Linux Integrity
[Prev Page][Next Page]
- [PATCH v2] tpm: return a TPM_RC_COMMAND_CODE response if a command isn't implemented
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH V3 2/2] IMA: Support using new creds in appraisal policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH V3 2/2] IMA: Support using new creds in appraisal policy
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V3 2/2] IMA: Support using new creds in appraisal policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH V3 2/2] IMA: Support using new creds in appraisal policy
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V3 2/2] IMA: Support using new creds in appraisal policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add explicit chip->ops locking for sysfs attributes.
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/4] tpm: ignore burstcount to improve tpm_tis send() performance
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: return a TPM_RC_COMMAND_CODE response if a command isn't implemented
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH] tpm: return a TPM_RC_COMMAND_CODE response if a command isn't implemented
- From: Philip Tricca <flihp@xxxxxxxxx>
- Re: [PATCH] tpm: Add explicit chip->ops locking for sysfs attributes.
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH v4 2/4] tpm: ignore burstcount to improve tpm_tis send() performance
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/4] tpm: ignore burstcount to improve tpm_tis send() performance
- From: Leendert van Doorn <leendert@xxxxxxxxxxxxxx>
- [PATCH] tpm: return a TPM_RC_COMMAND_CODE response if a command isn't implemented
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: FW: [RFC PATCH] tpm: don't return -EINVAL if TPM command validation fails
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [RFC PATCH] tpm: don't return -EINVAL if TPM command validation fails
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH v4 2/4] tpm: ignore burstcount to improve tpm_tis send() performance
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/4] tpm: ignore burstcount to improve tpm_tis send() performance
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: FW: [RFC PATCH] tpm: don't return -EINVAL if TPM command validation fails
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: FW: [RFC PATCH] tpm: don't return -EINVAL if TPM command validation fails
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH] tpm: don't return -EINVAL if TPM command validation fails
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH] tpm: don't return -EINVAL if TPM command validation fails
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH] tpm: don't return -EINVAL if TPM command validation fails
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add explicit chip->ops locking for sysfs attributes.
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- RE: [PATCH v4 2/4] tpm: ignore burstcount to improve tpm_tis send() performance
- From: <Alexander.Steffen@xxxxxxxxxxxx>
- Re: [PATCH v4 2/4] tpm: ignore burstcount to improve tpm_tis send() performance
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- Re: FW: [RFC PATCH] tpm: don't return -EINVAL if TPM command validation fails
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: FW: [RFC PATCH] tpm: don't return -EINVAL if TPM command validation fails
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: FW: [RFC PATCH] tpm: don't return -EINVAL if TPM command validation fails
- From: flihp <flihp@xxxxxxxxx>
- Re: [RFC PATCH] tpm: don't return -EINVAL if TPM command validation fails
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- RE: [PATCH v4 2/4] tpm: ignore burstcount to improve tpm_tis send() performance
- From: <Alexander.Steffen@xxxxxxxxxxxx>
- RE: [RFC PATCH] tpm: don't return -EINVAL if TPM command validation fails
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: [PATCH RFC v3 1/2] tpm: Keep CLKRUN enabled throughout the duration of transmit_cmd()
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- RE: [PATCH RFC v3 1/2] tpm: Keep CLKRUN enabled throughout the duration of transmit_cmd()
- From: "Shaikh, Azhar" <azhar.shaikh@xxxxxxxxx>
- Re: [PATCH] tpm: Add explicit chip->ops locking for sysfs attributes.
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] tpm: Add explicit chip->ops locking for sysfs attributes.
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: IMA appraisal master plan?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: IMA appraisal master plan?
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: IMA appraisal master plan?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] tpm: don't return -EINVAL if TPM command validation fails
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [RFC PATCH] tpm: don't return -EINVAL if TPM command validation fails
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: IMA appraisal master plan?
- From: James Morris <james.l.morris@xxxxxxxxxx>
- Re: IMA appraisal master plan?
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [RFC PATCH] tpm: don't return -EINVAL if TPM command validation fails
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [RFC PATCH] tpm: don't return -EINVAL if TPM command validation fails
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH] tpm: Add explicit chip->ops locking for sysfs attributes.
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add explicit chip->ops locking for sysfs attributes.
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH RFC v3 1/2] tpm: Keep CLKRUN enabled throughout the duration of transmit_cmd()
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH RFC v3 1/2] tpm: Keep CLKRUN enabled throughout the duration of transmit_cmd()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH RFC v3 2/2] tpm_tis: Move ilb_base_addr to tpm_tis_tcg_phy
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH RFC v3 1/2] tpm: Keep CLKRUN enabled throughout the duration of transmit_cmd()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add explicit chip->ops locking for sysfs attributes.
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [RFC PATCH] tpm: don't return -EINVAL if TPM command validation fails
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add explicit chip->ops locking for sysfs attributes.
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH] tpm: Add explicit chip->ops locking for sysfs attributes.
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- RE: [PATCH RFC v3 1/2] tpm: Keep CLKRUN enabled throughout the duration of transmit_cmd()
- From: "Shaikh, Azhar" <azhar.shaikh@xxxxxxxxx>
- Re: [PATCH RFC v3 1/2] tpm: Keep CLKRUN enabled throughout the duration of transmit_cmd()
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- RE: [PATCH RFC v3 1/2] tpm: Keep CLKRUN enabled throughout the duration of transmit_cmd()
- From: "Shaikh, Azhar" <azhar.shaikh@xxxxxxxxx>
- Re: [PATCH RFC v3 1/2] tpm: Keep CLKRUN enabled throughout the duration of transmit_cmd()
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- RE: [PATCH RFC v3 1/2] tpm: Keep CLKRUN enabled throughout the duration of transmit_cmd()
- From: "Shaikh, Azhar" <azhar.shaikh@xxxxxxxxx>
- Re: [PATCH] [RFC] time: Make sure jiffies_to_msecs() preserves non-zero time periods
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH RFC v3 1/2] tpm: Keep CLKRUN enabled throughout the duration of transmit_cmd()
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [RFC PATCH] tpm: don't return -EINVAL if TPM command validation fails
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [RFC PATCH] tpm: don't return -EINVAL if TPM command validation fails
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v2 06/15] ima: add parser of digest lists metadata
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: IMA appraisal master plan?
- From: Patrick Ohly <patrick.ohly@xxxxxxxxx>
- RE: [RFC PATCH] tpm: don't return -EINVAL if TPM command validation fails
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- RE: [PATCH RFC v3 0/2] Fix corner cases with disabling CLKRUN in tpm_tis
- From: "Shaikh, Azhar" <azhar.shaikh@xxxxxxxxx>
- Re: IMA appraisal master plan?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 06/15] ima: add parser of digest lists metadata
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: IMA appraisal master plan?
