Linux Integrity
[Prev Page][Next Page]
- Re: [PATCH 6/6] ima: Use ima tcb policy files for test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] kexec, KEYS: Make use of platform keyring for signature verify
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] kexec, KEYS: Make use of platform keyring for signature verify
- From: Kairui Song <kasong@xxxxxxxxxx>
- Re: [PATCH 0/6] LTP IMA fix bundle
- From: Jia Zhang <zhang.jia@xxxxxxxxxxxxxxxxx>
- Re: OTA does not work with IMA due to xattr not supported by zip
- From: rishi gupta <gupt21@xxxxxxxxx>
- Re: [RFC PATCH 2/2] kexec, KEYS: Make use of platform keyring for signature verify
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [BUG] Nuvoton NCPT650 TPM 2.0 mode not working
- From: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
- Re: [BUG] Nuvoton NCPT650 TPM 2.0 mode not working
- From: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
- RE: [PATCH 0/5] Extend TPM PPI interface to support revision 1.3
- From: "Safford, David (GE Global Research)" <david.safford@xxxxxx>
- Re: [PATCH v7 1/5] tpm: dynamically allocate the allocated_banks array
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] kexec, KEYS: Make use of platform keyring for signature verify
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [BUG] Nuvoton NCPT650 TPM 2.0 mode not working
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] kexec, KEYS: Make use of platform keyring for signature verify
- From: Dave Young <dyoung@xxxxxxxxxx>
- [PATCH v2 0/2] tpm/eventlog/tpm1: Small fixes
- From: Jia Zhang <zhang.jia@xxxxxxxxxxxxxxxxx>
- [PATCH 2/2] tpm/eventlog/tpm1: Fix off-by-1 when reading binary_bios_measurements
- From: Jia Zhang <zhang.jia@xxxxxxxxxxxxxxxxx>
- [PATCH 1/2] tpm/eventlog/tpm1: Simplify walking over *pos measurements
- From: Jia Zhang <zhang.jia@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] tpm/eventlog/tpm1: Simplify walking over *pos measurements
- From: Jia Zhang <zhang.jia@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 1/5] tpm: dynamically allocate the allocated_banks array
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: OTA does not work with IMA due to xattr not supported by zip
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: tpm_tis TPM2.0 not detected on cold boot
- From: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
- Re: tpm_tis TPM2.0 not detected on cold boot
- From: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
- Re: Add support for the TCG2 event log on UEFI systems
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 1/5] tpm: dynamically allocate the allocated_banks array
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] tpm/eventlog/tpm1: Fix off-by-1 when reading binary_bios_measurements
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] tpm/eventlog/tpm1: Simplify walking over *pos measurements
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: tpm_tis TPM2.0 not detected on cold boot
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: tpm_tis TPM2.0 not detected on cold boot
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: fix incorrect success returns from tpm_try_transmit()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: fix incorrect success returns from tpm_try_transmit()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: OTA does not work with IMA due to xattr not supported by zip
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: OTA does not work with IMA due to xattr not supported by zip
- From: rishi gupta <gupt21@xxxxxxxxx>
- [PATCH 1/5] tpm: ppi: pass function revision ID to tpm_eval_dsm()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH 3/5] tpm: ppi: Display up to 101 operations as define for version 1.3
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH 4/5] tpm: ppi: Possibly show command parameter if TPM PPI 1.3 is used
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH 5/5] tpm: ppi: Enable submission of optional command parameter for PPI 1.3
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH 2/5] tpm: ppi: rename TPM_PPI_REVISION_ID to TPM_PPI_REVISION_1
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH 0/5] Extend TPM PPI interface to support revision 1.3
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/2] integrity, KEYS: add a reference to platform keyring
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC PATCH 2/2] kexec, KEYS: Make use of platform keyring for signature verify
- From: Kairui Song <kasong@xxxxxxxxxx>
- [RFC PATCH 1/2] integrity, KEYS: add a reference to platform keyring
- From: Kairui Song <kasong@xxxxxxxxxx>
- [RFC PATCH 0/2] let kexec_file_load use platform keyring to verify the kernel image
- From: Kairui Song <kasong@xxxxxxxxxx>
- Re: [RFC PATCH 1/1] KEYS, integrity: Link .platform keyring to .secondary_trusted_keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH 1/1] KEYS, integrity: Link .platform keyring to .secondary_trusted_keys
- From: Kairui Song <kasong@xxxxxxxxxx>
- [PATCH 5/5] efi: Attempt to get the TCG2 event log in the boot stub
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH 4/5] tpm: Append the final event log to the TPM event log
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH 3/5] tpm: Reserve the TPM final events table
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH 2/5] tpm: Fix event log types for TPM2
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH 1/5] tpm: Abstract crypto agile event size calculations
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Add support for the TCG2 event log on UEFI systems
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [RFC PATCH 1/1] KEYS, integrity: Link .platform keyring to .secondary_trusted_keys
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: OTA does not work with IMA due to xattr not supported by zip
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH 1/1] KEYS, integrity: Link .platform keyring to .secondary_trusted_keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- OTA does not work with IMA due to xattr not supported by zip
- From: rishi gupta <gupt21@xxxxxxxxx>
- Re: [PATCH 6/6] ima: Use ima tcb policy files for test
- From: Jia Zhang <zhang.jia@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 1/5] tpm: dynamically allocate the allocated_banks array
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [RFC PATCH 4/4] crypto: Add EC-RDSA algorithm
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [RFC PATCH 4/4] crypto: Add EC-RDSA algorithm
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [RFC PATCH 4/4] crypto: Add EC-RDSA algorithm
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH 5/6] ima: Rename the folder name for policy files to datafiles
- From: Jia Zhang <zhang.jia@xxxxxxxxxxxxxxxxx>
- [PATCH 3/6] ima/ima_boot_aggregate: Fix extending PCRs beyond PCR 0-7
- From: Jia Zhang <zhang.jia@xxxxxxxxxxxxxxxxx>
- [PATCH 1/6] ima/ima_boot_aggregate: Fix the definition of event log
- From: Jia Zhang <zhang.jia@xxxxxxxxxxxxxxxxx>
- [PATCH 6/6] ima: Use ima tcb policy files for test
- From: Jia Zhang <zhang.jia@xxxxxxxxxxxxxxxxx>
- [PATCH 0/6] LTP IMA fix bundle
- From: Jia Zhang <zhang.jia@xxxxxxxxxxxxxxxxx>
- [PATCH 4/6] ima: Code cleanup
- From: Jia Zhang <zhang.jia@xxxxxxxxxxxxxxxxx>
- [PATCH 2/6] ima/ima_boot_aggregate: Don't hard code the length of sha1 hash
- From: Jia Zhang <zhang.jia@xxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 4/4] crypto: Add EC-RDSA algorithm
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [RFC PATCH 4/4] crypto: Add EC-RDSA algorithm
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [RFC PATCH 3/4] KEYS: set correct flags for keyctl if encrypt is not supported
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [RFC PATCH 2/4] akcipher: Introduce verify2 for public key algorithms
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [RFC PATCH 1/4] X.509: Parse public key parameters from x509 for akcipher
