Linux Integrity
[Prev Page][Next Page]
- Re: [PATCH] integrity: make 'sync' update the inode integrity state
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- [GIT PULL] linux-integrity patches for Linux 5.2
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] ima: Call test's cleanup inside ima_setup.sh cleanup
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v9 05/10] X.509: parse public key parameters from x509 for akcipher
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- [PATCH v9 06/10] crypto: Kconfig - create Public-key cryptography section
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 05/10] X.509: parse public key parameters from x509 for akcipher
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 03/10] crypto: akcipher - new verify API for public key algorithms
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 02/10] crypto: rsa - unimplement sign/verify for raw RSA backends
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 09/10] crypto: ecrdsa - add EC-RDSA test vectors to testmgr
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 08/10] crypto: ecrdsa - add EC-RDSA (GOST 34.10) algorithm
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 10/10] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 07/10] crypto: ecc - make ecc into separate module
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 04/10] KEYS: do not kmemdup digest in {public,tpm}_key_verify_signature
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 01/10] crypto: akcipher - default implementations for request callbacks
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 00/10] crypto: add EC-RDSA (GOST 34.10) algorithm
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH] integrity: make 'sync' update the inode integrity state
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: [PATCH] integrity: make 'sync' update the inode integrity state
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] ima: Call test's cleanup inside ima_setup.sh cleanup
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: appraisal reset safety
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: [PATCH v2 1/3] ima: Call test's cleanup inside ima_setup.sh cleanup
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2 1/3] ima: Call test's cleanup inside ima_setup.sh cleanup
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: [PATCH v2 1/3] ftpm: dt-binding: add dts documentation for fTPM driver
- From: Thirupathaiah Annapureddy <thiruan@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] ftpm: dt-binding: add dts documentation for fTPM driver
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v2 1/3] ftpm: dt-binding: add dts documentation for fTPM driver
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH 2/2] ftpm: firmware TPM running in TEE
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v2 1/3] ftpm: dt-binding: add dts documentation for fTPM driver
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v2 1/3] ftpm: dt-binding: add dts documentation for fTPM driver
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- Re: [PATCH v2 1/3] ftpm: dt-binding: add dts documentation for fTPM driver
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH 2/2] ftpm: firmware TPM running in TEE
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH] integrity: make 'sync' update the inode integrity state
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: [PATCH 2/2] ftpm: firmware TPM running in TEE
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- [ANNOUNCE][CFP] Linux Security Summit North America 2019
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v2 1/3] ftpm: dt-binding: add dts documentation for fTPM driver
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- Re: [PATCH v2 2/3] ftpm: firmware TPM running in TEE
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH v2 1/3] ftpm: dt-binding: add dts documentation for fTPM driver
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH v2 2/3] ftpm: firmware TPM running in TEE
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH v2 3/3] ftpm: add documentation for ftpm driver
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH v2 0/3] ftpm: a firmware based TPM driver
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v4] tpm: fix an invalid condition in tpm_common_poll
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Regression in suspend-to-ram (TPM related) with 5.1-rc1 (BISECTED)
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Regression in suspend-to-ram (TPM related) with 5.1-rc1 (BISECTED)
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: appraisal reset safety
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: appraisal reset safety
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: appraisal reset safety
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: appraisal reset safety
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: appraisal reset safety
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- [PATCH v2 3/3] powerpc: Add support to initialize ima policy rules
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v2 2/3] powerpc/powernv: detect the secure boot mode of the system
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v2 1/3] powerpc/powernv: Add support for OPAL_SECVAR_GET
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v2 0/3] powerpc: Enabling secure boot on powernv systems - Part 1
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd fixes for Linux v5.1
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH ghau85 v1] ima: add support for AUDIT_INTEGRITY_EVM_XATTR records
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [GIT PULL] tpmdd fixes for Linux v5.1
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: appraisal reset safety
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: appraisal reset safety
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4] tpm: fix an invalid condition in tpm_common_poll
- From: Thibaut Sautereau <thibaut.sautereau@xxxxxxxxxxx>
- Re: appraisal reset safety
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: Regression in suspend-to-ram (TPM related) with 5.1-rc1 (BISECTED)
- From: Martin Kepplinger <martin.kepplinger@xxxxxxxxxxxxx>
- Re: Regression in suspend-to-ram (TPM related) with 5.1-rc1 (BISECTED)
- From: Paul Zimmerman <pauldzim@xxxxxxxxx>
- Re: Regression in suspend-to-ram (TPM related) with 5.1-rc1 (BISECTED)
- From: Martin Kepplinger <martin.kepplinger@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] ftpm: firmware TPM running in TEE
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: appraisal reset safety
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] selftests/kexec: update get_secureboot_mode
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 3/3] ima: Add overlay test
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v2 2/3] shell: Add $TST_DEVICE as default parameter to tst_umount
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v2 1/3] ima: Call test's cleanup inside ima_setup.sh cleanup
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v2 0/3] LTP reproducer on broken IMA on overlayfs
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH] selftests/kexec: update get_secureboot_mode
