Linux Integrity
[Prev Page][Next Page]
- Re: LPC 2018
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] tpm: tpm_try_transmit() refactor error flow.
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- Re: [PATCH 2/3] IMA: Make use of filesystem-provided hashes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: LPC 2018
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
- From: David Gstir <david@xxxxxxxxxxxxx>
- RE: [PATCH] KEYS: trusted: fix -Wvarags warning
- From: David Laight <David.Laight@xxxxxxxxxx>
- RE: [PATCH] tpm: tpm_try_transmit() ignore value of go_to_idle()
- From: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
- Re: [PATCH] tpm: tpm_try_transmit() ignore value of go_to_idle()
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: LPC 2018
- From: James Morris <jmorris@xxxxxxxxx>
- Re: LPC 2018
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: fix -Wvarags warning
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: LPC 2018
- From: James Morris <jmorris@xxxxxxxxx>
- Re: LPC 2018
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 2/3] IMA: Make use of filesystem-provided hashes
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [GIT PULL] linux-integrity patches for Linux 4.20
- From: James Morris <jmorris@xxxxxxxxx>
- possible deadlock in process_measurement
- From: syzbot <syzbot+5ab61747675a87ea359d@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: LPC 2018
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: fix unused-value issues in tpm_try_transmit
- From: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
- [PATCH] tpm: tpm_try_transmit() ignore value of go_to_idle()
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- Re: [PATCH] tpm: fix unused-value issues in tpm_try_transmit
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- RE: [PATCH] KEYS: trusted: fix -Wvarags warning
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH 2/3] IMA: Make use of filesystem-provided hashes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: fix -Wvarags warning
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH 2/3] IMA: Make use of filesystem-provided hashes
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: fix -Wvarags warning
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: [PATCH] KEYS: trusted: fix -Wvarags warning
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: fix -Wvarags warning
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: [PATCH] KEYS: trusted: fix -Wvarags warning
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: fix -Wvarags warning
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: fix -Wvarags warning
- From: Nathan Chancellor <natechancellor@xxxxxxxxx>
- Re: [PATCH] KEYS: trusted: fix -Wvarags warning
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: fix -Wvarags warning
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: fix -Wvarags warning
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: fix -Wvarags warning
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: [PATCH] KEYS: trusted: fix -Wvarags warning
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: fix -Wvarags warning
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: [PATCH] KEYS: trusted: fix -Wvarags warning
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: fix -Wvarags warning
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: fix -Wvarags warning
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: [PATCH] KEYS: trusted: fix -Wvarags warning
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: fix -Wvarags warning
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: [PATCH v5 06/21] tpm: move tpm1_pcr_extend to tpm1-cmd.c
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: fix -Wvarags warning
- From: Nathan Chancellor <natechancellor@xxxxxxxxx>
- Re: [PATCH 2/3] IMA: Make use of filesystem-provided hashes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: LPC 2018
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] KEYS: trusted: fix -Wvarags warning
- From: ndesaulniers@xxxxxxxxxx
- Re: [PATCH 2/3] IMA: Make use of filesystem-provided hashes
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v5 05/21] tpm: factor out tpm_get_timeouts()
- From: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
- Re: LPC 2018
- From: Monty Wiseman <montywiseman32@xxxxxxxxx>
- [GIT PULL] linux-integrity patches for Linux 4.20
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] VFS: Add a call to obtain a file's hash
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 1/3] VFS: Add a call to obtain a file's hash
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] VFS: Add a call to obtain a file's hash
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 1/3] VFS: Add a call to obtain a file's hash
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v5 05/21] tpm: factor out tpm_get_timeouts()
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [PATCH v5 03/21] tpm: factor out tpm 1.x duration calculation to tpm1-cmd.c
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: undefined behavior (-Wvarargs) in security/keys/trusted.c#TSS_authhmac()
- From: James Bottomley <jejb@xxxxxxxxxxxxxxxxxx>
- Re: undefined behavior (-Wvarargs) in security/keys/trusted.c#TSS_authhmac()
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: LPC 2018
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 2/3] IMA: Make use of filesystem-provided hashes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] VFS: Add a call to obtain a file's hash
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Question about the TPM driver
- From: Ken Goldman <kgold@xxxxxxxxxxxxxxxxxx>
- RE: [PATCH] tpm: fix unused-value issues in tpm_try_transmit
- From: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
- Re: [PATCH] tpm: fix unused-value issues in tpm_try_transmit
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH -next] KEYS: trusted: remove set but not used variable ''
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- Re: [PATCH v2] Open a new file instance if no read permissions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Allow FUSE filesystems to provide out-of-band hashes to IMA
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] tpm: fix unused-value issues in tpm_try_transmit
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH] tpm: fix unused-value issues in tpm_try_transmit
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: Allow FUSE filesystems to provide out-of-band hashes to IMA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: LPC 2018
- From: Monty Wiseman <montywiseman32@xxxxxxxxx>
- undefined behavior (-Wvarargs) in security/keys/trusted.c#TSS_authhmac()
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: Allow FUSE filesystems to provide out-of-band hashes to IMA
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: Allow FUSE filesystems to provide out-of-band hashes to IMA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Allow FUSE filesystems to provide out-of-band hashes to IMA
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: Allow FUSE filesystems to provide out-of-band hashes to IMA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v6 5/5] x86/ima: define arch_get_ima_policy() for x86
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 4/5] ima: add support for arch specific policies
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 3/5] ima: refactor ima_init_policy()
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 2/5] ima: prevent kexec_load syscall based on runtime secureboot flag
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 1/5] x86/ima: define arch_ima_get_secureboot
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 0/6] Add support for architecture specific IMA policies
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- Re: Allow FUSE filesystems to provide out-of-band hashes to IMA
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- LPC 2018
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- [PATCH v2] Open a new file instance if no read permissions
- From: Goldwyn Rodrigues <rgoldwyn@xxxxxxx>
- Re: Allow FUSE filesystems to provide out-of-band hashes to IMA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] Open a new file instance if no read permissions on files
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Allow FUSE filesystems to provide out-of-band hashes to IMA
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] Open a new file instance if no read permissions on files
- From: Goldwyn Rodrigues <rgoldwyn@xxxxxxx>
- Re: [PATCH] Open a new file instance if no read permissions on files
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: PROBLEM: IMA xattrs not written on overlayfs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] Open a new file instance if no read permissions on files
- From: Goldwyn Rodrigues <rgoldwyn@xxxxxxx>
- Re: ima_template and ima_template_format - supported and legal values
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Allow FUSE filesystems to provide out-of-band hashes to IMA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 0/6] Add support for architecture specific IMA policies
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: PROBLEM: IMA xattrs not written on overlayfs
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH] Open a new file instance if no read permissions on files
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- ima_template and ima_template_format - supported and legal values
- From: Ken Goldman <kgold@xxxxxxxxxxxxxxxxxx>
- [PATCH] Open a new file instance if no read permissions on files
- From: Goldwyn Rodrigues <rgoldwyn@xxxxxxx>
- Re: Allow FUSE filesystems to provide out-of-band hashes to IMA
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: Allow FUSE filesystems to provide out-of-band hashes to IMA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 5/6] ima: add support for external setting of ima_appraise
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 5/5] x86/ima: define arch_get_ima_policy() for x86
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 4/5] ima: add support for arch specific policies
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 3/5] ima: refactor ima_init_policy()
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 2/5] ima: prevent kexec_load syscall based on runtime secureboot flag
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 1/5] x86/ima: define arch_ima_get_secureboot
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 0/6] Add support for architecture specific IMA policies
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- Re: PROBLEM: IMA xattrs not written on overlayfs
- From: Goldwyn Rodrigues <rgoldwyn@xxxxxxx>
- Re: Allow FUSE filesystems to provide out-of-band hashes to IMA
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v2] ima: fix showing large 'violations' or 'runtime_measurements_count'
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2] ima: fix showing large 'violations' or 'runtime_measurements_count'
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 12/21] tpm: move pcr extend code to tpm2-cmd.c
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Allow FUSE filesystems to provide out-of-band hashes to IMA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: PROBLEM: IMA xattrs not written on overlayfs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] Allow hwrng to initialize crng.
