Linux Integrity
[Prev Page][Next Page]
- Re: [PATCH] tpm: Revert "tpm: fix invalid locking in NONBLOCKING mode"
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Revert "tpm: fix invalid locking in NONBLOCKING mode"
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Revert "tpm: fix invalid locking in NONBLOCKING mode"
- From: Tadeusz Struk <tstruk@xxxxxxxxx>
- Re: [PATCH] tpm: Revert "tpm: fix invalid locking in NONBLOCKING mode"
- From: Alex Guzman <alex@xxxxxxxxx>
- RE: [PATCH] tpm: Revert "tpm: fix invalid locking in NONBLOCKING mode"
- From: <Mario.Limonciello@xxxxxxxx>
- Re: [PATCH] tpm: Revert "tpm: fix invalid locking in NONBLOCKING mode"
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm2: fix TIS locality timeout problems
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Revert "tpm: fix invalid locking in NONBLOCKING mode"
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- RE: [PATCH] tpm: Revert "tpm: fix invalid locking in NONBLOCKING mode"
- From: <Mario.Limonciello@xxxxxxxx>
- Re: [PATCH] tpm: Revert "tpm: fix invalid locking in NONBLOCKING mode"
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Revert "tpm: fix invalid locking in NONBLOCKING mode"
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCHv3 1/3] optee: do drivers initialization before and after tee-supplicant run
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCHv2 2/2] tpm_ftpm_tee: register driver on TEE bus
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [LTP v2 1/1] ima_tpm.sh: Fix for calculating boot aggregate
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm2: fix TIS locality timeout problems
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [LTP v2 1/1] ima_tpm.sh: Fix for calculating boot aggregate
- From: Petr Vorel <pvorel@xxxxxxx>
- RE: [PATCH] tpm2: fix TIS locality timeout problems
- From: <Mario.Limonciello@xxxxxxxx>
- [PATCH 1/1] ima_tpm.sh: Fix for calculating boot aggregate
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH] tpm2: fix TIS locality timeout problems
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Revert "tpm: fix invalid locking in NONBLOCKING mode"
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Revert "tpm: fix invalid locking in NONBLOCKING mode"
- From: Alex Guzman <alex@xxxxxxxxx>
- Re: [PATCH] tpm: Revert "tpm: fix invalid locking in NONBLOCKING mode"
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Revert "tpm: fix invalid locking in NONBLOCKING mode"
- From: Alex Guzman <alex@xxxxxxxxx>
- Re: [PATCH] tpm: Revert "tpm: fix invalid locking in NONBLOCKING mode"
- From: Alex Guzman <alex@xxxxxxxxx>
- Re: [PATCH] tpm: Revert "tpm: fix invalid locking in NONBLOCKING mode"
- From: Tadeusz Struk <tstruk@xxxxxxxxx>
- Re: [RFC PATCH v3 00/12] Integrity Policy Enforcement LSM (IPE)
- From: Jaskaran Singh Khurana <jaskarankhurana@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Revert "tpm: fix invalid locking in NONBLOCKING mode"
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Revert "tpm: fix invalid locking in NONBLOCKING mode"
- From: Tadeusz Struk <tstruk@xxxxxxxxx>
- Re: [PATCH] tpm: Revert "tpm: fix invalid locking in NONBLOCKING mode"
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- RE: [PATCH] tpm: Revert "tpm: fix invalid locking in NONBLOCKING mode"
- From: <Mario.Limonciello@xxxxxxxx>
- [PATCHv4 1/3] optee: do drivers initialization before and after tee-supplicant run
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- [PATCHv4 2/3] optee: use uuid for sysfs driver entry
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- [PATCHv4 3/3] tpm_ftpm_tee: register driver on TEE bus
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- [PATCHv4 0/3] optee: register drivers on optee bus
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- Re: [PATCH] tpm: Revert "tpm: fix invalid locking in NONBLOCKING mode"
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] tpm: Revert "tpm: fix invalid locking in NONBLOCKING mode"
- From: Mario Limonciello <mario.limonciello@xxxxxxxx>
- Re: [PATCH v9 7/8] tpm: Add YAML schema for TPM TIS I2C options
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH v9 6/8] tpm: tpm_tis: verify TPM_STS register is valid after locality request
- From: amirmizi6@xxxxxxxxx
- [PATCH v9 8/8] tpm: tpm_tis: add tpm_tis_i2c driver
- From: amirmizi6@xxxxxxxxx
- [PATCH v9 3/8] tpm: tpm_tis: Add retry in case of protocol failure or data integrity (on I2C only) failure.
- From: amirmizi6@xxxxxxxxx
- [PATCH v9 4/8] tpm: tpm_tis: Rewrite "tpm_tis_req_canceled()"
- From: amirmizi6@xxxxxxxxx
- [PATCH v9 0/8] Add tpm i2c ptp driver
- From: amirmizi6@xxxxxxxxx
- [PATCH v9 1/8] tpm: tpm_tis: Make implementation of read16, read32 and write32 optional
- From: amirmizi6@xxxxxxxxx
- [PATCH v9 2/8] tpm: tpm_tis: Fix expected bit handling and send all bytes in one shot without last byte in exception
- From: amirmizi6@xxxxxxxxx
- [PATCH v9 5/8] tpm: Handle an exception for TPM Firmware Update mode.
