Linux Integrity
[Prev Page][Next Page]
- Re: [PATCH v10 8/9] powerpc/ima: update ima arch policy to check for blacklist
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [PATCH v10 5/9] ima: make process_buffer_measurement() generic
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [PATCH v9 1/4] powerpc/powernv: Add OPAL API interface to access secure variable
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [PATCH v10a 3/9] powerpc: detect the trusted boot state of the system
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [PATCH v10a 1/9] powerpc: detect the secure boot mode of the system
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [PATCH v10 7/9] ima: check against blacklisted hashes for files with modsig
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v10 9/9] powerpc/ima: indicate kernel modules appended signatures are enforced
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [PATCH v10 2/9] powerpc/ima: add support to initialize ima policy rules
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- [PATCH v7 3/5] KEYS: Call the IMA hook to measure keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 2/5] IMA: Define an IMA hook to measure keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 4/5] IMA: Add support to limit measuring keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 0/5] KEYS: Measure keys when they are created or updated
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 5/5] IMA: Read keyrings= option from the IMA policy
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 1/5] IMA: Add KEY_CHECK func to measure keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 0/3] KEYS: Measure keys when they are created or updated
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 0/3] KEYS: Measure keys when they are created or updated
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 2/3] IMA: Define an IMA hook to measure keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 2/3] IMA: Define an IMA hook to measure keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 2/3] IMA: Define an IMA hook to measure keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 1/3] IMA: Add KEY_CHECK func to measure keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 1/3] IMA: Add KEY_CHECK func to measure keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 1/3] IMA: Add KEY_CHECK func to measure keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 3/3] KEYS: Call the IMA hook to measure keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 2/3] IMA: Define an IMA hook to measure keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v6 1/3] IMA: Add KEY_CHECK func to measure keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 2/3] IMA: Define an IMA hook to measure keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 3/3] KEYS: Call the IMA hook to measure keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 0/3] KEYS: Measure keys when they are created or updated
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: One question about trusted key of keyring in Linux kernel.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] tpm: move TPM_CHIP_FLAG_HAVE_TIMEOUTS check
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] ima: avoid appraise error for hash calc interrupt
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- [PATCH 14/25] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 12/25] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 11/25] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 10/25] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 09/25] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3] tpm_tis: turn on TPM before calling tpm_get_timeouts
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: question about setting TPM_CHIP_FLAG_IRQ in tpm_tis_core_init
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: turn on TPM before calling tpm_get_timeouts
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: turn on TPM before calling tpm_get_timeouts
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] tpm_tis: turn on TPM before calling tpm_get_timeouts
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: turn on TPM before calling tpm_get_timeouts
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [PATCH] tpm_tis: Move setting of TPM_CHIP_FLAG_IRQ into tpm_tis_probe_irq_single
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: turn on TPM before calling tpm_get_timeouts
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] tpm_tis: turn on TPM before calling tpm_get_timeouts
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v1 2/5] char: tpm: Add check_data handle to tpm_tis_phy_ops in order to check data integrity
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: question about setting TPM_CHIP_FLAG_IRQ in tpm_tis_core_init
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: question about setting TPM_CHIP_FLAG_IRQ in tpm_tis_core_init
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: question about setting TPM_CHIP_FLAG_IRQ in tpm_tis_core_init
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: turn on TPM before calling tpm_get_timeouts
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for Linux v5.5
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [GIT PULL] tpmdd updates for Linux v5.5
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: PROBLEM: TPM bug causes suspend to turn off device
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] ima: avoid appraise error for hash calc interrupt
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 04/10] IMA: Updated IMA policy functions to return keyrings option read from the policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 02/10] IMA: Added keyrings= option in IMA policy to only measure keys added to the specified keyrings.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 0/10] KEYS: Measure keys when they are created or updated
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 04/10] IMA: Updated IMA policy functions to return keyrings option read from the policy
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 02/10] IMA: Added keyrings= option in IMA policy to only measure keys added to the specified keyrings.
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 01/10] IMA: Added KEYRING_CHECK func in IMA policy to measure keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] ima: avoid appraise error for hash calc interrupt
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] ima: avoid appraise error for hash calc interrupt
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 0/10] KEYS: Measure keys when they are created or updated
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 04/10] IMA: Updated IMA policy functions to return keyrings option read from the policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 02/10] IMA: Added keyrings= option in IMA policy to only measure keys added to the specified keyrings.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 01/10] IMA: Added KEYRING_CHECK func in IMA policy to measure keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: question about setting TPM_CHIP_FLAG_IRQ in tpm_tis_core_init
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: question about setting TPM_CHIP_FLAG_IRQ in tpm_tis_core_init
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: question about setting TPM_CHIP_FLAG_IRQ in tpm_tis_core_init
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- question about setting TPM_CHIP_FLAG_IRQ in tpm_tis_core_init
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v1 3/5] char: tpm: rewrite "tpm_tis_req_canceled()"
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v9 0/4] powerpc: expose secure variables to the kernel and userspace
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- [PATCH v2] tpm_tis: turn on TPM before calling tpm_get_timeouts
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [PATCH] tpm_tis: turn on TPM before calling tpm_get_timeouts
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: PROBLEM: TPM bug causes suspend to turn off device
- From: "Christian Bundy" <christianbundy@xxxxxxxxxxx>
- Re: [PATCH v9 0/4] powerpc: expose secure variables to the kernel and userspace
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] ima: avoid appraise error for hash calc interrupt
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: PROBLEM: TPM bug causes suspend to turn off device
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v5 0/10] KEYS: Measure keys when they are created or updated
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 03/10] IMA: Read keyrings= option from the IMA policy into ima_rule_entry
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 0/10] KEYS: Measure keys when they are created or updated
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 01/10] IMA: Added KEYRING_CHECK func in IMA policy to measure keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 02/10] IMA: Added keyrings= option in IMA policy to only measure keys added to the specified keyrings.