- From: Patrick Ohly <patrick.ohly@xxxxxxxxx>
- Re: [PATCH v2 06/15] ima: add parser of digest lists metadata
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [RFC PATCH] tpm: don't return -EINVAL if TPM command validation fails
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- [GIT PULL] security subsystem: IMA bugfix
- From: James Morris <james.l.morris@xxxxxxxxxx>
- Re: IMA appraisal master plan?
- From: James Morris <james.l.morris@xxxxxxxxxx>
- Re: [RFC PATCH] tpm: don't return -EINVAL if TPM command validation fails
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v2 06/15] ima: add parser of digest lists metadata
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: IMA appraisal master plan?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 12/15] ima: do not update security.ima if appraisal status is not INTEGRITY_PASS
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v2 06/15] ima: add parser of digest lists metadata
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RFC PATCH] tpm: don't return -EINVAL if TPM command validation fails
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [RFC PATCH] tpm: don't return -EINVAL if TPM command validation fails
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- IMA appraisal master plan?
- From: "Safford, David (GE Global Research, US)" <david.safford@xxxxxx>
- RE: [RFC PATCH] tpm: don't return -EINVAL if TPM command validation fails
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: [RFC PATCH] tpm: don't return -EINVAL if TPM command validation fails
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [RFC PATCH] tpm: don't return -EINVAL if TPM command validation fails
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [RFC PATCH] tpm: don't return -EINVAL if TPM command validation fails
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [RFC PATCH] tpm: don't return -EINVAL if TPM command validation fails
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [RFC PATCH] tpm: don't return -EINVAL if TPM command validation fails
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [RFC PATCH] tpm: don't return -EINVAL if TPM command validation fails
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: IMA appraisal master plan?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: IMA appraisal master plan?
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v2] tpm: Move Linux RNG connection to hwrng
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: IMA appraisal master plan?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Move Linux RNG connection to hwrng
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [tpmdd-devel] tpm device not showing up in /dev anymore
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/15] ima: digest list feature
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: IMA appraisal master plan?
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC PATCH] tpm: don't return -EINVAL if TPM command validation fails
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH v2 00/15] ima: digest list feature
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v2 00/15] ima: digest list feature
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Add explicit chip->ops locking for sysfs attributes.
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH v2] tpm: Add explicit chip->ops locking for sysfs attributes.
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- [PATCH] tpm: Add explicit chip->ops locking for sysfs attributes.
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [USER] [PATCH V2] Add support for portable EVM format
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [USER] [PATCH V2] Add support for portable EVM format
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] treewide: Fix line continuation formats
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [USER] [PATCH V2] Add support for portable EVM format
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 0/4] treewide: Fix line continuation formats
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH 0/4] treewide: Fix line continuation formats
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH 4/4] ima: Fix line continuation format
- From: Joe Perches <joe@xxxxxxxxxxx>
- [PATCH 0/4] treewide: Fix line continuation formats
- From: Joe Perches <joe@xxxxxxxxxxx>
- RE: [PATCH v4 2/4] tpm: ignore burstcount to improve tpm_tis send() performance
- From: <Alexander.Steffen@xxxxxxxxxxxx>
- Re: IMA appraisal master plan?
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [USER] [PATCH] Add support for portable EVM format
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: IMA appraisal master plan?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: IMA appraisal master plan?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: IMA appraisal master plan?
- From: Patrick Ohly <patrick.ohly@xxxxxxxxx>
- Re: IMA appraisal master plan?
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: IMA appraisal master plan? (was: Re: [PATCH V6] EVM: Add support for portable signature format)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: IMA appraisal master plan? (was: Re: [PATCH V6] EVM: Add support for portable signature format)
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: IMA appraisal master plan? (was: Re: [PATCH V6] EVM: Add support for portable signature format)
- From: James Morris <james.l.morris@xxxxxxxxxx>
- [PATCH RFC v3 2/2] tpm_tis: Move ilb_base_addr to tpm_tis_tcg_phy
- From: Azhar Shaikh <azhar.shaikh@xxxxxxxxx>
- [PATCH RFC v3 1/2] tpm: Keep CLKRUN enabled throughout the duration of transmit_cmd()
- From: Azhar Shaikh <azhar.shaikh@xxxxxxxxx>
- [PATCH RFC v3 0/2] Fix corner cases with disabling CLKRUN in tpm_tis
- From: Azhar Shaikh <azhar.shaikh@xxxxxxxxx>
- [USER] [PATCH] Add support for portable EVM format
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- RE: [PATCH RFC v2 2/2] tpm_tis: Move ilb_base_addr to tpm_tis_tcg_phy
- From: "Shaikh, Azhar" <azhar.shaikh@xxxxxxxxx>
- Re: [PATCH RFC v2 2/2] tpm_tis: Move ilb_base_addr to tpm_tis_tcg_phy
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- RE: [PATCH RFC v2 2/2] tpm_tis: Move ilb_base_addr to tpm_tis_tcg_phy
- From: "Shaikh, Azhar" <azhar.shaikh@xxxxxxxxx>
- Re: IMA appraisal master plan? (was: Re: [PATCH V6] EVM: Add support for portable signature format)
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: IMA appraisal master plan? (was: Re: [PATCH V6] EVM: Add support for portable signature format)
- From: Patrick Ohly <patrick.ohly@xxxxxxxxx>
- RE: [PATCH RFC v2 2/2] tpm_tis: Move ilb_base_addr to tpm_tis_tcg_phy
- From: "Shaikh, Azhar" <azhar.shaikh@xxxxxxxxx>
- Re: IMA appraisal master plan? (was: Re: [PATCH V6] EVM: Add support for portable signature format)
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- IMA appraisal master plan? (was: Re: [PATCH V6] EVM: Add support for portable signature format)
- From: Patrick Ohly <patrick.ohly@xxxxxxxxx>
- [USER SPACE][RFC][PATCH 5/5] digest-list-tools: package
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [USER SPACE][RFC][PATCH 2/5] digest-list-tools: library
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [USER SPACE][RFC][PATCH 4/5] digest-list-tools: documentation
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [USER SPACE][RFC][PATCH 1/5] digest-list-tools: headers
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [USER SPACE][RFC][PATCH 3/5] digest-list-tools: tools
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [USER SPACE][RFC][PATCH 0/5] ima: digest-list-tools package
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [GIT PULL] Security subsystem: integrity updates for v4.15
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v2 2/2] tpm_tis: Move ilb_base_addr to tpm_tis_tcg_phy
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxx>
- Re: [PATCH RFC v2 0/2] Fix corner cases with disabling CLKRUN in tpm_tis
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxx>
- Re: [PATCH RFC v2 2/2] tpm_tis: Move ilb_base_addr to tpm_tis_tcg_phy
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- RE: [PATCH RFC v2 0/2] Fix corner cases with disabling CLKRUN in tpm_tis
- From: "Shaikh, Azhar" <azhar.shaikh@xxxxxxxxx>
- Re: [PATCH RFC v2 0/2] Fix corner cases with disabling CLKRUN in tpm_tis
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] [RFC] time: Make sure jiffies_to_msecs() preserves non-zero time periods
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH] [RFC] time: Make sure jiffies_to_msecs() preserves non-zero time periods
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH V3 1/2] security: Add a cred_getsecid hook