- From: amirmizi6@xxxxxxxxx
- [PATCH v9 7/8] tpm: Add YAML schema for TPM TIS I2C options
- From: amirmizi6@xxxxxxxxx
- Re: [Tee-dev] [PATCHv3 2/3] optee: use uuid for sysfs driver entry
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCHv2 2/2] tpm_ftpm_tee: register driver on TEE bus
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [Tee-dev] [PATCHv3 2/3] optee: use uuid for sysfs driver entry
- From: Jerome Forissier <jerome@xxxxxxxxxxxxx>
- Re: [Tee-dev] [PATCHv3 2/3] optee: use uuid for sysfs driver entry
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- Re: [PATCHv3 2/3] optee: use uuid for sysfs driver entry
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- Re: [PATCHv3 2/3] optee: use uuid for sysfs driver entry
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [Tee-dev] [PATCHv3 2/3] optee: use uuid for sysfs driver entry
- From: Jerome Forissier <jerome@xxxxxxxxxxxxx>
- [PATCHv3 2/3] optee: use uuid for sysfs driver entry
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- [PATCHv3 3/3] tpm_ftpm_tee: register driver on TEE bus
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- [PATCHv3 1/3] optee: do drivers initialization before and after tee-supplicant run
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- [PATCHv3 0/3] optee: register drivers on optee bus
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- Re: [PATCHv2 1/2] optee: do drivers initialization before and after tee-supplicant run
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- Re: [PATCHv2 2/2] tpm_ftpm_tee: register driver on TEE bus
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- Re: [PATCHv2 1/2] optee: do drivers initialization before and after tee-supplicant run
- From: Jens Wiklander <jens.wiklander@xxxxxxxxxx>
- Re: [PATCH 0/3] fs: reduce export usage of kerne_read*() calls
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC][PATCH 0/2] Add support for using reserved memory for ima buffer pass
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] fs: reduce export usage of kerne_read*() calls
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH 0/3] fs: reduce export usage of kerne_read*() calls
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 0/3] fs: reduce export usage of kerne_read*() calls
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCHv2 2/2] tpm_ftpm_tee: register driver on TEE bus
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] Kernel selftests: Add check if TPM devices are supported
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCHv2 2/2] tpm_ftpm_tee: register driver on TEE bus
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- Re: [PATCH v3] Kernel selftests: Add check if TPM devices are supported
- From: shuah <shuah@xxxxxxxxxx>
- Re: [PATCH v3] Kernel selftests: Add check if TPM devices are supported
- From: Petr Vorel <petr.vorel@xxxxxxxxx>
- Re: [PATCHv2 2/2] tpm_ftpm_tee: register driver on TEE bus
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] Kernel selftests: Add check if TPM devices are supported
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] Kernel selftests: Add check if TPM devices are supported
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [GIT PULL] tpmdd updates for Linux v5.8
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCHv2 1/2] optee: do drivers initialization before and after tee-supplicant run
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- Re: [PATCHv2 1/2] optee: do drivers initialization before and after tee-supplicant run
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH] security: integrity: Replace zero-length array with flexible-array member
- From: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
- [PATCH v3] Kernel selftests: Add check if TPM devices are supported
- From: Nikita Sobolev <Nikita.Sobolev@xxxxxxxxxxxx>
- [PATCHv2 2/2] tpm_ftpm_tee: register driver on TEE bus
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- [PATCH 2/2] tpm_ftpm_tee: register driver on tee bus
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- [PATCHv2 0/2] optee: register drivers on optee bus
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- [PATCHv2 1/2] optee: do drivers initialization before and after tee-supplicant run
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- [RFC PATCH] optee: __optee_enumerate_devices() can be static
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH] ima-evm-utils: Fix compatibility with LibreSSL
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] ima-evm-utils: Add support for Intel TSS2 for PCR reading
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 0/2] ima-evm-utils: Add some tests for evmctl
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] optee: do drivers initialization before and after tee-supplicant run
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v8 7/8] tpm: Add YAML schema for TPM TIS I2C options
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v2] Kernel selftests: Add check if tpm devices are supported
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] Kernel selftests: Add check if tpm devices are supported
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] Kernel selftests: Add check if tpm devices are supported
- From: Petr Vorel <petr.vorel@xxxxxxxxx>
- Re: [PATCH v2] Kernel selftests: Add check if tpm devices are supported
- From: Petr Vorel <petr.vorel@xxxxxxxxx>
- [PATCH v2] Kernel selftests: Add check if tpm devices are supported
- From: Nikita Sobolev <Nikita.Sobolev@xxxxxxxxxxxx>
- Re: How about just O_EXEC? (was Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH 2/2] tpm_ftpm_tee: register driver on tee bus
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- Re: How about just O_EXEC? (was Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC)
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH] Kernel selftests: Add check if tpm devices are supported
- From: Petr Vorel <petr.vorel@xxxxxxxxx>
- [PATCH] Kernel selftests: Add check if tpm devices are supported
- From: Nikita Sobolev <Nikita.Sobolev@xxxxxxxxxxxx>
- Re: [RFC][PATCH 1/2] Add a layer of abstraction to use the memory reserved by device tree for ima buffer pass.
- From: Prakhar Srivastava <prsriva@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC][PATCH 0/2] Add support for using reserved memory for ima buffer pass
- From: Prakhar Srivastava <prsriva@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] tpm_ftpm_tee: register driver on tee bus
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [GIT PULL] integrity subsystem fixes for v5.7
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [GIT PULL] integrity subsystem fixes for v5.7
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] integrity subsystem fixes for v5.7
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [GIT PULL] integrity subsystem fixes for v5.7
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] fs: reduce export usage of kerne_read*() calls
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 2/2] tpm_ftpm_tee: register driver on tee bus
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- [PATCH 1/2] optee: do drivers initialization before and after tee-supplicant run
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- [PATCH 0/2] optee: register drivers on optee bus
- From: Maxim Uvarov <maxim.uvarov@xxxxxxxxxx>
- Re: [PATCH 0/3] fs: reduce export usage of kerne_read*() calls
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: How about just O_EXEC? (was Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC)
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH 0/3] fs: reduce export usage of kerne_read*() calls
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/6] fs: Add a MAY_EXECMOUNT flag to infer the noexec mount property
- From: "Lev R. Oshvang ." <levonshe@xxxxxxxxx>
- Re: [PATCH v9 4/8] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
- From: "Sakkinen, Jarkko" <jarkko.sakkinen@xxxxxxxxx>
- Re: [PATCH v9 1/8] lib: add ASN.1 encoder
- From: "Sakkinen, Jarkko" <jarkko.sakkinen@xxxxxxxxx>
- Re: [RFC PATCH v3 00/12] Integrity Policy Enforcement LSM (IPE)
- From: Jaskaran Singh Khurana <jaskarankhurana@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 0/8] TPM 2.0 trusted keys with attached policy
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 0/8] TPM 2.0 trusted keys with attached policy
- From: "Sakkinen, Jarkko" <jarkko.sakkinen@xxxxxxxxx>
- Re: [PATCH v9 0/8] TPM 2.0 trusted keys with attached policy
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 0/8] TPM 2.0 trusted keys with attached policy
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 0/8] TPM 2.0 trusted keys with attached policy
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 0/8] TPM 2.0 trusted keys with attached policy
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 0/8] TPM 2.0 trusted keys with attached policy
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] fs: reduce export usage of kerne_read*() calls
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v9 0/8] TPM 2.0 trusted keys with attached policy
- From: "Kayaalp, Mehmet" <Mehmet.Kayaalp@xxxxxxx>
- Re: [PATCH v9 0/8] TPM 2.0 trusted keys with attached policy
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 0/8] TPM 2.0 trusted keys with attached policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 0/8] TPM 2.0 trusted keys with attached policy
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 0/8] TPM 2.0 trusted keys with attached policy
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v9 0/8] TPM 2.0 trusted keys with attached policy
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: How about just O_EXEC? (was Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH] tpm: check event log version before reading final events
- From: Loïc Yhuel <loic.yhuel@xxxxxxxxx>
- Re: How about just O_EXEC? (was Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: How about just O_EXEC? (was Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: How about just O_EXEC? (was Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC)
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: How about just O_EXEC? (was Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: How about just O_EXEC? (was Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v9 0/8] TPM 2.0 trusted keys with attached policy
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v9 0/8] TPM 2.0 trusted keys with attached policy
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: How about just O_EXEC? (was Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC)
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- How about just O_EXEC? (was Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v9 0/8] TPM 2.0 trusted keys with attached policy
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 0/8] TPM 2.0 trusted keys with attached policy
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: check event log version before reading final events
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/4] KEYS: trusted: Add generic trusted keys framework