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 05/10] IMA: Measure key if the IMA policy allows measurement for the keyring to which the key is linked to
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 06/10] IMA: Defined an IMA hook to measure keys on key create or update
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 08/10] IMA: Added a flag to determine whether IMA hook can process the key now or has to queue for processing later
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 04/10] IMA: Updated IMA policy functions to return keyrings option read from the policy
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 07/10] KEYS: Call the IMA hook to measure key when a new key is created or an existing key is updated
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 09/10] IMA: Defined functions to queue and dequeue keys for measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 10/10] IMA: Call queue and dequeue functions to measure keys.
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH] ima: avoid appraise error for hash calc interrupt
- From: Patrick Callaghan <patrickc@xxxxxxxxxxxxx>
- [PATCH v9 4/4] powerpc: load firmware trusted keys/hashes into kernel keyring
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v9 2/4] powerpc: expose secure variables to userspace via sysfs
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v9 3/4] x86/efi: move common keyring handler functions to new file
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v9 1/4] powerpc/powernv: Add OPAL API interface to access secure variable
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v9 0/4] powerpc: expose secure variables to the kernel and userspace
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [PATCH v1 3/5] char: tpm: rewrite "tpm_tis_req_canceled()"
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [PATCH v1 5/5] char: tpm: add tpm_tis_i2c driver
- From: amirmizi6@xxxxxxxxx
- [PATCH v1 2/5] char: tpm: Add check_data handle to tpm_tis_phy_ops in order to check data integrity
- From: amirmizi6@xxxxxxxxx
- [PATCH v1 1/5] char: tpm: Make implementation of read16 read32 write32 optional
- From: amirmizi6@xxxxxxxxx
- [PATCH v1 4/5] dt-bindings: tpm: Add the TPM TIS I2C device tree binding documentaion
- From: amirmizi6@xxxxxxxxx
- [PATCH v1 3/5] char: tpm: rewrite "tpm_tis_req_canceled()"
- From: amirmizi6@xxxxxxxxx
- [PATCH v1 0/5] add tpm i2c ptp driver
- From: amirmizi6@xxxxxxxxx
- Re: PROBLEM: TPM bug causes suspend to turn off device
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [PATCH v8 4/4] powerpc: load firmware trusted keys/hashes into kernel keyring
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v8 3/4] x86/efi: move common keyring handler functions to new file
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v8 2/4] powerpc: expose secure variables to userspace via sysfs
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v8 1/4] powerpc/powernv: Add OPAL API interface to access secure variable
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v8 0/4] powerpc: expose secure variables to the kernel and userspace
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- PROBLEM: TPM bug causes suspend to turn off device
- From: "Christian Bundy" <christianbundy@xxxxxxxxxxx>
- Re: [PATCH v7 4/4] powerpc: load firmware trusted keys/hashes into kernel keyring
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v4 01/10] IMA: Defined an IMA hook to measure keys on key create or update
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 01/10] IMA: Defined an IMA hook to measure keys on key create or update
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 01/10] IMA: Defined an IMA hook to measure keys on key create or update
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: remove tpm_dev_wq_lock
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: remove tpm_dev_wq_lock
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH v7 2/4] powerpc: expose secure variables to userspace via sysfs
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 0/4] powerpc: expose secure variables to the kernel and userspace
- From: Eric Richter <erichte@xxxxxxxxxxxxx>
- [PATCH v7 4/4] powerpc: load firmware trusted keys/hashes into kernel keyring
- From: Eric Richter <erichte@xxxxxxxxxxxxx>
- [PATCH v7 3/4] x86/efi: move common keyring handler functions to new file
- From: Eric Richter <erichte@xxxxxxxxxxxxx>
- [PATCH v7 2/4] powerpc: expose secure variables to userspace via sysfs
- From: Eric Richter <erichte@xxxxxxxxxxxxx>
- [PATCH v7 1/4] powerpc/powernv: Add OPAL API interface to access secure variable
- From: Eric Richter <erichte@xxxxxxxxxxxxx>
- Re: [PATCH v4 01/10] IMA: Defined an IMA hook to measure keys on key create or update
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 08/10] IMA: Defined functions to queue and dequeue keys for measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 01/10] IMA: Defined an IMA hook to measure keys on key create or update
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 08/10] IMA: Defined functions to queue and dequeue keys for measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 01/10] IMA: Defined an IMA hook to measure keys on key create or update
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 08/10] IMA: Defined functions to queue and dequeue keys for measurement
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Mail to David Howells @ redhat bounced
- From: Patrick Uiterwijk <puiterwijk@xxxxxxxxxx>
- Mail to David Howells @ redhat bounced
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 03/10] IMA: Added keyrings= option in IMA policy to only measure keys added to the specified keyrings.