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [RFC PATCH 0/4] crypto: Add EC-RDSA algorithm
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH 1/2] tpm/eventlog/tpm1: Simplify walking over *pos measurements
- From: Jia Zhang <zhang.jia@xxxxxxxxxxxxxxxxx>
- [PATCH 2/2] tpm/eventlog/tpm1: Fix off-by-1 when reading binary_bios_measurements
- From: Jia Zhang <zhang.jia@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] selftests: add TPM 2.0 tests
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/12] fs-verity: add a documentation file
- From: Daniel Colascione <dancol@xxxxxxxxxx>
- Re: tpm_tis TPM2.0 not detected on cold boot
- From: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
- Re: tpm_tis TPM2.0 not detected on cold boot
- From: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
- Re: tpm_tis TPM2.0 not detected on cold boot
- From: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
- Re: [PATCH] tpm: fix incorrect success returns from tpm_try_transmit()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: tpm_tis TPM2.0 not detected on cold boot
- From: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
- RE: [PATCH] tpm: fix incorrect success returns from tpm_try_transmit()
- From: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
- Re: [PATCH] tpm: fix incorrect success returns from tpm_try_transmit()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: tpm_tis TPM2.0 not detected on cold boot
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: fix incorrect success returns from tpm_try_transmit()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: tpm_tis TPM2.0 not detected on cold boot
- From: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
- RE: [PATCH] tpm: fix incorrect success returns from tpm_try_transmit()
- From: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
- Re: tpm_tis TPM2.0 not detected on cold boot
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: tpm_tis TPM2.0 not detected on cold boot
- From: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
- Re: tpm_tis TPM2.0 not detected on cold boot
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH REVIEW 2/2] tpm_tis: override durations for STM tpm with firmware 1.2.8.28
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH REVIEW 1/2] tpm: provide a way to override the chip returned durations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: fix incorrect success returns from tpm_try_transmit()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: tpm_tis TPM2.0 not detected on cold boot
- From: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
- Re: tpm_tis TPM2.0 not detected on cold boot
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: tpm_tis TPM2.0 not detected on cold boot
- From: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
- Re: tpm_tis TPM2.0 not detected on cold boot
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] tpm: fix incorrect success returns from tpm_try_transmit()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: tpm_tis TPM2.0 not detected on cold boot
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: tpm_tis TPM2.0 not detected on cold boot
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: tpm_tis TPM2.0 not detected on cold boot
- From: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
- Re: [DISCUSSION] IMA measurement log format
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: tpm_tis TPM2.0 not detected on cold boot
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [DISCUSSION] IMA measurement log format
- From: Jordan Hand <Jordan.Hand@xxxxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: fix typo in Mimi Zohar's address
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxx>
- [PATCH] MAINTAINERS: fix typo in Mimi Zohar's address
- From: Baruch Siach <baruch@xxxxxxxxxx>
- Re: tpm_tis TPM2.0 not detected on cold boot
- From: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
- Re: tpm_tis TPM2.0 not detected on cold boot
- From: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
- Re: [PATCH v2 01/12] fs-verity: add a documentation file
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v2 01/12] fs-verity: add a documentation file
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v2 01/12] fs-verity: add a documentation file
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH 03/12] __wr_after_init: generic header
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- Re: tpm_tis TPM2.0 not detected on cold boot
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 01/12] fs-verity: add a documentation file
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/12] fs-verity: add a documentation file
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: tpm_tis TPM2.0 not detected on cold boot
- From: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
- Re: [PATCH v7 1/5] tpm: dynamically allocate the allocated_banks array
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 03/12] __wr_after_init: generic functionality
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- Re: [PATCH 01/12] x86_64: memset_user()
- From: Cyrill Gorcunov <gorcunov@xxxxxxxxx>
- Re: [PATCH 01/12] x86_64: memset_user()
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH 01/12] x86_64: memset_user()
- From: Cyrill Gorcunov <gorcunov@xxxxxxxxx>
- Re: [PATCH 01/12] x86_64: memset_user()
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH 01/12] x86_64: memset_user()
- From: Cyrill Gorcunov <gorcunov@xxxxxxxxx>
- Re: [PATCH 03/12] __wr_after_init: generic header
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH 03/12] __wr_after_init: generic functionality
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH 03/12] __wr_after_init: generic header
- From: Nadav Amit <nadav.amit@xxxxxxxxx>
- Re: [PATCH v2 01/12] fs-verity: add a documentation file
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 03/12] __wr_after_init: generic functionality
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- Re: [PATCH 01/12] x86_64: memset_user()
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- Re: [PATCH 03/12] __wr_after_init: generic functionality
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH 01/12] x86_64: memset_user()
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- [PATCH 03/12] __wr_after_init: generic functionality
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [PATCH 02/12] __wr_after_init: linker section and label
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [PATCH 04/12] __wr_after_init: debug writes
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [PATCH 06/12] __wr_after_init: Documentation: self-protection
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [PATCH 05/12] __wr_after_init: x86_64: __wr_op
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [PATCH 07/12] __wr_after_init: lkdtm test
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [PATCH 08/12] rodata_test: refactor tests
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [PATCH 10/12] __wr_after_init: test write rare functionality
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [PATCH 09/12] rodata_test: add verification for __wr_after_init
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [PATCH 11/12] IMA: turn ima_policy_flags into __wr_after_init
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [PATCH 12/12] x86_64: __clear_user as case of __memset_user
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [PATCH 01/12] x86_64: memset_user()
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- Re: [PATCH 04/12] __wr_after_init: x86_64: __wr_op
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- Re: [PATCH 04/12] __wr_after_init: x86_64: __wr_op
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v2 01/12] fs-verity: add a documentation file
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v2 01/12] fs-verity: add a documentation file
