Linux Integrity
[Prev Page][Next Page]
- [PATCH V38 25/29] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [PATCH 5.3 regression fix] efi-stub: Fix get_efi_config_table on mixed-mode setups
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [integrity:next-queued-testing 2/13] include/linux/module_signature.h:32:2: error: unknown type name 'u8'
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH 5.3 regression fix] efi-stub: Fix get_efi_config_table on mixed-mode setups
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: 5.3 boot regression caused by 5.3 TPM changes
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: 5.3 boot regression caused by 5.3 TPM changes
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: 5.3 boot regression caused by 5.3 TPM changes
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: 5.3 boot regression caused by 5.3 TPM changes
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [RFC/RFT v3 2/3] KEYS: trusted: move tpm2 trusted keys code
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC/RFT v3 1/3] KEYS: trusted: create trusted keys subsystem
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Fwd: [integrity:next-queued-testing 8/13] security/integrity/ima/ima_modsig.c:81:17-20: ERROR: reference preceded by free on line 80
- From: Julia Lawall <Julia.Lawall@xxxxxxx>
- Re: [Tee-dev] [PATCH v8 0/2] fTPM: firmware TPM running in TEE
- From: Rouven Czerwinski <r.czerwinski@xxxxxxxxxxxxxx>
- [PATCH v3 1/4] tpm: Add a flag to indicate TPM power is managed by firmware
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- [PATCH v3 4/4] tpm: add driver for cr50 on SPI
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- [PATCH v3 2/4] tpm: tpm_tis_spi: Export functionality to other drivers
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- [PATCH v3 3/4] dt-bindings: tpm: document properties for cr50
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- [PATCH v3 0/4] tpm: Add driver for cr50
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- [PATCH AUTOSEL 5.2 59/59] tpm: tpm_ibm_vtpm: Fix unallocated banks
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: 5.3 boot regression caused by 5.3 TPM changes
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v2 6/6] tpm: Add driver for cr50 on I2C
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [RFC/RFT v3 2/3] KEYS: trusted: move tpm2 trusted keys code
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [RFC/RFT v3 2/3] KEYS: trusted: move tpm2 trusted keys code
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [RFC/RFT v3 3/3] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [RFC/RFT v3 2/3] KEYS: trusted: move tpm2 trusted keys code
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [RFC/RFT v3 1/3] KEYS: trusted: create trusted keys subsystem
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [RFC/RFT v3 0/3] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v8 0/2] fTPM: firmware TPM running in TEE
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] KEYS: trusted: allow module init if TPM is inactive or deactivated
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: allow module init if TPM is inactive or deactivated
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC/RFT v2 1/2] KEYS: trusted: create trusted keys subsystem
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 0/2] fTPM: firmware TPM running in TEE
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v3] KEYS: trusted: allow module init if TPM is inactive or deactivated
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: allow module init if TPM is inactive or deactivated
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: allow module init if TPM is inactive or deactivated
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3] KEYS: trusted: allow module init if TPM is inactive or deactivated
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: allow module init if TPM is inactive or deactivated
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: allow module init if TPM is inactive or deactivated
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: 5.3 boot regression caused by 5.3 TPM changes
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: allow module init if TPM is inactive or deactivated
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: allow module init if TPM is inactive or deactivated
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH] ima: Allow to import the blacklisted cert signed by secondary CA cert
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v12 01/11] MODSIGN: Export module signature definitions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v12 01/11] MODSIGN: Export module signature definitions
- From: Philipp Rudo <prudo@xxxxxxxxxxxxx>
- Re: [RFC/RFT v2 1/2] KEYS: trusted: create trusted keys subsystem
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [GIT PULL] tpmdd fixes for Linux v5.3-rc2
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] tpmdd fixes for Linux v5.3-rc2
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 0/2] fTPM: firmware TPM running in TEE
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC v2 0/6] Introduce TEE based Trusted Keys support
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: A Request for your Expertise: tpm_crb: probe of MSFT0101:00 failed with error -16
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: 5.3 boot regression caused by 5.3 TPM changes
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: 5.3 boot regression caused by 5.3 TPM changes
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- 5.3 boot regression caused by 5.3 TPM changes
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: allow module init if TPM is inactive or deactivated
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: allow module init if TPM is inactive or deactivated
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/6] hwrng: core: Freeze khwrng thread during suspend
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [PATCH v2 1/6] hwrng: core: Freeze khwrng thread during suspend
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [PATCH v2 5/6] tpm: add driver for cr50 on SPI
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: allow module init if TPM is inactive or deactivated
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxx>
- Re: [PATCH v2 6/6] tpm: Add driver for cr50 on I2C
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 5/6] tpm: add driver for cr50 on SPI
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 5/6] tpm: add driver for cr50 on SPI
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: allow module init if TPM is inactive or deactivated
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: allow module init if TPM is inactive or deactivated
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/6] hwrng: core: Freeze khwrng thread during suspend
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] tpm: Add tpm_tis_i2c backend for tpm_tis_core
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/2] tpm: Make implementation of read16/read32/write32 optional
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 5/6] tpm: add driver for cr50 on SPI
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: allow module init if TPM is inactive or deactivated
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: allow module init if TPM is inactive or deactivated
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC/RFT v2 1/2] KEYS: trusted: create trusted keys subsystem
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Exposing the tpm 2.0 PCRs? (renamed subject)
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 5/6] tpm: add driver for cr50 on SPI
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: allow module init if TPM is inactive or deactivated
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: allow module init if TPM is inactive or deactivated
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: allow module init if TPM is inactive or deactivated
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: allow module init if TPM is inactive or deactivated
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxx>
- Re: [PATCH v2 5/6] tpm: add driver for cr50 on SPI
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v2] KEYS: trusted: allow module init if TPM is inactive or deactivated
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: allow module init if TPM is inactive or deactivated
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: allow module init if TPM is inactive or deactivated
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [RFC/RFT v2 1/2] KEYS: trusted: create trusted keys subsystem
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH] ima: Allow to import the blacklisted cert signed by secondary CA cert
- From: Jia Zhang <zhang.jia@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] ima: Allow to import the blacklisted cert signed by secondary CA cert
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: unable to handle page fault in 5.3-rc[12]
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: Exposing the tpm 2.0 PCRs? (renamed subject)