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 02/10] IMA: Added KEYRING_CHECK func in IMA policy to measure keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 06/10] IMA: Measure key if the IMA policy allows measurement for the keyring to which the key is linked to
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 10/10] KEYS: Call the IMA hook to measure key when a new key is created or an existing key is updated
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 07/10] IMA: Added a boolean flag to track IMA initialization status
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 08/10] IMA: Defined functions to queue and dequeue keys for measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 09/10] IMA: Call queue and dequeue functions to measure keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 05/10] IMA: Updated IMA policy functions to return keyrings option read from the policy
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 04/10] IMA: Read keyrings= option from the IMA policy into ima_rule_entry
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 0/10] KEYS: Measure keys when they are created or updated
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 01/10] IMA: Defined an IMA hook to measure keys on key create or update
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 2/4] powerpc: expose secure variables to userspace via sysfs
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 1/4] powerpc/powernv: Add OPAL API interface to access secure variable
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10a 3/9] powerpc: detect the trusted boot state of the system
- From: Eric Richter <erichte@xxxxxxxxxxxxx>
- [PATCH v10a 1/9] powerpc: detect the secure boot mode of the system
- From: Eric Richter <erichte@xxxxxxxxxxxxx>
- [PATCH v6 2/4] powerpc: expose secure variables to userspace via sysfs
- From: Eric Richter <erichte@xxxxxxxxxxxxx>
- [PATCH v6 3/4] x86/efi: move common keyring handler functions to new file
- From: Eric Richter <erichte@xxxxxxxxxxxxx>
- [PATCH v6 4/4] powerpc: load firmware trusted keys/hashes into kernel keyring
- From: Eric Richter <erichte@xxxxxxxxxxxxx>
- [PATCH v6 1/4] powerpc/powernv: Add OPAL API interface to access secure variable
- From: Eric Richter <erichte@xxxxxxxxxxxxx>
- [PATCH v6 0/4] powerpc: expose secure variables to the kernel and userspace
- From: Eric Richter <erichte@xxxxxxxxxxxxx>
- Re: [PATCH v10 1/9] powerpc: detect the secure boot mode of the system
- From: Eric Richter <erichte@xxxxxxxxxxxxx>
- [PATCH 4.4 16/46] efi/x86: Do not clean dummy variable in kexec path
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.4 15/46] efi/cper: Fix endianness of PCIe class code
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.9 21/62] efi/cper: Fix endianness of PCIe class code
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.14 41/95] efi/cper: Fix endianness of PCIe class code
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.14 42/95] efi/x86: Do not clean dummy variable in kexec path
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.3 051/163] efi/cper: Fix endianness of PCIe class code
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.3 052/163] efi/x86: Do not clean dummy variable in kexec path
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.19 081/149] efi/cper: Fix endianness of PCIe class code
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.19 082/149] efi/x86: Do not clean dummy variable in kexec path
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.9 22/62] efi/x86: Do not clean dummy variable in kexec path
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [Patch v3 6/7] doc: keys: Document usage of TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: remove tpm_dev_wq_lock
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] tpm: remove tpm_dev_wq_lock
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: remove tpm_dev_wq_lock
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] tpm: remove tpm_dev_wq_lock
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [Patch v3 6/7] doc: keys: Document usage of TEE based Trusted Keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [Patch v3 6/7] doc: keys: Document usage of TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [Patch v3 6/7] doc: keys: Document usage of TEE based Trusted Keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [Patch v3 6/7] doc: keys: Document usage of TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4] tpm: Add tpm_version_major sysfs file
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Add major_version sysfs file
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 5/9] ima: make process_buffer_measurement() generic
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 5/9] ima: make process_buffer_measurement() generic
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/9] KEYS: Defined an IMA hook to measure keys on key create or update
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/9] KEYS: Defined an IMA hook to measure keys on key create or update
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/9] KEYS: Defined an IMA hook to measure keys on key create or update
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v3 1/9] KEYS: Defined an IMA hook to measure keys on key create or update
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/9] KEYS: Defined an IMA hook to measure keys on key create or update
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v3 2/9] KEYS: Defined functions to queue and dequeue keys for measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/9] KEYS: Defined an IMA hook to measure keys on key create or update
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [Patch v3 7/7] MAINTAINERS: Add entry for TEE based Trusted Keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [Patch v3 6/7] doc: keys: Document usage of TEE based Trusted Keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [Patch v3 5/7] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [Patch v3 4/7] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [Patch v3 3/7] tee: add private login method for kernel clients
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [Patch v3 2/7] tee: enable support to register kernel memory
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [Patch v3 1/7] tee: optee: allow kernel pages to register as shm
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [Patch v3 0/7] Introduce TEE based Trusted Keys support
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v3 2/9] KEYS: Defined functions to queue and dequeue keys for measurement
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 4/9] KEYS: Updated IMA policy functions for handling key measurement
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 3/9] KEYS: Added KEYRING_CHECK policy for key measurement
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/9] KEYS: Defined an IMA hook to measure keys on key create or update
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/9] KEYS: Defined an IMA hook to measure keys on key create or update
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v4] tpm: Add tpm_version_major sysfs file
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] x86/ima: update IMA arch policy to support appended signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v10 5/9] ima: make process_buffer_measurement() generic
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v10 7/9] ima: check against blacklisted hashes for files with modsig
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v10 6/9] certs: add wrapper function to check blacklisted binary hash
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v10 3/9] powerpc: detect the trusted boot state of the system
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v10 2/9] powerpc/ima: add support to initialize ima policy rules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v10 1/9] powerpc: detect the secure boot mode of the system
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC PATCH v10 9/9] powerpc/ima: indicate kernel modules appended signatures are enforced
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v10 8/9] powerpc/ima: update ima arch policy to check for blacklist
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v10 4/9] powerpc/ima: define trusted boot policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v10 0/9] powerpc: Enabling IMA arch specific secure boot policies
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 4/9] KEYS: Updated IMA policy functions for handling key measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 2/9] KEYS: Defined functions to queue and dequeue keys for measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 3/9] KEYS: Added KEYRING_CHECK policy for key measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 9/9] KEYS: Call the IMA hook to measure key when a new key is created or an existing key is updated
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 7/9] KEYS: Queue key for measurement if IMA is not yet initialized. Measure queued keys when IMA initialization is completed
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 8/9] KEYS: Added a boolean flag for IMA initialization status.
