Linux Integrity
Thread Index
[
Prev Page
][Next Page]
[PATCH] evm: return the real setxattr/removexattr failure status for inode without xattr support
From
: Mikhail Kurinnoi <viewizard@xxxxxxxxxxxxx>
[PATCH] evm: allow uid/gid/mode changes for inode without xattr support
From
: Mikhail Kurinnoi <viewizard@xxxxxxxxxxxxx>
Re: [PATCH V3] EVM: Allow userland to permit modification of EVM-protected metadata
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH] evm: allow metadata changes for inode without xattr support
From
: Mikhail Kurinnoi <viewizard@xxxxxxxxxxxxx>
Re: [PATCH V3] EVM: Allow userland to permit modification of EVM-protected metadata
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: [PATCH] evm: allow metadata changes for inode without xattr support
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH] evm: allow metadata changes for inode without xattr support
From
: Mikhail Kurinnoi <viewizard@xxxxxxxxxxxxx>
Re: [PATCH] evm: allow metadata changes for inode without xattr support
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH] evm: allow metadata changes for inode without xattr support
From
: Mikhail Kurinnoi <viewizard@xxxxxxxxxxxxx>
Re: [PATCH] evm: allow metadata changes for inode without xattr support
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH] tpm: Update MAINTAINERS for Jason Gunthorpe
From
: Peter Huewe <peterhuewe@xxxxxx>
Re: [PATCH V3] EVM: Allow userland to permit modification of EVM-protected metadata
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
[PATCH] MAINTAINERS: update the IMA, EVM, trusted-keys, encrypted-keys entries
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH] tpm: Update MAINTAINERS for Jason Gunthorpe
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] MAINTAINERS: update TPM driver infrastructure changes
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH V4] EVM: Add support for portable signature format
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
[PATCH] evm: allow metadata changes for inode without xattr support
From
: Mikhail Kurinnoi <viewizard@xxxxxxxxxxxxx>
[PATCH V3] EVM: Allow userland to permit modification of EVM-protected metadata
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
[PATCH V4] EVM: Add support for portable signature format
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: [RFC PATCH] ima: require secure_boot rules in lockdown mode
From
: David Howells <dhowells@xxxxxxxxxx>
Re: [RFC PATCH] ima: require secure_boot rules in lockdown mode
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH] ima: require secure_boot rules in lockdown mode
From
: David Howells <dhowells@xxxxxxxxxx>
TPM device driver and TPM_RC_RETRY
From
: Ken Goldman <kgold@xxxxxxxxxxxxxxxxxx>
Re: [RFC] EVM: Add support for portable signature format
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [RFC] EVM: Add support for portable signature format
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
[PATCH] tpm: Update MAINTAINERS for Jason Gunthorpe
From
: Jason Gunthorpe <jgg@xxxxxxxx>
[PATCH v2] tpm: Move Linux RNG connection to hwrng
From
: Jason Gunthorpe <jgg@xxxxxxxx>
Re: [PATCH v5 17/18] ima: Implement support for module-style appended signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH] ima: require secure_boot rules in lockdown mode
From
: James Morris <james.l.morris@xxxxxxxxxx>
Re: [PATCH] MAINTAINERS: update TPM driver infrastructure changes
From
: Peter Huewe <peterhuewe@xxxxxx>
Re: Proposal: rename tpm1_eventlog.c and tpm2_eventlog.c
From
: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH] ima: require secure_boot rules in lockdown mode
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH V3 1/2] security: Add a cred_getsecid hook
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [RFC PATCH] ima: require secure_boot rules in lockdown mode
From
: David Howells <dhowells@xxxxxxxxxx>
Re: [RFC PATCH] ima: require secure_boot rules in lockdown mode
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH] ima: require secure_boot rules in lockdown mode
From
: David Howells <dhowells@xxxxxxxxxx>
Re: [RFC] EVM: Add support for portable signature format
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: [RFC] EVM: Add support for portable signature format
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [RFC] EVM: Add support for portable signature format
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: [RFC] EVM: Add support for portable signature format
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [RFC] EVM: Add support for portable signature format
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: [RFC] EVM: Add support for portable signature format
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: [RFC] EVM: Add support for portable signature format
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [RFC] EVM: Add support for portable signature format
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [RFC] EVM: Add support for portable signature format
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [RFC] EVM: Add support for portable signature format
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: [RFC] EVM: Add support for portable signature format
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Failed initialization on TUXEDO Book BU1406
From
: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
Re: [PATCH V3 1/2] security: Add a cred_getsecid hook
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: [PATCH V3 1/2] security: Add a cred_getsecid hook
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: [RFC] EVM: Add support for portable signature format
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: Usage of inode number in EVM signatures
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Usage of inode number in EVM signatures
From
: "Peter P." <p.pan48711@xxxxxxxxx>
RE: [RFC] EVM: Add support for portable signature format
From
: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxxx>
RE: [RFC] EVM: Add support for portable signature format
From
: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxxx>
Re: Proposal: rename tpm1_eventlog.c and tpm2_eventlog.c
From
: Thiebaud Weksteen <tweek@xxxxxxxxxx>
Re: [PATCH v5 12/18] MODSIGN: Export module signature definitions
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v5 12/18] MODSIGN: Export module signature definitions
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v5 18/18] ima: Write modsig to the measurement list
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v5 00/18] Appended signatures support for IMA appraisal
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v5 13/18] PKCS#7: Introduce pkcs7_get_message_sig and verify_pkcs7_message_sig
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v5 12/18] MODSIGN: Export module signature definitions
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v5 18/18] ima: Write modsig to the measurement list
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [RFC] EVM: Add support for portable signature format
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: Fixing CVE-2017-15361
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v3 4/5] efi: call get_event_log before ExitBootServices
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: Fixing CVE-2017-15361
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: Fixing CVE-2017-15361
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: Fixing CVE-2017-15361
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: Fixing CVE-2017-15361
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
From
: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
RE: Fixing CVE-2017-15361
From
: <Alexander.Steffen@xxxxxxxxxxxx>
RE: Fixing CVE-2017-15361
From
: <Alexander.Steffen@xxxxxxxxxxxx>
RE: Fixing CVE-2017-15361
From
: <Alexander.Steffen@xxxxxxxxxxxx>
Re: Fixing CVE-2017-15361
From
: Michal Suchánek <msuchanek@xxxxxxx>
Re: [PATCH V3 1/2] security: Add a cred_getsecid hook
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: Proposal: rename tpm1_eventlog.c and tpm2_eventlog.c
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: Fixing CVE-2017-15361
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH V3 1/2] security: Add a cred_getsecid hook
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: Fixing CVE-2017-15361
From
: Michal Suchánek <msuchanek@xxxxxxx>
Re: Fixing CVE-2017-15361
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: Fixing CVE-2017-15361
