Linux Integrity
[Prev Page][Next Page]
- [PATCH v6 5/7] tpm: Handle an exception for TPM Firmware Update mode.
- From: amirmizi6@xxxxxxxxx
- [PATCH v6 1/7] tpm: tpm_tis: Make implementation of read16 read32 write32 optional
- From: amirmizi6@xxxxxxxxx
- [PATCH v6 0/7] Add tpm i2c ptp driver
- From: amirmizi6@xxxxxxxxx
- [PATCH v6 7/7] tpm: tpm_tis: add tpm_tis_i2c driver
- From: amirmizi6@xxxxxxxxx
- [PATCH v6 4/7] tpm: tpm_tis: Fix expected bit handling and send all bytes in one shot without last byte in exception
- From: amirmizi6@xxxxxxxxx
- [PATCH v6 2/7] tpm: tpm_tis: Add check_data handle to tpm_tis_phy_ops
- From: amirmizi6@xxxxxxxxx
- [PATCH v6 6/7] dt-bindings: tpm: Add YAML schema for TPM TIS I2C options
- From: amirmizi6@xxxxxxxxx
- Re: [RFC PATCH v2 03/12] security: add ipe lsm policy parser and policy loading
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [RFC PATCH v2 02/12] security: add ipe lsm evaluation loop and audit system
- From: Jann Horn <jannh@xxxxxxxxxx>
- [RFC PATCH v2 01/12] scripts: add ipe tooling to generate boot policy
- From: deven.desai@xxxxxxxxxxxxxxxxxxx
- [RFC PATCH v2 04/12] ipe: add property for trust of boot volume
- From: deven.desai@xxxxxxxxxxxxxxxxxxx
- [RFC PATCH v2 07/12] dm-verity: add bdev_setsecurity hook for dm-verity signature
- From: deven.desai@xxxxxxxxxxxxxxxxxxx
- [RFC PATCH v2 00/12] Integrity Policy Enforcement LSM (IPE)
- From: deven.desai@xxxxxxxxxxxxxxxxxxx
- [RFC PATCH v2 06/12] dm-verity: move signature check after tree validation
- From: deven.desai@xxxxxxxxxxxxxxxxxxx
- [RFC PATCH v2 08/12] ipe: add property for signed dmverity volumes
- From: deven.desai@xxxxxxxxxxxxxxxxxxx
- [RFC PATCH v2 05/12] fs: add security blob and hooks for block_device
- From: deven.desai@xxxxxxxxxxxxxxxxxxx
- [RFC PATCH v2 12/12] cleanup: uapi/linux/audit.h
- From: deven.desai@xxxxxxxxxxxxxxxxxxx
- [RFC PATCH v2 03/12] security: add ipe lsm policy parser and policy loading
- From: deven.desai@xxxxxxxxxxxxxxxxxxx
- [RFC PATCH v2 09/12] dm-verity: add bdev_setsecurity hook for root-hash
- From: deven.desai@xxxxxxxxxxxxxxxxxxx
- [RFC PATCH v2 11/12] documentation: Add IPE Documentation
- From: deven.desai@xxxxxxxxxxxxxxxxxxx
- [RFC PATCH v2 10/12] ipe: add property for dmverity roothash
- From: deven.desai@xxxxxxxxxxxxxxxxxxx
- [RFC PATCH v2 02/12] security: add ipe lsm evaluation loop and audit system
- From: deven.desai@xxxxxxxxxxxxxxxxxxx
- Re: [RESEND PATCH 00/11] Integrity Policy Enforcement LSM (IPE)
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [RESEND PATCH 00/11] Integrity Policy Enforcement LSM (IPE)
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- Re: [RESEND PATCH 00/11] Integrity Policy Enforcement LSM (IPE)
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [RESEND PATCH 00/11] Integrity Policy Enforcement LSM (IPE)
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/7] tpm: tpm_tis: Add check_data handle to tpm_tis_phy_ops in order to check data integrity
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [RESEND PATCH 00/11] Integrity Policy Enforcement LSM (IPE)
- From: deven.desai@xxxxxxxxxxxxxxxxxxx
- [RESEND PATCH 07/11] ipe: add property for signed dmverity volumes
- From: deven.desai@xxxxxxxxxxxxxxxxxxx
- [RESEND PATCH 08/11] dm-verity: add bdev_setsecurity hook for root-hash
- From: deven.desai@xxxxxxxxxxxxxxxxxxx
- [RESEND PATCH 10/11] documentation: Add IPE Documentation
- From: deven.desai@xxxxxxxxxxxxxxxxxxx
- [RESEND PATCH 11/11] cleanup: uapi/linux/audit.h
- From: deven.desai@xxxxxxxxxxxxxxxxxxx
- [RESEND PATCH 09/11] ipe: add property for dmverity roothash
- From: deven.desai@xxxxxxxxxxxxxxxxxxx
- [RESEND PATCH 04/11] fs: add security blob and hooks for block_device
- From: deven.desai@xxxxxxxxxxxxxxxxxxx
- [RESEND PATCH 03/11] ipe: add property for trust of boot volume
- From: deven.desai@xxxxxxxxxxxxxxxxxxx
- [RESEND PATCH 06/11] dm-verity: add bdev_setsecurity hook for dm-verity signature
- From: deven.desai@xxxxxxxxxxxxxxxxxxx
- [RESEND PATCH 05/11] dm-verity: move signature check after tree validation
- From: deven.desai@xxxxxxxxxxxxxxxxxxx
- [RESEND PATCH 01/11] scripts: add ipe tooling to generate boot policy
- From: deven.desai@xxxxxxxxxxxxxxxxxxx
- [PATCH 06/11] dm-verity: add bdev_setsecurity hook for dm-verity signature
- From: deven.desai@xxxxxxxxxxxxxxxxxxx
- [PATCH 03/11] ipe: add property for trust of boot volume
- From: deven.desai@xxxxxxxxxxxxxxxxxxx
- [PATCH 04/11] fs: add security blob and hooks for block_device
- From: deven.desai@xxxxxxxxxxxxxxxxxxx
- [PATCH 09/11] ipe: add property for dmverity roothash
- From: deven.desai@xxxxxxxxxxxxxxxxxxx
- [PATCH 11/11] cleanup: uapi/linux/audit.h
- From: deven.desai@xxxxxxxxxxxxxxxxxxx
- [PATCH 08/11] dm-verity: add bdev_setsecurity hook for root-hash
- From: deven.desai@xxxxxxxxxxxxxxxxxxx
- [PATCH 07/11] ipe: add property for signed dmverity volumes
- From: deven.desai@xxxxxxxxxxxxxxxxxxx
- [PATCH 10/11] documentation: Add IPE Documentation
- From: deven.desai@xxxxxxxxxxxxxxxxxxx
- [PATCH 05/11] dm-verity: move signature check after tree validation
- From: deven.desai@xxxxxxxxxxxxxxxxxxx
- [PATCH 05/11] dm|dm-verity: refactor root-hash signature option
- From: deven.desai@xxxxxxxxxxxxxxxxxxx
- [PATCH 00/11] Integrity Policy Enforcement LSM (IPE)
- From: deven.desai@xxxxxxxxxxxxxxxxxxx
- [PATCH 01/11] scripts: add ipe tooling to generate boot policy
- From: deven.desai@xxxxxxxxxxxxxxxxxxx
- [RFC PATCH] integrity : Preserve i_flags of inode in signature hash
- From: Lev Olshvang <levonshe@xxxxxxxxx>
- [RFC PATCH] integrity : utils Add 2 more inode atributes to hash
- From: Lev Olshvang <levonshe@xxxxxxxxx>
- [PATCH v5 6/7] dt-bindings: tpm: Add YAML schema for TPM TIS I2C options
- From: amirmizi6@xxxxxxxxx
- [PATCH v5 7/7] tpm: tpm_tis: add tpm_tis_i2c driver
- From: amirmizi6@xxxxxxxxx
- [PATCH v5 1/7] tpm: tpm_tis: Make implementation of read16 read32 write32 optional
- From: amirmizi6@xxxxxxxxx
- [PATCH v5 5/7] tpm: Handle an exception for TPM Firmware Update mode.