- From: Louis Collard <louiscollard@xxxxxxxxxxxx>
- Re: [PATCH v2] ima: fix showing large 'violations' or 'runtime_measurements_count'
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2] ima: fix showing large 'violations' or 'runtime_measurements_count'
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 3/3] FUSE: Allow filesystems to provide gethash methods
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH 2/3] IMA: Make use of filesystem-provided hashes
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH 1/3] VFS: Add a call to obtain a file's hash
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Allow FUSE filesystems to provide out-of-band hashes to IMA
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: PROBLEM: IMA xattrs not written on overlayfs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 12/21] tpm: move pcr extend code to tpm2-cmd.c
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- RE: [PATCH v5 12/21] tpm: move pcr extend code to tpm2-cmd.c
- From: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
- Re: [PATCH v5 12/21] tpm: move pcr extend code to tpm2-cmd.c
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- RE: [PATCH v5 12/21] tpm: move pcr extend code to tpm2-cmd.c
- From: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
- Re: [PATCH v5 12/21] tpm: move pcr extend code to tpm2-cmd.c
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 12/21] tpm: move pcr extend code to tpm2-cmd.c
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v2] security/integrity: remove unnecessary 'init_keyring' variable
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] security/integrity: remove unnecessary 'init_keyring' variable
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2] ima: fix showing large 'violations' or 'runtime_measurements_count'
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: PROBLEM: IMA xattrs not written on overlayfs
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- RE: [PATCH v5 12/21] tpm: move pcr extend code to tpm2-cmd.c
- From: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
- Re: PROBLEM: IMA xattrs not written on overlayfs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 06/21] tpm: move tpm1_pcr_extend to tpm1-cmd.c
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 12/21] tpm: move pcr extend code to tpm2-cmd.c
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 06/21] tpm: move tpm1_pcr_extend to tpm1-cmd.c
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- RE: [PATCH v5 12/21] tpm: move pcr extend code to tpm2-cmd.c
- From: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
- Re: [PATCH v5 21/21] tpm: use u32 instead of int for PCR index
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 13/21] tpm: add tpm_auto_startup() into tpm-interface.c
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 12/21] tpm: move pcr extend code to tpm2-cmd.c
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 11/21] tpm: factor out tpm_startup function
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 10/21] tpm: factor out tpm 1.x pm suspend flow into tpm1-cmd.c
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 00/21] tpm: separate tpm 1.x and tpm 2.x commands
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 08/21] tpm: factor out tpm1_get_random into tpm1-cmd.c
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 06/21] tpm: move tpm1_pcr_extend to tpm1-cmd.c
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 01/21] tpm2: add new tpm2 commands according to TCG 1.36
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 01/21] tpm2: add new tpm2 commands according to TCG 1.36
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: PROBLEM: IMA xattrs not written on overlayfs
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- INFO: task hung in process_measurement
- From: syzbot <syzbot+cdc562bc26a2b2b0a94f@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v5 03/21] tpm: factor out tpm 1.x duration calculation to tpm1-cmd.c
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v5 06/21] tpm: move tpm1_pcr_extend to tpm1-cmd.c
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v5 04/21] tpm: add tpm_calc_ordinal_duration() wrapper
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v5 07/21] tpm: move tpm_getcap to tpm1-cmd.c
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v5 08/21] tpm: factor out tpm1_get_random into tpm1-cmd.c
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v5 09/21] tpm: move tpm 1.x selftest code from tpm-interface.c tpm1-cmd.c
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v5 10/21] tpm: factor out tpm 1.x pm suspend flow into tpm1-cmd.c
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v5 05/21] tpm: factor out tpm_get_timeouts()
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v5 11/21] tpm: factor out tpm_startup function
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v5 12/21] tpm: move pcr extend code to tpm2-cmd.c
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v5 14/21] tpm: tpm-interface.c drop unused macros
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v5 13/21] tpm: add tpm_auto_startup() into tpm-interface.c
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v5 15/21] tpm: tpm-space.c remove unneeded semicolon
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v5 16/21] tpm: tpm1: rewrite tpm1_get_random() using tpm_buf structure
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v5 17/21] tpm1: implement tpm1_pcr_read_dev() using tpm_buf structure
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v5 21/21] tpm: use u32 instead of int for PCR index
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v5 20/21] tpm1: reimplement tpm1_continue_selftest() using tpm_buf
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v5 19/21] tpm1: reimplement SAVESTATE using tpm_buf
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v5 18/21] tmp1: rename tpm1_pcr_read_dev to tpm1_pcr_read().
