Linux Integrity
[Prev Page][Next Page]
- Re: [PATCH 2/2] dt-bindings: tpm: Add st,st33ktpm2xi2c to TCG TIS binding
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH 2/2] dt-bindings: tpm: Add st,st33ktpm2xi2c to TCG TIS binding
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm: tis_i2c: Add compatible string st,st33ktpm2xi2c
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 6/6] docs: trusted-encrypted: add DCP as new trust source
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: TPM error 0x0901, possibly related to TPM2_PT_CONTEXT_GAP_MAX
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/2] Documentation: tpm_tis
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH][next] tpm/eventlog: remove redundant assignment to variabel ret
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [EXT] Re: [PATCH v8 6/6] docs: trusted-encrypted: add DCP as new trust source
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/2] dt-bindings: tpm: Add st,st33ktpm2xi2c to TCG TIS binding
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: TPM error 0x0901, possibly related to TPM2_PT_CONTEXT_GAP_MAX
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: TPM error 0x0901, possibly related to TPM2_PT_CONTEXT_GAP_MAX
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/2] dt-bindings: tpm: Add st,st33ktpm2xi2c to TCG TIS binding
- From: "Haener, Michael" <michael.haener@xxxxxxxxxxx>
- Re: [PATCH 2/2] dt-bindings: tpm: Add st,st33ktpm2xi2c to TCG TIS binding
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH 2/2] dt-bindings: tpm: Add st,st33ktpm2xi2c to TCG TIS binding
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH 2/2] dt-bindings: tpm: Add st,st33ktpm2xi2c to TCG TIS binding
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH 2/2] dt-bindings: tpm: Add st,st33ktpm2xi2c to TCG TIS binding
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH 2/2] dt-bindings: tpm: Add st,st33ktpm2xi2c to TCG TIS binding
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH 2/2] dt-bindings: tpm: Add st,st33ktpm2xi2c to TCG TIS binding
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH 2/2] dt-bindings: tpm: Add st,st33ktpm2xi2c to TCG TIS binding
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH 2/2] dt-bindings: tpm: Add st,st33ktpm2xi2c to TCG TIS binding
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH 2/2] dt-bindings: tpm: Add st,st33ktpm2xi2c to TCG TIS binding
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH 2/2] dt-bindings: tpm: Add st,st33ktpm2xi2c to TCG TIS binding
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- [PATCH 2/2] dt-bindings: tpm: Add st,st33ktpm2xi2c to TCG TIS binding
- From: "M. Haener" <michael.haener@xxxxxxxxxxx>
- [PATCH 1/2] tpm: tis_i2c: Add compatible string st,st33ktpm2xi2c
- From: "M. Haener" <michael.haener@xxxxxxxxxxx>
- [PATCH 0/2] Add ST33KTPM2XI2C chip to the TPM TIS I2C driver
- From: "M. Haener" <michael.haener@xxxxxxxxxxx>
- [PATCH v17 20/21] Documentation: add ipe documentation
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v17 14/21] ipe: add support for dm-verity as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v17 19/21] ipe: kunit test for parser
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v17 17/21] ipe: enable support for fs-verity as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v17 15/21] security: add security_inode_setintegrity() hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v17 21/21] MAINTAINERS: ipe: add ipe maintainer information
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v17 16/21] fsverity: expose verified fsverity built-in signatures to LSMs
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v17 18/21] scripts: add boot policy generation program
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v17 09/21] uapi|audit|ipe: add ipe auditing support
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v17 13/21] dm verity: consume root hash digest and expose signature data via LSM hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v17 12/21] dm: add finalize hook to target_type
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v17 11/21] block,lsm: add LSM blob and new LSM hooks for block device
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v17 08/21] ipe: add userspace interface
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v17 10/21] ipe: add permissive toggle
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v17 06/21] ipe: introduce 'boot_verified' as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v17 07/21] security: add new securityfs delete function
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v17 05/21] initramfs|security: Add a security hook to do_populate_rootfs()
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v17 02/21] ipe: add policy parser
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v17 00/21] Integrity Policy Enforcement LSM (IPE)
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v17 04/21] ipe: add LSM hooks on execution and kernel read
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v17 03/21] ipe: add evaluation loop
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v17 01/21] security: add ipe lsm
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7] ima: add crypto agility support for template-hash algorithm
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC 2/2] ima: Fix detection of read/write violations on stacked filesystems
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC 2/2] ima: Fix detection of read/write violations on stacked filesystems
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [RFC 1/2] ovl: Define D_REAL_FILEDATA for d_real to return dentry with data
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [ima-evm-utils: PATCH v2 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: "Svahn, Kai" <kai.svahn@xxxxxxxxxxxxxxx>
- [RFC 2/2] ima: Fix detection of read/write violations on stacked filesystems
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC 1/2] ovl: Define D_REAL_FILEDATA for d_real to return dentry with data
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC 0/2] ima: Fix detection of read/write violations on stacked filesystems
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v7] ima: add crypto agility support for template-hash algorithm
- From: Enrico Bravi <enrico.bravi@xxxxxxxxx>
- Re: [ima-evm-utils: PATCH v2 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: "tianjia.zhang" <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 6/6] docs: trusted-encrypted: add DCP as new trust source
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: TPM error 0x0901, possibly related to TPM2_PT_CONTEXT_GAP_MAX
- From: William Brown <wbrown@xxxxxxx>
- Re: TPM error 0x0901, possibly related to TPM2_PT_CONTEXT_GAP_MAX
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/2] Documentation: tpm_tis
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- [PATCH][next] tpm/eventlog: remove redundant assignment to variabel ret
- From: Colin Ian King <colin.i.king@xxxxxxxxx>
- Re: [PATCH v6] ima: add crypto agility support for template-hash algorithm
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6] ima: add crypto agility support for template-hash algorithm
- From: Enrico Bravi <enrico.bravi@xxxxxxxxx>
- Re: (subset) [PATCH 00/34] address all -Wunused-const warnings
- From: Sebastian Reichel <sebastian.reichel@xxxxxxxxxxxxx>
- RE: [EXT] [PATCH v8 3/6] KEYS: trusted: Introduce NXP DCP-backed trusted keys
- From: Kshitiz Varshney <kshitiz.varshney@xxxxxxx>
- Re: [PATCH v3 00/10] evm: Support signatures on stacked filesystem
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [GIT PULL] security changes for v6.9-rc3
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 2/2] Documentation: tpm_tis
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 1/2] MAINTAINERS: Update URL's for KEYS/KEYRINGS_INTEGRITY and TPM DEVICE DRIVER
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 0/2] TPM documentation updates
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] security changes for v6.9-rc3
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: [EXT] [PATCH v8 3/6] KEYS: trusted: Introduce NXP DCP-backed trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH 33/34] drivers: remove incorrect of_match_ptr/ACPI_PTR annotations
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6] ima: add crypto agility support for template-hash algorithm
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: [EXT] [PATCH v8 3/6] KEYS: trusted: Introduce NXP DCP-backed trusted keys
- From: Kshitiz Varshney <kshitiz.varshney@xxxxxxx>
- RE: [EXT] Re: [PATCH v8 6/6] docs: trusted-encrypted: add DCP as new trust source
- From: Kshitiz Varshney <kshitiz.varshney@xxxxxxx>
- [PATCH v6] ima: add crypto agility support for template-hash algorithm