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v4] tpm: Document UEFI event log quirks
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Exposing the tpm 2.0 PCRs? (renamed subject)
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC/RFT v2 1/2] KEYS: trusted: create trusted keys subsystem
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 0/2] fTPM: firmware TPM running in TEE
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: allow module init if TPM is inactive or deactivated
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 5/6] tpm: add driver for cr50 on SPI
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- unable to handle page fault in 5.3-rc[12]
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [RFC v2 0/6] Introduce TEE based Trusted Keys support
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: [Tee-dev] [RFC v2 0/6] Introduce TEE based Trusted Keys support
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [RFC v2 0/6] Introduce TEE based Trusted Keys support
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [Tee-dev] [RFC v2 0/6] Introduce TEE based Trusted Keys support
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: [RFC v2 0/6] Introduce TEE based Trusted Keys support
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: [Tee-dev] [RFC v2 0/6] Introduce TEE based Trusted Keys support
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [RFC v2 0/6] Introduce TEE based Trusted Keys support
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [Tee-dev] [RFC v2 0/6] Introduce TEE based Trusted Keys support
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: [Tee-dev] [RFC v2 0/6] Introduce TEE based Trusted Keys support
- From: Rouven Czerwinski <r.czerwinski@xxxxxxxxxxxxxx>
- Re: [RFC v2 0/6] Introduce TEE based Trusted Keys support
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: [RFC v2 0/6] Introduce TEE based Trusted Keys support
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- [PATCH] ima: Allow to import the blacklisted cert signed by secondary CA cert
- From: Jia Zhang <zhang.jia@xxxxxxxxxxxxxxxxx>
- [PATCH V37 25/29] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [PATCH v6] ima-evm-utils: Add some tests for evmctl
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- ima-evm-utils: README: fix misspellings
- From: dbaryshkov@xxxxxxxxx
- Re: [PATCH v4] tpm: Document UEFI event log quirks
- From: Jonathan Corbet <corbet@xxxxxxx>
- [PATCH v6] ima-evm-utils: Add some tests for evmctl
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v5] ima-evm-utils: Add some tests for evmctl
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [RFC v2 0/6] Introduce TEE based Trusted Keys support
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v4] ima-evm-utils: Add some tests for evmctl
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC v2 0/6] Introduce TEE based Trusted Keys support
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [RFC v2 0/6] Introduce TEE based Trusted Keys support
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: [RFC v2 0/6] Introduce TEE based Trusted Keys support
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [RFC v2 0/6] Introduce TEE based Trusted Keys support
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: [PATCH v5 12/29] compat_ioctl: move drivers to compat_ptr_ioctl
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [RFC v2 0/6] Introduce TEE based Trusted Keys support
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- [PATCH v4] ima-evm-utils: Add some tests for evmctl
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v3] ima-evm-utils: Add some tests for evmctl
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v5 12/29] compat_ioctl: move drivers to compat_ptr_ioctl
- From: David Miller <davem@xxxxxxxxxxxxx>
- ima-evm-utils: release v1.2.1
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v5 12/29] compat_ioctl: move drivers to compat_ptr_ioctl
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v2 0/2] char: tpm: add new driver for tpm i2c ptp
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- Re: ima-evm-utils: git tagging for release
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: ima-evm-utils: git tagging for release
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: ima-evm-utils: git tagging for release
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [PATCH] ima-evm-utils: Allow EVM verify to determine hash algo
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [PATCH 2/2] ima-evm-utils: Never exit with -1 code
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH 2/2] ima-evm-utils: Never exit with -1 code
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [RFC v2 6/6] MAINTAINERS: Add entry for TEE based Trusted Keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [RFC v2 5/6] doc: keys: Document usage of TEE based Trusted Keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [RFC v2 4/6] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [RFC v2 3/6] tee: add private login method for kernel clients
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [RFC v2 2/6] tee: enable support to register kernel memory
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [RFC v2 1/6] tee: optee: allow kernel pages to register as shm
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [RFC v2 0/6] Introduce TEE based Trusted Keys support
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH 2/2] ima-evm-utils: Never exit with -1 code
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [PATCH 1/2] ima-evm-utils: Fix ima_verify return value on multiple files
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [PATCH] ima-evm-utils: fix trailing chars from configure script
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [PATCH] ima-evm-utils: Fix ima_verify for v1 signatures
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: ima-evm-utils: git tagging for release
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [PATCH v3] ima-evm-utils: Add some tests for evmctl
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- RE: [PATCH v2 0/2] char: tpm: add new driver for tpm i2c ptp
- From: Benoit HOUYERE <benoit.houyere@xxxxxx>
- Re: [PATCH v3] ima-evm-utils: Add some tests for evmctl
- From: Petr Vorel <pvorel@xxxxxxx>
- ima-evm-utils: git tagging for release
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH] ima-evm-utils: limit OPENSSL_init_crypto calls
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC 3/7] tee: add private login method for kernel clients
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [RFC 3/7] tee: add private login method for kernel clients
- From: Jens Wiklander <jens.wiklander@xxxxxxxxxx>
- [PATCH] ima-evm-utils: Allow EVM verify to determine hash algo
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v3] ima-evm-utils: Add some tests for evmctl
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v2] ima-evm-utils: Add some tests for evmctl
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v2] ima-evm-utils: Add some tests for evmctl
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] ima-evm-utils: Add some tests for evmctl
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v2] ima-evm-utils: Add some tests for evmctl
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH] ima-evm-utils: Add some tests for evmctl
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH] ima-evm-utils: Do not load keys from x509 certs if user pass --rsa
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v2] ima-evm-utils: Add some tests for evmctl
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v7 10/17] fs-verity: implement FS_IOC_ENABLE_VERITY ioctl
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- [PATCH] ima-evm-utils: fix trailing chars from configure script
- From: "Bruno E. O. Meneguele" <bmeneg@xxxxxxxxxx>
- Re: SMACK and keys
- From: Martin Townsend <mtownsend1973@xxxxxxxxx>
- [PATCH v2] ima-evm-utils: Add some tests for evmctl
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH 2/2] ima-evm-utils: Never exit with -1 code
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH 1/2] ima-evm-utils: Fix ima_verify return value on multiple files
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v1 4/5] ima-evm-utils: Allow multiple files in ima_verify
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH] ima-evm-utils: Fix ima_verify for v1 signatures
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [RFC PATCH] ima-evm-utils: Add some tests for evmctl
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: SMACK and keys
- From: Martin Townsend <mtownsend1973@xxxxxxxxx>
- Re: [PATCH 4/5] IMA: use obj-y for non-modular objects
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- Re: [PATCH 4/5] IMA: use obj-y for non-modular objects
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 3/5] integrity: use obj-y for non-modular objects
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- [PATCH 0/5] security: integrity: Makefile cleanups
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- [PATCH 5/5] EVM: use obj-y for non-modular objects
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- [PATCH 2/5] integrity: remove pointless subdir-$(CONFIG_...)