- From: amirmizi6@xxxxxxxxx
- [PATCH v5 3/7] tpm: tpm_tis: rewrite "tpm_tis_req_canceled()"
- From: amirmizi6@xxxxxxxxx
- [PATCH v5 4/7] tpm: tpm_tis: Fix expected bit handling and send all bytes in one shot without last byte in exception
- From: amirmizi6@xxxxxxxxx
- [PATCH v5 2/7] tpm: tpm_tis: Add check_data handle to tpm_tis_phy_ops in order to check data integrity
- From: amirmizi6@xxxxxxxxx
- Add tpm i2c ptp driver
- From: amirmizi6@xxxxxxxxx
- Re: [PATCH v4 0/2] tpm2: Make TPM2 logs accessible for non-UEFI firmware
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v4 0/2] tpm2: Make TPM2 logs accessible for non-UEFI firmware
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH] ima: make ima_mok_init() static
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- Re: [PATCH v4 1/7] ima: Switch to ima_hash_algo for boot aggregate
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4 2/2] tpm: Add support for event log pointer found in TPM2 ACPI table
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 1/2] acpi: Extend TPM2 ACPI table with missing log fields
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 0/2] tpm2: Make TPM2 logs accessible for non-UEFI firmware
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] integrity subsystem updates for v5.7
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v4 2/7] tpm: tpm_tis: Add check_data handle to tpm_tis_phy_ops in order to check data integrity
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] tpm: Add support for event log pointer found in TPM2 ACPI table
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] qtpm2: Export tpm2_get_cc_attrs_tbl for ibmvtpm driver as module
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] acpi: Extend TPM2 ACPI table with missing log fields
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 2/2] ima-evm-utils: Add sign/verify tests for evmctl
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 2/2] ima-evm-utils: Add sign/verify tests for evmctl
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [GIT PULL] integrity subsystem updates for v5.7
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: [PATCH v4 2/7] tpm: tpm_tis: Add check_data handle to tpm_tis_phy_ops in order to check data integrity
- From: Benoit HOUYERE <benoit.houyere@xxxxxx>
- Re: [PATCH v8 2/2] ima-evm-utils: Add sign/verify tests for evmctl
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v9 1/2] ima-evm-utils: Add some tests for evmctl
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 2/2] ima-evm-utils: Add sign/verify tests for evmctl
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 0/2] ima-evm-utils: Add some tests for evmctl
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v3] tpm: Add support for event log pointer found in TPM2 ACPI table
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2] qtpm2: Export tpm2_get_cc_attrs_tbl for ibmvtpm driver as module
- From: Sachin Sant <sachinp@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] acpi: Extend TPM2 ACPI table with missing log fields
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: [PATCH v3] tpm: Add support for event log pointer found in TPM2 ACPI table
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] acpi: Extend TPM2 ACPI table with missing log fields
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 4/7] tpm: tpm_tis: Fix expected bit handling and send all bytes in one shot without last byte in exception
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/7] tpm: tpm_tis: Add check_data handle to tpm_tis_phy_ops in order to check data integrity
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] tpm: Add support for event log pointer found in TPM2 ACPI table
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH v3] tpm: Add support for event log pointer found in TPM2 ACPI table
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3] acpi: Extend TPM2 ACPI table with missing log fields
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- RE: [PATCH v4 4/7] tpm: tpm_tis: Fix expected bit handling and send all bytes in one shot without last byte in exception
- From: Benoit HOUYERE <benoit.houyere@xxxxxx>
- Re: [PATCH v4 6/7] dt-bindings: tpm: Add YAML schema for TPM TIS I2C options
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v8 1/2] ima-evm-utils: Add some tests for evmctl
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 7/7] tpm: tpm_tis: add tpm_tis_i2c driver
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v8 1/2] ima-evm-utils: Add some tests for evmctl
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v8 1/2] ima-evm-utils: Add some tests for evmctl
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 3/7] tpm: tpm_tis: rewrite "tpm_tis_req_canceled()"
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH v4 7/7] tpm: tpm_tis: add tpm_tis_i2c driver
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 4/7] tpm: tpm_tis: Fix expected bit handling and send all bytes in one shot without last byte in exception
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 3/7] tpm: tpm_tis: rewrite "tpm_tis_req_canceled()"
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/7] tpm: tpm_tis: Make implementation of read16 read32 write32 optional
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] doc: trusted-encrypted: updates with TEE as a new trust source
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] acpi: Extend TPM2 ACPI table with missing log fields
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/3] tpm: Rearrange ACPI log code to easier extend for TPM2 case
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v4 4/7] tpm: tpm_tis: Fix expected bit handling and send all bytes in one shot without last byte in exception
- From: <amirmizi6@xxxxxxxxx>
- [PATCH v4 2/7] tpm: tpm_tis: Add check_data handle to tpm_tis_phy_ops in order to check data integrity
- From: <amirmizi6@xxxxxxxxx>
- [PATCH v4 6/7] dt-bindings: tpm: Add YAML schema for TPM TIS I2C options
- From: <amirmizi6@xxxxxxxxx>
- [PATCH v4 7/7] tpm: tpm_tis: add tpm_tis_i2c driver
- From: <amirmizi6@xxxxxxxxx>
- [PATCH v4 1/7] tpm: tpm_tis: Make implementation of read16 read32 write32 optional
- From: <amirmizi6@xxxxxxxxx>
- [PATCH v4 0/7] Add tpm i2c ptp driver
- From: <amirmizi6@xxxxxxxxx>
- [PATCH v4 5/7] tpm: Handle an exception for TPM Firmware Update mode.