- From: Enrico Bravi <enrico.bravi@xxxxxxxxx>
- Re: [PATCH v5] ima: add crypto agility support for template-hash algorithm
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5] ima: add crypto agility support for template-hash algorithm
- From: Enrico Bravi <enrico.bravi@xxxxxxxxx>
- Re: [PATCH v5] ima: add crypto agility support for template-hash algorithm
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5] ima: add crypto agility support for template-hash algorithm
- From: Enrico Bravi <enrico.bravi@xxxxxxxxx>
- Re: [PATCH 00/34] address all -Wunused-const warnings
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH 1/1] char: tpm: handle HAS_IOPORT dependencies
- From: "Arnd Bergmann" <arnd@xxxxxxxxxx>
- Re: [PATCH v5][next] integrity: Avoid -Wflex-array-member-not-at-end warnings
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH RFC 1/8] certs: Introduce ability to link to a system key
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH 1/1] char: tpm: handle HAS_IOPORT dependencies
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [PATCH v5][next] integrity: Avoid -Wflex-array-member-not-at-end warnings
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: TPM error 0x0901, possibly related to TPM2_PT_CONTEXT_GAP_MAX
- From: William Brown <wbrown@xxxxxxx>
- Re: TPM error 0x0901, possibly related to TPM2_PT_CONTEXT_GAP_MAX
- From: William Brown <wbrown@xxxxxxx>
- Re: [PATCH RFC 1/8] certs: Introduce ability to link to a system key
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5][next] integrity: Avoid -Wflex-array-member-not-at-end warnings
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5][next] integrity: Avoid -Wflex-array-member-not-at-end warnings
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] char: tpm: handle HAS_IOPORT dependencies
- From: "Arnd Bergmann" <arnd@xxxxxxxxxx>
- Re: TPM error 0x0901, possibly related to TPM2_PT_CONTEXT_GAP_MAX
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] char: tpm: handle HAS_IOPORT dependencies
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] char: tpm: handle HAS_IOPORT dependencies
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/1] char: tpm: handle HAS_IOPORT dependencies
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: TPM error 0x0901, possibly related to TPM2_PT_CONTEXT_GAP_MAX
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: TPM error 0x0901, possibly related to TPM2_PT_CONTEXT_GAP_MAX
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH v5][next] integrity: Avoid -Wflex-array-member-not-at-end warnings
- From: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/1] char: tpm: handle HAS_IOPORT dependencies
- From: "Arnd Bergmann" <arnd@xxxxxxxxxx>
- [PATCH 1/1] char: tpm: handle HAS_IOPORT dependencies
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- [PATCH 0/1] char: tpm: Handle HAS_IOPORT dependencies
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: ross.philipson@xxxxxxxxxx
- TPM error 0x0901, possibly related to TPM2_PT_CONTEXT_GAP_MAX
- From: William Brown <wbrown@xxxxxxx>
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RESEND][PATCH v3] security: Place security_path_post_mknod() where the original IMA call was
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [RESEND][PATCH v3] security: Place security_path_post_mknod() where the original IMA call was
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: "Andy Lutomirski" <luto@xxxxxxxxxx>
- Re: [PATCH 33/34] drivers: remove incorrect of_match_ptr/ACPI_PTR annotations
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 6/6] docs: trusted-encrypted: add DCP as new trust source
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 12/21] tpm: Add NULL primary creation
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RESEND][PATCH v3] security: Place security_path_post_mknod() where the original IMA call was
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 33/34] drivers: remove incorrect of_match_ptr/ACPI_PTR annotations
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 6/6] docs: trusted-encrypted: add DCP as new trust source
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [RESEND][PATCH v3] security: Place security_path_post_mknod() where the original IMA call was
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 33/34] drivers: remove incorrect of_match_ptr/ACPI_PTR annotations
- From: Corey Minyard <minyard@xxxxxxx>
- Re: [PATCH 33/34] drivers: remove incorrect of_match_ptr/ACPI_PTR annotations
- From: Corey Minyard <minyard@xxxxxxx>
- Re: [PATCH 33/34] drivers: remove incorrect of_match_ptr/ACPI_PTR annotations
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH 33/34] drivers: remove incorrect of_match_ptr/ACPI_PTR annotations
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- [RESEND][PATCH v3] security: Place security_path_post_mknod() where the original IMA call was
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 33/34] drivers: remove incorrect of_match_ptr/ACPI_PTR annotations
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 00/34] address all -Wunused-const warnings
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH v8 6/6] docs: trusted-encrypted: add DCP as new trust source
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v8 5/6] docs: document DCP-backed trusted keys kernel params
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v8 4/6] MAINTAINERS: add entry for DCP-based trusted keys
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v8 3/6] KEYS: trusted: Introduce NXP DCP-backed trusted keys
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v8 2/6] KEYS: trusted: improve scalability of trust source config
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v8 1/6] crypto: mxs-dcp: Add support for hardware-bound keys
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v8 0/6] DCP as trusted keys backend
- From: David Gstir <david@xxxxxxxxxxxxx>
- Re: [PATCH v16 17/20] ipe: enable support for fs-verity as a trust provider
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v16 16/20] fsverity: consume fsverity built-in signatures via LSM hook
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [GIT PULL] security changes for v6.9-rc3
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [GIT PULL] security changes for v6.9-rc3
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] security changes for v6.9-rc3
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [GIT PULL] security changes for v6.9-rc3
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] security changes for v6.9-rc3
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] security changes for v6.9-rc3
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [GIT PULL] security changes for v6.9-rc3
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [GIT PULL] security changes for v6.9-rc3
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] security changes for v6.9-rc3
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 12/21] tpm: Add NULL primary creation
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- [GIT PULL] security changes for v6.9-rc3
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [GIT PULL] security changes for v6.9-rc3
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [GIT PULL] security changes for v6.9-rc3
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v2] security: Handle dentries without inode in security_path_post_mknod()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v16 15/20] security: add security_inode_setintegrity() hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v16 14/20] ipe: add support for dm-verity as a trust provider
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v16 13/20] dm verity: consume root hash digest and signature data via LSM hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v16 11/20] block|security: add LSM blob to block_device
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v7 12/21] tpm: Add NULL primary creation
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 12/21] tpm: Add NULL primary creation
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH v4][next] integrity: Avoid -Wflex-array-member-not-at-end warnings
- From: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
- Re: [PATCH v8 04/15] x86: Secure Launch Resource Table header file
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v7 12/21] tpm: Add NULL primary creation
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 12/21] tpm: Add NULL primary creation
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd changes for v6.9-rc2
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 12/21] tpm: Add NULL primary creation
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 12/21] tpm: Add NULL primary creation
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] tpmdd changes for v6.9-rc2