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH] [RFC] time: Make sure jiffies_to_msecs() preserves non-zero time periods
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [tpmdd-devel] tpm device not showing up in /dev anymore
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [paul@xxxxxxxxxxxxxxxxxxxxxxxx: PGP key expires in 3 days: 0x7179B76704ABA18B (it can be extended)]
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [tpmdd-devel] tpm device not showing up in /dev anymore
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [tpmdd-devel] tpm device not showing up in /dev anymore
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [tpmdd-devel] tpm device not showing up in /dev anymore
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Move Linux RNG connection to hwrng
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Update MAINTAINERS for Jason Gunthorpe
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Update MAINTAINERS for Jason Gunthorpe
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [paul@xxxxxxxxxxxxxxxxxxxxxxxx: PGP key expires in 3 days: 0x7179B76704ABA18B (it can be extended)]
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [tpmdd-devel] tpm device not showing up in /dev anymore
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [tpmdd-devel] tpm device not showing up in /dev anymore
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [RFC PATCH v2] fw_lockdown: new micro LSM module to prevent loading unsigned firmware
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- Re: [RFC PATCH v2] fw_lockdown: new micro LSM module to prevent loading unsigned firmware
- From: James Morris <james.l.morris@xxxxxxxxxx>
- Re: [RFC PATCH v2] fw_lockdown: new micro LSM module to prevent loading unsigned firmware
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- Re: [RFC PATCH v2] fw_lockdown: new micro LSM module to prevent loading unsigned firmware
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2] fw_lockdown: new micro LSM module to prevent loading unsigned firmware
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- Re: [RFC PATCH v2] fw_lockdown: new micro LSM module to prevent loading unsigned firmware
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2] fw_lockdown: new micro LSM module to prevent loading unsigned firmware
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- [PATCH] ima: support new "hash" and "dont_hash" policy actions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] ima: add namespace template
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [RFC PATCH v2] fw_lockdown: new micro LSM module to prevent loading unsigned firmware
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [GIT PULL] Security subsystem: integrity updates for v4.15
- From: James Morris <james.l.morris@xxxxxxxxxx>
- Re: [PATCH v2] tpm: Move Linux RNG connection to hwrng
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [tpmdd-devel] tpm device not showing up in /dev anymore
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [tpmdd-devel] tpm device not showing up in /dev anymore
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [tpmdd-devel] tpm device not showing up in /dev anymore
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [tpmdd-devel] tpm device not showing up in /dev anymore
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: KEYS: trusted: Use common error handling code in trusted_update()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: [tpmdd-devel] tpm device not showing up in /dev anymore
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH 1/2] KEYS: trusted: Use common error handling code in trusted_update()
- From: Julia Lawall <julia.lawall@xxxxxxx>
- [PATCH 2/2] KEYS: trusted: Use common error handling code in tpm_unseal()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] KEYS: trusted: Use common error handling code in trusted_update()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 0/2] security/keys/trusted: Fine-tuning for two function implementations
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: IMA secure_boot rules and the kernel_lockdown manpage
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: IMA secure_boot rules and the kernel_lockdown manpage
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: IMA secure_boot rules and the kernel_lockdown manpage
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- IMA secure_boot rules and the kernel_lockdown manpage
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [tpmdd-devel] tpm device not showing up in /dev anymore
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [tpmdd-devel] tpm device not showing up in /dev anymore
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [tpmdd-devel] tpm device not showing up in /dev anymore
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [tpmdd-devel] tpm device not showing up in /dev anymore
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [tpmdd-devel] tpm device not showing up in /dev anymore
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [tpmdd-devel] tpm device not showing up in /dev anymore
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [RFC PATCH] ima: require secure_boot rules in lockdown mode
- From: James Morris <james.l.morris@xxxxxxxxxx>
- Re: [PATCH v2 00/15] ima: digest list feature
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v2 00/15] ima: digest list feature
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v2] tpm: Move Linux RNG connection to hwrng
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v2] tpm: Move Linux RNG connection to hwrng
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [PATCH v2 00/15] ima: digest list feature
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/15] ima: digest list feature
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v2 00/15] ima: digest list feature
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [RFC PATCH] ima: require secure_boot rules in lockdown mode
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] ima: require secure_boot rules in lockdown mode
- From: James Morris <james.l.morris@xxxxxxxxxx>
- btrfs UUID all zero (was: [Linux-ima-user] [PATCH] evmctl: use /proc/self/mountinfo instead of /dev/block/<major>:<minor>])
- From: Matthias Gerstner <mgerstner@xxxxxxx>
- Re: [PATCH v2 00/15] ima: digest list feature
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [RFC PATCH] ima: require secure_boot rules in lockdown mode
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH] ima: add namespace template
- From: Boshi Wang <wangboshi@xxxxxxxxxx>
- Re: [tpmdd-devel] tpm device not showing up in /dev anymore
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [RFC PATCH] ima: require secure_boot rules in lockdown mode
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Update MAINTAINERS for Jason Gunthorpe
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [RFC PATCH] ima: require secure_boot rules in lockdown mode
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] ima: require secure_boot rules in lockdown mode
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] ima: require secure_boot rules in lockdown mode
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH V6] EVM: Add support for portable signature format
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/15] ima: digest list feature
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v2 00/15] ima: digest list feature
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- RE: [PATCH v4 2/4] tpm: ignore burstcount to improve tpm_tis send() performance
- From: <Alexander.Steffen@xxxxxxxxxxxx>
- Re: [PATCH v2 00/15] ima: digest list feature
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH] tpm: Update MAINTAINERS for Jason Gunthorpe
- From: Peter Huewe <peterhuewe@xxxxxx>
- Re: [PATCH] tpm: Update MAINTAINERS for Jason Gunthorpe
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH RFC v2 1/2] tpm: Keep CLKRUN enabled throughout the duration of transmit_cmd()
- From: Azhar Shaikh <azhar.shaikh@xxxxxxxxx>
- [PATCH RFC v2 2/2] tpm_tis: Move ilb_base_addr to tpm_tis_tcg_phy
- From: Azhar Shaikh <azhar.shaikh@xxxxxxxxx>
- [PATCH RFC v2 0/2] Fix corner cases with disabling CLKRUN in tpm_tis
- From: Azhar Shaikh <azhar.shaikh@xxxxxxxxx>
- Re: [PATCH v2] tpm: Move Linux RNG connection to hwrng
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- RE: [PATCH v2 00/15] ima: digest list feature
- From: "Safford, David (GE Global Research, US)" <david.safford@xxxxxx>
- Re: [PATCH v4 2/4] tpm: ignore burstcount to improve tpm_tis send() performance
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/15] ima: digest list feature
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v2 00/15] ima: digest list feature