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v2 01/12] fs-verity: add a documentation file
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v2 01/12] fs-verity: add a documentation file
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v2 01/12] fs-verity: add a documentation file
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v2 01/12] fs-verity: add a documentation file
- From: Richard Weinberger <richard.weinberger@xxxxxxxxx>
- Re: [PATCH v7 1/5] tpm: dynamically allocate the allocated_banks array
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v2 01/12] fs-verity: add a documentation file
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v2 01/12] fs-verity: add a documentation file
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH 04/12] __wr_after_init: x86_64: __wr_op
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: EVM: Permission denied with overlayfs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 04/12] __wr_after_init: x86_64: __wr_op
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- Re: [PATCH 04/12] __wr_after_init: x86_64: __wr_op
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: linux-next: Tree for Dec 14 (security/integrity/ima/)
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 11/12] IMA: turn ima_policy_flags into __wr_after_init
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- Re: [PATCH 04/12] __wr_after_init: x86_64: __wr_op
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- Re: [PATCH 11/12] IMA: turn ima_policy_flags into __wr_after_init
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH 04/12] __wr_after_init: x86_64: __wr_op
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH 04/12] __wr_after_init: x86_64: __wr_op
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- Re: [PATCH v7 5/5] tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: EVM: Permission denied with overlayfs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 1/5] tpm: dynamically allocate the allocated_banks array
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: EVM: Permission denied with overlayfs
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: EVM: Permission denied with overlayfs
- From: Goldwyn Rodrigues <rgoldwyn@xxxxxxxx>
- Re: [PATCH 2/6] __wr_after_init: write rare for static allocation
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- Re: EVM: Permission denied with overlayfs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: EVM: Permission denied with overlayfs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/12] fs-verity: add a documentation file
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- [PATCH 03/12] __wr_after_init: generic header
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [PATCH 04/12] __wr_after_init: x86_64: __wr_op
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [PATCH 09/12] rodata_test: add verification for __wr_after_init
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [PATCH 07/12] __wr_after_init: lkdtm test
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [PATCH 08/12] rodata_test: refactor tests
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [PATCH 06/12] __wr_after_init: Documentation: self-protection
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [PATCH 05/12] __wr_after_init: x86_64: debug writes
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [PATCH 02/12] __wr_after_init: linker section and label
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [PATCH 01/12] x86_64: memset_user()
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [PATCH 11/12] IMA: turn ima_policy_flags into __wr_after_init
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [PATCH 10/12] __wr_after_init: test write rare functionality
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [PATCH 12/12] x86_64: __clear_user as case of __memset_user
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [RFC v2 PATCH 0/12] hardening: statically allocated protected memory
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- Re: EVM: Permission denied with overlayfs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: EVM: Permission denied with overlayfs
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: EVM: Permission denied with overlayfs
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: EVM: Permission denied with overlayfs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/12] fs-verity: add a documentation file
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: EVM: Permission denied with overlayfs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: EVM: Permission denied with overlayfs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: EVM: Permission denied with overlayfs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: EVM: Permission denied with overlayfs
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: EVM: Permission denied with overlayfs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 01/12] fs-verity: add a documentation file
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v2 01/12] fs-verity: add a documentation file
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v2 01/12] fs-verity: add a documentation file
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v2 01/12] fs-verity: add a documentation file
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v2 01/12] fs-verity: add a documentation file
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH v2 01/12] fs-verity: add a documentation file
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: EVM: Permission denied with overlayfs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- EVM: Permission denied with overlayfs
- From: Ignaz Forster <iforster@xxxxxxx>
- Re: [PATCH v2] ima: define ima_post_create_tmpfile() hook and add missing call
- From: Ignaz Forster <iforster@xxxxxxx>
- [PATCH v2] ima: define ima_post_create_tmpfile() hook and add missing call
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: cleanup the match_token policy code
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: cleanup the match_token policy code
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] ima: cleanup the match_token policy code
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: cleanup the match_token policy code
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] ima: cleanup the match_token policy code
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] ima: define ima_create_tmpfile() hook and add missing call
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH] ima: cleanup the match_token policy code
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] ima: cleanup the match_token policy code
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] ima: define ima_create_tmpfile() hook and add missing call
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 01/12] fs-verity: add a documentation file
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [GIT PULL] linux-integrity patches for Linux 4.21
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [GIT PULL] linux-integrity patches for Linux 4.21
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v2 01/12] fs-verity: add a documentation file
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 01/12] fs-verity: add a documentation file
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 01/12] fs-verity: add a documentation file
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v2 01/12] fs-verity: add a documentation file
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: Bug: Persisting O_TMPFILE with IMA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- tpm_tis TPM2.0 not detected on cold boot
- From: Michael Niewöhner <niewoehner.michael@xxxxxxxxx>
- Re: [PATCH] Allow hwrng to initialize crng.
- From: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
- Re: [PATCH] Allow hwrng to initialize crng.