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 12/21] tpm: Add NULL primary creation
- From: Gabríel Arthúr Pétursson <gabriel@xxxxxxxxx>
- Re: [PATCH v7 12/21] tpm: Add NULL primary creation
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 12/21] tpm: Add NULL primary creation
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] tpmdd changes for v6.9-rc2
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] tpmdd changes for v6.9-rc2
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] tpmdd changes for v6.9-rc2
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 12/21] tpm: Add NULL primary creation
- From: Gabríel Arthúr Pétursson <gabriel@xxxxxxxxx>
- Re: [PATCH v16 11/20] block|security: add LSM blob to block_device
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v16 01/20] security: add ipe lsm
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 04/15] x86: Secure Launch Resource Table header file
- From: Kim Phillips <kim.phillips@xxxxxxx>
- Re: [PATCH 2/2] ima: evm: Rename *_post_path_mknod() to *_path_post_mknod()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] ima: evm: Rename *_post_path_mknod() to *_path_post_mknod()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] ima: evm: Rename *_post_path_mknod() to *_path_post_mknod()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] security: Handle dentries without inode in security_path_post_mknod()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] ima: evm: Rename *_post_path_mknod() to *_path_post_mknod()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] ima: evm: Rename *_post_path_mknod() to *_path_post_mknod()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] security: Handle dentries without inode in security_path_post_mknod()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] security: Handle dentries without inode in security_path_post_mknod()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 2/2] ima: evm: Rename *_post_path_mknod() to *_path_post_mknod()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 1/2] security: Handle dentries without inode in security_path_post_mknod()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] ima: Fix use-after-free on a dentry's dname.name
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v16 01/20] security: add ipe lsm
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v16 03/20] ipe: add evaluation loop
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v16 02/20] ipe: add policy parser
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v16 02/20] ipe: add policy parser
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v16 01/20] security: add ipe lsm
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v16 00/20] Integrity Policy Enforcement LSM (IPE)
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v16 00/20] Integrity Policy Enforcement LSM (IPE)
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH v16 20/20] documentation: add ipe documentation
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 09/20] uapi|audit|ipe: add ipe auditing support
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 18/20] scripts: add boot policy generation program
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 16/20] fsverity: consume fsverity built-in signatures via LSM hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 19/20] ipe: kunit test for parser
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 07/20] security: add new securityfs delete function
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 17/20] ipe: enable support for fs-verity as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 14/20] ipe: add support for dm-verity as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 11/20] block|security: add LSM blob to block_device
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 15/20] security: add security_inode_setintegrity() hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 10/20] ipe: add permissive toggle
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 12/20] dm: add finalize hook to target_type
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 08/20] ipe: add userspace interface
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 13/20] dm verity: consume root hash digest and signature data via LSM hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 06/20] ipe: introduce 'boot_verified' as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 05/20] initramfs|security: Add a security hook to do_populate_rootfs()
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 00/20] Integrity Policy Enforcement LSM (IPE)
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 02/20] ipe: add policy parser
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 04/20] ipe: add LSM hooks on execution and kernel read
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 01/20] security: add ipe lsm
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 03/20] ipe: add evaluation loop
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 6/6] docs: trusted-encrypted: add DCP as new trust source
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 6/6] docs: trusted-encrypted: add DCP as new trust source
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: kernel crash in mknod
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: kernel crash in mknod
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: kernel crash in mknod
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: kernel crash in mknod
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: kernel crash in mknod
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: kernel crash in mknod
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 6/6] docs: trusted-encrypted: add DCP as new trust source
- From: David Gstir <david@xxxxxxxxxxxxx>
- Re: [PATCH] ima: define an init_module critical data record
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] ima: define an init_module critical data record
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: define an init_module critical data record
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 6/6] docs: trusted-encrypted: add DCP as new trust source
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 2/6] KEYS: trusted: improve scalability of trust source config
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 5/6] docs: document DCP-backed trusted keys kernel params
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH] ima: define an init_module critical data record
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH v2 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v7 6/6] docs: trusted-encrypted: add DCP as new trust source
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v7 5/6] docs: document DCP-backed trusted keys kernel params
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v7 4/6] MAINTAINERS: add entry for DCP-based trusted keys
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v7 3/6] KEYS: trusted: Introduce NXP DCP-backed trusted keys
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v7 2/6] KEYS: trusted: improve scalability of trust source config
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v7 1/6] crypto: mxs-dcp: Add support for hardware-bound keys
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v7 0/6] DCP as trusted keys backend
- From: David Gstir <david@xxxxxxxxxxxxx>
- [GIT PULL] tpmdd changes for v6.9-rc2
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: kernel crash in mknod
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: kernel crash in mknod
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: kernel crash in mknod
- From: Paulo Alcantara <pc@xxxxxxxxxxxxx>
- Re: kernel crash in mknod
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: kernel crash in mknod
- From: Paulo Alcantara <pc@xxxxxxxxxxxxx>
- Re: kernel crash in mknod
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: kernel crash in mknod
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- RE: kernel crash in mknod
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: kernel crash in mknod
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: kernel crash in mknod
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: kernel crash in mknod
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: Issue with TPM2 Encrypt/Decrypt Functionality and TSS API Integration
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: Issue with TPM2 Encrypt/Decrypt Functionality and TSS API Integration
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH v3 00/32] spi: get rid of some legacy macros
- From: patchwork-bot+chrome-platform@xxxxxxxxxx
- Re: [PATCH v3 00/32] spi: get rid of some legacy macros
- From: patchwork-bot+chrome-platform@xxxxxxxxxx
- Re: kernel crash in mknod