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v2 00/15] ima: digest list feature
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v2] tpm: Move Linux RNG connection to hwrng
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH V4] EVM: Allow userland to permit modification of EVM-protected metadata
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH V6] EVM: Add support for portable signature format
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH V5] EVM: Add support for portable signature format
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] tpm: Update MAINTAINERS for Jason Gunthorpe
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/15] ima: digest list feature
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v2 00/15] ima: digest list feature
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 02/15] ima: generalize ima_write_policy()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 07/15] ima: add parser of compact digest list
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 15/15] ima: add Documentation/security/IMA-digest-lists.txt
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 14/15] ima: add support for appraisal with digest lists
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 10/15] ima: disable digest lookup if digest lists are not checked
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 09/15] ima: introduce securityfs interfaces for digest lists
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 08/15] ima: add parser of RPM package headers
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 06/15] ima: add parser of digest lists metadata
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 03/15] ima: generalize policy file operations
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 12/15] ima: do not update security.ima if appraisal status is not INTEGRITY_PASS
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 13/15] evm: add kernel command line option to select protected xattrs
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 11/15] ima: add policy action digest_list
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 05/15] ima: add functions to manage digest lists
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 04/15] ima: use ima_show_htable_value to show hash table data
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 01/15] ima: generalize ima_read_policy()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 00/15] ima: digest list feature
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v2] tpm: Move Linux RNG connection to hwrng
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- RE: [PATCH RFC] tpm: Keep CLKRUN enabled throughout the duration of transmit_cmd()
- From: "Shaikh, Azhar" <azhar.shaikh@xxxxxxxxx>
- Re: [PATCH RFC] tpm: Keep CLKRUN enabled throughout the duration of transmit_cmd()
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: IMA skips some file measurements
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- RE: [PATCH RFC] tpm: Keep CLKRUN enabled throughout the duration of transmit_cmd()
- From: "Shaikh, Azhar" <azhar.shaikh@xxxxxxxxx>
- RE: IMA skips some file measurements
- From: "Magalhaes, Guilherme (Brazil R&D-CL)" <guilherme.magalhaes@xxxxxxx>
- Re: IMA skips some file measurements
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- RE: IMA skips some file measurements
- From: "Magalhaes, Guilherme (Brazil R&D-CL)" <guilherme.magalhaes@xxxxxxx>
- Re: IMA skips some file measurements
- From: Mikhail Kurinnoi <viewizard@xxxxxxxxxxxxx>
- IMA skips some file measurements
- From: "Magalhaes, Guilherme (Brazil R&D-CL)" <guilherme.magalhaes@xxxxxxx>
- Re: [PATCH RFC] tpm: Keep CLKRUN enabled throughout the duration of transmit_cmd()
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v2] tpm: Move Linux RNG connection to hwrng
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] MAINTAINERS: update the IMA, EVM, trusted-keys, encrypted-keys entries
- From: James Morris <james.l.morris@xxxxxxxxxx>
- [PATCH 3,RESEND] tpm: use struct tpm_chip for tpm_chip_find_get()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Move Linux RNG connection to hwrng
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH RFC] tpm: Keep CLKRUN enabled throughout the duration of transmit_cmd()
- From: Azhar Shaikh <azhar.shaikh@xxxxxxxxx>
- [PATCH] evm: return the real setxattr/removexattr failure status for inode without xattr support
- From: Mikhail Kurinnoi <viewizard@xxxxxxxxxxxxx>
- [PATCH] evm: allow uid/gid/mode changes for inode without xattr support
- From: Mikhail Kurinnoi <viewizard@xxxxxxxxxxxxx>
- Re: [PATCH V3] EVM: Allow userland to permit modification of EVM-protected metadata
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] evm: allow metadata changes for inode without xattr support
- From: Mikhail Kurinnoi <viewizard@xxxxxxxxxxxxx>
- Re: [PATCH V3] EVM: Allow userland to permit modification of EVM-protected metadata
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] evm: allow metadata changes for inode without xattr support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] evm: allow metadata changes for inode without xattr support
- From: Mikhail Kurinnoi <viewizard@xxxxxxxxxxxxx>
- Re: [PATCH] evm: allow metadata changes for inode without xattr support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] evm: allow metadata changes for inode without xattr support
- From: Mikhail Kurinnoi <viewizard@xxxxxxxxxxxxx>
- Re: [PATCH] evm: allow metadata changes for inode without xattr support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Update MAINTAINERS for Jason Gunthorpe
- From: Peter Huewe <peterhuewe@xxxxxx>
- Re: [PATCH V3] EVM: Allow userland to permit modification of EVM-protected metadata
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH] MAINTAINERS: update the IMA, EVM, trusted-keys, encrypted-keys entries
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Update MAINTAINERS for Jason Gunthorpe
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: update TPM driver infrastructure changes
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH V4] EVM: Add support for portable signature format
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH] evm: allow metadata changes for inode without xattr support
- From: Mikhail Kurinnoi <viewizard@xxxxxxxxxxxxx>
- [PATCH V3] EVM: Allow userland to permit modification of EVM-protected metadata
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH V4] EVM: Add support for portable signature format
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [RFC PATCH] ima: require secure_boot rules in lockdown mode
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC PATCH] ima: require secure_boot rules in lockdown mode
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] ima: require secure_boot rules in lockdown mode
- From: David Howells <dhowells@xxxxxxxxxx>
- TPM device driver and TPM_RC_RETRY
- From: Ken Goldman <kgold@xxxxxxxxxxxxxxxxxx>
- Re: [RFC] EVM: Add support for portable signature format
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [RFC] EVM: Add support for portable signature format
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH] tpm: Update MAINTAINERS for Jason Gunthorpe
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH v2] tpm: Move Linux RNG connection to hwrng
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v5 17/18] ima: Implement support for module-style appended signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] ima: require secure_boot rules in lockdown mode
- From: James Morris <james.l.morris@xxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: update TPM driver infrastructure changes
- From: Peter Huewe <peterhuewe@xxxxxx>
- Re: Proposal: rename tpm1_eventlog.c and tpm2_eventlog.c
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] ima: require secure_boot rules in lockdown mode
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH V3 1/2] security: Add a cred_getsecid hook
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH] ima: require secure_boot rules in lockdown mode
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC PATCH] ima: require secure_boot rules in lockdown mode
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] ima: require secure_boot rules in lockdown mode
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC] EVM: Add support for portable signature format
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [RFC] EVM: Add support for portable signature format
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [RFC] EVM: Add support for portable signature format
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [RFC] EVM: Add support for portable signature format
