Linux Integrity
[Prev Page][Next Page]
- [PATCH 4/8] security: keys: trusted: use ASN.1 tpm2 key format for the blobs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 3/8] oid_registry: Add TCG defined OIDS for TPM keys
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 2/8] lib: add asn.1 encoder
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/8] security: keys: trusted: flush the key handle after use
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 0/8] Fix TPM 2.0 trusted keys
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for Linux v5.4
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: One question about trusted key of keyring in Linux kernel.
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for Linux v5.4
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for Linux v5.4
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for Linux v5.4
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v1 0/2] IMA: Deferred measurement of keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v1 2/2] IMA: Call workqueue functions to measure queued keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v1 1/2] IMA: Define workqueue for early boot "key" measurements
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 5/6] IMA: Add support to limit measuring keys
- From: Mat Martineau <mathew.j.martineau@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 5/6] IMA: Add support to limit measuring keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 2/6] IMA: Add KEY_CHECK func to measure keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 4/6] KEYS: Call the IMA hook to measure keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 3/6] IMA: Define an IMA hook to measure keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 6/6] IMA: Read keyrings= option from the IMA policy
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 0/6] KEYS: Measure keys when they are created or updated
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 5/6] IMA: Add support to limit measuring keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 1/6] IMA: Check IMA policy flag
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 0/1] tpm/tpm_ftpm_tee: add shutdown call back
- From: Pavel Tatashin <pasha.tatashin@xxxxxxxxxx>
- [PATCH v4 1/1] tpm/tpm_ftpm_tee: add shutdown call back
- From: Pavel Tatashin <pasha.tatashin@xxxxxxxxxx>
- Ramifications of INTEGRITY_PLATFORM_KEYRING
- From: Matthias Gerstner <mgerstner@xxxxxxx>
- Re: [PATCH v9 5/6] IMA: Add support to limit measuring keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] tpm_tis_spi: use new `delay` structure for SPI transfer delays
- From: Alexandru Ardelean <alexandru.ardelean@xxxxxxxxxx>
- RE: One question about trusted key of keyring in Linux kernel.
- From: "Zhao, Shirley" <shirley.zhao@xxxxxxxxx>
- Re: One question about trusted key of keyring in Linux kernel.
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- RE: One question about trusted key of keyring in Linux kernel.
- From: "Zhao, Shirley" <shirley.zhao@xxxxxxxxx>
- Re: [PATCH v9 5/6] IMA: Add support to limit measuring keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH] ima-evm-utils: Fix compatibility with LibreSSL
- From: Mikhail Novosyolov <m.novosyolov@xxxxxxxxxxxx>
- Re: [PATCH v9 5/6] IMA: Add support to limit measuring keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 5/6] IMA: Add support to limit measuring keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 5/6] IMA: Add support to limit measuring keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 5/6] IMA: Add support to limit measuring keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v0 2/2] IMA: Call queue functions to measure keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 5/6] IMA: Add support to limit measuring keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: One question about trusted key of keyring in Linux kernel.
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- RE: One question about trusted key of keyring in Linux kernel.
- From: "Zhao, Shirley" <shirley.zhao@xxxxxxxxx>
- Re: [PATCH v0 2/2] IMA: Call queue functions to measure keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v0 1/2] IMA: Defined queue functions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v0 1/2] IMA: Defined queue functions
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [v11-ima PATCH 20/25] LSM: Verify LSM display sanity in binder
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v0 1/2] IMA: Defined queue functions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: One question about trusted key of keyring in Linux kernel.
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH 0/2] Revert patches fixing probing of interrupts
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- possible deadlock in process_measurement (2)
- From: syzbot <syzbot+18a1619cceea30ed45af@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v0 1/2] IMA: Defined queue functions
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 5/6] IMA: Add support to limit measuring keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v0 1/2] IMA: Defined queue functions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 5/5] char: tpm: add tpm_tis_i2c driver
- From: amirmizi6@xxxxxxxxx
- [PATCH v2 0/5] add tpm i2c ptp driver
- From: amirmizi6@xxxxxxxxx
- [PATCH v2 2/5] char: tpm: Add check_data handle to tpm_tis_phy_ops in order to check data integrity
- From: amirmizi6@xxxxxxxxx
- [PATCH v2 3/5] char: tpm: rewrite "tpm_tis_req_canceled()"
- From: amirmizi6@xxxxxxxxx
- [PATCH v2 4/5] dt-bindings: tpm: Add YAML schema for TPM TIS I2C options
- From: amirmizi6@xxxxxxxxx
- [PATCH v2 1/5] char: tpm: Make implementation of read16 read32 write32 optional
- From: amirmizi6@xxxxxxxxx
- [PATCH v1 5/5] char: tpm: add tpm_tis_i2c driver
- From: amirmizi6@xxxxxxxxx
- [PATCH v1 2/5] char: tpm: Add check_data handle to tpm_tis_phy_ops in order to check data integrity
- From: amirmizi6@xxxxxxxxx
- [PATCH v1 3/5] char: tpm: rewrite "tpm_tis_req_canceled()"
- From: amirmizi6@xxxxxxxxx
- [PATCH v1 0/5] add tpm i2c ptp driver
- From: amirmizi6@xxxxxxxxx
- [PATCH v1 4/5] dt-bindings: tpm: Add the TPM TIS I2C device tree binding documentaion
- From: amirmizi6@xxxxxxxxx
- [PATCH v1 1/5] char: tpm: Make implementation of read16 read32 write32 optional
- From: amirmizi6@xxxxxxxxx
- RE: One question about trusted key of keyring in Linux kernel.
- From: "Zhao, Shirley" <shirley.zhao@xxxxxxxxx>
- Re: One question about trusted key of keyring in Linux kernel.
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- RE: One question about trusted key of keyring in Linux kernel.
- From: "Zhao, Shirley" <shirley.zhao@xxxxxxxxx>
- Re: One question about trusted key of keyring in Linux kernel.
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- RE: One question about trusted key of keyring in Linux kernel.