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- RE: kernel crash in mknod
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v4] Documentation: tpm_tis
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v4] Documentation: tpm_tis
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v4] Documentation: tpm_tis
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 01/15] x86/boot: Place kernel_info at a fixed offset
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] Documentation: tpm_tis
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] Documentation: tpm_tis
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [PATCH v8 01/15] x86/boot: Place kernel_info at a fixed offset
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- [PATCH] ima: Fix use-after-free on a dentry's dname.name
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v4] Documentation: tpm_tis
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC v15 12/21] security: add security_bdev_setintegrity() hook
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] Documentation: tpm_tis
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] Documentation: tpm_tis
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH v3] Documentation: tpm_tis
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] Documentation: tpm_tis
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] Documentation: tpm_tis
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] Documentation: tpm_tis
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] Documentation: tpm_tis
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3][next] integrity: Avoid -Wflex-array-member-not-at-end warnings
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: [PATCH v2] Documentation: tpm_tis
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] Documentation: tpm_tis
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v4] ima: add crypto agility support for template-hash algorithm
- From: Enrico Bravi <enrico.bravi@xxxxxxxxx>
- Re: [PATCH v8 14/15] x86: Secure Launch late initcall platform module
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3][next] integrity: Avoid -Wflex-array-member-not-at-end warnings
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 01/15] x86/boot: Place kernel_info at a fixed offset
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH v2 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: Patrick Uiterwijk <patrick@xxxxxxxxxxxxxx>
- [PATCH v3][next] integrity: Avoid -Wflex-array-member-not-at-end warnings
- From: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
- [PATCH v2][next] integrity: Avoid -Wflex-array-member-not-at-end warnings
- From: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
- Re: [PATCH][next] integrity: Avoid -Wflex-array-member-not-at-end warnings
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH v2 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: Dmitry Baryshkov <dbaryshkov@xxxxxxxxx>
- Re: [PATCH][next] integrity: Avoid -Wflex-array-member-not-at-end warnings
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH RFC v15 12/21] security: add security_bdev_setintegrity() hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH v2 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH RFC v15 14/21] dm verity: consume root hash digest and signature data via LSM hook
- From: Mike Snitzer <snitzer@xxxxxxxxxx>
- Re: [PATCH RFC v15 14/21] dm verity: consume root hash digest and signature data via LSM hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v15 14/21] dm verity: consume root hash digest and signature data via LSM hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] Documentation: tpm_tis
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2] Documentation: tpm_tis
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v4] ima: add crypto agility support for template-hash algorithm
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4] ima: add crypto agility support for template-hash algorithm
- From: Enrico Bravi <enrico.bravi@xxxxxxxxx>
- Re: [PATCH v4] ima: add crypto agility support for template-hash algorithm
- From: Enrico Bravi <enrico.bravi@xxxxxxxxx>
- [PATCH v2] Documentation: tpm_tis
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC v15 12/21] security: add security_bdev_setintegrity() hook
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC v15 12/21] security: add security_bdev_setintegrity() hook
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC v15 14/21] dm verity: consume root hash digest and signature data via LSM hook
- From: Mike Snitzer <snitzer@xxxxxxxxxx>
- Re: [PATCH v3 08/10] evm: Enforce signatures on unsupported filesystem for EVM_INIT_X509
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v15 17/21] fsverity: consume builtin signature via LSM hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v15 16/21] security: add security_inode_setintegrity() hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v15 14/21] dm verity: consume root hash digest and signature data via LSM hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v15 12/21] security: add security_bdev_setintegrity() hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 01/10] ima: Rename backing_inode to real_inode
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 02/10] security: allow finer granularity in permitting copy-up of security xattrs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 04/10] evm: Use the metadata inode to calculate metadata hash
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 10/10] evm: Rename is_unsupported_fs to is_unsupported_hmac_fs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 09/10] fs: Rename SB_I_EVM_UNSUPPORTED to SB_I_EVM_HMAC_UNSUPPORTED
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 07/10] ima: re-evaluate file integrity on file metadata change
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 03/10] evm: Implement per signature type decision in security_inode_copy_up_xattr
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Fix suspend/shutdown on some boards by preserving chip Locality
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm: Fix suspend/shutdown on some boards by preserving chip Locality
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH v2] MAINTAINERS: Update URL's for KEYS/KEYRINGS_INTEGRITY and TPM DEVICE DRIVER
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: Update W's for KEYS/KEYRINGS_INTEGRITY and TPM DEVICE RIVER
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm: Fix suspend/shutdown on some boards by preserving chip Locality
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm: Fix suspend/shutdown on some boards by preserving chip Locality
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH][next] integrity: Avoid -Wflex-array-member-not-at-end warnings
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH v2 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: Alberto Mardegan <a.mardegan@xxxxxx>
- Re: [RFC PATCH v15 18/21] ipe: enable support for fs-verity as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v15 18/21] ipe: enable support for fs-verity as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH v2 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH v2 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [ima-evm-utils: PATCH v2 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [ima-evm-utils: PATCH v2 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [ima-evm-utils: PATCH v2 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- Re: [PATCH v4] ima: add crypto agility support for template-hash algorithm
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4] ima: add crypto agility support for template-hash algorithm
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v15 18/21] ipe: enable support for fs-verity as a trust provider
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v15 17/21] fsverity: consume builtin signature via LSM hook
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH v15 18/21] ipe: enable support for fs-verity as a trust provider
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH v15 05/21] initramfs|security: Add a security hook to do_populate_rootfs()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v15 05/21] initramfs|security: Add a security hook to do_populate_rootfs()
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [RFC PATCH v15 21/21] documentation: add ipe documentation
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v15 09/21] uapi|audit|ipe: add ipe auditing support
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v15 19/21] scripts: add boot policy generation program
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v15 20/21] ipe: kunit test for parser
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v15 13/21] dm: add finalize hook to target_type