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [RFC] EVM: Add support for portable signature format
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [RFC] EVM: Add support for portable signature format
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [RFC] EVM: Add support for portable signature format
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [RFC] EVM: Add support for portable signature format
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [RFC] EVM: Add support for portable signature format
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [RFC] EVM: Add support for portable signature format
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [RFC] EVM: Add support for portable signature format
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Failed initialization on TUXEDO Book BU1406
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: [PATCH V3 1/2] security: Add a cred_getsecid hook
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V3 1/2] security: Add a cred_getsecid hook
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [RFC] EVM: Add support for portable signature format
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: Usage of inode number in EVM signatures
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Usage of inode number in EVM signatures
- From: "Peter P." <p.pan48711@xxxxxxxxx>
- RE: [RFC] EVM: Add support for portable signature format
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxxx>
- RE: [RFC] EVM: Add support for portable signature format
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxxx>
- Re: Proposal: rename tpm1_eventlog.c and tpm2_eventlog.c
- From: Thiebaud Weksteen <tweek@xxxxxxxxxx>
- Re: [PATCH v5 12/18] MODSIGN: Export module signature definitions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 12/18] MODSIGN: Export module signature definitions
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 18/18] ima: Write modsig to the measurement list
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 00/18] Appended signatures support for IMA appraisal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 13/18] PKCS#7: Introduce pkcs7_get_message_sig and verify_pkcs7_message_sig
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 12/18] MODSIGN: Export module signature definitions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 18/18] ima: Write modsig to the measurement list
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [RFC] EVM: Add support for portable signature format
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: Fixing CVE-2017-15361
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 4/5] efi: call get_event_log before ExitBootServices
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Fixing CVE-2017-15361
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Fixing CVE-2017-15361
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Fixing CVE-2017-15361
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Fixing CVE-2017-15361
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- RE: Fixing CVE-2017-15361
- From: <Alexander.Steffen@xxxxxxxxxxxx>
- RE: Fixing CVE-2017-15361
- From: <Alexander.Steffen@xxxxxxxxxxxx>
- RE: Fixing CVE-2017-15361
- From: <Alexander.Steffen@xxxxxxxxxxxx>
- Re: Fixing CVE-2017-15361
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: [PATCH V3 1/2] security: Add a cred_getsecid hook
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Proposal: rename tpm1_eventlog.c and tpm2_eventlog.c
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Fixing CVE-2017-15361
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH V3 1/2] security: Add a cred_getsecid hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Fixing CVE-2017-15361
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: Fixing CVE-2017-15361
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Fixing CVE-2017-15361
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Fixing CVE-2017-15361
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: use struct tpm_chip for tpm_chip_find_get()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC] EVM: Add support for portable signature format
- From: Mikhail Kurinnoi <viewizard@xxxxxxxxxxxxx>
- Re: [PATCH V3 2/2] IMA: Support using new creds in appraisal policy
- From: James Morris <james.l.morris@xxxxxxxxxx>
- Re: [RFC] EVM: Add support for portable signature format
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V3 1/2] security: Add a cred_getsecid hook
- From: James Morris <james.l.morris@xxxxxxxxxx>
- Re: [RFC] EVM: Add support for portable signature format
- From: Mikhail Kurinnoi <viewizard@xxxxxxxxxxxxx>
- [PATCH V3 1/2] security: Add a cred_getsecid hook
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH V3 2/2] IMA: Support using new creds in appraisal policy
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [RFC] EVM: Add support for portable signature format
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: Fixing CVE-2017-15361
- From: Peter Huewe <peterhuewe@xxxxxx>
- Re: Fixing CVE-2017-15361
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v2] tpm: use struct tpm_chip for tpm_chip_find_get()
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: use struct tpm_chip for tpm_chip_find_get()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Move Linux RNG connection to hwrng
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Move Linux RNG connection to hwrng
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: use struct tpm_chip for tpm_chip_find_get()
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: use struct tpm_chip for tpm_chip_find_get()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Move Linux RNG connection to hwrng
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Move Linux RNG connection to hwrng
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Fixing CVE-2017-15361
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] ima: check signature enforcement against cmdline param instead of CONFIG
- From: "Bruno E. O. Meneguele" <brdeoliv@xxxxxxxxxx>
- Re: [PATCH v3 2/2] ima: check signature enforcement against cmdline param instead of CONFIG
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Move Linux RNG connection to hwrng
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [PATCH v2] tpm: use struct tpm_chip for tpm_chip_find_get()
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Move Linux RNG connection to hwrng
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: use struct tpm_chip for tpm_chip_find_get()
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [PATCH v3 2/2] ima: check signature enforcement against cmdline param instead of CONFIG
- From: "Bruno E. O. Meneguele" <brdeoliv@xxxxxxxxxx>
- Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [PATCH] tpm: Move Linux RNG connection to hwrng
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: Fixing CVE-2017-15361
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Fixing CVE-2017-15361
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Proposal: rename tpm1_eventlog.c and tpm2_eventlog.c
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH V3] EVM: Add support for portable signature format
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v2] tpm: use struct tpm_chip for tpm_chip_find_get()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- RE: [PATCH V3] EVM: Add support for portable signature format
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxxx>
- Re: [PATCH V3] EVM: Add support for portable signature format
- From: Mikhail Kurinnoi <viewizard@xxxxxxxxxxxxx>
- Re: [PATCH V3] EVM: Add support for portable signature format
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V3] EVM: Add support for portable signature format
- From: Mikhail Kurinnoi <viewizard@xxxxxxxxxxxxx>
- Re: [PATCH V3] EVM: Add support for portable signature format
- From: James Morris <james.l.morris@xxxxxxxxxx>
- [PATCH V3] EVM: Add support for portable signature format
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH V2] EVM: Allow userland to permit modification of EVM-protected xattrs
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: Proposal: rename tpm1_eventlog.c and tpm2_eventlog.c
- From: Thiebaud Weksteen <tweek@xxxxxxxxxx>
- Re: [tpmdd-devel] tpm device not showing up in /dev anymore
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH v3 2/2] ima: check signature enforcement against cmdline param instead of CONFIG
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Move Linux RNG connection to hwrng
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Proposal: rename tpm1_eventlog.c and tpm2_eventlog.c