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v5 00/21] tpm: separate tpm 1.x and tpm 2.x commands
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v5 01/21] tpm2: add new tpm2 commands according to TCG 1.36
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v5 02/21] tpm: sort objects in the Makefile
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- Re: PROBLEM: IMA xattrs not written on overlayfs
- From: Fabian Vogt <fvogt@xxxxxxx>
- Re: PROBLEM: IMA xattrs not written on overlayfs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: PROBLEM: IMA xattrs not written on overlayfs
- From: Ignaz Forster <iforster@xxxxxxx>
- Re: PROBLEM: IMA xattrs not written on overlayfs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 3/6] ima: refactor ima_init_policy()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2, RESEND 0/3] tpm: retrieve digest size of unknown algorithms from TPM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2, RESEND 0/3] tpm: retrieve digest size of unknown algorithms from TPM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 6/6] x86/ima: define arch_get_ima_policy() for x86
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 4/6] ima: add support for arch specific policies
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 5/6] ima: add support for external setting of ima_appraise
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 3/6] ima: refactor ima_init_policy()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/6] ima: prevent kexec_load syscall based on runtime secureboot flag
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/6] x86/ima: define arch_ima_get_secureboot
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2, RESEND 0/3] tpm: retrieve digest size of unknown algorithms from TPM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v2, RESEND 0/3] tpm: retrieve digest size of unknown algorithms from TPM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2, RESEND 0/3] tpm: retrieve digest size of unknown algorithms from TPM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: EXTERNAL: [PATCH v2 2/3] tpm: modify tpm_pcr_read() definition to pass TPM hash algorithms
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: EXTERNAL: [PATCH v2 2/3] tpm: modify tpm_pcr_read() definition to pass TPM hash algorithms
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4 1/6] x86/ima: define arch_ima_get_secureboot
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 2/6] ima: prevent kexec_load syscall based on runtime secureboot flag
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 5/6] ima: add support for external setting of ima_appraise
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 6/6] x86/ima: define arch_get_ima_policy() for x86
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 4/6] ima: add support for arch specific policies
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 3/6] ima: refactor ima_init_policy()
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 0/6] Add support for architecture specific IMA policies
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Allow hwrng to initialize crng.
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 03/21] tpm: factor out tpm 1.x duration calculation to tpm1-cmd.c
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 01/21] tpm2: add new tpm2 commands according to TCG 1.36
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH] Allow hwrng to initialize crng.
- From: Louis Collard <louiscollard@xxxxxxxxxxxx>
- Re: [PATCH v3 06/20] tpm: move tpm1_pcr_extend to tpm1-cmd.c
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 21/21] tpm: use u32 instead of int for PCR index
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 18/21] tmp1: rename tpm1_pcr_read_dev to tpm1_pcr_read().
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 14/21] tpm: tpm-interface.c drop unused macros
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 10/21] tpm: factor out tpm 1.x pm suspend flow into tpm1-cmd.c
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 20/21] tpm1: reimplement tpm1_continue_selftest() using tpm_buf
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 09/21] tpm: move tpm 1.x selftest code from tpm-interface.c tpm1-cmd.c
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 20/21] tpm1: reimplement tpm1_continue_selftest() using tpm_buf
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 01/21] tpm2: add new tpm2 commands according to TCG 1.36
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 02/21] tpm: sort objects in the Makefile
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 05/21] tpm: factor out tpm_get_timeouts()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 03/21] tpm: factor out tpm 1.x duration calculation to tpm1-cmd.c
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2, RESEND 3/3] tpm: retrieve digest size of unknown algorithms with PCR read
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2, RESEND 2/3] tpm: modify tpm_pcr_read() definition to pass TPM hash algorithms
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 20/21] tpm1: reimplement tpm1_continue_selftest() using tpm_buf
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 11/21] tpm: factor out tpm_startup function
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 11/21] tpm: factor out tpm_startup function
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/6] ima: refactor ima_init_policy()
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2, RESEND 2/3] tpm: modify tpm_pcr_read() definition to pass TPM hash algorithms
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] security/integrity: remove unnecessary 'init_keyring' variable
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] security/integrity: remove unnecessary 'init_keyring' variable
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] security/integrity: remove unnecessary 'init_keyring' variable
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: fix showing large 'violations' or 'runtime_measurements_count'
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] security/integrity: remove unnecessary 'init_keyring' variable
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] security/integrity: remove unnecessary 'init_keyring' variable
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] security/integrity: remove unnecessary 'init_keyring' variable
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] security/integrity: remove unnecessary 'init_keyring' variable
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4 09/21] tpm: move tpm 1.x selftest code from tpm-interface.c tpm1-cmd.c
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v4 05/21] tpm: factor out tpm_get_timeouts()
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v4 07/21] tpm: move tpm_getcap to tpm1-cmd.c
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v4 08/21] tpm: factor out tpm1_get_random into tpm1-cmd.c
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v4 21/21] tpm: use u32 instead of int for PCR index
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v4 20/21] tpm1: reimplement tpm1_continue_selftest() using tpm_buf
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v4 19/21] tpm1: reimplement SAVESTATE using tpm_buf
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v4 18/21] tmp1: rename tpm1_pcr_read_dev to tpm1_pcr_read().
