Linux Integrity
[Prev Page][Next Page]
- Re: [PATCH v4 0/4] tpm: add update_durations class op to allow override of chip supplied values
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v6] tpm_crb: fix fTPM on AMD Zen+ CPUs
- From: ivan.lazeev@xxxxxxxxx
- [PATCH 3/7] efi/tpm: Don't access event->count when it isn't mapped.
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 4/7] efi/tpm: don't traverse an event log with no events
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 2/7] efivar/ssdt: don't iterate over EFI vars if no SSDT override was specified
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 6/7] efi: make unexported efi_rci2_sysfs_init static
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 5/7] efi/tpm: only set efi_tpm_final_log_size after successful event log parsing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 7/7] efi/x86: do not clean dummy variable in kexec path
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 1/7] efi: cper: Fix endianness of PCIe class code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [GIT PULL 0/7] EFI fixes for v5.4
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2,RESEND] tpm: Detach page allocation from tpm_buf
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH 3/3] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH 3/3] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/3] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH 2/3] tpm: use tpm_try_get_ops() in tpm-sysfs.c.
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH 1/3] tpm: migrate pubek_show to struct tpm_buf
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH 0/3] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Detach page allocation from tpm_buf
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Detach page allocation from tpm_buf
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2,RESEND] tpm: Detach page allocation from tpm_buf
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v2] tpm: Detach page allocation from tpm_buf
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 3/9] powerpc: add support to initialize ima policy rules
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v4 4/4] powerpc: load firmware trusted keys/hashes into kernel keyring
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v4 0/4] powerpc: expose secure variables to the kernel and userspace
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v4 3/4] x86/efi: move common keyring handler functions to new file
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v4 2/4] powerpc: expose secure variables to userspace via sysfs
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v4 1/4] powerpc/powernv: Add OPAL API interface to access secure variable
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH] sysfs: Fixes __BIN_ATTR_WO() macro
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/4] tpm: add update_durations class op to allow override of chip supplied values
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Detach page allocation from tpm_buf
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] sysfs: add BIN_ATTR_WO() macro
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] sysfs: add BIN_ATTR_WO() macro
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] sysfs: add BIN_ATTR_WO() macro
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH AUTOSEL 5.3 03/71] ima: fix freeing ongoing ahash_request
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.3 02/71] ima: always return negative code for error
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.2 02/63] ima: always return negative code for error
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.2 03/63] ima: fix freeing ongoing ahash_request
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 02/43] ima: fix freeing ongoing ahash_request
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 01/43] ima: always return negative code for error
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 01/29] ima: always return negative code for error
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 01/19] ima: always return negative code for error
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.4 01/15] ima: always return negative code for error
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v6 1/9] dt-bindings: ibm,secureboot: secure boot specific properties for PowerNV
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 3/9] powerpc: add support to initialize ima policy rules
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 1/9] dt-bindings: ibm,secureboot: secure boot specific properties for PowerNV
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: bluez: NULL pointer dereference in bluetooth-meshd org.bluez.mesh.Network1.Join
- From: Matthias Gerstner <mgerstner@xxxxxxx>
- bluez: NULL pointer dereference in bluetooth-meshd org.bluez.mesh.Network1.Join
- From: Matthias Gerstner <mgerstner@xxxxxxx>
- Re: [PATCH v6 3/9] powerpc: add support to initialize ima policy rules
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v6 5/9] powerpc/ima: add measurement rules to ima arch specific policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v4 0/4] tpm: add update_durations class op to allow override of chip supplied values
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] tpm: Detach page allocation from tpm_buf
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [GIT PULL] integrity subsystem updates for v5.4
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [GIT PULL] integrity subsystem updates for v5.4
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Detach page allocation from tpm_buf
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] tpm: only set efi_tpm_final_log_size after successful event log parsing
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] efi+tpm: Don't access event->count when it isn't mapped.
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] efi+tpm: Don't access event->count when it isn't mapped.
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5] tpm_crb: fix fTPM on AMD Zen+ CPUs
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v6 9/9] powerpc/ima: update ima arch policy to check for blacklist
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v6 8/9] ima: deprecate permit_directio, instead use appraise_flag
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v6 7/9] ima: check against blacklisted hashes for files with modsig
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v6 6/9] ima: make process_buffer_measurement() non static
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v6 5/9] powerpc/ima: add measurement rules to ima arch specific policy
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v6 4/9] powerpc: detect the trusted boot state of the system
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v6 3/9] powerpc: add support to initialize ima policy rules
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v6 1/9] dt-bindings: ibm,secureboot: secure boot specific properties for PowerNV
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v6 2/9] powerpc: detect the secure boot mode of the system
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v6 0/9] powerpc: Enabling IMA arch specific secure boot policies
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Detach page allocation from tpm_buf
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH] tpm: Detach page allocation from tpm_buf
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH] KEYS: asym_tpm: Switch to get_random_bytes()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Detach page allocation from tpm_buf
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Detach page allocation from tpm_buf
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v5] tpm_crb: fix fTPM on AMD Zen+ CPUs
- From: ivan.lazeev@xxxxxxxxx
- Re: [PATCH v3] tpm: only set efi_tpm_final_log_size after successful event log parsing
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [GIT PULL] tpmdd fixes for Linux v5.4-rc1
- From: pr-tracker-bot@xxxxxxxxxx
- [PATCH v3] tpm: only set efi_tpm_final_log_size after successful event log parsing
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v2 1/2] efi+tpm: Don't access event->count when it isn't mapped.
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v2 1/2] efi+tpm: Don't access event->count when it isn't mapped.
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v2 1/2] efi+tpm: Don't access event->count when it isn't mapped.
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Detach page allocation from tpm_buf
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v2] tpm: only set efi_tpm_final_log_size after successful event log parsing
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [PATCH] tpm: Detach page allocation from tpm_buf
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 02/12] tpm-buf: add handling for TPM2B types
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 02/12] tpm-buf: add handling for TPM2B types
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH] tpm: only set efi_tpm_final_log_size after successful event log parsing
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH] tpm: only set efi_tpm_final_log_size after successful event log parsing
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] efi+tpm: Don't access event->count when it isn't mapped.
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 2/2] efi+tpm: don't traverse an event log with no events
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v2 1/2] efi+tpm: Don't access event->count when it isn't mapped.
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH 3/3] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH 2/3] tpm: use tpm_try_get_ops() in tpm-sysfs.c.