- From: <amirmizi6@xxxxxxxxx>
- [PATCH v4 3/7] tpm: tpm_tis: rewrite "tpm_tis_req_canceled()"
- From: <amirmizi6@xxxxxxxxx>
- [RFC] Add more inode fields to inode metadata signature
- From: Lev Olshvang <levonshe@xxxxxxxxx>
- RE: Immutable metadata
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH] doc: trusted-encrypted: updates with TEE as a new trust source
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v2 1/3] acpi: Extend TPM2 ACPI table with missing log fields
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/3] tpm: Rearrange ACPI log code to easier extend for TPM2 case
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] integrity ima_policy : Select files by suffix
- From: "Lev R. Oshvang ." <levonshe@xxxxxxxxx>
- Re: [PATCH v2 3/3] tpm: Add support for ACPI logs from TPM2 ACPI table
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for Linux v5.7
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v2 2/3] tpm: Rearrange ACPI log code to easier extend for TPM2 case
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] acpi: Extend TPM2 ACPI table with missing log fields
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Immutable metadata
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] integrity ima_policy : Select files by suffix
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 0/2] ima-evm-utils: Add some tests for evmctl
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] integrity ima_policy : Select files by suffix
- From: "Lev R. Oshvang ." <levonshe@xxxxxxxxx>
- Re: [PATCH v8 2/2] ima-evm-utils: Add sign/verify tests for evmctl
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v8 1/2] ima-evm-utils: Add some tests for evmctl
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- RE: [PATCH] integrity ima_policy : Select files by suffix
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v8 2/2] ima-evm-utils: Add sign/verify tests for evmctl
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 1/2] ima-evm-utils: Add some tests for evmctl
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 0/2] ima-evm-utils: Add some tests for evmctl
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- RE: Immutable metadata
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: Immutable metadata
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 2/3] tpm: Rearrange ACPI log code to easier extend for TPM2 case
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/3] tpm2: Make TPM2 logs accessible for non-UEFI firmware
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 1/3] acpi: Extend TPM2 ACPI table with missing log fields
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 3/3] tpm: Add support for ACPI logs from TPM2 ACPI table
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Subject: [PATCH] integrity - add more inode metadata to signature
- From: "Lev R. Oshvang ." <levonshe@xxxxxxxxx>
- Request for help
- From: "Lev R. Oshvang ." <levonshe@xxxxxxxxx>
- [PATCH] integrity ima_policy : Select files by suffix
- From: Lev Olshvang <levonshe@xxxxxxxxx>
- Re: Immutable metadata
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Immutable metadata
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v8 2/2] ima-evm-utils: Add sign/verify tests for evmctl
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 1/2] ima-evm-utils: Add some tests for evmctl
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 0/2] ima-evm-utils: Add some tests for evmctl
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v4 2/7] ima: Evaluate error in init_ima()
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v8 0/2] KEYS: Read keys to internal buffer & then copy to userspace
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 0/2] KEYS: Read keys to internal buffer & then copy to userspace
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH] evmctl: support verification of portable EVM signatures
- From: dbaryshkov@xxxxxxxxx
- Re: [PATCH v8 0/2] KEYS: Read keys to internal buffer & then copy to userspace
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH] ima-evm-utils: Fix compatibility with LibreSSL
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC PATCH 3/3] ima_evm_utils: tests: color boot_aggregate.test tty output
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC PATCH 1/3] ima-evm-utils: tests: verify boot_aggregate
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC PATCH 2/3] ima-evm-utils: tests: verify the last "boot_aggregate" record
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC PATCH 0/3] boot aggregate test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] ima-evm-utils: calculate the per TPM bank boot_aggregate
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 5/5] ima: Remove unused build_ima_appraise variable
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 4/5] ima: Remove redundant policy rule set in add_rules()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 3/5] ima: Fix ima digest hash table key calculation
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 2/5] evm: Check also if *tfm is an error pointer in init_desc()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 1/5] ima: Set file->f_mode instead of file->f_flags in ima_calc_file_hash()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v4] tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send()
- From: George Wilson <gcwilson@xxxxxxxxxxxxx>
- [PATCH v4 7/7] ima: Use ima_hash_algo for collision detection in the measurement list
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v4 6/7] ima: Calculate and extend PCR with digests in ima_template_entry
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v4 5/7] ima: Allocate and initialize tfm for each PCR bank
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v4 4/7] ima: Switch to dynamically allocated buffer for template digests
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v4 3/7] ima: Store template digest directly in ima_template_entry
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v4 2/7] ima: Evaluate error in init_ima()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v4 1/7] ima: Switch to ima_hash_algo for boot aggregate
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v4 0/7] ima: support stronger algorithms for attestation
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH] ima-evm-utils: Fix compatibility with LibreSSL
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima-evm-utils: Fix compatibility with LibreSSL
- From: Mikhail Novosyolov <m.novosyolov@xxxxxxxxxxxx>
- Re: [PATCH] ima-evm-utils: Fix compatibility with LibreSSL
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7] ima-evm-utils: Add some tests for evmctl
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v7] ima-evm-utils: Add some tests for evmctl
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7] ima-evm-utils: Add some tests for evmctl
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7] ima-evm-utils: Add some tests for evmctl
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 2/2] KEYS: Avoid false positive ENOMEM error on key read
- From: Waiman Long <longman@xxxxxxxxxx>
- [PATCH v8 1/2] KEYS: Don't write out to userspace while holding key semaphore
- From: Waiman Long <longman@xxxxxxxxxx>
- [PATCH v8 0/2] KEYS: Read keys to internal buffer & then copy to userspace
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH v7 2/2] KEYS: Avoid false positive ENOMEM error on key read
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH v7 2/2] KEYS: Avoid false positive ENOMEM error on key read
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 0/2] KEYS: Read keys to internal buffer & then copy to userspace
- From: Waiman Long <longman@xxxxxxxxxx>
- [PATCH v7 1/2] KEYS: Don't write out to userspace while holding key semaphore
- From: Waiman Long <longman@xxxxxxxxxx>
- [PATCH v7 2/2] KEYS: Avoid false positive ENOMEM error on key read
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH v6 2/2] KEYS: Avoid false positive ENOMEM error on key read
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH v5 2/2] KEYS: Avoid false positive ENOMEM error on key read
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/2] KEYS: Avoid false positive ENOMEM error on key read
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v6 2/2] KEYS: Avoid false positive ENOMEM error on key read
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 2/2] KEYS: Avoid false positive ENOMEM error on key read
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v6 0/2] KEYS: Read keys to internal buffer & then copy to userspace
- From: Waiman Long <longman@xxxxxxxxxx>
- [PATCH v6 1/2] KEYS: Don't write out to userspace while holding key semaphore
- From: Waiman Long <longman@xxxxxxxxxx>
- [PATCH v6 2/2] KEYS: Avoid false positive ENOMEM error on key read
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH v4] tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v5 2/2] KEYS: Avoid false positive ENOMEM error on key read
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH v5 2/2] KEYS: Avoid false positive ENOMEM error on key read
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4] tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/2] KEYS: Don't write out to userspace while holding key semaphore
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH v5 2/2] KEYS: Avoid false positive ENOMEM error on key read
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH v5 1/2] KEYS: Don't write out to userspace while holding key semaphore
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH v4] tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send()
- From: George Wilson <gcwilson@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/2] KEYS: Avoid false positive ENOMEM error on key read