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v15 08/21] ipe: add userspace interface
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v15 16/21] security: add security_inode_setintegrity() hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v15 15/21] ipe: add support for dm-verity as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v15 17/21] fsverity: consume builtin signature via LSM hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v15 10/21] ipe: add permissive toggle
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v15 18/21] ipe: enable support for fs-verity as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v15 12/21] security: add security_bdev_setintegrity() hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v15 14/21] dm verity: consume root hash digest and signature data via LSM hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v15 11/21] block|security: add LSM blob to block_device
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v15 07/21] security: add new securityfs delete function
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v15 06/21] ipe: introduce 'boot_verified' as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v15 05/21] initramfs|security: Add a security hook to do_populate_rootfs()
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v15 02/21] ipe: add policy parser
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v15 01/21] security: add ipe lsm
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v15 04/21] ipe: add LSM hooks on execution and kernel read
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v15 00/21] Integrity Policy Enforcement LSM (IPE)
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v15 03/21] ipe: add evaluation loop
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Fix suspend/shutdown on some boards by preserving chip Locality
- From: Adam Alves <adamoa@xxxxxxxxx>
- Re: [PATCH v2] tpm: Fix suspend/shutdown on some boards by preserving chip Locality
- From: Adam Alves <adamoa@xxxxxxxxx>
- Re: [ima-evm-utils: PATCH v1 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd changes for v6.9
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v2] tpm: Fix suspend/shutdown on some boards by preserving chip Locality
- From: Adam Alves <adamoa@xxxxxxxxx>
- Re: [ima-evm-utils: PATCH v1 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH v2] integrity: eliminate unnecessary "Problem loading X.509 certificate" msg
- From: Coiby Xu <coxu@xxxxxxxxxx>
- Re: [RFC PATCH v14 15/19] fsverity: consume builtin signature via LSM hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 3/3] tpm: of: If available use linux,sml-log to get the log and its size
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] powerpc/prom_init: Replace linux,sml-base/sml-size with linux,sml-log
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] tpm: of: If available Use linux,sml-log to get the log and its size
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC PATCH v14 15/19] fsverity: consume builtin signature via LSM hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v14 15/19] fsverity: consume builtin signature via LSM hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v14 15/19] fsverity: consume builtin signature via LSM hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v14 15/19] fsverity: consume builtin signature via LSM hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] powerpc/prom_init: Replace linux,sml-base/sml-size with linux,sml-log
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [RFC PATCH v2 2/3] dt-bindings: tpm: Add linux,sml-log to ibm,vtpm.yaml
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/2] tpm: of: If available Use linux,sml-log to get the log and its size
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 3/3] tpm: of: If available use linux,sml-log to get the log and its size
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC 1/8] certs: Introduce ability to link to a system key
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 2/3] dt-bindings: tpm: Add linux,sml-log to ibm,vtpm.yaml
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH RFC 8/8] clavis: Introduce new LSM called clavis
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH v14 15/19] fsverity: consume builtin signature via LSM hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 2/3] dt-bindings: tpm: Add linux,sml-log to ibm,vtpm.yaml
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH 2/2] tpm: of: If available Use linux,sml-log to get the log and its size
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] powerpc/prom_init: Replace linux,sml-base/sml-size with linux,sml-log
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- RE: [EXTERNAL] [PATCH RFC 1/8] certs: Introduce ability to link to a system key
- From: Bharat Bhushan <bbhushan2@xxxxxxxxxxx>
- Re: [RFC PATCH v14 15/19] fsverity: consume builtin signature via LSM hook
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH v14 15/19] fsverity: consume builtin signature via LSM hook
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH RFC 8/8] clavis: Introduce new LSM called clavis
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [GIT PULL] tpmdd changes for v6.9
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC 1/8] certs: Introduce ability to link to a system key
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH RFC 1/8] certs: Introduce ability to link to a system key
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH v2 3/3] tpm: of: If available use linux,sml-log to get the log and its size
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2 3/3] tpm: of: If available use linux,sml-log to get the log and its size
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 1/3] powerpc/prom_init: Replace linux,sml-base/sml-size with linux,sml-log
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/2] tpm: of: If available Use linux,sml-log to get the log and its size
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 3/6] KEYS: trusted: Introduce NXP DCP-backed trusted keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm: Fix suspend/shutdown on some boards by preserving chip Locality
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC 1/8] certs: Introduce ability to link to a system key
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC 1/8] certs: Introduce ability to link to a system key
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 1/3] powerpc/prom_init: Replace linux,sml-base/sml-size with linux,sml-log
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC PATCH v14 05/19] initramfs|security: Add a security hook to do_populate_rootfs()
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v14 01/19] security: add ipe lsm
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 1/3] powerpc/prom_init: Replace linux,sml-base/sml-size with linux,sml-log
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [RFC PATCH v2 1/3] powerpc/prom_init: Replace linux,sml-base/sml-size with linux,sml-log
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH RFC 8/8] clavis: Introduce new LSM called clavis
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC 7/8] clavis: Introduce a new key type called clavis_key_acl
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC 6/8] keys: Add ability to track intended usage of the public key
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC 0/8] Clavis LSM
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC 5/8] keys: Add new verification type (VERIFYING_CLAVIS_SIGNATURE)
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC 4/8] clavis: Prevent clavis boot param from changing during kexec
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC 2/8] clavis: Introduce a new system keyring called clavis
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC 1/8] certs: Introduce ability to link to a system key
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC 3/8] efi: Make clavis boot param persist across kexec
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH v14 05/19] initramfs|security: Add a security hook to do_populate_rootfs()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v14 01/19] security: add ipe lsm
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC][PATCH 5/8] ima: Record IMA verification result of digest lists in digest cache
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC PATCH v2 2/3] dt-bindings: tpm: Add linux,sml-log to ibm,vtpm.yaml
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC PATCH v2 3/3] tpm: of: If available use linux,sml-log to get the log and its size
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC PATCH v2 1/3] powerpc/prom_init: Replace linux,sml-base/sml-size with linux,sml-log
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC PATCH v2 0/3] Preserve TPM log across kexec