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: Fixing CVE-2017-15361
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v2] tpm: use struct tpm_chip for tpm_chip_find_get()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [RFC] EVM: Add support for portable signature format
From
: Mikhail Kurinnoi <viewizard@xxxxxxxxxxxxx>
Re: [PATCH V3 2/2] IMA: Support using new creds in appraisal policy
From
: James Morris <james.l.morris@xxxxxxxxxx>
Re: [RFC] EVM: Add support for portable signature format
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: [PATCH V3 1/2] security: Add a cred_getsecid hook
From
: James Morris <james.l.morris@xxxxxxxxxx>
Re: [RFC] EVM: Add support for portable signature format
From
: Mikhail Kurinnoi <viewizard@xxxxxxxxxxxxx>
[PATCH V3 1/2] security: Add a cred_getsecid hook
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
[PATCH V3 2/2] IMA: Support using new creds in appraisal policy
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
[RFC] EVM: Add support for portable signature format
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: Fixing CVE-2017-15361
From
: Peter Huewe <peterhuewe@xxxxxx>
Re: Fixing CVE-2017-15361
From
: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
Re: [PATCH v2] tpm: use struct tpm_chip for tpm_chip_find_get()
From
: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] tpm: use struct tpm_chip for tpm_chip_find_get()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] tpm: Move Linux RNG connection to hwrng
From
: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH] tpm: Move Linux RNG connection to hwrng
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v2] tpm: use struct tpm_chip for tpm_chip_find_get()
From
: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] tpm: use struct tpm_chip for tpm_chip_find_get()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] tpm: Move Linux RNG connection to hwrng
From
: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] tpm: Move Linux RNG connection to hwrng
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: Fixing CVE-2017-15361
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v3 2/2] ima: check signature enforcement against cmdline param instead of CONFIG
From
: "Bruno E. O. Meneguele" <brdeoliv@xxxxxxxxxx>
Re: [PATCH v3 2/2] ima: check signature enforcement against cmdline param instead of CONFIG
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH] tpm: Move Linux RNG connection to hwrng
From
: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
Re: [PATCH v2] tpm: use struct tpm_chip for tpm_chip_find_get()
From
: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH] tpm: Move Linux RNG connection to hwrng
From
: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] tpm: use struct tpm_chip for tpm_chip_find_get()
From
: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
Re: [PATCH v3 2/2] ima: check signature enforcement against cmdline param instead of CONFIG
From
: "Bruno E. O. Meneguele" <brdeoliv@xxxxxxxxxx>
Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
From
: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
Re: [PATCH] tpm: Move Linux RNG connection to hwrng
From
: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
Re: Fixing CVE-2017-15361
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Fixing CVE-2017-15361
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: Proposal: rename tpm1_eventlog.c and tpm2_eventlog.c
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH V3] EVM: Add support for portable signature format
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
[PATCH v2] tpm: use struct tpm_chip for tpm_chip_find_get()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
RE: [PATCH V3] EVM: Add support for portable signature format
From
: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxxx>
Re: [PATCH V3] EVM: Add support for portable signature format
From
: Mikhail Kurinnoi <viewizard@xxxxxxxxxxxxx>
Re: [PATCH V3] EVM: Add support for portable signature format
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: [PATCH V3] EVM: Add support for portable signature format
From
: Mikhail Kurinnoi <viewizard@xxxxxxxxxxxxx>
Re: [PATCH V3] EVM: Add support for portable signature format
From
: James Morris <james.l.morris@xxxxxxxxxx>
[PATCH V3] EVM: Add support for portable signature format
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
[PATCH V2] EVM: Allow userland to permit modification of EVM-protected xattrs
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: Proposal: rename tpm1_eventlog.c and tpm2_eventlog.c
From
: Thiebaud Weksteen <tweek@xxxxxxxxxx>
Re: [tpmdd-devel] tpm device not showing up in /dev anymore
From
: Laurent Bigonville <bigon@xxxxxxxxxx>
Re: [PATCH v3 2/2] ima: check signature enforcement against cmdline param instead of CONFIG
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH] tpm: Move Linux RNG connection to hwrng
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] tpm: remove chip_num parameter from in-kernel API
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Proposal: rename tpm1_eventlog.c and tpm2_eventlog.c
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] tpm: Move Linux RNG connection to hwrng
From
: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH] tpm: remove chip_num parameter from in-kernel API
From
: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
From
: Peter Huewe <peterhuewe@xxxxxx>
[PATCH] tpm: Move Linux RNG connection to hwrng
From
: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
From
: Dmitry Torokhov <dmitry.torokhov@xxxxxxxxx>
Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
From
: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
From
: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
From
: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
From
: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
[PATCH v3 2/2] ima: check signature enforcement against cmdline param instead of CONFIG
From
: "Bruno E. O. Meneguele" <brdeoliv@xxxxxxxxxx>
[PATCH v3 1/2] module: export module signature enforcement status
From
: "Bruno E. O. Meneguele" <brdeoliv@xxxxxxxxxx>
[PATCH v3 0/2] ima: change how MODULE_SIG_FORCE is checked on modules checking policy
From
: "Bruno E. O. Meneguele" <brdeoliv@xxxxxxxxxx>
Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
From
: Dmitry Torokhov <dmitry.torokhov@xxxxxxxxx>
Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
From
: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
From
: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
From
: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
From
: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
Re: [tpmdd-devel] tpm device not showing up in /dev anymore
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
From
: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
From
: PrasannaKumar Muralidharan <prasannatsmkumar@xxxxxxxxx>
Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [tpmdd-devel] tpm device not showing up in /dev anymore
From
: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH 1/2] xen-tpmfront: Use common error handling code in vtpm_send()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] tpm_tis_core: Use common error handling code in tpm_tis_send_data()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH 2/2] xen-tpmfront: Combine two condition checks into one statement in vtpm_send()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [tpmdd-devel] tpm device not showing up in /dev anymore
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v4 1/4] tpm: move wait_for_tpm_stat() to respective driver files
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [RFC][PATCH 2/2] ima: don't measure files in the TCB if Biba strict policy is enforced
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v2 2/2] ima: check signature enforcement against cmdline param instead of CONFIG
From
: kbuild test robot <lkp@xxxxxxxxx>
Re: [RFC][PATCH 1/2] ima: preserve the integrity of appraised files
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH 1/2] security: Add a cred_getsecid hook
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [RFC][PATCH 2/2] ima: don't measure files in the TCB if Biba strict policy is enforced
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [RFC][PATCH 1/2] ima: preserve the integrity of appraised files
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
[PATCH v2 0/2] ima: change how MODULE_SIG_FORCE is checked on modules checking policy
From
: "Bruno E. O. Meneguele" <brdeoliv@xxxxxxxxxx>
