Linux Integrity
[Prev Page][Next Page]
- Re: [PATCH] tpm: require to compile as part of the kernel
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: require to compile as part of the kernel
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH] tpm: require to compile as part of the kernel
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 0/5] Have IMA find and use a tpm_chip until system shutdown
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add module parameter for hwrng quality.
- From: "David R. Bild" <david.bild@xxxxxxxxxx>
- [PATCH] tpm: replace TPM_TRANSMIT_RAW with TPM_TRANSMIT_NESTED
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v8] tpm: separate cmd_ready/go_idle from runtime_pm
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 0/5] Have IMA find and use a tpm_chip until system shutdown
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 0/5] Have IMA find and use a tpm_chip until system shutdown
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 3/5] tpm: Convert tpm_find_get_ops() to use tpm_default_chip()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 2/5] tpm: Implement tpm_default_chip() to find a TPM chip
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Allow tpm_tis drivers to set hwrng quality.
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5] tpm: Return the actual size when receiving an unsupported command
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v8] tpm: separate cmd_ready/go_idle from runtime_pm
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Allow tpm_tis drivers to set hwrng quality.
- From: Louis Collard <louiscollard@xxxxxxxxxxxx>
- [PATCH v2] tpm: Allow tpm_tis drivers to set hwrng quality.
- From: Louis Collard <louiscollard@xxxxxxxxxxxx>
- [PATCH v2] tpm: Allow tpm_tis drivers to set hwrng quality.
- From: Louis Collard <louiscollard@xxxxxxxxxxxx>
- Re: [PATCH] integrity: prevent deadlock during digsig verification.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] integrity: prevent deadlock during digsig verification.
- From: Mikhail Kurinnoi <viewizard@xxxxxxxxxxxxx>
- Re: [PATCH] integrity: prevent deadlock during digsig verification.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] integrity: prevent deadlock during digsig verification.
- From: Matthias Gerstner <mgerstner@xxxxxxx>
- Re: [PATCH] integrity: prevent deadlock during digsig verification.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v8] tpm: separate cmd_ready/go_idle from runtime_pm
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- RE: [PATCH v7] tpm: separate cmd_ready/go_idle from runtime_pm
- From: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
- Re: [PATCH v7] tpm: separate cmd_ready/go_idle from runtime_pm
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- RE: [PATCH v7] tpm: separate cmd_ready/go_idle from runtime_pm
- From: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
- Re: [PATCH v7] tpm: separate cmd_ready/go_idle from runtime_pm
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH] integrity: prevent deadlock during digsig verification.
- From: Mikhail Kurinnoi <viewizard@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add module parameter for hwrng quality.
- From: Louis Collard <louiscollard@xxxxxxxxxxxx>
- Re: [PATCH] tpm: Allow tpm_tis drivers to set hwrng quality.
- From: Louis Collard <louiscollard@xxxxxxxxxxxx>
- RE: [PATCH v7] tpm: separate cmd_ready/go_idle from runtime_pm
- From: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
- [PATCH 0/2] Convert trusted keys to find and use the default TPM chip
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] tpm: Implement public tpm_put_chip() to release reference to chip
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] KEYS: trusted: Find tpm_chip and use it until module shutdown
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v7 1/5] tpm: rename tpm_chip_find_get() to tpm_find_get_ops()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v7 0/5] Have IMA find and use a tpm_chip until system shutdown
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v7 2/5] tpm: Implement tpm_default_chip() to find a TPM chip
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v7 4/5] ima: Use tpm_default_chip() and call TPM functions with a tpm_chip
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v7 3/5] tpm: Convert tpm_find_get_ops() to use tpm_default_chip()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v7 5/5] ima: Get rid of ima_used_chip and use ima_tpm_chip != NULL instead
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 3/5] tpm: Convert tpm_find_get_ops() to use tpm_default_chip()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 3/5] tpm: Convert tpm_find_get_ops() to use tpm_default_chip()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 2/5] tpm: Implement tpm_default_chip() to find a TPM chip
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 1/5] tpm: rename tpm_chip_find_get() to tpm_find_get_ops()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 4/5] ima: Use tpm_default_chip() and call TPM functions with a tpm_chip
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 5/5] ima: Get rid of ima_used_chip and use ima_tpm_chip != NULL instead
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 0/5] Have IMA find and use a tpm_chip until system shutdown
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH] ima-evm-utils: add --pcrinit and --pcr options to ima_measurement command
- From: George Wilson <gcwilson@xxxxxxxxxxxxx>
- [PATCH] ima-evm-utils: check the return code from tpm_pcr_read() in ima_measurement()
- From: George Wilson <gcwilson@xxxxxxxxxxxxx>
- [PATCH v5] tpm: Return the actual size when receiving an unsupported command
- From: Ricardo Schwarzmeier <Ricardo.Schwarzmeier@xxxxxxxxxxxx>
- Re: [PATCH v2 10/10] i2c: remove i2c_lock_adapter and use i2c_lock_bus directly
- From: Sekhar Nori <nsekhar@xxxxxx>
- Re: [PATCH v5 5/5] ima: Get rid of ima_used_chip and use ima_tpm_chip != NULL instead
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/5] ima: Use tpm_default_chip() and call TPM functions with a tpm_chip
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/5] tpm: Convert tpm_find_get_ops() to use tpm_default_chip()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/5] tpm: Implement tpm_default_chip() to find a TPM chip
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/5] tpm: rename tpm_chip_find_get() to tpm_find_get_ops()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/5] tpm: rename tpm_chip_find_get() to tpm_find_get_ops()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/10] tpm/tpm_i2c_infineon: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT)
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/10] tpm/tpm_i2c_infineon: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT)
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v5 1/5] tpm: rename tpm_chip_find_get() to tpm_find_get_ops()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 3/5] tpm: Convert tpm_find_get_ops() to use tpm_default_chip()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 4/5] ima: Use tpm_default_chip() and call TPM functions with a tpm_chip