- From: Petr Vorel <pvorel@xxxxxxx>
- appraisal reset safety
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 3/3] ima: Add overlay test
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH] x86/ima: add missing include
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] doc/kernel-parameters.txt: Deprecate ima_appraise_tcb
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] ima: Add overlay test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] doc/kernel-parameters.txt: Deprecate ima_appraise_tcb
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 3/3] ima: Add overlay test
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH] TCG2 log support build fixes for non-x86_64
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 1/2] efi: Fix cast to pointer from integer of different size in TPM log code
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: Unable to suspend lenovo t61
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH 1/2] efi: Fix cast to pointer from integer of different size in TPM log code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi: Include tpm_eventlog.h after asm/efi.h to avoid memcpy breakage
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi: Include tpm_eventlog.h after asm/efi.h to avoid memcpy breakage
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] TCG2 log support build fixes for non-x86_64
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] tpm: Fix builds on platforms that lack early_memremap()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] efi: Fix cast to pointer from integer of different size in TPM log code
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Igor Zhbanov <i.zhbanov@xxxxxxxxxxxx>
- [PATCH V32 24/27] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 2/2] ima-evm-utils: try to load digest by its alias
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] ima-evm-utils: try to load digest by its alias
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] ima-evm-utils: try to load digest by its alias
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] ima-evm-utils: try to load digest by its alias
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH 2/2] ima-evm-utils: try to load digest by its alias
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] ima-evm-utils: try to load digest by its alias
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v3] ima-evm-utils: Rework openssl init
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] ima-evm-utils: try to load digest by its alias
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] efi: Include tpm_eventlog.h after asm/efi.h to avoid memcpy breakage
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Igor Zhbanov <i.zhbanov@xxxxxxxxxxxx>
- Re: [PATCH 2/2] ftpm: firmware TPM running in TEE
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 2/2] ftpm: firmware TPM running in TEE
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] ftpm: firmware TPM running in TEE
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] ftpm: dt-binding: add dts documentation for fTPM driver
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] tpm: Actually fail on TPM errors during "get random"
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Add support for TCG2 log format on UEFI systems
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Igor Zhbanov <i.zhbanov@xxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 1/2] efi: Fix cast to pointer from integer of different size in TPM log code
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] selftests/kexec: update get_secureboot_mode
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: [PATCH 1/2] efi: Fix cast to pointer from integer of different size in TPM log code
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Perez Yves-Alexis <yves-alexis.perez@xxxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] ftpm: firmware TPM running in TEE
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Igor Zhbanov <i.zhbanov@xxxxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH 1/2] efi: Fix cast to pointer from integer of different size in TPM log code
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH 2/2] tpm: Fix builds on platforms that lack early_memremap()
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH] TCG2 log support build fixes for non-x86_64
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] ftpm: firmware TPM running in TEE
- From: Stephen Hemminger <stephen@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] ftpm: dt-binding: add dts documentation for fTPM driver
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH 1/2] ftpm: dt-binding: add dts documentation for fTPM driver
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH 2/2] ftpm: firmware TPM running in TEE
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH 1/2] ftpm: dt-binding: add dts documentation for fTPM driver
- From: Sasha Levin <sashal@xxxxxxxxxx>
- RE: [PATCH v3] tpm: Actually fail on TPM errors during "get random"
- From: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
- [PATCH 1/4] powerpc/include: Override unneeded early ioremap functions
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- [PATCH 4/4] powerpc: Add support to initialize ima policy rules
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- [PATCH 3/4] powerpc/powernv: Detect the secure boot mode of the system
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- [PATCH 2/4] powerpc/powernv: Add support for OPAL secure variables
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- Re: Add support for TCG2 log format on UEFI systems
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v3] tpm: Actually fail on TPM errors during "get random"
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Add support for TCG2 log format on UEFI systems
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Add support for TCG2 log format on UEFI systems
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: Add support for TCG2 log format on UEFI systems
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] tpm: Actually fail on TPM errors during "get random"
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- RE: [PATCH v3] tpm: Actually fail on TPM errors during "get random"
- From: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
- Re: [PATCH v3] tpm: Actually fail on TPM errors during "get random"
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3] tpm: Actually fail on TPM errors during "get random"
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH v3] tpm: Actually fail on TPM errors during "get random"
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] tpm: Actually fail on TPM errors during "get random"
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Actually fail on TPM errors during "get random"
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Actually fail on TPM errors during "get random"
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v2] tpm: Actually fail on TPM errors during "get random"
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] tpm: Actually fail on TPM errors during "get random"
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] tpm: Actually fail on TPM errors during "get random"