- From: "Zhao, Shirley" <shirley.zhao@xxxxxxxxx>
- Re: One question about trusted key of keyring in Linux kernel.
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- RE: One question about trusted key of keyring in Linux kernel.
- From: "Zhao, Shirley" <shirley.zhao@xxxxxxxxx>
- RE: One question about trusted key of keyring in Linux kernel.
- From: "Zhao, Shirley" <shirley.zhao@xxxxxxxxx>
- Re: [PATCH 0/2] Revert patches fixing probing of interrupts
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for Linux v5.4
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for Linux v5.4
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4] tpm: Add tpm_version_major sysfs file
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for Linux v5.4
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: Move setting of TPM_CHIP_FLAG_IRQ into tpm_tis_probe_irq_single
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for Linux v5.4
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for Linux v5.4
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: One question about trusted key of keyring in Linux kernel.
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] Revert patches fixing probing of interrupts
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for Linux v5.4
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: One question about trusted key of keyring in Linux kernel.
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- RE: One question about trusted key of keyring in Linux kernel.
- From: "Zhao, Shirley" <shirley.zhao@xxxxxxxxx>
- RE: One question about trusted key of keyring in Linux kernel.
- From: "Zhao, Shirley" <shirley.zhao@xxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for Linux v5.4
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] tpm: Update mailing list contact information in sysfs-class-tpm
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v4] tpm: Add tpm_version_major sysfs file
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v9 5/6] IMA: Add support to limit measuring keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Move setting of TPM_CHIP_FLAG_IRQ into tpm_tis_probe_irq_single
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v9 6/6] IMA: Read keyrings= option from the IMA policy
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v0 1/2] IMA: Defined queue functions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [v11-ima PATCH 14/25] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [v11-ima PATCH 24/25] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [v11-ima PATCH 25/25] AppArmor: Remove the exclusive flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [v11-ima PATCH 22/25] Audit: Include object data for all security modules
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [v11-ima PATCH 23/25] NET: Add SO_PEERCONTEXT for multiple LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [v11-ima PATCH 21/25] Audit: Add subj_LSM fields when necessary
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [v11-ima PATCH 19/25] NET: Store LSM netlabel data in a lsmblob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [v11-ima PATCH 20/25] LSM: Verify LSM display sanity in binder
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [v11-ima PATCH 18/25] LSM: security_secid_to_secctx in netlink netfilter
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [v11-ima PATCH 15/25] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [v11-ima PATCH 17/25] LSM: Use lsmcontext in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [v11-ima PATCH 16/25] LSM: Use lsmcontext in security_dentry_init_security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [v11-ima PATCH 13/25] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [v11-ima PATCH 12/25] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [v11-ima PATCH 11/25] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [v11-ima PATCH 10/25] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [v11-ima PATCH 09/25] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [v11-ima PATCH 07/25] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [v11-ima PATCH 08/25] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [v11-ima PATCH 06/25] LSM: Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [v11-ima PATCH 05/25] net: Prepare UDS for security module stacking
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [v11-ima PATCH 04/25] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [v11-ima PATCH 03/25] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [v11-ima PATCH 01/25] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [v11-ima PATCH 02/25] LSM: Create and manage the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [v11-ima PATCH 00/25] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for Linux v5.4
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for Linux v5.4
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Move setting of TPM_CHIP_FLAG_IRQ into tpm_tis_probe_irq_single
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH] tpm_tis: Move setting of TPM_CHIP_FLAG_IRQ into tpm_tis_probe_irq_single
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v0 1/2] IMA: Defined queue functions
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for Linux v5.4
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v9 6/6] IMA: Read keyrings= option from the IMA policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 5/6] IMA: Add support to limit measuring keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: One question about trusted key of keyring in Linux kernel.
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: One question about trusted key of keyring in Linux kernel.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v0 1/2] IMA: Defined queue functions
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v0 0/2] IMA: Deferred measurement of keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v0 2/2] IMA: Call queue functions to measure keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- RE: One question about trusted key of keyring in Linux kernel.
- From: "Zhao, Shirley" <shirley.zhao@xxxxxxxxx>
- Re: [PATCH v0] IMA: Check IMA policy flag
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 2/6] IMA: Add KEY_CHECK func to measure keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 4/6] KEYS: Call the IMA hook to measure keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 3/6] IMA: Define an IMA hook to measure keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 0/6] KEYS: Measure keys when they are created or updated
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 5/6] IMA: Add support to limit measuring keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 6/6] IMA: Read keyrings= option from the IMA policy
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 1/6] IMA: Check IMA policy flag
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 00/25] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v10 00/25] LSM: Module stacking for AppArmor
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: One question about trusted key of keyring in Linux kernel.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 2/2] tpm: Revert "tpm_tis_core: Turn on the TPM before probing IRQ's"
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH 0/2] Revert patches fixing probing of interrupts
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] tpm: Revert "tpm_tis_core: Set TPM_CHIP_FLAG_IRQ before probing for interrupts"
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- RE: One question about trusted key of keyring in Linux kernel.
