Linux Integrity
Thread Index
[
Prev Page
][
Next Page
]
OTA does not work with IMA due to xattr not supported by zip
From
: rishi gupta <gupt21@xxxxxxxxx>
Re: [PATCH 6/6] ima: Use ima tcb policy files for test
From
: Jia Zhang <zhang.jia@xxxxxxxxxxxxxxxxx>
Re: [PATCH v7 1/5] tpm: dynamically allocate the allocated_banks array
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [RFC PATCH 4/4] crypto: Add EC-RDSA algorithm
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [RFC PATCH 4/4] crypto: Add EC-RDSA algorithm
From
: Stephan Mueller <smueller@xxxxxxxxxx>
Re: [RFC PATCH 4/4] crypto: Add EC-RDSA algorithm
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH 5/6] ima: Rename the folder name for policy files to datafiles
From
: Jia Zhang <zhang.jia@xxxxxxxxxxxxxxxxx>
[PATCH 3/6] ima/ima_boot_aggregate: Fix extending PCRs beyond PCR 0-7
From
: Jia Zhang <zhang.jia@xxxxxxxxxxxxxxxxx>
[PATCH 1/6] ima/ima_boot_aggregate: Fix the definition of event log
From
: Jia Zhang <zhang.jia@xxxxxxxxxxxxxxxxx>
[PATCH 6/6] ima: Use ima tcb policy files for test
From
: Jia Zhang <zhang.jia@xxxxxxxxxxxxxxxxx>
[PATCH 0/6] LTP IMA fix bundle
From
: Jia Zhang <zhang.jia@xxxxxxxxxxxxxxxxx>
[PATCH 4/6] ima: Code cleanup
From
: Jia Zhang <zhang.jia@xxxxxxxxxxxxxxxxx>
[PATCH 2/6] ima/ima_boot_aggregate: Don't hard code the length of sha1 hash
From
: Jia Zhang <zhang.jia@xxxxxxxxxxxxxxxxx>
Re: [RFC PATCH 4/4] crypto: Add EC-RDSA algorithm
From
: Stephan Müller <smueller@xxxxxxxxxx>
[RFC PATCH 4/4] crypto: Add EC-RDSA algorithm
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[RFC PATCH 3/4] KEYS: set correct flags for keyctl if encrypt is not supported
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[RFC PATCH 2/4] akcipher: Introduce verify2 for public key algorithms
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[RFC PATCH 1/4] X.509: Parse public key parameters from x509 for akcipher
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[RFC PATCH 0/4] crypto: Add EC-RDSA algorithm
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH 1/2] tpm/eventlog/tpm1: Simplify walking over *pos measurements
From
: Jia Zhang <zhang.jia@xxxxxxxxxxxxxxxxx>
[PATCH 2/2] tpm/eventlog/tpm1: Fix off-by-1 when reading binary_bios_measurements
From
: Jia Zhang <zhang.jia@xxxxxxxxxxxxxxxxx>
Re: [PATCH] selftests: add TPM 2.0 tests
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v2 01/12] fs-verity: add a documentation file
From
: Daniel Colascione <dancol@xxxxxxxxxx>
Re: tpm_tis TPM2.0 not detected on cold boot
From
: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
Re: tpm_tis TPM2.0 not detected on cold boot
From
: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
Re: tpm_tis TPM2.0 not detected on cold boot
From
: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
Re: [PATCH] tpm: fix incorrect success returns from tpm_try_transmit()
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: tpm_tis TPM2.0 not detected on cold boot
From
: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
RE: [PATCH] tpm: fix incorrect success returns from tpm_try_transmit()
From
: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
Re: [PATCH] tpm: fix incorrect success returns from tpm_try_transmit()
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: tpm_tis TPM2.0 not detected on cold boot
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] tpm: fix incorrect success returns from tpm_try_transmit()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: tpm_tis TPM2.0 not detected on cold boot
From
: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
RE: [PATCH] tpm: fix incorrect success returns from tpm_try_transmit()
From
: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
Re: tpm_tis TPM2.0 not detected on cold boot
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: tpm_tis TPM2.0 not detected on cold boot
From
: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
Re: tpm_tis TPM2.0 not detected on cold boot
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH REVIEW 2/2] tpm_tis: override durations for STM tpm with firmware 1.2.8.28
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH REVIEW 1/2] tpm: provide a way to override the chip returned durations
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] tpm: fix incorrect success returns from tpm_try_transmit()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: tpm_tis TPM2.0 not detected on cold boot
From
: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
Re: tpm_tis TPM2.0 not detected on cold boot
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: tpm_tis TPM2.0 not detected on cold boot
From
: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
Re: tpm_tis TPM2.0 not detected on cold boot
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH] tpm: fix incorrect success returns from tpm_try_transmit()
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: tpm_tis TPM2.0 not detected on cold boot
From
: Ken Goldman <kgold@xxxxxxxxxxxxx>
Re: tpm_tis TPM2.0 not detected on cold boot
From
: Ken Goldman <kgold@xxxxxxxxxxxxx>
Re: tpm_tis TPM2.0 not detected on cold boot
From
: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
Re: [DISCUSSION] IMA measurement log format
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: tpm_tis TPM2.0 not detected on cold boot
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[DISCUSSION] IMA measurement log format
From
: Jordan Hand <Jordan.Hand@xxxxxxxxxxxxx>
Re: [PATCH] MAINTAINERS: fix typo in Mimi Zohar's address
From
: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxx>
[PATCH] MAINTAINERS: fix typo in Mimi Zohar's address
From
: Baruch Siach <baruch@xxxxxxxxxx>
Re: tpm_tis TPM2.0 not detected on cold boot
From
: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
Re: tpm_tis TPM2.0 not detected on cold boot
From
: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
Re: [PATCH v2 01/12] fs-verity: add a documentation file
From
: "Theodore Y. Ts'o" <tytso@xxxxxxx>
Re: [PATCH v2 01/12] fs-verity: add a documentation file
From
: "Theodore Y. Ts'o" <tytso@xxxxxxx>
Re: [PATCH v2 01/12] fs-verity: add a documentation file
From
: Matthew Wilcox <willy@xxxxxxxxxxxxx>
Re: [PATCH 03/12] __wr_after_init: generic header
From
: Igor Stoppa <igor.stoppa@xxxxxxxxx>
Re: tpm_tis TPM2.0 not detected on cold boot
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 01/12] fs-verity: add a documentation file
From
: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 01/12] fs-verity: add a documentation file
From
: "Theodore Y. Ts'o" <tytso@xxxxxxx>
Re: tpm_tis TPM2.0 not detected on cold boot
From
: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
Re: [PATCH v7 1/5] tpm: dynamically allocate the allocated_banks array
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH 03/12] __wr_after_init: generic functionality
From
: Igor Stoppa <igor.stoppa@xxxxxxxxx>
Re: [PATCH 01/12] x86_64: memset_user()
From
: Cyrill Gorcunov <gorcunov@xxxxxxxxx>
Re: [PATCH 01/12] x86_64: memset_user()
From
: Matthew Wilcox <willy@xxxxxxxxxxxxx>
Re: [PATCH 01/12] x86_64: memset_user()
From
: Cyrill Gorcunov <gorcunov@xxxxxxxxx>
