Linux Integrity
[Prev Page][Next Page]
- Re: [RFC PATCH 02/10] fs-verity: add data verification hooks for ->readpages()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH 02/10] fs-verity: add data verification hooks for ->readpages()
- From: Gao Xiang <gaoxiang25@xxxxxxxxxx>
- Re: [f2fs-dev] [RFC PATCH 10/10] f2fs: fs-verity support
- From: Chao Yu <yuchao0@xxxxxxxxxx>
- Re: [f2fs-dev] [RFC PATCH 02/10] fs-verity: add data verification hooks for ->readpages()
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [RFC PATCH 01/10] fs-verity: add setup code, UAPI, and Kconfig
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH 02/10] fs-verity: add data verification hooks for ->readpages()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [f2fs-dev] [RFC PATCH 02/10] fs-verity: add data verification hooks for ->readpages()
- From: Gao Xiang <gaoxiang25@xxxxxxxxxx>
- Re: [f2fs-dev] [RFC PATCH 02/10] fs-verity: add data verification hooks for ->readpages()
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [f2fs-dev] [RFC PATCH 02/10] fs-verity: add data verification hooks for ->readpages()
- From: Gao Xiang <gaoxiang25@xxxxxxxxxx>
- Re: [RFC PATCH 01/10] fs-verity: add setup code, UAPI, and Kconfig
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [RFC PATCH 01/10] fs-verity: add setup code, UAPI, and Kconfig
- From: Colin Walters <walters@xxxxxxxxxx>
- Re: [RFC PATCH 01/10] fs-verity: add setup code, UAPI, and Kconfig
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [RFC PATCH 00/10] fs-verity: filesystem-level integrity protection
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 01/10] fs-verity: add setup code, UAPI, and Kconfig
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 02/10] fs-verity: add data verification hooks for ->readpages()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 06/10] fs-verity: add CRC-32C support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 07/10] fs-verity: support builtin file signatures
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 05/10] fs-verity: add SHA-512 support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 09/10] ext4: add fs-verity read support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 10/10] f2fs: fs-verity support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 08/10] ext4: add basic fs-verity support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 04/10] fs-verity: implement FS_IOC_MEASURE_VERITY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH 03/10] fs-verity: implement FS_IOC_ENABLE_VERITY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 01/23] TPM: Add new TPMs to the tail of the list to prevent inadvertent change of dev
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] tpm: factor out TPM 1.x duration calculation to tpm1-cmd.c
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 08/23] TPMLIB: Break TPM bits out of security/keys/trusted.c
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 08/23] TPMLIB: Break TPM bits out of security/keys/trusted.c
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 08/23] TPMLIB: Break TPM bits out of security/keys/trusted.c
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 05/23] TPM: Use struct tpm_chip rather than chip number as interface parameter
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 03/23] TPM: Provide a platform driver for the user emulator driver
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 02/23] TPM: Provide a facility for a userspace TPM emulator
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 01/23] TPM: Add new TPMs to the tail of the list to prevent inadvertent change of dev
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 01/23] TPM: Add new TPMs to the tail of the list to prevent inadvertent change of dev
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 01/23] TPM: Add new TPMs to the tail of the list to prevent inadvertent change of dev
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: tpm: Provide a TPM access library
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- nvs.c: Inappropriately maps TPM space on Dell Inspiron 11 3000
- From: Harlan Lieberman-Berg <harlan@xxxxxxx>
- Re: tpm: Provide a TPM access library
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: tpm: Provide a TPM access library
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Excluding UBI partition not working
- From: john HA <john.352618@xxxxxxxxx>
- Re: [PATCH 1/7] evmtest: Regression testing Integrity Subsystem
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- Re: [PATCH 04/23] TPM: Expose struct tpm_chip and related find_get and put functions
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 02/23] TPM: Provide a facility for a userspace TPM emulator
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH 04/23] TPM: Expose struct tpm_chip and related find_get and put functions
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH 01/23] TPM: Add new TPMs to the tail of the list to prevent inadvertent change of dev
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH 23/23] TPM: Add an asymmetric key subtype for handling TPM-based keys
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 22/23] TPMLIB: Provide call for TPM_FlushSpecific
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 21/23] TPMLIB: Implement call to TPM_LoadKey2
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 20/23] TPMLIB: Implement call to TPM_CreateWrapKey
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 19/23] TPMLIB: Add some debugging code
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 18/23] TPMLIB: Encapsulate XOR-based encryption with authkey derivative
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 17/23] TPMLIB: Provide a wrapper to load bytes out of the reply
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 16/23] TPMLIB: Put more comments into the HMAC generation functions
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 15/23] TPMLIB: Use __be32 rather than int32_t and use cpu_to_beX() and co.