- From: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
- Re: Bug: Persisting O_TMPFILE with IMA
- From: Ignaz Forster <ignaz.forster@xxxxxx>
- [PATCH -next] evm: remove set but not used variable 'xattr'
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- Re: [PATCH -next] evm: CHECK-remove set but not used variable 'xattr'
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- [PATCH -next] evm: CHECK-remove set but not used variable 'xattr'
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- Re: linux-next: Tree for Dec 14 (security/integrity/ima/)
- From: Paul Gortmaker <paul.gortmaker@xxxxxxxxxxxxx>
- Re: linux-next: Tree for Dec 14 (security/integrity/ima/)
- From: Paul Gortmaker <paul.gortmaker@xxxxxxxxxxxxx>
- Re: linux-next: Tree for Dec 14 (security/integrity/ima/)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Bug: Persisting O_TMPFILE with IMA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Bug: Persisting O_TMPFILE with IMA
- From: Ignaz Forster <iforster@xxxxxxx>
- Re: linux-next: Tree for Dec 14 (security/integrity/ima/)
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [GIT PULL] linux-integrity patches for Linux 4.21
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH REVIEW 2/2] tpm_tis: override durations for STM tpm with firmware 1.2.8.28
- From: Alexey Klimov <aklimov@xxxxxxxxxx>
- [PATCH REVIEW 1/2] tpm: provide a way to override the chip returned durations
- From: Alexey Klimov <aklimov@xxxxxxxxxx>
- Re: [PATCH v6 7/7] tpm: pass an array of tpm_bank_list structures to tpm_pcr_extend()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/12] fs-verity: add a documentation file
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 01/12] fs-verity: add a documentation file
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v2 01/12] fs-verity: add a documentation file
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 01/12] fs-verity: add a documentation file
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/6] tpm: dynamically allocate active_banks array
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH v7 13/14] module: Do not set nx for module memory before freeing
- From: Nadav Amit <namit@xxxxxxxxxx>
- Re: [PATCH v7 13/14] module: Do not set nx for module memory before freeing
- From: Jessica Yu <jeyu@xxxxxxxxxx>
- Re: [PATCH] fs: Evaluate O_WRONLY | O_RDWR to O_RDWR
- From: Goldwyn Rodrigues <rgoldwyn@xxxxxxx>
- Re: [PATCH] fs: Evaluate O_WRONLY | O_RDWR to O_RDWR
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v1 0/5] Add support for O_MAYEXEC
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] fs: Evaluate O_WRONLY | O_RDWR to O_RDWR
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH] fs: Evaluate O_WRONLY | O_RDWR to O_RDWR
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH] fs: Evaluate O_WRONLY | O_RDWR to O_RDWR
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] akcipher: Introduce verify2 for public key algorithms
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH] fs: Evaluate O_WRONLY | O_RDWR to O_RDWR
- From: Goldwyn Rodrigues <rgoldwyn@xxxxxxx>
- [PATCH v7 5/5] tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v7 4/5] tpm: retrieve digest size of unknown algorithms with PCR read
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v7 3/5] tpm: rename and export tpm2_digest and tpm2_algorithms
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v7 2/5] tpm: add _head suffix to tcg_efi_specid_event and tcg_pcr_event2
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v7 1/5] tpm: dynamically allocate the allocated_banks array
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v7 0/5] tpm: retrieve digest size of unknown algorithms from TPM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v6 1/7] tpm: dynamically allocate the allocated_banks array
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v6 7/7] tpm: pass an array of tpm_bank_list structures to tpm_pcr_extend()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH] Allow hwrng to initialize crng.
- From: Louis Collard <louiscollard@xxxxxxxxxxxx>
- [PATCH v9 01/14] MODSIGN: Export module signature definitions
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v9 09/14] ima: Export func_tokens
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v9 14/14] ima: Store the measurement again when appraising a modsig
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v9 10/14] ima: Add modsig appraise_type option for module-style appended signatures
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v9 13/14] ima: Write modsig to the measurement list
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v9 12/14] ima: Add new "d-sig" template field
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v9 11/14] ima: Implement support for module-style appended signatures
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v9 08/14] ima: Introduce is_signed()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v9 07/14] integrity: Select CONFIG_KEYS instead of depending on it
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v9 06/14] integrity: Introduce asymmetric_sig_has_known_key()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v9 05/14] integrity: Introduce integrity_keyring_from_id()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v9 04/14] integrity: Introduce struct evm_xattr
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v9 03/14] PKCS#7: Introduce pkcs7_get_digest()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v9 02/14] PKCS#7: Refactor verify_pkcs7_signature() and add pkcs7_get_message_sig()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v9 00/14] Appended signatures support for IMA appraisal
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v2 7/7] ima: Support platform keyring for kernel appraisal
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v2 7/7] ima: Support platform keyring for kernel appraisal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/7] integrity: Load certs to the platform keyring
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/7] integrity: Define a trusted platform keyring
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH 0/5] security: remove needless usage of module header
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH v2a 5/7] efi: Import certificates from UEFI Secure Boot
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [PATCH v2 01/12] fs-verity: add a documentation file
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v6 1/7] tpm: dynamically allocate the allocated_banks array
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 4/7] tpm: modify tpm_pcr_read() definition to pass a TPM hash algorithm
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 7/7] tpm: pass an array of tpm_bank_list structures to tpm_pcr_extend()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 7/7] tpm: pass an array of tpm_bank_list structures to tpm_pcr_extend()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 6/7] tpm: ensure that the output of PCR read contains the correct digest size
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 5/7] tpm: retrieve digest size of unknown algorithms with PCR read
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 7/7] ima: Support platform keyring for kernel appraisal
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH] tpm-dev: Require response to be read only if there actually is a response
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 5/7] efi: Import certificates from UEFI Secure Boot
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [PATCH 2/6] __wr_after_init: write rare for static allocation
- From: Martin Schwidefsky <schwidefsky@xxxxxxxxxx>
- Re: [PATCH v2 01/12] fs-verity: add a documentation file
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH v6 1/7] tpm: dynamically allocate the allocated_banks array
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH v2 7/7] ima: Support platform keyring for kernel appraisal
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v2 6/7] efi: Allow the "db" UEFI variable to be suppressed
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v2 5/7] efi: Import certificates from UEFI Secure Boot
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v2 3/7] efi: Add EFI signature data types
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v2 2/7] integrity: Load certs to the platform keyring
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v2 1/7] integrity: Define a trusted platform keyring
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] ima: Use inode_is_open_for_write
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] ima: Use inode_is_open_for_write
- From: Nikolay Borisov <nborisov@xxxxxxxx>
- Re: [PATCH] fs: Convert open-coded "is inode open for write" check
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH] fs: Convert open-coded "is inode open for write" check
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2] fs: Convert open-coded "is inode open for write" check