Re: [PATCH 01/12] x86_64: memset_user()
From
: Matthew Wilcox <willy@xxxxxxxxxxxxx>
Re: [PATCH 01/12] x86_64: memset_user()
From
: Cyrill Gorcunov <gorcunov@xxxxxxxxx>
Re: [PATCH 03/12] __wr_after_init: generic header
From
: Matthew Wilcox <willy@xxxxxxxxxxxxx>
Re: [PATCH 03/12] __wr_after_init: generic functionality
From
: Matthew Wilcox <willy@xxxxxxxxxxxxx>
Re: [PATCH 03/12] __wr_after_init: generic header
From
: Nadav Amit <nadav.amit@xxxxxxxxx>
Re: [PATCH v2 01/12] fs-verity: add a documentation file
From
: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 03/12] __wr_after_init: generic functionality
From
: Igor Stoppa <igor.stoppa@xxxxxxxxx>
Re: [PATCH 01/12] x86_64: memset_user()
From
: Igor Stoppa <igor.stoppa@xxxxxxxxx>
Re: [PATCH 03/12] __wr_after_init: generic functionality
From
: Matthew Wilcox <willy@xxxxxxxxxxxxx>
Re: [PATCH 01/12] x86_64: memset_user()
From
: Matthew Wilcox <willy@xxxxxxxxxxxxx>
[PATCH 03/12] __wr_after_init: generic functionality
From
: Igor Stoppa <igor.stoppa@xxxxxxxxx>
[PATCH 02/12] __wr_after_init: linker section and label
From
: Igor Stoppa <igor.stoppa@xxxxxxxxx>
[PATCH 04/12] __wr_after_init: debug writes
From
: Igor Stoppa <igor.stoppa@xxxxxxxxx>
[PATCH 06/12] __wr_after_init: Documentation: self-protection
From
: Igor Stoppa <igor.stoppa@xxxxxxxxx>
[PATCH 05/12] __wr_after_init: x86_64: __wr_op
From
: Igor Stoppa <igor.stoppa@xxxxxxxxx>
[PATCH 07/12] __wr_after_init: lkdtm test
From
: Igor Stoppa <igor.stoppa@xxxxxxxxx>
[PATCH 08/12] rodata_test: refactor tests
From
: Igor Stoppa <igor.stoppa@xxxxxxxxx>
[PATCH 10/12] __wr_after_init: test write rare functionality
From
: Igor Stoppa <igor.stoppa@xxxxxxxxx>
[PATCH 09/12] rodata_test: add verification for __wr_after_init
From
: Igor Stoppa <igor.stoppa@xxxxxxxxx>
[PATCH 11/12] IMA: turn ima_policy_flags into __wr_after_init
From
: Igor Stoppa <igor.stoppa@xxxxxxxxx>
[PATCH 12/12] x86_64: __clear_user as case of __memset_user
From
: Igor Stoppa <igor.stoppa@xxxxxxxxx>
[PATCH 01/12] x86_64: memset_user()
From
: Igor Stoppa <igor.stoppa@xxxxxxxxx>
Re: [PATCH 04/12] __wr_after_init: x86_64: __wr_op
From
: Igor Stoppa <igor.stoppa@xxxxxxxxx>
Re: [PATCH 04/12] __wr_after_init: x86_64: __wr_op
From
: Andy Lutomirski <luto@xxxxxxxxxx>
Re: [PATCH v2 01/12] fs-verity: add a documentation file
From
: Matthew Wilcox <willy@xxxxxxxxxxxxx>
Re: [PATCH v2 01/12] fs-verity: add a documentation file
From
: "Theodore Y. Ts'o" <tytso@xxxxxxx>
Re: [PATCH v2 01/12] fs-verity: add a documentation file
From
: Matthew Wilcox <willy@xxxxxxxxxxxxx>
Re: [PATCH v2 01/12] fs-verity: add a documentation file
From
: Matthew Wilcox <willy@xxxxxxxxxxxxx>
Re: [PATCH v2 01/12] fs-verity: add a documentation file
From
: "Theodore Y. Ts'o" <tytso@xxxxxxx>
Re: [PATCH v2 01/12] fs-verity: add a documentation file
From
: Richard Weinberger <richard.weinberger@xxxxxxxxx>
Re: [PATCH v7 1/5] tpm: dynamically allocate the allocated_banks array
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v2 01/12] fs-verity: add a documentation file
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: [PATCH v2 01/12] fs-verity: add a documentation file
From
: "Theodore Y. Ts'o" <tytso@xxxxxxx>
Re: [PATCH 04/12] __wr_after_init: x86_64: __wr_op
From
: Matthew Wilcox <willy@xxxxxxxxxxxxx>
Re: EVM: Permission denied with overlayfs
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 04/12] __wr_after_init: x86_64: __wr_op
From
: Igor Stoppa <igor.stoppa@xxxxxxxxx>
Re: [PATCH 04/12] __wr_after_init: x86_64: __wr_op
From
: Matthew Wilcox <willy@xxxxxxxxxxxxx>
Re: linux-next: Tree for Dec 14 (security/integrity/ima/)
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH 11/12] IMA: turn ima_policy_flags into __wr_after_init
From
: Igor Stoppa <igor.stoppa@xxxxxxxxx>
Re: [PATCH 04/12] __wr_after_init: x86_64: __wr_op
From
: Igor Stoppa <igor.stoppa@xxxxxxxxx>
Re: [PATCH 11/12] IMA: turn ima_policy_flags into __wr_after_init
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
Re: [PATCH 04/12] __wr_after_init: x86_64: __wr_op
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
Re: [PATCH 04/12] __wr_after_init: x86_64: __wr_op
From
: Igor Stoppa <igor.stoppa@xxxxxxxxx>
Re: [PATCH v7 5/5] tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: EVM: Permission denied with overlayfs
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v7 1/5] tpm: dynamically allocate the allocated_banks array
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: EVM: Permission denied with overlayfs
From
: Amir Goldstein <amir73il@xxxxxxxxx>
Re: EVM: Permission denied with overlayfs
From
: Goldwyn Rodrigues <rgoldwyn@xxxxxxxx>
Re: [PATCH 2/6] __wr_after_init: write rare for static allocation
From
: Igor Stoppa <igor.stoppa@xxxxxxxxx>
Re: EVM: Permission denied with overlayfs
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: EVM: Permission denied with overlayfs
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 01/12] fs-verity: add a documentation file
From
: Dave Chinner <david@xxxxxxxxxxxxx>
[PATCH 03/12] __wr_after_init: generic header
From
: Igor Stoppa <igor.stoppa@xxxxxxxxx>
[PATCH 04/12] __wr_after_init: x86_64: __wr_op
From
: Igor Stoppa <igor.stoppa@xxxxxxxxx>
[PATCH 09/12] rodata_test: add verification for __wr_after_init
From
: Igor Stoppa <igor.stoppa@xxxxxxxxx>
[PATCH 07/12] __wr_after_init: lkdtm test
From
: Igor Stoppa <igor.stoppa@xxxxxxxxx>
[PATCH 08/12] rodata_test: refactor tests
From
: Igor Stoppa <igor.stoppa@xxxxxxxxx>
[PATCH 06/12] __wr_after_init: Documentation: self-protection
From
: Igor Stoppa <igor.stoppa@xxxxxxxxx>
[PATCH 05/12] __wr_after_init: x86_64: debug writes
From
: Igor Stoppa <igor.stoppa@xxxxxxxxx>
[PATCH 02/12] __wr_after_init: linker section and label
From
: Igor Stoppa <igor.stoppa@xxxxxxxxx>
[PATCH 01/12] x86_64: memset_user()
From
: Igor Stoppa <igor.stoppa@xxxxxxxxx>
[PATCH 11/12] IMA: turn ima_policy_flags into __wr_after_init
From
: Igor Stoppa <igor.stoppa@xxxxxxxxx>
[PATCH 10/12] __wr_after_init: test write rare functionality
From
: Igor Stoppa <igor.stoppa@xxxxxxxxx>
[PATCH 12/12] x86_64: __clear_user as case of __memset_user
From
: Igor Stoppa <igor.stoppa@xxxxxxxxx>
[RFC v2 PATCH 0/12] hardening: statically allocated protected memory
From
: Igor Stoppa <igor.stoppa@xxxxxxxxx>
Re: EVM: Permission denied with overlayfs
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: EVM: Permission denied with overlayfs
From
: Amir Goldstein <amir73il@xxxxxxxxx>
Re: EVM: Permission denied with overlayfs
From
: Amir Goldstein <amir73il@xxxxxxxxx>
Re: EVM: Permission denied with overlayfs
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 01/12] fs-verity: add a documentation file
From
: "Theodore Y. Ts'o" <tytso@xxxxxxx>
Re: EVM: Permission denied with overlayfs
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: EVM: Permission denied with overlayfs
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: EVM: Permission denied with overlayfs
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: EVM: Permission denied with overlayfs
From
: Amir Goldstein <amir73il@xxxxxxxxx>
Re: EVM: Permission denied with overlayfs