- From: "Zhao, Shirley" <shirley.zhao@xxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for Linux v5.5
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v10 00/25] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v0] IMA: Check IMA policy flag
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v0] IMA: Check IMA policy flag
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: IMA: Data included in the key measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: IMA: Data included in the key measurement
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: IMA: Data included in the key measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 4/5] dt-bindings: tpm: Add the TPM TIS I2C device tree binding documentaion
- From: Amir Mizinski <amirmizi6@xxxxxxxxx>
- Re: possible deadlock in mnt_want_write
- From: syzbot <syzbot+ae82084b07d0297e566b@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: IMA: Data included in the key measurement
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: IMA: Data included in the key measurement
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: IMA: Data included in the key measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for Linux v5.4
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: IMA: Data included in the key measurement
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: IMA: Data included in the key measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Move setting of TPM_CHIP_FLAG_IRQ into tpm_tis_probe_irq_single
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v8 2/5] IMA: Define an IMA hook to measure keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v0] IMA: Check IMA policy flag
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: IMA: Data included in the key measurement
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- IMA: Data included in the key measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for Linux v5.4
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v2] security: Fix Kconfig indentation
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH v8 4/5] IMA: Add support to limit measuring keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 2/5] IMA: Define an IMA hook to measure keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 2/5] IMA: Define an IMA hook to measure keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 4/5] IMA: Add support to limit measuring keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 4/5] IMA: Add support to limit measuring keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 2/5] IMA: Define an IMA hook to measure keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 2/5] IMA: Define an IMA hook to measure keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v8 4/5] IMA: Add support to limit measuring keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Question about creating EVM key
- From: Pouneh Aghababazadeh <paghababazadeh@xxxxxxxxx>
- Validating key measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH] security: Fix Kconfig indentation
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- [PATCH v11 21/25] Audit: Add subj_LSM fields when necessary
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 12/25] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 11/25] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 10/25] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 09/25] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 03/25] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v11 00/25] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v8 3/5] KEYS: Call the IMA hook to measure keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 3/5] KEYS: Call the IMA hook to measure keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v8 5/5] IMA: Read keyrings= option from the IMA policy
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 1/5] IMA: Add KEY_CHECK func to measure keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 2/5] IMA: Define an IMA hook to measure keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 4/5] IMA: Add support to limit measuring keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 0/5] KEYS: Measure keys when they are created or updated
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 3/5] KEYS: Call the IMA hook to measure keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: linux-5.4-rc8/drivers/char/tpm/tpm1-cmd.c:735: possible missing return value check
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Move setting of TPM_CHIP_FLAG_IRQ into tpm_tis_probe_irq_single
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: linux-5.4-rc8/drivers/char/tpm/tpm1-cmd.c:735: possible missing return value check
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: linux-5.4-rc8/drivers/char/tpm/tpm1-cmd.c:735: possible missing return value check
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Move setting of TPM_CHIP_FLAG_IRQ into tpm_tis_probe_irq_single
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: Move setting of TPM_CHIP_FLAG_IRQ into tpm_tis_probe_irq_single
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: turn on TPM before calling tpm_get_timeouts
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] ima: avoid appraise error for hash calc interrupt
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: question about setting TPM_CHIP_FLAG_IRQ in tpm_tis_core_init
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: turn on TPM before calling tpm_get_timeouts
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] tpm_tis: turn on TPM before calling tpm_get_timeouts
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: remove tpm_dev_wq_lock
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] ima: avoid appraise error for hash calc interrupt
- From: Patrick Callaghan <patrickc@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 3/5] KEYS: Call the IMA hook to measure keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v1 4/5] dt-bindings: tpm: Add the TPM TIS I2C device tree binding documentaion
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH] ima: avoid appraise error for hash calc interrupt
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 2/5] IMA: Define an IMA hook to measure keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 3/5] KEYS: Call the IMA hook to measure keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 4/5] IMA: Add support to limit measuring keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: One question about trusted key of keyring in Linux kernel.
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] tpm_tis: turn on TPM before calling tpm_get_timeouts
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: turn on TPM before calling tpm_get_timeouts
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] tpm_tis: turn on TPM before calling tpm_get_timeouts
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: turn on TPM before calling tpm_get_timeouts
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] tpm_tis: turn on TPM before calling tpm_get_timeouts
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: question about setting TPM_CHIP_FLAG_IRQ in tpm_tis_core_init
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Move setting of TPM_CHIP_FLAG_IRQ into tpm_tis_probe_irq_single
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Move setting of TPM_CHIP_FLAG_IRQ into tpm_tis_probe_irq_single
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for Linux v5.5
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 3/5] KEYS: Call the IMA hook to measure keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 4/5] IMA: Add support to limit measuring keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: avoid appraise error for hash calc interrupt
- From: Patrick Callaghan <patrickc@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: remove tpm_dev_wq_lock
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH] sysfs: Fixes __BIN_ATTR_WO() macro
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] sysfs: Fixes __BIN_ATTR_WO() macro
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [PATCH v10 4/9] powerpc/ima: define trusted boot policy
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [PATCH v10 6/9] certs: add wrapper function to check blacklisted binary hash
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [PATCH v10 8/9] powerpc/ima: update ima arch policy to check for blacklist
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [PATCH v10 5/9] ima: make process_buffer_measurement() generic
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [PATCH v9 1/4] powerpc/powernv: Add OPAL API interface to access secure variable
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [PATCH v10a 3/9] powerpc: detect the trusted boot state of the system
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [PATCH v10a 1/9] powerpc: detect the secure boot mode of the system
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [PATCH v10 7/9] ima: check against blacklisted hashes for files with modsig
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v10 9/9] powerpc/ima: indicate kernel modules appended signatures are enforced