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH 1/3] tpm: migrate pubek_show to struct tpm_buf
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH 0/3] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [Patch v6 4/4] KEYS: trusted: Move TPM2 trusted keys code
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [GIT PULL] tpmdd fixes for Linux v5.4-rc1
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: ima_tpm_chip is queried and saved only at IMA init, but never later
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- ima_tpm_chip is queried and saved only at IMA init, but never later
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v1 1/1] Add support for arm64 to carry ima measurement log in kexec_file_load
- From: prsriva <prsriva@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v1 1/1] Add support for arm64 to carry ima measurement log in kexec_file_load
- From: prsriva <prsriva@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/3] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH 2/3] tpm: use tpm_try_get_ops() in tpm-sysfs.c.
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH 1/3] tpm: migrate pubek_show to struct tpm_buf
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH 0/3] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 05/12] tpm2-sessions: Add full HMAC and encrypt/decrypt session handling
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 02/12] tpm-buf: add handling for TPM2B types
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] tpm: only set efi_tpm_final_log_size after successful event log parsing
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [RFC PATCH] tpm: only set efi_tpm_final_log_size after successful event log parsing
- From: Laura Abbott <labbott@xxxxxxxxxx>
- [PATCH v7 0/6] tpm: Add driver for cr50
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- [PATCH v7 4/6] tpm: tpm_tis_spi: Support cr50 devices
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- [PATCH v7 6/6] tpm: tpm_tis_spi: Drop THIS_MODULE usage from driver struct
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- [PATCH v7 5/6] tpm: tpm_tis_spi: Cleanup includes
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- [PATCH v7 3/6] tpm: tpm_tis_spi: Introduce a flow control callback
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- [PATCH v7 1/6] dt-bindings: tpm: document properties for cr50
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- [PATCH v7 2/6] tpm: Add a flag to indicate TPM power is managed by firmware
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [PATCH v6 01/12] tpm-buf: move from static inlines to real functions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] keys: Add Jarkko Sakkinen as co-maintainer
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4] tpm_crb: fix fTPM on AMD Zen+ CPUs
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 05/12] tpm2-sessions: Add full HMAC and encrypt/decrypt session handling
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 05/12] tpm2-sessions: Add full HMAC and encrypt/decrypt session handling
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 02/12] tpm-buf: add handling for TPM2B types
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 01/12] tpm-buf: move from static inlines to real functions
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 01/12] tpm-buf: move from static inlines to real functions
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v1 1/1] Add support for arm64 to carry ima measurement log in kexec_file_load
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [RFC PATCH v1 1/1] Add support for arm64 to carry ima measurement log in kexec_file_load
- From: Prakhar Srivastava <prsriva@xxxxxxxxxxxxxxxxxxx>
- Re: unable to handle page fault in 5.3-rc[12]
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH 0/1] KEYS: Measure keys in trusted keyring
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 0/1] KEYS: Measure keys in trusted keyring
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: IMA on remote file systems
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: [RFC PATCH v1 1/1] Add support for arm64 to carry ima measurement log in kexec_file_load
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [RFC PATCH v1 1/1] Add support for arm64 to carry ima measurement log in kexec_file_load
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH] tpm: only set efi_tpm_final_log_size after successful event log parsing
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [RFC PATCH] tpm: only set efi_tpm_final_log_size after successful event log parsing
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Platform Security Summit 2019, Oct 1-3, Redmond, WA
- From: Rich Persaud <persaur@xxxxxxxxx>
- Re: IMA on remote file systems
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: IMA on remote file systems
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: IMA on remote file systems
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v1 1/1] Add support for arm64 to carry ima measurement log in kexec_file_load
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: IMA on remote file systems
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: IMA on remote file systems
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: unable to handle page fault in 5.3-rc[12]
- From: Patrick Uiterwijk <puiterwijk@xxxxxxxxxx>
- Re: unable to handle page fault in 5.3-rc[12]
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [Patch v6 4/4] KEYS: trusted: Move TPM2 trusted keys code
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: unable to handle page fault in 5.3-rc[12]
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: IMA on remote file systems
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: unable to handle page fault in 5.3-rc[12]
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v4] tpm_crb: fix fTPM on AMD Zen+ CPUs
- From: Vanya Lazeev <ivan.lazeev@xxxxxxxxx>
- Re: [PATCH] tpm: Wrap the buffer from the caller to tpm_buf in tpm_send()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4] tpm_crb: fix fTPM on AMD Zen+ CPUs
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [Patch v6 4/4] KEYS: trusted: Move TPM2 trusted keys code
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [Patch v6 4/4] KEYS: trusted: Move TPM2 trusted keys code
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: IMA on remote file systems
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: IMA on remote file systems
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: IMA on remote file systems
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH 1/3] ima: keep the integrity state of open files up to date
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: IMA on remote file systems
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: [PATCH 1/3] ima: keep the integrity state of open files up to date
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [GIT PULL] integrity subsystem updates for v5.4
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for Linux v5.4
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH] tpm: Wrap the buffer from the caller to tpm_buf in tpm_send()
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] tpm: Wrap the buffer from the caller to tpm_buf in tpm_send()
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [GIT PULL] integrity subsystem updates for v5.4
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] tpm_crb: fix fTPM on AMD Zen+ CPUs
- From: Vanya Lazeev <ivan.lazeev@xxxxxxxxx>
- Re: LPC System Boot and Security Microconference (subject change)
- From: Piotr Król <piotr.krol@xxxxxxxxx>
- Re: [PATCH] MAINTAINERS: Add a git and a maintainer entry to keyring subsystems
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: IMA on remote file systems
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- Re: IMA on remote file systems
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: IMA on remote file systems
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- Re: [PATCH] selftest/trustedkeys: TPM 1.2 trusted keys test
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] selftest/trustedkeys: TPM 1.2 trusted keys test
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: LPC System Boot and Security Microconference (subject change)
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: IMA on remote file systems
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: LPC System Boot and Security Microconference (subject change)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] selftest/trustedkeys: TPM 1.2 trusted keys test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] ima: keep the integrity state of open files up to date
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: [PATCH] selftest/trustedkeys: TPM 1.2 trusted keys test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] selftest/trustedkeys: TPM 1.2 trusted keys test
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [Patch v6 4/4] KEYS: trusted: Move TPM2 trusted keys code
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [Patch v6 3/4] KEYS: trusted: Create trusted keys subsystem
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [Patch v6 2/4] KEYS: Use common tpm_buf for trusted and asymmetric keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [Patch v6 1/4] tpm: Move tpm_buf code to include/linux/
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [Patch v6 0/4] Create and consolidate trusted keys subsystem
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH] tpm: Fix tpm_send() length calculation
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2] Fix fTPM on AMD Zen+ CPUs
- From: Seunghun Han <kkamagui@xxxxxxxxx>
- Re: [PATCH v2] Fix fTPM on AMD Zen+ CPUs
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: Add a git and a maintainer entry to keyring subsystems