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 01/12] fs-verity: add a documentation file
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: [PATCH v2 01/12] fs-verity: add a documentation file
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: [PATCH v2 01/12] fs-verity: add a documentation file
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: [PATCH v2 01/12] fs-verity: add a documentation file
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: [PATCH v2 01/12] fs-verity: add a documentation file
From
: Dave Chinner <david@xxxxxxxxxxxxx>
Re: [PATCH v2 01/12] fs-verity: add a documentation file
From
: "Theodore Y. Ts'o" <tytso@xxxxxxx>
Re: EVM: Permission denied with overlayfs
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
EVM: Permission denied with overlayfs
From
: Ignaz Forster <iforster@xxxxxxx>
Re: [PATCH v2] ima: define ima_post_create_tmpfile() hook and add missing call
From
: Ignaz Forster <iforster@xxxxxxx>
[PATCH v2] ima: define ima_post_create_tmpfile() hook and add missing call
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] ima: cleanup the match_token policy code
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] ima: cleanup the match_token policy code
From
: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
Re: [PATCH] ima: cleanup the match_token policy code
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] ima: cleanup the match_token policy code
From
: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
Re: [PATCH] ima: cleanup the match_token policy code
From
: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
Re: [PATCH] ima: define ima_create_tmpfile() hook and add missing call
From
: kbuild test robot <lkp@xxxxxxxxx>
Re: [PATCH] ima: cleanup the match_token policy code
From
: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
[PATCH] ima: cleanup the match_token policy code
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH] ima: define ima_create_tmpfile() hook and add missing call
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 01/12] fs-verity: add a documentation file
From
: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
Re: [GIT PULL] linux-integrity patches for Linux 4.21
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [GIT PULL] linux-integrity patches for Linux 4.21
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH v2 01/12] fs-verity: add a documentation file
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v2 01/12] fs-verity: add a documentation file
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v2 01/12] fs-verity: add a documentation file
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: [PATCH v2 01/12] fs-verity: add a documentation file
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: Bug: Persisting O_TMPFILE with IMA
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
tpm_tis TPM2.0 not detected on cold boot
From
: Michael Niewöhner <niewoehner.michael@xxxxxxxxx>
Re: [PATCH] Allow hwrng to initialize crng.
From
: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
Re: [PATCH] Allow hwrng to initialize crng.
From
: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
Re: Bug: Persisting O_TMPFILE with IMA
From
: Ignaz Forster <ignaz.forster@xxxxxx>
[PATCH -next] evm: remove set but not used variable 'xattr'
From
: YueHaibing <yuehaibing@xxxxxxxxxx>
Re: [PATCH -next] evm: CHECK-remove set but not used variable 'xattr'
From
: YueHaibing <yuehaibing@xxxxxxxxxx>
[PATCH -next] evm: CHECK-remove set but not used variable 'xattr'
From
: YueHaibing <yuehaibing@xxxxxxxxxx>
Re: linux-next: Tree for Dec 14 (security/integrity/ima/)
From
: Paul Gortmaker <paul.gortmaker@xxxxxxxxxxxxx>
Re: linux-next: Tree for Dec 14 (security/integrity/ima/)
From
: Paul Gortmaker <paul.gortmaker@xxxxxxxxxxxxx>
Re: linux-next: Tree for Dec 14 (security/integrity/ima/)
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: Bug: Persisting O_TMPFILE with IMA
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Bug: Persisting O_TMPFILE with IMA
From
: Ignaz Forster <iforster@xxxxxxx>
Re: linux-next: Tree for Dec 14 (security/integrity/ima/)
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
[GIT PULL] linux-integrity patches for Linux 4.21
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH REVIEW 2/2] tpm_tis: override durations for STM tpm with firmware 1.2.8.28
From
: Alexey Klimov <aklimov@xxxxxxxxxx>
[PATCH REVIEW 1/2] tpm: provide a way to override the chip returned durations
From
: Alexey Klimov <aklimov@xxxxxxxxxx>
Re: [PATCH v6 7/7] tpm: pass an array of tpm_bank_list structures to tpm_pcr_extend()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v2 01/12] fs-verity: add a documentation file
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v2 01/12] fs-verity: add a documentation file
From
: "Theodore Y. Ts'o" <tytso@xxxxxxx>
Re: [PATCH v2 01/12] fs-verity: add a documentation file
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v2 01/12] fs-verity: add a documentation file
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: [PATCH v4 1/6] tpm: dynamically allocate active_banks array
From
: Ken Goldman <kgold@xxxxxxxxxxxxx>
Re: [PATCH v7 13/14] module: Do not set nx for module memory before freeing
From
: Nadav Amit <namit@xxxxxxxxxx>
Re: [PATCH v7 13/14] module: Do not set nx for module memory before freeing
From
: Jessica Yu <jeyu@xxxxxxxxxx>
Re: [PATCH] fs: Evaluate O_WRONLY | O_RDWR to O_RDWR
From
: Goldwyn Rodrigues <rgoldwyn@xxxxxxx>
Re: [PATCH] fs: Evaluate O_WRONLY | O_RDWR to O_RDWR
From
: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH v1 0/5] Add support for O_MAYEXEC
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] fs: Evaluate O_WRONLY | O_RDWR to O_RDWR
From
: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
Re: [PATCH] fs: Evaluate O_WRONLY | O_RDWR to O_RDWR
From
: Amir Goldstein <amir73il@xxxxxxxxx>
Re: [PATCH] fs: Evaluate O_WRONLY | O_RDWR to O_RDWR
From
: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH] akcipher: Introduce verify2 for public key algorithms
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH] fs: Evaluate O_WRONLY | O_RDWR to O_RDWR
From
: Goldwyn Rodrigues <rgoldwyn@xxxxxxx>
[PATCH v7 5/5] tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v7 4/5] tpm: retrieve digest size of unknown algorithms with PCR read
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v7 3/5] tpm: rename and export tpm2_digest and tpm2_algorithms
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v7 2/5] tpm: add _head suffix to tcg_efi_specid_event and tcg_pcr_event2
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v7 1/5] tpm: dynamically allocate the allocated_banks array
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v7 0/5] tpm: retrieve digest size of unknown algorithms from TPM
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v6 1/7] tpm: dynamically allocate the allocated_banks array
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v6 7/7] tpm: pass an array of tpm_bank_list structures to tpm_pcr_extend()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH] Allow hwrng to initialize crng.