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/2] KEYS: Avoid false positive ENOMEM error on key read
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH v3] tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send()
- From: George Wilson <gcwilson@xxxxxxxxxxxxx>
- Re: [PATCH v7] ima-evm-utils: Add some tests for evmctl
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm2: Export tpm2_get_cc_attrs_tbl for ibmvtpm driver as module
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 1/8] lib: add ASN.1 encoder
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] qtpm2: Export tpm2_get_cc_attrs_tbl for ibmvtpm driver as module
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/2] KEYS: Avoid false positive ENOMEM error on key read
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 1/8] lib: add ASN.1 encoder
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2] tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 1/8] lib: add ASN.1 encoder
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v8 6/8] security: keys: trusted: add PCR policy to TPM2 keys
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 1/8] lib: add ASN.1 encoder
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 6/8] security: keys: trusted: add PCR policy to TPM2 keys
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v8 2/8] oid_registry: Add TCG defined OIDS for TPM keys
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v8 1/8] lib: add ASN.1 encoder
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v7] ima-evm-utils: Add some tests for evmctl
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm2: Export tpm2_get_cc_attrs_tbl for ibmvtpm driver as module
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v7] ima-evm-utils: Add some tests for evmctl
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v7] ima-evm-utils: Add some tests for evmctl
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm2: Export tpm2_get_cc_attrs_tbl for ibmvtpm driver as module
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 7/8] ima: Calculate and extend PCR with digests in ima_template_entry
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: [PATCH v3 7/8] ima: Calculate and extend PCR with digests in ima_template_entry
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2] qtpm2: Export tpm2_get_cc_attrs_tbl for ibmvtpm driver as module
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3] tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send()
- From: George Wilson <gcwilson@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send()
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH v5 1/2] KEYS: Don't write out to userspace while holding key semaphore
- From: Waiman Long <longman@xxxxxxxxxx>
- [PATCH v5 0/2] KEYS: Read keys to internal buffer & then copy to userspace
- From: Waiman Long <longman@xxxxxxxxxx>
- [PATCH v5 2/2] KEYS: Avoid false positive ENOMEM error on key read
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH v3 7/8] ima: Calculate and extend PCR with digests in ima_template_entry
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm2: Export tpm2_get_cc_attrs_tbl for ibmvtpm driver as module
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] tpm2: Export tpm2_get_cc_attrs_tbl for ibmvtpm driver as module
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [RFC] IMA: Use Trusted Execution Environment to protect IMA keys and operations
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 4/4] KEYS: Avoid false positive ENOMEM error on key read
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v4 4/4] KEYS: Avoid false positive ENOMEM error on key read
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH v4 2/4] KEYS: Remove __user annotation from rxrpc_read()
- From: Waiman Long <longman@xxxxxxxxxx>
- RE: [PATCH v3 7/8] ima: Calculate and extend PCR with digests in ima_template_entry
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v4 4/4] KEYS: Avoid false positive ENOMEM error on key read
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v4 2/4] KEYS: Remove __user annotation from rxrpc_read()
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH v2] tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send()
- From: George Wilson <gcwilson@xxxxxxxxxxxxx>
- [PATCH v4 4/4] KEYS: Avoid false positive ENOMEM error on key read
- From: Waiman Long <longman@xxxxxxxxxx>
- [PATCH v4 3/4] KEYS: Remove __user annotation from dns_resolver_read()
- From: Waiman Long <longman@xxxxxxxxxx>
- [PATCH v4 2/4] KEYS: Remove __user annotation from rxrpc_read()
- From: Waiman Long <longman@xxxxxxxxxx>
- [PATCH v4 1/4] KEYS: Don't write out to userspace while holding key semaphore
- From: Waiman Long <longman@xxxxxxxxxx>
- [PATCH v4 0/4] KEYS: Read keys to internal buffer & then copy to userspace
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH v3 2/3] KEYS: Avoid false positive ENOMEM error on key read
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH v3 1/3] KEYS: Don't write out to userspace while holding key semaphore
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH v3 1/3] KEYS: Don't write out to userspace while holding key semaphore
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH] tpm2: Export tpm2_get_cc_attrs_tbl for ibmvtpm driver as module
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] tpm2: Export tpm2_get_cc_attrs_tbl for ibmvtpm driver as module
- From: Sachin Sant <sachinp@xxxxxxxxxxxxxxxxxx>
- [PATCH] tpm2: Export tpm2_get_cc_attrs_tbl for ibmvtpm driver as module
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] KEYS: Use kvmalloc() to better handle large buffer allocation
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/3] KEYS: Don't write out to userspace while holding key semaphore
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH v3 3/3] KEYS: Use kvmalloc() to better handle large buffer allocation
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH v3 3/3] KEYS: Use kvmalloc() to better handle large buffer allocation
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v3 1/3] KEYS: Don't write out to userspace while holding key semaphore
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/3] KEYS: Don't write out to userspace while holding key semaphore
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v3 1/3] KEYS: Don't write out to userspace while holding key semaphore
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v3 1/3] KEYS: Don't write out to userspace while holding key semaphore
- From: David Howells <dhowells@xxxxxxxxxx>
- [GIT PULL] tpmdd updates for Linux v5.7
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] KEYS: Use kvmalloc() to better handle large buffer allocation
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH v3 3/3] KEYS: Use kvmalloc() to better handle large buffer allocation
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/3] KEYS: Avoid false positive ENOMEM error on key read
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/3] KEYS: Don't write out to userspace while holding key semaphore
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/3] KEYS: Don't write out to userspace while holding key semaphore
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] KEYS: Use kvmalloc() to better handle large buffer allocation
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH v2 1/2] KEYS: Don't write out to userspace while holding key semaphore
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH v3 3/3] KEYS: Use kvmalloc() to better handle large buffer allocation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v7 3/3] tpm: ibmvtpm: Add support for TPM2
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 2/3] tpm: ibmvtpm: Wait for buffer to be set before proceeding
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] KEYS: Don't write out to userspace while holding key semaphore
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v3 2/3] KEYS: Avoid false positive ENOMEM error on key read
- From: Waiman Long <longman@xxxxxxxxxx>
- [PATCH v3 3/3] KEYS: Use kvmalloc() to better handle large buffer allocation
- From: Waiman Long <longman@xxxxxxxxxx>
- [PATCH v3 1/3] KEYS: Don't write out to userspace while holding key semaphore
- From: Waiman Long <longman@xxxxxxxxxx>
- [PATCH v3 0/3] KEYS: Read keys to internal buffer & then copy to userspace
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH v7 1/3] tpm: of: Handle IBM,vtpm20 case when getting log parameters
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] KEYS: Don't write out to userspace while holding key semaphore
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH v2 1/2] KEYS: Don't write out to userspace while holding key semaphore
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v7 0/3] Enable vTPM 2.0 for the IBM vTPM driver
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v7 2/3] tpm: ibmvtpm: Wait for buffer to be set before proceeding
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v7 3/3] tpm: ibmvtpm: Add support for TPM2
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v7 1/3] tpm: of: Handle IBM,vtpm20 case when getting log parameters
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] ima: add a new CONFIG for loading arch-specific policies
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v3] ima: add a new CONFIG for loading arch-specific policies
- From: Philipp Rudo <prudo@xxxxxxxxxxxxx>
- Re: [PATCH v3] ima: add a new CONFIG for loading arch-specific policies
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] KEYS: Avoid false positive ENOMEM error on key read
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH v6 1/3] tpm: of: Handle IBM,vtpm20 case when getting log parameters
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] tpm: of: Handle IBM,vtpm20 case when getting log parameters