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 2/5] tpm: Implement tpm_default_chip() to find a TPM chip
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 5/5] ima: Get rid of ima_used_chip and use ima_tpm_chip != NULL instead
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 0/5] Have IMA find and use a tpm_chip until system shutdown
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/10] tpm/tpm_i2c_infineon: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT)
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- Re: [PATCH v2 10/10] i2c: remove i2c_lock_adapter and use i2c_lock_bus directly
- From: Jonathan Cameron <jonathan.cameron@xxxxxxxxxx>
- Re: [PATCH v7] tpm: separate cmd_ready/go_idle from runtime_pm
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/5] Have IMA find and use a tpm_chip until system shutdown
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/5] Have IMA find and use a tpm_chip until system shutdown
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/5] Have IMA find and use a tpm_chip until system shutdown
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/10] Split i2c_lock_adapter into i2c_lock_root and i2c_lock_segment
- From: Wolfram Sang <wsa@xxxxxxxxxxxxx>
- RE: [PATCH v6] tpm: separate cmd_ready/go_idle from runtime_pm
- From: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
- RE: [PATCH v7] tpm: separate cmd_ready/go_idle from runtime_pm
- From: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
- Re: [PATCH v6] tpm: separate cmd_ready/go_idle from runtime_pm
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v7] tpm: separate cmd_ready/go_idle from runtime_pm
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v7] tpm: separate cmd_ready/go_idle from runtime_pm
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4] tpm: Return the actual size when receiving an unsupported command
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v4 2/5] tpm: Implement tpm_default_chip() to find a TPM chip
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 1/5] tpm: rename tpm_chip_find_get() to tpm_find_get_ops()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 0/5] Have IMA find and use a tpm_chip until system shutdown
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 3/5] tpm: Convert tpm_find_get_ops() to use tpm_default_chip()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 5/5] ima: Get rid of ima_used_chip and use ima_tpm_chip != NULL instead
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 4/5] ima: Use tpm_default_chip() and call TPM functions with a tpm_chip
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/10] tpm/tpm_i2c_infineon: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT)
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: IMA: Deadlock in ima_appraise_measurement when /bin/kmod carries a digsig in security.evm
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v7] tpm: separate cmd_ready/go_idle from runtime_pm
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- Re: [PATCH v3 2/4] tpm: Implement tpm_chip_find() for other subsystems to find a TPM chip
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v3 2/4] tpm: Implement tpm_chip_find() for other subsystems to find a TPM chip
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/4] tpm: Implement tpm_chip_find() for other subsystems to find a TPM chip
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v3 1/4] tpm: rename tpm_chip_find_get() to tpm_get_ops()
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [USER] [PATCH 1/2] Remove hardcoding of SHA1 in EVM signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: IMA: Deadlock in ima_appraise_measurement when /bin/kmod carries a digsig in security.evm
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 2/4] tpm: Implement tpm_chip_find() for other subsystems to find a TPM chip
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 3/4] ima: Use tpm_chip_find() and call TPM functions with a tpm_chip
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 4/4] ima: Get rid of ima_used_chip and use ima_tpm_chip != NULL instead
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 1/4] tpm: rename tpm_chip_find_get() to tpm_get_ops()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 0/4] Have IMA find and use a tpm_chip until system shutdown
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] ima: Use tpm_chip_find() and access TPM functions using it
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v2 3/4] ima: Use tpm_chip_find() and access TPM functions using it
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v4] MAINTAINERS: Add file patterns for tpm device tree bindings
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v4] tpm: Return the actual size when receiving an unsupported command
- From: Ricardo Schwarzmeier <Ricardo.Schwarzmeier@xxxxxxxxxxxx>
- Re: [PATCH v2 3/4] ima: Use tpm_chip_find() and access TPM functions using it
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v2 3/4] ima: Use tpm_chip_find() and access TPM functions using it
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] ima: Use tpm_chip_find() and access TPM functions using it
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] tpm: Implement tpm_chip_find() and tpm_chip_put() for other subsystems
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v2 1/4] tpm: Implement tpm_chip_find() and tpm_chip_put() for other subsystems
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] tpm: Implement tpm_chip_find() and tpm_chip_put() for other subsystems
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- RE: [PATCH v6] tpm: separate cmd_ready/go_idle from runtime_pm
- From: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
- Re: [PATCH v2 1/4] tpm: Implement tpm_chip_find() and tpm_chip_put() for other subsystems
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] tpm: Implement tpm_chip_find() and tpm_chip_put() for other subsystems
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v2 1/4] tpm: Implement tpm_chip_find() and tpm_chip_put() for other subsystems
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2 1/4] tpm: Implement tpm_chip_find() and tpm_chip_put() for other subsystems
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] tpm: add support for nonblocking operation
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] tpm: Implement tpm_chip_find() and tpm_chip_put() for other subsystems
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] tpm: Implement tpm_chip_find() and tpm_chip_put() for other subsystems
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/6] tpm: Introduce a kref for the tpm_chip
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] tpm: Return the actual size when receiving an unsupported command
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Return the actual size when receiving an unsupported command
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add module parameter for hwrng quality.