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v4 17/21] tpm1: implement tpm1_pcr_read_dev() using tpm_buf structure
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v4 16/21] tpm: tpm1: rewrite tpm1_get_random() using tpm_buf structure
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v4 14/21] tpm: tpm-interface.c drop unused macros
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v4 13/21] tpm: add tpm_auto_startup() into tpm-interface.c
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v4 12/21] tpm: move pcr extend code to tpm2-cmd.c
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v4 10/21] tpm: factor out tpm 1.x pm suspend flow into tpm1-cmd.c
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v4 11/21] tpm: factor out tpm_startup function
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v4 15/21] tpm: tpm-space.c remove unneeded semicolon
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v4 04/21] tpm: add tpm_calc_ordinal_duration() wrapper
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v4 06/21] tpm: move tpm1_pcr_extend to tpm1-cmd.c
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v4 03/21] tpm: factor out tpm 1.x duration calculation to tpm1-cmd.c
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v4 02/21] tpm: sort objects in the Makefile
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v4 01/21] tpm2: add new tpm2 commands according to TCG 1.36
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v4 00/21] tpm: separate tpm 1.x and tpm 2.x commands
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- Re: [PATCH v2, RESEND 2/3] tpm: modify tpm_pcr_read() definition to pass TPM hash algorithms
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2, RESEND 2/3] tpm: modify tpm_pcr_read() definition to pass TPM hash algorithms
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v3 3/6] ima: refactor ima_init_policy()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH v3 20/20] tpm1: reimplement tpm1_continue_selftest() using tpm_buf
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 19/20] tpm1: reimplement SAVESTATE using tpm_buf
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 18/20] tpm: use u32 instead of int for pcr index
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 17/20] tpm1: implement tpm1_pcr_read_dev() using tpm_buf structure
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 16/20] tpm: tpm1: rewrite tpm1_get_random() using tpm_buf structure
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 15/20] tpm: tpm-space.c remove unneeded semicolon
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 14/20] tpm: tpm-interface.c drop unused macros
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 13/20] tpm: add tpm_auto_startup into tpm-interface
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 11/20] tpm: factor out tpm_startup function
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 09/20] tpm: move tpm1 selftest code from tpm-interface tpm1-cmd.c
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 10/20] tpm: factor out tpm1 pm suspend flow into tpm1-cmd.c
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 12/20] tpm: move pcr extend code to tpm2-cmd.c
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 08/20] tpm: factor out tpm1_get_random into tpm1-cmd.c
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 07/20] tpm: move tpm_getcap to tpm1-cmd.c
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 06/20] tpm: move tpm1_pcr_extend to tpm1-cmd.c
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 05/20] tpm: factor out tpm_get_timeouts
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 04/20] tpm: add tpm_calc_ordinal_duration wrapper
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 03/20] tpm: factor out tpm 1.x duration calculation to tpm1-cmd.c
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 02/20] tpm: sort objects in the Makefile
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 01/20] tpm2: add new tpm2 commands according to TCG 1.36
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 03/20] tpm: factor out tpm 1.x duration calculation to tpm1-cmd.c
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 02/20] tpm: sort objects in the Makefile
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v3 0/6] Add support for architecture specific IMA policies
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 1/6] x86/ima: define arch_ima_get_secureboot
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 2/6] ima: prevent kexec_load syscall based on runtime secureboot flag
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 6/6] x86/ima: define arch_get_ima_policy() for x86
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 5/6] ima: add support for external setting of ima_appraise
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 4/6] ima: add support for arch specific policies
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 3/6] ima: refactor ima_init_policy()
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] tpm: Restore functionality to xen vtpm driver.
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] tpm: retrieve digest size of unknown algorithms with PCR read
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v3 08/20] tpm: factor out tpm1_get_random into tpm1-cmd.c
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v3 06/20] tpm: move tpm1_pcr_extend to tpm1-cmd.c
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v3 02/20] tpm: sort objects in the Makefile
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v3 12/20] tpm: move pcr extend code to tpm2-cmd.c
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v3 13/20] tpm: add tpm_auto_startup into tpm-interface
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v3 11/20] tpm: factor out tpm_startup function
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v3 09/20] tpm: move tpm1 selftest code from tpm-interface tpm1-cmd.c
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v3 07/20] tpm: move tpm_getcap to tpm1-cmd.c
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v3 14/20] tpm: tpm-interface.c drop unused macros
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v3 20/20] tpm1: reimplement tpm1_continue_selftest() using tpm_buf
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v3 19/20] tpm1: reimplement SAVESTATE using tpm_buf
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v3 18/20] tpm: use u32 instead of int for pcr index
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v3 17/20] tpm1: implement tpm1_pcr_read_dev() using tpm_buf structure
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v3 16/20] tpm: tpm1: rewrite tpm1_get_random() using tpm_buf structure
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v3 15/20] tpm: tpm-space.c remove unneeded semicolon
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v3 10/20] tpm: factor out tpm1 pm suspend flow into tpm1-cmd.c
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v3 05/20] tpm: factor out tpm_get_timeouts
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v3 03/20] tpm: factor out tpm 1.x duration calculation to tpm1-cmd.c
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v3 04/20] tpm: add tpm_calc_ordinal_duration wrapper
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v3 01/20] tpm2: add new tpm2 commands according to TCG 1.36
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- [PATCH v3 00/20] tpm: separate tpm 1.x and tpm 2.x commands
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- Re: [PATCH v2 3/3] tpm: retrieve digest size of unknown algorithms with PCR read
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [Xen-devel] [PATCH v2] tpm: Restore functionality to xen vtpm driver.
- From: Dag Nygren <dag@xxxxxxxxxx>
- [PATCH v3] tpm: Restore functionality to xen vtpm driver.
- From: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
- Re: [PATCH v2] tpm: Restore functionality to xen vtpm driver.
- From: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
- Re: [PATCH v6 0/2] tpm: add support for nonblocking operation
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Question about the TPM driver
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Question about the TPM driver
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Restore functionality to xen vtpm driver.
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] tpm: retrieve digest size of unknown algorithms with PCR read
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Question about the TPM driver
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Restore functionality to xen vtpm driver.
- From: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
- Re: Question about the TPM driver
- From: Martin Galvan <omgalvan.86@xxxxxxxxx>
- Re: [PATCH v2 3/3] tpm: retrieve digest size of unknown algorithms with PCR read
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2, RESEND 3/3] tpm: retrieve digest size of unknown algorithms with PCR read
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2, RESEND 1/3] tpm: rename and export tpm2_digest and tpm2_algorithms
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2, RESEND 2/3] tpm: modify tpm_pcr_read() definition to pass TPM hash algorithms
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2, RESEND 0/3] tpm: retrieve digest size of unknown algorithms from TPM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: EXTERNAL: [PATCH v2 2/3] tpm: modify tpm_pcr_read() definition to pass TPM hash algorithms
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 0/2] tpm: add support for nonblocking operation
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Restore functionality to xen vtpm driver.
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH RESEND] tpm: Restore functionality to xen vtpm driver.
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Question about the TPM driver
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 02/17] compat_ioctl: move drivers to generic_compat_ioctl_ptrarg
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 0/2] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tstruk@xxxxxxxxx>
- RE: EXTERNAL: [PATCH v2 2/3] tpm: modify tpm_pcr_read() definition to pass TPM hash algorithms
- From: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
- Re: [PATCH v2 3/3] tpm: retrieve digest size of unknown algorithms with PCR read
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: EXTERNAL: [PATCH v2 2/3] tpm: modify tpm_pcr_read() definition to pass TPM hash algorithms
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] tpm: rename and export tpm2_digest and tpm2_algorithms
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 0/2] tpm: add support for nonblocking operation
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 01/10] fs-verity: add setup code, UAPI, and Kconfig
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [RFC PATCH 01/10] fs-verity: add setup code, UAPI, and Kconfig
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 6/6] x86/ima: define arch_get_ima_policy() for x86
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [RFC PATCH 01/10] fs-verity: add setup code, UAPI, and Kconfig
- From: Colin Walters <walters@xxxxxxxxxx>
- [PATCH v2 2/6] ima: prevent kexec_load syscall based on runtime secureboot flag
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 3/6] ima: refactor ima_init_policy()
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 4/6] ima: add support for arch specific policies
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 6/6] x86/ima: define arch_get_ima_policy() for x86
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 5/6] ima: add support for external setting of ima_appraise
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 1/6] ima: define arch_ima_get_secureboot
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/6] Add support for architecture specific IMA policies
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v2] tpm: Restore functionality to xen vtpm driver.