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 6/9] KEYS: Measure key if the IMA policy allows measurement for the given keyring
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 5/9] KEYS: Updated ima_get_action() to return keyrings if specified in the policy
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 0/9] KEYS: Measure keys when they are created or updated
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 1/9] KEYS: Defined an IMA hook to measure keys on key create or update
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4] tpm: Add tpm_version_major sysfs file
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v9 5/8] ima: make process_buffer_measurement() generic
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 5/8] ima: make process_buffer_measurement() generic
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Add major_version sysfs file
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v2] tpm: Add major_version sysfs file
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Add major_version sysfs file
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Add major_version sysfs file
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Add major_version sysfs file
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v1] selftest/trustedkeys: TPM 1.2 trusted keys test
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v1] selftest/trustedkeys: TPM 1.2 trusted keys test
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v1] selftest/trustedkeys: TPM 1.2 trusted keys test
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Add major_version sysfs file
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v1] selftest/trustedkeys: TPM 1.2 trusted keys test
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add major_version sysfs file
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 2/8] powerpc/ima: add support to initialize ima policy rules
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Add major_version sysfs file
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] tpm: Update mailing list contact information in sysfs-class-tpm
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Add major_version sysfs file
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [LTP] [PATCH] ima: skip verifying TPM 2.0 PCR values
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Switch to platform_get_irq_optional()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Switch to platform_get_irq_optional()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v1] selftest/trustedkeys: TPM 1.2 trusted keys test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v1] selftest/trustedkeys: TPM 1.2 trusted keys test
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v1] selftest/trustedkeys: TPM 1.2 trusted keys test
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v1] selftest/trustedkeys: TPM 1.2 trusted keys test
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: remove tpm_dev_wq_lock
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: remove tpm_dev_wq_lock
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] KEYS: Added BUILTIN_TRUSTED_KEYS enum to measure keys added to builtin_trusted_keys keyring
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] KEYS: Added BUILTIN_TRUSTED_KEYS enum to measure keys added to builtin_trusted_keys keyring
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] KEYS: Added BUILTIN_TRUSTED_KEYS enum to measure keys added to builtin_trusted_keys keyring
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] KEYS: Defined an ima hook for measuring keys on key create or update
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 0/8] powerpc: Enabling IMA arch specific secure boot policies
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 2/8] powerpc/ima: add support to initialize ima policy rules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add major_version sysfs file
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] tpm: Add major_version sysfs file
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH v3] tpm: Add version_major sysfs file
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] tpm: Add major_version sysfs file
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] KEYS: Defined an ima hook for measuring keys on key create or update
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] KEYS: Added BUILTIN_TRUSTED_KEYS enum to measure keys added to builtin_trusted_keys keyring
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 5/8] ima: make process_buffer_measurement() generic
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 2/8] powerpc/ima: add support to initialize ima policy rules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] KEYS: Defined an ima hook for measuring keys on key create or update
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] KEYS: Defined an ima hook for measuring keys on key create or update
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add major_version sysfs file
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] KEYS: Defined an ima hook for measuring keys on key create or update
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] tpm: Update mailing list contact information in sysfs-class-tpm
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] tpm: Add major_version sysfs file
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH v2] tpm: Add major_version sysfs file
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] tpm: Add major_version sysfs file
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add major_version sysfs file
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] tpm: Add major_version sysfs file
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 2/8] powerpc/ima: add support to initialize ima policy rules
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V4 0/2] Add support for arm64 to carry ima measurement
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 7/8] ima: check against blacklisted hashes for files with modsig
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 5/8] ima: make process_buffer_measurement() generic
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 5/8] ima: make process_buffer_measurement() generic
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH V4 0/2] Add support for arm64 to carry ima measurement
- From: James Morse <james.morse@xxxxxxx>
- Re: [PATCH V4 0/2] Add support for arm64 to carry ima measurement
- From: James Morse <james.morse@xxxxxxx>
- Re: [PATCH v9 2/8] powerpc/ima: add support to initialize ima policy rules
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 3/8] powerpc: detect the trusted boot state of the system
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 1/8] powerpc: detect the secure boot mode of the system
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] powerpc: load firmware trusted keys/hashes into kernel keyring
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/4] powerpc: expose secure variables to userspace via sysfs
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/4] powerpc/powernv: Add OPAL API interface to access secure variable
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Tests to run to validate ima related changes
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH] tpm: Add major_version sysfs file
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [LTP] [PATCH] ima: skip verifying TPM 2.0 PCR values
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v8] tpm_crb: fix fTPM on AMD Zen+ CPUs
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Switch to platform_get_irq_optional()
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [LTP] [PATCH] ima: skip verifying TPM 2.0 PCR values
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [LTP] [PATCH] ima: skip verifying TPM 2.0 PCR values
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [LTP] [PATCH] ima: skip verifying TPM 2.0 PCR values
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [PATCH v2] tpm: Switch to platform_get_irq_optional()
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH] tpm: Switch to platform_get_irq_optional()
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [LTP] [PATCH] ima: skip verifying TPM 2.0 PCR values
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [LTP] [PATCH] ima: skip verifying TPM 2.0 PCR values