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: check event log version before reading final events
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 1/8] tpm: tpm_tis: Make implementation of read16, read32 and write32 optional
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v17 14/23] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v17 12/23] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v17 11/23] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v17 10/23] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v17 09/23] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 00/12] Integrity Policy Enforcement LSM (IPE)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v2] evm: Fix a small race in init_desc()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: check event log version before reading final events
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: Disparity in tpm pcr5 value
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [PATCH v1] tpm: tpm_tis: make implementation of read16, read32 and write32 optional fix
- From: amirmizi6@xxxxxxxxx
- [PATCH v1] make implementation of read16, read32 and write32 optional fix
- From: amirmizi6@xxxxxxxxx
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v5 2/6] fs: Add a MAY_EXECMOUNT flag to infer the noexec mount property
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v9 0/8] TPM 2.0 trusted keys with attached policy
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: check event log version before reading final events
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH] tpm: check event log version before reading final events
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] tpm: check event log version before reading final events
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH] tpm: check event log version before reading final events
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH] tpm: check event log version before reading final events
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH] tpm: check event log version before reading final events
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] tpm: check event log version before reading final events
- From: Loïc Yhuel <loic.yhuel@xxxxxxxxx>
- Re: [PATCH v8 1/8] tpm: tpm_tis: Make implementation of read16, read32 and write32 optional
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/4] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v9 3/8] security: keys: trusted: fix TPM2 authorizations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: eventlog: Replace zero-length array with flexible-array member
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH RESEND] tpm: eventlog: Replace zero-length array with flexible-array member
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Disparity in tpm pcr5 value
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: check event log version before reading final events
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: check event log version before reading final events
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- RE: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v5 2/6] fs: Add a MAY_EXECMOUNT flag to infer the noexec mount property
- From: "Lev R. Oshvang ." <levonshe@xxxxxxxxx>
- Re: [PATCH] tpm: check event log version before reading final events
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- RE: [PATCH v2] evm: Fix a small race in init_desc()
- From: Krzysztof Struczynski <krzysztof.struczynski@xxxxxxxxxx>
- RE: [PATCH v2] evm: Fix a small race in init_desc()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v9 3/8] security: keys: trusted: fix TPM2 authorizations
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 3/8] security: keys: trusted: fix TPM2 authorizations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 3/8] security: keys: trusted: fix TPM2 authorizations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: check event log version before reading final events
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 4/4] MAINTAINERS: Add entry for TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 3/4] doc: trusted-encrypted: updates with TEE as a new trust source
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/4] KEYS: trusted: Add generic trusted keys framework
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: eventlog: Replace zero-length array with flexible-array member
- From: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
- Re: [PATCH v2] tpm: eventlog: Replace zero-length array with flexible-array member
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] selftests/tpm: Fix runtime error
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/7] fs: introduce kernel_pread_file* support
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [PATCH v5 1/7] fs: introduce kernel_pread_file* support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2] tpm: eventlog: Replace zero-length array with flexible-array member
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH RESEND] tpm: eventlog: Replace zero-length array with flexible-array member
- From: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
- Re: [PATCH v5 1/7] fs: introduce kernel_pread_file* support
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [PATCH v5 1/7] fs: introduce kernel_pread_file* support
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH v5 1/7] fs: introduce kernel_pread_file* support
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [PATCH RESEND] tpm: eventlog: Replace zero-length array with flexible-array member
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis_core: Disable broken IRQ handling code
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/7] fs: introduce kernel_pread_file* support
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v5 1/7] fs: introduce kernel_pread_file* support
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [PATCH v5 1/7] fs: introduce kernel_pread_file* support
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH v5 1/7] fs: introduce kernel_pread_file* support
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [PATCH v5 1/7] fs: introduce kernel_pread_file* support
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH v5 1/7] fs: introduce kernel_pread_file* support
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [PATCH v5 1/7] fs: introduce kernel_pread_file* support
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH v5 1/7] fs: introduce kernel_pread_file* support
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH v5 1/7] fs: introduce kernel_pread_file* support
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [PATCH 0/3] fs: reduce export usage of kerne_read*() calls
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] security: add symbol namespace for reading file data
- From: Josh Triplett <josh@xxxxxxxxxxxxxxxx>
- Re: Disparity in tpm pcr5 value
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: Disparity in tpm pcr5 value
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] security: add symbol namespace for reading file data
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] security: add symbol namespace for reading file data
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH 2/3] security: add symbol namespace for reading file data
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] fs: move kernel_read*() calls to its own symbol namespace
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] security: add symbol namespace for reading file data
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH 1/3] fs: unexport kernel_read_file()
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- [PATCH 2/3] security: add symbol namespace for reading file data
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- [PATCH 3/3] fs: move kernel_read*() calls to its own symbol namespace
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- [PATCH 0/3] fs: reduce export usage of kerne_read*() calls
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [RFC][PATCH 1/3] evm: Move hooks outside LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] powerpc/ima: fix secure boot rules in ima arch policy
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [PATCH v5 5/6] doc: Add documentation for the fs.open_mayexec_enforce sysctl
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v5 4/6] selftest/openat2: Add tests for O_MAYEXEC enforcing
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v5 1/6] fs: Add support for an O_MAYEXEC flag on openat2(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- RE: [RFC][PATCH 1/3] evm: Move hooks outside LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [RFC][PATCH 1/2] Add a layer of abstraction to use the memory reserved by device tree for ima buffer pass.
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [RFC][PATCH 0/2] Add support for using reserved memory for ima buffer pass
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v5 1/6] fs: Add support for an O_MAYEXEC flag on openat2(2)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 5/6] doc: Add documentation for the fs.open_mayexec_enforce sysctl
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 4/6] selftest/openat2: Add tests for O_MAYEXEC enforcing
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 1/6] fs: Add support for an O_MAYEXEC flag on openat2(2)
- From: Christian Heimes <christian@xxxxxxxxxx>
- Re: [PATCH v5 2/6] fs: Add a MAY_EXECMOUNT flag to infer the noexec mount property
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 1/6] fs: Add support for an O_MAYEXEC flag on openat2(2)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC PATCH v3 00/12] Integrity Policy Enforcement LSM (IPE)
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: check event log version before reading final events
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [RFC][PATCH 1/3] evm: Move hooks outside LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: check event log version before reading final events
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v2] tpm: eventlog: Replace zero-length array with flexible-array member
- From: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
- [PATCH v2] evm: Fix a small race in init_desc()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH] tpm: check event log version before reading final events
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- RE: [RFC][PATCH 1/3] evm: Move hooks outside LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [RFC][PATCH 1/3] evm: Move hooks outside LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: [RFC][PATCH 1/3] evm: Move hooks outside LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [RFC][PATCH 1/3] evm: Move hooks outside LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v8 2/8] tpm: tpm_tis: Add verify_data_integrity handle toy tpm_tis_phy_ops
- From: amirmizi6@xxxxxxxxx
- [PATCH v8 5/8] tpm: Handle an exception for TPM Firmware Update mode.