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [PATCH v10 2/9] powerpc/ima: add support to initialize ima policy rules
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- [PATCH v7 3/5] KEYS: Call the IMA hook to measure keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 2/5] IMA: Define an IMA hook to measure keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 4/5] IMA: Add support to limit measuring keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 0/5] KEYS: Measure keys when they are created or updated
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 5/5] IMA: Read keyrings= option from the IMA policy
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 1/5] IMA: Add KEY_CHECK func to measure keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 0/3] KEYS: Measure keys when they are created or updated
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 0/3] KEYS: Measure keys when they are created or updated
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 2/3] IMA: Define an IMA hook to measure keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 2/3] IMA: Define an IMA hook to measure keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 2/3] IMA: Define an IMA hook to measure keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 1/3] IMA: Add KEY_CHECK func to measure keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 1/3] IMA: Add KEY_CHECK func to measure keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 1/3] IMA: Add KEY_CHECK func to measure keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 3/3] KEYS: Call the IMA hook to measure keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 2/3] IMA: Define an IMA hook to measure keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v6 1/3] IMA: Add KEY_CHECK func to measure keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 2/3] IMA: Define an IMA hook to measure keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 3/3] KEYS: Call the IMA hook to measure keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 0/3] KEYS: Measure keys when they are created or updated
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: One question about trusted key of keyring in Linux kernel.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] tpm: move TPM_CHIP_FLAG_HAVE_TIMEOUTS check
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] ima: avoid appraise error for hash calc interrupt
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- [PATCH 14/25] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 12/25] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 11/25] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 10/25] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 09/25] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3] tpm_tis: turn on TPM before calling tpm_get_timeouts
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: question about setting TPM_CHIP_FLAG_IRQ in tpm_tis_core_init
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: turn on TPM before calling tpm_get_timeouts
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: turn on TPM before calling tpm_get_timeouts
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] tpm_tis: turn on TPM before calling tpm_get_timeouts
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: turn on TPM before calling tpm_get_timeouts
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [PATCH] tpm_tis: Move setting of TPM_CHIP_FLAG_IRQ into tpm_tis_probe_irq_single
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: turn on TPM before calling tpm_get_timeouts
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] tpm_tis: turn on TPM before calling tpm_get_timeouts
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v1 2/5] char: tpm: Add check_data handle to tpm_tis_phy_ops in order to check data integrity
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: question about setting TPM_CHIP_FLAG_IRQ in tpm_tis_core_init
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: question about setting TPM_CHIP_FLAG_IRQ in tpm_tis_core_init
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: question about setting TPM_CHIP_FLAG_IRQ in tpm_tis_core_init
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: turn on TPM before calling tpm_get_timeouts
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for Linux v5.5
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [GIT PULL] tpmdd updates for Linux v5.5
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: PROBLEM: TPM bug causes suspend to turn off device
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] ima: avoid appraise error for hash calc interrupt
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 04/10] IMA: Updated IMA policy functions to return keyrings option read from the policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 02/10] IMA: Added keyrings= option in IMA policy to only measure keys added to the specified keyrings.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 0/10] KEYS: Measure keys when they are created or updated
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 04/10] IMA: Updated IMA policy functions to return keyrings option read from the policy
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 02/10] IMA: Added keyrings= option in IMA policy to only measure keys added to the specified keyrings.
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 01/10] IMA: Added KEYRING_CHECK func in IMA policy to measure keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] ima: avoid appraise error for hash calc interrupt
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] ima: avoid appraise error for hash calc interrupt
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 0/10] KEYS: Measure keys when they are created or updated
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 04/10] IMA: Updated IMA policy functions to return keyrings option read from the policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 02/10] IMA: Added keyrings= option in IMA policy to only measure keys added to the specified keyrings.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 01/10] IMA: Added KEYRING_CHECK func in IMA policy to measure keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: question about setting TPM_CHIP_FLAG_IRQ in tpm_tis_core_init
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: question about setting TPM_CHIP_FLAG_IRQ in tpm_tis_core_init
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: question about setting TPM_CHIP_FLAG_IRQ in tpm_tis_core_init
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- question about setting TPM_CHIP_FLAG_IRQ in tpm_tis_core_init
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v1 3/5] char: tpm: rewrite "tpm_tis_req_canceled()"
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v9 0/4] powerpc: expose secure variables to the kernel and userspace
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- [PATCH v2] tpm_tis: turn on TPM before calling tpm_get_timeouts
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [PATCH] tpm_tis: turn on TPM before calling tpm_get_timeouts
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: PROBLEM: TPM bug causes suspend to turn off device
- From: "Christian Bundy" <christianbundy@xxxxxxxxxxx>
- Re: [PATCH v9 0/4] powerpc: expose secure variables to the kernel and userspace
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] ima: avoid appraise error for hash calc interrupt
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: PROBLEM: TPM bug causes suspend to turn off device
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v5 0/10] KEYS: Measure keys when they are created or updated
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 03/10] IMA: Read keyrings= option from the IMA policy into ima_rule_entry
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 0/10] KEYS: Measure keys when they are created or updated
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 01/10] IMA: Added KEYRING_CHECK func in IMA policy to measure keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 02/10] IMA: Added keyrings= option in IMA policy to only measure keys added to the specified keyrings.
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 05/10] IMA: Measure key if the IMA policy allows measurement for the keyring to which the key is linked to
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 06/10] IMA: Defined an IMA hook to measure keys on key create or update
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 08/10] IMA: Added a flag to determine whether IMA hook can process the key now or has to queue for processing later
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 04/10] IMA: Updated IMA policy functions to return keyrings option read from the policy
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 07/10] KEYS: Call the IMA hook to measure key when a new key is created or an existing key is updated
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 09/10] IMA: Defined functions to queue and dequeue keys for measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 10/10] IMA: Call queue and dequeue functions to measure keys.