From
: Louis Collard <louiscollard@xxxxxxxxxxxx>
[PATCH v9 01/14] MODSIGN: Export module signature definitions
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v9 09/14] ima: Export func_tokens
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v9 14/14] ima: Store the measurement again when appraising a modsig
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v9 10/14] ima: Add modsig appraise_type option for module-style appended signatures
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v9 13/14] ima: Write modsig to the measurement list
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v9 12/14] ima: Add new "d-sig" template field
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v9 11/14] ima: Implement support for module-style appended signatures
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v9 08/14] ima: Introduce is_signed()
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v9 07/14] integrity: Select CONFIG_KEYS instead of depending on it
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v9 06/14] integrity: Introduce asymmetric_sig_has_known_key()
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v9 05/14] integrity: Introduce integrity_keyring_from_id()
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v9 04/14] integrity: Introduce struct evm_xattr
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v9 03/14] PKCS#7: Introduce pkcs7_get_digest()
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v9 02/14] PKCS#7: Refactor verify_pkcs7_signature() and add pkcs7_get_message_sig()
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v9 00/14] Appended signatures support for IMA appraisal
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
Re: [PATCH v2 7/7] ima: Support platform keyring for kernel appraisal
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
Re: [PATCH v2 7/7] ima: Support platform keyring for kernel appraisal
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 2/7] integrity: Load certs to the platform keyring
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
Re: [PATCH v2 1/7] integrity: Define a trusted platform keyring
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
Re: [PATCH 0/5] security: remove needless usage of module header
From
: James Morris <jmorris@xxxxxxxxx>
[PATCH v2a 5/7] efi: Import certificates from UEFI Secure Boot
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
Re: [PATCH v2 01/12] fs-verity: add a documentation file
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v6 1/7] tpm: dynamically allocate the allocated_banks array
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v6 4/7] tpm: modify tpm_pcr_read() definition to pass a TPM hash algorithm
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v6 7/7] tpm: pass an array of tpm_bank_list structures to tpm_pcr_extend()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v6 7/7] tpm: pass an array of tpm_bank_list structures to tpm_pcr_extend()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v6 6/7] tpm: ensure that the output of PCR read contains the correct digest size
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v6 5/7] tpm: retrieve digest size of unknown algorithms with PCR read
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v2 7/7] ima: Support platform keyring for kernel appraisal
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
Re: [PATCH] tpm-dev: Require response to be read only if there actually is a response
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v2 5/7] efi: Import certificates from UEFI Secure Boot
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
Re: [PATCH 2/6] __wr_after_init: write rare for static allocation
From
: Martin Schwidefsky <schwidefsky@xxxxxxxxxx>
Re: [PATCH v2 01/12] fs-verity: add a documentation file
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
From
: Ken Goldman <kgold@xxxxxxxxxxxxx>
Re: [PATCH v6 1/7] tpm: dynamically allocate the allocated_banks array
From
: Ken Goldman <kgold@xxxxxxxxxxxxx>
Re: [PATCH v2 7/7] ima: Support platform keyring for kernel appraisal
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH v2 6/7] efi: Allow the "db" UEFI variable to be suppressed
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH v2 5/7] efi: Import certificates from UEFI Secure Boot
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH v2 3/7] efi: Add EFI signature data types
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH v2 2/7] integrity: Load certs to the platform keyring
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH v2 1/7] integrity: Define a trusted platform keyring
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH] ima: Use inode_is_open_for_write
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH] ima: Use inode_is_open_for_write
From
: Nikolay Borisov <nborisov@xxxxxxxx>
Re: [PATCH] fs: Convert open-coded "is inode open for write" check
From
: kbuild test robot <lkp@xxxxxxxxx>
Re: [PATCH] fs: Convert open-coded "is inode open for write" check
From
: kbuild test robot <lkp@xxxxxxxxx>
Re: [PATCH v2] fs: Convert open-coded "is inode open for write" check
From
: Andreas Dilger <adilger@xxxxxxxxx>
Re: [RFC][PATCH 08/12] KEYS: PGP-based public key signature verification
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [RFC][PATCH 08/12] KEYS: PGP-based public key signature verification
From
: David Howells <dhowells@xxxxxxxxxx>
Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
From
: Ken Goldman <kgold@xxxxxxxxxxxxx>
Re: [PATCH v2] fs: Convert open-coded "is inode open for write" check
From
: Jan Kara <jack@xxxxxxx>
[PATCH v2] fs: Convert open-coded "is inode open for write" check
From
: Nikolay Borisov <nborisov@xxxxxxxx>
[PATCH] fs: Convert open-coded "is inode open for write" check
From
: Nikolay Borisov <nborisov@xxxxxxxx>
Re: [PATCH 2/6] __wr_after_init: write rare for static allocation
From
: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
Re: [PATCH v6 4/7] tpm: modify tpm_pcr_read() definition to pass a TPM hash algorithm
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v7 00/14] x86/alternative: text_poke() enhancements
From
: Nadav Amit <namit@xxxxxxxxxx>
Re: [PATCH 2/6] __wr_after_init: write rare for static allocation
From
: Igor Stoppa <igor.stoppa@xxxxxxxxx>
Re: [PATCH 2/6] __wr_after_init: write rare for static allocation
From
: Igor Stoppa <igor.stoppa@xxxxxxxxx>
Re: [PATCH 2/6] __wr_after_init: write rare for static allocation
From
: Igor Stoppa <igor.stoppa@xxxxxxxxx>
[PATCH 2/5] keys: remove needless modular infrastructure from ecryptfs_format
From
: Paul Gortmaker <paul.gortmaker@xxxxxxxxxxxxx>
[PATCH 1/5] security: audit and remove any unnecessary uses of module.h
From
: Paul Gortmaker <paul.gortmaker@xxxxxxxxxxxxx>
[PATCH 0/5] security: remove needless usage of module header
From
: Paul Gortmaker <paul.gortmaker@xxxxxxxxxxxxx>
Re: [PATCH v6 4/7] tpm: modify tpm_pcr_read() definition to pass a TPM hash algorithm
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 0/7] add platform/firmware keys support for kernel verification by IMA
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: unrecognized TMP 2.0 hardware
From
: Malte Gell <mailinglisten@xxxxxxxxx>
Re: [PATCH v6 2/7] tpm: add _head suffix to tcg_efi_specid_event and tcg_pcr_event2
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
Re: [PATCH v6 4/7] tpm: modify tpm_pcr_read() definition to pass a TPM hash algorithm
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v2 1/7] integrity: Define a trusted platform keyring
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v2 7/7] ima: Support platform keyring for kernel appraisal
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v2 3/7] efi: Add EFI signature data types
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v2 6/7] efi: Allow the "db" UEFI variable to be suppressed
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v2 5/7] efi: Import certificates from UEFI Secure Boot
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v2 4/7] efi: Add an EFI signature blob parser
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v2 2/7] integrity: Load certs to the platform keyring
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v2 1/7] integrity: Define a trusted platform keyring
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v2 0/7] add platform/firmware keys support for kernel verification by IMA
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
Re: [PATCH v6 4/7] tpm: modify tpm_pcr_read() definition to pass a TPM hash algorithm
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: unrecognized TMP 2.0 hardware
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: [PATCH 7/7] ima: Support platform keyring for kernel appraisal
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
unrecognized TMP 2.0 hardware
From
: Chris Murphy <chris@xxxxxxxxxxxxxxxxx>
Re: [PATCH v7 13/14] module: Do not set nx for module memory before freeing
From
: Nadav Amit <namit@xxxxxxxxxx>
Re: [PATCH v7 13/14] module: Do not set nx for module memory before freeing
From
: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
Re: [PATCH v6 4/7] tpm: modify tpm_pcr_read() definition to pass a TPM hash algorithm
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v7 13/14] module: Do not set nx for module memory before freeing
From
: Nadav Amit <namit@xxxxxxxxxx>
Re: [PATCH v7 13/14] module: Do not set nx for module memory before freeing
From
: Andy Lutomirski <luto@xxxxxxxxxx>