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v6 1/3] tpm: of: Handle IBM,vtpm20 case when getting log parameters
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v6 3/3] tpm: ibmvtpm: Add support for TPM2
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] KEYS: Avoid false positive ENOMEM error on key read
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v2 2/2] KEYS: Avoid false positive ENOMEM error on key read
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH v2 2/2] KEYS: Avoid false positive ENOMEM error on key read
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH v8 1/8] lib: add ASN.1 encoder
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v8 8/8] security: keys: trusted: implement counter/timer policy
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v8 7/8] security: keys: trusted: add ability to specify arbitrary policy
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v8 6/8] security: keys: trusted: add PCR policy to TPM2 keys
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v8 5/8] security: keys: trusted: Make sealed key properly interoperable
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v8 4/8] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v8 3/8] security: keys: trusted: fix TPM2 authorizations
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v8 2/8] oid_registry: Add TCG defined OIDS for TPM keys
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v8 1/8] lib: add ASN.1 encoder
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v8 0/8] TPM 2.0 trusted keys with attached policy
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v8 1/8] lib: add ASN.1 encoder
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v8 0/8] TPM 2.0 trusted keys with attached policy
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 4/6] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] KEYS: Avoid false positive ENOMEM error on key read
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v7 4/6] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v3] ima: add a new CONFIG for loading arch-specific policies
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v2 2/2] KEYS: Avoid false positive ENOMEM error on key read
- From: Waiman Long <longman@xxxxxxxxxx>
- [PATCH v2 1/2] KEYS: Don't write out to userspace while holding key semaphore
- From: Waiman Long <longman@xxxxxxxxxx>
- [PATCH v2 0/2] KEYS: Read keys to internal buffer & then copy to userspace
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH v7 4/6] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 3/3] tpm: ibmvtpm: Add support for TPM2
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] MAINTAINERS: adjust to trusted keys subsystem creation
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] MAINTAINERS: adjust to trusted keys subsystem creation
- From: Lukas Bulwahn <lukas.bulwahn@xxxxxxxxx>
- Re: [PATCH v7 4/6] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 3/6] security: keys: trusted: fix TPM2 authorizations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] MAINTAINERS: adjust to trusted keys subsystem creation
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 1/6] lib: add ASN.1 encoder
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 3/3] tpm: ibmvtpm: Add support for TPM2
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] KEYS: Don't write out to userspace while holding key semaphore
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 3/3] tpm: ibmvtpm: Add support for TPM2
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] ima: add a new CONFIG for loading arch-specific policies
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v3] ima: add a new CONFIG for loading arch-specific policies
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [PATCH v3] MAINTAINERS: adjust to trusted keys subsystem creation
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH] KEYS: Don't write out to userspace while holding key semaphore
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH] KEYS: Don't write out to userspace while holding key semaphore
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: adjust to trusted keys subsystem creation
- From: Lukas Bulwahn <lukas.bulwahn@xxxxxxxxx>
- [PATCH] KEYS: Don't write out to userspace while holding key semaphore
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: adjust to trusted keys subsystem creation
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: adjust to trusted keys subsystem creation
- From: Lukas Bulwahn <lukas.bulwahn@xxxxxxxxx>
- Re: [PATCH v2] MAINTAINERS: adjust to trusted keys subsystem creation
- From: Lukas Bulwahn <lukas.bulwahn@xxxxxxxxx>
- [PATCH v3] MAINTAINERS: adjust to trusted keys subsystem creation
- From: Lukas Bulwahn <lukas.bulwahn@xxxxxxxxx>
- Re: [PATCH v7 1/6] lib: add ASN.1 encoder
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 3/3] tpm: ibmvtpm: Add support for TPM2
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v6 0/3] Enable vTPM 2.0 for the IBM vTPM driver
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: st33zp24: Convert to use GPIO descriptors
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: adjust to trusted keys subsystem creation
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 3/3] tpm: ibmvtpm: Add support for TPM2
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 2/3] tpm: ibmvtpm: Wait for buffer to be set before proceeding
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 0/3] Enable vTPM 2.0 for the IBM vTPM driver
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] MAINTAINERS: adjust to trusted keys subsystem creation
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v2] ima: add a new CONFIG for loading arch-specific policies
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- [PATCH v7 6/6] security: keys: trusted: implement counter/timer policy
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 5/6] security: keys: trusted: add ability to specify arbitrary policy
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 4/6] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 3/6] security: keys: trusted: fix TPM2 authorizations
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 2/6] oid_registry: Add TCG defined OIDS for TPM keys
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 1/6] lib: add ASN.1 encoder
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 0/6] TPM 2.0 trusted keys with attached policy
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] tpm: st33zp24: Convert to use GPIO descriptors
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: adjust to trusted keys subsystem creation
- From: Lukas Bulwahn <lukas.bulwahn@xxxxxxxxx>
- [PATCH v2] MAINTAINERS: adjust to trusted keys subsystem creation
- From: Lukas Bulwahn <lukas.bulwahn@xxxxxxxxx>
- Re: [PATCH] MAINTAINERS: adjust to trusted keys subsystem creation
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- [PATCH] MAINTAINERS: adjust to trusted keys subsystem creation
- From: Lukas Bulwahn <lukas.bulwahn@xxxxxxxxx>
- Re: [PATCH v2] ima: add a new CONFIG for loading arch-specific policies
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] ima: add a new CONFIG for loading arch-specific policies
- From: Philipp Rudo <prudo@xxxxxxxxxxxxx>
- [PATCH v6 1/3] tpm: of: Handle IBM,vtpm20 case when getting log parameters
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 3/3] tpm: ibmvtpm: Add support for TPM2
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 2/3] tpm: ibmvtpm: Wait for buffer to be set before proceeding
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 0/3] Enable vTPM 2.0 for the IBM vTPM driver
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/3] tpm: ibmvtpm: Add support for TPM 2
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2] ima: add a new CONFIG for loading arch-specific policies
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] ima: add a new CONFIG for loading arch-specific policies
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] ima: add a new CONFIG for loading arch-specific policies
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] ima: add a new CONFIG for loading arch-specific policies
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2] ima: add a new CONFIG for loading arch-specific policies
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [PATCH v6 3/6] security: keys: trusted: fix TPM2 authorizations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 1/6] lib: add ASN.1 encoder
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 4/6] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 6/6] security: keys: trusted: implement counter/timer policy
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 1/6] lib: add ASN.1 encoder
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 4/6] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 6/6] security: keys: trusted: implement counter/timer policy
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 3/6] security: keys: trusted: fix TPM2 authorizations
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/3] tpm: ibmvtpm: Add support for TPM 2
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 6/6] security: keys: trusted: implement counter/timer policy
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 4/6] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 3/6] security: keys: trusted: fix TPM2 authorizations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 2/6] oid_registry: Add TCG defined OIDS for TPM keys
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 1/6] lib: add ASN.1 encoder
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 7/8] ima: Calculate and extend PCR with digests in ima_template_entry
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: add a new CONFIG for loading arch-specific policies