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v6] tpm: separate cmd_ready/go_idle from runtime_pm
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] tpm: add support for nonblocking operation
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tstruk@xxxxxxxxx>
- Re: [PATCH v3 0/2] tpm: add support for nonblocking operation
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] tpm: Implement tpm_chip_find() and tpm_chip_put() for other subsystems
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] tpm: Implement tpm_chip_find() and tpm_chip_put() for other subsystems
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH v2 0/4] Have IMA find and use a tpm_chip until system shutdown
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 1/4] tpm: Implement tpm_chip_find() and tpm_chip_put() for other subsystems
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 3/4] ima: Use tpm_chip_find() and access TPM functions using it
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/4] ima: Implement ima_shutdown and register it as a reboot_notifier
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 4/4] ima: Get rid of ima_used_chip and use ima_tpm_chip != NULL instead
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 03/10] input: rohm_bu21023: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT)
- From: Dmitry Torokhov <dmitry.torokhov@xxxxxxxxx>
- Re: [PATCH 1/6] tpm: Introduce a kref for the tpm_chip
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/6] tpm: Introduce a kref for the tpm_chip
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH 1/6] tpm: Introduce a kref for the tpm_chip
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH 4/6] ima: Implement ima_shutdown and register it as a reboot_notifier
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH 6/6] ima: Get rid of ima_used_chip and use ima_tpm_chip != NULL instead
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH 5/6] ima: Use tpm_chip_find() and access TPM functions using it
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH 3/6] tpm: Implement tpm_chip_find() for other subsystems to call
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH 2/6] tpm: Get additional kref with every call to tpm_try_get_ops()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH 0/6] Have IMA find and use a tpm_chip until system shutdown
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3] tpm: Return the actual size when receiving an unsupported command
- From: Ricardo Schwarzmeier <Ricardo.Schwarzmeier@xxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Return the actual size when receiving an unsupported command
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: IMA: Deadlock in ima_appraise_measurement when /bin/kmod carries a digsig in security.evm
- From: Matthias Gerstner <mgerstner@xxxxxxx>
- [PATCH v2] tpm: Return the actual size when receiving an unsupported command
- From: Ricardo Schwarzmeier <Ricardo.Schwarzmeier@xxxxxxxxxxxx>
- [PATCH v2 01/10] tpm/tpm_i2c_infineon: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT)
- From: Peter Rosin <peda@xxxxxxxxxx>
- [PATCH v2 05/10] media: drxk_hard: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT)
- From: Peter Rosin <peda@xxxxxxxxxx>
- [PATCH v2 06/10] media: rtl2830: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT)
- From: Peter Rosin <peda@xxxxxxxxxx>
- [PATCH v2 08/10] media: tda18271: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT)
- From: Peter Rosin <peda@xxxxxxxxxx>
- [PATCH v2 03/10] input: rohm_bu21023: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT)
- From: Peter Rosin <peda@xxxxxxxxxx>
- [PATCH v2 10/10] i2c: remove i2c_lock_adapter and use i2c_lock_bus directly
- From: Peter Rosin <peda@xxxxxxxxxx>
- [PATCH v2 07/10] media: tda1004x: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT)
- From: Peter Rosin <peda@xxxxxxxxxx>
- [PATCH v2 09/10] mfd: 88pm860x-i2c: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT)
- From: Peter Rosin <peda@xxxxxxxxxx>
- [PATCH v2 04/10] media: af9013: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT)
- From: Peter Rosin <peda@xxxxxxxxxx>
- [PATCH v2 02/10] i2c: mux: pca9541: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT)
- From: Peter Rosin <peda@xxxxxxxxxx>
- [PATCH v2 00/10] Split i2c_lock_adapter into i2c_lock_root and i2c_lock_segment
- From: Peter Rosin <peda@xxxxxxxxxx>
- Re: [PATCH v3 0/2] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: IMA: Deadlock in ima_appraise_measurement when /bin/kmod carries a digsig in security.evm
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/11] i2c: add helpers for locking the I2C segment
- From: Peter Rosin <peda@xxxxxxxxxx>
- Re: [PATCH 04/11] input: rohm_bu21023: switch to i2c_lock_segment
- From: Dmitry Torokhov <dmitry.torokhov@xxxxxxxxx>
- Re: [PATCH v3 0/2] tpm: add support for nonblocking operation
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 02/11] tpm/tpm_i2c_infineon: switch to i2c_lock_segment
- From: Peter Rosin <peda@xxxxxxxxxx>
- Re: [PATCH 02/11] tpm/tpm_i2c_infineon: switch to i2c_lock_segment
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Return the actual size when receiving an unsupported command
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add module parameter for hwrng quality.
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- RE: [PATCH v6] tpm: separate cmd_ready/go_idle from runtime_pm
- From: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
- Re: [PATCH] tpm: add support for nonblocking operation
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: add support for nonblocking operation
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Allow tpm_tis drivers to set hwrng quality.
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis_spi: Pass the SPI IRQ down to the driver
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add module parameter for hwrng quality.
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6] tpm: separate cmd_ready/go_idle from runtime_pm
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Converting IMA to always use a tpm_chip results in a lock ordering issue
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- IMA: Deadlock in ima_appraise_measurement when /bin/kmod carries a digsig in security.evm
- From: Matthias Gerstner <mgerstner@xxxxxxx>
- Re: [PATCH 01/11] i2c: add helpers for locking the I2C segment
- From: Wolfram Sang <wsa@xxxxxxxxxxxxx>
- Re: [PATCH 01/11] i2c: add helpers for locking the I2C segment
- From: Peter Rosin <peda@xxxxxxxxxx>
- Re: [PATCH 00/11] Split i2c_lock_adapter into i2c_lock_root and i2c_lock_segment
- From: Wolfram Sang <wsa@xxxxxxxxxxxxx>
- Re: [PATCH 01/11] i2c: add helpers for locking the I2C segment
- From: Wolfram Sang <wsa@xxxxxxxxxxxxx>
- Re: [integrity:next-integrity-queued 22/22] security/integrity/evm/evm_crypto.c:93: undefined reference to `hash_algo_name'
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH] tpm: Return the actual size when receiving an unsupported command
- From: Ricardo Schwarzmeier <Ricardo.Schwarzmeier@xxxxxxxxxxxx>
- Re: [integrity:next-integrity-queued 22/22] security/integrity/evm/evm_crypto.c:93: undefined reference to `hash_algo_name'
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH 02/11] tpm/tpm_i2c_infineon: switch to i2c_lock_segment
- From: Peter Rosin <peda@xxxxxxxxxx>
- [PATCH 03/11] i2c: mux: pca9541: switch to i2c_lock_segment
- From: Peter Rosin <peda@xxxxxxxxxx>
- [PATCH 04/11] input: rohm_bu21023: switch to i2c_lock_segment
- From: Peter Rosin <peda@xxxxxxxxxx>
- [PATCH 05/11] media: af9013: switch to i2c_lock_segment
- From: Peter Rosin <peda@xxxxxxxxxx>
- [PATCH 08/11] media: tda1004x: switch to i2c_lock_segment
- From: Peter Rosin <peda@xxxxxxxxxx>
- [PATCH 09/11] media: tda18271: switch to i2c_lock_segment
- From: Peter Rosin <peda@xxxxxxxxxx>
- [PATCH 10/11] mfd: 88pm860x-i2c: switch to i2c_lock_segment
- From: Peter Rosin <peda@xxxxxxxxxx>
- [PATCH 11/11] i2c: rename i2c_lock_adapter to i2c_lock_root
- From: Peter Rosin <peda@xxxxxxxxxx>
- [PATCH 07/11] media: rtl2830: switch to i2c_lock_segment
- From: Peter Rosin <peda@xxxxxxxxxx>
- [PATCH 06/11] media: drxk_hard: switch to i2c_lock_segment
- From: Peter Rosin <peda@xxxxxxxxxx>
- [PATCH 01/11] i2c: add helpers for locking the I2C segment
- From: Peter Rosin <peda@xxxxxxxxxx>
- [PATCH 00/11] Split i2c_lock_adapter into i2c_lock_root and i2c_lock_segment
- From: Peter Rosin <peda@xxxxxxxxxx>
- Re: [USER] [PATCH 2/2] Add security.apparmor to the set of extended attributes used by EVM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [USER] [PATCH 2/2] Add security.apparmor to the set of extended attributes used by EVM
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [USER] [PATCH 1/2] Remove hardcoding of SHA1 in EVM signatures
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [-next PATCH] security: use octal not symbolic permissions
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [-next PATCH] security: use octal not symbolic permissions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [-next PATCH] security: use octal not symbolic permissions
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [-next PATCH] security: use octal not symbolic permissions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [-next PATCH] security: use octal not symbolic permissions
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH v3 2/2] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v3 2/2] tpm: add support for nonblocking operation