Re: [PATCH v6 7/7] tpm: pass an array of tpm_bank_list structures to tpm_pcr_extend()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v6 7/7] tpm: pass an array of tpm_bank_list structures to tpm_pcr_extend()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH] tpm-dev: Require response to be read only if there actually is a response
From
: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
Re: [PATCH v6 6/7] tpm: ensure that the output of PCR read contains the correct digest size
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v6 5/7] tpm: retrieve digest size of unknown algorithms with PCR read
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v6 1/7] tpm: dynamically allocate the allocated_banks array
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v7 13/14] module: Do not set nx for module memory before freeing
From
: Nadav Amit <namit@xxxxxxxxxx>
Re: [PATCH v7 08/14] x86/ftrace: Use text_poke_*() infrastructure
From
: Ingo Molnar <mingo@xxxxxxxxxx>
Re: [PATCH v7 09/14] x86/kprobes: Instruction pages initialization enhancements
From
: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
Re: [PATCH v7 13/14] module: Do not set nx for module memory before freeing
From
: Andrea Parri <andrea.parri@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v7 00/14] x86/alternative: text_poke() enhancements
From
: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
Re: [PATCH v7 14/14] module: Prevent module removal racing with text_poke()
From
: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
Re: [PATCH v7 13/14] module: Do not set nx for module memory before freeing
From
: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
Re: [PATCH 2/6] __wr_after_init: write rare for static allocation
From
: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
Re: [PATCH v6 4/7] tpm: modify tpm_pcr_read() definition to pass a TPM hash algorithm
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
Re: [PATCH 2/6] __wr_after_init: write rare for static allocation
From
: Matthew Wilcox <willy@xxxxxxxxxxxxx>
Re: [PATCH v7 08/14] x86/ftrace: Use text_poke_*() infrastructure
From
: Nadav Amit <namit@xxxxxxxxxx>
Re: [PATCH 2/6] __wr_after_init: write rare for static allocation
From
: Andy Lutomirski <luto@xxxxxxxxxx>
Re: [PATCH v6 4/7] tpm: modify tpm_pcr_read() definition to pass a TPM hash algorithm
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v7 03/14] x86/mm: temporary mm struct
From
: Nadav Amit <namit@xxxxxxxxxx>
[PATCH v7 02/14] x86/jump_label: Use text_poke_early() during early init
From
: Nadav Amit <namit@xxxxxxxxxx>
[PATCH v7 04/14] fork: provide a function for copying init_mm
From
: Nadav Amit <namit@xxxxxxxxxx>
[PATCH v7 05/14] x86/alternative: initializing temporary mm for patching
From
: Nadav Amit <namit@xxxxxxxxxx>
[PATCH v7 07/14] x86/kgdb: avoid redundant comparison of patched code
From
: Nadav Amit <namit@xxxxxxxxxx>
[PATCH v7 08/14] x86/ftrace: Use text_poke_*() infrastructure
From
: Nadav Amit <namit@xxxxxxxxxx>
[PATCH v7 06/14] x86/alternative: use temporary mm for text poking
From
: Nadav Amit <namit@xxxxxxxxxx>
[PATCH v7 09/14] x86/kprobes: Instruction pages initialization enhancements
From
: Nadav Amit <namit@xxxxxxxxxx>
[PATCH v7 11/14] x86/jump-label: remove support for custom poker
From
: Nadav Amit <namit@xxxxxxxxxx>
[PATCH v7 10/14] x86: avoid W^X being broken during modules loading
From
: Nadav Amit <namit@xxxxxxxxxx>
[PATCH v7 13/14] module: Do not set nx for module memory before freeing
From
: Nadav Amit <namit@xxxxxxxxxx>
[PATCH v7 12/14] x86/alternative: Remove the return value of text_poke_*()
From
: Nadav Amit <namit@xxxxxxxxxx>
[PATCH v7 14/14] module: Prevent module removal racing with text_poke()
From
: Nadav Amit <namit@xxxxxxxxxx>
[PATCH v7 01/14] Fix "x86/alternatives: Lockdep-enforce text_mutex in text_poke*()"
From
: Nadav Amit <namit@xxxxxxxxxx>
[PATCH v7 00/14] x86/alternative: text_poke() enhancements
From
: Nadav Amit <namit@xxxxxxxxxx>
Re: [PATCH v6 6/7] tpm: ensure that the output of PCR read contains the correct digest size
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] selftests: add TPM 2.0 tests
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v6 0/7] tpm: retrieve digest size of unknown algorithms from TPM
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v6 0/7] tpm: retrieve digest size of unknown algorithms from TPM
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v6 7/7] tpm: pass an array of tpm_bank_list structures to tpm_pcr_extend()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v6 6/7] tpm: ensure that the output of PCR read contains the correct digest size
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v6 5/7] tpm: retrieve digest size of unknown algorithms with PCR read
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v6 4/7] tpm: modify tpm_pcr_read() definition to pass a TPM hash algorithm
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v8 00/14] Appended signatures support for IMA appraisal
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
Re: [PATCH v6 2/7] tpm: add _head suffix to tcg_efi_specid_event and tcg_pcr_event2
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v6 1/7] tpm: dynamically allocate the allocated_banks array
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v8 00/14] Appended signatures support for IMA appraisal
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH 10/17] prmem: documentation
From
: Igor Stoppa <igor.stoppa@xxxxxxxxx>
[PATCH 1/6] __wr_after_init: linker section and label
From
: Igor Stoppa <igor.stoppa@xxxxxxxxx>
[PATCH 4/6] rodata_test: add verification for __wr_after_init
From
: Igor Stoppa <igor.stoppa@xxxxxxxxx>
[PATCH 2/6] __wr_after_init: write rare for static allocation
From
: Igor Stoppa <igor.stoppa@xxxxxxxxx>
[PATCH 6/6] __wr_after_init: lkdtm test
From
: Igor Stoppa <igor.stoppa@xxxxxxxxx>
[PATCH 5/6] __wr_after_init: test write rare functionality
From
: Igor Stoppa <igor.stoppa@xxxxxxxxx>
[PATCH 3/6] rodata_test: refactor tests
From
: Igor Stoppa <igor.stoppa@xxxxxxxxx>
[RFC v1 PATCH 0/6] hardening: statically allocated protected memory
From
: Igor Stoppa <igor.stoppa@xxxxxxxxx>
[PATCH v6 7/7] tpm: pass an array of tpm_bank_list structures to tpm_pcr_extend()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v6 6/7] tpm: ensure that the output of PCR read contains the correct digest size
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v6 5/7] tpm: retrieve digest size of unknown algorithms with PCR read
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v6 4/7] tpm: modify tpm_pcr_read() definition to pass a TPM hash algorithm
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v6 3/7] tpm: rename and export tpm2_digest and tpm2_algorithms
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v6 2/7] tpm: add _head suffix to tcg_efi_specid_event and tcg_pcr_event2
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v6 1/7] tpm: dynamically allocate the allocated_banks array
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v6 0/7] tpm: retrieve digest size of unknown algorithms from TPM
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: Re: TPM legacy
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: Re: TPM legacy
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: Re: TPM legacy
From
: Jason Gunthorpe <jgg@xxxxxxxx>
Re: Re: TPM legacy
From
: Peter Huewe <peterhuewe@xxxxxx>
Re: Re: TPM legacy
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: Re: TPM legacy
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v5 2/7] tpm: remove definition of TPM2_ACTIVE_PCR_BANKS
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: Re: TPM legacy
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: Re: TPM legacy
From
: Jason Gunthorpe <jgg@xxxxxxxx>
Aw: Re: TPM legacy
From
: "Peter Huewe" <PeterHuewe@xxxxxx>
Re: [PATCH v3 1/7] ima-evm-utils: Fix hash buffer overflow in verify_evm and hmac_evm
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5 2/7] tpm: remove definition of TPM2_ACTIVE_PCR_BANKS
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v3 6/7] ima-evm-utils: Extract digest algorithms from hash_info.h
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v3 7/7] ima-evm-utils: Try to load digest by its alias
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v3 3/7] ima-evm-utils: Define the '--xattr-user' option for testing
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v3 4/7] ima-evm-utils: Allow using Streebog hash function
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v3 5/7] ima-evm-utils: Preload OpenSSL engine via '--engine' option
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v3 2/7] ima-evm-utils: Define hash and sig buffer sizes and add asserts
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v3 1/7] ima-evm-utils: Fix hash buffer overflow in verify_evm and hmac_evm
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: TPM legacy
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: TPM legacy
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] docs: Extend trusted keys documentation for TPM 2.0
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: TPM legacy
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH] ima-evm-utils: libimaevm: get key description out of verbose condition
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: TPM legacy
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] docs: Extend trusted keys documentation for TPM 2.0
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 5/7] ima-evm-utils: Preload OpenSSL engine via '--engine' option
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2.1 6/7] ima-evm-utils: Extract digest algorithms from hash_info.h