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH] tpm: Actually fail on TPM errors during "get random"
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd fixes for Linux v5.1
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd fixes for Linux v5.1
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Igor Zhbanov <i.zhbanov@xxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [GIT PULL] tpmdd fixes for Linux v5.1
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Jordan Glover <Golden_Miller83@xxxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] ima: Add overlay test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Igor Zhbanov <i.zhbanov@xxxxxxxxxxxx>
- Re: [REGRESSION] 5.1-rc1: tpm_try_transmit: send(): error -5
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: turn on TPM on suspend for TPM 1.x
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] ima: Add overlay test
- From: Ignaz Forster <iforster@xxxxxxx>
- Re: [REGRESSION] 5.1-rc1: tpm_try_transmit: send(): error -5
- From: Domenico Andreoli <domenico.andreoli@xxxxxxxxx>
- Re: [PATCH] tpm: turn on TPM on suspend for TPM 1.x
- From: Domenico Andreoli <domenico.andreoli@xxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4] tpm: fix an invalid condition in tpm_common_poll
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v4] tpm: fix an invalid condition in tpm_common_poll
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] KEYS: trusted: allow trusted.ko to initialize w/o a TPM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [REGRESSION] 5.1-rc1: tpm_try_transmit: send(): error -5
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] LTP reproducer on broken IMA on overlayfs
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v8 10/10] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH ghak109 V2] audit: link integrity evm_write_xattrs record to syscall event
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v8 10/10] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 10/10] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v8 10/10] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4] tpm: fix an invalid condition in tpm_common_poll
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v3] KEYS: trusted: allow trusted.ko to initialize w/o a TPM
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH 3/3] ima: Add overlay test
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH 0/3] LTP reproducer on broken IMA on overlayfs
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH ghak109 V2] audit: link integrity evm_write_xattrs record to syscall event
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 9/9] selftests/kexec: make kexec_load test independent of IMA being enabled
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v5 1/9] selftests/kexec: move the IMA kexec_load selftest to selftests/kexec
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v5 8/9] selftests/kexec: check kexec_load and kexec_file_load are enabled
- From: Petr Vorel <pvorel@xxxxxxx>
- [REGRESSION] 5.1-rc1: tpm_try_transmit: send(): error -5
- From: Domenico Andreoli <domenico.andreoli@xxxxxxxxx>
- Re: Bad file pattern in MAINTAINERS section 'KEYS-TRUSTED'
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Bad file pattern in MAINTAINERS section 'KEYS-TRUSTED'
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH RESEND v3] tpm: fix an invalid condition in tpm_common_poll
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH ghak109 V2] audit: link integrity evm_write_xattrs record to syscall event
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH ghak109 V2] audit: link integrity evm_write_xattrs record to syscall event
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ghak109 V2] audit: link integrity evm_write_xattrs record to syscall event
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH ghak109 V1] audit: link integrity evm_write_xattrs record to syscall event
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH ghak109 V1] audit: link integrity evm_write_xattrs record to syscall event
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: Bad file pattern in MAINTAINERS section 'KEYS-TRUSTED'
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH v8 05/10] X.509: parse public key parameters from x509 for akcipher
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: [PATCH ghak109 V1] audit: link integrity evm_write_xattrs record to syscall event
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH v8 03/10] crypto: akcipher - new verify API for public key algorithms
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: [PATCH RESEND v3] tpm: fix an invalid condition in tpm_common_poll
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 27/27] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ghak109 V1] audit: link integrity evm_write_xattrs record to syscall event
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ghak109 V1] audit: link integrity evm_write_xattrs record to syscall event
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH ghak109 V1] audit: link integrity evm_write_xattrs record to syscall event
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Bad file pattern in MAINTAINERS section 'KEYS-TRUSTED'
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: Bad file pattern in MAINTAINERS section 'KEYS-TRUSTED'
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH v4a 1/2] selftests/kexec: make tests independent of IMA being enabled
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v5 2/9] selftests/kexec: cleanup the kexec selftest
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v5 3/9] selftests/kexec: define a set of common functions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v5 5/9] kselftest/kexec: define "require_root_privileges"
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v5 1/9] selftests/kexec: move the IMA kexec_load selftest to selftests/kexec
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v5 0/9] selftests/kexec: add kexec tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v5 7/9] selftests/kexec: Add missing '=y' to config options
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v5 6/9] selftests/kexec: kexec_file_load syscall test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v5 9/9] selftests/kexec: make kexec_load test independent of IMA being enabled
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v5 4/9] selftests/kexec: define common logging functions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v5 8/9] selftests/kexec: check kexec_load and kexec_file_load are enabled
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v8 10/10] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 09/10] crypto: ecrdsa - add EC-RDSA test vectors to testmgr
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 08/10] crypto: ecrdsa - add EC-RDSA (GOST 34.10) algorithm
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 07/10] crypto: ecc - make ecc into separate module
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 06/10] crypto: Kconfig - create Public-key cryptography section
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 05/10] X.509: parse public key parameters from x509 for akcipher
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 04/10] KEYS: do not kmemdup digest in {public,tpm}_key_verify_signature