- From: J Freyensee <why2jjj.linux@xxxxxxxxx>
- Re: [-next PATCH] security: use octal not symbolic permissions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [-next PATCH] security: use octal not symbolic permissions
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [-next PATCH] security: use octal not symbolic permissions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [-next PATCH] security: use octal not symbolic permissions
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH V3 1/2] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [USER] [PATCH 1/2] Remove hardcoding of SHA1 in EVM signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH V3 1/2] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V2 1/2] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [-next PATCH] security: use octal not symbolic permissions
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [USER] [PATCH 2/2] Add security.apparmor to the set of extended attributes used by EVM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [-next PATCH] security: use octal not symbolic permissions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [-next PATCH] security: use octal not symbolic permissions
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [-next PATCH] security: use octal not symbolic permissions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [-next PATCH] security: use octal not symbolic permissions
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH v3 2/2] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v3 1/2] tpm: add ptr to the tpm_space struct to file_priv
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v3 0/2] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH V3 1/2] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v2 2/2] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2 2/2] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2 2/2] tpm: add support for nonblocking operation
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH] tpm: add support for nonblocking operation
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/2] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v2 1/2] tpm: add ptr to the tpm_space struct to file_priv
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v2 2/2] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [-next PATCH] security: use octal not symbolic permissions
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [-next PATCH] security: use octal not symbolic permissions
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH] tpm_tis_spi: Pass the SPI IRQ down to the driver
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH V3 2/2] evm: Allow non-SHA1 digital signatures
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH V3 1/2] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Support additional signature types in EVM
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] tpm: add support for nonblocking operation
- From: flihp <flihp@xxxxxxxxx>
- Re: [PATCH] tpm_tis_spi: Pass the SPI IRQ down to the driver
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH] tpm: Allow tpm_tis drivers to set hwrng quality.
- From: Louis Collard <louiscollard@xxxxxxxxxxxx>
- [PATCH] tpm_tis_spi: Pass the SPI IRQ down to the driver
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH] tpm_tis_spi: Pass the SPI IRQ down to the driver
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- [PATCH] tpm: Add module parameter for hwrng quality.
- From: Louis Collard <louiscollard@xxxxxxxxxxxx>
- [PATCH v6] tpm: separate cmd_ready/go_idle from runtime_pm
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- Re: [PATCH V2 2/2] evm: Allow non-SHA1 digital signatures
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] tpm: separate cmd_ready/go_idle from runtime_pm
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH V2 2/2] evm: Allow non-SHA1 digital signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [Fwd: Re: Fwd: New Version Notification for draft-cel-nfsv4-linux-seclabel-xtensions-00.txt]
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- RE: [PATCH] tpm: separate cmd_ready/go_idle from runtime_pm
- From: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
- Re: [PATCH] tpm: separate cmd_ready/go_idle from runtime_pm
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 7/8] ima: based on policy prevent loading firmware (pre-allocated buffer)
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- [PATCH V2 2/2] evm: Allow non-SHA1 digital signatures
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH V2 1/2] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] ima-evm-utils: attr/xattr.h is deprecated. Use sys/xattr.h instead
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 4/4] ima: Differentiate auditing policy rules from "audit" actions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: violations and invalidated PCR value
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- RE: [PATCH] tpm: separate cmd_ready/go_idle from runtime_pm
- From: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
- Re: [RFC PATCH v4 7/8] ima: based on policy prevent loading firmware (pre-allocated buffer)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v4a 8/8] module: replace the existing LSM hook in init_module
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 7/8] ima: based on policy prevent loading firmware (pre-allocated buffer)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4a 8/8] module: replace the existing LSM hook in init_module
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 4/4] ima: Differentiate auditing policy rules from "audit" actions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4a 8/8] module: replace the existing LSM hook in init_module
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- violations and invalidated PCR value
- From: "Magalhaes, Guilherme (Brazil R&D-CL)" <guilherme.magalhaes@xxxxxxx>
- Re: [PATCH v4a 8/8] module: replace the existing LSM hook in init_module
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 1/4] tpm: migrate tpm2_shutdown() to use struct tpm_buf
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 4/4] ima: Differentiate auditing policy rules from "audit" actions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/8] kexec/firmware: support system wide policy requiring signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/8] kexec/firmware: support system wide policy requiring signatures
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 0/8] kexec/firmware: support system wide policy requiring signatures
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v4 0/8] kexec/firmware: support system wide policy requiring signatures
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 0/8] kexec/firmware: support system wide policy requiring signatures
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v3 4/4] ima: Differentiate auditing policy rules from "audit" actions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 3/4] ima: Do not audit if CONFIG_INTEGRITY_AUDIT is not set
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 0/8] kexec/firmware: support system wide policy requiring signatures
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 1/4] ima: Call audit_log_string() rather than logging it untrusted
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 4/4] ima: Differentiate auditing policy rules from "audit" actions
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 2/4] ima: Use audit_log_format() rather than audit_log_string()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 3/4] ima: Do not audit if CONFIG_INTEGRITY_AUDIT is not set
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 0/4] IMA: work on audit records produced by IMA
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v4 2/8] kexec: add call to LSM hook in original kexec_load syscall
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v4 1/8] security: define new LSM hook named security_kernel_load_data
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH] tpm: add support for nonblocking operation
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: add support for nonblocking operation
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/8] kexec/firmware: support system wide policy requiring signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/8] kexec/firmware: support system wide policy requiring signatures
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [GIT PULL] linux-integrity fixes for Linux 4.18 (#2)
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v4 0/8] kexec/firmware: support system wide policy requiring signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4a 8/8] module: replace the existing LSM hook in init_module
- From: Jessica Yu <jeyu@xxxxxxxxxx>
- Re: [PATCH 1/2] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: fix race condition in tpm_common_write()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 5/8] ima: based on policy require signed firmware (sysfs fallback)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] evm: Allow non-SHA1 digital signatures
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH 1/2] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v4 5/8] ima: based on policy require signed firmware (sysfs fallback)
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- Re: [PATCH v4 5/8] ima: based on policy require signed firmware (sysfs fallback)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4a 8/8] module: replace the existing LSM hook in init_module
