Linux Integrity
[Prev Page][Next Page]
- [PATCH v3 03/10] evm: Implement per signature type decision in security_inode_copy_up_xattr
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 02/10] security: allow finer granularity in permitting copy-up of security xattrs
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 08/10] evm: Enforce signatures on unsupported filesystem for EVM_INIT_X509
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 05/10] ima: Move file-change detection variables into new structure
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 06/10] evm: Store and detect metadata inode attributes changes
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 01/10] ima: Rename backing_inode to real_inode
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 04/10] evm: Use the metadata inode to calculate metadata hash
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 07/10] ima: re-evaluate file integrity on file metadata change
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 00/10] evm: Support signatures on stacked filesystem
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v7 19/21] tpm: add the null key name as a sysfs export
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 18/21] KEYS: trusted: Add session encryption protection to the seal/unseal path
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 17/21] tpm: add session encryption protection to tpm2_get_random()
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 16/21] tpm: add hmac checks to tpm2_pcr_extend()
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 15/21] tpm: Add the rest of the session HMAC API
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 14/21] tpm: Add HMAC session name/handle append
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 13/21] tpm: Add HMAC session start and end functions
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Re: [PATCH v7 12/21] tpm: Add NULL primary creation
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH v2 ima-evm-utils 4/6] Add support for OpenSSL provider to the library and evmctl
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 ima-evm-utils 3/6] evmctl: Replace deprecated sign_hash with imaevm_signhash
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 ima-evm-utils 1/6] headers: Remove usage of CONFIG_IMA_EVM_ENGINE from public header
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 ima-evm-utils 6/6] ci: Install pkcs11-provider where available
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 ima-evm-utils 5/6] tests: Add pkcs11 test using provider
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 ima-evm-utils 0/6] Deprecate sign_hash and add provider support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 ima-evm-utils 2/6] Pass ENGINE and keyid through to function using them
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 14/15] x86: Secure Launch late initcall platform module
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 20/25] ovl: add fscaps handlers
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 19/25] fs: add vfs_remove_fscaps()
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 18/25] fs: add vfs_set_fscaps()
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 17/25] fs: add vfs_get_fscaps()
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 16/25] fs: add inode operations to get/set/remove fscaps
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 11/25] security: add hooks for set/get/remove of fscaps
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 10/25] xattr: use is_fscaps_xattr()
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 09/25] commoncap: use is_fscaps_xattr()
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 08/25] xattr: add is_fscaps_xattr() helper
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 06/25] capability: provide helpers for converting between xattrs and vfs_caps
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 04/15] x86: Secure Launch Resource Table header file
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v5 6/8] ima: suspend measurements during buffer copy at kexec execute
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 00/25] fs: use type-safe uid representation for filesystem capabilities
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- Re: [RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v2 06/25] capability: provide helpers for converting between xattrs and vfs_caps
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- Re: [PATCH v2 00/25] fs: use type-safe uid representation for filesystem capabilities
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v5 6/8] ima: suspend measurements during buffer copy at kexec execute
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 7/8] ima: make the kexec extra memory configurable
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 07/25] capability: provide a helper for converting vfs_caps to xattr for userspace
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 06/25] capability: provide helpers for converting between xattrs and vfs_caps
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 05/25] capability: use vfsuid_t for vfs_caps rootids
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 03/25] capability: add static asserts for comapatibility of vfs_cap_data and vfs_ns_cap_data
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 02/25] mnt_idmapping: include cred.h
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 01/25] mnt_idmapping: split out core vfs[ug]id_t definitions into vfsid.h
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v8 14/15] x86: Secure Launch late initcall platform module
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Re: [PATCH v8 04/15] x86: Secure Launch Resource Table header file
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v8 04/15] x86: Secure Launch Resource Table header file
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Re: [PATCH v5 5/8] ima: kexec: move IMA log copy from kexec load to execute
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 15/25] security: call evm fscaps hooks from generic security hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 12/25] selinux: add hooks for fscaps operations