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 03/10] crypto: akcipher - new verify API for public key algorithms
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 02/10] crypto: rsa - unimplement sign/verify for raw RSA backends
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 01/10] crypto: akcipher - default implementations for request callbacks
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 00/10] crypto: add EC-RDSA (GOST 34.10) algorithm
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v3] KEYS: trusted: allow trusted.ko to initialize w/o a TPM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Bad file pattern in MAINTAINERS section 'KEYS-TRUSTED'
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2] KEYS: trusted: allow trusted.ko to initialize w/o a TPM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: allow trusted.ko to initialize w/o a TPM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: allow trusted.ko to initialize w/o a TPM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Bad file pattern in MAINTAINERS section 'KEYS-TRUSTED'
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4a 1/2] selftests/kexec: make tests independent of IMA being enabled
- From: Dave Young <dyoung@xxxxxxxxxx>
- [PATCH 27/27] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Bad file pattern in MAINTAINERS section 'KEYS-TRUSTED'
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: allow trusted.ko to initialize w/o a TPM
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- RE: Portable Executable (PE) Signature Validation and Measurement for KEXEC system call using IMA
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxx>
- Re: [PATCH v4a 1/2] selftests/kexec: make tests independent of IMA being enabled
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Portable Executable (PE) Signature Validation and Measurement for KEXEC system call using IMA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: Portable Executable (PE) Signature Validation and Measurement for KEXEC system call using IMA
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/5] NFSD: Remove ima_file_check call
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: defer execution of TPM-specific code until key instantiate
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH] KEYS: trusted: allow trusted.ko to initialize w/o a TPM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/5] NFSD: Remove ima_file_check call
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- Re: [PATCH RESEND v3] tpm: fix an invalid condition in tpm_common_poll
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: INFO: task hung in process_measurement
- From: Tomi Valkeinen <tomi.valkeinen@xxxxxx>
- Re: [PATCH v4a 1/2] selftests/kexec: make tests independent of IMA being enabled
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: INFO: task hung in process_measurement
- From: syzbot <syzbot+cdc562bc26a2b2b0a94f@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v3] ima-evm-utils: Convert sign v2 from RSA to EVP_PKEY API
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v3] ima-evm-utils: Rework openssl init
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH 2/2] ima-evm-utils: try to load digest by its alias
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH 1/2] ima-evm-utils: Extract digest algorithms from hash_info.h
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH 0/2] ima-evm-utils: rebase of digest algo resolving
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v2] ima-evm-utils: rework openssl init
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v2 3/5] NFSD: Remove ima_file_check call
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 03/11] crypto: rsa - unimplement sign/verify for raw RSA backends
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: Adding cmldine args measure to ima
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 05/11] KEYS: do not kmemdup digest in {public,tpm}_key_verify_signature
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v4a 1/2] selftests/kexec: make tests independent of IMA being enabled
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4a 2/2] selftests/kexec: testing CONFIG_KEXEC_BZIMAGE_VERIFY_SIG is not enough
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 11/11] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: defer execution of TPM-specific code until key instantiate
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH] KEYS: trusted: defer execution of TPM-specific code until key instantiate
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Portable Executable (PE) Signature Validation and Measurement for KEXEC system call using IMA
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxx>
- Adding cmldine args measure to ima
- From: Prakhar Srivastava <prsriva@xxxxxxxxxxxxx>
- Re: [PATCH RESEND v3] tpm: fix an invalid condition in tpm_common_poll
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH RESEND v3] tpm: fix an invalid condition in tpm_common_poll
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v3] tpm: fix an invalid condition in tpm_common_poll
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 00/11] crypto: add EC-RDSA (GOST 34.10) algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/8] evmtest: Regression testing integrity subsystem
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH] tpm: turn on TPM on suspend for TPM 1.x
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v2 1/8] evmtest: Regression testing integrity subsystem
- From: djacobs7@xxxxxxxxxxxxxx
- [PATCH v2 2/8] evmtest: test loading IMA policies
- From: djacobs7@xxxxxxxxxxxxxx
- [PATCH v2 4/8] evmtest: test kexec signature policy
- From: djacobs7@xxxxxxxxxxxxxx
- [PATCH v2 5/8] evmtest: validate boot record
- From: djacobs7@xxxxxxxxxxxxxx
- [PATCH v2 3/8] evmtest: test kernel module loading
- From: djacobs7@xxxxxxxxxxxxxx
- [PATCH v2 6/8] evmtest: test the preservation of extended attributes
- From: djacobs7@xxxxxxxxxxxxxx
- [PATCH v2 7/8] emvtest: Add ability to run all tests
- From: djacobs7@xxxxxxxxxxxxxx
- [PATCH v2 8/8] evmtest: virtual machine compatibility
- From: djacobs7@xxxxxxxxxxxxxx
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Igor Zhbanov <i.zhbanov@xxxxxxxxxxxx>
- Re: [PATCH v3] tpm: fix an invalid condition in tpm_common_poll
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3] tpm: fix an invalid condition in tpm_common_poll
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v2 3/5] NFSD: Remove ima_file_check call
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- Re: [PATCH v2] tpm: fix an invalid condition in tpm_common_poll
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: fix an invalid condition in tpm_common_poll
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/6] security/keys/encrypted: Break module dependency chain
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/6] security/keys/encrypted: Break module dependency chain
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Regression in suspend-to-ram (TPM related) with 5.1-rc1 (BISECTED)
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: fix a race between poll and write in tpm-dev-common
