v1 PATCH 1/2] Refactoring carrying over IMA measuremnet logs over Kexec.
- From: kernel test robot <lkp@xxxxxxxxx>
- [v1 PATCH 1/2] Refactoring carrying over IMA measuremnet logs over Kexec.
- From: Prakhar Srivastava <prsriva@xxxxxxxxxxxxxxxxxxx>
- [v1 PATCH 2/2] Add Documentation regarding the ima-kexec-buffer node in the chosen node documentation
- From: Prakhar Srivastava <prsriva@xxxxxxxxxxxxxxxxxxx>
- [v1 PATCH 0/2] Adding support to carry IMA measurement logs
- From: Prakhar Srivastava <prsriva@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] ima: Remove __init annotation from ima_pcrread()
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [PATCH v2] IMA: Add audit log for failure conditions
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH] ima: Remove __init annotation from ima_pcrread()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- RE: [GIT PULL] integrity subsystem updates for v5.8
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [GIT PULL] integrity subsystem updates for v5.8
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: result logged in integrity audit message
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: result logged in integrity audit message
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [GIT PULL] integrity subsystem updates for v5.8
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v7 1/8] fs: introduce kernel_pread_file* support
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- [PATCH v7 8/8] ima: add FIRMWARE_PARTIAL_READ support
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- [PATCH v7 7/8] MAINTAINERS: bcm-vk: add maintainer for Broadcom VK Driver
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- [PATCH v7 5/8] bcm-vk: add bcm_vk UAPI
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- [PATCH v7 4/8] firmware: test partial file reads of request_firmware_into_buf
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- [PATCH v7 3/8] test_firmware: add partial read support for request_firmware_into_buf
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- [PATCH v7 2/8] firmware: add offset to request_firmware_into_buf
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- [PATCH v7 1/8] fs: introduce kernel_pread_file* support
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- [PATCH v7 0/8] firmware: add partial read support in request_firmware_into_buf
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH v6 1/8] fs: introduce kernel_pread_file* support
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH v6 1/8] fs: introduce kernel_pread_file* support
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- result logged in integrity audit message
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 8/8] ima: add FIRMWARE_PARTIAL_READ support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 8/8] ima: add FIRMWARE_PARTIAL_READ support
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH v6 8/8] ima: add FIRMWARE_PARTIAL_READ support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v6 0/8] firmware: add partial read support in request_firmware_into_buf
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- [PATCH v6 1/8] fs: introduce kernel_pread_file* support
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- [PATCH v6 3/8] test_firmware: add partial read support for request_firmware_into_buf
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- [PATCH v6 2/8] firmware: add offset to request_firmware_into_buf
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- [PATCH v6 5/8] bcm-vk: add bcm_vk UAPI
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- [PATCH v6 4/8] firmware: test partial file reads of request_firmware_into_buf
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- [PATCH v6 7/8] MAINTAINERS: bcm-vk: add maintainer for Broadcom VK Driver
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- [PATCH v6 8/8] ima: add FIRMWARE_PARTIAL_READ support
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH] IMA: Add log statements for failure conditions
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] IMA: Add log statements for failure conditions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] IMA: Add log statements for failure conditions
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] IMA: Add log statements for failure conditions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] IMA: Add log statements for failure conditions
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] IMA: Add log statements for failure conditions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] IMA: Add log statements for failure conditions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] fs: reduce export usage of kerne_read*() calls
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] fs: reduce export usage of kerne_read*() calls
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- [GIT PULL] integrity subsystem updates for v5.8
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: ibmvtpm: Wait for ready buffer before probing for TPM2 attributes
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: TPM resource manager separation
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- TPM resource manager separation
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] ima: Directly assign the ima_default_policy pointer to ima_rules