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH V6] EVM: Allow runtime modification of the set of verified xattrs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 8/8] ima: Differentiate auditing policy rules from "audit" actions
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 8/8] ima: Differentiate auditing policy rules from "audit" actions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 8/8] ima: Differentiate auditing policy rules from "audit" actions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 8/8] ima: Differentiate auditing policy rules from "audit" actions
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [GIT PULL] linux-integrity fixes for Linux 4.18 (#2)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 7/8] ima: based on policy prevent loading firmware (pre-allocated buffer)
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- Re: [RFC PATCH v4 7/8] ima: based on policy prevent loading firmware (pre-allocated buffer)
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- Re: [PATCH v4 5/8] ima: based on policy require signed firmware (sysfs fallback)
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- Re: [PATCH v4 4/8] firmware: add call to LSM hook before firmware sysfs fallback
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- Re: [PATCH] tpm: add support for nonblocking operation
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] tpm: add support for nonblocking operation
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 13/21] ima: use match_string() helper
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- [PATCH] EVM: unlock on error path in evm_read_xattrs()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [PATCH] tpm: add support for nonblocking operation
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: Enabling EVM on NFS mounts
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- Re: [PATCH V6] EVM: Allow runtime modification of the set of verified xattrs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v4a 8/8] module: replace the existing LSM hook in init_module
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 13/21] ima: use match_string() helper
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] EVM: prevent array underflow in evm_write_xattrs()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH][next] EVM: fix memory leak of temporary buffer 'temp'
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 1/4] ima: Call audit_log_string() rather than logging it untrusted
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 4/4] ima: Differentiate auditing policy rules from "audit" actions
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 3/4] ima: Do not audit if CONFIG_INTEGRITY_AUDIT is not set
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/4] ima: Use audit_log_format() rather than audit_log_string()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/4] IMA: work on audit records produced by IMA
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 13/21] ima: use match_string() helper
- From: Yisheng Xie <xieyisheng1@xxxxxxxxxx>
- Re: [PATCH v2] tpm: fix race condition in tpm_common_write()
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 8/8] ima: Differentiate auditing policy rules from "audit" actions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] tpm: separate cmd_ready/go_idle from runtime_pm
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 8/8] ima: Differentiate auditing policy rules from "audit" actions
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH 8/8] ima: Differentiate auditing policy rules from "audit" actions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 8/8] ima: Differentiate auditing policy rules from "audit" actions
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 8/8] ima: Differentiate auditing policy rules from "audit" actions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 8/8] ima: Differentiate auditing policy rules from "audit" actions
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 8/8] ima: Differentiate auditing policy rules from "audit" actions
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 8/8] ima: Differentiate auditing policy rules from "audit" actions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 8/8] ima: Differentiate auditing policy rules from "audit" actions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 5/8] integrity: Add exe= and tty= before res= to integrity audits
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 5/8] integrity: Add exe= and tty= before res= to integrity audits
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 8/8] module: replace the existing LSM hook in init_module
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 8/8] module: replace the existing LSM hook in init_module
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: fix race condition in tpm_common_write()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH] evm: Don't deadlock if a crypto algorithm is unavailable
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 8/8] ima: Differentiate auditing policy rules from "audit" actions
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/8] audit: Implement audit_log_tty()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH V4] evm: Allow non-SHA1 digital signatures
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v2] tpm: fix race condition in tpm_common_write()
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2] tpm: fix race condition in tpm_common_write()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 8/8] ima: Differentiate auditing policy rules from "audit" actions
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH 8/8] ima: Differentiate auditing policy rules from "audit" actions
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 8/8] ima: Differentiate auditing policy rules from "audit" actions
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH 8/8] ima: Differentiate auditing policy rules from "audit" actions
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 6/8] integrity: Factor out common part of integrity_audit_msg()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5/8] integrity: Add exe= and tty= before res= to integrity audits
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 8/8] ima: Differentiate auditing policy rules from "audit" actions
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH 8/8] ima: Differentiate auditing policy rules from "audit" actions
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH 5/8] integrity: Add exe= and tty= before res= to integrity audits
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: fix race condition in tpm_common_write()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: fix race condition in tpm_common_write()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- RE: [PATCH] tpm: separate cmd_ready/go_idle from runtime_pm
- From: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
- Re: [PATCH] tpm: separate cmd_ready/go_idle from runtime_pm
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 8/8] module: replace the existing LSM hook in init_module
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v4 8/8] module: replace the existing LSM hook in init_module
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 8/8] module: replace the existing LSM hook in init_module
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5/8] integrity: Add exe= and tty= before res= to integrity audits
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 8/8] module: replace the existing LSM hook in init_module
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 5/8] integrity: Add exe= and tty= before res= to integrity audits
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 5/8] integrity: Add exe= and tty= before res= to integrity audits
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH 6/8] integrity: Factor out common part of integrity_audit_msg()
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH 8/8] ima: Differentiate auditing policy rules from "audit" actions
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH 5/8] integrity: Add exe= and tty= before res= to integrity audits
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 4/8] audit: Allow others to call audit_log_d_path_exe()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/7] security: rename security_kernel_read_file() hook
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 3/8] audit: Implement audit_log_tty()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/7] security: rename security_kernel_read_file() hook
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 2/8] ima: Use audit_log_format() rather than audit_log_string()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/8] ima: Call audit_log_string() rather than logging it untrusted
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V4] evm: Allow non-SHA1 digital signatures
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH v4 2/8] kexec: add call to LSM hook in original kexec_load syscall
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 3/8] ima: based on policy require signed kexec kernel images
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 4/8] firmware: add call to LSM hook before firmware sysfs fallback