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v3 5/8] ima: Switch to dynamically allocated buffer for template digests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: add a new CONFIG for loading arch-specific policies
- From: Heiko Carstens <heiko.carstens@xxxxxxxxxx>
- Re: [PATCH v5 4/6] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
- From: James Prestwood <prestwoj@xxxxxxxxx>
- Re: [PATCH v5 2/3] tpm: ibmvtpm: Wait for buffer to be set before proceeding
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/8] ima: Switch to ima_hash_algo for boot aggregate
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 3/3] tpm: ibmvtpm: Add support for TPM 2
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- RE: [PATCH v3 2/8] ima: Switch to ima_hash_algo for boot aggregate
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH] ima: add a new CONFIG for loading arch-specific policies
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: add a new CONFIG for loading arch-specific policies
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] ima: add a new CONFIG for loading arch-specific policies
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/8] ima: Switch to ima_hash_algo for boot aggregate
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: [PATCH v3 2/8] ima: Switch to ima_hash_algo for boot aggregate
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v3 2/8] ima: Switch to ima_hash_algo for boot aggregate
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v6 6/6] security: keys: trusted: implement counter/timer policy
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 5/6] security: keys: trusted: add ability to specify arbitrary policy
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 4/6] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 3/6] security: keys: trusted: fix TPM2 authorizations
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 2/6] oid_registry: Add TCG defined OIDS for TPM keys
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 1/6] lib: add ASN.1 encoder
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 0/6] TPM 2.0 trusted keys with attached policy
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/3] tpm: ibmvtpm: Add support for TPM 2
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/3] tpm: ibmvtpm: Wait for buffer to be set before proceeding
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/6] security: keys: trusted fix tpm2 authorizations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- RE: [ima] 9165b814d2: BUG:kernel_NULL_pointer_dereference,address
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v4 0/3] Enable vTPM 2.0 for the IBM vTPM driver
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v5 3/3] tpm: ibmvtpm: Add support for TPM 2
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 0/3] Enable vTPM 2.0 for the IBM vTPM driver
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 1/3] tpm: of: Handle IBM,vtpm20 case when getting log parameters
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 2/3] tpm: ibmvtpm: Wait for buffer to be set before proceeding
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 3/3] tpm: ibmvtpm: Add support for TPM 2
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 0/3] Enable vTPM 2.0 for the IBM vTPM driver
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 1/3] tpm: of: Handle IBM,vtpm20 case when getting log parameters
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 2/3] tpm: ibmvtpm: Wait for buffer to be set before proceeding
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/6] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
- From: James Prestwood <prestwoj@xxxxxxxxx>
- Re: [PATCH v5 4/6] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
- From: James Prestwood <prestwoj@xxxxxxxxx>
- Re: [PATCH] ima-evm-utils: Fix compatibility with LibreSSL
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 4/6] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/6] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] ima: add a new CONFIG for loading arch-specific policies
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 3/6] security: keys: trusted fix tpm2 authorizations
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/6] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
- From: James Prestwood <prestwoj@xxxxxxxxx>
- Re: [PATCH] tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send()
- From: George Wilson <gcwilson@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: tpm_tis_spi_cr50: use new structure for SPI transfer delays
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/6] security: keys: trusted fix tpm2 authorizations
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/6] security: keys: trusted fix tpm2 authorizations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 4/4] tpm: ibmvtpm: Add support for TPM 2
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/4] tpm: Implement tpm2_init_commands to use in non-auto startup case
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/4] tpm: ibmvtpm: Wait for buffer to be set before proceeding
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH] tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send()
- From: George Wilson <gcwilson@xxxxxxxxxxxxx>
- Re: [PATCH] ima-evm-utils: Fix compatibility with LibreSSL
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH] security: integrity: Replace zero-length array with flexible-array member
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- [PATCH v2] tpm: tpm_tis_spi_cr50: use new structure for SPI transfer delays
- From: Sergiu Cuciurean <sergiu.cuciurean@xxxxxxxxxx>
- Re: [PATCH] ima-evm-utils: Fix compatibility with LibreSSL
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 3/6] security: keys: trusted fix tpm2 authorizations
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/6] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v3 1/4] tpm: of: Handle IBM,vtpm20 case when getting log parameters
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 4/4] tpm: ibmvtpm: Add support for TPM 2
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 3/4] tpm: Implement tpm2_init_commands to use in non-auto startup case
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 0/4] Enable vTPM 2.0 for the IBM vTPM driver
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 2/4] tpm: ibmvtpm: Wait for buffer to be set before proceeding
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/6] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
- From: James Prestwood <prestwoj@xxxxxxxxx>
- Re: [PATCH v5 4/6] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] ima: add a new CONFIG for loading arch-specific policies
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: add a new CONFIG for loading arch-specific policies
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH] ima: add a new CONFIG for loading arch-specific policies
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] tpm: Implement tpm2_init to call when TPM_OPS_AUTO_STARTUP is not set
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 3/6] security: keys: trusted fix tpm2 authorizations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] Char: tpm_tis_spi_cr50: use new structure for SPI transfer delays
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH V3] tpm_tis_spi: use new 'delay' structure for SPI transfer delays
- From: "Ardelean, Alexandru" <alexandru.Ardelean@xxxxxxxxxx>
- Re: [PATCH V3] tpm_tis_spi: use new 'delay' structure for SPI transfer delays
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] tpm: Implement tpm2_init to call when TPM_OPS_AUTO_STARTUP is not set
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/4] tpm: ibmvtpm: Wait for buffer to be set before proceeding
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH] Char: tpm_tis_spi_cr50: use new structure for SPI transfer delays
- From: Sergiu Cuciurean <sergiu.cuciurean@xxxxxxxxxx>
- Re: [PATCH] ima-evm-utils: Fix compatibility with LibreSSL
- From: Mikhail Novosyolov <m.novosyolov@xxxxxxxxxxxx>
- Re: [PATCH V3] tpm_tis_spi: use new 'delay' structure for SPI transfer delays
- From: "Ardelean, Alexandru" <alexandru.Ardelean@xxxxxxxxxx>
- [PATCH v3 1/4] tpm: of: Handle IBM,vtpm20 case when getting log parameters
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 2/4] tpm: ibmvtpm: Wait for buffer to be set before proceeding
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 4/4] tpm: ibmvtpm: Add support for TPM 2
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 0/4] Enable vTPM 2.0 for the IBM vTPM driver
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 3/4] tpm: Implement tpm2_init_commands to use in non-auto startup case
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] tpm: Implement tpm2_init to call when TPM_OPS_AUTO_STARTUP is not set
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/4] tpm: ibmvtpm: Wait for buffer to be set before proceeding
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] tpm: Implement tpm2_init to call when TPM_OPS_AUTO_STARTUP is not set
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/4] tpm: ibmvtpm: Wait for buffer to be set before proceeding
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] tpm: of: Handle IBM,vtpm20 case when getting log parameters
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/6] security: keys: trusted fix tpm2 authorizations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] tpm: Add driver for cr50 on I2C
- From: "Helen Mae Koike Fornazier" <koike@xxxxxxxxxxxxx>
- Re: [PATCH] ima-evm-utils: Fix compatibility with LibreSSL
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima-evm-utils: Fix compatibility with LibreSSL
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] Add TPM 2.0 compatible I2C interface for chips with cr50 firmware.