- From: Andreas Dilger <adilger@xxxxxxxxx>
- Re: [RFC][PATCH 08/12] KEYS: PGP-based public key signature verification
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC][PATCH 08/12] KEYS: PGP-based public key signature verification
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH v2] fs: Convert open-coded "is inode open for write" check
- From: Jan Kara <jack@xxxxxxx>
- [PATCH v2] fs: Convert open-coded "is inode open for write" check
- From: Nikolay Borisov <nborisov@xxxxxxxx>
- [PATCH] fs: Convert open-coded "is inode open for write" check
- From: Nikolay Borisov <nborisov@xxxxxxxx>
- Re: [PATCH 2/6] __wr_after_init: write rare for static allocation
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v6 4/7] tpm: modify tpm_pcr_read() definition to pass a TPM hash algorithm
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v7 00/14] x86/alternative: text_poke() enhancements
- From: Nadav Amit <namit@xxxxxxxxxx>
- Re: [PATCH 2/6] __wr_after_init: write rare for static allocation
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- Re: [PATCH 2/6] __wr_after_init: write rare for static allocation
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- Re: [PATCH 2/6] __wr_after_init: write rare for static allocation
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [PATCH 2/5] keys: remove needless modular infrastructure from ecryptfs_format
- From: Paul Gortmaker <paul.gortmaker@xxxxxxxxxxxxx>
- [PATCH 1/5] security: audit and remove any unnecessary uses of module.h
- From: Paul Gortmaker <paul.gortmaker@xxxxxxxxxxxxx>
- [PATCH 0/5] security: remove needless usage of module header
- From: Paul Gortmaker <paul.gortmaker@xxxxxxxxxxxxx>
- Re: [PATCH v6 4/7] tpm: modify tpm_pcr_read() definition to pass a TPM hash algorithm
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/7] add platform/firmware keys support for kernel verification by IMA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: unrecognized TMP 2.0 hardware
- From: Malte Gell <mailinglisten@xxxxxxxxx>
- Re: [PATCH v6 2/7] tpm: add _head suffix to tcg_efi_specid_event and tcg_pcr_event2
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [PATCH v6 4/7] tpm: modify tpm_pcr_read() definition to pass a TPM hash algorithm
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v2 1/7] integrity: Define a trusted platform keyring
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v2 7/7] ima: Support platform keyring for kernel appraisal
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v2 3/7] efi: Add EFI signature data types
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v2 6/7] efi: Allow the "db" UEFI variable to be suppressed
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v2 5/7] efi: Import certificates from UEFI Secure Boot
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v2 4/7] efi: Add an EFI signature blob parser
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v2 2/7] integrity: Load certs to the platform keyring
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v2 1/7] integrity: Define a trusted platform keyring
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v2 0/7] add platform/firmware keys support for kernel verification by IMA
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [PATCH v6 4/7] tpm: modify tpm_pcr_read() definition to pass a TPM hash algorithm
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: unrecognized TMP 2.0 hardware
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 7/7] ima: Support platform keyring for kernel appraisal
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- unrecognized TMP 2.0 hardware
- From: Chris Murphy <chris@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 13/14] module: Do not set nx for module memory before freeing
- From: Nadav Amit <namit@xxxxxxxxxx>
- Re: [PATCH v7 13/14] module: Do not set nx for module memory before freeing
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v6 4/7] tpm: modify tpm_pcr_read() definition to pass a TPM hash algorithm
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 13/14] module: Do not set nx for module memory before freeing
- From: Nadav Amit <namit@xxxxxxxxxx>
- Re: [PATCH v7 13/14] module: Do not set nx for module memory before freeing
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v6 7/7] tpm: pass an array of tpm_bank_list structures to tpm_pcr_extend()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v6 7/7] tpm: pass an array of tpm_bank_list structures to tpm_pcr_extend()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH] tpm-dev: Require response to be read only if there actually is a response
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- Re: [PATCH v6 6/7] tpm: ensure that the output of PCR read contains the correct digest size
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v6 5/7] tpm: retrieve digest size of unknown algorithms with PCR read
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v6 1/7] tpm: dynamically allocate the allocated_banks array
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v7 13/14] module: Do not set nx for module memory before freeing
- From: Nadav Amit <namit@xxxxxxxxxx>
- Re: [PATCH v7 08/14] x86/ftrace: Use text_poke_*() infrastructure
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH v7 09/14] x86/kprobes: Instruction pages initialization enhancements
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- Re: [PATCH v7 13/14] module: Do not set nx for module memory before freeing
- From: Andrea Parri <andrea.parri@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 00/14] x86/alternative: text_poke() enhancements
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v7 14/14] module: Prevent module removal racing with text_poke()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v7 13/14] module: Do not set nx for module memory before freeing
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 2/6] __wr_after_init: write rare for static allocation
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v6 4/7] tpm: modify tpm_pcr_read() definition to pass a TPM hash algorithm
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [PATCH 2/6] __wr_after_init: write rare for static allocation
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v7 08/14] x86/ftrace: Use text_poke_*() infrastructure
- From: Nadav Amit <namit@xxxxxxxxxx>
- Re: [PATCH 2/6] __wr_after_init: write rare for static allocation
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v6 4/7] tpm: modify tpm_pcr_read() definition to pass a TPM hash algorithm
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v7 03/14] x86/mm: temporary mm struct
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v7 02/14] x86/jump_label: Use text_poke_early() during early init
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v7 04/14] fork: provide a function for copying init_mm
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v7 05/14] x86/alternative: initializing temporary mm for patching
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v7 07/14] x86/kgdb: avoid redundant comparison of patched code
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v7 08/14] x86/ftrace: Use text_poke_*() infrastructure
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v7 06/14] x86/alternative: use temporary mm for text poking
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v7 09/14] x86/kprobes: Instruction pages initialization enhancements
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v7 11/14] x86/jump-label: remove support for custom poker
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v7 10/14] x86: avoid W^X being broken during modules loading
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v7 13/14] module: Do not set nx for module memory before freeing
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v7 12/14] x86/alternative: Remove the return value of text_poke_*()
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v7 14/14] module: Prevent module removal racing with text_poke()
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v7 01/14] Fix "x86/alternatives: Lockdep-enforce text_mutex in text_poke*()"
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v7 00/14] x86/alternative: text_poke() enhancements
- From: Nadav Amit <namit@xxxxxxxxxx>
- Re: [PATCH v6 6/7] tpm: ensure that the output of PCR read contains the correct digest size
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] selftests: add TPM 2.0 tests
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 0/7] tpm: retrieve digest size of unknown algorithms from TPM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 0/7] tpm: retrieve digest size of unknown algorithms from TPM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 7/7] tpm: pass an array of tpm_bank_list structures to tpm_pcr_extend()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 6/7] tpm: ensure that the output of PCR read contains the correct digest size