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 5/8] ima: based on policy require signed firmware (sysfs fallback)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 1/8] security: define new LSM hook named security_kernel_load_data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 8/8] module: replace the existing LSM hook in init_module
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [RFC PATCH v4 7/8] ima: based on policy prevent loading firmware (pre-allocated buffer)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 6/8] ima: add build time policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 0/8] kexec/firmware: support system wide policy requiring signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH] EVM: prevent array underflow in evm_write_xattrs()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH] EVM: Fix null dereference on xattr when xattr fails to allocate
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] EVM: Fix null dereference on xattr when xattr fails to allocate
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] EVM: Fix null dereference on xattr when xattr fails to allocate
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [PATCH 4.9 135/329] integrity/security: fix digsig.c build error with header file
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.14 128/496] integrity/security: fix digsig.c build error with header file
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: verify locality released before returning from release_locality
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: verify locality released before returning from release_locality
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH] EVM: Fix null dereference on xattr when xattr fails to allocate
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- [PATCH][next] EVM: fix memory leak of temporary buffer 'temp'
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/4] tpm: migrate tpm2_shutdown() to use struct tpm_buf
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v3 2/2] usb: misc: xapea00x: perform platform initialization of TPM
- From: Ken Goldman <kgold@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] usb: misc: xapea00x: perform platform initialization of TPM
- From: Ken Goldman <kgold@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/7] security: rename security_kernel_read_file() hook
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v3 1/7] security: rename security_kernel_read_file() hook
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v3 1/7] security: rename security_kernel_read_file() hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/7] security: rename security_kernel_read_file() hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/7] kexec: add call to LSM hook in original kexec_load syscall
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v3 1/7] security: rename security_kernel_read_file() hook
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH 5/8] integrity: Add exe= and tty= before res= to integrity audits
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH 4/8] audit: Allow others to call audit_log_d_path_exe()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH 6/8] integrity: Factor out common part of integrity_audit_msg()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/8] ima: Call audit_log_string() rather than logging it untrusted
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH 7/8] ima: Do not audit if CONFIG_INTEGRITY_AUDIT is not set
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH 8/8] ima: Differentiate auditing policy rules from "audit" actions
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH 2/8] ima: Use audit_log_format() rather than audit_log_string()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH 3/8] audit: Implement audit_log_tty()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH 0/8] IMA: work on audit records produced by IMA
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH] ima-evm-utils: attr/xattr.h is deprecated. Use sys/xattr.h instead
- From: Lars Wendler <polynomial-c@xxxxxxxxxx>
- [PATCH v3 6/7] ima: add build time policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [RFC PATCH v3 7/7] ima: based on policy prevent loading firmware (pre-allocated buffer)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 5/7] ima: based on policy require signed firmware (sysfs fallback)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 1/7] security: rename security_kernel_read_file() hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 4/7] firmware: add call to LSM hook before firmware sysfs fallback
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 3/7] ima: based on policy require signed kexec kernel images
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 2/7] kexec: add call to LSM hook in original kexec_load syscall
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 0/7] kexec/firmware: support system wide policy requiring signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: fix race condition in tpm_common_write()
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] tpm: fix race condition in tpm_common_write()
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] IMA: use list_splice_tail_init_rcu() instead of its open coded variant
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 25/33] ima: use match_string() helper
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: fix race condition in tpm_common_write()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- RE: [PATCH] tpm: separate cmd_ready/go_idle from runtime_pm
- From: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
- Re: [PATCH] tpm: fix race condition in tpm_common_write()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: separate cmd_ready/go_idle from runtime_pm
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/4] tpm: migrate tpm2_shutdown() to use struct tpm_buf
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for v4.18
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [GIT PULL] linux-integrity for Linux 4.18
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH v7 02/14] PKCS#7: Refactor verify_pkcs7_signature() and add pkcs7_get_message_sig()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v7 05/14] integrity: Introduce integrity_keyring_from_id()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v7 04/14] integrity: Introduce struct evm_xattr
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v7 06/14] integrity: Introduce asymmetric_sig_has_known_key()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v7 07/14] integrity: Select CONFIG_KEYS instead of depending on it
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v7 08/14] ima: Introduce is_signed()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v7 09/14] ima: Export func_tokens
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v7 10/14] ima: Add modsig appraise_type option for module-style appended signatures
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v7 11/14] ima: Implement support for module-style appended signatures
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v7 13/14] ima: Write modsig to the measurement list
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v7 14/14] ima: Store the measurement again when appraising a modsig
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v7 12/14] ima: Add new "d-sig" template field
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v7 03/14] PKCS#7: Introduce pkcs7_get_digest()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v7 01/14] MODSIGN: Export module signature definitions
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v7 00/14] Appended signatures support for IMA appraisal
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v2] tpm: fix race condition in tpm_common_write()
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [GIT PULL] linux-integrity for Linux 4.18
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: fix race condition in tpm_common_write()
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] tpm: fix race condition in tpm_common_write()
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH] tpm: fix race condition in tpm_common_write()
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- [PATCH] IMA: use list_splice_tail_init_rcu() instead of its open coded variant
- From: Petko Manolov <petkan@xxxxxxxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- RE: [PATCH] tpm: separate cmd_ready/go_idle from runtime_pm
- From: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
- Re: [PATCH] tpm: separate cmd_ready/go_idle from runtime_pm
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Enabling EVM on NFS mounts
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- [PATCH 25/33] ima: use match_string() helper
- From: Yisheng Xie <xieyisheng1@xxxxxxxxxx>
- Re: [PATCH v4 3/4] tpm: migrate tpm2_get_tpm_pt() to use struct tpm_buf
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v4 2/4] tpm: migrate tpm2_probe() to use struct tpm_buf
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v4 1/4] tpm: migrate tpm2_shutdown() to use struct tpm_buf
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v2 3/9] security: define security_kernel_read_blob() wrapper
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for v4.18
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v2 3/9] security: define security_kernel_read_blob() wrapper
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: Cleaning up IMA