- From: amirmizi6@xxxxxxxxx
- [PATCH v8 8/8] tpm: tpm_tis: add tpm_tis_i2c driver
- From: amirmizi6@xxxxxxxxx
- [PATCH v8 7/8] tpm: Add YAML schema for TPM TIS I2C options
- From: amirmizi6@xxxxxxxxx
- [PATCH v8 6/8] verify TPM_STS register is valid after locality request
- From: amirmizi6@xxxxxxxxx
- [PATCH v8 3/8] tpm: tpm_tis: Rewrite "tpm_tis_req_canceled()"
- From: amirmizi6@xxxxxxxxx
- [PATCH v8 0/8] Add tpm i2c ptp driver
- From: amirmizi6@xxxxxxxxx
- [PATCH v8 4/8] tpm: tpm_tis: Fix expected bit handling and send all bytes in one shot without last byte in exception
- From: amirmizi6@xxxxxxxxx
- [PATCH v8 1/8] tpm: tpm_tis: Make implementation of read16, read32 and write32 optional
- From: amirmizi6@xxxxxxxxx
- RE: [PATCH] evm: Fix a small race in init_desc()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH] evm: Fix a small race in init_desc()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- RE: [bug report] evm: Check also if *tfm is an error pointer in init_desc()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [bug report] evm: Check also if *tfm is an error pointer in init_desc()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- RE: [bug report] evm: Check also if *tfm is an error pointer in init_desc()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [bug report] evm: Check also if *tfm is an error pointer in init_desc()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH] tpm: check event log version before reading final events
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] tpm: check event log version before reading final events
- From: Loïc Yhuel <loic.yhuel@xxxxxxxxx>
- RE: [bug report] evm: Check also if *tfm is an error pointer in init_desc()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [bug report] evm: Check also if *tfm is an error pointer in init_desc()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH v4 0/4] Introduce TEE based Trusted Keys support
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- RE: [RFC][PATCH 1/3] evm: Move hooks outside LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH] tpm: check event log version before reading final events
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2] tpm: eventlog: Replace zero-length array with flexible-array member
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] tpm: check event log version before reading final events
- From: Loïc Yhuel <loic.yhuel@xxxxxxxxx>
- Re: [RFC][PATCH 1/3] evm: Move hooks outside LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: Questions on SHA1 in ima_init
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: Questions on SHA1 in ima_init
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 00/12] Integrity Policy Enforcement LSM (IPE)
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- Questions on SHA1 in ima_init
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- RE: [RFC][PATCH 1/3] evm: Move hooks outside LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- RE: [PATCH] selftests/tpm: Fix runtime error
- From: Nikita Sobolev <Nikita.Sobolev@xxxxxxxxxxxx>
- Re: [RFC PATCH v3 00/12] Integrity Policy Enforcement LSM (IPE)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH 09/12] rdma: use __anon_inode_getfd
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH 04/12] bpf: use __anon_inode_getfd
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH v4 1/7] ima: Switch to ima_hash_algo for boot aggregate
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC][PATCH 1/3] evm: Move hooks outside LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2] tpm: eventlog: Replace zero-length array with flexible-array member
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: [PATCH RESEND] tpm: eventlog: Replace zero-length array with flexible-array member
- From: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
- Re: [PATCH 08/12] vfio: use __anon_inode_getfd
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Add a __anon_inode_getfd helper
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 03/12] pidfd: use __anon_inode_getfd
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 02/12] kvm: use __anon_inode_getfd
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 04/12] bpf: use __anon_inode_getfd
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 05/12] io_uring: use __anon_inode_getfd
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 06/12] eventpoll: use __anon_inode_getfd
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 07/12] eventfd: use __anon_inode_getfd
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 08/12] vfio: use __anon_inode_getfd
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 10/12] drm_syncobj: use __anon_inode_getfd
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 09/12] rdma: use __anon_inode_getfd
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 11/12] gpiolib: use __anon_inode_getfd
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 12/12] vtpm_proxy: use __anon_inode_getfd
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 01/12] fd: add a new __anon_inode_getfd helper
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v5 0/6] Add support for O_MAYEXEC
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: [RFC][PATCH 1/3] evm: Move hooks outside LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH] tpm_tis_core: Disable broken IRQ handling code
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v5 0/6] Add support for O_MAYEXEC
- From: "Lev R. Oshvang ." <levonshe@xxxxxxxxx>
- Re: [PATCH v4 1/7] ima: Switch to ima_hash_algo for boot aggregate
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] integrity: evm: Fix RCU list related warnings.
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [PATCH] integrity: evm: Fix RCU list related warnings.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] integrity: evm: Fix RCU list related warnings.