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC][PATCH 4/8] ima: Add digest_cache_measure and digest_cache_appraise boot-time policies
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC][PATCH 8/8] ima: Detect if digest cache changed since last measurement/appraisal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC][PATCH 8/8] ima: Detect if digest cache changed since last measurement/appraisal
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v14 00/19] Integrity Policy Enforcement LSM (IPE)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] powerpc/prom_init: Replace linux,sml-base/sml-size with linux,sml-log
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] powerpc/prom_init: Replace linux,sml-base/sml-size with linux,sml-log
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [RFC][PATCH 8/8] ima: Detect if digest cache changed since last measurement/appraisal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC][PATCH 6/8] ima: Use digest cache for measurement
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC][PATCH 6/8] ima: Use digest cache for measurement
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3] tpm: Fix suspend/shutdown on some boards by preserving chip Locality
- From: Adam Alves <adamoa@xxxxxxxxx>
- Re: [RFC][PATCH 4/8] ima: Add digest_cache_measure and digest_cache_appraise boot-time policies
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Fix suspend/shutdown on some boards by preserving chip Locality
- From: Adam Alves <adamoa@xxxxxxxxx>
- Re: [RFC][PATCH 3/8] ima: Add digest_cache policy keyword
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] powerpc/prom_init: Replace linux,sml-base/sml-size with linux,sml-log
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] tpm: of: If available Use linux,sml-log to get the log and its size
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v4] ima: add crypto agility support for template-hash algorithm
- From: Enrico Bravi <enrico.bravi@xxxxxxxxx>
- Re: [RFC][PATCH 4/8] ima: Add digest_cache_measure and digest_cache_appraise boot-time policies
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Fix suspend/shutdown on some boards by preserving chip Locality
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: [RFC][PATCH 3/8] ima: Add digest_cache policy keyword
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC][PATCH 2/8] ima: Nest iint mutex for DIGEST_LIST_CHECK hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 3/6] KEYS: trusted: Introduce NXP DCP-backed trusted keys
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v2] tpm: Fix suspend/shutdown on some boards by preserving chip Locality
- From: Adam Alves <adamoa@xxxxxxxxx>
- Re: [PATCH 0/2] Preserve TPM log across kexec
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] Fix TPM chip hanging system before suspend/shutdown
- From: Adam Alves <adamoa@xxxxxxxxx>
- Re: [PATCH 1/2] powerpc/prom_init: Replace linux,sml-base/sml-size with linux,sml-log
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 0/2] Preserve TPM log across kexec
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 1/2] powerpc/prom_init: Replace linux,sml-base/sml-size with linux,sml-log
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH 1/2] powerpc/prom_init: Replace linux,sml-base/sml-size with linux,sml-log
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] powerpc/prom_init: Replace linux,sml-base/sml-size with linux,sml-log
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH] tpm,tpm_tis: Avoid warning splat at shutdown
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: [RFC][PATCH 4/8] ima: Add digest_cache_measure and digest_cache_appraise boot-time policies
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] powerpc/prom_init: Replace linux,sml-base/sml-size with linux,sml-log
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm,tpm_tis: Avoid warning splat at shutdown
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] xattr: restrict vfs_getxattr_alloc() allocation size
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] xattr: restrict vfs_getxattr_alloc() allocation size
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/2] tpm: of: If available Use linux,sml-log to get the log and its size
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/2] tpm: of: If available Use linux,sml-log to get the log and its size
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/1] Fix TPM chip hanging system before suspend/shutdown
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] Fix TPM chip hanging system before suspend/shutdown
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC][PATCH 2/8] ima: Nest iint mutex for DIGEST_LIST_CHECK hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC][PATCH 3/8] ima: Add digest_cache policy keyword
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: tpm_tis_remove: `WARNING: CPU: 6 PID: 265 at kernel/workqueue.c:3397 __flush_work.isra.0+0x29f/0x2c0`
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 5/6] docs: document DCP-backed trusted keys kernel params
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 3/6] KEYS: trusted: Introduce NXP DCP-backed trusted keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 3/6] KEYS: trusted: Introduce NXP DCP-backed trusted keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 2/6] KEYS: trusted: improve scalability of trust source config
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 1/6] crypto: mxs-dcp: Add support for hardware-bound keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH v6 6/6] docs: trusted-encrypted: add DCP as new trust source
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v6 5/6] docs: document DCP-backed trusted keys kernel params
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v6 4/6] MAINTAINERS: add entry for DCP-based trusted keys
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v6 3/6] KEYS: trusted: Introduce NXP DCP-backed trusted keys
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v6 2/6] KEYS: trusted: improve scalability of trust source config
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v6 1/6] crypto: mxs-dcp: Add support for hardware-bound keys
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v5 0/6] DCP as trusted keys backend
- From: David Gstir <david@xxxxxxxxxxxxx>
- Re: [PATCH v5 4/6] MAINTAINERS: add entry for DCP-based trusted keys
- From: David Gstir <david@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] powerpc/prom_init: Replace linux,sml-base/sml-size with linux,sml-log
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] evm: Change vfs_getxattr() with __vfs_getxattr() in evm_calc_hmac_or_hash()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] tpm: of: If available Use linux,sml-log to get the log and its size
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] evm: Change vfs_getxattr() with __vfs_getxattr() in evm_calc_hmac_or_hash()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] evm: Change vfs_getxattr() with __vfs_getxattr() in evm_calc_hmac_or_hash()
- From: Seth Forshee <sforshee@xxxxxxxxxx>
- [PATCH] evm: Change vfs_getxattr() with __vfs_getxattr() in evm_calc_hmac_or_hash()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] tpm: of: If available Use linux,sml-log to get the log and its size
- From: Conor Dooley <conor.dooley@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] tpm: of: If available Use linux,sml-log to get the log and its size
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] powerpc/prom_init: Replace linux,sml-base/sml-size with linux,sml-log
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v39 01/42] integrity: disassociate ima_filter_rule from security_audit_rule
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v14 17/19] scripts: add boot policy generation program
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH 1/1] Fix TPM chip hanging system before suspend/shutdown
- From: Adam Alves <adamoa@xxxxxxxxx>
- [PATCH 0/1] Fix TPM chip hanging system before suspend/shutdown
- From: Adam Alves <adamoa@xxxxxxxxx>
- Re: [RFC PATCH v14 16/19] ipe: enable support for fs-verity as a trust provider
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [RFC PATCH v14 14/19] ipe: add support for dm-verity as a trust provider
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [RFC PATCH v14 19/19] documentation: add ipe documentation
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v14 16/19] ipe: enable support for fs-verity as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v14 17/19] scripts: add boot policy generation program
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v14 08/19] ipe: add userspace interface
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v14 11/19] block|security: add LSM blob to block_device