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
notebook TPM2 not woking
From
: Malte Gell <malte.gell@xxxxxxxxx>
Re: [PATCH v2.1 6/7] ima-evm-utils: Extract digest algorithms from hash_info.h
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v2 5/7] ima-evm-utils: Preload OpenSSL engine via '--engine' option
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH] docs: Extend trusted keys documentation for TPM 2.0
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] docs: Extend trusted keys documentation for TPM 2.0
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
TPM legacy
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v5 2/7] tpm: remove definition of TPM2_ACTIVE_PCR_BANKS
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v2.1 6/7] ima-evm-utils: Extract digest algorithms from hash_info.h
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] libimaevm: get key description out of verbose condition
From
: "Bruno E. O. Meneguele" <bmeneg@xxxxxxxxxx>
[PATCH] ima-evm-utils: libimaevm: get key description out of verbose condition
From
: "Bruno E. O. Meneguele" <bmeneg@xxxxxxxxxx>
[PATCH] libimaevm: get key description out of verbose condition
From
: "Bruno E. O. Meneguele" <bmeneg@xxxxxxxxxx>
Re: [PATCH v5 2/7] tpm: remove definition of TPM2_ACTIVE_PCR_BANKS
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v5 2/7] tpm: remove definition of TPM2_ACTIVE_PCR_BANKS
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v2.1 6/7] ima-evm-utils: Extract digest algorithms from hash_info.h
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 2/7] ima-evm-utils: Define hash and sig buffer sizes and add asserts
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 5/7] ima-evm-utils: Preload OpenSSL engine via '--engine' option
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 4/7] ima-evm-utils: Allow using Streebog hash function
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 3/7] ima-evm-utils: Define the '--xattr-user' option for testing
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v6 08/10] x86: avoid W^X being broken during modules loading
From
: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
Re: [PATCH v8 04/14] integrity: Introduce struct evm_xattr
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v6 00/10] x86/alternative: text_poke() fixes
From
: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
[PATCH v2.1 6/7] ima-evm-utils: Extract digest algorithms from hash_info.h
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v5 2/7] tpm: remove definition of TPM2_ACTIVE_PCR_BANKS
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v2 7/7] ima-evm-utils: Try to load digest by its alias
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v2 6/7] ima-evm-utils: Extract digest algorithms from hash_info.h
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v2 5/7] ima-evm-utils: Preload OpenSSL engine via '--engine' option
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v2 4/7] ima-evm-utils: Allow using Streebog hash function
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v2 3/7] ima-evm-utils: Define the '--xattr-user' option for testing
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v2 2/7] ima-evm-utils: Define hash and sig buffer sizes and add asserts
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v2 1/7] ima-evm-utils: Fix hash buffer overflow in verify_evm and hmac_evm
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v5 6/7] tpm: ensure that the output of PCR read contains the correct digest size
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v6 08/10] x86: avoid W^X being broken during modules loading
From
: Nadav Amit <namit@xxxxxxxxxx>
Re: [PATCH 0/7] add platform/firmware keys support for kernel verification by IMA
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 4/7] efi: Add an EFI signature blob parser
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 5/7] efi: Import certificates from UEFI Secure Boot
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [BUG] Nuvoton NCPT650 TPM 2.0 mode not working
From
: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
Re: [PATCH v5 2/7] tpm: remove definition of TPM2_ACTIVE_PCR_BANKS
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v5 6/7] tpm: ensure that the output of PCR read contains the correct digest size
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v5 2/7] tpm: remove definition of TPM2_ACTIVE_PCR_BANKS
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v9 00/17] Removed nested TPM operations
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v6] tpm: add support for partial reads
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] selftests: add TPM 2.0 tests
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] selftests: add TPM 2.0 tests
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] selftests: add TPM 2.0 tests
From
: Joey Pabalinas <joeypabalinas@xxxxxxxxx>
Re: [PATCH] selftests: add TPM 2.0 tests
From
: Joey Pabalinas <joeypabalinas@xxxxxxxxx>
Re: [PATCH] selftests: add TPM 2.0 tests
From
: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
Re: [BUG] Nuvoton NCPT650 TPM 2.0 mode not working
From
: Ken Goldman <kgold@xxxxxxxxxxxxx>
Re: [PATCH] selftests: add TPM 2.0 tests
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH] selftests: add TPM 2.0 tests
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] IMA: Mask O_RDWR if FMODE_READ is set
From
: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
Re: [PATCH] IMA: Mask O_RDWR if FMODE_READ is set
From
: Amir Goldstein <amir73il@xxxxxxxxx>
Re: [PATCH 3/3] ima-evm-utils: Allow to use Streebog hash function
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 3/3] ima-evm-utils: Allow to use Streebog hash function
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH] IMA: Mask O_RDWR if FMODE_READ is set
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 3/3] ima-evm-utils: Allow to use Streebog hash function
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 2/3] ima-evm-utils: Add --xattr-user option for testing
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 1/3] ima-avm-utils: Fix hash buffer overflow in verify_evm
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [BUG] Nuvoton NCPT650 TPM 2.0 mode not working
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [BUG] Nuvoton NCPT650 TPM 2.0 mode not working
From
: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
Re: [RFC][PATCH] fs: set xattrs in initramfs from regular files
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v6 00/10] x86/alternative: text_poke() fixes
From
: Nadav Amit <namit@xxxxxxxxxx>
Re: [RFC][PATCH] fs: set xattrs in initramfs from regular files
From
: Rob Landley <rob@xxxxxxxxxxx>
[PATCH] IMA: Mask O_RDWR if FMODE_READ is set
From
: Goldwyn Rodrigues <rgoldwyn@xxxxxxx>
Re: [RFC][PATCH] fs: set xattrs in initramfs from regular files
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [RFC][PATCH] fs: set xattrs in initramfs from regular files
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH 1/3] ima-avm-utils: Fix hash buffer overflow in verify_evm
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [RFC][PATCH] fs: set xattrs in initramfs from regular files
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [RFC][PATCH] fs: set xattrs in initramfs from regular files
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v6 00/10] x86/alternative: text_poke() fixes
From
: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
[PATCH 3/3] ima-evm-utils: Allow to use Streebog hash function
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH 2/3] ima-evm-utils: Add --xattr-user option for testing
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH 1/3] ima-avm-utils: Fix hash buffer overflow in verify_evm
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [BUG] Nuvoton NCPT650 TPM 2.0 mode not working
From
: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
[PATCH 7/7] ima: Support platform keyring for kernel appraisal
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH 6/7] efi: Allow the "db" UEFI variable to be suppressed
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH 5/7] efi: Import certificates from UEFI Secure Boot
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH 4/7] efi: Add an EFI signature blob parser
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH 3/7] efi: Add EFI signature data types
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH 2/7] integrity: Load certs to the platform keyring
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH 1/7] integrity: Define a trusted platform keyring
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH 0/7] add platform/firmware keys support for kernel verification by IMA
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
Re: [RFC][PATCH] fs: set xattrs in initramfs from regular files
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [RFC][PATCH] fs: set xattrs in initramfs from regular files
From
: Rob Landley <rob@xxxxxxxxxxx>
Re: [RFC][PATCH] fs: set xattrs in initramfs from regular files
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [RFC][PATCH] fs: set xattrs in initramfs from regular files
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH 10/17] prmem: documentation
From
: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
Re: [PATCH 10/17] prmem: documentation
From
: Matthew Wilcox <willy@xxxxxxxxxxxxx>
Re: [PATCH 10/17] prmem: documentation
From
: Igor Stoppa <igor.stoppa@xxxxxxxxx>