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 5/7] tpm: retrieve digest size of unknown algorithms with PCR read
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 4/7] tpm: modify tpm_pcr_read() definition to pass a TPM hash algorithm
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 00/14] Appended signatures support for IMA appraisal
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v6 2/7] tpm: add _head suffix to tcg_efi_specid_event and tcg_pcr_event2
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 1/7] tpm: dynamically allocate the allocated_banks array
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 00/14] Appended signatures support for IMA appraisal
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 10/17] prmem: documentation
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [PATCH 1/6] __wr_after_init: linker section and label
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [PATCH 4/6] rodata_test: add verification for __wr_after_init
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [PATCH 2/6] __wr_after_init: write rare for static allocation
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [PATCH 6/6] __wr_after_init: lkdtm test
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [PATCH 5/6] __wr_after_init: test write rare functionality
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [PATCH 3/6] rodata_test: refactor tests
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [RFC v1 PATCH 0/6] hardening: statically allocated protected memory
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [PATCH v6 7/7] tpm: pass an array of tpm_bank_list structures to tpm_pcr_extend()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v6 6/7] tpm: ensure that the output of PCR read contains the correct digest size
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v6 5/7] tpm: retrieve digest size of unknown algorithms with PCR read
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v6 4/7] tpm: modify tpm_pcr_read() definition to pass a TPM hash algorithm
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v6 3/7] tpm: rename and export tpm2_digest and tpm2_algorithms
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v6 2/7] tpm: add _head suffix to tcg_efi_specid_event and tcg_pcr_event2
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v6 1/7] tpm: dynamically allocate the allocated_banks array
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v6 0/7] tpm: retrieve digest size of unknown algorithms from TPM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: Re: TPM legacy
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Re: TPM legacy
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Re: TPM legacy
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: Re: TPM legacy
- From: Peter Huewe <peterhuewe@xxxxxx>
- Re: Re: TPM legacy
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Re: TPM legacy
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/7] tpm: remove definition of TPM2_ACTIVE_PCR_BANKS
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Re: TPM legacy
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Re: TPM legacy
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Aw: Re: TPM legacy
- From: "Peter Huewe" <PeterHuewe@xxxxxx>
- Re: [PATCH v3 1/7] ima-evm-utils: Fix hash buffer overflow in verify_evm and hmac_evm
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/7] tpm: remove definition of TPM2_ACTIVE_PCR_BANKS
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 6/7] ima-evm-utils: Extract digest algorithms from hash_info.h
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v3 7/7] ima-evm-utils: Try to load digest by its alias
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v3 3/7] ima-evm-utils: Define the '--xattr-user' option for testing
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v3 4/7] ima-evm-utils: Allow using Streebog hash function
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v3 5/7] ima-evm-utils: Preload OpenSSL engine via '--engine' option
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v3 2/7] ima-evm-utils: Define hash and sig buffer sizes and add asserts
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v3 1/7] ima-evm-utils: Fix hash buffer overflow in verify_evm and hmac_evm
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: TPM legacy
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: TPM legacy
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] docs: Extend trusted keys documentation for TPM 2.0
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: TPM legacy
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] ima-evm-utils: libimaevm: get key description out of verbose condition
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: TPM legacy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] docs: Extend trusted keys documentation for TPM 2.0
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 5/7] ima-evm-utils: Preload OpenSSL engine via '--engine' option
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2.1 6/7] ima-evm-utils: Extract digest algorithms from hash_info.h
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- notebook TPM2 not woking
- From: Malte Gell <malte.gell@xxxxxxxxx>
- Re: [PATCH v2.1 6/7] ima-evm-utils: Extract digest algorithms from hash_info.h
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v2 5/7] ima-evm-utils: Preload OpenSSL engine via '--engine' option
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH] docs: Extend trusted keys documentation for TPM 2.0
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] docs: Extend trusted keys documentation for TPM 2.0
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- TPM legacy
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/7] tpm: remove definition of TPM2_ACTIVE_PCR_BANKS
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2.1 6/7] ima-evm-utils: Extract digest algorithms from hash_info.h
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] libimaevm: get key description out of verbose condition
- From: "Bruno E. O. Meneguele" <bmeneg@xxxxxxxxxx>
- [PATCH] ima-evm-utils: libimaevm: get key description out of verbose condition
- From: "Bruno E. O. Meneguele" <bmeneg@xxxxxxxxxx>
- [PATCH] libimaevm: get key description out of verbose condition
- From: "Bruno E. O. Meneguele" <bmeneg@xxxxxxxxxx>
- Re: [PATCH v5 2/7] tpm: remove definition of TPM2_ACTIVE_PCR_BANKS
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/7] tpm: remove definition of TPM2_ACTIVE_PCR_BANKS
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2.1 6/7] ima-evm-utils: Extract digest algorithms from hash_info.h
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/7] ima-evm-utils: Define hash and sig buffer sizes and add asserts
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 5/7] ima-evm-utils: Preload OpenSSL engine via '--engine' option
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 4/7] ima-evm-utils: Allow using Streebog hash function
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/7] ima-evm-utils: Define the '--xattr-user' option for testing
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 08/10] x86: avoid W^X being broken during modules loading
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- Re: [PATCH v8 04/14] integrity: Introduce struct evm_xattr
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 00/10] x86/alternative: text_poke() fixes
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v2.1 6/7] ima-evm-utils: Extract digest algorithms from hash_info.h
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v5 2/7] tpm: remove definition of TPM2_ACTIVE_PCR_BANKS
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 7/7] ima-evm-utils: Try to load digest by its alias
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v2 6/7] ima-evm-utils: Extract digest algorithms from hash_info.h
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v2 5/7] ima-evm-utils: Preload OpenSSL engine via '--engine' option
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v2 4/7] ima-evm-utils: Allow using Streebog hash function
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v2 3/7] ima-evm-utils: Define the '--xattr-user' option for testing
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v2 2/7] ima-evm-utils: Define hash and sig buffer sizes and add asserts
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v2 1/7] ima-evm-utils: Fix hash buffer overflow in verify_evm and hmac_evm
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v5 6/7] tpm: ensure that the output of PCR read contains the correct digest size
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 08/10] x86: avoid W^X being broken during modules loading
- From: Nadav Amit <namit@xxxxxxxxxx>
- Re: [PATCH 0/7] add platform/firmware keys support for kernel verification by IMA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 4/7] efi: Add an EFI signature blob parser