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v14 14/19] ipe: add support for dm-verity as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v14 18/19] ipe: kunit test for parser
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v14 15/19] fsverity: consume builtin signature via LSM hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v14 13/19] dm verity: consume root hash digest and signature data via LSM hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v14 09/19] uapi|audit|ipe: add ipe auditing support
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v14 12/19] dm: add finalize hook to target_type
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v14 06/19] ipe: introduce 'boot_verified' as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v14 10/19] ipe: add permissive toggle
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v14 07/19] security: add new securityfs delete function
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v14 05/19] initramfs|security: Add a security hook to do_populate_rootfs()
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v14 02/19] ipe: add policy parser
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v14 03/19] ipe: add evaluation loop
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v14 00/19] Integrity Policy Enforcement LSM (IPE)
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v14 04/19] ipe: add LSM hooks on execution and kernel read
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v14 01/19] security: add ipe lsm
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH] Fix TPM chip hanging system before suspend/shutdown
- From: Adam Alves <adamoa@xxxxxxxxx>
- Re: [PATCH v39 01/42] integrity: disassociate ima_filter_rule from security_audit_rule
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] Preserve TPM log across kexec
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 2/2] tpm: of: If available Use linux,sml-log to get the log and its size
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 1/2] powerpc/prom_init: Replace linux,sml-base/sml-size with linux,sml-log
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 0/2] Preserve TPM log across kexec
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2 24/25] commoncap: use vfs fscaps interfaces
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] integrity: eliminate unnecessary "Problem loading X.509 certificate" msg
- From: Maxime Ripard <mripard@xxxxxxxxxx>
- Re: [PATCH v2] integrity: eliminate unnecessary "Problem loading X.509 certificate" msg
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] integrity: eliminate unnecessary "Problem loading X.509 certificate" msg
- From: Maxime Ripard <mripard@xxxxxxxxxx>
- Re: [PATCH v39 01/42] integrity: disassociate ima_filter_rule from security_audit_rule
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 24/25] commoncap: use vfs fscaps interfaces
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 24/25] commoncap: use vfs fscaps interfaces
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 24/25] commoncap: use vfs fscaps interfaces
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Issue with TPM2 Encrypt/Decrypt Functionality and TSS API Integration
- From: Samuel Lee <slee@xxxxxxxxxxxxx>
- Re: [GIT PULL] integrity: subsystem update for v6.8-rcX
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v2 24/25] commoncap: use vfs fscaps interfaces
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- Re: [PATCH v2 24/25] commoncap: use vfs fscaps interfaces
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 24/25] commoncap: use vfs fscaps interfaces
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 24/25] commoncap: use vfs fscaps interfaces
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- Re: [PATCH v2 24/25] commoncap: use vfs fscaps interfaces
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 24/25] commoncap: use vfs fscaps interfaces
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH] xattr: restrict vfs_getxattr_alloc() allocation size
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: tpm_tis_remove: `WARNING: CPU: 6 PID: 265 at kernel/workqueue.c:3397 __flush_work.isra.0+0x29f/0x2c0`
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: [PATCH] tpm,tpm_tis: Avoid warning splat at shutdown
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: [PATCH] xattr: restrict vfs_getxattr_alloc() allocation size
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH] xattr: restrict vfs_getxattr_alloc() allocation size
- From: Seth Forshee <sforshee@xxxxxxxxxx>
- Re: [PATCH] xattr: restrict vfs_getxattr_alloc() allocation size
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v2 24/25] commoncap: use vfs fscaps interfaces
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH] xattr: restrict vfs_getxattr_alloc() allocation size
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [GIT PULL] integrity: subsystem update for v6.8-rcX
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 24/25] commoncap: use vfs fscaps interfaces
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH] Documentation: tpm_tis
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- Re: [PATCH] Documentation: tpm_tis
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v5 0/6] DCP as trusted keys backend
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 4/6] MAINTAINERS: add entry for DCP-based trusted keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 3/6] KEYS: trusted: Introduce NXP DCP-backed trusted keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 2/6] KEYS: trusted: improve scalability of trust source config
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 1/6] crypto: mxs-dcp: Add support for hardware-bound keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 1/6] crypto: mxs-dcp: Add support for hardware-bound keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] Documentation: tpm_tis
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH] Documentation: tpm_tis
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2] MAINTAINERS: Update W's for KEYS/KEYRINGS_INTEGRITY and TPM DEVICE DRIVER
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH][next] integrity: Avoid -Wflex-array-member-not-at-end warnings
- From: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
- Re: [PATCH v2 24/25] commoncap: use vfs fscaps interfaces
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- Re: [PATCH v2 24/25] commoncap: use vfs fscaps interfaces
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 24/25] commoncap: use vfs fscaps interfaces
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- Re: [PATCH v2 14/25] evm: add support for fscaps security hooks
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 06/25] capability: provide helpers for converting between xattrs and vfs_caps
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- Re: [PATCH v2 24/25] commoncap: use vfs fscaps interfaces
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 06/25] capability: provide helpers for converting between xattrs and vfs_caps
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [syzbot] [integrity?] [lsm?] KMSAN: uninit-value in ima_add_template_entry
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [syzbot] [lsm?] [integrity?] KMSAN: uninit-value in ima_add_template_entry
- From: syzbot <syzbot+7bc44a489f0ef0670bd5@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v13 14/20] dm verity: consume root hash digest and signature data via LSM hook
- From: Mike Snitzer <snitzer@xxxxxxxxxx>
- Re: [RFC PATCH v13 14/20] dm verity: consume root hash digest and signature data via LSM hook
- From: Mike Snitzer <snitzer@xxxxxxxxxx>
- Re: [RFC PATCH v13 13/20] dm: add finalize hook to target_type
- From: Mike Snitzer <snitzer@xxxxxxxxxx>
- Re: [RFC PATCH v13 12/20] dm verity: set DM_TARGET_SINGLETON feature flag
- From: Mike Snitzer <snitzer@xxxxxxxxxx>
- Re: TPM error path on probe
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 06/25] capability: provide helpers for converting between xattrs and vfs_caps
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- Re: [PATCH v2 11/25] security: add hooks for set/get/remove of fscaps
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- Re: [PATCH v2 06/25] capability: provide helpers for converting between xattrs and vfs_caps
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH v1 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2 11/25] security: add hooks for set/get/remove of fscaps
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 14/25] evm: add support for fscaps security hooks
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 14/25] evm: add support for fscaps security hooks
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [ima-evm-utils PATCH] Add missing newline to error message