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Move Linux RNG connection to hwrng
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: Peter Huewe <peterhuewe@xxxxxx>
- [PATCH] tpm: Move Linux RNG connection to hwrng
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: Dmitry Torokhov <dmitry.torokhov@xxxxxxxxx>
- Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- [PATCH v3 2/2] ima: check signature enforcement against cmdline param instead of CONFIG
- From: "Bruno E. O. Meneguele" <brdeoliv@xxxxxxxxxx>
- [PATCH v3 1/2] module: export module signature enforcement status
- From: "Bruno E. O. Meneguele" <brdeoliv@xxxxxxxxxx>
- [PATCH v3 0/2] ima: change how MODULE_SIG_FORCE is checked on modules checking policy
- From: "Bruno E. O. Meneguele" <brdeoliv@xxxxxxxxxx>
- Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: Dmitry Torokhov <dmitry.torokhov@xxxxxxxxx>
- Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [tpmdd-devel] tpm device not showing up in /dev anymore
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
- Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [tpmdd-devel] tpm device not showing up in /dev anymore
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] xen-tpmfront: Use common error handling code in vtpm_send()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis_core: Use common error handling code in tpm_tis_send_data()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] xen-tpmfront: Combine two condition checks into one statement in vtpm_send()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [tpmdd-devel] tpm device not showing up in /dev anymore
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/4] tpm: move wait_for_tpm_stat() to respective driver files
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC][PATCH 2/2] ima: don't measure files in the TCB if Biba strict policy is enforced
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v2 2/2] ima: check signature enforcement against cmdline param instead of CONFIG
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [RFC][PATCH 1/2] ima: preserve the integrity of appraised files
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH 1/2] security: Add a cred_getsecid hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC][PATCH 2/2] ima: don't measure files in the TCB if Biba strict policy is enforced
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [RFC][PATCH 1/2] ima: preserve the integrity of appraised files
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/2] ima: change how MODULE_SIG_FORCE is checked on modules checking policy
- From: "Bruno E. O. Meneguele" <brdeoliv@xxxxxxxxxx>
- [PATCH v2 1/2] module: export module signature enforcement status
- From: "Bruno E. O. Meneguele" <brdeoliv@xxxxxxxxxx>
- [PATCH v2 2/2] ima: check signature enforcement against cmdline param instead of CONFIG
- From: "Bruno E. O. Meneguele" <brdeoliv@xxxxxxxxxx>
- Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] module: export module signature enforcement status
- From: "Bruno E. O. Meneguele" <brdeoliv@xxxxxxxxxx>
- [RFC PATCH] ima: require secure_boot rules in lockdown mode
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] xen-tpmfront: Use common error handling code in vtpm_send()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis_core: Use common error handling code in tpm_tis_send_data()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: [tpmdd-devel] tpm device not showing up in /dev anymore
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH] tpm_i2c_nuvoton: Use common error handling code in i2c_nuvoton_send()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: [tpmdd-devel] tpm device not showing up in /dev anymore
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH 2/2] xen-tpmfront: Combine two condition checks into one statement in vtpm_send()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] xen-tpmfront: Use common error handling code in vtpm_send()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] Xen vTPM frontend: Fine-tuning for vtpm_send()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis_core: Use common error handling code in tpm_tis_send_data()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC][PATCH 1/2] ima: preserve the integrity of appraised files
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH] tpm_i2c_nuvoton: Use common error handling code in i2c_nuvoton_send()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/4] tpm: move wait_for_tpm_stat() to respective driver files
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [tpmdd-devel] tpm device not showing up in /dev anymore
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] char/tpm: Improve a size determination in nine functions
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH 2/2] ima: check signature enforcement against cmdline param instead of CONFIG
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] module: export module signature enforcement status
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH] tpm: remove chip_num parameter from in-kernel API
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC][PATCH 1/2] ima: preserve the integrity of appraised files
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH] tpm: remove a misleading error message from tpm_get_timeouts()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC][PATCH 0/2] ima: preserve integrity of dynamic data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH V2] EVM: Add support for portable signature format
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: Behaviour regarding scripts when enforcing digital signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis_core: Use common error handling code in tpm_tis_send_data()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH 2/2] xen-tpmfront: Combine two condition checks into one statement in vtpm_send()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH v4 2/4] tpm: ignore burstcount to improve tpm_tis send() performance
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH 2/2] xen-tpmfront: Combine two condition checks into one statement in vtpm_send()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] xen-tpmfront: Use common error handling code in vtpm_send()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 0/2] Xen vTPM frontend: Fine-tuning for vtpm_send()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] tpm_tis_core: Use common error handling code in tpm_tis_send_data()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] tpm_i2c_nuvoton: Use common error handling code in i2c_nuvoton_send()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: [tpmdd-devel] tpm device not showing up in /dev anymore
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: IMA appraisal against xz-compressed modules
- From: "Bruno E. O. Meneguele" <brdeoliv@xxxxxxxxxx>
- [PATCH 1/2] module: export module signature enforcement status
- From: "Bruno E. O. Meneguele" <brdeoliv@xxxxxxxxxx>
- [PATCH 0/2] ima: change how MODULE_SIG_FORCE is checked on modules checking policy
- From: "Bruno E. O. Meneguele" <brdeoliv@xxxxxxxxxx>
- [PATCH 2/2] ima: check signature enforcement against cmdline param instead of CONFIG
- From: "Bruno E. O. Meneguele" <brdeoliv@xxxxxxxxxx>
- Re: [PATCH v4 2/4] tpm: ignore burstcount to improve tpm_tis send() performance
- From: Ken Goldman <kgold@xxxxxxxxxxxxxxxxxx>
- Re: TPM meetup in Prague?
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [RFC][PATCH 2/2] ima: don't measure files in the TCB if Biba strict policy is enforced
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 1/2] ima: preserve the integrity of appraised files
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 0/2] ima: preserve integrity of dynamic data
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Behaviour regarding scripts when enforcing digital signatures
- From: Matthias Gerstner <mgerstner@xxxxxxx>
- RE: [PATCH v4 2/4] tpm: ignore burstcount to improve tpm_tis send() performance
- From: <Alexander.Steffen@xxxxxxxxxxxx>
- RE: [PATCH 3/4] char/tpm: Improve a size determination in nine functions
- From: <Alexander.Steffen@xxxxxxxxxxxx>
- Re: [PATCH 3/4] char/tpm: Improve a size determination in nine functions
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] EVM: Allow userland to permit modification of EVM-protected xattrs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] char/tpm: Improve a size determination in nine functions
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/4] tpm: move wait_for_tpm_stat() to respective driver files
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH] ima: fix hash algorithm initialization
- From: Boshi Wang <wangboshi@xxxxxxxxxx>
- Re: TPM meetup in Prague?