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 5/7] efi: Import certificates from UEFI Secure Boot
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [BUG] Nuvoton NCPT650 TPM 2.0 mode not working
- From: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
- Re: [PATCH v5 2/7] tpm: remove definition of TPM2_ACTIVE_PCR_BANKS
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v5 6/7] tpm: ensure that the output of PCR read contains the correct digest size
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v5 2/7] tpm: remove definition of TPM2_ACTIVE_PCR_BANKS
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v9 00/17] Removed nested TPM operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6] tpm: add support for partial reads
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] selftests: add TPM 2.0 tests
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] selftests: add TPM 2.0 tests
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] selftests: add TPM 2.0 tests
- From: Joey Pabalinas <joeypabalinas@xxxxxxxxx>
- Re: [PATCH] selftests: add TPM 2.0 tests
- From: Joey Pabalinas <joeypabalinas@xxxxxxxxx>
- Re: [PATCH] selftests: add TPM 2.0 tests
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [BUG] Nuvoton NCPT650 TPM 2.0 mode not working
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH] selftests: add TPM 2.0 tests
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH] selftests: add TPM 2.0 tests
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] IMA: Mask O_RDWR if FMODE_READ is set
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH] IMA: Mask O_RDWR if FMODE_READ is set
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH 3/3] ima-evm-utils: Allow to use Streebog hash function
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] ima-evm-utils: Allow to use Streebog hash function
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH] IMA: Mask O_RDWR if FMODE_READ is set
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] ima-evm-utils: Allow to use Streebog hash function
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] ima-evm-utils: Add --xattr-user option for testing
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] ima-avm-utils: Fix hash buffer overflow in verify_evm
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [BUG] Nuvoton NCPT650 TPM 2.0 mode not working
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [BUG] Nuvoton NCPT650 TPM 2.0 mode not working
- From: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
- Re: [RFC][PATCH] fs: set xattrs in initramfs from regular files
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v6 00/10] x86/alternative: text_poke() fixes
- From: Nadav Amit <namit@xxxxxxxxxx>
- Re: [RFC][PATCH] fs: set xattrs in initramfs from regular files
- From: Rob Landley <rob@xxxxxxxxxxx>
- [PATCH] IMA: Mask O_RDWR if FMODE_READ is set
- From: Goldwyn Rodrigues <rgoldwyn@xxxxxxx>
- Re: [RFC][PATCH] fs: set xattrs in initramfs from regular files
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC][PATCH] fs: set xattrs in initramfs from regular files
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] ima-avm-utils: Fix hash buffer overflow in verify_evm
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [RFC][PATCH] fs: set xattrs in initramfs from regular files
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [RFC][PATCH] fs: set xattrs in initramfs from regular files
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 00/10] x86/alternative: text_poke() fixes
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 3/3] ima-evm-utils: Allow to use Streebog hash function
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH 2/3] ima-evm-utils: Add --xattr-user option for testing
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH 1/3] ima-avm-utils: Fix hash buffer overflow in verify_evm
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [BUG] Nuvoton NCPT650 TPM 2.0 mode not working
- From: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
- [PATCH 7/7] ima: Support platform keyring for kernel appraisal
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH 6/7] efi: Allow the "db" UEFI variable to be suppressed
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH 5/7] efi: Import certificates from UEFI Secure Boot
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH 4/7] efi: Add an EFI signature blob parser
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH 3/7] efi: Add EFI signature data types
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH 2/7] integrity: Load certs to the platform keyring
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH 1/7] integrity: Define a trusted platform keyring
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH 0/7] add platform/firmware keys support for kernel verification by IMA
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] fs: set xattrs in initramfs from regular files
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC][PATCH] fs: set xattrs in initramfs from regular files
- From: Rob Landley <rob@xxxxxxxxxxx>
- Re: [RFC][PATCH] fs: set xattrs in initramfs from regular files
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] fs: set xattrs in initramfs from regular files
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 10/17] prmem: documentation
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH 10/17] prmem: documentation
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH 10/17] prmem: documentation
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [RFC][PATCH] fs: set xattrs in initramfs from regular files
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH 10/17] prmem: documentation
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH 10/17] prmem: documentation
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- Re: [PATCH 10/17] prmem: documentation
- From: Nadav Amit <nadav.amit@xxxxxxxxx>
- Re: [PATCH 10/17] prmem: documentation
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- Re: [PATCH v6] tpm: add support for partial reads
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v6] tpm: add support for partial reads
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5] tpm: add support for partial reads
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: EXTERNAL: Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH v6 00/10] x86/alternative: text_poke() fixes
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v6 02/10] x86/jump_label: Use text_poke_early() during early init
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v6 04/10] fork: provide a function for copying init_mm
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v6 03/10] x86/mm: temporary mm struct
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v6 07/10] x86/kgdb: avoid redundant comparison of patched code
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v6 06/10] x86/alternative: use temporary mm for text poking
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v6 10/10] x86/alternative: remove the return value of text_poke_*()
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v6 08/10] x86: avoid W^X being broken during modules loading
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v6 05/10] x86/alternative: initializing temporary mm for patching
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v6 09/10] x86/jump-label: remove support for custom poker
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v6 01/10] Fix "x86/alternatives: Lockdep-enforce text_mutex in text_poke*()"
- From: Nadav Amit <namit@xxxxxxxxxx>
- Re: EXTERNAL: Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
- From: Jeremy Boone <jeremy.boone@xxxxxxxxxxxx>
- Re: EXTERNAL: Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
- From: Jeremy Boone <jeremy.boone@xxxxxxxxxxxx>
- Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v5] tpm: add support for partial reads
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5] tpm: add support for partial reads
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5] tpm: add support for partial reads
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 05/17] tpm: declare struct tpm_header
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v5 00/10] x86/alternative: text_poke() fixes
- From: Nadav Amit <namit@xxxxxxxxxx>
- Re: [PATCH v5 02/10] x86/jump_label: Use text_poke_early() during early init
- From: Nadav Amit <namit@xxxxxxxxxx>
- Re: [PATCH v5] tpm: add support for partial reads
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v5] tpm: add support for partial reads
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v5 02/10] x86/jump_label: Use text_poke_early() during early init
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH v5 02/10] x86/jump_label: Use text_poke_early() during early init
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v5 02/10] x86/jump_label: Use text_poke_early() during early init