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [PATCH v5 4/4] powerpc: load firmware trusted keys/hashes into kernel keyring
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v5 1/4] powerpc/powernv: Add OPAL API interface to access secure variable
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v5 3/4] x86/efi: move common keyring handler functions to new file
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v5 2/4] powerpc: expose secure variables to userspace via sysfs
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v5 0/4] powerpc: expose secure variables to the kernel and userspace
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [LTP] [PATCH] ima: skip verifying TPM 2.0 PCR values
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [LTP] [PATCH] ima: skip verifying TPM 2.0 PCR values
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [LTP] [PATCH] ima: skip verifying TPM 2.0 PCR values
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- IMA test information
- From: Prakhar Srivastava <prsriva@xxxxxxxxxxxxxxxxxxx>
- Re: [LTP] [PATCH] ima: skip verifying TPM 2.0 PCR values
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v1] selftest/trustedkeys: TPM 1.2 trusted keys test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8] tpm_crb: fix fTPM on AMD Zen+ CPUs
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v1] selftest/trustedkeys: TPM 1.2 trusted keys test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [LTP] [PATCH] ima: skip verifying TPM 2.0 PCR values
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Switch to platform_get_irq_optional()
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] tpm: Switch to platform_get_irq_optional()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v8] tpm_crb: fix fTPM on AMD Zen+ CPUs
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [LTP] [PATCH] ima: skip verifying TPM 2.0 PCR values
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v9 7/8] ima: check against blacklisted hashes for files with modsig
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 4/8] powerpc/ima: define trusted boot policy
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 3/8] powerpc: detect the trusted boot state of the system
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 2/8] powerpc/ima: add support to initialize ima policy rules
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 1/8] powerpc: detect the secure boot mode of the system
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [LTP] [PATCH] ima: skip verifying TPM 2.0 PCR values
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v8] tpm_crb: fix fTPM on AMD Zen+ CPUs
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] tpm: Switch to platform_get_irq_optional()
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v9 5/8] ima: make process_buffer_measurement() generic
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Switch to platform_get_irq_optional()
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH] tpm: Switch to platform_get_irq_optional()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [LTP] [PATCH] ima: skip verifying TPM 2.0 PCR values
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v9 8/8] powerpc/ima: update ima arch policy to check for blacklist
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v9 7/8] ima: check against blacklisted hashes for files with modsig
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v9 5/8] ima: make process_buffer_measurement() generic
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v9 6/8] certs: add wrapper function to check blacklisted binary hash
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v9 4/8] powerpc/ima: define trusted boot policy
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v9 3/8] powerpc: detect the trusted boot state of the system
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v9 2/8] powerpc/ima: add support to initialize ima policy rules
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v9 1/8] powerpc: detect the secure boot mode of the system
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v9 0/8] powerpc: Enabling IMA arch specific secure boot policies
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Measure ima policy
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/4] KEYS: measure keys when they are created or updated
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/4] KEYS: Queue key for measurement if ima is not initialized. Measure queued keys when ima is initialized
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 3/4] KEYS: Added BUILTIN_TRUSTED_KEYS enum to measure keys added to builtin_trusted_keys keyring
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 4/4] KEYS: Enabled ima policy to measure keys added to builtin_trusted_keys keyring
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 1/4] KEYS: Defined an ima hook for measuring keys on key create or update
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8] tpm_crb: fix fTPM on AMD Zen+ CPUs
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v1 5/6] KEYS: measure queued keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v1 6/6] KEYS: measure keys when they are created or updated
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v1 5/6] KEYS: measure queued keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v1 5/6] KEYS: measure queued keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 3/6] KEYS: ima hook to measure builtin_trusted_keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v1 3/6] KEYS: ima hook to measure builtin_trusted_keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Switch to platform_get_irq_optional()
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH] ima-evm-utils: add support for tpm2-tools to read the TPM 2.0 PCRs
- From: Patrick Uiterwijk <patrick@xxxxxxxxxxxxxx>
- Re: [PATCH v1 5/6] KEYS: measure queued keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v1 3/6] KEYS: ima hook to measure builtin_trusted_keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v1 2/6] KEYS: ima: Refactored process_buffer_measurement function so that it can measure any buffer (and not just KEXEC_CMDLINE one)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8] tpm_crb: fix fTPM on AMD Zen+ CPUs
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [Patch v8 0/4] Create and consolidate trusted keys subsystem
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [Patch v8 0/4] Create and consolidate trusted keys subsystem
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Switch to platform_get_irq_optional()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Switch to platform_get_irq_optional()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v1 2/6] KEYS: ima: Refactored process_buffer_measurement function so that it can measure any buffer (and not just KEXEC_CMDLINE one)
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v1 3/6] KEYS: ima hook to measure builtin_trusted_keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v1 6/6] KEYS: measure keys when they are created or updated
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v1 0/6] KEYS: measure keys when they are created or updated
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v1 5/6] KEYS: measure queued keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v1 4/6] KEYS: ima functions to queue and dequeue keys to measure
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v1 1/6] KEYS: Helper function to check if the given keyring is builtin_trusted_keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 3/8] powerpc: detect the trusted boot state of the system
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v8 1/8] powerpc: detect the secure boot mode of the system
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH] selftest/trustedkeys: TPM 1.2 trusted keys test
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [bug report] tpm: add support for nonblocking operation
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH V4 0/2] Add support for arm64 to carry ima measurement
- From: prsriva <prsriva@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8] tpm_crb: fix fTPM on AMD Zen+ CPUs
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Switch to platform_get_irq_optional()
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH] tpm: Switch to platform_get_irq_optional()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Switch to platform_get_irq_optional()