- From: Enrico Perla <enrico.perla@xxxxxxxxxx>
- Re: [PATCH] tpm: adjust command response sleep time for vTPM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] ima: fix ineffective default hash algorithm due to invalid hash algorithm boot argument
- From: Boshi Wang <wangboshi@xxxxxxxxxx>
- Re: TPM meetup in Prague?
- From: James Morris <james.l.morris@xxxxxxxxxx>
- Re: [PATCH 1/2] security: Add a cred_getsecid hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 2/2] IMA: Support using new creds in appraisal policy
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH 1/2] security: Add a cred_getsecid hook
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH] EVM: Allow userland to permit modification of EVM-protected xattrs
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH V2] EVM: Add support for portable signature format
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: char/tpm: Less checks in tpm_ibmvtpm_probe() after error detection
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: IMA appraisal against xz-compressed modules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: IMA appraisal against xz-compressed modules
- From: "Bruno E. O. Meneguele" <brdeoliv@xxxxxxxxxx>
- Re: [PATCH] EVM: Add support for portable signature format
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- Re: RFC: Make it practical to ship EVM signatures
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- Re: [PATCH] EVM: Add support for portable signature format
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] EVM: Add support for portable signature format
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- Re: [PATCH] EVM: Add support for portable signature format
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- Re: [PATCH] EVM: Add support for portable signature format
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- TPM meetup in Prague?
- From: <Alexander.Steffen@xxxxxxxxxxxx>
- Re: [PATCH] EVM: Add support for portable signature format
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] EVM: Add support for portable signature format
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: RFC: Make it practical to ship EVM signatures
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: Writing out EVM protected xattrs while EVM is active
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- RE: [PATCH v4 1/4] tpm: move wait_for_tpm_stat() to respective driver files
- From: <Alexander.Steffen@xxxxxxxxxxxx>
- RE: [PATCH 3/4] char/tpm: Improve a size determination in nine functions
- From: <Alexander.Steffen@xxxxxxxxxxxx>
- RE: [PATCH 1/6] IMA: Allow EVM validation on appraisal even without a symmetric key
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- Re: Circumstances for using the tag “Fixes” (or not)
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- RE: [PATCH] EVM: Add support for portable signature format
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxxx>
- Re: [PATCH] ima: fix ineffective default hash algorithm due to invalid hash algorithm boot argument
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/4] char/tpm: Less checks in tpm_ibmvtpm_probe() after error detection
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH 4/4] char/tpm: Less checks in tpm_ibmvtpm_probe() after error detection
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH v4 2/4] tpm: ignore burstcount to improve tpm_tis send() performance
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 3/4] tpm: reduce tpm polling delay in tpm_tis_core
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 4/4] tpm: use tpm_msleep() value as max delay
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/4] tpm: move wait_for_tpm_stat() to respective driver files
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: IMA appraisal against xz-compressed modules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/4] char/tpm: Less checks in tpm_ibmvtpm_probe() after error detection
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: [PATCH 4/4] char/tpm: Less checks in tpm_ibmvtpm_probe() after error detection
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH 0/4] char-TPM: Adjustments for ten function implementations
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] EVM: Add support for portable signature format
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/4] char/tpm: Less checks in tpm_ibmvtpm_probe() after error detection
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: [PATCH 4/4] char/tpm: Less checks in tpm_ibmvtpm_probe() after error detection
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: char/tpm: Improve a size determination in nine functions
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: char/tpm: Improve a size determination in nine functions
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: [PATCH] EVM: Add support for portable signature format
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/4] char/tpm: Less checks in tpm_ibmvtpm_probe() after error detection
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: [PATCH] EVM: Add support for portable signature format
- From: Mikhail Kurinnoi <viewizard@xxxxxxxxxxxxx>
- Re: RFC: Make it practical to ship EVM signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: RFC: Make it practical to ship EVM signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: Writing out EVM protected xattrs while EVM is active
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- RE: [PATCH] EVM: Add support for portable signature format
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxxx>
- Re: Writing out EVM protected xattrs while EVM is active
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- Re: RFC: Make it practical to ship EVM signatures
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- Re: RFC: Make it practical to ship EVM signatures
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- Re: [PATCH] MAINTAINERS: update TPM driver infrastructure changes
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [GIT PULL] tpmdd updates for Linux 4.15
- From: James Morris <james.l.morris@xxxxxxxxxx>
- Re: RFC: Make it practical to ship EVM signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: RFC: Make it practical to ship EVM signatures
- From: Mikhail Kurinnoi <viewizard@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] security: Add a cred_getsecid hook
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 2/2] IMA: Support using new creds in appraisal policy
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: RFC: Make it practical to ship EVM signatures
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- Re: RFC: Make it practical to ship EVM signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: IMA appraisal against xz-compressed modules
- From: "Bruno E. O. Meneguele" <brdeoliv@xxxxxxxxxx>
- Re: RFC: Make it practical to ship EVM signatures
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- Re: Writing out EVM protected xattrs while EVM is active
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: char-TPM: Adjustments for ten function implementations
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: Writing out EVM protected xattrs while EVM is active
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: Writing out EVM protected xattrs while EVM is active
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: Writing out EVM protected xattrs while EVM is active
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- Re: Writing out EVM protected xattrs while EVM is active
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: char/tpm: Delete an error message for a failed memory allocation in tpm_…()
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: Writing out EVM protected xattrs while EVM is active
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: char/tpm: Improve a size determination in nine functions
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- [PATCH] EVM: Add support for portable signature format
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: char/tpm: Improve a size determination in nine functions
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: char/tpm: Improve a size determination in nine functions
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: Writing out EVM protected xattrs while EVM is active
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: char/tpm: Improve a size determination in nine functions
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: Writing out EVM protected xattrs while EVM is active
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: char/tpm: Improve a size determination in nine functions
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: char/tpm: Improve a size determination in nine functions
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] char-TPM: Adjustments for ten function implementations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: char/tpm: Improve a size determination in nine functions
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] char-TPM: Adjustments for ten function implementations
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: char/tpm: Improve a size determination in nine functions
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [GIT PULL] tpmdd updates for Linux 4.15
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: char-TPM: Adjustments for ten function implementations
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/4] tpm: ignore burstcount to improve tpm_tis send() performance
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 3/4] tpm: reduce tpm polling delay in tpm_tis_core
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: char/tpm: Improve a size determination in nine functions
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 4/5] efi: call get_event_log before ExitBootServices
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] char-TPM: Adjustments for ten function implementations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] char-TPM: Adjustments for ten function implementations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] char-TPM: Adjustments for ten function implementations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: char/tpm: Improve a size determination in nine functions
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] char/tpm: Improve a size determination in nine functions
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] char/tpm: Improve a size determination in nine functions
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] char/tpm: Improve a size determination in nine functions
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Adjusting further size determinations?