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH 2/2] ima: Call ima_calc_boot_aggregate() in ima_eventdigest_init()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH] ima: Directly free *entry in ima_alloc_init_template() if digests is NULL
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH] tpm: ibmvtpm: Wait for ready buffer before probing for TPM2 attributes
- From: David Gibson <david@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] tpm/st33zp24: fix spelling mistake "drescription" -> "description"
- From: Binbin Zhou <zhoubinbin@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] ima: Call ima_calc_boot_aggregate() in ima_eventdigest_init()
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH 2/2] ima: Call ima_calc_boot_aggregate() in ima_eventdigest_init()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] ima: Call ima_calc_boot_aggregate() in ima_eventdigest_init()
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- [PATCHv8 3/3] tpm_ftpm_tee: register driver on TEE bus
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- [PATCHv8 2/3] optee: enable support for multi-stage bus enumeration
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- [PATCHv8 1/3] optee: use uuid for sysfs driver entry
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- [PATCHv8 0/3] optee: register drivers on optee bus
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- Re: [PATCHv7 1/3] optee: use uuid for sysfs driver entry
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- [PATCH] IMA: Add log statements for failure conditions
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- RE: general protection fault in ima_free_template_entry
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCHv7 2/3] optee: enable support for multi-stage bus enumeration
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- [PATCHv7 1/3] optee: use uuid for sysfs driver entry
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- [PATCHv7 3/3] tpm_ftpm_tee: register driver on TEE bus
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- [PATCHv7 0/3] optee: register drivers on optee bus
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- general protection fault in ima_free_template_entry
- From: syzbot <syzbot+223310b454ba6b75974e@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis_spi: Don't send anything during flow control
- From: Doug Anderson <dianders@xxxxxxxxxxxx>
- [PATCH v10 5/8] tpm: Handle an exception for TPM Firmware Update mode.
- From: amirmizi6@xxxxxxxxx
- [PATCH v10 8/8] tpm: tpm_tis: add tpm_tis_i2c driver
- From: amirmizi6@xxxxxxxxx
- [PATCH v10 7/8] tpm: Add YAML schema for TPM TIS I2C options
- From: amirmizi6@xxxxxxxxx
- [PATCH v10 2/8] tpm: tpm_tis: Fix expected bit handling and send all bytes in one shot without last byte in exception
- From: amirmizi6@xxxxxxxxx
- [PATCH v10 1/8] tpm: Make read{16, 32}() and write32() in tpm_tis_phy_ops optional
- From: amirmizi6@xxxxxxxxx
- [PATCH v10 0/8] Add tpm i2c ptp driver
- From: amirmizi6@xxxxxxxxx
- [PATCH v10 3/8] tpm: tpm_tis: Add retry in case of protocol failure or data integrity (on I2C only) failure.
- From: amirmizi6@xxxxxxxxx
- [PATCH v10 6/8] tpm: tpm_tis: verify TPM_STS register is valid after locality request
- From: amirmizi6@xxxxxxxxx
- [PATCH v10 4/8] tpm: tpm_tis: Rewrite "tpm_tis_req_canceled()"
- From: amirmizi6@xxxxxxxxx
- Re: [PATCH] tpm_tis_spi: Don't send anything during flow control
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCHv6 1/3] optee: use uuid for sysfs driver entry
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH] tpm_tis_core: Disable broken IRQ handling code
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCHv6 1/3] optee: use uuid for sysfs driver entry
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- Re: [PATCHv6 1/3] optee: use uuid for sysfs driver entry
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] ima: Call ima_calc_boot_aggregate() in ima_eventdigest_init()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] ima: Directly assign the ima_default_policy pointer to ima_rules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 1/2] ima: Directly assign the ima_default_policy pointer to ima_rules
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 2/2] ima: Call ima_calc_boot_aggregate() in ima_eventdigest_init()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v5 0/4] Introduce TEE based Trusted Keys support
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v5 0/4] Introduce TEE based Trusted Keys support
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v5 0/4] Introduce TEE based Trusted Keys support
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- [PATCH v5 4/4] MAINTAINERS: Add entry for TEE based Trusted Keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v5 3/4] doc: trusted-encrypted: updates with TEE as a new trust source
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v5 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v5 1/4] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v5 0/4] Introduce TEE based Trusted Keys support
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v4 1/4] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v4 1/4] KEYS: trusted: Add generic trusted keys framework
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/4] KEYS: trusted: Add generic trusted keys framework
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis_spi: Don't send anything during flow control