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH] tpm: Wrap the buffer from the caller to tpm_buf in tpm_send()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] tpm: tpm_crb: enhance resource mapping mechanism for supporting AMD's fTPM
- From: Seunghun Han <kkamagui@xxxxxxxxx>
- Re: [PATCH v2 2/2] tpm: tpm_crb: enhance resource mapping mechanism for supporting AMD's fTPM
- From: Seunghun Han <kkamagui@xxxxxxxxx>
- Re: [PATCH] selftest/trustedkeys: TPM 1.2 trusted keys test
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] selftest/trustedkeys: TPM 1.2 trusted keys test
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Fix tpm_send() length calculation
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] selftest/trustedkeys: TPM 1.2 trusted keys test
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH] tpm: Fix tpm_send() length calculation
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] selftest/trustedkeys: TPM 1.2 trusted keys test
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4] tpm_crb: fix fTPM on AMD Zen+ CPUs
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] Fix fTPM on AMD Zen+ CPUs
- From: Seunghun Han <kkamagui@xxxxxxxxx>
- Re: [PATCH v4] tpm_crb: fix fTPM on AMD Zen+ CPUs
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] selftest/trustedkeys: TPM 1.2 trusted keys test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: IMA on remote file systems
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: KEYS-TRUSTED git
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] selftest/trustedkeys: TPM 1.2 trusted keys test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] ima: keep the integrity state of open files up to date
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH AUTOSEL 4.19 126/167] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v4] tpm_crb: fix fTPM on AMD Zen+ CPUs
- From: ivan.lazeev@xxxxxxxxx
- Re: [RESEND PATCH] MAINTAINERS: keys: Update path to trusted.h
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4] KEYS: trusted: correctly initialize digests and fix locking issue
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: Add a git and a maintainer entry to keyring subsystems
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: Add a git and a maintainer entry to keyring subsystems
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [RFC PATCH v1 1/1] Add support for arm64 to carry ima measurement log in kexec_file_load
- From: Prakhar Srivastava <prsriva@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v1 0/1] Add support for arm64 to carry ima measurement log in kexec_file_load
- From: Prakhar Srivastava <prsriva@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4] KEYS: trusted: correctly initialize digests and fix locking issue
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: Add a git and a maintainer entry to keyring subsystems
- From: Joe Perches <joe@xxxxxxxxxxx>
- [PATCH] security: ima: make use of kmemdup
- From: Saiyam Doshi <saiyamdoshi.in@xxxxxxxxx>
- Re: [PATCH] MAINTAINERS: Add a git and a maintainer entry to keyring subsystems
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: IMA on remote file systems
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- Re: [PATCH] selftest/trustedkeys: TPM 1.2 trusted keys test
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] Fix fTPM on AMD Zen+ CPUs
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] Fix fTPM on AMD Zen+ CPUs
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] selftests/tpm2: Add log and *.pyc to .gitignore
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Call tpm_put_ops() when the validation for @digests fails
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] selftests/tpm2: Add the missing TEST_FILES assignment
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: KEYS-TRUSTED git
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] tpm: tpm_crb: enhance resource mapping mechanism for supporting AMD's fTPM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: KEYS-TRUSTED git
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [GIT PULL] integrity subsystem updates for v5.4
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] selftest/trustedkeys: TPM 1.2 trusted keys test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: KEYS-TRUSTED git
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: KEYS-TRUSTED git
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v6 00/12] add integrity and security to TPM2 transactions
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: KEYS-TRUSTED git
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH] selftests/tpm2: Add log and *.pyc to .gitignore
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: KEYS-TRUSTED git
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: KEYS-TRUSTED git
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] selftests/tpm2: Add the missing TEST_FILES assignment
- From: Petr Vorel <petr.vorel@xxxxxxxxx>
- Re: [PATCH v6 00/12] add integrity and security to TPM2 transactions
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH AUTOSEL 4.19 126/167] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v2] Fix fTPM on AMD Zen+ CPUs
- From: Seunghun Han <kkamagui@xxxxxxxxx>
- Re: [PATCH] selftest/trustedkeys: TPM 1.2 trusted keys test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] selftest/trustedkeys: TPM 1.2 trusted keys test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] selftests/tpm2: Add the missing TEST_FILES assignment
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 00/12] add integrity and security to TPM2 transactions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 00/12] add integrity and security to TPM2 transactions
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] tpm: tpm_crb: enhance resource mapping mechanism for supporting AMD's fTPM
- From: Seunghun Han <kkamagui@xxxxxxxxx>
- Re: [PATCH v2 1/2] tpm: tpm_crb: enhance command and response buffer size calculation code
- From: Seunghun Han <kkamagui@xxxxxxxxx>
- Re: [PATCH] tpm: Call tpm_put_ops() when the validation for @digests fails
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v2 2/2] tpm: tpm_crb: enhance resource mapping mechanism for supporting AMD's fTPM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] tpm: tpm_crb: enhance resource mapping mechanism for supporting AMD's fTPM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH] MAINTAINERS: Add a git and a maintainer entry to keyring subsystems
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] KEYS: trusted: correctly initialize digests and fix locking issue
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH] tpm: Call tpm_put_ops() when the validation for @digests fails
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: KEYS-TRUSTED git
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] tpm: tpm_crb: enhance command and response buffer size calculation code
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_crb: fix fTPM on AMD Zen+ CPUs
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: KEYS-TRUSTED git
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [RESEND PATCH] MAINTAINERS: keys: Update path to trusted.h
- From: Denis Efremov <efremov@xxxxxxxxx>
- Re: KEYS-TRUSTED git
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] ima: keep the integrity state of open files up to date
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: KEYS-TRUSTED git
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [RFC][PATCH 1/1] Carry ima measurement log for arm64 via kexec_file_load
- From: prsriva <prsriva@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] ima: keep the integrity state of open files up to date
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 0/1] KEYS: Measure keys in trusted keyring
- From: James Morris <jmorris@xxxxxxxxx>
- Re: KEYS-TRUSTED git
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: KEYS-TRUSTED git
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: KEYS-TRUSTED git
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: KEYS-TRUSTED git
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH AUTOSEL 4.19 126/167] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/1] KEYS: Measure keys in trusted keyring
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v6 12/12] tpm2-sessions: NOT FOR COMMITTING add sessions testing
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 11/12] Documentation: add tpm-security.rst
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 10/12] tpm: add the null key name as a tpm2 sysfs variable
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 09/12] trusted keys: Add session encryption protection to the seal/unseal path
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 08/12] tpm2: add session encryption protection to tpm2_get_random()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 07/12] tpm2: add hmac checks to tpm2_pcr_extend()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 06/12] tpm-buf: add tpm_buf_parameters()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 05/12] tpm2-sessions: Add full HMAC and encrypt/decrypt session handling
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 04/12] tpm2-space: export the context save and load commands
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 03/12] tpm-buf: add cursor based functions for response parsing
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 02/12] tpm-buf: add handling for TPM2B types
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 01/12] tpm-buf: move from static inlines to real functions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 00/12] add integrity and security to TPM2 transactions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/5] integrity: remove unneeded, broken attempt to add -fshort-wchar
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- Re: [PATCH 2/5] integrity: remove pointless subdir-$(CONFIG_...)