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- [PATCH 1/5] integrity: remove unneeded, broken attempt to add -fshort-wchar
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- [PATCH 4/5] IMA: use obj-y for non-modular objects
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- Re: [RFC PATCH] ima-evm-utils: Add some tests for evmctl
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH] ima-evm-utils: Add some tests for evmctl
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [RFC PATCH] ima-evm-utils: Add some tests for evmctl
- From: "Bruno E. O. Meneguele" <bmeneg@xxxxxxxxxx>
- Re: SMACK and keys
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] ima-evm-utils: Add some tests for evmctl
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v2] ima-evm-utils: Namespace some too generic object names
- From: "Bruno E. O. Meneguele" <bmeneg@xxxxxxxxxx>
- Re: SMACK and keys
- From: Martin Townsend <mtownsend1973@xxxxxxxxx>
- Re: [RFC PATCH] ima-evm-utils: Add some tests for evmctl
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] ima-evm-utils: Namespace some too generic object names
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] ima-evm-utils: Do not allow fallback and unknown hash algos
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2] ima-evm-utils: Namespace some too generic object names
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH 1/2] ima-evm-utils: Do not allow fallback and unknown hash algos
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH 2/2] ima-evm-utils: Show used hash algo in verbose mode
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] ima-evm-utils: Do not allow fallback and unknown hash algos
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] ima-evm-utils: functions/arrays define as static
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima-evm-utils: Namespace some too generic function names
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC PATCH] ima-evm-utils: Add some tests for evmctl
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH 2/2] ima-evm-utils: Show used hash algo in verbose mode
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH 1/2] ima-evm-utils: Do not allow fallback and unknown hash algos
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v2] ima-evm-utils: Namespace some too generic object names
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH] ima-evm-utils: Namespace some too generic function names
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: ima-evm-utils: library version
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima-evm-utils: Namespace some too generic function names
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: ima-evm-utils: library version
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima-evm-utils: Namespace some too generic function names
- From: "Bruno E. O. Meneguele" <bmeneg@xxxxxxxxxx>
- [PATCH] ima-evm-utils: Namespace some too generic function names
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: ima-evm-utils: library version
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: ima-evm-utils: library version
- From: "Bruno E. O. Meneguele" <bmeneg@xxxxxxxxxx>
- Re: ima-evm-utils: library version
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Exposing the tpm 2.0 PCRs? (renamed subject)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- ima-evm-utils: library version
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] powerpc: expose secure variables via sysfs
- From: "Oliver O'Halloran" <oohall@xxxxxxxxx>
- Re: [PATCH v1] ima-evm-utils: use tsspcrread to read the TPM 2.0 PCRs
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v3] ima-evm-utils: use tsspcrread to read the TPM 2.0 PCRs
- From: Petr Vorel <pvorel@xxxxxxx>
- Reminder: 1 open syzbot bug in "security/integrity" subsystem
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3 2/2] ima-evm-utils: log unknown keyid's as errors
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v3 2/2] ima-evm-utils: log unknown keyid's as errors
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] ima-evm-utils: log unknown keyid's as errors
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v3 2/2] ima-evm-utils: log unknown keyid's as errors
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v12 01/11] MODSIGN: Export module signature definitions
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] ima-evm-utils: log unknown keyid's as errors
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v3] ima-evm-utils: use tsspcrread to read the TPM 2.0 PCRs
- From: "Bruno E. O. Meneguele" <bmeneg@xxxxxxxxxx>
- [PATCH v3] ima-evm-utils: use tsspcrread to read the TPM 2.0 PCRs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] ima-evm-utils: use tsspcrread to read the TPM 2.0 PCRs
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v2] ima-evm-utils: use tsspcrread to read the TPM 2.0 PCRs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] ima-evm-utils: use tsspcrread to read the TPM 2.0 PCRs
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v2] ima-evm-utils: use tsspcrread to read the TPM 2.0 PCRs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] ima-evm-utils: use tsspcrread to read the TPM 2.0 PCRs
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v2] ima-evm-utils: use tsspcrread to read the TPM 2.0 PCRs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] ima-evm-utils: use tsspcrread to read the TPM 2.0 PCRs
- From: "Bruno E. O. Meneguele" <bmeneg@xxxxxxxxxx>
- Re: [PATCH v1] ima-evm-utils: use tsspcrread to read the TPM 2.0 PCRs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2] ima-evm-utils: use tsspcrread to read the TPM 2.0 PCRs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] powerpc: expose secure variables via sysfs
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1] ima-evm-utils: use tsspcrread to read the TPM 2.0 PCRs
- From: "Bruno E. O. Meneguele" <bmeneg@xxxxxxxxxx>
- Re: [PATCH v1] ima-evm-utils: use tsspcrread to read the TPM 2.0 PCRs
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v1] ima-evm-utils: use tsspcrread to read the TPM 2.0 PCRs
- From: "Bruno E. O. Meneguele" <bmeneg@xxxxxxxxxx>
- Re: SMACK and keys
- From: Martin Townsend <mtownsend1973@xxxxxxxxx>
- ubifs assert when creating a SMACK transmuting directory.