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 14/23] TPMLIB: Make store_s() take a void* data argument, not unsigned char*
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 13/23] TPMLIB: Rename store8() and storebytes()
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 12/23] TPMLIB: Create tpm_{even, odd}_nonce structs to represent nonces
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 11/23] TPMLIB: Put banner comments on public TPM library functions
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 10/23] TPMLIB: Better format calls to TSS_*hmac*()
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 09/23] TPMLIB: Do some source cleanups
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 08/23] TPMLIB: Break TPM bits out of security/keys/trusted.c
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 07/23] TPM: Consolidate tpm_send(), transmit_cmd() and tpm_transmit()
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 06/23] TPM: Move ordinal values from interface file to header with other ordinals
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 05/23] TPM: Use struct tpm_chip rather than chip number as interface parameter
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 04/23] TPM: Expose struct tpm_chip and related find_get and put functions
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 03/23] TPM: Provide a platform driver for the user emulator driver
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 02/23] TPM: Provide a facility for a userspace TPM emulator
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 01/23] TPM: Add new TPMs to the tail of the list to prevent inadvertent change of dev
- From: David Howells <dhowells@xxxxxxxxxx>
- tpm: Provide a TPM access library
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: update on IMA on NFS
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- Re: Fwd: PROBLEM: tpm_cpg can't request region with AMD/Dell fTPM
- From: Harlan Lieberman-Berg <harlan@xxxxxxx>
- Re: [PATCH 1/7] evmtest: Regression testing Integrity Subsystem
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH 2/7] evmtest: test appraisal on policy loading with signature
- From: David Jacobson <davidj@xxxxxxxxxxxxx>
- [PATCH 7/7] emvtest: Add ability to run all tests
- From: David Jacobson <davidj@xxxxxxxxxxxxx>
- [PATCH 3/7] evmtest: test kernel module loading
- From: David Jacobson <davidj@xxxxxxxxxxxxx>
- [PATCH 6/7] evmtest: test the preservation of extended attributes
- From: David Jacobson <davidj@xxxxxxxxxxxxx>
- [PATCH 5/7] evmtest: validate boot record
- From: David Jacobson <davidj@xxxxxxxxxxxxx>
- [PATCH 4/7] evmtest: test kexec signature policy
- From: David Jacobson <davidj@xxxxxxxxxxxxx>
- [PATCH 1/7] evmtest: Regression testing Integrity Subsystem
- From: David Jacobson <davidj@xxxxxxxxxxxxx>
- Re: [PATCH v5 1/2] tpm: add ptr to the tpm_space struct to file_priv
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/2] tpm: add ptr to the tpm_space struct to file_priv
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v5 1/2] tpm: add ptr to the tpm_space struct to file_priv
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v5 2/2] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v5 0/2] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v4 2/2] tpm: add support for nonblocking operation
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Fwd: PROBLEM: tpm_cpg can't request region with AMD/Dell fTPM
- From: Harlan Lieberman-Berg <harlan@xxxxxxx>
- Re: Fwd: PROBLEM: tpm_cpg can't request region with AMD/Dell fTPM
- From: Tomas Winkler <tomasw@xxxxxxxxx>
- Re: Fwd: PROBLEM: tpm_cpg can't request region with AMD/Dell fTPM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v4 2/2] tpm: add support for nonblocking operation
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v4 2/2] tpm: add support for nonblocking operation
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/2] tpm: add ptr to the tpm_space struct to file_priv
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v4 1/2] tpm: add ptr to the tpm_space struct to file_priv
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v4 2/2] tpm: add support for nonblocking operation
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/2] tpm: add ptr to the tpm_space struct to file_priv
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Fwd: PROBLEM: tpm_cpg can't request region with AMD/Dell fTPM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v4 2/2] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v4 1/2] tpm: add ptr to the tpm_space struct to file_priv
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v4 0/2] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v3 RESEND 2/2] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Fwd: PROBLEM: tpm_cpg can't request region with AMD/Dell fTPM
- From: Harlan Lieberman-Berg <harlan@xxxxxxx>
- Re: [PATCH v3 RESEND 2/2] tpm: add support for nonblocking operation
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v3 RESEND 2/2] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v3 RESEND 2/2] tpm: add support for nonblocking operation
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 RESEND 2/2] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v3 RESEND 2/2] tpm: add support for nonblocking operation
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v3 RESEND 1/2] tpm: add ptr to the tpm_space struct to file_priv
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v3 RESEND 2/2] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v3 RESEND 0/2] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 0/6][RFC] Add EFI secure key to key retention service
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 0/6][RFC] Add EFI secure key to key retention service
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/6][RFC] Add EFI secure key to key retention service
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/6][RFC] Add EFI secure key to key retention service
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 1/6] x86/KASLR: make getting random long number function public
- From: joeyli <jlee@xxxxxxxx>
- Re: [PATCH 2/6] efi: the function transfers status to string
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/6] x86/KASLR: make getting random long number function public
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/6][RFC] Add EFI secure key to key retention service
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 6/6] key: enforce the secure boot checking when loading efi root key
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 5/6] key: add EFI secure key as a master key type
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 4/6] key: add EFI secure key type
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 3/6] efi: generate efi root key in EFI boot stub
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 2/6] efi: the function transfers status to string
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 1/6] x86/KASLR: make getting random long number function public
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- [PATCH 0/6][RFC] Add EFI secure key to key retention service
- From: "Lee, Chun-Yi" <joeyli.kernel@xxxxxxxxx>
- Re: [PATCH 3/4] ima: add support for KEXEC_ORIG_KERNEL_CHECK
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/4] ima: add support for KEXEC_ORIG_KERNEL_CHECK
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 3/4] ima: add support for KEXEC_ORIG_KERNEL_CHECK
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] ima: add support for KEXEC_ORIG_KERNEL_CHECK
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/4] ima: add support for arch specific policies
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
- From: David Howells <dhowells@xxxxxxxxxx>
- update on IMA on NFS
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- Re: [GIT PULL] tpmdd 4.19 updates
- From: James Morris <jmorris@xxxxxxxxx>
- Re: How to generate and load evm-key in TPM less systems
- From: rishi gupta <gupt21@xxxxxxxxx>
- Re: How to generate and load evm-key in TPM less systems
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- How to generate and load evm-key in TPM less systems
- From: rishi gupta <gupt21@xxxxxxxxx>
- Re: [GIT PULL] tpmdd 4.19 updates
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 4/4] x86/ima: define arch_get_ima_policy() for x86
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 1/4] ima: add support for arch specific policies
- From: kbuild test robot <lkp@xxxxxxxxx>
- [RFC PATCH] ima: arch_policy_rules can be static
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- [PATCH 4/4] x86/ima: define arch_get_ima_policy() for x86
- From: Eric Richter <erichte@xxxxxxxxxxxxxxxxxx>
- [PATCH 3/4] ima: add support for KEXEC_ORIG_KERNEL_CHECK
- From: Eric Richter <erichte@xxxxxxxxxxxxxxxxxx>
- [PATCH 2/4] ima: add support for external setting of ima_appraise
- From: Eric Richter <erichte@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/4] ima: add support for arch specific policies
- From: Eric Richter <erichte@xxxxxxxxxxxxxxxxxx>
- [PATCH 0/4] Add support for architecture-specific IMA policies
- From: Eric Richter <erichte@xxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] linux-integrity patches for 4.19
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [GIT PULL] linux-integrity patches for 4.19
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: [PATCH 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
- From: Udit Agarwal <udit.agarwal@xxxxxxx>
- [GIT PULL] linux-integrity patches for 4.19
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: add support for partial reads
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] tpm: add support for partial reads
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] tpm: add support for partial reads
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] tpm: add support for partial reads
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] tpm: add support for partial reads
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] tpm: add support for partial reads
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] tpm: add support for partial reads
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] tpm: add support for partial reads
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: add support for partial reads
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] tpm: add support for partial reads
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: add support for nonblocking operation
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
- From: Jan Lübbe <jlu@xxxxxxxxxxxxxx>
- [PATCH v2 2/2] encrypted_keys: Adds support for secure key-type as master key.
- From: Udit Agarwal <udit.agarwal@xxxxxxx>
- [PATCH v2 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
- From: Udit Agarwal <udit.agarwal@xxxxxxx>
- Re: [PATCH -next] EVM: fix return value check in evm_write_xattrs()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: [PATCH 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
- From: Udit Agarwal <udit.agarwal@xxxxxxx>
- Re: [PATCH 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
- From: Jan Lübbe <jlu@xxxxxxxxxxxxxx>
- [PATCH 1/2] security/keys/secure_key: Adds the secure key support based on CAAM.