[PATCH v2 1/2] module: export module signature enforcement status
From
: "Bruno E. O. Meneguele" <brdeoliv@xxxxxxxxxx>
[PATCH v2 2/2] ima: check signature enforcement against cmdline param instead of CONFIG
From
: "Bruno E. O. Meneguele" <brdeoliv@xxxxxxxxxx>
Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
From
: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/2] module: export module signature enforcement status
From
: "Bruno E. O. Meneguele" <brdeoliv@xxxxxxxxxx>
[RFC PATCH] ima: require secure_boot rules in lockdown mode
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [tpmdd-devel] [PATCH] tpm: remove chip_num parameter from in-kernel API
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/2] xen-tpmfront: Use common error handling code in vtpm_send()
From
: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH] tpm_tis_core: Use common error handling code in tpm_tis_send_data()
From
: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
Re: [tpmdd-devel] tpm device not showing up in /dev anymore
From
: Laurent Bigonville <bigon@xxxxxxxxxx>
Re: [PATCH] tpm_i2c_nuvoton: Use common error handling code in i2c_nuvoton_send()
From
: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
Re: [tpmdd-devel] tpm device not showing up in /dev anymore
From
: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
Re: [PATCH 2/2] xen-tpmfront: Combine two condition checks into one statement in vtpm_send()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH 1/2] xen-tpmfront: Use common error handling code in vtpm_send()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH 0/2] Xen vTPM frontend: Fine-tuning for vtpm_send()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] tpm_tis_core: Use common error handling code in tpm_tis_send_data()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [RFC][PATCH 1/2] ima: preserve the integrity of appraised files
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH] tpm_i2c_nuvoton: Use common error handling code in i2c_nuvoton_send()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v4 1/4] tpm: move wait_for_tpm_stat() to respective driver files
From
: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
Re: [tpmdd-devel] tpm device not showing up in /dev anymore
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH 3/4] char/tpm: Improve a size determination in nine functions
From
: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
Re: [PATCH 2/2] ima: check signature enforcement against cmdline param instead of CONFIG
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/2] module: export module signature enforcement status
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
[PATCH] tpm: remove chip_num parameter from in-kernel API
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [RFC][PATCH 1/2] ima: preserve the integrity of appraised files
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
[PATCH] tpm: remove a misleading error message from tpm_get_timeouts()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [RFC][PATCH 0/2] ima: preserve integrity of dynamic data
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH V2] EVM: Add support for portable signature format
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: Behaviour regarding scripts when enforcing digital signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH] tpm_tis_core: Use common error handling code in tpm_tis_send_data()
From
: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
Re: [PATCH 2/2] xen-tpmfront: Combine two condition checks into one statement in vtpm_send()
From
: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
Re: [PATCH v4 2/4] tpm: ignore burstcount to improve tpm_tis send() performance
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH 2/2] xen-tpmfront: Combine two condition checks into one statement in vtpm_send()
From
: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
[PATCH 1/2] xen-tpmfront: Use common error handling code in vtpm_send()
From
: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
[PATCH 0/2] Xen vTPM frontend: Fine-tuning for vtpm_send()
From
: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
[PATCH] tpm_tis_core: Use common error handling code in tpm_tis_send_data()
From
: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
[PATCH] tpm_i2c_nuvoton: Use common error handling code in i2c_nuvoton_send()
From
: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
Re: [tpmdd-devel] tpm device not showing up in /dev anymore
From
: Laurent Bigonville <bigon@xxxxxxxxxx>
Re: IMA appraisal against xz-compressed modules
From
: "Bruno E. O. Meneguele" <brdeoliv@xxxxxxxxxx>
[PATCH 1/2] module: export module signature enforcement status
From
: "Bruno E. O. Meneguele" <brdeoliv@xxxxxxxxxx>
[PATCH 0/2] ima: change how MODULE_SIG_FORCE is checked on modules checking policy
From
: "Bruno E. O. Meneguele" <brdeoliv@xxxxxxxxxx>
[PATCH 2/2] ima: check signature enforcement against cmdline param instead of CONFIG
From
: "Bruno E. O. Meneguele" <brdeoliv@xxxxxxxxxx>
Re: [PATCH v4 2/4] tpm: ignore burstcount to improve tpm_tis send() performance
From
: Ken Goldman <kgold@xxxxxxxxxxxxxxxxxx>
Re: TPM meetup in Prague?
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[RFC][PATCH 2/2] ima: don't measure files in the TCB if Biba strict policy is enforced
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[RFC][PATCH 1/2] ima: preserve the integrity of appraised files
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[RFC][PATCH 0/2] ima: preserve integrity of dynamic data
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Behaviour regarding scripts when enforcing digital signatures
From
: Matthias Gerstner <mgerstner@xxxxxxx>
RE: [PATCH v4 2/4] tpm: ignore burstcount to improve tpm_tis send() performance
From
: <Alexander.Steffen@xxxxxxxxxxxx>
RE: [PATCH 3/4] char/tpm: Improve a size determination in nine functions
From
: <Alexander.Steffen@xxxxxxxxxxxx>
Re: [PATCH 3/4] char/tpm: Improve a size determination in nine functions
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] EVM: Allow userland to permit modification of EVM-protected xattrs
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH 3/4] char/tpm: Improve a size determination in nine functions
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v4 1/4] tpm: move wait_for_tpm_stat() to respective driver files
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH] ima: fix hash algorithm initialization
From
: Boshi Wang <wangboshi@xxxxxxxxxx>
Re: TPM meetup in Prague?
From
: Enrico Perla <enrico.perla@xxxxxxxxxx>
Re: [PATCH] tpm: adjust command response sleep time for vTPM
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] ima: fix ineffective default hash algorithm due to invalid hash algorithm boot argument
From
: Boshi Wang <wangboshi@xxxxxxxxxx>
Re: TPM meetup in Prague?
From
: James Morris <james.l.morris@xxxxxxxxxx>
Re: [PATCH 1/2] security: Add a cred_getsecid hook
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH 2/2] IMA: Support using new creds in appraisal policy
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
[PATCH 1/2] security: Add a cred_getsecid hook
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
[PATCH] EVM: Allow userland to permit modification of EVM-protected xattrs
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
[PATCH V2] EVM: Add support for portable signature format
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: char/tpm: Less checks in tpm_ibmvtpm_probe() after error detection
From
: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
Re: IMA appraisal against xz-compressed modules
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: IMA appraisal against xz-compressed modules
From
: "Bruno E. O. Meneguele" <brdeoliv@xxxxxxxxxx>
Re: [PATCH] EVM: Add support for portable signature format
From
: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
Re: RFC: Make it practical to ship EVM signatures
From
: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
Re: [PATCH] EVM: Add support for portable signature format
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: [PATCH] EVM: Add support for portable signature format
From
: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
Re: [PATCH] EVM: Add support for portable signature format
From
: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
Re: [PATCH] EVM: Add support for portable signature format
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
TPM meetup in Prague?