[RFC][PATCH] fs: set xattrs in initramfs from regular files
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH 10/17] prmem: documentation
From
: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
Re: [PATCH 10/17] prmem: documentation
From
: Igor Stoppa <igor.stoppa@xxxxxxxxx>
Re: [PATCH 10/17] prmem: documentation
From
: Nadav Amit <nadav.amit@xxxxxxxxx>
Re: [PATCH 10/17] prmem: documentation
From
: Igor Stoppa <igor.stoppa@xxxxxxxxx>
Re: [PATCH v6] tpm: add support for partial reads
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH v6] tpm: add support for partial reads
From
: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v5] tpm: add support for partial reads
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
From
: Jason Gunthorpe <jgg@xxxxxxxx>
Re: EXTERNAL: Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
From
: Jason Gunthorpe <jgg@xxxxxxxx>
[PATCH v6 00/10] x86/alternative: text_poke() fixes
From
: Nadav Amit <namit@xxxxxxxxxx>
[PATCH v6 02/10] x86/jump_label: Use text_poke_early() during early init
From
: Nadav Amit <namit@xxxxxxxxxx>
[PATCH v6 04/10] fork: provide a function for copying init_mm
From
: Nadav Amit <namit@xxxxxxxxxx>
[PATCH v6 03/10] x86/mm: temporary mm struct
From
: Nadav Amit <namit@xxxxxxxxxx>
[PATCH v6 07/10] x86/kgdb: avoid redundant comparison of patched code
From
: Nadav Amit <namit@xxxxxxxxxx>
[PATCH v6 06/10] x86/alternative: use temporary mm for text poking
From
: Nadav Amit <namit@xxxxxxxxxx>
[PATCH v6 10/10] x86/alternative: remove the return value of text_poke_*()
From
: Nadav Amit <namit@xxxxxxxxxx>
[PATCH v6 08/10] x86: avoid W^X being broken during modules loading
From
: Nadav Amit <namit@xxxxxxxxxx>
[PATCH v6 05/10] x86/alternative: initializing temporary mm for patching
From
: Nadav Amit <namit@xxxxxxxxxx>
[PATCH v6 09/10] x86/jump-label: remove support for custom poker
From
: Nadav Amit <namit@xxxxxxxxxx>
[PATCH v6 01/10] Fix "x86/alternatives: Lockdep-enforce text_mutex in text_poke*()"
From
: Nadav Amit <namit@xxxxxxxxxx>
Re: EXTERNAL: Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
From
: Jeremy Boone <jeremy.boone@xxxxxxxxxxxx>
Re: EXTERNAL: Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
From
: Jeremy Boone <jeremy.boone@xxxxxxxxxxxx>
Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
From
: Jason Gunthorpe <jgg@xxxxxxxx>
Re: [PATCH v5] tpm: add support for partial reads
From
: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v5] tpm: add support for partial reads
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v5] tpm: add support for partial reads
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v9 05/17] tpm: declare struct tpm_header
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
From
: Jason Gunthorpe <jgg@xxxxxxxx>
Re: [PATCH v5 00/10] x86/alternative: text_poke() fixes
From
: Nadav Amit <namit@xxxxxxxxxx>
Re: [PATCH v5 02/10] x86/jump_label: Use text_poke_early() during early init
From
: Nadav Amit <namit@xxxxxxxxxx>
Re: [PATCH v5] tpm: add support for partial reads
From
: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
Re: [PATCH v5] tpm: add support for partial reads
From
: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
Re: [PATCH v5 02/10] x86/jump_label: Use text_poke_early() during early init
From
: "H. Peter Anvin" <hpa@xxxxxxxxx>
Re: [PATCH v5 02/10] x86/jump_label: Use text_poke_early() during early init
From
: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
Re: [PATCH v5 02/10] x86/jump_label: Use text_poke_early() during early init
From
: "H. Peter Anvin" <hpa@xxxxxxxxx>
Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v9 05/17] tpm: declare struct tpm_header
From
: Jason Gunthorpe <jgg@xxxxxxxx>
RE: [PATCH v9 04/17] tpm: print tpm2_commit_space() error inside tpm2_commit_space()
From
: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
Re: [PATCH v9 05/17] tpm: declare struct tpm_header
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v9 04/17] tpm: print tpm2_commit_space() error inside tpm2_commit_space()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v5] tpm: add support for partial reads
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v5 00/10] x86/alternative: text_poke() fixes
From
: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
From
: Jason Gunthorpe <jgg@xxxxxxxx>
Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
From
: Jason Gunthorpe <jgg@xxxxxxxx>
Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
From
: Jason Gunthorpe <jgg@xxxxxxxx>
Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
RE: [PATCH v9 05/17] tpm: declare struct tpm_header
From
: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
RE: [PATCH v9 04/17] tpm: print tpm2_commit_space() error inside tpm2_commit_space()
From
: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
From
: Jason Gunthorpe <jgg@xxxxxxxx>
Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
From
: Jason Gunthorpe <jgg@xxxxxxxx>
[PATCH 0/3] selftest/ima: fail kexec_load syscall
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH 2/3] selftests/ima: kexec_load syscall test
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH 3/3] x86/ima: retry detecting secure boot mode
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH 1/3] ima: add error mesage to kexec_load
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v5] tpm: add support for partial reads
From
: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
Re: [PATCH v4 2/2] tpm: add support for partial reads
From
: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
Documenting the proposal for TPM 2.0 security in the face of bus interposer attacks
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v4 2/2] tpm: add support for partial reads
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v4 2/2] tpm: add support for partial reads
From
: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
Re: [PATCH v5 6/7] tpm: ensure that the output of PCR read contains the correct digest size
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v9 00/17] Removed nested TPM operations
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v9 16/17] tpm: take TPM chip power gating out of tpm_transmit()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v9 15/17] tpm: introduce tpm_chip_start() and tpm_chip_stop()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v5 6/7] tpm: ensure that the output of PCR read contains the correct digest size
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v5 7/7] tpm: pass an array of tpm_bank_list structures to tpm_pcr_extend()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v5 7/7] tpm: pass an array of tpm_bank_list structures to tpm_pcr_extend()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v5 7/7] tpm: pass an array of tpm_bank_list structures to tpm_pcr_extend()
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5 6/7] tpm: ensure that the output of PCR read contains the correct digest size
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v9 00/17] Removed nested TPM operations
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v9 16/17] tpm: take TPM chip power gating out of tpm_transmit()
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v9 15/17] tpm: introduce tpm_chip_start() and tpm_chip_stop()
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v4 2/2] tpm: add support for partial reads
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [BUG] Nuvoton NCPT650 TPM 2.0 mode not working
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
RE: [PATCH v9 16/17] tpm: take TPM chip power gating out of tpm_transmit()
From
: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
Re: [PATCH v8 08/17] tpm: call tpm2_flush_space() on error in tpm_try_transmit()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v9 16/17] tpm: take TPM chip power gating out of tpm_transmit()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v9 14/17] tpm: remove TPM_TRANSMIT_UNLOCKED flag
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v5 7/7] tpm: pass an array of tpm_bank_list structures to tpm_pcr_extend()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v5 7/7] tpm: pass an array of tpm_bank_list structures to tpm_pcr_extend()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v5 6/7] tpm: ensure that the output of PCR read contains the correct digest size
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v5 7/7] tpm: pass an array of tpm_bank_list structures to tpm_pcr_extend()
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v4 2/2] tpm: add support for partial reads
From
: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
Re: [PATCH v8 08/17] tpm: call tpm2_flush_space() on error in tpm_try_transmit()
From
: Sasha Levin <sashal@xxxxxxxxxx>
RE: [PATCH v9 16/17] tpm: take TPM chip power gating out of tpm_transmit()
From
: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
Re: [PATCH v9 14/17] tpm: remove TPM_TRANSMIT_UNLOCKED flag
From
: Jason Gunthorpe <jgg@xxxxxxxx>
Re: [BUG] Nuvoton NCPT650 TPM 2.0 mode not working
From
: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
[PATCH v9 17/17] tpm: remove @flags from tpm_transmit()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH v9 16/17] tpm: take TPM chip power gating out of tpm_transmit()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH v9 15/17] tpm: introduce tpm_chip_start() and tpm_chip_stop()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH v9 14/17] tpm: remove TPM_TRANSMIT_UNLOCKED flag
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH v9 13/17] tpm: use tpm_try_get_ops() in tpm-sysfs.c.