- From: Udit Agarwal <udit.agarwal@xxxxxxx>
- [PATCH 2/2] encrypted_keys: Adds support for secure key-type as master key.
- From: Udit Agarwal <udit.agarwal@xxxxxxx>
- Re: [PATCH] tpm: add support for partial reads
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] tpm: add support for partial reads
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: add support for partial reads
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] tpm: add support for partial reads
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: add support for partial reads
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] tpm: add support for partial reads
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: add support for partial reads
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] tpm: add support for partial reads
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: add support for partial reads
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH] tpm: add support for partial reads
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] tpm: Add module parameter for hwrng quality.
- From: "David R. Bild" <david.bild@xxxxxxxxxx>
- Re: [PATCH] tpm.h: increase poll timings to fix tpm_tis regression
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v6 0/8] kexec/firmware: support system wide policy requiring signatures
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] tpm: add support for nonblocking operation
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 7/8] module: replace the existing LSM hook in init_module
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 8/8] ima: based on policy warn about loading firmware (pre-allocated buffer)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v6 7/8] module: replace the existing LSM hook in init_module
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v6 6/8] ima: add build time policy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v6 5/8] ima: based on policy require signed firmware (sysfs fallback)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v6 4/8] firmware: add call to LSM hook before firmware sysfs fallback
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v6 3/8] ima: based on policy require signed kexec kernel images
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v6 2/8] kexec: add call to LSM hook in original kexec_load syscall
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v6 1/8] security: define new LSM hook named security_kernel_load_data
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] keys: trusted: remove redundant variable keyhndl
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- [PATCH v6 7/8] module: replace the existing LSM hook in init_module
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 6/8] ima: add build time policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 3/8] ima: based on policy require signed kexec kernel images
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 2/8] kexec: add call to LSM hook in original kexec_load syscall
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 8/8] ima: based on policy warn about loading firmware (pre-allocated buffer)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 5/8] ima: based on policy require signed firmware (sysfs fallback)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 4/8] firmware: add call to LSM hook before firmware sysfs fallback
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 1/8] security: define new LSM hook named security_kernel_load_data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 0/8] kexec/firmware: support system wide policy requiring signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/10] Split i2c_lock_adapter into i2c_lock_root and i2c_lock_segment
- From: Wolfram Sang <wsa@xxxxxxxxxxxxx>
- Re: [PATCH v2 00/10] Split i2c_lock_adapter into i2c_lock_root and i2c_lock_segment
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- Re: [PATCH v2 00/10] Split i2c_lock_adapter into i2c_lock_root and i2c_lock_segment
- From: Wolfram Sang <wsa@xxxxxxxxxxxxx>
- Re: [PATCH v5 7/8] ima: based on policy warn about loading firmware (pre-allocated buffer)
- From: Bjorn Andersson <bjorn.andersson@xxxxxxxxxx>
- Re: [PATCH v5 7/8] ima: based on policy warn about loading firmware (pre-allocated buffer)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm.h: increase poll timings to fix tpm_tis regression
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] tpm.h: increase poll timings to fix tpm_tis regression
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm.h: increase poll timings to fix tpm_tis regression
- From: Peter Huewe <peterhuewe@xxxxxx>
- Re: [PATCH] tpm.h: increase poll timings to fix tpm_tis regression
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm.h: increase poll timings to fix tpm_tis regression
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] tpm.h: increase poll timings to fix tpm_tis regression
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm.h: increase poll timings to fix tpm_tis regression
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH] tpm.h: increase poll timings to fix tpm_tis regression
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Regression in tpm_tis driver: the TPM now fatally offlines itself after a few hours of use
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] EVM: fix return value check in evm_write_xattrs()
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [PATCH -next] EVM: fix return value check in evm_write_xattrs()
- From: Wei Yongjun <weiyongjun1@xxxxxxxxxx>
- Re: [PATCH v5 7/8] ima: based on policy warn about loading firmware (pre-allocated buffer)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v5 7/8] ima: based on policy warn about loading firmware (pre-allocated buffer)
- From: Bjorn Andersson <bjorn.andersson@xxxxxxxxxx>
- Re: [PATCH v5 7/8] ima: based on policy warn about loading firmware (pre-allocated buffer)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 7/8] ima: based on policy warn about loading firmware (pre-allocated buffer)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v5 7/8] ima: based on policy warn about loading firmware (pre-allocated buffer)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v5 7/8] ima: based on policy warn about loading firmware (pre-allocated buffer)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Question on IMA Policy
- From: Martin Townsend <mtownsend1973@xxxxxxxxx>
- Re: Question on IMA Policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Question on IMA Policy
- From: Martin Townsend <mtownsend1973@xxxxxxxxx>
- Re: [PATCH] tpm: add support for nonblocking operation
- From: flihp <flihp@xxxxxxxxx>
- Re: ima: why IMA_APPRAISE_DIRECTORIES patch is not mainlined
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- on annual leave
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] ima: Use tpm_default_chip() and call TPM functions with a tpm_chip
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Fix NULL pointer dereference in tpm_transmit()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: ima: why IMA_APPRAISE_DIRECTORIES patch is not mainlined
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Fix NULL pointer dereference in tpm_transmit()
- From: "S, Shirish" <sshankar@xxxxxxx>
- Re: [PATCH] tpm: Fix NULL pointer dereference in tpm_transmit()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Fix NULL pointer dereference in tpm_transmit()
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH 2/2] KEYS: trusted: Find tpm_chip and use it until module shutdown
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] ima: Use tpm_default_chip() and call TPM functions with a tpm_chip
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH] tpm: Fix NULL pointer dereference in tpm_transmit()
- From: Shirish S <shirish.s@xxxxxxx>
- Re: [PATCH v2 09/10] mfd: 88pm860x-i2c: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT)
- From: Lee Jones <lee.jones@xxxxxxxxxx>
- Re: [PATCH] tpm: Add module parameter for hwrng quality.
- From: Louis Collard <louiscollard@xxxxxxxxxxxx>
- Re: [PATCH 2/2] KEYS: trusted: Find tpm_chip and use it until module shutdown
- From: James Bottomley <jejb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] KEYS: trusted: Find tpm_chip and use it until module shutdown
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 2/2] KEYS: trusted: Find tpm_chip and use it until module shutdown
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] ima: Use tpm_default_chip() and call TPM functions with a tpm_chip
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] KEYS: trusted: Find tpm_chip and use it until module shutdown
- From: James Bottomley <jejb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] KEYS: trusted: Find tpm_chip and use it until module shutdown
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] tpm: Implement public tpm_put_chip() to release reference to chip
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] ima: Remove unused is_ima_appraise_enabled() function.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/8] ima: based on policy require signed kexec kernel images
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/8] security: define new LSM hook named security_kernel_load_data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/8] firmware: add call to LSM hook before firmware sysfs fallback
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH] ima: Remove unused is_ima_appraise_enabled() function.