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- Re: [PATCH v2 15/25] security: call evm fscaps hooks from generic security hooks
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- Re: [PATCH v2 12/25] selinux: add hooks for fscaps operations
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 13/25] smack: add hooks for fscaps operations
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- Re: [PATCH v2 12/25] selinux: add hooks for fscaps operations
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- Re: [PATCH v2 11/25] security: add hooks for set/get/remove of fscaps
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- Re: [PATCH v2 15/25] security: call evm fscaps hooks from generic security hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 12/25] selinux: add hooks for fscaps operations
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 11/25] security: add hooks for set/get/remove of fscaps
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v8 15/15] x86: EFI stub DRTM launch support for Secure Launch
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 13/25] smack: add hooks for fscaps operations
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/8] ima: kexec: define functions to copy IMA log at soft boot
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 4/8] ima: kexec: define functions to copy IMA log at soft boot
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 25/25] vfs: return -EOPNOTSUPP for fscaps from vfs_*xattr()
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 24/25] commoncap: use vfs fscaps interfaces
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 23/25] commoncap: remove cap_inode_getsecurity()
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 15/25] security: call evm fscaps hooks from generic security hooks
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 21/25] ovl: use vfs_{get,set}_fscaps() for copy-up
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 19/25] fs: add vfs_remove_fscaps()
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 18/25] fs: add vfs_set_fscaps()
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 20/25] ovl: add fscaps handlers
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 17/25] fs: add vfs_get_fscaps()
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 16/25] fs: add inode operations to get/set/remove fscaps
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 22/25] fs: use vfs interfaces for capabilities xattrs
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 09/25] commoncap: use is_fscaps_xattr()
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 11/25] security: add hooks for set/get/remove of fscaps
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 14/25] evm: add support for fscaps security hooks
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 10/25] xattr: use is_fscaps_xattr()
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 13/25] smack: add hooks for fscaps operations
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 12/25] selinux: add hooks for fscaps operations
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 08/25] xattr: add is_fscaps_xattr() helper
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 07/25] capability: provide a helper for converting vfs_caps to xattr for userspace
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 06/25] capability: provide helpers for converting between xattrs and vfs_caps
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 05/25] capability: use vfsuid_t for vfs_caps rootids
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 03/25] capability: add static asserts for comapatibility of vfs_cap_data and vfs_ns_cap_data
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 02/25] mnt_idmapping: include cred.h
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 04/25] capability: rename cpu_vfs_cap_data to vfs_caps
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 01/25] mnt_idmapping: split out core vfs[ug]id_t definitions into vfsid.h
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 00/25] fs: use type-safe uid representation for filesystem capabilities
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- Re: [PATCH v8 15/15] x86: EFI stub DRTM launch support for Secure Launch
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH v5 2/8] kexec: define functions to map and unmap segments
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 15/15] x86: EFI stub DRTM launch support for Secure Launch
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 2/4] tsm: Add RTMRs to the configfs-tsm hierarchy
- From: Mikko Ylinen <mikko.ylinen@xxxxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH v1 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- Re: [ima-evm-utils: PATCH v1 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH v1 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- [ima-evm-utils: PATCH v1 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 0/8] ima: kexec: measure events between kexec load and execute
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 1/8] ima: define and call ima_alloc_kexec_file_buf
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v2 2/9] security: allow finer granularity in permitting copy-up of security xattrs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 3/3] tpm: make locality request return value consistent
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- Re: [PATCH v2 0/4] Add missing TPM compatible strings
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 0/4] Add missing TPM compatible strings
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 0/4] Add missing TPM compatible strings
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 0/4] Add missing TPM compatible strings
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [syzbot] [integrity?] [lsm?] KMSAN: uninit-value in ima_add_template_entry
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [syzbot] [integrity?] [lsm?] KMSAN: uninit-value in ima_add_template_entry
- From: syzbot <syzbot+7bc44a489f0ef0670bd5@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/8] ima: define and call ima_alloc_kexec_file_buf
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] tpm: make locality request return value consistent