- From: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
- Re: [PATCH RESEND] tpm: Restore functionality to xen vtpm driver.
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH RESEND] tpm: Restore functionality to xen vtpm driver.
- From: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
- Re: Question about the TPM driver
- From: Martin Galvan <omgalvan.86@xxxxxxxxx>
- Re: Question about the TPM driver
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: Question about the TPM driver
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: Question about the TPM driver
- From: Martin Galvan <omgalvan.86@xxxxxxxxx>
- Re: Question about the TPM driver
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Question about the TPM driver
- From: Martin Galvan <omgalvan.86@xxxxxxxxx>
- Re: [PATCH v2 02/17] compat_ioctl: move drivers to generic_compat_ioctl_ptrarg
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 02/17] compat_ioctl: move drivers to generic_compat_ioctl_ptrarg
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v2 02/17] compat_ioctl: move drivers to generic_compat_ioctl_ptrarg
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH v2 02/17] compat_ioctl: move drivers to generic_compat_ioctl_ptrarg
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v6 2/2] tpm: add support for nonblocking operation
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 1/2] tpm: add ptr to the tpm_space struct to file_priv
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] tpm: retrieve digest size of unknown algorithms from TPM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/2] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v6 2/2] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v6 1/2] tpm: add ptr to the tpm_space struct to file_priv
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v6 0/2] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: PROBLEM: IMA xattrs not written on overlayfs
- From: Ignaz Forster <iforster@xxxxxxx>
- [bug report] tpm: Keep CLKRUN enabled throughout the duration of transmit_cmd()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [PATCH] ima: fix showing large 'violations' or 'runtime_measurements_count'
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] security/integrity: remove unnecessary 'init_keyring' variable
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] security/integrity: constify some read-only data
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: PROBLEM: IMA xattrs not written on overlayfs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- PROBLEM: IMA xattrs not written on overlayfs
- From: Ignaz Forster <iforster@xxxxxxx>
- Re: tpm2_dump_capability not working on latest Ubuntu
- From: Martin Galvan <omgalvan.86@xxxxxxxxx>
- Re: tpm2_dump_capability not working on latest Ubuntu
- From: Peter Huewe <peterhuewe@xxxxxx>
- tpm2_dump_capability not working on latest Ubuntu
- From: Martin Galvan <omgalvan.86@xxxxxxxxx>
- Re: caps file showing wrong TCG version?
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: caps file showing wrong TCG version?
- From: Peter Huewe <peterhuewe@xxxxxx>
- Re: caps file showing wrong TCG version?
- From: Martin Galvan <omgalvan.86@xxxxxxxxx>
- Re: caps file showing wrong TCG version?
- From: Martin Galvan <omgalvan.86@xxxxxxxxx>
- Re: caps file showing wrong TCG version?
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: caps file showing wrong TCG version?
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: EXTERNAL: [PATCH v2 2/3] tpm: modify tpm_pcr_read() definition to pass TPM hash algorithms
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: EXTERNAL: [PATCH v2 2/3] tpm: modify tpm_pcr_read() definition to pass TPM hash algorithms
- From: Jeremy Boone <Jeremy.Boone@nccgroup.trust>
- Re: [PATCH] tpm: fix response size validation in tpm_get_random()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 3/3] tpm: retrieve digest size of unknown algorithms with PCR read
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 2/3] tpm: modify tpm_pcr_read() definition to pass TPM hash algorithms
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 1/3] tpm: rename and export tpm2_digest and tpm2_algorithms
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 0/3] tpm: retrieve digest size of unknown algorithms from TPM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH] tpm: Make SECURITYFS a weak dependency
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: suppress transmit cmd error logs when TPM 1.2 is disabled/deactivated
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: fix response size validation in tpm_get_random()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: caps file showing wrong TCG version?
- From: Martin Galvan <omgalvan.86@xxxxxxxxx>
- Re: caps file showing wrong TCG version?
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: caps file showing wrong TCG version?
- From: Martin Galvan <omgalvan.86@xxxxxxxxx>
- Re: caps file showing wrong TCG version?
- From: Martin Galvan <omgalvan.86@xxxxxxxxx>
- caps file showing wrong TCG version?
- From: Martin Galvan <omgalvan.86@xxxxxxxxx>
- [PATCH] tpm: Make SECURITYFS a weak dependency
- From: Peter Huewe <peterhuewe@xxxxxx>
- [PATCH] tpm: fix response size validation in tpm_get_random()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 02/10] fs-verity: add data verification hooks for ->readpages()
- From: Olof Johansson <olof@xxxxxxxxx>
- Re: [RFC PATCH 00/10] fs-verity: filesystem-level integrity protection
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH 00/10] fs-verity: filesystem-level integrity protection
- From: Jan Lübbe <jlu@xxxxxxxxxxxxxx>
- Re: [PATCH v5 2/2] tpm: add support for nonblocking operation
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/2] tpm: add support for nonblocking operation
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/2] tpm: add support for nonblocking operation
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH] tpm: suppress transmit cmd error logs when TPM 1.2 is disabled/deactivated
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [f2fs-dev] [RFC PATCH 10/10] f2fs: fs-verity support
- From: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
- Re: [f2fs-dev] [RFC PATCH 10/10] f2fs: fs-verity support
- From: Chao Yu <yuchao0@xxxxxxxxxx>
- Re: [f2fs-dev] [RFC PATCH 10/10] f2fs: fs-verity support
- From: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
- Re: [f2fs-dev] [RFC PATCH 10/10] f2fs: fs-verity support
- From: Chao Yu <yuchao0@xxxxxxxxxx>
- [RFC PATCH 0/2] Support TLV formatted IMA measurement list
- From: "Safford, David (GE Global Research, US)" <david.safford@xxxxxx>
- [RFC PATCH 1/2] refactor IMA template code into separate files.