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 8/8] module: replace the existing LSM hook in init_module
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v5 1/8] security: define new LSM hook named security_kernel_load_data
- From: J Freyensee <why2jjj.linux@xxxxxxxxx>
- Re: [PATCH v5 3/8] ima: based on policy require signed kexec kernel images
- From: J Freyensee <why2jjj.linux@xxxxxxxxx>
- Re: [PATCH] ima: Use tpm_default_chip() and call TPM functions with a tpm_chip
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 7/8] ima: based on policy warn about loading firmware (pre-allocated buffer)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] ima: Use tpm_default_chip() and call TPM functions with a tpm_chip
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 5/5] ima: Get rid of ima_used_chip and use ima_tpm_chip != NULL instead
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 5/5] ima: Get rid of ima_used_chip and use ima_tpm_chip != NULL instead
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 0/8] kexec/firmware: support system wide policy requiring signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 1/8] security: define new LSM hook named security_kernel_load_data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 2/8] kexec: add call to LSM hook in original kexec_load syscall
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 3/8] ima: based on policy require signed kexec kernel images
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 7/8] ima: based on policy warn about loading firmware (pre-allocated buffer)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 8/8] module: replace the existing LSM hook in init_module
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 5/8] ima: based on policy require signed firmware (sysfs fallback)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 6/8] ima: add build time policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 4/8] firmware: add call to LSM hook before firmware sysfs fallback
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] ima-evm-utils: check the return code from tpm_pcr_read() in ima_measurement()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [USER] [PATCH 2/2] Add security.apparmor to the set of extended attributes used by EVM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: require to compile as part of the kernel
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] tpm: require to compile as part of the kernel
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] tpm: require to compile as part of the kernel
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: require to compile as part of the kernel
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: require to compile as part of the kernel
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH] tpm: require to compile as part of the kernel
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 0/5] Have IMA find and use a tpm_chip until system shutdown
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add module parameter for hwrng quality.
- From: "David R. Bild" <david.bild@xxxxxxxxxx>
- [PATCH] tpm: replace TPM_TRANSMIT_RAW with TPM_TRANSMIT_NESTED
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v8] tpm: separate cmd_ready/go_idle from runtime_pm
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 0/5] Have IMA find and use a tpm_chip until system shutdown
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 0/5] Have IMA find and use a tpm_chip until system shutdown
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 3/5] tpm: Convert tpm_find_get_ops() to use tpm_default_chip()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 2/5] tpm: Implement tpm_default_chip() to find a TPM chip
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Allow tpm_tis drivers to set hwrng quality.
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5] tpm: Return the actual size when receiving an unsupported command
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v8] tpm: separate cmd_ready/go_idle from runtime_pm
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Allow tpm_tis drivers to set hwrng quality.
- From: Louis Collard <louiscollard@xxxxxxxxxxxx>
- [PATCH v2] tpm: Allow tpm_tis drivers to set hwrng quality.
- From: Louis Collard <louiscollard@xxxxxxxxxxxx>
- [PATCH v2] tpm: Allow tpm_tis drivers to set hwrng quality.
- From: Louis Collard <louiscollard@xxxxxxxxxxxx>
- Re: [PATCH] integrity: prevent deadlock during digsig verification.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] integrity: prevent deadlock during digsig verification.
- From: Mikhail Kurinnoi <viewizard@xxxxxxxxxxxxx>
- Re: [PATCH] integrity: prevent deadlock during digsig verification.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] integrity: prevent deadlock during digsig verification.
- From: Matthias Gerstner <mgerstner@xxxxxxx>
- Re: [PATCH] integrity: prevent deadlock during digsig verification.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v8] tpm: separate cmd_ready/go_idle from runtime_pm
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- RE: [PATCH v7] tpm: separate cmd_ready/go_idle from runtime_pm
- From: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
- Re: [PATCH v7] tpm: separate cmd_ready/go_idle from runtime_pm
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- RE: [PATCH v7] tpm: separate cmd_ready/go_idle from runtime_pm
- From: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
- Re: [PATCH v7] tpm: separate cmd_ready/go_idle from runtime_pm
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH] integrity: prevent deadlock during digsig verification.
- From: Mikhail Kurinnoi <viewizard@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add module parameter for hwrng quality.
- From: Louis Collard <louiscollard@xxxxxxxxxxxx>
- Re: [PATCH] tpm: Allow tpm_tis drivers to set hwrng quality.