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 05/17] tpm: declare struct tpm_header
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- RE: [PATCH v9 04/17] tpm: print tpm2_commit_space() error inside tpm2_commit_space()
- From: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
- Re: [PATCH v9 05/17] tpm: declare struct tpm_header
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 04/17] tpm: print tpm2_commit_space() error inside tpm2_commit_space()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5] tpm: add support for partial reads
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 00/10] x86/alternative: text_poke() fixes
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- RE: [PATCH v9 05/17] tpm: declare struct tpm_header
- From: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
- RE: [PATCH v9 04/17] tpm: print tpm2_commit_space() error inside tpm2_commit_space()
- From: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
- Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH 0/3] selftest/ima: fail kexec_load syscall
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 2/3] selftests/ima: kexec_load syscall test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 3/3] x86/ima: retry detecting secure boot mode
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 1/3] ima: add error mesage to kexec_load
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v5] tpm: add support for partial reads
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v4 2/2] tpm: add support for partial reads
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] tpm: add support for partial reads
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] tpm: add support for partial reads
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v5 6/7] tpm: ensure that the output of PCR read contains the correct digest size
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 00/17] Removed nested TPM operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 16/17] tpm: take TPM chip power gating out of tpm_transmit()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 15/17] tpm: introduce tpm_chip_start() and tpm_chip_stop()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 6/7] tpm: ensure that the output of PCR read contains the correct digest size
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v5 7/7] tpm: pass an array of tpm_bank_list structures to tpm_pcr_extend()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 7/7] tpm: pass an array of tpm_bank_list structures to tpm_pcr_extend()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 7/7] tpm: pass an array of tpm_bank_list structures to tpm_pcr_extend()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 6/7] tpm: ensure that the output of PCR read contains the correct digest size
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 00/17] Removed nested TPM operations
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v9 16/17] tpm: take TPM chip power gating out of tpm_transmit()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v9 15/17] tpm: introduce tpm_chip_start() and tpm_chip_stop()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] tpm: add support for partial reads
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [BUG] Nuvoton NCPT650 TPM 2.0 mode not working
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- RE: [PATCH v9 16/17] tpm: take TPM chip power gating out of tpm_transmit()
- From: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
- Re: [PATCH v8 08/17] tpm: call tpm2_flush_space() on error in tpm_try_transmit()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 16/17] tpm: take TPM chip power gating out of tpm_transmit()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 14/17] tpm: remove TPM_TRANSMIT_UNLOCKED flag
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 7/7] tpm: pass an array of tpm_bank_list structures to tpm_pcr_extend()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v5 7/7] tpm: pass an array of tpm_bank_list structures to tpm_pcr_extend()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v5 6/7] tpm: ensure that the output of PCR read contains the correct digest size
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v5 7/7] tpm: pass an array of tpm_bank_list structures to tpm_pcr_extend()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] tpm: add support for partial reads
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v8 08/17] tpm: call tpm2_flush_space() on error in tpm_try_transmit()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- RE: [PATCH v9 16/17] tpm: take TPM chip power gating out of tpm_transmit()
- From: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
- Re: [PATCH v9 14/17] tpm: remove TPM_TRANSMIT_UNLOCKED flag
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [BUG] Nuvoton NCPT650 TPM 2.0 mode not working
- From: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
- [PATCH v9 17/17] tpm: remove @flags from tpm_transmit()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v9 16/17] tpm: take TPM chip power gating out of tpm_transmit()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v9 15/17] tpm: introduce tpm_chip_start() and tpm_chip_stop()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v9 14/17] tpm: remove TPM_TRANSMIT_UNLOCKED flag
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v9 13/17] tpm: use tpm_try_get_ops() in tpm-sysfs.c.
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v9 12/17] tpm: remove @space from tpm_transmit()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v9 11/17] tpm: move TPM space code out of tpm_transmit()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v9 10/17] tpm: move tpm_validate_commmand() to tpm2-space.c
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v9 09/17] tpm: clean up tpm_try_transmit() error handling flow
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v9 08/17] tpm: call tpm2_flush_space() on error in tpm_try_transmit()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v9 07/17] tpm: encapsulate tpm_dev_transmit()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v9 06/17] tpm: access command header through struct in tpm_try_transmit()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v9 05/17] tpm: declare struct tpm_header
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v9 04/17] tpm: print tpm2_commit_space() error inside tpm2_commit_space()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v9 03/17] tpm: return 0 from pcrs_show() when tpm1_pcr_read() fails
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v9 02/17] tpm: fix invalid return value in pubek_show()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v9 01/17] tpm: use tpm_buf in tpm_transmit_cmd() as the IO parameter
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v9 00/17] Removed nested TPM operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [BUG] Nuvoton NCPT650 TPM 2.0 mode not working
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] tpm: add support for partial reads
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] tpm: rename data_pending to transmit_result
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 16/17] tpm: take TPM chip power gating out of tpm_transmit()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 08/17] tpm: call tpm2_flush_space() on error in tpm_try_transmit()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 6/7] tpm: ensure that the output of PCR read contains the correct digest size
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 7/7] tpm: pass an array of tpm_bank_list structures to tpm_pcr_extend()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 7/7] tpm: pass an array of tpm_bank_list structures to tpm_pcr_extend()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] Allow hwrng to initialize crng.
- From: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
- Re: [BUG] Nuvoton NCPT650 TPM 2.0 mode not working
- From: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
- [PATCH v8 11/14] ima: Implement support for module-style appended signatures
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v8 14/14] ima: Store the measurement again when appraising a modsig
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v8 13/14] ima: Write modsig to the measurement list
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v8 12/14] ima: Add new "d-sig" template field
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v8 10/14] ima: Add modsig appraise_type option for module-style appended signatures
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v8 09/14] ima: Export func_tokens
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v8 08/14] ima: Introduce is_signed()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v8 07/14] integrity: Select CONFIG_KEYS instead of depending on it
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]