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- Re: KEYS-TRUSTED git
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 2/2] tpm: tpm_crb: enhance resource mapping mechanism for supporting AMD's fTPM
- From: Seunghun Han <kkamagui@xxxxxxxxx>
- [PATCH v2 1/2] tpm: tpm_crb: enhance command and response buffer size calculation code
- From: Seunghun Han <kkamagui@xxxxxxxxx>
- [PATCH v2 0/2] Enhance support for the AMD's fTPM
- From: Seunghun Han <kkamagui@xxxxxxxxx>
- Re: KEYS-TRUSTED git
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [RFC][PATCH 1/1] Carry ima measurement log for arm64 via kexec_file_load
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3] KEYS: trusted: correctly initialize digests and fix locking issue
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH 3/3] ima: update the file measurement on writes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] ima: keep the integrity state of open files up to date
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] ima: update the file measurement on truncate
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: KEYS-TRUSTED git
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- KEYS-TRUSTED git
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_crb: fix fTPM on AMD Zen+ CPUs
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH AUTOSEL 4.19 126/167] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH] tpm_crb: fix fTPM on AMD Zen+ CPUs
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis_core: Set TPM_CHIP_FLAG_IRQ before probing for interrupts
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: correctly initialize digests and fix locking issue
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: correctly initialize digests and fix locking issue
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH AUTOSEL 4.19 126/167] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5] tpm: Parse event log from TPM2 ACPI table
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 4/4] tpm: tpm_tis_spi: Support cr50 devices
- From: Heiko Stübner <heiko@xxxxxxxxx>
- Re: [PATCH v6 4/4] tpm: tpm_tis_spi: Support cr50 devices
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH AUTOSEL 4.19 126/167] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC][PATCH 1/1] Carry ima measurement log for arm64 via kexec_file_load
- From: prsriva <prsriva@xxxxxxxxxxxxxxxxxxx>
- Re: TPM 2.0 Linux sysfs interface
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH] tpm_tis_core: Set TPM_CHIP_FLAG_IRQ before probing for interrupts
- From: Jan Lübbe <jlu@xxxxxxxxxxxxxx>
- RE: [PATCH v2 0/2] char: tpm: add new driver for tpm i2c ptp
- From: Benoit HOUYERE <benoit.houyere@xxxxxx>
- Re: [PATCH v5 2/2] powerpc: Add support to initialize ima policy rules
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/2] powerpc: detect the secure boot mode of the system
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/4] x86/efi: move common keyring handler functions to new file
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: TPM 2.0 Linux sysfs interface
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: TPM 2.0 Linux sysfs interface
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH] tpm_crb: fix fTPM on AMD Zen+ CPUs
- From: ivan.lazeev@xxxxxxxxx
- [PATCH v2] KEYS: trusted: correctly initialize digests and fix locking issue
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH] KEYS: trusted: correctly initialize digests and fix locking issue
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH] sysfs: add BIN_ATTR_WO() macro
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: TPM 2.0 Linux sysfs interface
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: TPM 2.0 Linux sysfs interface
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: TPM 2.0 Linux sysfs interface
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 4/4] powerpc: load firmware trusted keys/hashes into kernel keyring
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 3/4] x86/efi: move common keyring handler functions to new file
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: TPM 2.0 Linux sysfs interface
- From: Jordan Hand <jorhand@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH AUTOSEL 4.19 126/167] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v4] tpm: Parse event log from TPM2 ACPI table
- From: Jordan Hand <jorhand@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5] tpm: Parse event log from TPM2 ACPI table
- From: Jordan Hand <jorhand@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] tpm: tpm_crb: enhance resource mapping mechanism for supporting AMD's fTPM
- From: Seunghun Han <kkamagui@xxxxxxxxx>
- Re: [PATCH v4] tpm: Parse event log from TPM2 ACPI table
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH 2/2] tpm: tpm_crb: enhance resource mapping mechanism for supporting AMD's fTPM
- From: Seunghun Han <kkamagui@xxxxxxxxx>
- Re: [PATCH 2/2] tpm: tpm_crb: enhance resource mapping mechanism for supporting AMD's fTPM
- From: Seunghun Han <kkamagui@xxxxxxxxx>
- Re: [PATCH AUTOSEL 4.19 126/167] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v6 4/4] tpm: tpm_tis_spi: Support cr50 devices
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [PATCH AUTOSEL 4.19 126/167] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Doug Anderson <dianders@xxxxxxxxxxxx>
- Re: [PATCH v6 4/4] tpm: tpm_tis_spi: Support cr50 devices
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH AUTOSEL 4.19 126/167] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 062/167] tpm: Fix some name collisions with drivers/char/tpm.h
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: TPM 2.0 Linux sysfs interface
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: TPM 2.0 Linux sysfs interface
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] tpm: tpm_crb: enhance resource mapping mechanism for supporting AMD's fTPM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] tpm: tpm_crb: enhance resource mapping mechanism for supporting AMD's fTPM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 3/3] tpm_tis: override durations for STM tpm with firmware 1.2.8.28
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/1] KEYS: Measure keys in trusted keyring
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/3] tpm: provide a way to override the chip returned durations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: TPM 2.0 Linux sysfs interface
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: TPM 2.0 Linux sysfs interface
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH 2/2] tpm: tpm_crb: enhance resource mapping mechanism for supporting AMD's fTPM
- From: "Safford, David (GE Global Research, US)" <david.safford@xxxxxx>
- Re: TPM 2.0 Linux sysfs interface
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] tpm: tpm_crb: enhance resource mapping mechanism for supporting AMD's fTPM
- From: Seunghun Han <kkamagui@xxxxxxxxx>
- Re: [PATCH 2/2] tpm: tpm_crb: enhance resource mapping mechanism for supporting AMD's fTPM
- From: Seunghun Han <kkamagui@xxxxxxxxx>
- Re: TPM 2.0 Linux sysfs interface
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] sysfs: add BIN_ATTR_WO() macro
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] tpm: tpm_crb: enhance resource mapping mechanism for supporting AMD's fTPM
- From: Seunghun Han <kkamagui@xxxxxxxxx>
- Re: [PATCH 1/1] KEYS: Measure keys in trusted keyring
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: TPM 2.0 Linux sysfs interface