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH 1/1] tpm: Add driver for cr50 on I2C
- From: Fabien Lahoudere <fabien.lahoudere@xxxxxxxxxxxxx>
- [PATCH 1/1] Add TPM 2.0 compatible I2C interface for chips with cr50 firmware.
- From: Fabien Lahoudere <fabien.lahoudere@xxxxxxxxxxxxx>
- Re: [PATCH V2] tpm: Don't make log failures fatal
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: tpm1_bios_measurements_next should increase position index
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: tpm1_bios_measurements_next should increase position index
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v3 2/2] tpm: tpm2_bios_measurements_next should increase position index
- From: Vasily Averin <vvs@xxxxxxxxxxxxx>
- [PATCH v3 1/2] tpm: tpm1_bios_measurements_next should increase position index
- From: Vasily Averin <vvs@xxxxxxxxxxxxx>
- [PATCH v2] ima-evm-utils: Add support for Intel TSS2 for PCR reading
- From: patrick@xxxxxxxxxxxxxx
- Re: [RFC PATCH 0/8] ima-evm-utils: calculate per TPM bank template digest
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Add support for TSS2 for PCR reading
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/8] ima-evm-utils: calculate per TPM bank template digest
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/8] ima-evm-utils: calculate per TPM bank template digest
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/3] integrity: improve log messages
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] integrity subsystem fixes for v5.6
- From: pr-tracker-bot@xxxxxxxxxx
- [RFC PATCH 3/8] ima-evm-utils: calculate the digests for multiple TPM banks
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC PATCH 0/8] ima-evm-utils: calculate per TPM bank template digest
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC PATCH 7/8] ima-evm-utils: use a common bank variable for TPM 1.2 and TPM 2.0
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC PATCH 8/8] ima-evm-utils: remove TPM 1.2 specific code
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC PATCH 6/8] ima-evm-utils: compare re-calculated PCRs with the TPM values
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC PATCH 5/8] ima-evm-utils: read the PCRs for the requested TPM banks
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC PATCH 4/8] ima-evm-utils: add support in tpm2_read_pcrs to read different TPM banks
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC PATCH 2/8] ima-evm-utils: increase the size of "zero" and "fox" variables
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC PATCH 1/8] ima-evm-utils: treat unallocated banks as an error
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 0/3] integrity: improve log messages
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH V2] tpm: Don't make log failures fatal
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH V2] tpm: Don't make log failures fatal
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V2] tpm: Don't make log failures fatal
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v5 0/6] TPM 2.0 trusted keys with attached policy
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] Enable vTPM 2.0 for the IBM vTPM driver
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] Enable vTPM 2.0 for the IBM vTPM driver
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [GIT PULL] integrity subsystem fixes for v5.6
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: Debugging errors with Dell XPS 9560 TPM
- From: Alex Guzman <alex@xxxxxxxxx>
- Re: [PATCH v2 0/4] Enable vTPM 2.0 for the IBM vTPM driver
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v5 3/3] integrity: Remove duplicate pr_fmt definitions
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 1/3] IMA: Update KBUILD_MODNAME for IMA files to ima
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 2/3] IMA: Add log statements for failure conditions
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 0/3] integrity: improve log messages
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for Linux v5.6-rc3
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v4 1/3] IMA: Update KBUILD_MODNAME for IMA files to ima
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/3] IMA: Update KBUILD_MODNAME for IMA files to ima
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/3] IMA: improve log messages
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: Debugging errors with Dell XPS 9560 TPM
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: Debugging errors with Dell XPS 9560 TPM
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2] ima: export the measurement list when needed
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] ima: export the measurement list when needed
- From: david.safford@xxxxxxxxx
- Re: [PATCH v2 1/2] crypto: fix mismatched hash algorithm name sm3-256 to sm3
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: fix mismatched hash algorithm name sm3-256 to sm3
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: fix mismatched hash algorithm name sm3-256 to sm3
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [GIT PULL] tpmdd updates for Linux v5.6-rc3
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v2 1/2] crypto: fix mismatched hash algorithm name sm3-256 to sm3
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v2] IMA hash algorithm supports sm3
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v2 2/2] ima: add sm3 algorithm to hash algorithm configuration list
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] Add support for TSS2 for PCR reading
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] ima-evm-utils: Fix compatibility with LibreSSL
- From: Mikhail Novosyolov <m.novosyolov@xxxxxxxxxxxx>
- Re: [PATCH v4 2/3] IMA: Add log statements for failure conditions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 3/3] IMA: Remove duplicate pr_fmt definitions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 0/3] IMA: improve log messages
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4 2/3] IMA: Add log statements for failure conditions
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 0/3] IMA: improve log messages
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 3/3] IMA: Remove duplicate pr_fmt definitions
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 1/3] IMA: Update KBUILD_MODNAME for IMA files to ima
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: Debugging errors with Dell XPS 9560 TPM
- From: Alex Guzman <alex@xxxxxxxxx>
- Re: Debugging errors with Dell XPS 9560 TPM
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: Debugging errors with Dell XPS 9560 TPM
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: Debugging errors with Dell XPS 9560 TPM
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: Debugging errors with Dell XPS 9560 TPM
- From: Alex Guzman <alex@xxxxxxxxx>
- [PATCH AUTOSEL 5.5 201/542] IMA: Check IMA policy flag
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v3 7/7] char: tpm: add tpm_tis_i2c driver
- From: Eddie James <eajames@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/3] IMA: Add log statements for failure conditions.
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/4] tpm: ibmvtpm: Wait for buffer to be set before proceeding
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 1/4] tpm: of: Handle IBM,vtpm20 case when getting log parameters
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 3/4] tpm: Implement tpm2_init to call when TPM_OPS_AUTO_STARTUP is not set
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 4/4] tpm: ibmvtpm: Add support for TPM 2
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/4] Enable vTPM 2.0 for the IBM vTPM driver
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] ima: export the measurement list when needed
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] tpm: ibmvtpm: Add support for TPM 2
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH 3/3] tpm: ibmvtpm: Add support for TPM 2
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] tpm: ibmvtpm: Add support for TPM 2
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH 1/3] tpm: of: Handle IBM,vtpm20 case when getting log parameters
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] tpm: ibmvtpm: Add support for TPM 2
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] tpm: ibmvtpm: Add support for TPM 2
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH 3/3] tpm: ibmvtpm: Add support for TPM 2
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] tpm: ibmvtpm: Add support for TPM 2
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH 3/3] tpm: ibmvtpm: Add support for TPM 2
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] tpm: ibmvtpm: Wait for buffer to be set before proceeding
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] tpm: ibmvtpm: Wait for buffer to be set before proceeding
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] tpm: ibmvtpm: Add support for TPM 2
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] tpm: of: Handle IBM,vtpm20 case when getting log parameters
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/2] ima: uncompressed module appraisal support
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v2] ima: export the measurement list when needed
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: [PATCH v2] ima: export the measurement list when needed
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] IMA: Add module name and base name prefix to log.