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- [PATCH v9 8/8] security: keys: trusted: implement counter/timer policy
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v9 7/8] security: keys: trusted: add ability to specify arbitrary policy
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v9 6/8] security: keys: trusted: add PCR policy to TPM2 keys
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v9 5/8] security: keys: trusted: Make sealed key properly interoperable
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis_core: Disable broken IRQ handling code
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [PATCH v9 4/8] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v9 3/8] security: keys: trusted: fix TPM2 authorizations
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v9 2/8] oid_registry: Add TCG defined OIDS for TPM keys
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: Disparity in tpm pcr5 value
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [PATCH v9 1/8] lib: add ASN.1 encoder
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v9 0/8] TPM 2.0 trusted keys with attached policy
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis_core: Disable broken IRQ handling code
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: Disparity in tpm pcr5 value
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC][PATCH 1/3] evm: Move hooks outside LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] encrypted-keys: Replace zero-length array with flexible-array
- From: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
- [PATCH] ima: Replace zero-length array with flexible-array
- From: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
- Re: [PATCH RESEND] tpm: eventlog: Replace zero-length array with flexible-array member
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] tpm_tis_core: Disable broken IRQ handling code
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- RE: [RFC][PATCH 1/3] evm: Move hooks outside LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: Disparity in tpm pcr5 value
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [RFC][PATCH 1/3] evm: Move hooks outside LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Disparity in tpm pcr5 value
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis_core: Disable broken IRQ handling code
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] tpm_tis_core: Disable broken IRQ handling code
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH] tpm_tis_core: Disable broken IRQ handling code
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v5 0/6] Add support for O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- RE: [PATCH] ima: Allow imasig requirement to be satisfied by EVM portable signatures
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- RE: [PATCH v5 0/6] Add support for O_MAYEXEC
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v5 0/6] Add support for O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- RE: [PATCH v5 0/6] Add support for O_MAYEXEC
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v5 0/6] Add support for O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v5 0/6] Add support for O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- RE: [PATCH v5 0/6] Add support for O_MAYEXEC
- From: David Laight <David.Laight@xxxxxxxxxx>
- RE: [RFC][PATCH 1/3] evm: Move hooks outside LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: Disparity in tpm pcr5 value
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [ANNOUNCE][CFP] Linux Security Summit Europe 2020
- From: Elena Reshetova <elena.reshetova@xxxxxxxxx>
- Re: [RFC][PATCH 0/2] Add support for using reserved memory for ima buffer pass
- From: Prakhar Srivastava <prsriva@xxxxxxxxxxxxxxxxxxx>
- [PATCH RESEND] tpm: eventlog: Replace zero-length array with flexible-array member
- From: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
- Re: [PATCH v2] powerpc/ima: fix secure boot rules in ima arch policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC][PATCH 1/3] evm: Move hooks outside LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC][PATCH 1/3] evm: Move hooks outside LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 6/7] tpm: Add YAML schema for TPM TIS I2C options
- From: Rob Herring <robh@xxxxxxxxxx>
- RE: [RFC][PATCH 1/3] evm: Move hooks outside LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v5 0/6] Add support for O_MAYEXEC
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH v7 6/7] tpm: Add YAML schema for TPM TIS I2C options
- From: Amir Mizinski <amirmizi6@xxxxxxxxx>
- Re: Disparity in tpm pcr5 value
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH v5 0/6] Add support for O_MAYEXEC
- From: "Lev R. Oshvang ." <levonshe@xxxxxxxxx>
- [PATCH v4 4/4] MAINTAINERS: Add entry for TEE based Trusted Keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v4 3/4] doc: trusted-encrypted: updates with TEE as a new trust source
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v4 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v4 1/4] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v4 0/4] Introduce TEE based Trusted Keys support
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Disparity in tpm pcr5 value
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [RFC PATCH v1] ima: verify mprotect change is consistent with mmap policy
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [RFC PATCH v1] ima: verify mprotect change is consistent with mmap policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v7 6/7] tpm: Add YAML schema for TPM TIS I2C options
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v5 0/6] Add support for O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH v5 5/6] doc: Add documentation for the fs.open_mayexec_enforce sysctl
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v5 6/6] ima: add policy support for the new file open MAY_OPENEXEC flag
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v5 1/6] fs: Add support for an O_MAYEXEC flag on openat2(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v5 4/6] selftest/openat2: Add tests for O_MAYEXEC enforcing
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v5 0/6] Add support for O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH] ima: verify mprotect change is consistent with mmap policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v5 2/6] fs: Add a MAY_EXECMOUNT flag to infer the noexec mount property
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH] ima: verify mprotect change is consistent with mmap policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC][PATCH 0/2] Add support for using reserved memory for ima buffer pass
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [RFC PATCH] ima: verify mprotect change is consistent with mmap policy
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [RFC PATCH] ima: verify mprotect change is consistent with mmap policy
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH] ima: verify mprotect change is consistent with mmap policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC][PATCH 0/2] Add support for using reserved memory for ima buffer pass
- From: Prakhar Srivastava <prsriva@xxxxxxxxxxxxxxxxxxx>
- [RFC][PATCH 2/2] Add support for ima buffer pass using reserved memory arm64
- From: Prakhar Srivastava <prsriva@xxxxxxxxxxxxxxxxxxx>
- [RFC][PATCH 1/2] Add a layer of abstraction to use the memory reserved by device tree for ima buffer pass.
- From: Prakhar Srivastava <prsriva@xxxxxxxxxxxxxxxxxxx>
- [RFC][PATCH 2/2] Add support for ima buffer pass using reserved memory arm64
- From: Prakhar Srivastava <prsriva@xxxxxxxxxxxxxxxxxxx>
- [RFC]{PATCH 1/2] Add a layer of abstraction to use the memory reserved by device tree for ima buffer pass.
- From: Prakhar Srivastava <prsriva@xxxxxxxxxxxxxxxxxxx>
- [RFC][PATCH 0/2] Add support for using reserved memory for ima buffer pass
- From: Prakhar Srivastava <prsriva@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] powerpc/ima: fix secure boot rules in ima arch policy
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- RE: [RFC][PATCH 1/3] evm: Move hooks outside LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v4 1/2] acpi: Extend TPM2 ACPI table with missing log fields
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] efi/tpm: fix section mismatch warning
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] efi/tpm: fix section mismatch warning
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi/tpm: fix section mismatch warning
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] efi/tpm: fix section mismatch warning
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] integrity: evm: Fix RCU list related warnings.
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [RFC][PATCH 1/3] evm: Move hooks outside LSM infrastructure
- From: "Lev R. Oshvang ." <levonshe@xxxxxxxxx>
- [PATCH] integrity: evm: Fix RCU list related warnings.