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: TPM 2.0 Linux sysfs interface
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v6 4/4] tpm: tpm_tis_spi: Support cr50 devices
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v6 4/4] tpm: tpm_tis_spi: Support cr50 devices
- From: kbuild test robot <lkp@xxxxxxxxx>
- [GIT PULL] tpmdd updates for Linux v5.4
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v4 2/3] tpm: provide a way to override the chip returned durations
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [PATCH v4 1/3] tpm: Remove duplicate code from caps_show() in tpm-sysfs.c
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [PATCH v4 3/3] tpm_tis: override durations for STM tpm with firmware 1.2.8.28
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [PATCH v4 0/4] tpm: add update_durations class op to allow override of chip supplied values
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [RESEND][PATCH v2-resend] MAINTAINERS: fix style in KEYS-TRUSTED entry
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] tpm: tpm_crb: enhance resource mapping mechanism for supporting AMD's fTPM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4] tpm: Parse event log from TPM2 ACPI table
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Remove duplicate code from caps_show() in tpm-sysfs.c
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v2] tpm: Remove duplicate code from caps_show() in tpm-sysfs.c
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] ima: keep the integrity state of open files up to date
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v3 3/4] x86/efi: move common keyring handler functions to new file
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v5 2/2] powerpc: Add support to initialize ima policy rules
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v5 1/2] powerpc: detect the secure boot mode of the system
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] ima: keep the integrity state of open files up to date
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH 3/3] ima: update the file measurement on writes
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- [PATCH 2/3] ima: update the file measurement on truncate
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- [PATCH 1/3] ima: keep the integrity state of open files up to date
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: [RFC/RFT v4 5/5] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH] ima-evm-utils: Fix possible DIR leak in find
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH 2/2] tpm: tpm_crb: enhance resource mapping mechanism for supporting AMD's fTPM
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v4] tpm: Parse event log from TPM2 ACPI table
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH v4] tpm: Parse event log from TPM2 ACPI table
- From: Jordan Hand <jorhand@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3] tpm: Parse event log from TPM2 ACPI table
- From: Jordan Hand <jorhand@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC][PATCH 1/1] Carry ima measurement log for arm64 via kexec_file_load
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [RFC][PATCH 1/1] Carry ima measurement log for arm64 via kexec_file_load
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH 1/3 v3] tpm: Remove duplicate code from caps_show() in tpm-sysfs.c
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: TPM 2.0 Linux sysfs interface
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 0/1] KEYS: Measure keys in trusted keyring
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 2/2] tpm: tpm_crb: enhance resource mapping mechanism for supporting AMD's fTPM
- From: "Safford, David (GE Global Research, US)" <david.safford@xxxxxx>
- Re: [RFC/RFT v4 5/5] KEYS: trusted: Add generic trusted keys framework
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC/RFT v4 5/5] KEYS: trusted: Add generic trusted keys framework
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Fix interrupt probing
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] tpm: tpm_crb: enhance resource mapping mechanism for supporting AMD's fTPM
- From: Seunghun Han <kkamagui@xxxxxxxxx>
- Re: [PATCH 2/2] tpm: tpm_crb: enhance resource mapping mechanism for supporting AMD's fTPM
- From: Seunghun Han <kkamagui@xxxxxxxxx>
- Re: [PATCH] tpm: Remove duplicate code from caps_show() in tpm-sysfs.c
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [PATCH 2/2] tpm: tpm_crb: enhance resource mapping mechanism for supporting AMD's fTPM
- From: "Safford, David (GE Global Research, US)" <david.safford@xxxxxx>
- Re: [PATCH v6 4/4] tpm: tpm_tis_spi: Support cr50 devices
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [PATCH v6 4/4] tpm: tpm_tis_spi: Support cr50 devices
- From: Heiko Stuebner <heiko@xxxxxxxxx>
- Re: [PATCH 2/2] tpm: tpm_crb: enhance resource mapping mechanism for supporting AMD's fTPM
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH 2/2] tpm: tpm_crb: enhance resource mapping mechanism for supporting AMD's fTPM
- From: Seunghun Han <kkamagui@xxxxxxxxx>
- Re: [PATCH 2/2] tpm: tpm_crb: enhance resource mapping mechanism for supporting AMD's fTPM
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] x86: tpm: Remove a busy bit of the NVS area for supporting AMD's fTPM
- From: Seunghun Han <kkamagui@xxxxxxxxx>
- [PATCH 2/2] tpm: tpm_crb: enhance resource mapping mechanism for supporting AMD's fTPM
- From: Seunghun Han <kkamagui@xxxxxxxxx>
- [PATCH 1/2] tpm: tpm_crb: enhance command and response buffer size calculation code
- From: Seunghun Han <kkamagui@xxxxxxxxx>
- [PATCH 0/2] Enhance support for the AMD's fTPM
- From: Seunghun Han <kkamagui@xxxxxxxxx>
- Re: [RFC/RFT v4 5/5] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [RFC][PATCH 1/1] Carry ima measurement log for arm64 via kexec_file_load
- From: Stephen Boyd <sboyd@xxxxxxxxxx>
- Re: [PATCH 0/1] KEYS: Measure keys in trusted keyring
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Fix interrupt probing
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH] tpm_tis_core: Set TPM_CHIP_FLAG_IRQ before probing for interrupts
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 1/4] dt-bindings: tpm: document properties for cr50
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- [PATCH v6 4/4] tpm: tpm_tis_spi: Support cr50 devices
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- [PATCH v6 3/4] tpm: tpm_tis_spi: Introduce a flow control callback
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- [PATCH v6 2/4] tpm: Add a flag to indicate TPM power is managed by firmware
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- [PATCH v6 0/4] tpm: Add driver for cr50
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [PATCH 3/3 v3] tpm_tis: override durations for STM tpm with firmware 1.2.8.28
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/3 v3] tpm: provide a way to override the chip returned durations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2 v2] tpm_tis: override durations for STM tpm with firmware 1.2.8.28
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH 2/3 v3] tpm: provide a way to override the chip returned durations
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [PATCH 3/3 v3] tpm_tis: override durations for STM tpm with firmware 1.2.8.28
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [PATCH 1/3 v3] tpm: Remove duplicate code from caps_show() in tpm-sysfs.c