From
: <Alexander.Steffen@xxxxxxxxxxxx>
Re: [PATCH] EVM: Add support for portable signature format
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: [PATCH] EVM: Add support for portable signature format
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: RFC: Make it practical to ship EVM signatures
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: Writing out EVM protected xattrs while EVM is active
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
RE: [PATCH v4 1/4] tpm: move wait_for_tpm_stat() to respective driver files
From
: <Alexander.Steffen@xxxxxxxxxxxx>
RE: [PATCH 3/4] char/tpm: Improve a size determination in nine functions
From
: <Alexander.Steffen@xxxxxxxxxxxx>
RE: [PATCH 1/6] IMA: Allow EVM validation on appraisal even without a symmetric key
From
: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
Re: Circumstances for using the tag “Fixes” (or not)
From
: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
RE: [PATCH] EVM: Add support for portable signature format
From
: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxxx>
Re: [PATCH] ima: fix ineffective default hash algorithm due to invalid hash algorithm boot argument
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH 4/4] char/tpm: Less checks in tpm_ibmvtpm_probe() after error detection
From
: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
Re: [PATCH 4/4] char/tpm: Less checks in tpm_ibmvtpm_probe() after error detection
From
: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
Re: [PATCH v4 2/4] tpm: ignore burstcount to improve tpm_tis send() performance
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v4 3/4] tpm: reduce tpm polling delay in tpm_tis_core
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v4 4/4] tpm: use tpm_msleep() value as max delay
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v4 1/4] tpm: move wait_for_tpm_stat() to respective driver files
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: IMA appraisal against xz-compressed modules
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH 4/4] char/tpm: Less checks in tpm_ibmvtpm_probe() after error detection
From
: Michal Suchánek <msuchanek@xxxxxxx>
Re: [PATCH 4/4] char/tpm: Less checks in tpm_ibmvtpm_probe() after error detection
From
: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
Re: [PATCH 0/4] char-TPM: Adjustments for ten function implementations
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH] EVM: Add support for portable signature format
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH 4/4] char/tpm: Less checks in tpm_ibmvtpm_probe() after error detection
From
: Michal Suchánek <msuchanek@xxxxxxx>
Re: [PATCH 4/4] char/tpm: Less checks in tpm_ibmvtpm_probe() after error detection
From
: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
Re: char/tpm: Improve a size determination in nine functions
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: char/tpm: Improve a size determination in nine functions
From
: Michal Suchánek <msuchanek@xxxxxxx>
Re: [PATCH] EVM: Add support for portable signature format
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH 4/4] char/tpm: Less checks in tpm_ibmvtpm_probe() after error detection
From
: Michal Suchánek <msuchanek@xxxxxxx>
Re: [PATCH] EVM: Add support for portable signature format
From
: Mikhail Kurinnoi <viewizard@xxxxxxxxxxxxx>
Re: RFC: Make it practical to ship EVM signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: RFC: Make it practical to ship EVM signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: Writing out EVM protected xattrs while EVM is active
From
: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
RE: [PATCH] EVM: Add support for portable signature format
From
: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxxx>
Re: Writing out EVM protected xattrs while EVM is active
From
: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
Re: RFC: Make it practical to ship EVM signatures
From
: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
Re: RFC: Make it practical to ship EVM signatures
From
: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
Re: [PATCH] MAINTAINERS: update TPM driver infrastructure changes
From
: Marc Zyngier <marc.zyngier@xxxxxxx>
Re: [GIT PULL] tpmdd updates for Linux 4.15
From
: James Morris <james.l.morris@xxxxxxxxxx>
Re: RFC: Make it practical to ship EVM signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: RFC: Make it practical to ship EVM signatures
From
: Mikhail Kurinnoi <viewizard@xxxxxxxxxxxxx>
Re: [PATCH 1/2] security: Add a cred_getsecid hook
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: [PATCH 2/2] IMA: Support using new creds in appraisal policy
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: RFC: Make it practical to ship EVM signatures
From
: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
Re: RFC: Make it practical to ship EVM signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: IMA appraisal against xz-compressed modules
From
: "Bruno E. O. Meneguele" <brdeoliv@xxxxxxxxxx>
Re: RFC: Make it practical to ship EVM signatures
From
: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
Re: Writing out EVM protected xattrs while EVM is active
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: char-TPM: Adjustments for ten function implementations
From
: Michal Suchánek <msuchanek@xxxxxxx>
Re: Writing out EVM protected xattrs while EVM is active
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: Writing out EVM protected xattrs while EVM is active
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: Writing out EVM protected xattrs while EVM is active
From
: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
Re: Writing out EVM protected xattrs while EVM is active
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: char/tpm: Delete an error message for a failed memory allocation in tpm_…()
From
: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
Re: Writing out EVM protected xattrs while EVM is active
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: char/tpm: Improve a size determination in nine functions
From
: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
[PATCH] EVM: Add support for portable signature format
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: char/tpm: Improve a size determination in nine functions
From
: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
Re: char/tpm: Improve a size determination in nine functions
From
: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
Re: Writing out EVM protected xattrs while EVM is active
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: char/tpm: Improve a size determination in nine functions
From
: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
Re: Writing out EVM protected xattrs while EVM is active
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: char/tpm: Improve a size determination in nine functions
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: char/tpm: Improve a size determination in nine functions
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH 0/4] char-TPM: Adjustments for ten function implementations
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: char/tpm: Improve a size determination in nine functions
From
: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 0/4] char-TPM: Adjustments for ten function implementations
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: char/tpm: Improve a size determination in nine functions
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[GIT PULL] tpmdd updates for Linux 4.15
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: char-TPM: Adjustments for ten function implementations
From
: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v4 2/4] tpm: ignore burstcount to improve tpm_tis send() performance
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v4 3/4] tpm: reduce tpm polling delay in tpm_tis_core
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: char/tpm: Improve a size determination in nine functions
From
: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 4/5] efi: call get_event_log before ExitBootServices
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH 0/4] char-TPM: Adjustments for ten function implementations
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH 0/4] char-TPM: Adjustments for ten function implementations
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH 0/4] char-TPM: Adjustments for ten function implementations
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: char/tpm: Improve a size determination in nine functions
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH 3/4] char/tpm: Improve a size determination in nine functions
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH 3/4] char/tpm: Improve a size determination in nine functions
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH 3/4] char/tpm: Improve a size determination in nine functions
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: Adjusting further size determinations?