- From: Martin Townsend <mtownsend1973@xxxxxxxxx>
- Re: SMACK and keys
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v1] ima-evm-utils: use tsspcrread to read the TPM 2.0 PCRs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: SMACK and keys
- From: Martin Townsend <mtownsend1973@xxxxxxxxx>
- Re: [PATCH] ima-evm-utils: use tsspcrread to read the TPM 2.0 PCRs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima-evm-utils: use tsspcrread to read the TPM 2.0 PCRs
- From: "Bruno E. O. Meneguele" <bmeneg@xxxxxxxxxx>
- [PATCH v7 04/17] fs: uapi: define verity bit for FS_IOC_GETFLAGS
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v7 10/17] fs-verity: implement FS_IOC_ENABLE_VERITY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v7 11/17] fs-verity: implement FS_IOC_MEASURE_VERITY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v7 12/17] fs-verity: add SHA-512 support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v7 13/17] fs-verity: support builtin file signatures
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v7 03/17] fs-verity: add UAPI header
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v7 05/17] fs-verity: add Kconfig and the helper functions for hashing
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v7 06/17] fs-verity: add inode and superblock fields
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v7 16/17] ext4: update on-disk format documentation for fs-verity
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v7 17/17] f2fs: add fs-verity support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v7 15/17] ext4: add fs-verity read support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v7 14/17] ext4: add basic fs-verity support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v7 09/17] fs-verity: add data verification hooks for ->readpages()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v7 08/17] fs-verity: add the hook for file ->setattr()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v7 07/17] fs-verity: add the hook for file ->open()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v7 01/17] fs-verity: add a documentation file
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v7 02/17] fs-verity: add MAINTAINERS file entry
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v7 00/17] fs-verity: read-only file-based authenticity protection
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: SMACK and keys
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] ima-evm-utils: use tsspcrread to read the TPM 2.0 PCRs
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH] ima-evm-utils: use tsspcrread to read the TPM 2.0 PCRs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] powerpc: expose secure variables via sysfs
- From: "Oliver O'Halloran" <oohall@xxxxxxxxx>
- SMACK and keys
- From: Martin Townsend <mtownsend1973@xxxxxxxxx>
- [PATCH] ima-evm-utils: Show information about x509 cert when loading public key
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v2 5/6] tpm: add driver for cr50 on SPI
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- Re: [PATCH v2 5/6] tpm: add driver for cr50 on SPI
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- Re: [PATCH v4] ima_evm_utils: erroneous "verification failed: 0 (invalid padding)" message
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v4] ima_evm_utils: erroneous "verification failed: 0 (invalid padding)" message
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] ima-evm-utils: Remove not needed argument from verify_hash_v2
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH 1/3] ima-evm-utils: Remove indirect call to subfunctions in verify_hash
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] ima-evm-utils: Remove not needed argument from verify_hash_v2
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] ima-evm-utils: Improve OpenSSL error reporting
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] ima-evm-utils: Remove ERR_load_crypto_strings from read_priv_pkey
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH 3/3] ima-evm-utils: Improve OpenSSL error reporting
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH 2/3] ima-evm-utils: Remove not needed argument from verify_hash_v2
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH 1/3] ima-evm-utils: Remove indirect call to subfunctions in verify_hash
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH V36 25/29] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [PATCH v2 5/6] tpm: add driver for cr50 on SPI
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [PATCH v2 5/6] tpm: add driver for cr50 on SPI
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [PATCH v2 0/2] char: tpm: add new driver for tpm i2c ptp
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- Re: [PATCH v2] ima_evm_utils: erroneous "verification failed: 0 (invalid padding)" message
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC PATCH 1/2] tpm: Make implementation of read16/read32/write32 optional
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- [RFC PATCH 0/2] tpm: Simple implementation of tpm_tis_i2c
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- [RFC PATCH 2/2] tpm: Add tpm_tis_i2c backend for tpm_tis_core
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- Re: [PATCH v2 5/6] tpm: add driver for cr50 on SPI
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- Re: [PATCH v2 5/6] tpm: add driver for cr50 on SPI
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- Re: [PATCH v2] ima_evm_utils: erroneous "verification failed: 0 (invalid padding)" message
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v3 1/2] ima_evm_utils: erroneous "verification failed: 0 (invalid padding)" message
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 2/2] ima-evm-utils: log unknown keyid's as errors
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: [PATCH v2 0/2] char: tpm: add new driver for tpm i2c ptp
- From: <Eyal.Cohen@xxxxxxxxxxx>
- [RFC/RFT v2 2/2] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [RFC/RFT v2 1/2] KEYS: trusted: create trusted keys subsystem
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [RFC/RFT v2 0/2] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [RFC PATCH v7 1/1] Add dm verity root hash pkcs7 sig validation.
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [RFC PATCH v7 1/1] Add dm verity root hash pkcs7 sig validation.
- From: Jaskaran Khurana <jaskarankhurana@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v7 0/1] Add dm verity root hash pkcs7 sig validation.
- From: Jaskaran Khurana <jaskarankhurana@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] ima_evm_utils: erroneous "verification failed: 0 (invalid padding)" message
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v2 5/6] tpm: add driver for cr50 on SPI
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [PATCH v2 5/6] tpm: add driver for cr50 on SPI
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [PATCH v2 5/6] tpm: add driver for cr50 on SPI
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [PATCH v2 5/6] tpm: add driver for cr50 on SPI
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v2 5/6] tpm: add driver for cr50 on SPI
- From: Guenter Roeck <groeck@xxxxxxxxxx>
- Re: [PATCH v2 5/6] tpm: add driver for cr50 on SPI
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [PATCH v2 3/6] tpm_tis_spi: add max xfer size
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [PATCH v2 5/6] tpm: add driver for cr50 on SPI
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v2 5/6] tpm: add driver for cr50 on SPI
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [PATCH v2 5/6] tpm: add driver for cr50 on SPI
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v2 5/6] tpm: add driver for cr50 on SPI
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [PATCH v2 1/6] hwrng: core: Freeze khwrng thread during suspend
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [PATCH v2 5/6] tpm: add driver for cr50 on SPI
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v2 1/6] hwrng: core: Freeze khwrng thread during suspend
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v2 5/6] tpm: add driver for cr50 on SPI
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [PATCH v2 1/6] hwrng: core: Freeze khwrng thread during suspend
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [PATCH v1 0/5] ima-evm-utils: Assorted fixes and improvements
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2 1/6] hwrng: core: Freeze khwrng thread during suspend
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [PATCH v2 6/6] tpm: Add driver for cr50 on I2C
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- Re: [PATCH 2/2] ima_evm_utils: limit duplicate "Failed to open keyfile" messages
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v6 0/1] Add dm verity root hash pkcs7 sig validation.