- From: Mark Baushke <mdb@xxxxxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: Cleaning up IMA
- From: Petko Manolov <petkan@xxxxxxxxxxxxx>
- Re: [PATCH V4] evm: Allow non-SHA1 digital signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH v2 3/9] security: define security_kernel_read_blob() wrapper
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/9] security: define security_kernel_read_blob() wrapper
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] ima: Reflect correct permissions for policy
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/9] security: define security_kernel_read_blob() wrapper
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 3/4] tpm: migrate tpm2_get_tpm_pt() to use struct tpm_buf
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 4/4] tpm: migrate tpm2_get_random() to use struct tpm_buf
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for v4.18
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [GIT PULL] tpmdd updates for v4.18
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] tpm: check selftest status before retrying full selftest
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 3/4] tpm: migrate tpm2_get_tpm_pt() to use struct tpm_buf
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/4] tpm: migrate tpm2_probe() to use struct tpm_buf
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/4] tpm: migrate tpm2_shutdown() to use struct tpm_buf
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 4/4] tpm: migrate tpm2_get_random() to use struct tpm_buf
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/9] security: define security_kernel_read_blob() wrapper
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2 3/9] security: define security_kernel_read_blob() wrapper
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH ghak81 V3 3/3] audit: collect audit task parameters
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH ghak81 V3 2/3] audit: normalize loginuid read access
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH ghak81 V3 1/3] audit: use new audit_context access funciton for seccomp_actions_logged
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V4] evm: Allow non-SHA1 digital signatures
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH v2 2/9] ima: fix updating the ima_appraise flag
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 1/9] ima: based on policy verify firmware signatures (pre-allocated buffer)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 4/9] kexec: add call to LSM hook in original kexec_load syscall
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 3/9] security: define security_kernel_read_blob() wrapper
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 5/9] ima: based on policy require signed kexec kernel images
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 7/9] ima: based on policy require signed firmware (sysfs fallback)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 6/9] firmware: add call to LSM hook before firmware sysfs fallback
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 8/9] ima: add build time policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 9/9] ima: based on policy prevent loading firmware (pre-allocated buffer)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/9] kexec/firmware: support system wide policy requiring signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] audit: add containerid support for IMA-audit
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] ima: Fix pr_fmt() redefinition
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH] ima: Fix pr_fmt() redefinition
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH] ima: Fix pr_fmt() redefinition
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH ghak81 V3 3/3] audit: collect audit task parameters
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH V4] evm: Allow non-SHA1 digital signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 3/5] ima: differentiate auditing policy rules from "audit" actions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] ima: Reflect correct permissions for policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH V6] EVM: Allow runtime modification of the set of verified xattrs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH] tpm: separate cmd_ready/go_idle from runtime_pm
- From: Tomas Winkler <tomas.winkler@xxxxxxxxx>
- Re: [RFC PATCH v4 3/5] ima: differentiate auditing policy rules from "audit" actions
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/2] tpm: reduce poll sleep time in tpm_transmit()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH ghak81 V3 0/3] audit: group task params
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak81 V3 1/3] audit: use new audit_context access funciton for seccomp_actions_logged
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak81 V3 2/3] audit: normalize loginuid read access
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak81 V3 3/3] audit: collect audit task parameters
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH v4 0/2] tpm: improving granularity in poll sleep times
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 1/2] tpm: reduce poll sleep time in tpm_transmit()
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 2/2] tpm: reduce polling time to usecs for even finer granularity
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH V4] evm: Allow non-SHA1 digital signatures
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH V6] EVM: Allow runtime modification of the set of verified xattrs
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V3] evm: Allow non-SHA1 digital signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 3/5] ima: differentiate auditing policy rules from "audit" actions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/6] firmware: differentiate between signed regulatory.db and other firmware
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/6] firmware: differentiate between signed regulatory.db and other firmware
- From: Josh Boyer <jwboyer@xxxxxxxxxx>
- [PATCH v3] tpm: check selftest status before retrying full selftest
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH ghak81 RFC V2 3/5] audit: use inline function to get audit context
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH 3/6] firmware: differentiate between signed regulatory.db and other firmware
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- Re: [PATCH ghak81 RFC V2 3/5] audit: use inline function to get audit context
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH 3/6] firmware: differentiate between signed regulatory.db and other firmware
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH V5 3/3] EVM: Allow runtime modification of the set of verified xattrs
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH V3] evm: Allow non-SHA1 digital signatures
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH ghak81 RFC V2 5/5] audit: collect audit task parameters
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH ghak81 RFC V2 4/5] audit: use inline function to set audit context
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH ghak81 RFC V2 3/5] audit: use inline function to get audit context
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V5 3/3] EVM: Allow runtime modification of the set of verified xattrs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH ghak81 RFC V2 2/5] audit: convert sessionid unset to a macro
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] usb: misc: xapea00x: perform platform initialization of TPM
- From: "David R. Bild" <david.bild@xxxxxxxxxx>
- Re: [PATCH v3 2/2] usb: misc: xapea00x: perform platform initialization of TPM
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v3 2/2] usb: misc: xapea00x: perform platform initialization of TPM
- From: "David R. Bild" <david.bild@xxxxxxxxxx>
- Re: [PATCH ghak81 RFC V2 1/5] audit: normalize loginuid read access
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] usb: misc: xapea00x: perform platform initialization of TPM
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH 3/6] firmware: differentiate between signed regulatory.db and other firmware
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- Re: [PATCH V5 3/3] EVM: Allow runtime modification of the set of verified xattrs
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V5 3/3] EVM: Allow runtime modification of the set of verified xattrs
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V5 3/3] EVM: Allow runtime modification of the set of verified xattrs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH V5 3/3] EVM: Allow runtime modification of the set of verified xattrs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH V5 3/3] EVM: Allow runtime modification of the set of verified xattrs
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 3/6] firmware: differentiate between signed regulatory.db and other firmware
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH V2] evm: Allow non-SHA1 digital signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] tpm: replace kmalloc() + memcpy() with kmemdup()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] tpm: replace kmalloc() + memcpy() with kmemdup()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: fix use after free in tpm2_load_context
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] tpm: reduce polling time to usecs for even finer granularity