- From: Louis Collard <louiscollard@xxxxxxxxxxxx>
- RE: [PATCH v7] tpm: separate cmd_ready/go_idle from runtime_pm
- From: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
- [PATCH 0/2] Convert trusted keys to find and use the default TPM chip
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] tpm: Implement public tpm_put_chip() to release reference to chip
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] KEYS: trusted: Find tpm_chip and use it until module shutdown
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v7 1/5] tpm: rename tpm_chip_find_get() to tpm_find_get_ops()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v7 0/5] Have IMA find and use a tpm_chip until system shutdown
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v7 2/5] tpm: Implement tpm_default_chip() to find a TPM chip
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v7 4/5] ima: Use tpm_default_chip() and call TPM functions with a tpm_chip
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v7 3/5] tpm: Convert tpm_find_get_ops() to use tpm_default_chip()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v7 5/5] ima: Get rid of ima_used_chip and use ima_tpm_chip != NULL instead
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 3/5] tpm: Convert tpm_find_get_ops() to use tpm_default_chip()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 3/5] tpm: Convert tpm_find_get_ops() to use tpm_default_chip()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 2/5] tpm: Implement tpm_default_chip() to find a TPM chip
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 1/5] tpm: rename tpm_chip_find_get() to tpm_find_get_ops()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 4/5] ima: Use tpm_default_chip() and call TPM functions with a tpm_chip
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 5/5] ima: Get rid of ima_used_chip and use ima_tpm_chip != NULL instead
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 0/5] Have IMA find and use a tpm_chip until system shutdown
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH] ima-evm-utils: add --pcrinit and --pcr options to ima_measurement command
- From: George Wilson <gcwilson@xxxxxxxxxxxxx>
- [PATCH] ima-evm-utils: check the return code from tpm_pcr_read() in ima_measurement()
- From: George Wilson <gcwilson@xxxxxxxxxxxxx>
- [PATCH v5] tpm: Return the actual size when receiving an unsupported command
- From: Ricardo Schwarzmeier <Ricardo.Schwarzmeier@xxxxxxxxxxxx>
- Re: [PATCH v2 10/10] i2c: remove i2c_lock_adapter and use i2c_lock_bus directly
- From: Sekhar Nori <nsekhar@xxxxxx>
- Re: [PATCH v5 5/5] ima: Get rid of ima_used_chip and use ima_tpm_chip != NULL instead
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/5] ima: Use tpm_default_chip() and call TPM functions with a tpm_chip
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/5] tpm: Convert tpm_find_get_ops() to use tpm_default_chip()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/5] tpm: Implement tpm_default_chip() to find a TPM chip
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/5] tpm: rename tpm_chip_find_get() to tpm_find_get_ops()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/5] tpm: rename tpm_chip_find_get() to tpm_find_get_ops()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/10] tpm/tpm_i2c_infineon: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT)
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/10] tpm/tpm_i2c_infineon: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT)
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v5 1/5] tpm: rename tpm_chip_find_get() to tpm_find_get_ops()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 3/5] tpm: Convert tpm_find_get_ops() to use tpm_default_chip()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 4/5] ima: Use tpm_default_chip() and call TPM functions with a tpm_chip
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 2/5] tpm: Implement tpm_default_chip() to find a TPM chip
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 5/5] ima: Get rid of ima_used_chip and use ima_tpm_chip != NULL instead
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 0/5] Have IMA find and use a tpm_chip until system shutdown
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/10] tpm/tpm_i2c_infineon: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT)
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- Re: [PATCH v2 10/10] i2c: remove i2c_lock_adapter and use i2c_lock_bus directly
- From: Jonathan Cameron <jonathan.cameron@xxxxxxxxxx>
- Re: [PATCH v7] tpm: separate cmd_ready/go_idle from runtime_pm
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/5] Have IMA find and use a tpm_chip until system shutdown
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/5] Have IMA find and use a tpm_chip until system shutdown
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/5] Have IMA find and use a tpm_chip until system shutdown
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/10] Split i2c_lock_adapter into i2c_lock_root and i2c_lock_segment
- From: Wolfram Sang <wsa@xxxxxxxxxxxxx>
- RE: [PATCH v6] tpm: separate cmd_ready/go_idle from runtime_pm
- From: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
- RE: [PATCH v7] tpm: separate cmd_ready/go_idle from runtime_pm
- From: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
- Re: [PATCH v6] tpm: separate cmd_ready/go_idle from runtime_pm
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v7] tpm: separate cmd_ready/go_idle from runtime_pm
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v7] tpm: separate cmd_ready/go_idle from runtime_pm
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4] tpm: Return the actual size when receiving an unsupported command
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v4 2/5] tpm: Implement tpm_default_chip() to find a TPM chip
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 1/5] tpm: rename tpm_chip_find_get() to tpm_find_get_ops()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 0/5] Have IMA find and use a tpm_chip until system shutdown
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 3/5] tpm: Convert tpm_find_get_ops() to use tpm_default_chip()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 5/5] ima: Get rid of ima_used_chip and use ima_tpm_chip != NULL instead
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 4/5] ima: Use tpm_default_chip() and call TPM functions with a tpm_chip
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/10] tpm/tpm_i2c_infineon: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT)
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: IMA: Deadlock in ima_appraise_measurement when /bin/kmod carries a digsig in security.evm
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v7] tpm: separate cmd_ready/go_idle from runtime_pm
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- Re: [PATCH v3 2/4] tpm: Implement tpm_chip_find() for other subsystems to find a TPM chip
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v3 2/4] tpm: Implement tpm_chip_find() for other subsystems to find a TPM chip
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/4] tpm: Implement tpm_chip_find() for other subsystems to find a TPM chip
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v3 1/4] tpm: rename tpm_chip_find_get() to tpm_get_ops()
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [USER] [PATCH 1/2] Remove hardcoding of SHA1 in EVM signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: IMA: Deadlock in ima_appraise_measurement when /bin/kmod carries a digsig in security.evm
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 2/4] tpm: Implement tpm_chip_find() for other subsystems to find a TPM chip
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 3/4] ima: Use tpm_chip_find() and call TPM functions with a tpm_chip
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 4/4] ima: Get rid of ima_used_chip and use ima_tpm_chip != NULL instead
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 1/4] tpm: rename tpm_chip_find_get() to tpm_get_ops()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 0/4] Have IMA find and use a tpm_chip until system shutdown
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] ima: Use tpm_chip_find() and access TPM functions using it
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v2 3/4] ima: Use tpm_chip_find() and access TPM functions using it
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v4] MAINTAINERS: Add file patterns for tpm device tree bindings
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v4] tpm: Return the actual size when receiving an unsupported command
- From: Ricardo Schwarzmeier <Ricardo.Schwarzmeier@xxxxxxxxxxxx>
- Re: [PATCH v2 3/4] ima: Use tpm_chip_find() and access TPM functions using it
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v2 3/4] ima: Use tpm_chip_find() and access TPM functions using it
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] ima: Use tpm_chip_find() and access TPM functions using it
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] tpm: Implement tpm_chip_find() and tpm_chip_put() for other subsystems
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v2 1/4] tpm: Implement tpm_chip_find() and tpm_chip_put() for other subsystems
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] tpm: Implement tpm_chip_find() and tpm_chip_put() for other subsystems
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- RE: [PATCH v6] tpm: separate cmd_ready/go_idle from runtime_pm
- From: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
- Re: [PATCH v2 1/4] tpm: Implement tpm_chip_find() and tpm_chip_put() for other subsystems
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] tpm: Implement tpm_chip_find() and tpm_chip_put() for other subsystems
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v2 1/4] tpm: Implement tpm_chip_find() and tpm_chip_put() for other subsystems
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2 1/4] tpm: Implement tpm_chip_find() and tpm_chip_put() for other subsystems
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] tpm: add support for nonblocking operation
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] tpm: Implement tpm_chip_find() and tpm_chip_put() for other subsystems
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] tpm: Implement tpm_chip_find() and tpm_chip_put() for other subsystems
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/6] tpm: Introduce a kref for the tpm_chip
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] tpm: Return the actual size when receiving an unsupported command
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Return the actual size when receiving an unsupported command
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add module parameter for hwrng quality.