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH] ima: avoid appraise error for hash calc interrupt
- From: Patrick Callaghan <patrickc@xxxxxxxxxxxxx>
- [PATCH v9 4/4] powerpc: load firmware trusted keys/hashes into kernel keyring
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v9 2/4] powerpc: expose secure variables to userspace via sysfs
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v9 3/4] x86/efi: move common keyring handler functions to new file
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v9 1/4] powerpc/powernv: Add OPAL API interface to access secure variable
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v9 0/4] powerpc: expose secure variables to the kernel and userspace
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [PATCH v1 3/5] char: tpm: rewrite "tpm_tis_req_canceled()"
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [PATCH v1 5/5] char: tpm: add tpm_tis_i2c driver
- From: amirmizi6@xxxxxxxxx
- [PATCH v1 2/5] char: tpm: Add check_data handle to tpm_tis_phy_ops in order to check data integrity
- From: amirmizi6@xxxxxxxxx
- [PATCH v1 1/5] char: tpm: Make implementation of read16 read32 write32 optional
- From: amirmizi6@xxxxxxxxx
- [PATCH v1 4/5] dt-bindings: tpm: Add the TPM TIS I2C device tree binding documentaion
- From: amirmizi6@xxxxxxxxx
- [PATCH v1 3/5] char: tpm: rewrite "tpm_tis_req_canceled()"
- From: amirmizi6@xxxxxxxxx
- [PATCH v1 0/5] add tpm i2c ptp driver
- From: amirmizi6@xxxxxxxxx
- Re: PROBLEM: TPM bug causes suspend to turn off device
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [PATCH v8 4/4] powerpc: load firmware trusted keys/hashes into kernel keyring
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v8 3/4] x86/efi: move common keyring handler functions to new file
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v8 2/4] powerpc: expose secure variables to userspace via sysfs
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v8 1/4] powerpc/powernv: Add OPAL API interface to access secure variable
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v8 0/4] powerpc: expose secure variables to the kernel and userspace
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- PROBLEM: TPM bug causes suspend to turn off device
- From: "Christian Bundy" <christianbundy@xxxxxxxxxxx>
- Re: [PATCH v7 4/4] powerpc: load firmware trusted keys/hashes into kernel keyring
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v4 01/10] IMA: Defined an IMA hook to measure keys on key create or update
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 01/10] IMA: Defined an IMA hook to measure keys on key create or update
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 01/10] IMA: Defined an IMA hook to measure keys on key create or update
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: remove tpm_dev_wq_lock
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: remove tpm_dev_wq_lock
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH v7 2/4] powerpc: expose secure variables to userspace via sysfs
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 0/4] powerpc: expose secure variables to the kernel and userspace
- From: Eric Richter <erichte@xxxxxxxxxxxxx>
- [PATCH v7 4/4] powerpc: load firmware trusted keys/hashes into kernel keyring
- From: Eric Richter <erichte@xxxxxxxxxxxxx>
- [PATCH v7 3/4] x86/efi: move common keyring handler functions to new file
- From: Eric Richter <erichte@xxxxxxxxxxxxx>
- [PATCH v7 2/4] powerpc: expose secure variables to userspace via sysfs
- From: Eric Richter <erichte@xxxxxxxxxxxxx>
- [PATCH v7 1/4] powerpc/powernv: Add OPAL API interface to access secure variable
- From: Eric Richter <erichte@xxxxxxxxxxxxx>
- Re: [PATCH v4 01/10] IMA: Defined an IMA hook to measure keys on key create or update
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 08/10] IMA: Defined functions to queue and dequeue keys for measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 01/10] IMA: Defined an IMA hook to measure keys on key create or update
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 08/10] IMA: Defined functions to queue and dequeue keys for measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 01/10] IMA: Defined an IMA hook to measure keys on key create or update
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 08/10] IMA: Defined functions to queue and dequeue keys for measurement
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Mail to David Howells @ redhat bounced
- From: Patrick Uiterwijk <puiterwijk@xxxxxxxxxx>
- Mail to David Howells @ redhat bounced
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 03/10] IMA: Added keyrings= option in IMA policy to only measure keys added to the specified keyrings.
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 02/10] IMA: Added KEYRING_CHECK func in IMA policy to measure keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 06/10] IMA: Measure key if the IMA policy allows measurement for the keyring to which the key is linked to
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 10/10] KEYS: Call the IMA hook to measure key when a new key is created or an existing key is updated
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 07/10] IMA: Added a boolean flag to track IMA initialization status
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 08/10] IMA: Defined functions to queue and dequeue keys for measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 09/10] IMA: Call queue and dequeue functions to measure keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 05/10] IMA: Updated IMA policy functions to return keyrings option read from the policy
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 04/10] IMA: Read keyrings= option from the IMA policy into ima_rule_entry
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 0/10] KEYS: Measure keys when they are created or updated
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 01/10] IMA: Defined an IMA hook to measure keys on key create or update
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 2/4] powerpc: expose secure variables to userspace via sysfs
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 1/4] powerpc/powernv: Add OPAL API interface to access secure variable
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10a 3/9] powerpc: detect the trusted boot state of the system
- From: Eric Richter <erichte@xxxxxxxxxxxxx>
- [PATCH v10a 1/9] powerpc: detect the secure boot mode of the system
- From: Eric Richter <erichte@xxxxxxxxxxxxx>
- [PATCH v6 2/4] powerpc: expose secure variables to userspace via sysfs
- From: Eric Richter <erichte@xxxxxxxxxxxxx>
- [PATCH v6 3/4] x86/efi: move common keyring handler functions to new file
- From: Eric Richter <erichte@xxxxxxxxxxxxx>
- [PATCH v6 4/4] powerpc: load firmware trusted keys/hashes into kernel keyring
- From: Eric Richter <erichte@xxxxxxxxxxxxx>
- [PATCH v6 1/4] powerpc/powernv: Add OPAL API interface to access secure variable
- From: Eric Richter <erichte@xxxxxxxxxxxxx>
- [PATCH v6 0/4] powerpc: expose secure variables to the kernel and userspace
- From: Eric Richter <erichte@xxxxxxxxxxxxx>
- Re: [PATCH v10 1/9] powerpc: detect the secure boot mode of the system
- From: Eric Richter <erichte@xxxxxxxxxxxxx>
- [PATCH 4.4 16/46] efi/x86: Do not clean dummy variable in kexec path
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.4 15/46] efi/cper: Fix endianness of PCIe class code
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.9 21/62] efi/cper: Fix endianness of PCIe class code
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.14 41/95] efi/cper: Fix endianness of PCIe class code
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.14 42/95] efi/x86: Do not clean dummy variable in kexec path
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.3 051/163] efi/cper: Fix endianness of PCIe class code
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.3 052/163] efi/x86: Do not clean dummy variable in kexec path
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.19 081/149] efi/cper: Fix endianness of PCIe class code
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.19 082/149] efi/x86: Do not clean dummy variable in kexec path
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.9 22/62] efi/x86: Do not clean dummy variable in kexec path
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [Patch v3 6/7] doc: keys: Document usage of TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: remove tpm_dev_wq_lock
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] tpm: remove tpm_dev_wq_lock
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: remove tpm_dev_wq_lock
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] tpm: remove tpm_dev_wq_lock
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [Patch v3 6/7] doc: keys: Document usage of TEE based Trusted Keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [Patch v3 6/7] doc: keys: Document usage of TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [Patch v3 6/7] doc: keys: Document usage of TEE based Trusted Keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [Patch v3 6/7] doc: keys: Document usage of TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4] tpm: Add tpm_version_major sysfs file