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH v9 12/17] tpm: remove @space from tpm_transmit()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH v9 11/17] tpm: move TPM space code out of tpm_transmit()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH v9 10/17] tpm: move tpm_validate_commmand() to tpm2-space.c
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH v9 09/17] tpm: clean up tpm_try_transmit() error handling flow
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH v9 08/17] tpm: call tpm2_flush_space() on error in tpm_try_transmit()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH v9 07/17] tpm: encapsulate tpm_dev_transmit()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH v9 06/17] tpm: access command header through struct in tpm_try_transmit()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH v9 05/17] tpm: declare struct tpm_header
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH v9 04/17] tpm: print tpm2_commit_space() error inside tpm2_commit_space()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH v9 03/17] tpm: return 0 from pcrs_show() when tpm1_pcr_read() fails
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH v9 02/17] tpm: fix invalid return value in pubek_show()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH v9 01/17] tpm: use tpm_buf in tpm_transmit_cmd() as the IO parameter
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH v9 00/17] Removed nested TPM operations
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [BUG] Nuvoton NCPT650 TPM 2.0 mode not working
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v4 2/2] tpm: add support for partial reads
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH 1/2] tpm: rename data_pending to transmit_result
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v8 16/17] tpm: take TPM chip power gating out of tpm_transmit()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v8 08/17] tpm: call tpm2_flush_space() on error in tpm_try_transmit()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v5 6/7] tpm: ensure that the output of PCR read contains the correct digest size
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v5 7/7] tpm: pass an array of tpm_bank_list structures to tpm_pcr_extend()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v5 7/7] tpm: pass an array of tpm_bank_list structures to tpm_pcr_extend()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] Allow hwrng to initialize crng.
From
: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
Re: [BUG] Nuvoton NCPT650 TPM 2.0 mode not working
From
: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
[PATCH v8 11/14] ima: Implement support for module-style appended signatures
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v8 14/14] ima: Store the measurement again when appraising a modsig
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v8 13/14] ima: Write modsig to the measurement list
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v8 12/14] ima: Add new "d-sig" template field
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v8 10/14] ima: Add modsig appraise_type option for module-style appended signatures
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v8 09/14] ima: Export func_tokens
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v8 08/14] ima: Introduce is_signed()
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v8 07/14] integrity: Select CONFIG_KEYS instead of depending on it
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v8 06/14] integrity: Introduce asymmetric_sig_has_known_key()
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v8 05/14] integrity: Introduce integrity_keyring_from_id()
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v8 04/14] integrity: Introduce struct evm_xattr
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v8 03/14] PKCS#7: Introduce pkcs7_get_digest()
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v8 02/14] PKCS#7: Refactor verify_pkcs7_signature() and add pkcs7_get_message_sig()
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v8 01/14] MODSIGN: Export module signature definitions
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v8 00/14] Appended signatures support for IMA appraisal
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v4 2/2] tpm: add support for partial reads
From
: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
[PATCH 1/2] tpm: rename data_pending to transmit_result
From
: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
Re: [PATCH v8 11/17] tpm: move TPM space code out of tpm_transmit()
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v8 17/17] tpm: remove @flags from tpm_transmit()
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v8 16/17] tpm: take TPM chip power gating out of tpm_transmit()
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v8 15/17] tpm: introduce tpm_chip_start() and tpm_chip_stop()
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v8 08/17] tpm: call tpm2_flush_space() on error in tpm_try_transmit()
From
: Sasha Levin <sashal@xxxxxxxxxx>
Re: [PATCH v5 6/7] tpm: ensure that the output of PCR read contains the correct digest size
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v5 7/7] tpm: pass an array of tpm_bank_list structures to tpm_pcr_extend()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v5 7/7] tpm: pass an array of tpm_bank_list structures to tpm_pcr_extend()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v5 6/7] tpm: ensure that the output of PCR read contains the correct digest size
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v5 4/7] tpm: modify tpm_pcr_read() definition to pass a TPM hash algorithm
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v5 2/7] tpm: remove definition of TPM2_ACTIVE_PCR_BANKS
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v5 1/7] tpm: dynamically allocate the allocated_banks array
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH v8 17/17] tpm: remove @flags from tpm_transmit()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH v8 07/17] tpm: encapsulate tpm_dev_transmit()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH v8 06/17] tpm: access command header through struct in tpm_try_transmit()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH v8 16/17] tpm: take TPM chip power gating out of tpm_transmit()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH v8 15/17] tpm: introduce tpm_chip_start() and tpm_chip_stop()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH v8 14/17] tpm: remove TPM_TRANSMIT_UNLOCKED flag
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH v8 13/17] tpm: use tpm_try_get_ops() in tpm-sysfs.c.
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH v8 12/17] tpm: remove @space from tpm_transmit()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH v8 11/17] tpm: move TPM space code out of tpm_transmit()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH v8 10/17] tpm: move tpm_validate_commmand() to tpm2-space.c
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH v8 09/17] tpm: clean up tpm_try_transmit() error handling flow
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH v8 08/17] tpm: call tpm2_flush_space() on error in tpm_try_transmit()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH v8 05/17] tpm: declare struct tpm_header
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH v8 04/17] tpm: print tpm2_commit_space() error inside tpm2_commit_space()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH v8 03/17] tpm: return 0 from pcrs_show() when tpm1_pcr_read() fails
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH v8 02/17] tpm: fix invalid return value in pubek_show()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH v8 01/17] tpm: use tpm_buf in tpm_transmit_cmd() as the IO parameter
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH v8 00/17] Removed nested TPM operations
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v7 15/17] tpm: introduce tpm_chip_start() and tpm_chip_stop()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
TPM2 smoke tests
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v4 0/3] crypto: streebog - add Streebog hash function
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3] tpm: add support for partial reads
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v3] tpm: add support for partial reads
From
: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
Re: [PATCH v3] tpm: add support for partial reads
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v3] tpm: add support for partial reads
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH v3] tpm: add support for partial reads
From
: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
Re: [PATCH v2] tpm: add support for partial reads
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v7 15/17] tpm: introduce tpm_chip_start() and tpm_chip_stop()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v2] tpm: add support for partial reads
From
: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
Re: [PATCH v2] tpm: add support for partial reads
From
: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
Re: [BUG] Nuvoton NCPT650 TPM 2.0 mode not working
From
: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]