From
: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
RE: Adjusting further size determinations?
From
: Julia Lawall <julia.lawall@xxxxxxx>
RE: Adjusting further size determinations?
From
: David Laight <David.Laight@xxxxxxxxxx>
Re: Adjusting further size determinations?
From
: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
Re: Adjusting further size determinations?
From
: Joe Perches <joe@xxxxxxxxxxx>
RE: char-TPM: Adjustments for ten function implementations
From
: <Alexander.Steffen@xxxxxxxxxxxx>
Re: Adjusting further size determinations?
From
: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
Re: char-TPM: Adjustments for ten function implementations
From
: Joe Perches <joe@xxxxxxxxxxx>
RE: char-TPM: Adjustments for ten function implementations
From
: <Alexander.Steffen@xxxxxxxxxxxx>
Re: char-TPM: Adjustments for ten function implementations
From
: Joe Perches <joe@xxxxxxxxxxx>
RE: char-TPM: Adjustments for ten function implementations
From
: Julia Lawall <julia.lawall@xxxxxxx>
Re: char-TPM: Adjustments for ten function implementations
From
: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
RE: char-TPM: Adjustments for ten function implementations
From
: <Alexander.Steffen@xxxxxxxxxxxx>
Re: char-TPM: Adjustments for ten function implementations
From
: Joe Perches <joe@xxxxxxxxxxx>
RE: [PATCH 3/4] char/tpm: Improve a size determination in nine functions
From
: <Alexander.Steffen@xxxxxxxxxxxx>
Re: char-TPM: Adjustments for ten function implementations
From
: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
[PATCH] ima: fix ineffective default hash algorithm due to invalid hash algorithm boot argument
From
: Boshi Wang <wangboshi@xxxxxxxxxx>
Re: [Linux-ima-devel] [PATCH] ima: fix ineffective default hash algorithm due to invalid hash algorithm boot argument
From
: Boshi Wang <wangboshi@xxxxxxxxxx>
Re: [PATCH 0/4] char-TPM: Adjustments for ten function implementations
From
: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
Re: Writing out EVM protected xattrs while EVM is active
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: Writing out EVM protected xattrs while EVM is active
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: Writing out EVM protected xattrs while EVM is active
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: Writing out EVM protected xattrs while EVM is active
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: Writing out EVM protected xattrs while EVM is active
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
[PATCH v5 02/18] ima: Remove some superfluous parentheses
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
[PATCH v5 01/18] ima: Remove redundant conditional operator
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
[PATCH v5 04/18] evm, ima: Remove more superfluous parentheses
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
[PATCH v5 03/18] evm, ima: Remove superfluous parentheses
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
[PATCH v5 05/18] ima: Simplify ima_eventsig_init
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
[PATCH v5 06/18] ima: Improvements in ima_appraise_measurement
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
[PATCH v5 07/18] integrity: Introduce struct evm_xattr
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
[PATCH v5 08/18] integrity: Select CONFIG_KEYS instead of depending on it
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
[PATCH v5 09/18] ima: Don't pass xattr value to EVM xattr verification.
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
[PATCH v5 10/18] ima: Store measurement after appraisal
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
[PATCH v5 11/18] ima: Export func_tokens
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
[PATCH v5 13/18] PKCS#7: Introduce pkcs7_get_message_sig and verify_pkcs7_message_sig
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
[PATCH v5 14/18] integrity: Introduce integrity_keyring_from_id
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
[PATCH v5 16/18] ima: Add functions to read and verify a modsig signature
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
[PATCH v5 17/18] ima: Implement support for module-style appended signatures
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
[PATCH v5 18/18] ima: Write modsig to the measurement list
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
[PATCH v5 15/18] ima: Add modsig appraise_type option for module-style appended signatures
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
[PATCH v5 12/18] MODSIGN: Export module signature definitions
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
[PATCH v5 00/18] Appended signatures support for IMA appraisal
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
Writing out EVM protected xattrs while EVM is active
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: [PATCH 0/4] char-TPM: Adjustments for ten function implementations
From
: Joe Perches <joe@xxxxxxxxxxx>
Re: [Linux-ima-devel] Centos7 execute 'su -c "keyctl pipe 820080884"' show keyctl_read_alloc: Permission denied
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [Linux-ima-devel] [PATCH] ima: fix ineffective default hash algorithm due to invalid hash algorithm boot argument
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
[PATCH v4 0/4] additional TPM performance improvements
From
: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
[PATCH v4 1/4] tpm: move wait_for_tpm_stat() to respective driver files
From
: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
[PATCH v4 2/4] tpm: ignore burstcount to improve tpm_tis send() performance
From
: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
[PATCH v4 3/4] tpm: reduce tpm polling delay in tpm_tis_core
From
: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
[PATCH v4 4/4] tpm: use tpm_msleep() value as max delay
From
: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
Re: char/tpm: Improve a size determination in nine functions
From
: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
Re: char/tpm: Improve a size determination in nine functions
From
: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
Re: char/tpm: Improve a size determination in nine functions
From
: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
Re: char/tpm: Improve a size determination in nine functions
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/2] IMA: Support using new creds in appraisal policy
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: char/tpm: Improve a size determination in nine functions
From
: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 0/4] char-TPM: Adjustments for ten function implementations
From
: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 0/4] char-TPM: Adjustments for ten function implementations
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 3/4] char/tpm: Improve a size determination in nine functions
From
: Julia Lawall <julia.lawall@xxxxxxx>
RE: [PATCH 3/4] char/tpm: Improve a size determination in nine functions
From
: <Alexander.Steffen@xxxxxxxxxxxx>
Re: [PATCH 3/4] char/tpm: Improve a size determination in nine functions
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH 3/4] char/tpm: Improve a size determination in nine functions
From
: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
Re: [PATCH 3/4] char/tpm: Improve a size determination in nine functions
From
: Julia Lawall <julia.lawall@xxxxxxx>
Re: [PATCH 3/4] char/tpm: Improve a size determination in nine functions
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH 0/4] char-TPM: Adjustments for ten function implementations
From
: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
RE: [PATCH 3/4] char/tpm: Improve a size determination in nine functions
From
: <Alexander.Steffen@xxxxxxxxxxxx>
Re: [PATCH 0/4] char-TPM: Adjustments for ten function implementations