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Add major_version sysfs file
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 5/9] ima: make process_buffer_measurement() generic
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 5/9] ima: make process_buffer_measurement() generic
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/9] KEYS: Defined an IMA hook to measure keys on key create or update
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/9] KEYS: Defined an IMA hook to measure keys on key create or update
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/9] KEYS: Defined an IMA hook to measure keys on key create or update
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v3 1/9] KEYS: Defined an IMA hook to measure keys on key create or update
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/9] KEYS: Defined an IMA hook to measure keys on key create or update
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v3 2/9] KEYS: Defined functions to queue and dequeue keys for measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/9] KEYS: Defined an IMA hook to measure keys on key create or update
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [Patch v3 7/7] MAINTAINERS: Add entry for TEE based Trusted Keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [Patch v3 6/7] doc: keys: Document usage of TEE based Trusted Keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [Patch v3 5/7] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [Patch v3 4/7] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [Patch v3 3/7] tee: add private login method for kernel clients
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [Patch v3 2/7] tee: enable support to register kernel memory
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [Patch v3 1/7] tee: optee: allow kernel pages to register as shm
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [Patch v3 0/7] Introduce TEE based Trusted Keys support
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v3 2/9] KEYS: Defined functions to queue and dequeue keys for measurement
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 4/9] KEYS: Updated IMA policy functions for handling key measurement
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 3/9] KEYS: Added KEYRING_CHECK policy for key measurement
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/9] KEYS: Defined an IMA hook to measure keys on key create or update
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/9] KEYS: Defined an IMA hook to measure keys on key create or update
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v4] tpm: Add tpm_version_major sysfs file
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] x86/ima: update IMA arch policy to support appended signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v10 5/9] ima: make process_buffer_measurement() generic
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v10 7/9] ima: check against blacklisted hashes for files with modsig
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v10 6/9] certs: add wrapper function to check blacklisted binary hash
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v10 3/9] powerpc: detect the trusted boot state of the system
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v10 2/9] powerpc/ima: add support to initialize ima policy rules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v10 1/9] powerpc: detect the secure boot mode of the system
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC PATCH v10 9/9] powerpc/ima: indicate kernel modules appended signatures are enforced
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v10 8/9] powerpc/ima: update ima arch policy to check for blacklist
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v10 4/9] powerpc/ima: define trusted boot policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v10 0/9] powerpc: Enabling IMA arch specific secure boot policies
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 4/9] KEYS: Updated IMA policy functions for handling key measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 2/9] KEYS: Defined functions to queue and dequeue keys for measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 3/9] KEYS: Added KEYRING_CHECK policy for key measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 9/9] KEYS: Call the IMA hook to measure key when a new key is created or an existing key is updated
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 7/9] KEYS: Queue key for measurement if IMA is not yet initialized. Measure queued keys when IMA initialization is completed
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 8/9] KEYS: Added a boolean flag for IMA initialization status.
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 6/9] KEYS: Measure key if the IMA policy allows measurement for the given keyring
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 5/9] KEYS: Updated ima_get_action() to return keyrings if specified in the policy
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 0/9] KEYS: Measure keys when they are created or updated
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 1/9] KEYS: Defined an IMA hook to measure keys on key create or update
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4] tpm: Add tpm_version_major sysfs file
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v9 5/8] ima: make process_buffer_measurement() generic
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 5/8] ima: make process_buffer_measurement() generic
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Add major_version sysfs file
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v2] tpm: Add major_version sysfs file
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Add major_version sysfs file
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Add major_version sysfs file
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Add major_version sysfs file
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v1] selftest/trustedkeys: TPM 1.2 trusted keys test
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v1] selftest/trustedkeys: TPM 1.2 trusted keys test
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v1] selftest/trustedkeys: TPM 1.2 trusted keys test
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Add major_version sysfs file
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v1] selftest/trustedkeys: TPM 1.2 trusted keys test
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add major_version sysfs file
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 2/8] powerpc/ima: add support to initialize ima policy rules
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Add major_version sysfs file
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] tpm: Update mailing list contact information in sysfs-class-tpm
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Add major_version sysfs file
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [LTP] [PATCH] ima: skip verifying TPM 2.0 PCR values
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Switch to platform_get_irq_optional()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Switch to platform_get_irq_optional()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v1] selftest/trustedkeys: TPM 1.2 trusted keys test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v1] selftest/trustedkeys: TPM 1.2 trusted keys test
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v1] selftest/trustedkeys: TPM 1.2 trusted keys test
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v1] selftest/trustedkeys: TPM 1.2 trusted keys test
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: remove tpm_dev_wq_lock
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: remove tpm_dev_wq_lock
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] KEYS: Added BUILTIN_TRUSTED_KEYS enum to measure keys added to builtin_trusted_keys keyring
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] KEYS: Added BUILTIN_TRUSTED_KEYS enum to measure keys added to builtin_trusted_keys keyring
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] KEYS: Added BUILTIN_TRUSTED_KEYS enum to measure keys added to builtin_trusted_keys keyring
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] KEYS: Defined an ima hook for measuring keys on key create or update
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 0/8] powerpc: Enabling IMA arch specific secure boot policies
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 2/8] powerpc/ima: add support to initialize ima policy rules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add major_version sysfs file
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] tpm: Add major_version sysfs file
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH v3] tpm: Add version_major sysfs file
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] tpm: Add major_version sysfs file
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] KEYS: Defined an ima hook for measuring keys on key create or update
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] KEYS: Added BUILTIN_TRUSTED_KEYS enum to measure keys added to builtin_trusted_keys keyring
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 5/8] ima: make process_buffer_measurement() generic