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH v2 5/6] tpm: add driver for cr50 on SPI
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v2 5/6] tpm: add driver for cr50 on SPI
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- Re: [PATCH v2 1/6] hwrng: core: Freeze khwrng thread during suspend
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v2 3/6] tpm_tis_spi: add max xfer size
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- Re: [PATCH v2 0/2] char: tpm: add new driver for tpm i2c ptp
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- Re: [PATCH v2 1/6] hwrng: core: Freeze khwrng thread during suspend
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] ima_evm_utils: erroneous "verification failed: 0 (invalid padding)" message
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 0/2] [IMA] Measure public keys of BuiltIn Trusted Keys
- From: Lakshmi <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 1/6] hwrng: core: Freeze khwrng thread during suspend
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- [PATCH v2 2/6] tpm_tis_core: add optional max xfer size check
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- [PATCH v2 3/6] tpm_tis_spi: add max xfer size
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- [PATCH v2 6/6] tpm: Add driver for cr50 on I2C
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- [PATCH v2 5/6] tpm: add driver for cr50 on SPI
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- [PATCH v2 4/6] dt-bindings: tpm: document properties for cr50
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- [PATCH v2 0/6] tpm: Add driver for cr50
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [PATCH 2/2] ima_evm_utils: limit duplicate "Failed to open keyfile" messages
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] ima_evm_utils: erroneous "verification failed: 0 (invalid padding)" message
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] ima_evm_utils: limit duplicate "Failed to open keyfile" messages
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH 1/2] ima_evm_utils: erroneous "verification failed: 0 (invalid padding)" message
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH 1/8] tpm: block messages while suspended
- From: Stephen Boyd <swboyd@xxxxxxxxxxxx>
- Re: [RFC PATCH v6 0/1] Add dm verity root hash pkcs7 sig validation.
- From: Jaskaran Singh Khurana <jaskarankhurana@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] tpm: tpm_ibm_vtpm: Fix unallocated banks
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: [PATCH 0/2] [IMA] Measure public keys of BuiltIn Trusted Keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 0/2] [IMA] Measure public keys of BuiltIn Trusted Keys
- From: Lakshmi <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] ima-evm-utils: Fix null dereference from file2bin to memcpy
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v2 1/5] ima-evm-utils: Fix null dereference from file2bin to memcpy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 2/2] ima_evm_utils: limit duplicate "Failed to open keyfile" messages
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 1/2] ima_evm_utils: erroneous "verification failed: 0 (invalid padding)" message
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v6 0/1] Add dm verity root hash pkcs7 sig validation.
- From: Milan Broz <gmazyland@xxxxxxxxx>
- [PATCH v2 5/5] ima-evm-utils: Add more error checking in add_file_hash
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v2 4/5] ima-evm-utils: Fix file2bin stat and fopen relations
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v2 3/5] ima-evm-utils: Fix memory leak in get_password
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v2 2/5] ima-evm-utils: Fix possible xattr_value overflows in calc_evm_hash
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v2 1/5] ima-evm-utils: Fix null dereference from file2bin to memcpy
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v1 2/5] ima-evm-utils: Fix possible strcpy overflow
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v1 4/5] ima-evm-utils: Fix file2bin stat and fopen relations
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH V35 25/29] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [PATCH] tpm_crb - workaround broken ACPI tables
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v1 4/5] ima-evm-utils: Fix file2bin stat and fopen relations
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v1 2/5] ima-evm-utils: Fix possible strcpy overflow
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v1 1/5] ima-evm-utils: Fix null dereference from file2bin to memcpy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: allow module init if TPM is inactive or deactivated
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: possible deadlock in process_measurement
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 0/2] char: tpm: add new driver for tpm i2c ptp
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 0/2] fTPM: firmware TPM running in TEE
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- [PATCH] ima: Remove needless securityfs_remove() calls
- From: luanshi <zhangliguang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_crb - workaround broken ACPI tables
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH] tpm_crb - workaround broken ACPI tables
- From: "Safford, David (GE Global Research, US)" <david.safford@xxxxxx>
- Re: [RFC PATCH] ima: fix ima_file_mmap circular locking dependency
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] fTPM: fix PTR_ERR() usage
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] fTPM: fix PTR_ERR() usage
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [RFC PATCH] ima: fix ima_file_mmap circular locking dependency
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v1 5/5] ima-evm-utils: Add more error checking in add_file_hash
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v1 4/5] ima-evm-utils: Fix file2bin stat and fopen relations
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v1 3/5] ima-evm-utils: Fix memory leak in get_password
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v1 2/5] ima-evm-utils: Fix possible strcpy overflow
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v1 1/5] ima-evm-utils: Fix null dereference from file2bin to memcpy
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [RFC PATCH] ima: fix ima_file_mmap circular locking dependency
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm_crb - workaround broken ACPI tables
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH] tpm_crb - workaround broken ACPI tables
- From: "Safford, David (GE Global Research, US)" <david.safford@xxxxxx>
- Re: [PATCH] tpm_crb - workaround broken ACPI tables
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [RFC PATCH v6 0/1] Add dm verity root hash pkcs7 sig validation.