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 7/8] ima: check against blacklisted hashes for files with modsig
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [PATCH v8 7/8] ima: check against blacklisted hashes for files with modsig
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 3/8] powerpc: detect the trusted boot state of the system
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 5/8] ima: make process_buffer_measurement() generic
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 7/8] ima: check against blacklisted hashes for files with modsig
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 2/8] powerpc/ima: add support to initialize ima policy rules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 4/8] powerpc/ima: add measurement rules to ima arch specific policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 7/8] ima: check against blacklisted hashes for files with modsig
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 4/8] powerpc/ima: add measurement rules to ima arch specific policy
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v0 1/1] ima: Refactor process_buffer_measurement() to make it generic
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v8 8/8] powerpc/ima: update ima arch policy to check for blacklist
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v8 7/8] ima: check against blacklisted hashes for files with modsig
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v8 6/8] certs: add wrapper function to check blacklisted binary hash
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v8 5/8] ima: make process_buffer_measurement() generic
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v8 4/8] powerpc/ima: add measurement rules to ima arch specific policy
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v8 3/8] powerpc: detect the trusted boot state of the system
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v8 2/8] powerpc/ima: add support to initialize ima policy rules
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v8 0/8] powerpc: Enabling IMA arch specific secure boot policies
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v8 1/8] powerpc: detect the secure boot mode of the system
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH] tpm: Switch to platform_get_irq_optional()
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH AUTOSEL 5.3 48/89] efi/cper: Fix endianness of PCIe class code
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.3 49/89] efi/x86: Do not clean dummy variable in kexec path
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 075/100] efi/cper: Fix endianness of PCIe class code
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 076/100] efi/x86: Do not clean dummy variable in kexec path
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 38/56] efi/x86: Do not clean dummy variable in kexec path
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 18/29] efi/x86: Do not clean dummy variable in kexec path
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.4 12/21] efi/cper: Fix endianness of PCIe class code
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.4 13/21] efi/x86: Do not clean dummy variable in kexec path
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 17/29] efi/cper: Fix endianness of PCIe class code
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 37/56] efi/cper: Fix endianness of PCIe class code
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v0] KEYS: Security LSM Hook for key_create_or_update
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v0] KEYS: Security LSM Hook for key_create_or_update
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v0] KEYS: Security LSM Hook for key_create_or_update
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: [PATCH v3] tpm/tpm_ftpm_tee: add shutdown call back
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] tpm/tpm_ftpm_tee: add shutdown call back
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Salt tpm_get_random() result with get_random_bytes()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 2/8] powerpc: add support to initialize ima policy rules
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v3] x86, efi: never relocate kernel below lowest acceptable address
- From: Joe Perches <joe@xxxxxxxxxxx>
- [PATCH 4.14 43/65] efivar/ssdt: Dont iterate over EFI vars if no SSDT override was specified
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.19 49/81] efivar/ssdt: Dont iterate over EFI vars if no SSDT override was specified
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.3 063/112] efi/tpm: Dont access event->count when it isnt mapped
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.3 064/112] efi/tpm: Dont traverse an event log with no events
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.3 065/112] efi/tpm: Only set efi_tpm_final_log_size after successful event log parsing
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.3 062/112] efivar/ssdt: Dont iterate over EFI vars if no SSDT override was specified
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.9 76/92] efivar/ssdt: Dont iterate over EFI vars if no SSDT override was specified
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v8] tpm_crb: fix fTPM on AMD Zen+ CPUs
- From: ivan.lazeev@xxxxxxxxx
- Re: [PATCH v3] x86, efi: never relocate kernel below lowest acceptable address
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH v0 1/1] KEYS: LSM Hook for key_create_or_update
- From: James Morris <jamorris@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm/tpm_ftpm_tee: add shutdown call back
- From: Pavel Tatashin <pasha.tatashin@xxxxxxxxxx>
- [PATCH v3] tpm/tpm_ftpm_tee: add shutdown call back
- From: Pavel Tatashin <pasha.tatashin@xxxxxxxxxx>
- Re: [PATCH v3] x86, efi: never relocate kernel below lowest acceptable address
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Salt tpm_get_random() result with get_random_bytes()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Salt tpm_get_random() result with get_random_bytes()
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v3] x86, efi: never relocate kernel below lowest acceptable address
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v7 0/6] tpm: Add driver for cr50
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] x86, efi: never relocate kernel below lowest acceptable address
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH v3] x86, efi: never relocate kernel below lowest acceptable address
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm/tpm_ftpm_tee: add shutdown call back
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v0 1/1] KEYS: LSM Hook for key_create_or_update
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Salt tpm_get_random() result with get_random_bytes()
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] efi/tpm: return -EINVAL when determining tpm final events log size fails
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Salt tpm_get_random() result with get_random_bytes()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Salt tpm_get_random() result with get_random_bytes()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Salt tpm_get_random() result with get_random_bytes()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Salt tpm_get_random() result with get_random_bytes()
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- [Patch v8 4/4] KEYS: trusted: Move TPM2 trusted keys code
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [Patch v8 3/4] KEYS: trusted: Create trusted keys subsystem
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [Patch v8 2/4] KEYS: Use common tpm_buf for trusted and asymmetric keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [Patch v8 1/4] tpm: Move tpm_buf code to include/linux/
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [Patch v8 0/4] Create and consolidate trusted keys subsystem
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH V4 0/2] Add support for arm64 to carry ima measurement
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v0 1/1] KEYS: LSM Hook for key_create_or_update
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v0 1/1] KEYS: LSM Hook for key_create_or_update
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v0 0/1] KEYS: LSM Hook for key_create_or_update