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v6] tpm: separate cmd_ready/go_idle from runtime_pm
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] tpm: add support for nonblocking operation
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tstruk@xxxxxxxxx>
- Re: [PATCH v3 0/2] tpm: add support for nonblocking operation
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] tpm: Implement tpm_chip_find() and tpm_chip_put() for other subsystems
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] tpm: Implement tpm_chip_find() and tpm_chip_put() for other subsystems
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH v2 0/4] Have IMA find and use a tpm_chip until system shutdown
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 1/4] tpm: Implement tpm_chip_find() and tpm_chip_put() for other subsystems
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 3/4] ima: Use tpm_chip_find() and access TPM functions using it
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/4] ima: Implement ima_shutdown and register it as a reboot_notifier
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 4/4] ima: Get rid of ima_used_chip and use ima_tpm_chip != NULL instead
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 03/10] input: rohm_bu21023: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT)
- From: Dmitry Torokhov <dmitry.torokhov@xxxxxxxxx>
- Re: [PATCH 1/6] tpm: Introduce a kref for the tpm_chip
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/6] tpm: Introduce a kref for the tpm_chip
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH 1/6] tpm: Introduce a kref for the tpm_chip
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH 4/6] ima: Implement ima_shutdown and register it as a reboot_notifier
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH 6/6] ima: Get rid of ima_used_chip and use ima_tpm_chip != NULL instead
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH 5/6] ima: Use tpm_chip_find() and access TPM functions using it
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH 3/6] tpm: Implement tpm_chip_find() for other subsystems to call
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH 2/6] tpm: Get additional kref with every call to tpm_try_get_ops()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH 0/6] Have IMA find and use a tpm_chip until system shutdown
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3] tpm: Return the actual size when receiving an unsupported command
- From: Ricardo Schwarzmeier <Ricardo.Schwarzmeier@xxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Return the actual size when receiving an unsupported command
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: IMA: Deadlock in ima_appraise_measurement when /bin/kmod carries a digsig in security.evm
- From: Matthias Gerstner <mgerstner@xxxxxxx>
- [PATCH v2] tpm: Return the actual size when receiving an unsupported command
- From: Ricardo Schwarzmeier <Ricardo.Schwarzmeier@xxxxxxxxxxxx>
- [PATCH v2 01/10] tpm/tpm_i2c_infineon: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT)
- From: Peter Rosin <peda@xxxxxxxxxx>
- [PATCH v2 05/10] media: drxk_hard: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT)
- From: Peter Rosin <peda@xxxxxxxxxx>
- [PATCH v2 06/10] media: rtl2830: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT)
- From: Peter Rosin <peda@xxxxxxxxxx>
- [PATCH v2 08/10] media: tda18271: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT)
- From: Peter Rosin <peda@xxxxxxxxxx>
- [PATCH v2 03/10] input: rohm_bu21023: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT)
- From: Peter Rosin <peda@xxxxxxxxxx>
- [PATCH v2 10/10] i2c: remove i2c_lock_adapter and use i2c_lock_bus directly
- From: Peter Rosin <peda@xxxxxxxxxx>
- [PATCH v2 07/10] media: tda1004x: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT)
- From: Peter Rosin <peda@xxxxxxxxxx>
- [PATCH v2 09/10] mfd: 88pm860x-i2c: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT)
- From: Peter Rosin <peda@xxxxxxxxxx>
- [PATCH v2 04/10] media: af9013: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT)
- From: Peter Rosin <peda@xxxxxxxxxx>
- [PATCH v2 02/10] i2c: mux: pca9541: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT)
- From: Peter Rosin <peda@xxxxxxxxxx>
- [PATCH v2 00/10] Split i2c_lock_adapter into i2c_lock_root and i2c_lock_segment
- From: Peter Rosin <peda@xxxxxxxxxx>
- Re: [PATCH v3 0/2] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: IMA: Deadlock in ima_appraise_measurement when /bin/kmod carries a digsig in security.evm
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/11] i2c: add helpers for locking the I2C segment
- From: Peter Rosin <peda@xxxxxxxxxx>
- Re: [PATCH 04/11] input: rohm_bu21023: switch to i2c_lock_segment
- From: Dmitry Torokhov <dmitry.torokhov@xxxxxxxxx>
- Re: [PATCH v3 0/2] tpm: add support for nonblocking operation
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 02/11] tpm/tpm_i2c_infineon: switch to i2c_lock_segment
- From: Peter Rosin <peda@xxxxxxxxxx>
- Re: [PATCH 02/11] tpm/tpm_i2c_infineon: switch to i2c_lock_segment
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Return the actual size when receiving an unsupported command
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add module parameter for hwrng quality.
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- RE: [PATCH v6] tpm: separate cmd_ready/go_idle from runtime_pm
- From: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
- Re: [PATCH] tpm: add support for nonblocking operation
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: add support for nonblocking operation
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Allow tpm_tis drivers to set hwrng quality.
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis_spi: Pass the SPI IRQ down to the driver
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add module parameter for hwrng quality.