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [PATCH 0/3 v3] tpm: add update_durations class op to allow override of chip supplied values
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] tpm: Remove duplicate code from caps_show() in tpm-sysfs.c
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH 2/2 v2] tpm_tis: override durations for STM tpm with firmware 1.2.8.28
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [RFC][PATCH 1/1] Carry ima measurement log for arm64 via kexec_file_load
- From: Prakhar Srivastava <prsriva@xxxxxxxxxxxxxxxxxxx>
- [RFC][PATCH v1 0/1] Carry ima measurement log for arm64 via kexec_file_load
- From: Prakhar Srivastava <prsriva@xxxxxxxxxxxxxxxxxxx>
- [RFC][PATCH 1/1] Carry ima measurement log for arm64 via kexec_file_load
- From: Prakhar Srivastava <prsriva@xxxxxxxxxxxxxxxxxxx>
- [RFC][PATCH v1 0/1] Carry ima measurement log for arm64 via kexec_file_load
- From: Prakhar Srivastava <prsriva@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] tpm: tpm_tis_spi: Support cr50 devices
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2 v2] tpm_tis: override durations for STM tpm with firmware 1.2.8.28
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [PATCH] ima: ima_api: Use struct_size() in kzalloc()
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: [PATCH] ima: use struct_size() in kzalloc()
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] tpm: tpm_tis_spi: Support cr50 devices
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [PATCH] sefltest/ima: support appended signatures (modsig)
- From: Jordan Hand <jorhand@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] tpm: tpm_tis_spi: Support cr50 devices
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/4] tpm: tpm_tis_spi: Introduce a flow control callback
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/4] dt-bindings: tpm: document properties for cr50
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] x86: tpm: Remove a busy bit of the NVS area for supporting AMD's fTPM
- From: Seunghun Han <kkamagui@xxxxxxxxx>
- Re: [PATCH] tpm_tis: Fix interrupt probing
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] x86: tpm: Remove a busy bit of the NVS area for supporting AMD's fTPM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] x86: tpm: Remove a busy bit of the NVS area for supporting AMD's fTPM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] KEYS: trusted: move tpm2 trusted keys code
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2 v2] tpm_tis: override durations for STM tpm with firmware 1.2.8.28
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2 v2] tpm_tis: override durations for STM tpm with firmware 1.2.8.28
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH] tpm: Remove duplicate code from caps_show() in tpm-sysfs.c
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- RE: [WIP][RFC][PATCH 1/3] security: introduce call_int_hook_and() macro
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH 1/2 v2] tpm: provide a way to override the chip returned durations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Fix interrupt probing
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: TPM 2.0 Linux sysfs interface
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH] ima: use struct_size() in kzalloc()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 0/1] KEYS: Measure keys in trusted keyring
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: TPM 2.0 Linux sysfs interface
- From: Piotr Król <piotr.krol@xxxxxxxxx>
- Re: [PATCH v1] sefltest/ima: support appended signatures (modsig)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v1] sefltest/ima: support appended signatures (modsig)
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH][next] ima: ima_modsig: Fix use-after-free bug in ima_read_modsig
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: [PATCH] ima: use struct_size() in kzalloc()
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: [PATCH] ima: use struct_size() in kzalloc()
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: [PATCH] ima: use struct_size() in kzalloc()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] tpm: tpm_tis_spi: Support cr50 devices
- From: Heiko Stuebner <heiko@xxxxxxxxx>
- Re: [PATCH v5 4/4] tpm: tpm_tis_spi: Support cr50 devices
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [PATCH v5 4/4] tpm: tpm_tis_spi: Support cr50 devices
- From: Heiko Stuebner <heiko@xxxxxxxxx>
- IMA on remote file systems
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- Re: TPM 2.0 Linux sysfs interface
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: TPM 2.0 Linux sysfs interface
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v1] sefltest/ima: support appended signatures (modsig)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: TPM 2.0 Linux sysfs interface
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v1] sefltest/ima: support appended signatures (modsig)
- From: shuah <shuah@xxxxxxxxxx>
- Re: [PATCH] sefltest/ima: support appended signatures (modsig)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v1] sefltest/ima: support appended signatures (modsig)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: TPM 2.0 Linux sysfs interface
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] sefltest/ima: support appended signatures (modsig)
- From: shuah <shuah@xxxxxxxxxx>
- Re: [PATCH][next] ima: ima_modsig: Fix use-after-free bug in ima_read_modsig
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v12 00/11] Appended signatures support for IMA appraisal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] sefltest/ima: support appended signatures (modsig)
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH] sefltest/ima: support appended signatures (modsig)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] x86: tpm: Remove a busy bit of the NVS area for supporting AMD's fTPM
- From: Seunghun Han <kkamagui@xxxxxxxxx>
- [PATCH v5 2/4] tpm: Add a flag to indicate TPM power is managed by firmware
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- [PATCH v5 3/4] tpm: tpm_tis_spi: Introduce a flow control callback
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- [PATCH v5 4/4] tpm: tpm_tis_spi: Support cr50 devices
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- [PATCH v5 1/4] dt-bindings: tpm: document properties for cr50
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- [PATCH v5 0/4] tpm: Add driver for cr50
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [PATCH v5 4/4] KEYS: trusted: move tpm2 trusted keys code
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH 1/2 v2] tpm: provide a way to override the chip returned durations
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [PATCH 2/2 v2] tpm_tis: override durations for STM tpm with firmware 1.2.8.28
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [PATCH 0/2 v2] tpm: add update_durations class op to allow override of chip supplied values
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [PATCH 1/1] KEYS: Measure keys in trusted keyring
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/1] KEYS: Measure keys in trusted keyring
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Fix interrupt probing
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] x86: tpm: Remove a busy bit of the NVS area for supporting AMD's fTPM
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH] x86: tpm: Remove a busy bit of the NVS area for supporting AMD's fTPM
- From: Seunghun Han <kkamagui@xxxxxxxxx>