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2 14/25] evm: add support for fscaps security hooks
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 14/25] evm: add support for fscaps security hooks
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 14/25] evm: add support for fscaps security hooks
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v5 4/8] ima: kexec: define functions to copy IMA log at soft boot
- From: Petr Tesařík <petr@xxxxxxxxxxx>
- Re: [PATCH v2 14/25] evm: add support for fscaps security hooks
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH v1 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: Frank Sorenson <sorenson@xxxxxxxxxx>
- Re: [RFC PATCH v13 17/20] ipe: enable support for fs-verity as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v13 17/20] ipe: enable support for fs-verity as a trust provider
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH v13 17/20] ipe: enable support for fs-verity as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: TPM error path on probe
- From: Tim Harvey <tharvey@xxxxxxxxxxxxx>
- Re: [PATCH v5 6/8] ima: suspend measurements during buffer copy at kexec execute
- From: Petr Tesařík <petr@xxxxxxxxxxx>
- Re: TPM error path on probe
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [RFC PATCH v13 17/20] ipe: enable support for fs-verity as a trust provider
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH v13 17/20] ipe: enable support for fs-verity as a trust provider
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [RFC PATCH v13 20/20] documentation: add ipe documentation
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v13 17/20] ipe: enable support for fs-verity as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v13 15/20] ipe: add support for dm-verity as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v13 09/20] uapi|audit|ipe: add ipe auditing support
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v13 19/20] ipe: kunit test for parser
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v13 18/20] scripts: add boot policy generation program
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v13 08/20] ipe: add userspace interface
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v13 16/20] fsverity: consume builtin signature via LSM hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v13 12/20] dm verity: set DM_TARGET_SINGLETON feature flag
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v13 11/20] block|security: add LSM blob to block_device
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v13 13/20] dm: add finalize hook to target_type
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v13 14/20] dm verity: consume root hash digest and signature data via LSM hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v13 10/20] ipe: add permissive toggle
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v13 07/20] security: add new securityfs delete function
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v13 06/20] ipe: introduce 'boot_verified' as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v13 05/20] initramfs|security: Add a security hook to do_populate_rootfs()
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v13 01/20] security: add ipe lsm
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v13 00/20] Integrity Policy Enforcement LSM (IPE)
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v13 04/20] ipe: add LSM hooks on execution and kernel read
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v13 02/20] ipe: add policy parser
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v13 03/20] ipe: add evaluation loop
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- TPM error path on probe
- From: Tim Harvey <tharvey@xxxxxxxxxxxxx>
- Re: [PATCH v3 00/13] security: digest_cache LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 ima-evm-utils 4/7] evmctl: Replace deprecated sign_hash with imaevm_signhash
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v4 ima-evm-utils 1/7] tests: Skip pkcs11 test if no engine support in evmctl
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v4 ima-evm-utils 5/7] Add support for OpenSSL provider to the library and evmctl
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v4 ima-evm-utils 7/7] ci: Install pkcs11-provider where available
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v4 ima-evm-utils 0/7] Implement imaevm_signhash and add provider support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v4 ima-evm-utils 2/7] headers: Remove usage of CONFIG_IMA_EVM_ENGINE from public header
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v4 ima-evm-utils 6/7] tests: Add pkcs11 test using provider
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v4 ima-evm-utils 3/7] Implement imaevm_signhash library function and deprecate sign_hash
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: Add TPM DT bindings to TPM maintainers
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: Update W's for KEYS/KEYRINGS_INTEGRITY and TPM DEVICE RIVER
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 20/25] ovl: add fscaps handlers
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: Add TPM DT bindings to TPM maintainers
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v2 20/25] ovl: add fscaps handlers
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [ima-evm-utils: PATCH v1 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: André Draszik <git@xxxxxxxxxx>
- Re: [ima-evm-utils: PATCH v1 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: Tergel Myanganbayar <tergelmyanganbayar2024@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 ima-evm-utils 0/7] Deprecate sign_hash and add provider support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 ima-evm-utils 4/7] evmctl: Replace deprecated sign_hash with imaevm_signhash
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 ima-evm-utils 3/7] Pass ENGINE and keyid through to function using them
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 ima-evm-utils 7/7] ci: Install pkcs11-provider where available
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 ima-evm-utils 0/7] Deprecate sign_hash and add provider support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 ima-evm-utils 5/7] Add support for OpenSSL provider to the library and evmctl
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 ima-evm-utils 6/7] tests: Add pkcs11 test using provider
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 ima-evm-utils 2/7] headers: Remove usage of CONFIG_IMA_EVM_ENGINE from public header
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 ima-evm-utils 1/7] tests: Skip pkcs11 test if no engine support in evmctl
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH v1 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: George Wilson <gcwilson@xxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH v1 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 ima-evm-utils 2/6] Pass ENGINE and keyid through to function using them
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: Update W's for KEYS/KEYRINGS_INTEGRITY and TPM DEVICE RIVER
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: Update W's for KEYS/KEYRINGS_INTEGRITY and TPM DEVICE RIVER
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: Update W's for KEYS/KEYRINGS_INTEGRITY and TPM DEVICE RIVER
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 0/6] DCP as trusted keys backend
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: Update W's for KEYS/KEYRINGS_INTEGRITY and TPM DEVICE RIVER
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: Update W's for KEYS/KEYRINGS_INTEGRITY and TPM DEVICE RIVER
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- [PATCH] MAINTAINERS: Update W's for KEYS/KEYRINGS_INTEGRITY and TPM DEVICE RIVER
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 0/6] DCP as trusted keys backend
- From: Richard Weinberger <richard@xxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH v1 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: "Bruno Meneguele" <bmeneg@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [ima-evm-utils: PATCH v1 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH v1 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 21/21] tpm: disable the TPM if NULL name changes
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [ima-evm-utils: PATCH v1 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [ima-evm-utils: PATCH v1 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH v1 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 10/10] evm: Rename is_unsupported_fs to is_unsupported_hmac_fs
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 09/10] fs: Rename SB_I_EVM_UNSUPPORTED to SB_I_EVM_HMAC_UNSUPPORTED
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]