- From: madhuparnabhowmik10@xxxxxxxxx
- Re: Fwd: a8d5875ce5 ("Default enable RCU list lockdep debugging with .."): WARNING: suspicious RCU usage
- From: Madhuparna Bhowmik <madhuparnabhowmik10@xxxxxxxxx>
- Re: [PATCH 2/2] ima: add policy support for the new file open MAY_OPENEXEC flag
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH 2/2] ima: add policy support for the new file open MAY_OPENEXEC flag
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Fwd: a8d5875ce5 ("Default enable RCU list lockdep debugging with .."): WARNING: suspicious RCU usage
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Fwd: a8d5875ce5 ("Default enable RCU list lockdep debugging with .."): WARNING: suspicious RCU usage
- From: Madhuparna Bhowmik <madhuparnabhowmik10@xxxxxxxxx>
- Re: [PATCH v7 3/7] tpm: tpm_tis: Rewrite "tpm_tis_req_canceled()"
- From: Amir Mizinski <amirmizi6@xxxxxxxxx>
- Re: [PATCH v7 2/7] tpm: tpm_tis: Add verify_data_integrity handle toy tpm_tis_phy_ops
- From: Amir Mizinski <amirmizi6@xxxxxxxxx>
- RE: [RESEND][PATCH v2 3/6] ima: Fix ima digest hash table key calculation
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH] efi/tpm: fix section mismatch warning
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Fwd: a8d5875ce5 ("Default enable RCU list lockdep debugging with .."): WARNING: suspicious RCU usage
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH 2/2] ima: add policy support for the new file open MAY_OPENEXEC flag
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH] ima: Add stats interface
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] efi/tpm: fix section mismatch warning
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] efi/tpm: fix section mismatch warning
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH] efi/tpm: fix section mismatch warning
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 2/2] ima: add policy support for the new file open MAY_OPENEXEC flag
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] ima: add policy support for identifying file execute mode bit
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] ima: add policy support for identifying file execute mode bit
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 2/2] ima: add policy support for the new file open MAY_OPENEXEC flag
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 0/2] ima: extending IMA policy to support interpreters
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Fwd: a8d5875ce5 ("Default enable RCU list lockdep debugging with .."): WARNING: suspicious RCU usage
- From: Madhuparna Bhowmik <madhuparnabhowmik10@xxxxxxxxx>
- [RFC][PATCH 1/3] evm: Move hooks outside LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 3/3] evm: Return -EAGAIN to ignore verification failures
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 2/3] evm: Extend API of post hooks to pass the result of pre hooks
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- RE: [PATCH v2 6/6] ima: Fix return value of ima_write_policy()
- From: Krzysztof Struczynski <krzysztof.struczynski@xxxxxxxxxx>
- Re: [PATCH v7 3/7] tpm: tpm_tis: Rewrite "tpm_tis_req_canceled()"
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 2/7] tpm: tpm_tis: Add verify_data_integrity handle toy tpm_tis_phy_ops
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 6/6] ima: Fix return value of ima_write_policy()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Fwd: a8d5875ce5 ("Default enable RCU list lockdep debugging with .."): WARNING: suspicious RCU usage
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Fwd: a8d5875ce5 ("Default enable RCU list lockdep debugging with .."): WARNING: suspicious RCU usage
- From: Madhuparna Bhowmik <madhuparnabhowmik10@xxxxxxxxx>
- [RESEND][PATCH v2 3/6] ima: Fix ima digest hash table key calculation
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- RE: [PATCH v2 3/6] ima: Fix ima digest hash table key calculation
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- RE: vfs_getxattr_alloc() problem
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: Fwd: a8d5875ce5 ("Default enable RCU list lockdep debugging with .."): WARNING: suspicious RCU usage
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: vfs_getxattr_alloc() problem
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: vfs_getxattr_alloc() problem
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: [PATCH v2 3/6] ima: Fix ima digest hash table key calculation
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v2 1/6] ima: Set file->f_mode instead of file->f_flags in ima_calc_file_hash()
- From: Goldwyn Rodrigues <rgoldwyn@xxxxxxx>
- [PATCH v7 2/7] tpm: tpm_tis: Add verify_data_integrity handle toy tpm_tis_phy_ops
- From: amirmizi6@xxxxxxxxx
- [PATCH v7 7/7] tpm: tpm_tis: add tpm_tis_i2c driver
- From: amirmizi6@xxxxxxxxx
- [PATCH v7 4/7] tpm: tpm_tis: Fix expected bit handling and send all bytes in one shot without last byte in exception
- From: amirmizi6@xxxxxxxxx
- [PATCH v7 5/7] tpm: Handle an exception for TPM Firmware Update mode.
- From: amirmizi6@xxxxxxxxx
- [PATCH v7 6/7] tpm: Add YAML schema for TPM TIS I2C options
- From: amirmizi6@xxxxxxxxx
- [PATCH v7 3/7] tpm: tpm_tis: Rewrite "tpm_tis_req_canceled()"
- From: amirmizi6@xxxxxxxxx
- [PATCH v7 1/7] tpm: tpm_tis: Make implementation of read16, read32 and write32 optional
- From: amirmizi6@xxxxxxxxx
- [PATCH v7 0/7] Add tpm i2c ptp driver
- From: amirmizi6@xxxxxxxxx
- RE: [PATCH v2 3/6] ima: Fix ima digest hash table key calculation
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- RE: [PATCH v2 3/6] ima: Fix ima digest hash table key calculation
- From: David Laight <David.Laight@xxxxxxxxxx>
- [PATCH v2 6/6] ima: Fix return value of ima_write_policy()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 2/6] evm: Check also if *tfm is an error pointer in init_desc()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 5/6] ima: Set again build_ima_appraise variable
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 4/6] ima: Remove redundant policy rule set in add_rules()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 3/6] ima: Fix ima digest hash table key calculation
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 1/6] ima: Set file->f_mode instead of file->f_flags in ima_calc_file_hash()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v10 2/2] ima-evm-utils: Add sign/verify tests for evmctl
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v10 1/2] ima-evm-utils: Add some tests for evmctl
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v10 0/2] ima-evm-utils: Add some tests for evmctl
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH 3/5] ima: Fix ima digest hash table key calculation
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: vfs_getxattr_alloc() problem
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH] ima: Add stats interface
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- RE: [PATCH 3/5] ima: Fix ima digest hash table key calculation
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- RE: [PATCH] ima: Allow imasig requirement to be satisfied by EVM portable signatures
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: vfs_getxattr_alloc() problem
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: Allow imasig requirement to be satisfied by EVM portable signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: Fix return value of ima_write_policy()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/5] ima: Fix ima digest hash table key calculation
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: [PATCH 3/5] ima: Fix ima digest hash table key calculation
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- RE: [PATCH] ima: Fix return value of ima_write_policy()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH] ima: Fix return value of ima_write_policy()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 5/5] ima: Remove unused build_ima_appraise variable
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/5] ima: Fix ima digest hash table key calculation
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 05/12] fs: add security blob and hooks for block_device
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 05/12] fs: add security blob and hooks for block_device
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v1] tpm/tpm_ftpm_tee: Use UUID API for exporting the UUID
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- RE: [PATCH 1/5] ima: Set file->f_mode instead of file->f_flags in ima_calc_file_hash()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- RE: [PATCH 2/5] evm: Check also if *tfm is an error pointer in init_desc()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v1] tpm/tpm_ftpm_tee: Use UUID API for exporting the UUID
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/5] evm: Check also if *tfm is an error pointer in init_desc()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v1] tpm/tpm_ftpm_tee: Use UUID API for exporting the UUID
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/5] ima: Set file->f_mode instead of file->f_flags in ima_calc_file_hash()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 6/7] dt-bindings: tpm: Add YAML schema for TPM TIS I2C options
- From: Amir Mizinski <amirmizi6@xxxxxxxxx>