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: fix a race between poll and write in tpm-dev-common
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v10, RESEND 5/6] KEYS: trusted: explicitly use tpm_chip structure from tpm_default_chip()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v10, RESEND 5/6] KEYS: trusted: explicitly use tpm_chip structure from tpm_default_chip()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 02/11] crypto: akcipher - check the presence of callback before the call
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Igor Zhbanov <i.zhbanov@xxxxxxxxxxxx>
- Re: [PATCH v2 3/5] NFSD: Remove ima_file_check call
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 02/11] crypto: akcipher - check the presence of callback before the call
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 02/11] crypto: akcipher - check the presence of callback before the call
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH ghak109 V1] audit: link integrity evm_write_xattrs record to syscall event
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH ghak109 V1] audit: link integrity evm_write_xattrs record to syscall event
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH ghak109 V1] audit: link integrity evm_write_xattrs record to syscall event
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: fix an invalid condition in tpm_common_poll
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2] tpm: fix an invalid condition in tpm_common_poll
- From: Mantas Mikulėnas <grawity@xxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Igor Zhbanov <i.zhbanov@xxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v2] tpm: fix an invalid condition in tpm_common_poll
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2] tpm: fix an invalid condition in tpm_common_poll
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/5] NFSD: Remove ima_file_check call
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- Re: [PATCH v4 0/8] selftests/kexec: add kexec tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Kernel 5.0 regression in /dev/tpm0 access
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/8] selftests/kexec: add kexec tests
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Igor Zhbanov <i.zhbanov@xxxxxxxxxxxx>
- Re: [PATCH 0/6] security/keys/encrypted: Break module dependency chain
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Regression in suspend-to-ram (TPM related) with 5.1-rc1 (BISECTED)
- From: Paul Zimmerman <pauldzim@xxxxxxxxx>
- Re: [PATCH 0/6] security/keys/encrypted: Break module dependency chain
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 0/6] security/keys/encrypted: Break module dependency chain
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH 0/6] security/keys/encrypted: Break module dependency chain
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v2] tpm: fix an invalid condition in tpm_common_poll
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2 3/5] NFSD: Remove ima_file_check call
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: fix a race between poll and write in tpm-dev-common
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Igor Zhbanov <i.zhbanov@xxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Igor Zhbanov <i.zhbanov@xxxxxxxxxxxx>
- [PATCH 5/6] security/integrity/evm: Drop direct dependency on key_type_encrypted
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH 0/6] security/keys/encrypted: Break module dependency chain
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Regression in suspend-to-ram (TPM related) with 5.1-rc1
- From: Paul Zimmerman <pauldzim@xxxxxxxxx>
- Re: [PATCH] tpm: fix a race between poll and write in tpm-dev-common
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [PATCH v10, RESEND 5/6] KEYS: trusted: explicitly use tpm_chip structure from tpm_default_chip()
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH] tpm: fix a race between poll and write in tpm-dev-common
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: Regression in suspend-to-ram (TPM related) with 5.1-rc1
- From: Paul Zimmerman <pauldzim@xxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [openssl-tpm2-engine] tpm sessions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: Kernel 5.0 regression in /dev/tpm0 access
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Igor Zhbanov <i.zhbanov@xxxxxxxxxxxx>
- Re: Kernel 5.0 regression in /dev/tpm0 access
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ghak109 V1] audit: link integrity evm_write_xattrs record to syscall event
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [RFC] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: Add support for TCG2 log format on UEFI systems
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/8] selftests/kexec: add kexec tests
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [RFC] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [RFC] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: Add support for TCG2 log format on UEFI systems
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH v4 2/8] selftests/kexec: cleanup the kexec selftest
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4 8/8] selftests/kexec: check kexec_load and kexec_file_load are enabled
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4 7/8] selftests/kexec: Add missing '=y' to config options
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4 6/8] selftests/kexec: kexec_file_load syscall test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4 5/8] kselftest/kexec: define "require_root_privileges"
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4 3/8] selftests/kexec: define a set of common functions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4 4/8] selftests/kexec: define common logging functions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4 1/8] selftests/kexec: move the IMA kexec_load selftest to selftests/kexec
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4 0/8] selftests/kexec: add kexec tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 5/7] selftests/ima: kexec_file_load syscall test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Add support for TCG2 log format on UEFI systems
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [RFC] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: Kernel 5.0 regression in /dev/tpm0 access
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Kernel 5.0 regression in /dev/tpm0 access
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Make timeout logic simpler and more robust
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Make timeout logic simpler and more robust
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 5/7] selftests/ima: kexec_file_load syscall test
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: Kernel 5.0 regression in /dev/tpm0 access
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: Kernel 5.0 regression in /dev/tpm0 access
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] tpm: Make timeout logic simpler and more robust
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Make timeout logic simpler and more robust
- From: Calvin Owens <calvinowens@xxxxxx>
- [RFC] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [PATCH] tpm: Make timeout logic simpler and more robust