- From: "Safford, David (GE Global Research, US)" <david.safford@xxxxxx>
- [RFC PATCH 2/2] Add code for TLV formatted IMA measurement list
- From: "Safford, David (GE Global Research, US)" <david.safford@xxxxxx>
- Re: [f2fs-dev] [RFC PATCH 10/10] f2fs: fs-verity support
- From: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
- Re: [f2fs-dev] [RFC PATCH 10/10] f2fs: fs-verity support
- From: Chao Yu <chao@xxxxxxxxxx>
- Re: [PATCH 08/23] TPMLIB: Break TPM bits out of security/keys/trusted.c
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Re: [RFC PATCH 02/10] fs-verity: add data verification hooks for ->readpages()
- From: Gao Xiang <hsiangkao@xxxxxxx>
- Re: [f2fs-dev] [RFC PATCH 10/10] f2fs: fs-verity support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH 01/10] fs-verity: add setup code, UAPI, and Kconfig
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH 02/10] fs-verity: add data verification hooks for ->readpages()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH 01/10] fs-verity: add setup code, UAPI, and Kconfig
- From: Chuck Lever <chucklever@xxxxxxxxx>
- Re: [RFC PATCH 02/10] fs-verity: add data verification hooks for ->readpages()
- From: Chuck Lever <chucklever@xxxxxxxxx>
- Re: Re: [RFC PATCH 02/10] fs-verity: add data verification hooks for ->readpages()
- From: Gao Xiang <hsiangkao@xxxxxxx>
- Re: [RFC PATCH 02/10] fs-verity: add data verification hooks for ->readpages()
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [f2fs-dev] [RFC PATCH 02/10] fs-verity: add data verification hooks for ->readpages()
- From: Gao Xiang <gaoxiang25@xxxxxxxxxx>
- Re: [RFC PATCH 02/10] fs-verity: add data verification hooks for ->readpages()
- From: Gao Xiang <gaoxiang25@xxxxxxxxxx>
- Re: [f2fs-dev] [RFC PATCH 02/10] fs-verity: add data verification hooks for ->readpages()
- From: Gao Xiang <gaoxiang25@xxxxxxxxxx>
- Re: [RFC PATCH 02/10] fs-verity: add data verification hooks for ->readpages()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH 02/10] fs-verity: add data verification hooks for ->readpages()
- From: Gao Xiang <gaoxiang25@xxxxxxxxxx>
- Re: [f2fs-dev] [RFC PATCH 10/10] f2fs: fs-verity support
- From: Chao Yu <yuchao0@xxxxxxxxxx>
- Re: [f2fs-dev] [RFC PATCH 02/10] fs-verity: add data verification hooks for ->readpages()
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [RFC PATCH 01/10] fs-verity: add setup code, UAPI, and Kconfig
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH 02/10] fs-verity: add data verification hooks for ->readpages()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [f2fs-dev] [RFC PATCH 02/10] fs-verity: add data verification hooks for ->readpages()
- From: Gao Xiang <gaoxiang25@xxxxxxxxxx>
- Re: [f2fs-dev] [RFC PATCH 02/10] fs-verity: add data verification hooks for ->readpages()
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [f2fs-dev] [RFC PATCH 02/10] fs-verity: add data verification hooks for ->readpages()
- From: Gao Xiang <gaoxiang25@xxxxxxxxxx>
- Re: [RFC PATCH 01/10] fs-verity: add setup code, UAPI, and Kconfig
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [RFC PATCH 01/10] fs-verity: add setup code, UAPI, and Kconfig
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: [RFC PATCH 01/10] fs-verity: add setup code, UAPI, and Kconfig
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [RFC PATCH 00/10] fs-verity: filesystem-level integrity protection
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 01/10] fs-verity: add setup code, UAPI, and Kconfig
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 02/10] fs-verity: add data verification hooks for ->readpages()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 06/10] fs-verity: add CRC-32C support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 07/10] fs-verity: support builtin file signatures
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 05/10] fs-verity: add SHA-512 support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 09/10] ext4: add fs-verity read support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 10/10] f2fs: fs-verity support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 08/10] ext4: add basic fs-verity support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 04/10] fs-verity: implement FS_IOC_MEASURE_VERITY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 03/10] fs-verity: implement FS_IOC_ENABLE_VERITY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 01/23] TPM: Add new TPMs to the tail of the list to prevent inadvertent change of dev
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] tpm: factor out TPM 1.x duration calculation to tpm1-cmd.c
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 08/23] TPMLIB: Break TPM bits out of security/keys/trusted.c
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 08/23] TPMLIB: Break TPM bits out of security/keys/trusted.c
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 08/23] TPMLIB: Break TPM bits out of security/keys/trusted.c
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 05/23] TPM: Use struct tpm_chip rather than chip number as interface parameter
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 03/23] TPM: Provide a platform driver for the user emulator driver
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 02/23] TPM: Provide a facility for a userspace TPM emulator
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 01/23] TPM: Add new TPMs to the tail of the list to prevent inadvertent change of dev
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 01/23] TPM: Add new TPMs to the tail of the list to prevent inadvertent change of dev
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 01/23] TPM: Add new TPMs to the tail of the list to prevent inadvertent change of dev
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: tpm: Provide a TPM access library
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- nvs.c: Inappropriately maps TPM space on Dell Inspiron 11 3000
- From: Harlan Lieberman-Berg <harlan@xxxxxxx>
- Re: tpm: Provide a TPM access library
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: tpm: Provide a TPM access library
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Excluding UBI partition not working
- From: john HA <john.352618@xxxxxxxxx>
- Re: [PATCH 1/7] evmtest: Regression testing Integrity Subsystem
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- Re: [PATCH 04/23] TPM: Expose struct tpm_chip and related find_get and put functions
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 02/23] TPM: Provide a facility for a userspace TPM emulator
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH 04/23] TPM: Expose struct tpm_chip and related find_get and put functions
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH 01/23] TPM: Add new TPMs to the tail of the list to prevent inadvertent change of dev
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH 23/23] TPM: Add an asymmetric key subtype for handling TPM-based keys
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 22/23] TPMLIB: Provide call for TPM_FlushSpecific
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 21/23] TPMLIB: Implement call to TPM_LoadKey2
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 20/23] TPMLIB: Implement call to TPM_CreateWrapKey
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 19/23] TPMLIB: Add some debugging code
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 18/23] TPMLIB: Encapsulate XOR-based encryption with authkey derivative
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 17/23] TPMLIB: Provide a wrapper to load bytes out of the reply
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 16/23] TPMLIB: Put more comments into the HMAC generation functions
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 15/23] TPMLIB: Use __be32 rather than int32_t and use cpu_to_beX() and co.