- RE: [PATCH v2] tpm_tis: work around status register bug in STMicroelectronics TPM
- From: Benoit HOUYERE <benoit.houyere@xxxxxx>
- Re: [PATCH v2] tpm_tis: work around status register bug in STMicroelectronics TPM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: work around status register bug in STMicroelectronics TPM
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- RE: [PATCH v2] tpm_tis: work around status register bug in STMicroelectronics TPM
- From: Benoit HOUYERE <benoit.houyere@xxxxxx>
- Re: [PATCH] tpm_tis: work around status register bug in STMicroelectronics TPM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm/tpm_tis: Free IRQ if probing fails
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: work around status register bug in STMicroelectronics TPM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: work around status register bug in STMicroelectronics TPM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 2/7] tpm: tpm_tis: Add check_data handle to tpm_tis_phy_ops
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm/tpm_tis: Free IRQ if probing fails
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for Linux v5.7-rc3
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH] tpm_tis: work around status register bug in STMicroelectronics TPM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm_tis: work around status register bug in STMicroelectronics TPM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 2/7] tpm: tpm_tis: Add check_data handle to tpm_tis_phy_ops
- From: Amir Mizinski <amirmizi6@xxxxxxxxx>
- Re: [PATCH v2] tpm/tpm_tis: Free IRQ if probing fails
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- vfs_getxattr_alloc() problem
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH] ima: Allow imasig requirement to be satisfied by EVM portable signatures
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH] ima: Fix return value of ima_write_policy()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v2] tpm_tis: work around status register bug in STMicroelectronics TPM
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: work around status register bug in STMicroelectronics TPM
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [GIT PULL] tpmdd updates for Linux v5.7-rc3
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: work around status register bug in STMicroelectronics TPM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: IMA: policy update LSM rules failed
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: work around status register bug in STMicroelectronics TPM
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] doc: trusted-encrypted: updates with TEE as a new trust source
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: work around status register bug in STMicroelectronics TPM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: work around status register bug in STMicroelectronics TPM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] doc: trusted-encrypted: updates with TEE as a new trust source
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [RFC] IMA: New IMA measurements for dm-crypt and selinux
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] IMA: New IMA measurements for dm-crypt and selinux
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] IMA: New IMA measurements for dm-crypt and selinux
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] IMA: New IMA measurements for dm-crypt and selinux
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm_tis: work around status register bug in STMicroelectronics TPM
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- Re: [PATCH] tpm_tis: work around status register bug in STMicroelectronics TPM
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- Re: [PATCH] tpm_tis: work around status register bug in STMicroelectronics TPM
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: work around status register bug in STMicroelectronics TPM
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] doc: trusted-encrypted: updates with TEE as a new trust source
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: work around status register bug in STMicroelectronics TPM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: work around status register bug in STMicroelectronics TPM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis_core: Disable broken IRQ handling code
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] Revert "Kernel selftests: tpm2: check for tpm support"
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: fix wrong return value in tpm_pcr_extend
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v2] tpm/tpm_tis: Free IRQ if probing fails
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm/tpm_tis: Free IRQ if probing fails
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm_tis: work around status register bug in STMicroelectronics TPM
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: work around status register bug in STMicroelectronics TPM
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v2] tpm_tis: work around status register bug in STMicroelectronics TPM
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- Re: [PATCH] tpm_tis: work around status register bug in STMicroelectronics TPM
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- Re: [PATCH] tpm_tis: work around status register bug in STMicroelectronics TPM
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] tpm_tis: work around status register bug in STMicroelectronics TPM
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [RFC PATCH v3 02/12] security: add ipe lsm evaluation loop and audit system
- From: deven.desai@xxxxxxxxxxxxxxxxxxx
- [RFC PATCH v3 05/12] fs: add security blob and hooks for block_device
- From: deven.desai@xxxxxxxxxxxxxxxxxxx
- [RFC PATCH v3 06/12] dm-verity: move signature check after tree validation
- From: deven.desai@xxxxxxxxxxxxxxxxxxx
- [RFC PATCH v3 09/12] dm-verity: add bdev_setsecurity hook for root-hash
- From: deven.desai@xxxxxxxxxxxxxxxxxxx
- [RFC PATCH v3 08/12] ipe: add property for signed dmverity volumes
- From: deven.desai@xxxxxxxxxxxxxxxxxxx
- [RFC PATCH v3 10/12] ipe: add property for dmverity roothash
- From: deven.desai@xxxxxxxxxxxxxxxxxxx
- [RFC PATCH v3 07/12] dm-verity: add bdev_setsecurity hook for dm-verity signature
- From: deven.desai@xxxxxxxxxxxxxxxxxxx
- [RFC PATCH v3 04/12] ipe: add property for trust of boot volume
- From: deven.desai@xxxxxxxxxxxxxxxxxxx
- [RFC PATCH v3 01/12] scripts: add ipe tooling to generate boot policy
- From: deven.desai@xxxxxxxxxxxxxxxxxxx
- [RFC PATCH v3 12/12] cleanup: uapi/linux/audit.h
- From: deven.desai@xxxxxxxxxxxxxxxxxxx
- [RFC PATCH v3 11/12] documentation: add ipe documentation
- From: deven.desai@xxxxxxxxxxxxxxxxxxx
- [RFC PATCH v3 03/12] security: add ipe lsm policy parser and policy loading
- From: deven.desai@xxxxxxxxxxxxxxxxxxx
- [RFC PATCH v3 00/12] Integrity Policy Enforcement LSM (IPE)
- From: deven.desai@xxxxxxxxxxxxxxxxxxx
- Re: [PATCH v6 6/7] dt-bindings: tpm: Add YAML schema for TPM TIS I2C options
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH] tpm_tis_core: Disable broken IRQ handling code
- From: Jan Lübbe <jlu@xxxxxxxxxxxxxx>
- [PATCH] ima: remove redundant code
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v2] ima: optimize ima_pcr_extend function by asynchronous
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] mm, treewide: Rename kzfree() to kfree_sensitive()
- From: Johannes Weiner <hannes@xxxxxxxxxxx>
- Re: [PATCH] ima: optimize ima_pcr_extend function by asynchronous
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] support to read and tune appraise mode in runtime
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 11/12] documentation: Add IPE Documentation
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Revert "Kernel selftests: tpm2: check for tpm support"
- From: shuah <shuah@xxxxxxxxxx>
- Re: [PATCH] tpm: fix wrong return value in tpm_pcr_extend
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] tpm: fix wrong return value in tpm_pcr_extend
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: Remove unnecessary memzero_explicit()
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH] Revert "Kernel selftests: tpm2: check for tpm support"
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: Remove unnecessary memzero_explicit()
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH] Revert "Kernel selftests: tpm2: check for tpm support"
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: fix wrong return value in tpm_pcr_extend
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: Remove unnecessary memzero_explicit()
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: [PATCH 1/2] mm, treewide: Rename kzfree() to kfree_sensitive()
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH] ima: optimize ima_pcr_extend function by asynchronous
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis_core: Disable broken IRQ handling code
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] tpm/tpm_tis: Free IRQ if probing fails
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH] tpm/tpm_tis: Free IRQ if probing fails
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: Remove unnecessary memzero_explicit()
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH] ima: optimize ima_pcr_extend function by asynchronous