- From: Calvin Owens <calvinowens@xxxxxx>
- Re: [PATCH] tpm: Make timeout logic simpler and more robust
- From: Calvin Owens <calvinowens@xxxxxx>
- Re: [PATCH] tpm: Make timeout logic simpler and more robust
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Make timeout logic simpler and more robust
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Make timeout logic simpler and more robust
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Make timeout logic simpler and more robust
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Make timeout logic simpler and more robust
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 5/7] selftests/ima: kexec_file_load syscall test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Make timeout logic simpler and more robust
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Make timeout logic simpler and more robust
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Make timeout logic simpler and more robust
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Make timeout logic simpler and more robust
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Make timeout logic simpler and more robust
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 5/7] selftests/ima: kexec_file_load syscall test
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH] tpm: Make timeout logic simpler and more robust
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] tpm: Make timeout logic simpler and more robust
- From: Calvin Owens <calvinowens@xxxxxx>
- Re: [PATCH v3 0/7] selftests/ima: add kexec and kernel module tests
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v3 2/7] selftests/ima: define a set of common functions
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 3/3] x86/ima: retry detecting secure boot mode
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 3/3] x86/ima: retry detecting secure boot mode
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] secuirty: integrity: ima: pedantic formatting
- From: "Enrico Weigelt, metux IT consult" <info@xxxxxxxxx>
- Re: Kernel 5.0 regression in /dev/tpm0 access
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/5] selftests/ima: kexec_file_load syscall test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 3/7] selftests/ima: define common logging functions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 2/7] selftests/ima: define a set of common functions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 1/7] selftests/ima: cleanup the kexec selftest
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 5/7] selftests/ima: kexec_file_load syscall test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 7/7] selftests/ima: Add missing '=y' to config options
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 6/7] selftests/ima: loading kernel modules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 4/7] kselftest/ima: define "require_root_privileges"
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 0/7] selftests/ima: add kexec and kernel module tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 4/5] selftests/ima: kexec_file_load syscall test
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2] ima-evm-utils: simplify digest alias handling
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v2] ima-evm-utils: simplify digest alias handling
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] ima-evm-utils: rework openssl init
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v2] ima-evm-utils: simplify digest alias handling
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v2] ima-evm-utils: rework openssl init
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] ima-evm-utils: simplify digest alias handling
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 5/5] selftests/ima: loading kernel modules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 4/5] selftests/ima: kexec_file_load syscall test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] selftests/ima: Add missing '=y' to config options
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Kernel 5.0 regression in /dev/tpm0 access
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: Kernel 5.0 regression in /dev/tpm0 access
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Kernel 5.0 regression in /dev/tpm0 access
- From: Mantas Mikulėnas <grawity@xxxxxxxxx>
- Re: [RFC PATCH v2] ima-evm-utils: convert sign v2 from RSA to EVP_PKEY API
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v2 3/5] NFSD: Remove ima_file_check call
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- Re: [PATCH v2 3/5] NFSD: Remove ima_file_check call
- From: Bruce Fields <bfields@xxxxxxxxxxxx>
- Re: [PATCH v2 3/5] NFSD: Remove ima_file_check call
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- Re: [PATCH v2 3/5] NFSD: Remove ima_file_check call
- From: bfields@xxxxxxxxxxxx (J. Bruce Fields)
- Re: [PATCH 3/3] x86/ima: retry detecting secure boot mode
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 3/3] x86/ima: retry detecting secure boot mode
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] x86/ima: retry detecting secure boot mode
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 2/3] scripts/ima: define a set of common functions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] x86/ima: retry detecting secure boot mode
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] scripts/ima: define a set of common functions
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH 3/3] x86/ima: retry detecting secure boot mode
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 3/3] x86/ima: retry detecting secure boot mode
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] x86/ima: require signed kernel modules
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 3/3] x86/ima: retry detecting secure boot mode
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v2] x86/ima: require signed kernel modules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] x86/ima: require signed kernel modules
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v2] x86/ima: require signed kernel modules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] x86/ima: retry detecting secure boot mode
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v2] x86/ima: require signed kernel modules
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 10/20] x86: avoid W^X being broken during modules loading
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 10/20] x86: avoid W^X being broken during modules loading
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v2] MAINTAINERS: fix typo in Mimi Zohar's address
- From: Baruch Siach <baruch@xxxxxxxxxx>
- Re: IMA fails to see TPM chip (rpi3, linaro optee)
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 10/20] x86: avoid W^X being broken during modules loading
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] x86/cpufeature: Remove __pure attribute to _static_cpu_has()
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 10/20] x86: avoid W^X being broken during modules loading
- Re: [PATCH] x86/cpufeature: Remove __pure attribute to _static_cpu_has()
- [PATCH v2 5/5] NFS: Prototype support for IMA on NFS (client)