- From: Doug Anderson <dianders@xxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for Linux v5.8
- From: pr-tracker-bot@xxxxxxxxxx
- [PATCHv6 1/3] optee: use uuid for sysfs driver entry
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- [PATCHv6 2/3] optee: enable support for multi-stage bus enumeration
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- [PATCHv6 3/3] tpm_ftpm_tee: register driver on TEE bus
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- [PATCHv6 0/3] optee: register drivers on optee bus
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- Re: [PATCHv5 3/3] tpm_ftpm_tee: register driver on TEE bus
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- RE: [linux-next:master 2476/12912] security/integrity/ima/ima_crypto.c:575:12: warning: stack frame size of 1152 bytes in function 'ima_calc_field_array_hash_tfm'
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCHv5 3/3] tpm_ftpm_tee: register driver on TEE bus
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCHv5 1/3] optee: do drivers initialization before and after tee-supplicant run
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCHv5 2/3] optee: use uuid for sysfs driver entry
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v4 1/4] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v4 1/4] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCHv5 1/3] optee: do drivers initialization before and after tee-supplicant run
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCHv5 1/3] optee: do drivers initialization before and after tee-supplicant run
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- Re: [RFC][PATCH 0/2] Add support for using reserved memory for ima buffer pass
- From: Prakhar Srivastava <prsriva@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 2/8] tpm: tpm_tis: Fix expected bit handling and send all bytes in one shot without last byte in exception
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 1/8] tpm: tpm_tis: Make implementation of read16, read32 and write32 optional
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/4] KEYS: trusted: Add generic trusted keys framework
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/4] KEYS: trusted: Add generic trusted keys framework
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCHv5 1/3] optee: do drivers initialization before and after tee-supplicant run
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis_spi: Don't send anything during flow control
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Oops at boot with linux-next kernel with IMA boot options
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis_spi: Don't send anything during flow control
- From: Doug Anderson <dianders@xxxxxxxxxxxx>
- Re: [PATCH] tpm_tis_spi: Don't send anything during flow control
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- [PATCHv5 2/3] optee: use uuid for sysfs driver entry
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- [PATCHv5 3/3] tpm_ftpm_tee: register driver on TEE bus
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- [PATCHv5 1/3] optee: do drivers initialization before and after tee-supplicant run
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- [PATCHv5 0/3] optee: register drivers on optee bus
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- Re: [RFC PATCH v3 00/12] Integrity Policy Enforcement LSM (IPE)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: Oops at boot with linux-next kernel with IMA boot options
- From: Takashi Iwai <tiwai@xxxxxxx>
- RE: Oops at boot with linux-next kernel with IMA boot options
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCHv2 2/2] tpm_ftpm_tee: register driver on TEE bus
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH] tpm: Revert "tpm: fix invalid locking in NONBLOCKING mode"
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] tpm_tis_spi: Don't send anything during flow control
- From: Douglas Anderson <dianders@xxxxxxxxxxxx>
- Re: [PATCH v2] tpm: fix TIS locality timeout problems
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v2] tpm: fix TIS locality timeout problems
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: Oops at boot with linux-next kernel with IMA boot options
- From: Takashi Iwai <tiwai@xxxxxxx>
- RE: Oops at boot with linux-next kernel with IMA boot options
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: Oops at boot with linux-next kernel with IMA boot options
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [LTP v2 1/1] ima_tpm.sh: Fix for calculating boot aggregate
- From: Petr Vorel <pvorel@xxxxxxx>
- Oops at boot with linux-next kernel with IMA boot options
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [LTP v2 1/1] ima_tpm.sh: Fix for calculating boot aggregate
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [LTP v2 1/1] ima_tpm.sh: Fix for calculating boot aggregate
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCHv2 2/2] tpm_ftpm_tee: register driver on TEE bus
- From: Jens Wiklander <jens.wiklander@xxxxxxxxxx>
- Re: [PATCHv3 1/3] optee: do drivers initialization before and after tee-supplicant run
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- Re: [PATCHv2 2/2] tpm_ftpm_tee: register driver on TEE bus
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- Re: [PATCH] tpm: Revert "tpm: fix invalid locking in NONBLOCKING mode"
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]