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- RE: Adjusting further size determinations?
- From: Julia Lawall <julia.lawall@xxxxxxx>
- RE: Adjusting further size determinations?
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: Adjusting further size determinations?
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: Adjusting further size determinations?
- From: Joe Perches <joe@xxxxxxxxxxx>
- RE: char-TPM: Adjustments for ten function implementations
- From: <Alexander.Steffen@xxxxxxxxxxxx>
- Re: Adjusting further size determinations?
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: char-TPM: Adjustments for ten function implementations
- From: Joe Perches <joe@xxxxxxxxxxx>
- RE: char-TPM: Adjustments for ten function implementations
- From: <Alexander.Steffen@xxxxxxxxxxxx>
- Re: char-TPM: Adjustments for ten function implementations
- From: Joe Perches <joe@xxxxxxxxxxx>
- RE: char-TPM: Adjustments for ten function implementations
- From: Julia Lawall <julia.lawall@xxxxxxx>
- Re: char-TPM: Adjustments for ten function implementations
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- RE: char-TPM: Adjustments for ten function implementations
- From: <Alexander.Steffen@xxxxxxxxxxxx>
- Re: char-TPM: Adjustments for ten function implementations
- From: Joe Perches <joe@xxxxxxxxxxx>
- RE: [PATCH 3/4] char/tpm: Improve a size determination in nine functions
- From: <Alexander.Steffen@xxxxxxxxxxxx>
- Re: char-TPM: Adjustments for ten function implementations
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] ima: fix ineffective default hash algorithm due to invalid hash algorithm boot argument
- From: Boshi Wang <wangboshi@xxxxxxxxxx>
- Re: [Linux-ima-devel] [PATCH] ima: fix ineffective default hash algorithm due to invalid hash algorithm boot argument
- From: Boshi Wang <wangboshi@xxxxxxxxxx>
- Re: [PATCH 0/4] char-TPM: Adjustments for ten function implementations
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: Writing out EVM protected xattrs while EVM is active
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: Writing out EVM protected xattrs while EVM is active
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: Writing out EVM protected xattrs while EVM is active
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: Writing out EVM protected xattrs while EVM is active
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: Writing out EVM protected xattrs while EVM is active
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 02/18] ima: Remove some superfluous parentheses
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 01/18] ima: Remove redundant conditional operator
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 04/18] evm, ima: Remove more superfluous parentheses
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 03/18] evm, ima: Remove superfluous parentheses
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 05/18] ima: Simplify ima_eventsig_init
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 06/18] ima: Improvements in ima_appraise_measurement
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 07/18] integrity: Introduce struct evm_xattr
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 08/18] integrity: Select CONFIG_KEYS instead of depending on it
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 09/18] ima: Don't pass xattr value to EVM xattr verification.
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 10/18] ima: Store measurement after appraisal
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 11/18] ima: Export func_tokens
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 13/18] PKCS#7: Introduce pkcs7_get_message_sig and verify_pkcs7_message_sig
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 14/18] integrity: Introduce integrity_keyring_from_id
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 16/18] ima: Add functions to read and verify a modsig signature
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 17/18] ima: Implement support for module-style appended signatures
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 18/18] ima: Write modsig to the measurement list
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 15/18] ima: Add modsig appraise_type option for module-style appended signatures
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 12/18] MODSIGN: Export module signature definitions
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 00/18] Appended signatures support for IMA appraisal
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- Writing out EVM protected xattrs while EVM is active
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 0/4] char-TPM: Adjustments for ten function implementations
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [Linux-ima-devel] Centos7 execute 'su -c "keyctl pipe 820080884"' show keyctl_read_alloc: Permission denied
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [Linux-ima-devel] [PATCH] ima: fix ineffective default hash algorithm due to invalid hash algorithm boot argument
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 0/4] additional TPM performance improvements
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 1/4] tpm: move wait_for_tpm_stat() to respective driver files
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 2/4] tpm: ignore burstcount to improve tpm_tis send() performance
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 3/4] tpm: reduce tpm polling delay in tpm_tis_core
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 4/4] tpm: use tpm_msleep() value as max delay
- From: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
- Re: char/tpm: Improve a size determination in nine functions
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: char/tpm: Improve a size determination in nine functions
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: char/tpm: Improve a size determination in nine functions
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: char/tpm: Improve a size determination in nine functions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] IMA: Support using new creds in appraisal policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: char/tpm: Improve a size determination in nine functions
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] char-TPM: Adjustments for ten function implementations
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] char-TPM: Adjustments for ten function implementations
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] char/tpm: Improve a size determination in nine functions
- From: Julia Lawall <julia.lawall@xxxxxxx>
- RE: [PATCH 3/4] char/tpm: Improve a size determination in nine functions
- From: <Alexander.Steffen@xxxxxxxxxxxx>
- Re: [PATCH 3/4] char/tpm: Improve a size determination in nine functions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] char/tpm: Improve a size determination in nine functions
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] char/tpm: Improve a size determination in nine functions
- From: Julia Lawall <julia.lawall@xxxxxxx>
- Re: [PATCH 3/4] char/tpm: Improve a size determination in nine functions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] char-TPM: Adjustments for ten function implementations
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- RE: [PATCH 3/4] char/tpm: Improve a size determination in nine functions
- From: <Alexander.Steffen@xxxxxxxxxxxx>
- Re: [PATCH 0/4] char-TPM: Adjustments for ten function implementations
- From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] char/tpm: Improve a size determination in nine functions
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] char-TPM: Adjustments for ten function implementations
- From: Julia Lawall <julia.lawall@xxxxxxx>
- Re: [PATCH 0/4] char-TPM: Adjustments for ten function implementations
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH 0/4] char-TPM: Adjustments for ten function implementations
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] char-TPM: Adjustments for ten function implementations
- From: Julia Lawall <julia.lawall@xxxxxxx>
- Re: [PATCH 0/4] char-TPM: Adjustments for ten function implementations
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH v3 4/5] efi: call get_event_log before ExitBootServices
- From: Thiebaud Weksteen <tweek@xxxxxxxxxx>
- Re: [PATCH 0/4] char-TPM: Adjustments for ten function implementations
- From: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]