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- [PATCH v2 4/5] NFS: Rename security xattr handler
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- [PATCH v2 3/5] NFSD: Remove ima_file_check call
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- [PATCH v2 2/5] NFSD: Prototype support for IMA on NFS (server)
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- [PATCH v2 1/5] NFS: Define common IMA-related protocol elements
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- [PATCH v2 0/5] RFC: Linux IMA on NFS prototype
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- [PATCH] x86/cpufeature: Remove __pure attribute to _static_cpu_has()
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] MAINTAINERS: fix typo in Mimi Zohar's address
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: fix typo in Mimi Zohar's address
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxx>
- Re: [PATCH v2 10/20] x86: avoid W^X being broken during modules loading
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] vfs: Move kernel_read_file() to fs/read_write.c
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] integrity: use KERNEL_DS instead of get_ds()
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] vfs: Move kernel_read_file() to fs/read_write.c
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] vfs: Move kernel_read_file() to fs/read_write.c
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] vfs: Move kernel_read_file() to fs/read_write.c
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] vfs: Move kernel_read_file() to fs/read_write.c
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH] integrity: use KERNEL_DS instead of get_ds()
- From: Jann Horn <jannh@xxxxxxxxxx>
- [PATCH v7 00/11] crypto: add EC-RDSA (GOST 34.10) algorithm
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v7 02/11] crypto: akcipher - check the presence of callback before the call
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v7 07/11] crypto: Kconfig - create Public-key cryptography section
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v7 04/11] crypto: akcipher - new verify API for public key algorithms
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v7 03/11] crypto: rsa - unimplement sign/verify for raw RSA backends
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v7 05/11] KEYS: do not kmemdup digest in {public,tpm}_key_verify_signature
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v7 06/11] X.509: parse public key parameters from x509 for akcipher
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v7 08/11] crypto: ecc - make ecc into separate module
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v7 11/11] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v7 10/11] crypto: ecrdsa - add EC-RDSA test vectors to testmgr
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v7 09/11] crypto: ecrdsa - add EC-RDSA (GOST 34.10) algorithm
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v7 01/11] KEYS: report to keyctl only actually supported key ops
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH RFC 4/4] NFSD: Prototype support for IMA on NFS (server)
- From: Bruce Fields <bfields@xxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] X.509: Parse public key parameters from x509 for akcipher
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH RFC 4/4] NFSD: Prototype support for IMA on NFS (server)
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- Re: [PATCH RFC 4/4] NFSD: Prototype support for IMA on NFS (server)
- From: Bruce Fields <bfields@xxxxxxxxxxxx>
- [integrity:next-queued-testing 7/12] arch/x86/kernel/ima_arch.c:78:4: error: implicit declaration of function 'set_module_sig_enforced'
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v5 04/10] crypto: akcipher - new verify API for public key algorithms
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] selftests/ima: Add missing '=y' to config options
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2 5/5] selftests/ima: loading kernel modules
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v2 5/5] selftests/ima: loading kernel modules
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2 4/5] selftests/ima: kexec_file_load syscall test
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2 4/5] selftests/ima: kexec_file_load syscall test
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v2 3/5] selftests/ima: define common logging functions
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2 3/5] selftests/ima: define common logging functions
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2 2/5] selftests/ima: define a set of common functions
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v5 04/10] crypto: akcipher - new verify API for public key algorithms
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v5 04/10] crypto: akcipher - new verify API for public key algorithms
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v5 04/10] crypto: akcipher - new verify API for public key algorithms
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v5 04/10] crypto: akcipher - new verify API for public key algorithms
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] scripts/ima: define a set of common functions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] scripts/ima: define a set of common functions
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH V4 2/4] tpm: Reserve the TPM final events table
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] X.509: Parse public key parameters from x509 for akcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] X.509: Parse public key parameters from x509 for akcipher
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] X.509: Parse public key parameters from x509 for akcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] X.509: Parse public key parameters from x509 for akcipher
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] X.509: Parse public key parameters from x509 for akcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] X.509: Parse public key parameters from x509 for akcipher
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] X.509: Parse public key parameters from x509 for akcipher
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] X.509: Parse public key parameters from x509 for akcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 04/10] crypto: akcipher - new verify API for public key algorithms
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [DISCUSSION] IMA Signature Measurements
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- RE: [DISCUSSION] IMA Signature Measurements
- From: Jordan Hand <Jordan.Hand@xxxxxxxxxxxxx>
- Re: [PATCH v5 04/10] crypto: akcipher - new verify API for public key algorithms
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [DISCUSSION] IMA Signature Measurements
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [DISCUSSION] IMA Signature Measurements
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [DISCUSSION] IMA Signature Measurements
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [DISCUSSION] IMA Signature Measurements
- From: Jordan Hand <Jordan.Hand@xxxxxxxxxxxxx>
- [PATCH V5 1/4] tpm: Abstract crypto agile event size calculations