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] IMA: Add module name and base name prefix to log.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/3] IMA: Add log statements for failure conditions.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] IMA: Add module name and base name prefix to log.
- From: Shuah Khan <skhan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/3] IMA: Add log statements for failure conditions.
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/3] IMA: Update KBUILD_MODNAME for IMA files to ima
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/3] IMA: improve log messages in IMA
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] ima: export the measurement list when needed
- From: david.safford@xxxxxxxxx
- Re: [PATCH v3 3/3] IMA: Add module name and base name prefix to log.
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH v3 3/3] IMA: Add module name and base name prefix to log.
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/3] IMA: improve log messages in IMA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/3] IMA: Add log statements for failure conditions.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/7] char: tpm: Make implementation of read16 read32 write32 optional
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/3] IMA: Update KBUILD_MODNAME for IMA files to ima
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] ima: more careful error checking in restore_template_fmt()
- From: Konsta Karsisto <konsta.karsisto@xxxxxxxxx>
- Re: [PATCH v3 3/3] IMA: Add module name and base name prefix to log.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/2] ima: uncompressed module appraisal support
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 6/7] dt-bindings: tpm: Add YAML schema for TPM TIS I2C options
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: rename sm3-256 to sm3 in hash_algo_name
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 3/3] IMA: Add module name and base name prefix to log.
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 0/3] IMA: improve log messages in IMA
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 2/3] IMA: Add log statements for failure conditions.
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 1/3] IMA: Update KBUILD_MODNAME for IMA files to ima
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] ima: export the measurement list when needed
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: rename sm3-256 to sm3 in hash_algo_name
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/3] IMA: Add log statements for failure conditions.
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH v2 2/3] IMA: Add log statements for failure conditions.
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] IMA: Update KBUILD_MODNAME for IMA files to ima
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] IMA: Update KBUILD_MODNAME for IMA files to ima
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/2] ima: uncompressed module appraisal support
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v2] ima: export the measurement list when needed
- From: david.safford@xxxxxxxxx
- RE: [PATCH v3 2/8] ima: Switch to ima_hash_algo for boot aggregate
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v2] ima: export the measurement list when needed
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- RE: [PATCH 1/2] crypto: sm3 - add a new alias name sm3-256
- From: "Van Leeuwen, Pascal" <pvanleeuwen@xxxxxxxxxx>
- RE: [PATCH 1/2] crypto: rename sm3-256 to sm3 in hash_algo_name
- From: "Van Leeuwen, Pascal" <pvanleeuwen@xxxxxxxxxx>
- Re: [PATCH v2 2/3] IMA: Add log statements for failure conditions.
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH v2 1/3] IMA: Update KBUILD_MODNAME for IMA files to ima
- From: Joe Perches <joe@xxxxxxxxxxx>
- [PATCH v2 3/3] IMA: Add module name and base name prefix to log
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/3] IMA: Add log statements for failure conditions.
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 1/3] IMA: Update KBUILD_MODNAME for IMA files to ima
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/8] ima: Switch to ima_hash_algo for boot aggregate
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] IMA: Add log statements for failure conditions.
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] IMA: Add log statements for failure conditions.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] IMA: Add log statements for failure conditions.
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/2] ima: uncompressed module appraisal support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] ima: export the measurement list when needed
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/2] ima: uncompressed module appraisal support
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: sm3 - add a new alias name sm3-256
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2] ima: export the measurement list when needed
- From: david.safford@xxxxxxxxx
- Re: [PATCH 1/2] crypto: sm3 - add a new alias name sm3-256
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: rename sm3-256 to sm3 in hash_algo_name
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: sm3 - add a new alias name sm3-256
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 7/7] char: tpm: add tpm_tis_i2c driver
- From: amirmizi6@xxxxxxxxx
- [PATCH v3 4/7] char: tpm: Fix expected bit handling and send all bytes in one shot without last byte in exception
- From: amirmizi6@xxxxxxxxx
- [PATCH v3 2/7] char: tpm: Add check_data handle to tpm_tis_phy_ops in order to check data integrity
- From: amirmizi6@xxxxxxxxx
- [PATCH v3 1/7] char: tpm: Make implementation of read16 read32 write32 optional
- From: amirmizi6@xxxxxxxxx
- [PATCH v3 0/7] add tpm i2c ptp driver
- From: amirmizi6@xxxxxxxxx
- [PATCH v3 6/7] dt-bindings: tpm: Add YAML schema for TPM TIS I2C options
- From: amirmizi6@xxxxxxxxx
- [PATCH v3 3/7] char: tpm: rewrite "tpm_tis_req_canceled()"
- From: amirmizi6@xxxxxxxxx
- [PATCH v3 5/7] tpm: Handle an exception for TPM Firmware Update mode.
- From: amirmizi6@xxxxxxxxx
- Re: [RFC PATCH 0/2] ima: uncompressed module appraisal support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: [PATCH 1/2] crypto: sm3 - add a new alias name sm3-256
- From: "Van Leeuwen, Pascal" <pvanleeuwen@xxxxxxxxxx>
- Re: [PATCH] IMA: Add log statements for failure conditions.
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH] IMA: Add log statements for failure conditions.
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: sm3 - add a new alias name sm3-256
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/2] ima: uncompressed module appraisal support
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: sm3 - add a new alias name sm3-256
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/8] tpm: Initialize crypto_id of allocated_banks to HASH_ALGO__LAST
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] ima: export the measurement list when needed
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] IMA hash algorithm supports sm3
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH 2/2] ima: add sm3 algorithm to hash algorithm configuration list
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: rename sm3-256 to sm3 in hash_algo_name
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- 回复:[PATCH 1/2] crypto: sm3 - add a new alias name sm3-256
- From: "Tianjia Zhang" <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v3 8/8] ima: Use ima_hash_algo for collision detection in the measurement list
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 7/8] ima: Calculate and extend PCR with digests in ima_template_entry
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 6/8] ima: Allocate and initialize tfm for each PCR bank
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 5/8] ima: Switch to dynamically allocated buffer for template digests
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 4/8] ima: Store template digest directly in ima_template_entry
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 3/8] ima: Evaluate error in init_ima()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 2/8] ima: Switch to ima_hash_algo for boot aggregate
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 1/8] tpm: Initialize crypto_id of allocated_banks to HASH_ALGO__LAST
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 0/8] ima: support stronger algorithms for attestation
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v2] ima: export the measurement list when needed
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: [PATCH 1/2] crypto: sm3 - add a new alias name sm3-256
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] IMA: Add log statements for failure conditions.
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH] tpm: Revert tpm_tis_spi_mod.ko to tpm_tis_spi.ko.
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Revert tpm_tis_spi_mod.ko to tpm_tis_spi.ko.
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] IMA: Add log statements for failure conditions.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/2] ima: uncompressed module appraisal support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/2] ima: uncompressed module appraisal support
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH] IMA: Add log statements for failure conditions.
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH] IMA: Updated KBUILD_MODNAME for IMA files to ima
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/2] ima: uncompressed module appraisal support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/2] ima: uncompressed module appraisal support
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]