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: reduce poll sleep time in tpm_transmit()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: reduce poll sleep time in tpm_transmit()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: check selftest status before retrying full selftest
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: reduce poll sleep time in tpm_transmit()
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: verify locality released before returning from release_locality
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH V5 3/3] EVM: Allow runtime modification of the set of verified xattrs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] usb: misc: xapea00x: perform platform initialization of TPM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] usb: misc: xapea00x: perform platform initialization of TPM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH ghak81 RFC V2 1/5] audit: normalize loginuid read access
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak81 RFC V2 3/5] audit: use inline function to get audit context
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak81 RFC V2 2/5] audit: convert sessionid unset to a macro
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak81 RFC V2 4/5] audit: use inline function to set audit context
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak81 RFC V2 5/5] audit: collect audit task parameters
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak81 RFC V2 0/5] audit: group task params
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH V5 3/3] EVM: Allow runtime modification of the set of verified xattrs
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH V5 2/3] EVM: turn evm_config_xattrnames into a list
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH V5 1/3] integrity: Add an integrity directory in securityfs
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH ghak81 RFC V1 1/5] audit: normalize loginuid read access
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH 3/6] firmware: differentiate between signed regulatory.db and other firmware
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- Re: [PATCH V4 2/2] EVM: Allow runtime modification of the set of verified xattrs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH V4 2/2] EVM: Allow runtime modification of the set of verified xattrs
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: verify locality released before returning from release_locality
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- [PATCH V2] evm: Allow non-SHA1 digital signatures
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V4 2/2] EVM: Allow runtime modification of the set of verified xattrs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [RFC PATCH v4 4/5] ima: extend IMA audit policy rules with attribute to audit namespaces
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [RFC PATCH v4 2/5] ima: Add ns_status for storing namespaced iint data
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [RFC PATCH v4 1/5] ima: Add IMA namespace support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [RFC PATCH v4 3/5] ima: differentiate auditing policy rules from "audit" actions
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [RFC PATCH v4 5/5] ima: namespace audit status flags
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [RFC PATCH v4 0/5] ima: Namespacing IMA
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: verify locality released before returning from release_locality
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: tpm_crb: relinquish locality on error path.
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/6] firmware: differentiate between signed regulatory.db and other firmware
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH V4 2/2] EVM: Allow runtime modification of the set of verified xattrs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH V4 1/2] EVM: turn evm_config_xattrnames into a list
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] ima: Remove unused variable ima_initialized
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/4] tpm: Move eventlog files to a subdirectory
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH 1/3] ima: based on the "secure_boot" policy limit syscalls
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH 2/3] kexec: call LSM hook for kexec_load syscall
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH 3/3] ima: based on policy require signed kexec kernel images
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH 0/3] kexec: limit kexec_load syscall
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/6] firmware: differentiate between signed regulatory.db and other firmware
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- Re: [PATCH v2 net-next 1/4] umh: introduce fork_usermode_blob() helper
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH v2 net-next 1/4] umh: introduce fork_usermode_blob() helper
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH ghak81 RFC V1 5/5] audit: collect audit task parameters
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH ghak81 RFC V1 1/5] audit: normalize loginuid read access
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH ghak81 RFC V1 3/5] audit: use inline function to get audit context
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH V4 2/2] EVM: Allow runtime modification of the set of verified xattrs
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH V4 1/2] EVM: turn evm_config_xattrnames into a list
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 17/18] security: encrypted-keys: Remove pr_fmt duplicate logging prefixes
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] ima: Remove unused variable ima_initialized
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] evm: Allow non-SHA1 digital signatures
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] evm: Allow non-SHA1 digital signatures
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH 00/18] Convert default pr_fmt from empty to KBUILD_MODNAME
- From: Joe Perches <joe@xxxxxxxxxxx>
- [PATCH 17/18] security: encrypted-keys: Remove pr_fmt duplicate logging prefixes
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH v3 2/2] usb: misc: xapea00x: perform platform initialization of TPM
- From: "David R. Bild" <david.bild@xxxxxxxxxx>
- [PATCH] ima: Remove unused variable ima_initialized
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v3 2/2] usb: misc: xapea00x: perform platform initialization of TPM
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] usb: misc: xapea00x: perform platform initialization of TPM
- From: "David R. Bild" <david.bild@xxxxxxxxxx>
- Re: [PATCH v3 2/2] usb: misc: xapea00x: perform platform initialization of TPM
- From: "David R. Bild" <david.bild@xxxxxxxxxx>
- Re: [PATCH v3 2/2] usb: misc: xapea00x: perform platform initialization of TPM
- From: "David R. Bild" <david.bild@xxxxxxxxxx>
- Re: [PATCH v3 2/2] usb: misc: xapea00x: perform platform initialization of TPM
- From: "David R. Bild" <david.bild@xxxxxxxxxx>
- Re: [PATCH v3 2/2] usb: misc: xapea00x: perform platform initialization of TPM
- From: "David R. Bild" <david.bild@xxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: reduce poll sleep time in tpm_transmit()
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: verify locality released before returning from release_locality
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH 3/6] firmware: differentiate between signed regulatory.db and other firmware
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] usb: misc: xapea00x: perform platform initialization of TPM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] usb: misc: xapea00x: perform platform initialization of TPM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] usb: misc: xapea00x: perform platform initialization of TPM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] usb: misc: xapea00x: perform platform initialization of TPM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/4] tpm: Move eventlog files to a subdirectory
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] evm: Allow non-SHA1 digital signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/6] firmware: differentiate between signed regulatory.db and other firmware
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- Re: [PATCH 3/6] firmware: differentiate between signed regulatory.db and other firmware
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] evm: Allow non-SHA1 digital signatures
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- RE: [PATCH] tpm: tpm_crb: relinquish locality on error path.
- From: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
- Re: [PATCH 3/6] firmware: differentiate between signed regulatory.db and other firmware
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- [PATCH V4 2/2] EVM: Allow runtime modification of the set of verified xattrs
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH V4 1/2] EVM: turn evm_config_xattrnames into a list
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 3/6] firmware: differentiate between signed regulatory.db and other firmware
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] tpm: replace kmalloc() + memcpy() with kmemdup()
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 1/2] tpm: replace kmalloc() + memcpy() with kmemdup()
- From: James Morris <jmorris@xxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]