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6] tpm: separate cmd_ready/go_idle from runtime_pm
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Converting IMA to always use a tpm_chip results in a lock ordering issue
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- IMA: Deadlock in ima_appraise_measurement when /bin/kmod carries a digsig in security.evm
- From: Matthias Gerstner <mgerstner@xxxxxxx>
- Re: [PATCH 01/11] i2c: add helpers for locking the I2C segment
- From: Wolfram Sang <wsa@xxxxxxxxxxxxx>
- Re: [PATCH 01/11] i2c: add helpers for locking the I2C segment
- From: Peter Rosin <peda@xxxxxxxxxx>
- Re: [PATCH 00/11] Split i2c_lock_adapter into i2c_lock_root and i2c_lock_segment
- From: Wolfram Sang <wsa@xxxxxxxxxxxxx>
- Re: [PATCH 01/11] i2c: add helpers for locking the I2C segment
- From: Wolfram Sang <wsa@xxxxxxxxxxxxx>
- Re: [integrity:next-integrity-queued 22/22] security/integrity/evm/evm_crypto.c:93: undefined reference to `hash_algo_name'
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH] tpm: Return the actual size when receiving an unsupported command
- From: Ricardo Schwarzmeier <Ricardo.Schwarzmeier@xxxxxxxxxxxx>
- Re: [integrity:next-integrity-queued 22/22] security/integrity/evm/evm_crypto.c:93: undefined reference to `hash_algo_name'
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH 02/11] tpm/tpm_i2c_infineon: switch to i2c_lock_segment
- From: Peter Rosin <peda@xxxxxxxxxx>
- [PATCH 03/11] i2c: mux: pca9541: switch to i2c_lock_segment
- From: Peter Rosin <peda@xxxxxxxxxx>
- [PATCH 04/11] input: rohm_bu21023: switch to i2c_lock_segment
- From: Peter Rosin <peda@xxxxxxxxxx>
- [PATCH 05/11] media: af9013: switch to i2c_lock_segment
- From: Peter Rosin <peda@xxxxxxxxxx>
- [PATCH 08/11] media: tda1004x: switch to i2c_lock_segment
- From: Peter Rosin <peda@xxxxxxxxxx>
- [PATCH 09/11] media: tda18271: switch to i2c_lock_segment
- From: Peter Rosin <peda@xxxxxxxxxx>
- [PATCH 10/11] mfd: 88pm860x-i2c: switch to i2c_lock_segment
- From: Peter Rosin <peda@xxxxxxxxxx>
- [PATCH 11/11] i2c: rename i2c_lock_adapter to i2c_lock_root
- From: Peter Rosin <peda@xxxxxxxxxx>
- [PATCH 07/11] media: rtl2830: switch to i2c_lock_segment
- From: Peter Rosin <peda@xxxxxxxxxx>
- [PATCH 06/11] media: drxk_hard: switch to i2c_lock_segment
- From: Peter Rosin <peda@xxxxxxxxxx>
- [PATCH 01/11] i2c: add helpers for locking the I2C segment
- From: Peter Rosin <peda@xxxxxxxxxx>
- [PATCH 00/11] Split i2c_lock_adapter into i2c_lock_root and i2c_lock_segment
- From: Peter Rosin <peda@xxxxxxxxxx>
- Re: [USER] [PATCH 2/2] Add security.apparmor to the set of extended attributes used by EVM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [USER] [PATCH 2/2] Add security.apparmor to the set of extended attributes used by EVM
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [USER] [PATCH 1/2] Remove hardcoding of SHA1 in EVM signatures
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [-next PATCH] security: use octal not symbolic permissions
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [-next PATCH] security: use octal not symbolic permissions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [-next PATCH] security: use octal not symbolic permissions
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [-next PATCH] security: use octal not symbolic permissions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [-next PATCH] security: use octal not symbolic permissions
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH v3 2/2] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v3 2/2] tpm: add support for nonblocking operation
- From: J Freyensee <why2jjj.linux@xxxxxxxxx>
- Re: [-next PATCH] security: use octal not symbolic permissions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [-next PATCH] security: use octal not symbolic permissions
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [-next PATCH] security: use octal not symbolic permissions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [-next PATCH] security: use octal not symbolic permissions
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH V3 1/2] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [USER] [PATCH 1/2] Remove hardcoding of SHA1 in EVM signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH V3 1/2] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V2 1/2] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [-next PATCH] security: use octal not symbolic permissions
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [USER] [PATCH 2/2] Add security.apparmor to the set of extended attributes used by EVM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [-next PATCH] security: use octal not symbolic permissions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [-next PATCH] security: use octal not symbolic permissions
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [-next PATCH] security: use octal not symbolic permissions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [-next PATCH] security: use octal not symbolic permissions
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH v3 2/2] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v3 1/2] tpm: add ptr to the tpm_space struct to file_priv
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v3 0/2] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH V3 1/2] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v2 2/2] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2 2/2] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2 2/2] tpm: add support for nonblocking operation
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH] tpm: add support for nonblocking operation
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/2] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v2 1/2] tpm: add ptr to the tpm_space struct to file_priv
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v2 2/2] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [-next PATCH] security: use octal not symbolic permissions
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [-next PATCH] security: use octal not symbolic permissions
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH] tpm_tis_spi: Pass the SPI IRQ down to the driver
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH V3 2/2] evm: Allow non-SHA1 digital signatures
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH V3 1/2] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Support additional signature types in EVM
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] tpm: add support for nonblocking operation
- From: flihp <flihp@xxxxxxxxx>
- Re: [PATCH] tpm_tis_spi: Pass the SPI IRQ down to the driver
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH] tpm: Allow tpm_tis drivers to set hwrng quality.
- From: Louis Collard <louiscollard@xxxxxxxxxxxx>
- [PATCH] tpm_tis_spi: Pass the SPI IRQ down to the driver
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH] tpm_tis_spi: Pass the SPI IRQ down to the driver
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH] tpm: Add module parameter for hwrng quality.
- From: Louis Collard <louiscollard@xxxxxxxxxxxx>
- [PATCH v6] tpm: separate cmd_ready/go_idle from runtime_pm
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- Re: [PATCH V2 2/2] evm: Allow non-SHA1 digital signatures
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] tpm: separate cmd_ready/go_idle from runtime_pm
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH V2 2/2] evm: Allow non-SHA1 digital signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [Fwd: Re: Fwd: New Version Notification for draft-cel-nfsv4-linux-seclabel-xtensions-00.txt]
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- RE: [PATCH] tpm: separate cmd_ready/go_idle from runtime_pm
- From: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
- Re: [PATCH] tpm: separate cmd_ready/go_idle from runtime_pm
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 7/8] ima: based on policy prevent loading firmware (pre-allocated buffer)
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- [PATCH V2 2/2] evm: Allow non-SHA1 digital signatures
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH V2 1/2] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] ima-evm-utils: attr/xattr.h is deprecated. Use sys/xattr.h instead
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 4/4] ima: Differentiate auditing policy rules from "audit" actions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: violations and invalidated PCR value
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- RE: [PATCH] tpm: separate cmd_ready/go_idle from runtime_pm
- From: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
- Re: [RFC PATCH v4 7/8] ima: based on policy prevent loading firmware (pre-allocated buffer)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v4a 8/8] module: replace the existing LSM hook in init_module
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 7/8] ima: based on policy prevent loading firmware (pre-allocated buffer)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4a 8/8] module: replace the existing LSM hook in init_module
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 4/4] ima: Differentiate auditing policy rules from "audit" actions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4a 8/8] module: replace the existing LSM hook in init_module
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- violations and invalidated PCR value
- From: "Magalhaes, Guilherme (Brazil R&D-CL)" <guilherme.magalhaes@xxxxxxx>
- Re: [PATCH v4a 8/8] module: replace the existing LSM hook in init_module
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 1/4] tpm: migrate tpm2_shutdown() to use struct tpm_buf
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 4/4] ima: Differentiate auditing policy rules from "audit" actions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/8] kexec/firmware: support system wide policy requiring signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/8] kexec/firmware: support system wide policy requiring signatures
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 0/8] kexec/firmware: support system wide policy requiring signatures
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v4 0/8] kexec/firmware: support system wide policy requiring signatures
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 0/8] kexec/firmware: support system wide policy requiring signatures
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v3 4/4] ima: Differentiate auditing policy rules from "audit" actions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 3/4] ima: Do not audit if CONFIG_INTEGRITY_AUDIT is not set