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 14/23] TPMLIB: Make store_s() take a void* data argument, not unsigned char*
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 13/23] TPMLIB: Rename store8() and storebytes()
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 12/23] TPMLIB: Create tpm_{even, odd}_nonce structs to represent nonces
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 11/23] TPMLIB: Put banner comments on public TPM library functions
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 10/23] TPMLIB: Better format calls to TSS_*hmac*()
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 09/23] TPMLIB: Do some source cleanups
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 08/23] TPMLIB: Break TPM bits out of security/keys/trusted.c
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 07/23] TPM: Consolidate tpm_send(), transmit_cmd() and tpm_transmit()
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 06/23] TPM: Move ordinal values from interface file to header with other ordinals
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 05/23] TPM: Use struct tpm_chip rather than chip number as interface parameter
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 04/23] TPM: Expose struct tpm_chip and related find_get and put functions
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 03/23] TPM: Provide a platform driver for the user emulator driver
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 02/23] TPM: Provide a facility for a userspace TPM emulator
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 01/23] TPM: Add new TPMs to the tail of the list to prevent inadvertent change of dev
- From: David Howells <dhowells@xxxxxxxxxx>
- tpm: Provide a TPM access library
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: update on IMA on NFS
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- Re: Fwd: PROBLEM: tpm_cpg can't request region with AMD/Dell fTPM
- From: Harlan Lieberman-Berg <harlan@xxxxxxx>
- Re: [PATCH 1/7] evmtest: Regression testing Integrity Subsystem
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH 2/7] evmtest: test appraisal on policy loading with signature
- From: David Jacobson <davidj@xxxxxxxxxxxxx>
- [PATCH 7/7] emvtest: Add ability to run all tests
- From: David Jacobson <davidj@xxxxxxxxxxxxx>
- [PATCH 3/7] evmtest: test kernel module loading
- From: David Jacobson <davidj@xxxxxxxxxxxxx>
- [PATCH 6/7] evmtest: test the preservation of extended attributes
- From: David Jacobson <davidj@xxxxxxxxxxxxx>
- [PATCH 5/7] evmtest: validate boot record
- From: David Jacobson <davidj@xxxxxxxxxxxxx>
- [PATCH 4/7] evmtest: test kexec signature policy
- From: David Jacobson <davidj@xxxxxxxxxxxxx>
- [PATCH 1/7] evmtest: Regression testing Integrity Subsystem
- From: David Jacobson <davidj@xxxxxxxxxxxxx>
- Re: [PATCH v5 1/2] tpm: add ptr to the tpm_space struct to file_priv
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/2] tpm: add ptr to the tpm_space struct to file_priv
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v5 1/2] tpm: add ptr to the tpm_space struct to file_priv
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v5 2/2] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v5 0/2] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v4 2/2] tpm: add support for nonblocking operation
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Fwd: PROBLEM: tpm_cpg can't request region with AMD/Dell fTPM
- From: Harlan Lieberman-Berg <harlan@xxxxxxx>
- Re: Fwd: PROBLEM: tpm_cpg can't request region with AMD/Dell fTPM
- From: Tomas Winkler <tomasw@xxxxxxxxx>
- Re: Fwd: PROBLEM: tpm_cpg can't request region with AMD/Dell fTPM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v4 2/2] tpm: add support for nonblocking operation
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v4 2/2] tpm: add support for nonblocking operation
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/2] tpm: add ptr to the tpm_space struct to file_priv
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v4 1/2] tpm: add ptr to the tpm_space struct to file_priv
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v4 2/2] tpm: add support for nonblocking operation
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/2] tpm: add ptr to the tpm_space struct to file_priv
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Fwd: PROBLEM: tpm_cpg can't request region with AMD/Dell fTPM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v4 2/2] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v4 1/2] tpm: add ptr to the tpm_space struct to file_priv
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v4 0/2] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v3 RESEND 2/2] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Fwd: PROBLEM: tpm_cpg can't request region with AMD/Dell fTPM
- From: Harlan Lieberman-Berg <harlan@xxxxxxx>
- Re: [PATCH v3 RESEND 2/2] tpm: add support for nonblocking operation
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v3 RESEND 2/2] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v3 RESEND 2/2] tpm: add support for nonblocking operation
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 RESEND 2/2] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v3 RESEND 2/2] tpm: add support for nonblocking operation
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v3 RESEND 1/2] tpm: add ptr to the tpm_space struct to file_priv
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v3 RESEND 2/2] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v3 RESEND 0/2] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 0/6][RFC] Add EFI secure key to key retention service
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 0/6][RFC] Add EFI secure key to key retention service
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/6][RFC] Add EFI secure key to key retention service
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/6][RFC] Add EFI secure key to key retention service
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 1/6] x86/KASLR: make getting random long number function public
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 2/6] efi: the function transfers status to string
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/6] x86/KASLR: make getting random long number function public
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/6][RFC] Add EFI secure key to key retention service
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 6/6] key: enforce the secure boot checking when loading efi root key
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 5/6] key: add EFI secure key as a master key type
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 4/6] key: add EFI secure key type
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 3/6] efi: generate efi root key in EFI boot stub
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 2/6] efi: the function transfers status to string
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 1/6] x86/KASLR: make getting random long number function public
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 0/6][RFC] Add EFI secure key to key retention service
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- Re: [PATCH 3/4] ima: add support for KEXEC_ORIG_KERNEL_CHECK
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/4] ima: add support for KEXEC_ORIG_KERNEL_CHECK
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 3/4] ima: add support for KEXEC_ORIG_KERNEL_CHECK
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] ima: add support for KEXEC_ORIG_KERNEL_CHECK
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/4] ima: add support for arch specific policies
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
- From: David Howells <dhowells@xxxxxxxxxx>
- update on IMA on NFS
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- Re: [GIT PULL] tpmdd 4.19 updates
- From: James Morris <jmorris@xxxxxxxxx>
- Re: How to generate and load evm-key in TPM less systems
- From: rishi gupta <gupt21@xxxxxxxxx>
- Re: How to generate and load evm-key in TPM less systems
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- How to generate and load evm-key in TPM less systems
- From: rishi gupta <gupt21@xxxxxxxxx>
- Re: [GIT PULL] tpmdd 4.19 updates
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 4/4] x86/ima: define arch_get_ima_policy() for x86
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 1/4] ima: add support for arch specific policies
- From: kbuild test robot <lkp@xxxxxxxxx>
- [RFC PATCH] ima: arch_policy_rules can be static
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- [PATCH 4/4] x86/ima: define arch_get_ima_policy() for x86
- From: Eric Richter <erichte@xxxxxxxxxxxxxxxxxx>
- [PATCH 3/4] ima: add support for KEXEC_ORIG_KERNEL_CHECK
- From: Eric Richter <erichte@xxxxxxxxxxxxxxxxxx>
- [PATCH 2/4] ima: add support for external setting of ima_appraise
- From: Eric Richter <erichte@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/4] ima: add support for arch specific policies
- From: Eric Richter <erichte@xxxxxxxxxxxxxxxxxx>
- [PATCH 0/4] Add support for architecture-specific IMA policies
- From: Eric Richter <erichte@xxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] linux-integrity patches for 4.19
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [GIT PULL] linux-integrity patches for 4.19
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: [PATCH 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
- From: Udit Agarwal <udit.agarwal@xxxxxxx>
- [GIT PULL] linux-integrity patches for 4.19
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: add support for partial reads
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] tpm: add support for partial reads
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] tpm: add support for partial reads
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] tpm: add support for partial reads
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] tpm: add support for partial reads
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] tpm: add support for partial reads
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] tpm: add support for partial reads
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] tpm: add support for partial reads
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: add support for partial reads
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] tpm: add support for partial reads
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: add support for nonblocking operation
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
- From: Jan Lübbe <jlu@xxxxxxxxxxxxxx>
- [PATCH v2 2/2] encrypted_keys: Adds support for secure key-type as master key.