- From: Jaskaran Singh Khurana <jaskarankhurana@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_crb - workaround broken ACPI tables
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v4] tpm: Document UEFI event log quirks
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] tpm: Document UEFI event log quirks
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] fTPM: fix PTR_ERR() usage
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_crb - workaround broken ACPI tables
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Doug Anderson <dianders@xxxxxxxxxxxx>
- Re: [PATCH v3] tpm: Document UEFI event log quirks
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH v3] tpm: Document UEFI event log quirks
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v2] tpm: Document UEFI event log quirks
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH] tpm_crb - workaround broken ACPI tables
- From: "Safford, David (GE Global Research, US)" <david.safford@xxxxxx>
- Re: [PATCH] tpm: Document UEFI event log quirks
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH] fTPM: fix PTR_ERR() usage
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Away for couple of weeks
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC/RFT] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v8 0/2] fTPM: firmware TPM running in TEE
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] ima-evm-utils: link to libcrypto instead of OpenSSL
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v3] tpm: tpm_ibm_vtpm: Fix unallocated banks
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: possible deadlock in process_measurement
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 0/2] fTPM: firmware TPM running in TEE
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH] tpm_crb - workaround broken ACPI tables
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v3] tpm: tpm_ibm_vtpm: Fix unallocated banks
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Remove a deprecated comments about implicit sysfs locking
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 0/2] fTPM: firmware TPM running in TEE
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH v8 0/2] fTPM: firmware TPM running in TEE
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 2/2] fTPM: add documentation for ftpm driver
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 1/2] fTPM: firmware TPM running in TEE
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Doug Anderson <dianders@xxxxxxxxxxxx>
- Re: possible deadlock in process_measurement
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: allow module init if TPM is inactive or deactivated
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH] tpm_crb - workaround broken ACPI tables
- From: "Safford, David (GE Global Research, US)" <david.safford@xxxxxx>
- Re: [PATCH v1 0/5] ima-evm-utils: Assorted fixes and improvements
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC/RFT] KEYS: trusted: Add generic trusted keys framework
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_crb - workaround broken ACPI tables
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_crb - workaround broken ACPI tables
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: possible deadlock in process_measurement
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: tpm_ibm_vtpm: Fix unallocated banks
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Doug Anderson <dianders@xxxxxxxxxxxx>
- Re: [PATCH] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH] tpm_crb - workaround broken ACPI tables
- From: "Safford, David (GE Global Research, US)" <david.safford@xxxxxx>
- Re: [PATCH] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Doug Anderson <dianders@xxxxxxxxxxxx>
- Re: [PATCH] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
- From: Douglas Anderson <dianders@xxxxxxxxxxxx>
- [PATCH v3] tpm: tpm_ibm_vtpm: Fix unallocated banks
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [PATCH 1/4] ima-evm-utils: link to libcrypto instead of OpenSSL
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH] tpm_crb - workaround broken ACPI tables
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH] tpm_crb - workaround broken ACPI tables
- From: "Safford, David (GE Global Research, US)" <david.safford@xxxxxx>
- Re: possible deadlock in process_measurement
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm_crb - workaround broken ACPI tables
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [GIT PULL] Keys: Set 4 - Key ACLs for 5.3
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [GIT PULL] Keys: Set 4 - Key ACLs for 5.3
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] Keys: Set 4 - Key ACLs for 5.3
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [GIT PULL] Keys: Set 4 - Key ACLs for 5.3
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [GIT PULL] Keys: Set 4 - Key ACLs for 5.3
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 1/2] fTPM: firmware TPM running in TEE
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Reminder: 2 open syzbot bugs in "security/integrity" subsystem
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2] tpm: tpm_ibm_vtpm: Fix unallocated banks
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: tpm_ibm_vtpm: Fix unallocated banks
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: allow module init if TPM is inactive or deactivated
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: allow module init if TPM is inactive or deactivated
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/5] ima-evm-utils: Assorted fixes and improvements
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH 4/8] dt-bindings: tpm: document properties for cr50
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [RFC 3/7] tee: add private login method for kernel clients
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [RFC 3/7] tee: add private login method for kernel clients
- From: Jens Wiklander <jens.wiklander@xxxxxxxxxx>
- Re: [RFC 0/7] Introduce TEE based Trusted Keys support
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [RFC 3/7] tee: add private login method for kernel clients
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [GIT PULL] integrity subsystem updates for v5.3
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [GIT PULL] tpmdd updates for Linux v5.3
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [GIT PULL] Keys: Set 4 - Key ACLs for 5.3
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v2] tpm: tpm_ibm_vtpm: Fix unallocated banks
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v2] tpm: tpm_ibm_vtpm: Fix unallocated banks
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: tpm_ibm_vtpm: Fix unallocated banks
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Document UEFI event log quirks
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: allow module init if TPM is inactive or deactivated
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: allow module init if TPM is inactive or deactivated
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxx>
- Re: [RFC 0/7] Introduce TEE based Trusted Keys support
- From: Jens Wiklander <jens.wiklander@xxxxxxxxxx>
- Re: [RFC 3/7] tee: add private login method for kernel clients
- From: Jens Wiklander <jens.wiklander@xxxxxxxxxx>
- Re: [PATCH] tpm: Document UEFI event log quirks
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Document UEFI event log quirks
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/5] ima-evm-utils: Assorted fixes and improvements
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: fixes uninitialized allocated banks for IBM vtpm driver
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: tpm_ibm_vtpm: Fix unallocated banks
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v2] tpm: Remove a deprecated comments about implicit sysfs locking
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH] tpm: Remove a deprecated comments about implicit sysfs locking
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 0/9] ima-evm-utils: Convert v2 signatures from RSA to EVP_PKEY API
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Fix null pointer dereference on chip register error path
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Fix null pointer dereference on chip register error path
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Fix null pointer dereference on chip register error path
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH 2/2] ima-evm-utils: support template "buf" field
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 1/2] ima-evm-utils: limit "remain unprocessed data" messages
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [GIT PULL] integrity subsystem updates for v5.3
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC 0/7] Introduce TEE based Trusted Keys support
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH] tpm: Document UEFI event log quirks
- From: Jordan Hand <jorhand@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: tpm_ibm_vtpm: Fix unallocated banks
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v1 5/5] ima-evm-utils: Fix clang warning about possible unaligned pointer for hdr->keyid
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v1 4/5] ima-evm-utils: Allow multiple files in ima_verify
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v1 3/5] ima-evm-utils: Preload public keys for ima_verify
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v1 2/5] ima-evm-utils: Fix memory leak in init_public_keys
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v1 1/5] ima-evm-utils: Fix EVP_MD_CTX leak in ima_calc_hash
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v1 0/5] ima-evm-utils: Assorted fixes and improvements
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: Can we enforce "IMA Policy" based on file type
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Document UEFI event log quirks