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH 3/4] char/tpm: Improve a size determination in nine functions
From
: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
Re: [PATCH 0/4] char-TPM: Adjustments for ten function implementations
From
: Julia Lawall <julia.lawall@xxxxxxx>
Re: [PATCH 0/4] char-TPM: Adjustments for ten function implementations
From
: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
Re: [PATCH 0/4] char-TPM: Adjustments for ten function implementations
From
: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 0/4] char-TPM: Adjustments for ten function implementations
From
: Julia Lawall <julia.lawall@xxxxxxx>
Re: [PATCH 0/4] char-TPM: Adjustments for ten function implementations
From
: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
Re: [PATCH v3 4/5] efi: call get_event_log before ExitBootServices
From
: Thiebaud Weksteen <tweek@xxxxxxxxxx>
Re: [PATCH 0/4] char-TPM: Adjustments for ten function implementations
From
: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 0/4] char-TPM: Adjustments for ten function implementations
From
: Joe Perches <joe@xxxxxxxxxxx>
Re: [PATCH 1/2] security: Add a cred_getsecid hook
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH 2/2] IMA: Support using new creds in appraisal policy
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: [PATCH 2/2] IMA: Support using new creds in appraisal policy
From
: Mikhail Kurinnoi <viewizard@xxxxxxxxxxxxx>
Re: [PATCH 0/4] char-TPM: Adjustments for ten function implementations
From
: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
[PATCH 2/2] IMA: Support using new creds in appraisal policy
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
[PATCH 1/2] security: Add a cred_getsecid hook
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: [PATCH 0/4] char-TPM: Adjustments for ten function implementations
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH 0/4] char-TPM: Adjustments for ten function implementations
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH V3 2/2] Add a bprm_interpreted security hook and call into IMA from it
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: [PATCH V2] EVM: Allow userspace to signal an RSA key has been loaded
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
[PATCH 4/4] char/tpm: Less checks in tpm_ibmvtpm_probe() after error detection
From
: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
[PATCH 3/4] char/tpm: Improve a size determination in nine functions
From
: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
[PATCH 2/4] char/tpm: Delete an error message for a failed memory allocation in tpm_ibmvtpm_probe()
From
: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
[PATCH 1/4] char/tpm: Delete an error message for a failed memory allocation in tpm_ascii_bios_measurements_show()
From
: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
[PATCH 0/4] char-TPM: Adjustments for ten function implementations
From
: SF Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 4/5] efi: call get_event_log before ExitBootServices
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] keys, trusted: fix missing support for TPM 2.0 in trusted_update()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v3 4/5] efi: call get_event_log before ExitBootServices
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v3 4/5] efi: call get_event_log before ExitBootServices
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH] keys, trusted: fix missing support for TPM 2.0 in trusted_update()
From
: Boshi Wang <wangboshi@xxxxxxxxxx>
Re: [PATCH] EVM: Include security.apparmor in EVM measurements
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH V2] EVM: Allow userspace to signal an RSA key has been loaded
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH V3 2/2] Add a bprm_interpreted security hook and call into IMA from it
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: IMA appraisal against xz-compressed modules
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [tpmdd-devel] tpm device not showing up in /dev anymore
From
: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
Re: [PATCH] EVM: Include security.apparmor in EVM measurements
From
: John Johansen <john.johansen@xxxxxxxxxxxxx>
[PATCH] EVM: Include security.apparmor in EVM measurements
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: [PATCH v3 4/5] efi: call get_event_log before ExitBootServices
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: RFC: Make it practical to ship EVM signatures
From
: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
Re: [PATCH v3 4/5] efi: call get_event_log before ExitBootServices
From
: Javier Martinez Canillas <javier@xxxxxxxxxxxx>
IMA appraisal against xz-compressed modules
From
: "Bruno E. O. Meneguele" <brdeoliv@xxxxxxxxxx>
Re: [PATCH v3 4/5] tpm: reduce tpm_msleep() time in get_burstcount()
From
: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 4/5] efi: call get_event_log before ExitBootServices
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v3 5/5] tpm: use tpm_msleep() value as max delay
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v3 4/5] tpm: reduce tpm_msleep() time in get_burstcount()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v3 3/5] tpm: reduce polling delay in tpm_tis wait_for_tpm_stat()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH V3 2/2] Add a bprm_interpreted security hook and call into IMA from it
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
[PATCH V3 1/2] IMA: Add support for IMA validation after credentials are committed
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
[PATCH V2] EVM: Only complain about a missing HMAC key once
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
[PATCH V2] EVM: Allow userspace to signal an RSA key has been loaded
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: [PATCH] EVM: Allow userspace to signal an RSA key has been loaded
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: [PATCH] EVM: Allow userspace to signal an RSA key has been loaded
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH] vfs: fix mounting a filesystem with i_version
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 4/5] efi: call get_event_log before ExitBootServices
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v3 4/5] efi: call get_event_log before ExitBootServices
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH 13/18] tpm: use ARRAY_SIZE
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v3 2/5] tpm: ignore burstcount to improve tpm_tis send() performance
From
: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 4/5] efi: call get_event_log before ExitBootServices
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH V2] IMA: Add support for IMA validation after credentials are committed
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
[PATCH V2] IMA: Add support for IMA validation after credentials are committed
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
[PATCH] IMA: Add support for IMA validation after credentials are committed
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
[PATCH] EVM: Only complain about a missing HMAC key once
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
[PATCH] EVM: Allow userspace to signal an RSA key has been loaded
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: [PATCH] IMA: Add support for IMA validation after credentials are committed
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: [PATCH] IMA: Add support for IMA validation after credentials are committed
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH 13/18] tpm: use ARRAY_SIZE
From
: Jérémy Lefaure <jeremy.lefaure@xxxxxxxxxxxx>
Re: RFC: Make it practical to ship EVM signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 2/5] tpm: ignore burstcount to improve tpm_tis send() performance
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v3 1/5] tpm: move wait_for_tpm_stat() to respective driver files