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 0/8] kexec/firmware: support system wide policy requiring signatures
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 1/4] ima: Call audit_log_string() rather than logging it untrusted
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 4/4] ima: Differentiate auditing policy rules from "audit" actions
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 2/4] ima: Use audit_log_format() rather than audit_log_string()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 3/4] ima: Do not audit if CONFIG_INTEGRITY_AUDIT is not set
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 0/4] IMA: work on audit records produced by IMA
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v4 2/8] kexec: add call to LSM hook in original kexec_load syscall
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v4 1/8] security: define new LSM hook named security_kernel_load_data
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH] tpm: add support for nonblocking operation
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: add support for nonblocking operation
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/8] kexec/firmware: support system wide policy requiring signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/8] kexec/firmware: support system wide policy requiring signatures
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [GIT PULL] linux-integrity fixes for Linux 4.18 (#2)
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v4 0/8] kexec/firmware: support system wide policy requiring signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4a 8/8] module: replace the existing LSM hook in init_module
- From: Jessica Yu <jeyu@xxxxxxxxxx>
- Re: [PATCH 1/2] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: fix race condition in tpm_common_write()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 5/8] ima: based on policy require signed firmware (sysfs fallback)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] evm: Allow non-SHA1 digital signatures
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH 1/2] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v4 5/8] ima: based on policy require signed firmware (sysfs fallback)
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- Re: [PATCH v4 5/8] ima: based on policy require signed firmware (sysfs fallback)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4a 8/8] module: replace the existing LSM hook in init_module
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH V6] EVM: Allow runtime modification of the set of verified xattrs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 8/8] ima: Differentiate auditing policy rules from "audit" actions
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 8/8] ima: Differentiate auditing policy rules from "audit" actions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 8/8] ima: Differentiate auditing policy rules from "audit" actions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 8/8] ima: Differentiate auditing policy rules from "audit" actions
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [GIT PULL] linux-integrity fixes for Linux 4.18 (#2)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 7/8] ima: based on policy prevent loading firmware (pre-allocated buffer)
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- Re: [RFC PATCH v4 7/8] ima: based on policy prevent loading firmware (pre-allocated buffer)
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- Re: [PATCH v4 5/8] ima: based on policy require signed firmware (sysfs fallback)
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- Re: [PATCH v4 4/8] firmware: add call to LSM hook before firmware sysfs fallback
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- Re: [PATCH] tpm: add support for nonblocking operation
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] tpm: add support for nonblocking operation
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 13/21] ima: use match_string() helper
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- [PATCH] EVM: unlock on error path in evm_read_xattrs()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [PATCH] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: Enabling EVM on NFS mounts
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- Re: [PATCH V6] EVM: Allow runtime modification of the set of verified xattrs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v4a 8/8] module: replace the existing LSM hook in init_module
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 13/21] ima: use match_string() helper
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] EVM: prevent array underflow in evm_write_xattrs()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH][next] EVM: fix memory leak of temporary buffer 'temp'
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 1/4] ima: Call audit_log_string() rather than logging it untrusted
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 4/4] ima: Differentiate auditing policy rules from "audit" actions
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 3/4] ima: Do not audit if CONFIG_INTEGRITY_AUDIT is not set
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/4] ima: Use audit_log_format() rather than audit_log_string()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/4] IMA: work on audit records produced by IMA
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 13/21] ima: use match_string() helper
- From: Yisheng Xie <xieyisheng1@xxxxxxxxxx>
- Re: [PATCH v2] tpm: fix race condition in tpm_common_write()
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 8/8] ima: Differentiate auditing policy rules from "audit" actions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] tpm: separate cmd_ready/go_idle from runtime_pm
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 8/8] ima: Differentiate auditing policy rules from "audit" actions
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH 8/8] ima: Differentiate auditing policy rules from "audit" actions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 8/8] ima: Differentiate auditing policy rules from "audit" actions
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 8/8] ima: Differentiate auditing policy rules from "audit" actions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 8/8] ima: Differentiate auditing policy rules from "audit" actions
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 8/8] ima: Differentiate auditing policy rules from "audit" actions
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 8/8] ima: Differentiate auditing policy rules from "audit" actions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 8/8] ima: Differentiate auditing policy rules from "audit" actions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 5/8] integrity: Add exe= and tty= before res= to integrity audits
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 5/8] integrity: Add exe= and tty= before res= to integrity audits
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 8/8] module: replace the existing LSM hook in init_module
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 8/8] module: replace the existing LSM hook in init_module
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: fix race condition in tpm_common_write()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 8/8] ima: Differentiate auditing policy rules from "audit" actions
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/8] audit: Implement audit_log_tty()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH V4] evm: Allow non-SHA1 digital signatures
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v2] tpm: fix race condition in tpm_common_write()
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2] tpm: fix race condition in tpm_common_write()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 8/8] ima: Differentiate auditing policy rules from "audit" actions
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH 8/8] ima: Differentiate auditing policy rules from "audit" actions
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 8/8] ima: Differentiate auditing policy rules from "audit" actions
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH 8/8] ima: Differentiate auditing policy rules from "audit" actions
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 6/8] integrity: Factor out common part of integrity_audit_msg()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5/8] integrity: Add exe= and tty= before res= to integrity audits
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 8/8] ima: Differentiate auditing policy rules from "audit" actions
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH 8/8] ima: Differentiate auditing policy rules from "audit" actions
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH 5/8] integrity: Add exe= and tty= before res= to integrity audits
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: fix race condition in tpm_common_write()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: fix race condition in tpm_common_write()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- RE: [PATCH] tpm: separate cmd_ready/go_idle from runtime_pm
- From: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
- Re: [PATCH] tpm: separate cmd_ready/go_idle from runtime_pm
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 8/8] module: replace the existing LSM hook in init_module
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v4 8/8] module: replace the existing LSM hook in init_module
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 8/8] module: replace the existing LSM hook in init_module
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5/8] integrity: Add exe= and tty= before res= to integrity audits
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 8/8] module: replace the existing LSM hook in init_module
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 5/8] integrity: Add exe= and tty= before res= to integrity audits
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 5/8] integrity: Add exe= and tty= before res= to integrity audits
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH 6/8] integrity: Factor out common part of integrity_audit_msg()
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH 8/8] ima: Differentiate auditing policy rules from "audit" actions
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH 5/8] integrity: Add exe= and tty= before res= to integrity audits
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 4/8] audit: Allow others to call audit_log_d_path_exe()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]