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V4 0/2] Add support for arm64 to carry ima measurement
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH v0 0/1] ima: Refactor process_buffer_measurement() to make it generic
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v0 1/1] ima: Refactor process_buffer_measurement() to make it generic
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 0/6] tpm: Add driver for cr50
- From: Heiko Stuebner <heiko@xxxxxxxxx>
- Re: [PATCH V4 0/2] Add support for arm64 to carry ima measurement
- From: Pavel Tatashin <pasha.tatashin@xxxxxxxxxx>
- Re: [PATCH V4 0/2] Add support for arm64 to carry ima measurement
- From: James Morse <james.morse@xxxxxxx>
- Re: [PATCH] tpm: Salt tpm_get_random() result with get_random_bytes()
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH] tpm: Salt tpm_get_random() result with get_random_bytes()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 1/8] powerpc: detect the secure boot mode of the system
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v7 2/8] powerpc: add support to initialize ima policy rules
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v7 4/8] powerpc/ima: add measurement rules to ima arch specific policy
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v7 3/8] powerpc: detect the trusted boot state of the system
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v7 2/8] powerpc: add support to initialize ima policy rules
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v4 2/4] powerpc: expose secure variables to userspace via sysfs
- From: "Oliver O'Halloran" <oohall@xxxxxxxxx>
- Re: [Patch v7 0/4] Create and consolidate trusted keys subsystem
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [Patch v7 0/4] Create and consolidate trusted keys subsystem
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v4 1/4] powerpc/powernv: Add OPAL API interface to access secure variable
- From: "Oliver O'Halloran" <oohall@xxxxxxxxx>
- Re: [PATCH V4 0/2] Add support for arm64 to carry ima measurement
- From: prsriva <prsriva@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] x86, efi: never relocate kernel below lowest acceptable address
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v2] tpm/tpm_ftpm_tee: add shutdown call back
- From: Pavel Tatashin <pasha.tatashin@xxxxxxxxxx>
- Re: [PATCH v3] x86, efi: never relocate kernel below lowest acceptable address
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] ftpm: add shutdown call back
- From: Pavel Tatashin <pasha.tatashin@xxxxxxxxxx>
- Re: [Patch v7 0/4] Create and consolidate trusted keys subsystem
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] ftpm: add shutdown call back
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] selftest/trustedkeys: TPM 1.2 trusted keys test
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 0/6] tpm: Add driver for cr50
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: remove tpm_dev_wq_lock
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: use GFP kernel for tpm_buf allocations
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [Patch v7 0/4] Create and consolidate trusted keys subsystem
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: use GFP kernel for tpm_buf allocations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6] tpm_crb: fix fTPM on AMD Zen+ CPUs
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH V4 0/2] Add support for arm64 to carry ima measurement
- From: James Morse <james.morse@xxxxxxx>
- [PATCH] efi/tpm: return -EINVAL when determining tpm final events log size fails
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v0 1/2] KEYS: Measure keys added to builtin or secondary trusted keys keyring
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/3] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 3/3] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6] tpm_crb: fix fTPM on AMD Zen+ CPUs
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v7] tpm_crb: fix fTPM on AMD Zen+ CPUs
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v0 1/2] KEYS: Measure keys added to builtin or secondary trusted keys keyring
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v0 2/2] KEYS: LSM Hook for key_create_or_update
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v0 1/2] KEYS: Measure keys added to builtin or secondary trusted keys keyring
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [Patch v7 2/4] KEYS: Use common tpm_buf for trusted and asymmetric keys
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [Patch v7 1/4] tpm: Move tpm_buf code to include/linux/
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [Patch v7 0/4] Create and consolidate trusted keys subsystem
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [PATCH v0 2/2] KEYS: LSM Hook for key_create_or_update
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v0 1/2] KEYS: Measure keys added to builtin or secondary trusted keys keyring
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v0 0/2] KEYS: Measure keys added to builtin or secondary trusted keys keyring
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: Use GFP_KERNEL for allocating struct tpm_buf
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- [PATCH v2] tpm: use GFP kernel for tpm_buf allocations
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] ftpm: add shutdown call back
- From: Pavel Tatashin <pasha.tatashin@xxxxxxxxxx>
- Re: [PATCH] selftest/trustedkeys: TPM 1.2 trusted keys test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 7/8] ima: check against blacklisted hashes for files with modsig
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 8/8] powerpc/ima: update ima arch policy to check for blacklist
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 6/8] certs: add wrapper function to check blacklisted binary hash
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 5/8] ima: make process_buffer_measurement() generic
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 2/8] powerpc: add support to initialize ima policy rules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] selftest/trustedkeys: TPM 1.2 trusted keys test
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [Patch v7 0/4] Create and consolidate trusted keys subsystem
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] selftest/trustedkeys: TPM 1.2 trusted keys test
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [Patch v7 4/4] KEYS: trusted: Move TPM2 trusted keys code
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [Patch v7 2/4] KEYS: Use common tpm_buf for trusted and asymmetric keys
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [Patch v7 1/4] tpm: Move tpm_buf code to include/linux/
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 0/6] tpm: Add driver for cr50
- From: Heiko Stübner <heiko@xxxxxxxxx>
- [PATCH V4 2/2] update powerpc implementation to call into of_ima*
- From: Prakhar Srivastava <prsriva@xxxxxxxxxxxxxxxxxxx>
- [PATCH V4 1/2] Add support for arm64 to carry ima measurement log in kexec_file_load
- From: Prakhar Srivastava <prsriva@xxxxxxxxxxxxxxxxxxx>
- [PATCH V4 0/2] Add support for arm64 to carry ima measurement
- From: Prakhar Srivastava <prsriva@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: remove tpm_dev_wq_lock
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH v4 0/3] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 3/3] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/3] tpm: use tpm_try_get_ops() in tpm-sysfs.c.
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/3] tpm: migrate pubek_show to struct tpm_buf
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 2/2] update powerpc implementation to call into of_ima*
- From: Prakhar Srivastava <prsriva@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 1/2] Add support for arm64 to carry ima measurement log in kexec_file_load
- From: Prakhar Srivastava <prsriva@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 0/2] Add support for arm64 to carry ima measurement log in kexec_file_load
- From: Prakhar Srivastava <prsriva@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: Use GFP_KERNEL for allocating struct tpm_buf
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v4 3/3] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v4 2/3] tpm: use tpm_try_get_ops() in tpm-sysfs.c.