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v3 4/5] efi: call get_event_log before ExitBootServices
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: RFC: Make it practical to ship EVM signatures
From
: Mikhail Kurinnoi <viewizard@xxxxxxxxxxxxx>
Re: RFC: Make it practical to ship EVM signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: RFC: Make it practical to ship EVM signatures
From
: Mikhail Kurinnoi <viewizard@xxxxxxxxxxxxx>
Re: RFC: Make it practical to ship EVM signatures
From
: Mikhail Kurinnoi <viewizard@xxxxxxxxxxxxx>
Re: RFC: Make it practical to ship EVM signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: RFC: Make it practical to ship EVM signatures
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: RFC: Make it practical to ship EVM signatures
From
: Mikhail Kurinnoi <viewizard@xxxxxxxxxxxxx>
Re: RFC: Make it practical to ship EVM signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: RFC: Make it practical to ship EVM signatures
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: RFC: Make it practical to ship EVM signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: RFC: Make it practical to ship EVM signatures
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: RFC: Make it practical to ship EVM signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH] vfs: fix mounting a filesystem with i_version
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH] vfs: fix mounting a filesystem with i_version
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH] vfs: fix mounting a filesystem with i_version
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
[PATCH] vfs: fix mounting a filesystem with i_version
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Digest list extension for IMA
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH 00/18] use ARRAY_SIZE macro
From
: "J. Bruce Fields" <bfields@xxxxxxxxxxxx>
Re: mailing list archive
From
: Ruben Roy <rubenroy2005@xxxxxxxxx>
mailing list archive
From
: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
Re: Re: [PATCH] MAINTAINERS: update TPM driver infrastructure changes
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH 13/18] tpm: use ARRAY_SIZE
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH 3/3] tpm: add the crypto algorithm identifier to active_bank_info
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v3 4/5] efi: call get_event_log before ExitBootServices
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v3 4/5] efi: call get_event_log before ExitBootServices
From
: Thiebaud Weksteen <tweek@xxxxxxxxxx>
Re: [PATCH 2/3] tpm: retrieve digest size of unknown algorithms with PCR read
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v3 4/5] efi: call get_event_log before ExitBootServices
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH 1/3] tpm: move PCR read code to static function tpm2_pcr_read_common()
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH v3 4/5] tpm: reduce tpm_msleep() time in get_burstcount()
From
: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
[PATCH v3 5/5] tpm: use tpm_msleep() value as max delay
From
: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
[PATCH v3 3/5] tpm: reduce polling delay in tpm_tis wait_for_tpm_stat()
From
: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
[PATCH v3 2/5] tpm: ignore burstcount to improve tpm_tis send() performance
From
: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
[PATCH v3 1/5] tpm: move wait_for_tpm_stat() to respective driver files
From
: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
[PATCH v3 0/4] additional TPM performance improvements
From
: Nayna Jain <nayna@xxxxxxxxxxxxxxxxxx>
Re: Re: [PATCH] MAINTAINERS: update TPM driver infrastructure changes
From
: Peter Huewe <peterhuewe@xxxxxx>
Re: [PATCH 0/3] tpm: retrieve digest size of unknown algorithms from TPM
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: Re: [PATCH] MAINTAINERS: update TPM driver infrastructure changes
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
RE: [PATCH] tpm: adjust command response sleep time for vTPM
From
: "Magalhaes, Guilherme (Brazil R&D-CL)" <guilherme.magalhaes@xxxxxxx>
[PATCH] tpm: adjust command response sleep time for vTPM
From
: Guilherme Magalhaes <guilherme.magalhaes@xxxxxxx>
IMA measurement performance degradation
From
: "Magalhaes, Guilherme (Brazil R&D-CL)" <guilherme.magalhaes@xxxxxxx>
Re: [PATCH 00/18] use ARRAY_SIZE macro
From
: Jérémy Lefaure <jeremy.lefaure@xxxxxxxxxxxx>
Re: RFC: Make it practical to ship EVM signatures
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: RFC: Make it practical to ship EVM signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/6] IMA: Allow EVM validation on appraisal even without a symmetric key
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH 00/18] use ARRAY_SIZE macro
From
: bfields@xxxxxxxxxxxx (J. Bruce Fields)
Re: RFC: Make it practical to ship EVM signatures
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: [PATCH 1/6] IMA: Allow EVM validation on appraisal even without a symmetric key
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: [PATCH 00/18] use ARRAY_SIZE macro
From
: Mauro Carvalho Chehab <mchehab@xxxxxxxxxxxxxxxx>
Re: RFC: Make it practical to ship EVM signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [RFC PATCH 3/3] fs: detect that the i_rwsem has already been taken exclusively
From
: Jeff Layton <jlayton@xxxxxxxxxx>
Re: [RFC PATCH 3/3] fs: detect that the i_rwsem has already been taken exclusively
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH 3/3] fs: detect that the i_rwsem has already been taken exclusively
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: RFC: Make it practical to ship EVM signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH 00/18] use ARRAY_SIZE macro
From
: Greg KH <greg@xxxxxxxxx>
Re: [RFC PATCH 3/3] fs: detect that the i_rwsem has already been taken exclusively
From
: Dave Chinner <david@xxxxxxxxxxxxx>
Re: [RFC PATCH 3/3] fs: detect that the i_rwsem has already been taken exclusively
From
: Dave Chinner <david@xxxxxxxxxxxxx>
Re: [RFC PATCH 3/3] fs: detect that the i_rwsem has already been taken exclusively
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH 00/18] use ARRAY_SIZE macro
From
: Jérémy Lefaure <jeremy.lefaure@xxxxxxxxxxxx>
Re: [RFC PATCH 3/3] fs: detect that the i_rwsem has already been taken exclusively
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH 3/3] fs: detect that the i_rwsem has already been taken exclusively
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH 3/3] fs: detect that the i_rwsem has already been taken exclusively
From
: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH 3/3] fs: detect that the i_rwsem has already been taken exclusively
From
: Dave Chinner <david@xxxxxxxxxxxxx>
Re: [RFC PATCH 3/3] fs: detect that the i_rwsem has already been taken exclusively
From
: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH 3/3] fs: detect that the i_rwsem has already been taken exclusively
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH 00/18] use ARRAY_SIZE macro
From
: "Tobin C. Harding" <me@xxxxxxxx>
[PATCH 13/18] tpm: use ARRAY_SIZE
From
: Jérémy Lefaure <jeremy.lefaure@xxxxxxxxxxxx>
[PATCH 00/18] use ARRAY_SIZE macro
From
: Jérémy Lefaure <jeremy.lefaure@xxxxxxxxxxxx>
Re: [RFC PATCH 3/3] fs: detect that the i_rwsem has already been taken exclusively
From
: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH 3/3] fs: detect that the i_rwsem has already been taken exclusively
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: RFC: Make it practical to ship EVM signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/6] IMA: Allow EVM validation on appraisal even without a symmetric key
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH 3/3] fs: detect that the i_rwsem has already been taken exclusively
From