- Re: [PATCH] x86: tpm: Remove a busy bit of the NVS area for supporting AMD's fTPM
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] x86: tpm: Remove a busy bit of the NVS area for supporting AMD's fTPM
- From: Seunghun Han <kkamagui@xxxxxxxxx>
- Re: [PATCH] tpm_tis: Fix interrupt probing
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] KEYS: trusted: move tpm2 trusted keys code
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/4] KEYS: trusted: create trusted keys subsystem
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/4] tpm: move tpm_buf code to include/linux/
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Fix interrupt probing
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] x86: tpm: Remove a busy bit of the NVS area for supporting AMD's fTPM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] x86: tpm: Remove a busy bit of the NVS area for supporting AMD's fTPM
- From: Seunghun Han <kkamagui@xxxxxxxxx>
- Re: [PATCH] tpm: tpm_crb: Add an AMD fTPM support feature
- From: Seunghun Han <kkamagui@xxxxxxxxx>
- Re: [PATCH] tpm: tpm_crb: Fix an improper buffer size calculation bug
- From: Seunghun Han <kkamagui@xxxxxxxxx>
- Re: TPM 2.0 Linux sysfs interface
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v12 00/11] Appended signatures support for IMA appraisal
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v4 0/6] tpm: Add driver for cr50
- From: Heiko Stuebner <heiko@xxxxxxxxx>
- TPM 2.0 Linux sysfs interface
- From: Piotr Król <piotr.krol@xxxxxxxxx>
- Re: [PATCH v12 00/11] Appended signatures support for IMA appraisal
- From: Jordan Hand <jorhand@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86: tpm: Remove a busy bit of the NVS area for supporting AMD's fTPM
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v3 2/4] powerpc: expose secure variables to userspace via sysfs
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/4] powerpc: expose secure variables to userspace via sysfs
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH] sysfs: add BIN_ATTR_WO() macro
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/4] powerpc: expose secure variables to userspace via sysfs
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/4] powerpc: expose secure variables to userspace via sysfs
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/4] powerpc: expose secure variables to userspace via sysfs
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 4/4] powerpc: load firmware trusted keys/hashes into kernel keyring
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v3 3/4] x86/efi: move common keyring handler functions to new file
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v3 1/4] powerpc/powernv: Add OPAL API interface to access secure variable
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v3 0/4] powerpc: expose secure variables to the kernel and userspace
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v3 2/4] powerpc: expose secure variables to userspace via sysfs
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH] tpm: tpm_crb: Add an AMD fTPM support feature
- From: "Safford, David (GE Global Research, US)" <david.safford@xxxxxx>
- Re: [PATCH] tpm: tpm_crb: Fix an improper buffer size calculation bug
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: tpm_crb: Add an AMD fTPM support feature
- From: Seunghun Han <kkamagui@xxxxxxxxx>
- [PATCH] x86: tpm: Remove a busy bit of the NVS area for supporting AMD's fTPM
- From: Seunghun Han <kkamagui@xxxxxxxxx>
- [PATCH] tpm: tpm_crb: Fix an improper buffer size calculation bug
- From: Seunghun Han <kkamagui@xxxxxxxxx>
- Re: [PATCH] tpm: tpm_crb: Add an AMD fTPM support feature
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RESEND][PATCH v2-resend] MAINTAINERS: fix style in KEYS-TRUSTED entry
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH] tpm: tpm_crb: Add an AMD fTPM support feature
- From: Seunghun Han <kkamagui@xxxxxxxxx>
- [RESEND][PATCH v2-resend] MAINTAINERS: fix style in KEYS-TRUSTED entry
- From: Lukas Bulwahn <lukas.bulwahn@xxxxxxxxx>
- Re: [PATCH v2 0/2] char: tpm: add new driver for tpm i2c ptp
- From: Oshri Alkobi <oshrialkoby85@xxxxxxxxx>
- Re: [PATCH v4 4/6] tpm: tpm_tis_spi: Export functionality to other drivers
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [PATCH v2 1/4] powerpc/powernv: Add OPAL API interface to access secure variable
- From: "Oliver O'Halloran" <oohall@xxxxxxxxx>
- Re: [PATCH v2 2/4] powerpc: expose secure variables to userspace via sysfs
- From: "Oliver O'Halloran" <oohall@xxxxxxxxx>
- Re: [PATCH v2 1/4] powerpc/powernv: Add OPAL API interface to access secure variable
- From: "Oliver O'Halloran" <oohall@xxxxxxxxx>
- Re: [PATCH v4 3/6] tpm: tpm_tis_spi: Add a pre-transfer callback
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [GIT PULL] Keys: Set 4 - Key ACLs for 5.3
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v5 0/4] Create and consolidate trusted keys subsystem
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Fix interrupt probing
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC/RFT v4 1/5] tpm: move tpm_buf code to include/linux/
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC/RFT v4 0/5] Add generic trusted keys framework/subsystem
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 3/6] tpm: tpm_tis_spi: Add a pre-transfer callback
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [GIT PULL] Keys: Set 4 - Key ACLs for 5.3
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/6] tpm: tpm_tis_spi: Introduce a flow control callback
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 4/6] tpm: tpm_tis_spi: Export functionality to other drivers
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/4] powerpc: load firmware trusted keys into kernel keyring
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] x86/efi: move common keyring handler functions to new file
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/4] powerpc: expose secure variables to userspace via sysfs
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] Keys: Set 4 - Key ACLs for 5.3
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 4/4] powerpc: load firmware trusted keys into kernel keyring
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v2 2/4] powerpc: expose secure variables to userspace via sysfs
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v2 3/4] x86/efi: move common keyring handler functions to new file
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v2 0/4] powerpc: expose secure variables to the kernel and userspace
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v2 1/4] powerpc/powernv: Add OPAL API interface to access secure variable
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v5 4/4] KEYS: trusted: move tpm2 trusted keys code
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v5 3/4] KEYS: trusted: create trusted keys subsystem
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v5 2/4] KEYS: trusted: use common tpm_buf for TPM1.x code
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v5 1/4] tpm: move tpm_buf code to include/linux/
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v5 0/4] Create and consolidate trusted keys subsystem
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH] ima-evm-utils: Enable large-file support
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH] ima-evm-utils: Enable large-file support
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- WARNING: lock held when returning to user space!