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V5 3/4] tpm: Append the final event log to the TPM event log
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V5 4/4] efi: Attempt to get the TCG2 event log in the boot stub
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Add support for TCG2 log format on UEFI systems
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [PATCH V4 2/4] tpm: Reserve the TPM final events table
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v2 5/5] selftests/ima: loading kernel modules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: About PureBoot and TPM based DRM's
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: About PureBoot and TPM based DRM's
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- About PureBoot and TPM based DRM's
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 5/5] selftests/ima: loading kernel modules
- From: shuah <shuah@xxxxxxxxxx>
- Re: [PATCH V2 4/4] FUSE: Allow filesystems to provide gethash methods
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v2 5/5] selftests/ima: loading kernel modules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH V4 2/4] tpm: Reserve the TPM final events table
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH RFC v6] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v2 5/5] selftests/ima: loading kernel modules
- From: shuah <shuah@xxxxxxxxxx>
- Re: [PATCH v2 4/5] selftests/ima: kexec_file_load syscall test
- From: shuah <shuah@xxxxxxxxxx>
- Re: [PATCH v2 3/5] selftests/ima: define common logging functions
- From: shuah <shuah@xxxxxxxxxx>
- Re: [PATCH v2 2/5] selftests/ima: define a set of common functions
- From: shuah <shuah@xxxxxxxxxx>
- Re: [PATCH v2 1/5] selftests/ima: cleanup the kexec selftest
- From: shuah <shuah@xxxxxxxxxx>
- [PATCH v2 1/5] selftests/ima: cleanup the kexec selftest
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 2/5] selftests/ima: define a set of common functions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 5/5] selftests/ima: loading kernel modules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 4/5] selftests/ima: kexec_file_load syscall test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 3/5] selftests/ima: define common logging functions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 0/5] selftests/ima: add kexec and kernel module tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH V2 4/4] FUSE: Allow filesystems to provide gethash methods
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V2 2/4] IMA: Allow rule matching on filesystem subtype
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V2 1/4] VFS: Add a call to obtain a file's hash
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Allow trusted filesystems to provide IMA hashes directly
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: IMA fails to see TPM chip (rpi3, linaro optee)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: IMA fails to see TPM chip (rpi3, linaro optee)
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH ima-evm-utils] Include sys/types.h in header to fix build with musl
- From: luca.boccassi@xxxxxxxxx
- Re: IMA fails to see TPM chip (rpi3, linaro optee)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH V4 0/4] Add support for TCG2 event logs on EFI systems
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: IMA fails to see TPM chip (rpi3, linaro optee)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: IMA fails to see TPM chip (rpi3, linaro optee)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 10/10] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: IMA fails to see TPM chip (rpi3, linaro optee)
- From: Markku Savela <msa@xxxxxxxxxxx>
- Re: [PATCH v5 10/10] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 10/10] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: David Tolnay <dtolnay@xxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] X.509: Parse public key parameters from x509 for akcipher
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v5 00/10] crypto: add EC-RDSA (GOST 34.10) algorithm
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v5 03/10] crypto: rsa - unimplement sign/verify for raw RSA backends
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v5 02/10] crypto: akcipher - check the presence of callback before the call
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v5 01/10] KEYS: report to keyctl only actually supported key ops
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v5 04/10] crypto: akcipher - new verify API for public key algorithms
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v5 10/10] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v5 09/10] crypto: ecrdsa - add EC-RDSA test vectors to testmgr
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v5 07/10] crypto: ecc - make ecc into separate module
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v5 08/10] crypto: ecrdsa - add EC-RDSA (GOST 34.10) algorithm
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v5 05/10] X.509: parse public key parameters from x509 for akcipher
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v5 06/10] crypto: Kconfig - create Public-key cryptography section
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: David Tolnay <dtolnay@xxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: David Tolnay <dtolnay@xxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: David Tolnay <dtolnay@xxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v2] security: mark expected switch fall-throughs and add a missing break
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: David Tolnay <dtolnay@xxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: David Tolnay <dtolnay@xxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: David Tolnay <dtolnay@xxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- [PATCH V4 3/4] tpm: Append the final event log to the TPM event log
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V4 4/4] efi: Attempt to get the TCG2 event log in the boot stub
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V4 2/4] tpm: Reserve the TPM final events table
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V4 1/4] tpm: Abstract crypto agile event size calculations
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V4 0/4] Add support for TCG2 event logs on EFI systems
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [PATCH RFC 0/4] IMA on NFS prototype
- From: bfields@xxxxxxxxxxxx (J. Bruce Fields)
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH V3] Add support for TPM2 event logs on EFI systems
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v3 00/20] Merge text_poke fixes and executable lockdowns
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2] security: mark expected switch fall-throughs and add a missing break
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v2] security: mark expected switch fall-throughs and add a missing break
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v2] security: mark expected switch fall-throughs and add a missing break
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: [PATCH v3 00/20] Merge text_poke fixes and executable lockdowns
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]