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 2/8] powerpc/ima: add support to initialize ima policy rules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] KEYS: Defined an ima hook for measuring keys on key create or update
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] KEYS: Defined an ima hook for measuring keys on key create or update
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add major_version sysfs file
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] KEYS: Defined an ima hook for measuring keys on key create or update
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] tpm: Update mailing list contact information in sysfs-class-tpm
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] tpm: Add major_version sysfs file
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH v2] tpm: Add major_version sysfs file
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] tpm: Add major_version sysfs file
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add major_version sysfs file
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] tpm: Add major_version sysfs file
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 2/8] powerpc/ima: add support to initialize ima policy rules
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V4 0/2] Add support for arm64 to carry ima measurement
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 7/8] ima: check against blacklisted hashes for files with modsig
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 5/8] ima: make process_buffer_measurement() generic
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 5/8] ima: make process_buffer_measurement() generic
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH V4 0/2] Add support for arm64 to carry ima measurement
- From: James Morse <james.morse@xxxxxxx>
- Re: [PATCH V4 0/2] Add support for arm64 to carry ima measurement
- From: James Morse <james.morse@xxxxxxx>
- Re: [PATCH v9 2/8] powerpc/ima: add support to initialize ima policy rules
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 3/8] powerpc: detect the trusted boot state of the system
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 1/8] powerpc: detect the secure boot mode of the system
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] powerpc: load firmware trusted keys/hashes into kernel keyring
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/4] powerpc: expose secure variables to userspace via sysfs
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/4] powerpc/powernv: Add OPAL API interface to access secure variable
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Tests to run to validate ima related changes
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH] tpm: Add major_version sysfs file
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [LTP] [PATCH] ima: skip verifying TPM 2.0 PCR values
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v8] tpm_crb: fix fTPM on AMD Zen+ CPUs
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Switch to platform_get_irq_optional()
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [LTP] [PATCH] ima: skip verifying TPM 2.0 PCR values
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [LTP] [PATCH] ima: skip verifying TPM 2.0 PCR values
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [LTP] [PATCH] ima: skip verifying TPM 2.0 PCR values
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [PATCH v2] tpm: Switch to platform_get_irq_optional()
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH] tpm: Switch to platform_get_irq_optional()
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [LTP] [PATCH] ima: skip verifying TPM 2.0 PCR values
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [LTP] [PATCH] ima: skip verifying TPM 2.0 PCR values
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [PATCH v5 4/4] powerpc: load firmware trusted keys/hashes into kernel keyring
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v5 1/4] powerpc/powernv: Add OPAL API interface to access secure variable
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v5 3/4] x86/efi: move common keyring handler functions to new file
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v5 2/4] powerpc: expose secure variables to userspace via sysfs
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v5 0/4] powerpc: expose secure variables to the kernel and userspace
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [LTP] [PATCH] ima: skip verifying TPM 2.0 PCR values
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [LTP] [PATCH] ima: skip verifying TPM 2.0 PCR values
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [LTP] [PATCH] ima: skip verifying TPM 2.0 PCR values
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- IMA test information
- From: Prakhar Srivastava <prsriva@xxxxxxxxxxxxxxxxxxx>
- Re: [LTP] [PATCH] ima: skip verifying TPM 2.0 PCR values
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v1] selftest/trustedkeys: TPM 1.2 trusted keys test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8] tpm_crb: fix fTPM on AMD Zen+ CPUs
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v1] selftest/trustedkeys: TPM 1.2 trusted keys test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [LTP] [PATCH] ima: skip verifying TPM 2.0 PCR values
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Switch to platform_get_irq_optional()
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] tpm: Switch to platform_get_irq_optional()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v8] tpm_crb: fix fTPM on AMD Zen+ CPUs
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [LTP] [PATCH] ima: skip verifying TPM 2.0 PCR values
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v9 7/8] ima: check against blacklisted hashes for files with modsig
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 4/8] powerpc/ima: define trusted boot policy
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 3/8] powerpc: detect the trusted boot state of the system
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 2/8] powerpc/ima: add support to initialize ima policy rules
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 1/8] powerpc: detect the secure boot mode of the system
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [LTP] [PATCH] ima: skip verifying TPM 2.0 PCR values
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v8] tpm_crb: fix fTPM on AMD Zen+ CPUs
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] tpm: Switch to platform_get_irq_optional()
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v9 5/8] ima: make process_buffer_measurement() generic
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Switch to platform_get_irq_optional()
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH] tpm: Switch to platform_get_irq_optional()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [LTP] [PATCH] ima: skip verifying TPM 2.0 PCR values
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v9 8/8] powerpc/ima: update ima arch policy to check for blacklist
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v9 7/8] ima: check against blacklisted hashes for files with modsig
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v9 5/8] ima: make process_buffer_measurement() generic
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v9 6/8] certs: add wrapper function to check blacklisted binary hash
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v9 4/8] powerpc/ima: define trusted boot policy
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v9 3/8] powerpc: detect the trusted boot state of the system
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v9 2/8] powerpc/ima: add support to initialize ima policy rules
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v9 1/8] powerpc: detect the secure boot mode of the system
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v9 0/8] powerpc: Enabling IMA arch specific secure boot policies
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Measure ima policy
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/4] KEYS: measure keys when they are created or updated
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/4] KEYS: Queue key for measurement if ima is not initialized. Measure queued keys when ima is initialized
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 3/4] KEYS: Added BUILTIN_TRUSTED_KEYS enum to measure keys added to builtin_trusted_keys keyring
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 4/4] KEYS: Enabled ima policy to measure keys added to builtin_trusted_keys keyring
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 1/4] KEYS: Defined an ima hook for measuring keys on key create or update
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8] tpm_crb: fix fTPM on AMD Zen+ CPUs
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v1 5/6] KEYS: measure queued keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v1 6/6] KEYS: measure keys when they are created or updated
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v1 5/6] KEYS: measure queued keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v1 5/6] KEYS: measure queued keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 3/6] KEYS: ima hook to measure builtin_trusted_keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v1 3/6] KEYS: ima hook to measure builtin_trusted_keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Switch to platform_get_irq_optional()