: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
Re: [PATCH] MAINTAINERS: update TPM driver infrastructure changes
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Aw: Re: Re: Re: tpm_tis_spi gets initialized long after IMA
From
: "Peter Huewe" <PeterHuewe@xxxxxx>
Re: RFC: Make it practical to ship EVM signatures
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: RFC: Make it practical to ship EVM signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: Aw: Re: Re: tpm_tis_spi gets initialized long after IMA
From
: pau <pau@xxxxxxxxxxxxxxxxxx>
Re: RFC: Make it practical to ship EVM signatures
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: RFC: Make it practical to ship EVM signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Aw: Re: Re: tpm_tis_spi gets initialized long after IMA
From
: "Peter Huewe" <PeterHuewe@xxxxxx>
Aw: Re: [PATCH] MAINTAINERS: update TPM driver infrastructure changes
From
: "Peter Huewe" <PeterHuewe@xxxxxx>
Re: RFC: Make it practical to ship EVM signatures
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: [PATCH v3 4/5] efi: call get_event_log before ExitBootServices
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] MAINTAINERS: update TPM driver infrastructure changes
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: Aw: Re: tpm_tis_spi gets initialized long after IMA
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
RE: [PATCH] MAINTAINERS: update TPM driver infrastructure changes
From
: <Peter.Huewe@xxxxxxxxxxxx>
Aw: Re: tpm_tis_spi gets initialized long after IMA
From
: "Peter Huewe" <PeterHuewe@xxxxxx>
Re: [RFC PATCH 3/3] fs: detect that the i_rwsem has already been taken exclusively
From
: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH 3/3] fs: detect that the i_rwsem has already been taken exclusively
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: Aw: tpm_tis_spi gets initialized long after IMA
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: RFC: Make it practical to ship EVM signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH 3/3] fs: detect that the i_rwsem has already been taken exclusively
From
: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH 3/3] fs: detect that the i_rwsem has already been taken exclusively
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH 3/3] fs: detect that the i_rwsem has already been taken exclusively
From
: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH 3/3] fs: detect that the i_rwsem has already been taken exclusively
From
: Dave Chinner <david@xxxxxxxxxxxxx>
Aw: tpm_tis_spi gets initialized long after IMA
From
: "Peter Huewe" <PeterHuewe@xxxxxx>
tpm_tis_spi gets initialized long after IMA
From
: "Peter Huewe" <PeterHuewe@xxxxxx>
Re: RFC: Make it practical to ship EVM signatures
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: RFC: Make it practical to ship EVM signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH 1/3] fs: define new read_iter rwf flag
From
: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH 1/3] fs: define new read_iter rwf flag
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH 1/3] fs: define new read_iter rwf flag
From
: Matthew Wilcox <willy@xxxxxxxxxxxxx>
[RFC PATCH 3/3] fs: detect that the i_rwsem has already been taken exclusively
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
[RFC PATCH 0/3] define new read_iter file operation rwf flag
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
[RFC PATCH 1/3] fs: define new read_iter rwf flag
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
[RFC PATCH 2/3] integrity: use call_read_iter to calculate the file hash
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
[PATCH 6/6] EVM: Add a new digital signature format
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
[PATCH 5/6] EVM: Write out HMAC xattrs in the new format
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
[PATCH 4/6] EVM: Add an hmac_ng xattr format
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
[PATCH 3/6] EVM: Allow userland to override the default EVM attributes
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
[PATCH 2/6] EVM: Add infrastructure for making EVM fields optional
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
[PATCH 1/6] IMA: Allow EVM validation on appraisal even without a symmetric key
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
RFC: Make it practical to ship EVM signatures
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: [PATCH] ima: Support filesystems without i_version support
From
: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
[PATCH] ima: Use i_version only when filesystem supports it
From
: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
TPM 2.0 CRB driver & locality
From
: Jork Loeser <Jork.Loeser@xxxxxxxxxxxxx>
Re: about context gap
From
: Ken Goldman <kgold@xxxxxxxxxxxxxxxxxx>
Re: about context gap
From
: Ken Goldman <kgold@xxxxxxxxxxxxxxxxxx>
Re: [PATCH] MAINTAINERS: update TPM driver infrastructure changes
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH] ima: Support filesystems without i_version support
From
: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 4/5] efi: call get_event_log before ExitBootServices
From
: Thiebaud Weksteen <tweek@xxxxxxxxxx>
Re: [PATCH v3 4/5] efi: call get_event_log before ExitBootServices
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [tpmdd-devel] [PATCH v3 0/5] Call GetEventLog before ExitBootServices
From
: Javier Martinez Canillas <javierm@xxxxxxxxxx>
Re: [PATCH v3 2/5] tpm: rename event log provider files
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH 3/3] tpm: add the crypto algorithm identifier to active_bank_info
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 2/3] tpm: retrieve digest size of unknown algorithms with PCR read
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 1/3] tpm: move PCR read code to static function tpm2_pcr_read_common()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 0/3] tpm: retrieve digest size of unknown algorithms from TPM
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v3 0/5] Call GetEventLog before ExitBootServices
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v3 5/5] tpm: parse TPM event logs based on EFI table
From
: Jason Gunthorpe <jgunthorpe@xxxxxxxxxxxxxxxxxxxx>
[PATCH v3 1/5] tpm: move tpm_eventlog.h outside of drivers folder
From
: Thiebaud Weksteen <tweek@xxxxxxxxxx>
[PATCH v3 2/5] tpm: rename event log provider files
From
: Thiebaud Weksteen <tweek@xxxxxxxxxx>
[PATCH v3 4/5] efi: call get_event_log before ExitBootServices
From
: Thiebaud Weksteen <tweek@xxxxxxxxxx>
[PATCH v3 3/5] tpm: add event log format version
From
: Thiebaud Weksteen <tweek@xxxxxxxxxx>
[PATCH v3 5/5] tpm: parse TPM event logs based on EFI table
From
: Thiebaud Weksteen <tweek@xxxxxxxxxx>
[PATCH v3 0/5] Call GetEventLog before ExitBootServices
From
: Thiebaud Weksteen <tweek@xxxxxxxxxx>
Re: about context gap
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
about context gap
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH] MAINTAINERS: update TPM driver infrastructure changes
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [tpmdd-devel] New ML for TPM and IMA
From
: Joe Perches <joe@xxxxxxxxxxx>
Re: [tpmdd-devel] New ML for TPM and IMA
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [tpmdd-devel] New ML for TPM and IMA
From
: Joe Perches <joe@xxxxxxxxxxx>
Re: [tpmdd-devel] New ML for TPM and IMA
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [tpmdd-devel] New ML for TPM and IMA
From
: Peter Huewe <peterhuewe@xxxxxx>
Re: New ML for TPM and IMA
From
: Joe Perches <joe@xxxxxxxxxxx>
Re: New ML for TPM and IMA
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [tpmdd-devel] New ML for TPM and IMA
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [tpmdd-devel] New ML for TPM and IMA
From
: Peter Huewe <peterhuewe@xxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]