- From: "Oliver, Dario N" <dario.n.oliver@xxxxxxxxx>
- Re: [PATCH] ima-evm-utils: Change log text of hash in hash_ima
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH] ima-evm-utils: Enable large-file support
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- [PATCH] tpm_tis: Fix interrupt probing
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: Does probing of TIS with interrupts work
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC/RFT v4 4/5] KEYS: trusted: move tpm2 trusted keys code
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [RFC/RFT v4 3/5] KEYS: trusted: create trusted keys subsystem
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [RFC/RFT v4 1/5] tpm: move tpm_buf code to include/linux/
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [RFC/RFT v4 0/5] Add generic trusted keys framework/subsystem
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH V40 25/29] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH] ima-evm-utils: Enable large-file support
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [RFC/RFT v4 1/5] tpm: move tpm_buf code to include/linux/
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 4/6] tpm: tpm_tis_spi: Export functionality to other drivers
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [RFC/RFT v4 4/5] KEYS: trusted: move tpm2 trusted keys code
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 3/6] tpm: tpm_tis_spi: Add a pre-transfer callback
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [RFC/RFT v4 3/5] KEYS: trusted: create trusted keys subsystem
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/6] tpm: tpm_tis_spi: Introduce a flow control callback
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [RFC/RFT v4 3/5] KEYS: trusted: create trusted keys subsystem
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm/tpm_ftpm_tee: trivial checkpatch fixes
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC/RFT v4 2/5] KEYS: trusted: use common tpm_buf for TPM1.x code
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC/RFT v4 0/5] Add generic trusted keys framework/subsystem
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 4/6] tpm: tpm_tis_spi: Export functionality to other drivers
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 3/6] tpm: tpm_tis_spi: Add a pre-transfer callback
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/6] tpm: tpm_tis_spi: Introduce a flow control callback
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [WIP][RFC][PATCH 1/3] security: introduce call_int_hook_and() macro
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm/tpm_ftpm_tee: trivial checkpatch fixes
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v5 2/2] powerpc: Add support to initialize ima policy rules
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v5 1/2] powerpc: detect the secure boot mode of the system
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v5 0/2] powerpc: Enabling IMA arch specific secure boot policies
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [WIP][RFC][PATCH 3/3] security: add infoflow LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [WIP][RFC][PATCH 2/3] lsm notifier: distinguish between state change and policy change
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [WIP][RFC][PATCH 1/3] security: introduce call_int_hook_and() macro
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [WIP][RFC][PATCH 0/3] Introduce Infoflow LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v7] ima-evm-utils: Add some tests for evmctl
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH] ima-evm-utils: Change log text of hash in hash_ima
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v2 1/6] hwrng: core: Freeze khwrng thread during suspend
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RESEND PATCH] MAINTAINERS: keys: Update path to trusted.h
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] char: tpm: add new driver for tpm i2c ptp
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- Re: [PATCH v2 1/6] hwrng: core: Freeze khwrng thread during suspend
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- Re: [GIT PULL] Keys: Set 4 - Key ACLs for 5.3
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC/RFT v4 0/5] Add generic trusted keys framework/subsystem
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [RESEND PATCH] MAINTAINERS: keys: Update path to trusted.h
- From: Denis Efremov <efremov@xxxxxxxxx>
- Re: Bad file pattern in MAINTAINERS section 'KEYS-TRUSTED'
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Does probing of TIS with interrupts work
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm/tpm_ftpm_tee: trivial checkpatch fixes
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] Fix fTPM on AMD Zen+ CPUs
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/6] tpm: Add a flag to indicate TPM power is managed by firmware
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] char: tpm: add new driver for tpm i2c ptp
- From: Oshri Alkobi <oshrialkoby85@xxxxxxxxx>
- Re: [RFC/RFT v4 0/5] Add generic trusted keys framework/subsystem
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [RFC/RFT v4 0/5] Add generic trusted keys framework/subsystem
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v3 4/4] tpm: add driver for cr50 on SPI
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] Fix fTPM on AMD Zen+ CPUs
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC/RFT v4 0/5] Add generic trusted keys framework/subsystem
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [RFC PATCH v5 1/1] Add dm verity root hash pkcs7 sig validation.
- From: Jaskaran Singh Khurana <jaskarankhurana@xxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd fixes for Linux v5.3-rc4
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] tpmdd fixes for Linux v5.3-rc4
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm/tpm_ftpm_tee: trivial checkpatch fixes
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- [PATCH] tpm/tpm_ftpm_tee: trivial checkpatch fixes
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: Does probing of TIS with interrupts work
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [RFC/RFT v3 2/3] KEYS: trusted: move tpm2 trusted keys code
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [RFC/RFT v4 5/5] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [RFC/RFT v4 4/5] KEYS: trusted: move tpm2 trusted keys code
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [RFC/RFT v4 3/5] KEYS: trusted: create trusted keys subsystem
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [RFC/RFT v4 2/5] KEYS: trusted: use common tpm_buf for TPM1.x code
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [RFC/RFT v4 1/5] tpm: move tpm_buf code to include/linux/
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [RFC/RFT v4 0/5] Add generic trusted keys framework/subsystem
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: Bad file pattern in MAINTAINERS section 'KEYS-TRUSTED'
- From: Denis Efremov <efremov@xxxxxxxxx>
- Does probing of TIS with interrupts work
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2] Fix fTPM on AMD Zen+ CPUs
- From: Vanya Lazeev <ivan.lazeev@xxxxxxxxx>
- [PATCH v4 1/6] tpm: Add a flag to indicate TPM power is managed by firmware
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- [PATCH v4 2/6] tpm: tpm_tis_spi: Introduce a flow control callback
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- [PATCH v4 3/6] tpm: tpm_tis_spi: Add a pre-transfer callback
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- [PATCH v4 4/6] tpm: tpm_tis_spi: Export functionality to other drivers
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- [PATCH v4 6/6] tpm: add driver for cr50 on SPI
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- [PATCH v4 5/6] dt-bindings: tpm: document properties for cr50
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- [PATCH v4 0/6] tpm: Add driver for cr50
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [PATCH v3 4/4] tpm: add driver for cr50 on SPI
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [PATCH v3 2/4] tpm: tpm_tis_spi: Export functionality to other drivers
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [PATCH v3 1/4] tpm: Add a flag to indicate TPM power is managed by firmware
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [PATCH v2] Fix fTPM on AMD Zen+ CPUs
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH][next] ima: ima_modsig: Fix use-after-free bug in ima_read_modsig
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- [PATCH v2] Fix fTPM on AMD Zen+ CPUs
- From: ivan.lazeev@xxxxxxxxx
- [PATCH] Fix fTPM on AMD Zen+ CPUs
- From: ivan.lazeev@xxxxxxxxx
- Re: [PATCH v3 4/4] tpm: add driver for cr50 on SPI
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/4] tpm: tpm_tis_spi: Export functionality to other drivers
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/4] tpm: Add a flag to indicate TPM power is managed by firmware
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] KEYS: trusted: allow module init if TPM is inactive or deactivated
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [Tee-dev] [RFC v2 2/6] tee: enable support to register kernel memory
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [Tee-dev] [RFC v2 2/6] tee: enable support to register kernel memory
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- Re: [PATCH v13 2/5] Add flags option to get xattr method paired to __vfs_getxattr
- From: Mark Salyzyn <salyzyn@xxxxxxxxxxx>
- Re: [RFC/RFT v3 2/3] KEYS: trusted: move tpm2 trusted keys code
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 5.3 regression fix] efi-stub: Fix get_efi_config_table on mixed-mode setups
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC/RFT v3 2/3] KEYS: trusted: move tpm2 trusted keys code
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [RFC/RFT v3 1/3] KEYS: trusted: create trusted keys subsystem
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH] ima: Fix a use after free in ima_read_modsig()
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [PATCH] ima: Fix a use after free in ima_read_modsig()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH] ima: Fix a use after free in ima_read_modsig()
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- [PATCH] ima: Fix a use after free in ima_read_modsig()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH 5.3 regression fix] efi-stub: Fix get_efi_config_table on mixed-mode setups
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v8 0/2] fTPM: firmware TPM running in TEE
- From: Sasha Levin <sashal@xxxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]