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v6 16/17] ext4: update on-disk format documentation for fs-verity
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v6 15/17] ext4: add fs-verity read support
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v6 14/17] ext4: add basic fs-verity support
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v6 13/17] fs-verity: support builtin file signatures
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH] tpm: fixes uninitialized allocated banks for IBM vtpm driver
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v2] tpm: tpm_ibm_vtpm: Fix unallocated banks
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [GIT PULL] Keys: Set 4 - Key ACLs for 5.3
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] tpm: Fix null pointer dereference on chip register error path
- From: Milan Broz <gmazyland@xxxxxxxxx>
- [PATCH v8 2/2] fTPM: add documentation for ftpm driver
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH v8 0/2] fTPM: firmware TPM running in TEE
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH v8 1/2] fTPM: firmware TPM running in TEE
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH] tpm: fixes uninitialized allocated banks for IBM vtpm driver
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Fix null pointer dereference on chip register error path
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: fixes uninitialized allocated banks for IBM vtpm driver
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH] KEYS: trusted: allow module init if TPM is inactive or deactivated
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH] tpm: fixes uninitialized allocated banks for IBM vtpm driver
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Revert "tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()"
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- [RFC/RFT] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH] tpm: fixes uninitialized allocated banks for IBM vtpm driver
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v12 01/11] MODSIGN: Export module signature definitions
- From: Philipp Rudo <prudo@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] char: tpm: add new driver for tpm i2c ptp
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] Revert "tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()"
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] char: tpm: add new driver for tpm i2c ptp
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] Revert "tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()"
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: fixes uninitialized allocated banks for IBM vtpm driver
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: fixes uninitialized allocated banks for IBM vtpm driver
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: [PATCH] tpm: fixes uninitialized allocated banks for IBM vtpm driver
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Document UEFI event log quirks
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Document UEFI event log quirks
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Document UEFI event log quirks
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] powerpc: expose secure variables via sysfs
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- RE: [PATCH v7 1/2] fTPM: firmware TPM running in TEE
- From: Thirupathaiah Annapureddy <thiruan@xxxxxxxxxxxxx>
- Re: [PATCH] Revert "tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()"
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxx>
- Re: [PATCH v12 01/11] MODSIGN: Export module signature definitions
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v7 1/2] fTPM: firmware TPM running in TEE
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH] Revert "tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()"
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: fixes uninitialized allocated banks for IBM vtpm driver
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: [PATCH] tpm: fixes uninitialized allocated banks for IBM vtpm driver
- From: Sachin Sant <sachinp@xxxxxxxxxxxxxxxxxx>
- Re: Problem with the kernels trusted module on "inactive" TPM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Problem with the kernels trusted module on "inactive" TPM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH] tpm: fixes uninitialized allocated banks for IBM vtpm driver
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] Revert "tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()"
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3] tpm: Get TCG log from TPM2 ACPI table for tpm2 systems
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] char: tpm: add new driver for tpm i2c ptp
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- Re: [PATCH] Revert "tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()"
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v12 01/11] MODSIGN: Export module signature definitions
- From: Philipp Rudo <prudo@xxxxxxxxxxxxx>
- Re: Problem with the kernels trusted module on "inactive" TPM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] Revert "tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()"
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v2] Revert "tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()"
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 1/2] fTPM: firmware TPM running in TEE
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] char: tpm: add new driver for tpm i2c ptp
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v2] tpm: Fix null pointer dereference on chip register error path
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH v12 00/11] Appended signatures support for IMA appraisal
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v12 01/11] MODSIGN: Export module signature definitions
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- RE: [PATCH v7 1/2] fTPM: firmware TPM running in TEE
- From: Thirupathaiah Annapureddy <thiruan@xxxxxxxxxxxxx>
- [PATCH] tpm: fixes uninitialized allocated banks for IBM vtpm driver
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Fix null pointer dereference on chip register error path
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 10/17] fs-verity: implement FS_IOC_ENABLE_VERITY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] tpm: Document UEFI event log quirks
- From: Jordan Hand <jorhand@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Document UEFI event log quirks
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH] tpm: Document UEFI event log quirks
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v8 9/9] ima-evm-utils: Log hash_algo with hash value in verbose mode
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 8/9] ima-evm-utils: Pass status codes from sign and hash functions to the callers
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 7/9] ima-evm-utils: Remove RSA_ASN1_templates
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 6/9] ima-evm-utils: Replace calc_keyid_v2 with calc_pkeyid_v2
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 5/9] ima-evm-utils: Convert sign_hash_v2 to EVP_PKEY API
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 4/9] ima-evm-utils: Convert verify_hash_v2 and find_keyid to EVP_PKEY API
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 3/9] ima-evm-utils: Convert cmd_import and calc keyid v2 to EVP_PKEY API
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 2/9] ima-evm-utils: Convert read_priv_key to EVP_PKEY API
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 1/9] ima-evm-utils: Convert read_pub_key to EVP_PKEY API
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 0/9] ima-evm-utils: Convert v2 signatures from RSA to EVP_PKEY API
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v7 1/2] fTPM: firmware TPM running in TEE
- From: Joakim Bech <joakim.bech@xxxxxxxxxx>
- Re: [PATCH] ima: Replace two seq_printf() calls by seq_puts() in ima_show_template_data_ascii()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 1/2] fTPM: firmware TPM running in TEE
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: ima: Replace two seq_printf() calls by seq_puts() in ima_show_template_data_ascii()
- From: Markus Elfring <Markus.Elfring@xxxxxx>
- RE: [PATCH] ima: Replace two seq_printf() calls by seq_puts() in ima_show_template_data_ascii()
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v7 1/2] fTPM: firmware TPM running in TEE
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [PATCH v7 1/2] fTPM: firmware TPM running in TEE
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: [f2fs-dev] [PATCH v6 17/17] f2fs: add fs-verity support
- From: Chao Yu <yuchao0@xxxxxxxxxx>
- [PATCH] ima: Replace two seq_printf() calls by seq_puts() in ima_show_template_data_ascii()
- From: Markus Elfring <Markus.Elfring@xxxxxx>
- [PATCH] ima: Replace two seq_printf() calls by seq_puts() in ima_show_template_data_ascii()
- From: Markus Elfring <Markus.Elfring@xxxxxx>
- [PATCH] ima: Replace two seq_printf() calls by seq_puts() in ima_show_template_data_ascii()
- From: Markus Elfring <Markus.Elfring@xxxxxx>
- [PATCH] ima: Replace two seq_printf() calls by seq_puts() in ima_show_template_data_ascii()
- From: Markus Elfring <Markus.Elfring@xxxxxx>
- Re: [PATCH] tpm: Fix null pointer dereference on chip register error path
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- RE: [PATCH v7 1/2] fTPM: firmware TPM running in TEE
- From: Thirupathaiah Annapureddy <thiruan@xxxxxxxxxxxxx>
- Re: [PATCH v7 1/2] fTPM: firmware TPM running in TEE
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- [PATCH 1/2] ima: always return negative code for error
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- [PATCH 2/2] ima: fix freeing ongoing ahash_request
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- [RFC PATCH v6 1/1] Add dm verity root hash pkcs7 sig validation.