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] selftests/tpm2: Change exception handling to be Python 3 compatible
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm/tpm_tis: Free IRQ if probing fails
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 11/12] documentation: Add IPE Documentation
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [PATCH 2/2] ima: simplify function process_buffer_measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] ima: simplify function ima_store_template
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Revert "Kernel selftests: tpm2: check for tpm support"
- From: shuah <shuah@xxxxxxxxxx>
- Re: [PATCH] evm: Fix possible memory leak in evm_calc_hmac_or_hash()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 0/2] support to read and tune appraise mode in runtime
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] mm, treewide: Rename kzfree() to kfree_sensitive()
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 1/2] mm, treewide: Rename kzfree() to kfree_sensitive()
- From: David Sterba <dsterba@xxxxxxx>
- RE: [PATCH] tpm: fix wrong return value in tpm_pcr_extend
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH] ima: optimize ima_pcr_extend function by asynchronous
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH 2/2] ima: simplify function process_buffer_measurement
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH 1/2] ima: simplify function ima_store_template
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH 0/2] Simplify the implementation of some functions in IMA
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH] tpm: fix wrong return value in tpm_pcr_extend
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] selftests/tpm2: Change exception handling to be Python 3 compatible
- From: Ezra Buehler <ezra@xxxxxxxx>
- [PATCH -next v2] IMA: fix memdup.cocci warnings
- From: Zou Wei <zou_wei@xxxxxxxxxx>
- Re: [RFC] IMA: New IMA measurements for dm-crypt and selinux
- From: "Lev R. Oshvang ." <levonshe@xxxxxxxxx>
- Re: [PATCH 1/2] mm, treewide: Rename kzfree() to kfree_sensitive()
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [PATCH -next] IMA: Fix a memdup.cocci warning
- From: Markus Elfring <Markus.Elfring@xxxxxx>
- Re: [PATCH 1/2] mm, treewide: Rename kzfree() to kfree_sensitive()
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] tpm/tpm_tis: Free IRQ if probing fails
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH -next] IMA: fix memdup.cocci warnings
- From: Zou Wei <zou_wei@xxxxxxxxxx>
- [PATCH] evm: Fix possible memory leak in evm_calc_hmac_or_hash()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH] selftests/tpm2: Change exception handling to be Python 3 compatible
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] qtpm2: Export tpm2_get_cc_attrs_tbl for ibmvtpm driver as module
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm/tpm_tis: Free IRQ if probing fails
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] crypto: Remove unnecessary memzero_explicit()
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH] selftests/tpm2: Change exception handling to be Python 3 compatible
- From: Ezra Buehler <ezra@xxxxxxxx>
- Re: [PATCH 0/2] support to read and tune appraise mode in runtime
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [RFC] IMA: New IMA measurements for dm-crypt and selinux
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] qtpm2: Export tpm2_get_cc_attrs_tbl for ibmvtpm driver as module
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] mm, treewide: Rename kzfree() to kfree_sensitive()
- From: David Rientjes <rientjes@xxxxxxxxxx>
- [PATCH v2 2/2] crypto: Remove unnecessary memzero_explicit()
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH 0/2] support to read and tune appraise mode in runtime
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] crypto: Remove unnecessary memzero_explicit()
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH 2/2] crypto: Remove unnecessary memzero_explicit()
- From: Joe Perches <joe@xxxxxxxxxxx>
- [PATCH 2/2] crypto: Remove unnecessary memzero_explicit()
- From: Waiman Long <longman@xxxxxxxxxx>
- [PATCH 0/2] mm, treewide: Rename kzfree() to kfree_sensitive()
- From: Waiman Long <longman@xxxxxxxxxx>
- [PATCH 1/2] mm, treewide: Rename kzfree() to kfree_sensitive()
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH] tpm/tpm_tis: Free IRQ if probing fails
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH] tpm/tpm_tis: Free IRQ if probing fails
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] selftests/tpm2: Change exception handling to be Python 3 compatible
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm/tpm_tis: Free IRQ if probing fails
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH] selftests/tpm2: Change exception handling to be Python 3 compatible
- From: Ezra Buehler <ezra@xxxxxxxx>
- Re: [PATCH v2 0/2] support to read and tune appraise mode in runtime
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] selftests/tpm2: Change exception handling to be Python 3 compatible
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH] tpm/tpm_tis: Free IRQ if probing fails
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] selftests/tpm2: Change exception handling to be Python 3 compatible
- From: Ezra Buehler <ezra@xxxxxxxx>
- Re: [PATCH] tpm_tis_core: Disable broken IRQ handling code
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH] selftests/tpm2: Change exception handling to be Python 3 compatible
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH] Revert "Kernel selftests: tpm2: check for tpm support"
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] selftests/tpm: Fix runtime error
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH] selftests/tpm: Fix runtime error
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 2/7] tpm: tpm_tis: Add check_data handle to tpm_tis_phy_ops
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC] IMA: New IMA measurements for dm-crypt and selinux
- From: "Lev R. Oshvang ." <levonshe@xxxxxxxxx>
- Re: [PATCH v2 0/2] support to read and tune appraise mode in runtime
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [RFC] IMA: New IMA measurements for dm-crypt and selinux
- From: Stephen Smalley <stephen.smalley@xxxxxxxxx>
- Re: [PATCH] tpm_tis_core: Disable broken IRQ handling code
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis_core: Disable broken IRQ handling code
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis_core: Disable broken IRQ handling code
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis_core: Disable broken IRQ handling code
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH] powerpc/ima: fix secure boot rules in ima arch policy
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis_core: Disable broken IRQ handling code
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH] tpm_tis_core: Disable broken IRQ handling code
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [RFC PATCH v2 03/12] security: add ipe lsm policy parser and policy loading
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 02/12] security: add ipe lsm evaluation loop and audit system
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 00/12] Integrity Policy Enforcement LSM (IPE)
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/2] support to read and tune appraise mode in runtime
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v2 2/2] ima: support to tune appraise mode in runtime
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v2 1/2] ima: support to read appraise mode
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] ima: support to tune appraise mode in runtime
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH 1/2] ima: support to read appraise mode
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH 2/2] ima: support to tune appraise mode in runtime
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH 0/2] support to read and tune appraise mode in runtime
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 7/7] tpm: tpm_tis: add tpm_tis_i2c driver
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 2/7] tpm: tpm_tis: Add check_data handle to tpm_tis_phy_ops
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 1/7] tpm: tpm_tis: Make implementation of read16 read32 write32 optional
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC] IMA: New IMA measurements for dm-crypt and selinux
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC] IMA: New IMA measurements for dm-crypt and selinux
- From: Milan Broz <gmazyland@xxxxxxxxx>
- [RFC] Use file change time instead of generation
- From: "Lev R. Oshvang ." <levonshe@xxxxxxxxx>
- [RFC] IMA: New IMA measurements for dm-crypt and selinux
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH] ima: Simplify the implementation of ima_fs_init function
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 7/7] tpm: tpm_tis: add tpm_tis_i2c driver
- From: Joel Stanley <joel@xxxxxxxxx>
- Re: [RFC PATCH v2 00/12] Integrity Policy Enforcement LSM (IPE)
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 3/7] tpm: tpm_tis: rewrite "tpm_tis_req_canceled()"
- From: amirmizi6@xxxxxxxxx
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]