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH] ima-evm-utils: add support for tpm2-tools to read the TPM 2.0 PCRs
- From: Patrick Uiterwijk <patrick@xxxxxxxxxxxxxx>
- Re: [PATCH v1 5/6] KEYS: measure queued keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v1 3/6] KEYS: ima hook to measure builtin_trusted_keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v1 2/6] KEYS: ima: Refactored process_buffer_measurement function so that it can measure any buffer (and not just KEXEC_CMDLINE one)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8] tpm_crb: fix fTPM on AMD Zen+ CPUs
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [Patch v8 0/4] Create and consolidate trusted keys subsystem
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [Patch v8 0/4] Create and consolidate trusted keys subsystem
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Switch to platform_get_irq_optional()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Switch to platform_get_irq_optional()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v1 2/6] KEYS: ima: Refactored process_buffer_measurement function so that it can measure any buffer (and not just KEXEC_CMDLINE one)
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v1 3/6] KEYS: ima hook to measure builtin_trusted_keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v1 6/6] KEYS: measure keys when they are created or updated
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v1 0/6] KEYS: measure keys when they are created or updated
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v1 5/6] KEYS: measure queued keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v1 4/6] KEYS: ima functions to queue and dequeue keys to measure
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v1 1/6] KEYS: Helper function to check if the given keyring is builtin_trusted_keys
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 3/8] powerpc: detect the trusted boot state of the system
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v8 1/8] powerpc: detect the secure boot mode of the system
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH] selftest/trustedkeys: TPM 1.2 trusted keys test
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [bug report] tpm: add support for nonblocking operation
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH V4 0/2] Add support for arm64 to carry ima measurement
- From: prsriva <prsriva@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8] tpm_crb: fix fTPM on AMD Zen+ CPUs
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Switch to platform_get_irq_optional()
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH] tpm: Switch to platform_get_irq_optional()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Switch to platform_get_irq_optional()
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 7/8] ima: check against blacklisted hashes for files with modsig
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [PATCH v8 7/8] ima: check against blacklisted hashes for files with modsig
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 3/8] powerpc: detect the trusted boot state of the system
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 5/8] ima: make process_buffer_measurement() generic
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 7/8] ima: check against blacklisted hashes for files with modsig
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 2/8] powerpc/ima: add support to initialize ima policy rules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 4/8] powerpc/ima: add measurement rules to ima arch specific policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 7/8] ima: check against blacklisted hashes for files with modsig
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 4/8] powerpc/ima: add measurement rules to ima arch specific policy
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v0 1/1] ima: Refactor process_buffer_measurement() to make it generic
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v8 8/8] powerpc/ima: update ima arch policy to check for blacklist
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v8 7/8] ima: check against blacklisted hashes for files with modsig
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v8 6/8] certs: add wrapper function to check blacklisted binary hash
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v8 5/8] ima: make process_buffer_measurement() generic
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v8 4/8] powerpc/ima: add measurement rules to ima arch specific policy
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v8 3/8] powerpc: detect the trusted boot state of the system
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v8 2/8] powerpc/ima: add support to initialize ima policy rules
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v8 0/8] powerpc: Enabling IMA arch specific secure boot policies
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v8 1/8] powerpc: detect the secure boot mode of the system
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH] tpm: Switch to platform_get_irq_optional()
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH AUTOSEL 5.3 48/89] efi/cper: Fix endianness of PCIe class code
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.3 49/89] efi/x86: Do not clean dummy variable in kexec path
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 075/100] efi/cper: Fix endianness of PCIe class code
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 076/100] efi/x86: Do not clean dummy variable in kexec path
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 38/56] efi/x86: Do not clean dummy variable in kexec path
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 18/29] efi/x86: Do not clean dummy variable in kexec path
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.4 12/21] efi/cper: Fix endianness of PCIe class code
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.4 13/21] efi/x86: Do not clean dummy variable in kexec path
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 17/29] efi/cper: Fix endianness of PCIe class code
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 37/56] efi/cper: Fix endianness of PCIe class code
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v0] KEYS: Security LSM Hook for key_create_or_update
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v0] KEYS: Security LSM Hook for key_create_or_update
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v0] KEYS: Security LSM Hook for key_create_or_update
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: [PATCH v3] tpm/tpm_ftpm_tee: add shutdown call back
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] tpm/tpm_ftpm_tee: add shutdown call back
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Salt tpm_get_random() result with get_random_bytes()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 2/8] powerpc: add support to initialize ima policy rules
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v3] x86, efi: never relocate kernel below lowest acceptable address
- From: Joe Perches <joe@xxxxxxxxxxx>
- [PATCH 4.14 43/65] efivar/ssdt: Dont iterate over EFI vars if no SSDT override was specified
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.19 49/81] efivar/ssdt: Dont iterate over EFI vars if no SSDT override was specified
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.3 063/112] efi/tpm: Dont access event->count when it isnt mapped
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.3 064/112] efi/tpm: Dont traverse an event log with no events
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.3 065/112] efi/tpm: Only set efi_tpm_final_log_size after successful event log parsing
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.3 062/112] efivar/ssdt: Dont iterate over EFI vars if no SSDT override was specified
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.9 76/92] efivar/ssdt: Dont iterate over EFI vars if no SSDT override was specified
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v8] tpm_crb: fix fTPM on AMD Zen+ CPUs
- From: ivan.lazeev@xxxxxxxxx
- Re: [PATCH v3] x86, efi: never relocate kernel below lowest acceptable address
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH v0 1/1] KEYS: LSM Hook for key_create_or_update
- From: James Morris <jamorris@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm/tpm_ftpm_tee: add shutdown call back
- From: Pavel Tatashin <pasha.tatashin@xxxxxxxxxx>
- [PATCH v3] tpm/tpm_ftpm_tee: add shutdown call back
- From: Pavel Tatashin <pasha.tatashin@xxxxxxxxxx>
- Re: [PATCH v3] x86, efi: never relocate kernel below lowest acceptable address
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Salt tpm_get_random() result with get_random_bytes()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Salt tpm_get_random() result with get_random_bytes()
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v3] x86, efi: never relocate kernel below lowest acceptable address
- From: Borislav Petkov <bp@xxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]