- From: Jaskaran Khurana <jaskarankhurana@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v6 0/1] Add dm verity root hash pkcs7 sig validation.
- From: Jaskaran Khurana <jaskarankhurana@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v5 0/1] Add dm verity root hash pkcs7 sig validation.
- From: Jaskaran Singh Khurana <jaskarankhurana@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 00/17] fs-verity: read-only file-based authenticity protection
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 07/17] fs-verity: add the hook for file ->open()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 06/17] fs-verity: add inode and superblock fields
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 05/17] fs-verity: add Kconfig and the helper functions for hashing
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 08/17] fs-verity: add the hook for file ->setattr()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 11/17] fs-verity: implement FS_IOC_MEASURE_VERITY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 12/17] fs-verity: add SHA-512 support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 09/17] fs-verity: add data verification hooks for ->readpages()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 15/17] ext4: add fs-verity read support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 10/17] fs-verity: implement FS_IOC_ENABLE_VERITY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 16/17] ext4: update on-disk format documentation for fs-verity
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 14/17] ext4: add basic fs-verity support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 17/17] f2fs: add fs-verity support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 13/17] fs-verity: support builtin file signatures
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 04/17] fs: uapi: define verity bit for FS_IOC_GETFLAGS
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 03/17] fs-verity: add UAPI header
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 01/17] fs-verity: add a documentation file
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 02/17] fs-verity: add MAINTAINERS file entry
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v12 01/11] MODSIGN: Export module signature definitions
- From: Jessica Yu <jeyu@xxxxxxxxxx>
- Re: [PATCH v12 00/11] Appended signatures support for IMA appraisal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Problem with the kernels trusted module on "inactive" TPM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] Revert "tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()"
- From: Michal Suchanek <msuchanek@xxxxxxx>
- Re: [PATCH v4 2/3] initramfs: read metadata from special file METADATA!!!
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: fix freeing ongoing ahash_request
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v5 0/1] Add dm verity root hash pkcs7 sig validation.
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH] ima: fix freeing ongoing ahash_request
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- Re: [PATCH] ima: fix freeing ongoing ahash_request
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 3/3] gen_init_cpio: add support for file metadata
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 1/2] fTPM: firmware TPM running in TEE
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [RFC PATCH v5 0/1] Add dm verity root hash pkcs7 sig validation.
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC PATCH v5 0/1] Add dm verity root hash pkcs7 sig validation.
- From: Jaskaran Singh Khurana <jaskarankhurana@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v5 0/1] Add dm verity root hash pkcs7 sig validation.
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH v5 0/1] Add dm verity root hash pkcs7 sig validation.
- From: Jaskaran Singh Khurana <jaskarankhurana@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v5 1/1] Add dm verity root hash pkcs7 sig validation.
- From: Jaskaran Singh Khurana <jaskarankhurana@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/2] char: tpm: add new driver for tpm i2c ptp
- From: Oshri Alkoby <oshrialkoby85@xxxxxxxxx>
- [PATCH v2 0/2] char: tpm: add new driver for tpm i2c ptp
- From: Oshri Alkoby <oshrialkoby85@xxxxxxxxx>
- [PATCH v2 1/2] dt-bindings: tpm: add the TPM I2C PTP device tree binding documentation
- From: Oshri Alkoby <oshrialkoby85@xxxxxxxxx>
- Re: [PATCH] ima: Update MAX_TEMPLATE_NAME_LEN to fit largest reasonable definition
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] ima: fix freeing ongoing ahash_request
- From: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Fix null pointer dereference on chip register error path
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH v7 1/2] fTPM: firmware TPM running in TEE
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [RFC PATCH v5 1/1] Add dm verity root hash pkcs7 sig validation.
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [RFC PATCH v5 0/1] Add dm verity root hash pkcs7 sig validation.
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH v5 1/1] Add dm verity root hash pkcs7 sig validation.
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v12 06/11] ima: Factor xattr_verify() out of ima_appraise_measurement()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v12 05/11] ima: Add modsig appraise_type option for module-style appended signatures
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v12 10/11] ima: Store the measurement again when appraising a modsig
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v12 09/11] ima: Define ima-modsig template
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v12 07/11] ima: Implement support for module-style appended signatures
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v12 11/11] ima: Allow template= option for appraise rules as well
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v12 08/11] ima: Collect modsig
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v12 01/11] MODSIGN: Export module signature definitions
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v12 03/11] PKCS#7: Introduce pkcs7_get_digest()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v12 04/11] integrity: Select CONFIG_KEYS instead of depending on it
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v12 02/11] PKCS#7: Refactor verify_pkcs7_signature()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v12 00/11] Appended signatures support for IMA appraisal
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [RFC PATCH v5 1/1] Add dm verity root hash pkcs7 sig validation.
- From: Jaskaran Singh Khurana <jaskarankhurana@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v5 1/1] Add dm verity root hash pkcs7 sig validation.
- From: Jaskaran Singh Khurana <jaskarankhurana@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v5 1/1] Add dm verity root hash pkcs7 sig validation.
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH V10 2/3] IMA: Define a new template field buf
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH] ima: Update MAX_TEMPLATE_NAME_LEN to fit largest reasonable definition
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v7 1/2] fTPM: firmware TPM running in TEE
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH V10 2/3] IMA: Define a new template field buf
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: linux-next: Tree for Jun 26 (security/integrity/ima/)
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v7 1/2] fTPM: firmware TPM running in TEE
- From: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
- Re: linux-next: Tree for Jun 26 (security/integrity/ima/)
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v7 1/2] fTPM: firmware TPM running in TEE
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 1/2] fTPM: firmware TPM running in TEE
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: linux-next: Tree for Jun 26 (security/integrity/ima/)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v5 1/1] Add dm verity root hash pkcs7 sig validation.
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH v1 2/2] char: tpm: add new driver for tpm i2c ptp
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v1 1/2] dt-bindings: tpm: add the TPM I2C PTP device tree binding documentation
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/2] char: tpm: add new driver for tpm i2c ptp
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 2/2] fTPM: add documentation for ftpm driver
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v7 1/2] fTPM: firmware TPM running in TEE
- From: Sasha Levin <sashal@xxxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]