- From: Udit Agarwal <udit.agarwal@xxxxxxx>
- [PATCH v2 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
- From: Udit Agarwal <udit.agarwal@xxxxxxx>
- Re: [PATCH -next] EVM: fix return value check in evm_write_xattrs()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: [PATCH 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
- From: Udit Agarwal <udit.agarwal@xxxxxxx>
- Re: [PATCH 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
- From: Jan Lübbe <jlu@xxxxxxxxxxxxxx>
- [PATCH 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
- From: Udit Agarwal <udit.agarwal@xxxxxxx>
- [PATCH 2/2] encrypted_keys: Adds support for secure key-type as master key.
- From: Udit Agarwal <udit.agarwal@xxxxxxx>
- Re: [PATCH] tpm: add support for partial reads
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] tpm: add support for partial reads
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: add support for partial reads
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] tpm: add support for partial reads
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: add support for partial reads
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] tpm: add support for partial reads
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: add support for partial reads
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] tpm: add support for partial reads
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: add support for partial reads
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] tpm: add support for partial reads
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] tpm: Add module parameter for hwrng quality.
- From: "David R. Bild" <david.bild@xxxxxxxxxx>
- Re: [PATCH] tpm.h: increase poll timings to fix tpm_tis regression
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v6 0/8] kexec/firmware: support system wide policy requiring signatures
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] tpm: add support for nonblocking operation
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 7/8] module: replace the existing LSM hook in init_module
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 8/8] ima: based on policy warn about loading firmware (pre-allocated buffer)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v6 7/8] module: replace the existing LSM hook in init_module
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v6 6/8] ima: add build time policy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v6 5/8] ima: based on policy require signed firmware (sysfs fallback)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v6 4/8] firmware: add call to LSM hook before firmware sysfs fallback
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v6 3/8] ima: based on policy require signed kexec kernel images
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v6 2/8] kexec: add call to LSM hook in original kexec_load syscall
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v6 1/8] security: define new LSM hook named security_kernel_load_data
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] keys: trusted: remove redundant variable keyhndl
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- [PATCH v6 7/8] module: replace the existing LSM hook in init_module
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 6/8] ima: add build time policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 3/8] ima: based on policy require signed kexec kernel images
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 2/8] kexec: add call to LSM hook in original kexec_load syscall
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 8/8] ima: based on policy warn about loading firmware (pre-allocated buffer)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 5/8] ima: based on policy require signed firmware (sysfs fallback)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 4/8] firmware: add call to LSM hook before firmware sysfs fallback
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 1/8] security: define new LSM hook named security_kernel_load_data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 0/8] kexec/firmware: support system wide policy requiring signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/10] Split i2c_lock_adapter into i2c_lock_root and i2c_lock_segment
- From: Wolfram Sang <wsa@xxxxxxxxxxxxx>
- Re: [PATCH v2 00/10] Split i2c_lock_adapter into i2c_lock_root and i2c_lock_segment
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- Re: [PATCH v2 00/10] Split i2c_lock_adapter into i2c_lock_root and i2c_lock_segment
- From: Wolfram Sang <wsa@xxxxxxxxxxxxx>
- Re: [PATCH v5 7/8] ima: based on policy warn about loading firmware (pre-allocated buffer)
- From: Bjorn Andersson <bjorn.andersson@xxxxxxxxxx>
- Re: [PATCH v5 7/8] ima: based on policy warn about loading firmware (pre-allocated buffer)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm.h: increase poll timings to fix tpm_tis regression
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] tpm.h: increase poll timings to fix tpm_tis regression
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm.h: increase poll timings to fix tpm_tis regression
- From: Peter Huewe <peterhuewe@xxxxxx>
- Re: [PATCH] tpm.h: increase poll timings to fix tpm_tis regression
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm.h: increase poll timings to fix tpm_tis regression
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] tpm.h: increase poll timings to fix tpm_tis regression
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm.h: increase poll timings to fix tpm_tis regression
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH] tpm.h: increase poll timings to fix tpm_tis regression
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Regression in tpm_tis driver: the TPM now fatally offlines itself after a few hours of use
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] EVM: fix return value check in evm_write_xattrs()
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [PATCH -next] EVM: fix return value check in evm_write_xattrs()
- From: Wei Yongjun <weiyongjun1@xxxxxxxxxx>
- Re: [PATCH v5 7/8] ima: based on policy warn about loading firmware (pre-allocated buffer)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v5 7/8] ima: based on policy warn about loading firmware (pre-allocated buffer)
- From: Bjorn Andersson <bjorn.andersson@xxxxxxxxxx>
- Re: [PATCH v5 7/8] ima: based on policy warn about loading firmware (pre-allocated buffer)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 7/8] ima: based on policy warn about loading firmware (pre-allocated buffer)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v5 7/8] ima: based on policy warn about loading firmware (pre-allocated buffer)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v5 7/8] ima: based on policy warn about loading firmware (pre-allocated buffer)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Question on IMA Policy
- From: Martin Townsend <mtownsend1973@xxxxxxxxx>
- Re: Question on IMA Policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Question on IMA Policy
- From: Martin Townsend <mtownsend1973@xxxxxxxxx>
- Re: [PATCH] tpm: add support for nonblocking operation
- From: flihp <flihp@xxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]