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v4 1/3] tpm: migrate pubek_show to struct tpm_buf
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v4 0/3] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] Add support for arm64 to carry ima measurement log in kexec_file_load
- From: prsriva <prsriva@xxxxxxxxxxxxxxxxxxx>
- [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: "Safford, David (GE Global Research, US)" <david.safford@xxxxxx>
- RE: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- RE: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- RE: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: add check after commands attribs tab allocation
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: Use GFP_KERNEL for allocating struct tpm_buf
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v7] tpm_crb: fix fTPM on AMD Zen+ CPUs
- From: ivan.lazeev@xxxxxxxxx
- Re: [PATCH v2 1/2] Add support for arm64 to carry ima measurement log in kexec_file_load
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v6 3/9] powerpc: add support to initialize ima policy rules
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v7 8/8] powerpc/ima: update ima arch policy to check for blacklist
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v7 5/8] ima: make process_buffer_measurement() generic
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v7 7/8] ima: check against blacklisted hashes for files with modsig
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v7 6/8] certs: add wrapper function to check blacklisted binary hash
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v7 4/8] powerpc/ima: add measurement rules to ima arch specific policy
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v7 3/8] powerpc: detect the trusted boot state of the system
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v7 2/8] powerpc: add support to initialize ima policy rules
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v7 1/8] powerpc: detect the secure boot mode of the system
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v7 0/8] powerpc: Enabling IMA arch specific secure boot policies
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: add check after commands attribs tab allocation
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: Use GFP_KERNEL for allocating struct tpm_buf
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- [PATCH] tpm: add check after commands attribs tab allocation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: Use GFP_KERNEL for allocating struct tpm_buf
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- [PATCH v2 1/2] Add support for arm64 to carry ima measurement log in kexec_file_load
- From: Prakhar Srivastava <prsriva@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/2] update powerpc implementation to call into of_ima*
- From: Prakhar Srivastava <prsriva@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/2] Add support to carry ima measurement log in kexec_file_load
- From: Prakhar Srivastava <prsriva@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 0/1] KEYS: Measure keys in trusted keyring
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [tip: efi/urgent] efi/cper: Fix endianness of PCIe class code
- From: "tip-bot2 for Lukas Wunner" <tip-bot2@xxxxxxxxxxxxx>
- [tip: efi/urgent] efi: Make unexported efi_rci2_sysfs_init() static
- From: "tip-bot2 for Ben Dooks" <tip-bot2@xxxxxxxxxxxxx>
- [tip: efi/urgent] efivar/ssdt: Don't iterate over EFI vars if no SSDT override was specified
- From: "tip-bot2 for Ard Biesheuvel" <tip-bot2@xxxxxxxxxxxxx>
- [tip: efi/urgent] efi/tpm: Only set 'efi_tpm_final_log_size' after successful event log parsing
- From: "tip-bot2 for Jerry Snitselaar" <tip-bot2@xxxxxxxxxxxxx>
- [tip: efi/urgent] efi/x86: Do not clean dummy variable in kexec path
- From: "tip-bot2 for Dave Young" <tip-bot2@xxxxxxxxxxxxx>
- [tip: efi/urgent] efi/tpm: Don't access event->count when it isn't mapped
- From: "tip-bot2 for Peter Jones" <tip-bot2@xxxxxxxxxxxxx>
- [tip: efi/urgent] efi/tpm: Don't traverse an event log with no events
- From: "tip-bot2 for Peter Jones" <tip-bot2@xxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- [Patch v7 4/4] KEYS: trusted: Move TPM2 trusted keys code
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [Patch v7 3/4] KEYS: trusted: Create trusted keys subsystem
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [Patch v7 2/4] KEYS: Use common tpm_buf for trusted and asymmetric keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [Patch v7 1/4] tpm: Move tpm_buf code to include/linux/
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [Patch v7 0/4] Create and consolidate trusted keys subsystem
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] tpm: Detach page allocation from tpm_buf
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 0/6] tpm: Add driver for cr50
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 6/6] tpm: tpm_tis_spi: Drop THIS_MODULE usage from driver struct
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 5/6] tpm: tpm_tis_spi: Cleanup includes
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 4/6] tpm: tpm_tis_spi: Support cr50 devices
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/1] KEYS: Measure keys in trusted keyring
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: Use GFP_KERNEL for allocating struct tpm_buf
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/3] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 0/1] KEYS: Measure keys in trusted keyring
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/1] KEYS: Measure keys in trusted keyring
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH 0/1] KEYS: Measure keys in trusted keyring
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH 0/1] KEYS: Measure keys in trusted keyring
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: "Safford, David (GE Global Research, US)" <david.safford@xxxxxx>
- Re: [PATCH 0/1] KEYS: Measure keys in trusted keyring
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] tpm: Detach page allocation from tpm_buf
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [Patch v6 4/4] KEYS: trusted: Move TPM2 trusted keys code
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] tpm: Detach page allocation from tpm_buf
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] tpm: Detach page allocation from tpm_buf
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] tpm: Detach page allocation from tpm_buf
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] tpm: Detach page allocation from tpm_buf
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: "Safford, David (GE Global Research, US)" <david.safford@xxxxxx>
- Re: [Patch v6 4/4] KEYS: trusted: Move TPM2 trusted keys code
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: ima_tpm_chip is queried and saved only at IMA init, but never later
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: Use GFP_KERNEL for allocating struct tpm_buf
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6] tpm_crb: fix fTPM on AMD Zen+ CPUs
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 2/2] tpm: Detach page allocation from tpm_buf
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v3 1/2] tpm: Use GFP_KERNEL for allocating struct tpm_buf
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v3 0/2] tpm: Detach page allocation from tpm_buf
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v3 3/3] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v3 2/3] tpm: use tpm_try_get_ops() in tpm-sysfs.c.
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v3 1/3] tpm: migrate pubek_show to struct tpm_buf
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v3 0/3] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/4] tpm: add update_durations class op to allow override of chip supplied values
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Detach page allocation from tpm_buf
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Detach page allocation from tpm_buf
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Detach page allocation from tpm_buf
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] tpm: migrate pubek_show to struct tpm_buf
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/4] tpm: add update_durations class op to allow override of chip supplied values
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: ima_tpm_chip is queried and saved only at IMA init, but never later
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: ima_tpm_chip is queried and saved only at IMA init, but never later
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: ima_tpm_chip is queried and saved only at IMA init, but never later
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Detach page allocation from tpm_buf
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Detach page allocation from tpm_buf
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Detach page allocation from tpm_buf
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6] tpm_crb: fix fTPM on AMD Zen+ CPUs
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Detach page allocation from tpm_buf
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Detach page allocation from tpm_buf
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Detach page allocation from tpm_buf
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] tpm: migrate pubek_show to struct tpm_buf
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH 3/3] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH 2/3] tpm: use tpm_try_get_ops() in tpm-sysfs.c.
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH 1/3] tpm: migrate pubek_show to struct tpm_buf
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH 0/3] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]