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 3/3] tpm: make locality request return value consistent
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] tpm: ensure tpm is in known state at startup
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: init_tis() takes 50 ms on Dell XPS 13 9360 – almost 10 % of whole time until initrd
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/3] tpm: ensure tpm is in known state at startup
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 15/15] x86: EFI stub DRTM launch support for Secure Launch
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v8 14/15] x86: Secure Launch late initcall platform module
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v8 15/15] x86: EFI stub DRTM launch support for Secure Launch
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v10 00/25] security: Move IMA and EVM to the LSM infrastructure
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: init_tis() takes 50 ms on Dell XPS 13 9360 – almost 10 % of whole time until initrd
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: init_tis() takes 50 ms on Dell XPS 13 9360 – almost 10 % of whole time until initrd
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] integrity: eliminate unnecessary "Problem loading X.509 certificate" msg
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] integrity: eliminate unnecessary "Problem loading X.509 certificate" msg
- From: Coiby Xu <coxu@xxxxxxxxxx>
- Re: [PATCH v10 0/25] security: Move IMA and EVM to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 0/25] security: Move IMA and EVM to the LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- Re: [PATCH v8 14/15] x86: Secure Launch late initcall platform module
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v10 19/25] integrity: Move integrity_kernel_module_request() to IMA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
- From: "Dr. Greg" <greg@xxxxxxxxxxxx>
- Re: [PATCH v8 07/15] x86: Secure Launch kernel early boot stub
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v8 03/15] x86: Secure Launch Kconfig
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v10 19/25] integrity: Move integrity_kernel_module_request() to IMA
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 12/25] security: Introduce file_post_open hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v8 01/15] x86/boot: Place kernel_info at a fixed offset
- From: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
- [PATCH v10 17/25] security: Introduce inode_post_remove_acl hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 25/25] integrity: Remove LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 24/25] ima: Make it independent from 'integrity' LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 23/25] evm: Make it independent from 'integrity' LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 22/25] evm: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 21/25] ima: Move IMA-Appraisal to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 02/25] ima: Align ima_file_mprotect() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 20/25] ima: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 19/25] integrity: Move integrity_kernel_module_request() to IMA
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 18/25] security: Introduce key_post_create_or_update hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 16/25] security: Introduce inode_post_set_acl hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 15/25] security: Introduce inode_post_create_tmpfile hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 14/25] security: Introduce path_post_mknod hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 13/25] security: Introduce file_release hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 12/25] security: Introduce file_post_open hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 11/25] security: Introduce inode_post_removexattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 10/25] security: Introduce inode_post_setattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 09/25] security: Align inode_setattr hook definition with EVM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 08/25] evm: Align evm_inode_post_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 07/25] evm: Align evm_inode_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 06/25] evm: Align evm_inode_post_setattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 05/25] ima: Align ima_post_read_file() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 04/25] ima: Align ima_inode_removexattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 03/25] ima: Align ima_inode_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 01/25] ima: Align ima_inode_post_setattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 00/25] security: Move IMA and EVM to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 19/25] integrity: Move integrity_kernel_module_request() to IMA
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 15/15] x86: EFI stub DRTM launch support for Secure Launch
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v8 14/15] x86: Secure Launch late initcall platform module
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v8 07/15] x86: Secure Launch kernel early boot stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v9 12/25] security: Introduce file_post_open hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v8 04/15] x86: Secure Launch Resource Table header file
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v8 03/15] x86: Secure Launch Kconfig
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v8 01/15] x86/boot: Place kernel_info at a fixed offset
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v5 8/8] ima: measure kexec load and exec events as critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 8/8] ima: measure kexec load and exec events as critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/8] ima: kexec: define functions to copy IMA log at soft boot
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v5 2/8] kexec: define functions to map and unmap segments
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 13/15] tpm: Add sysfs interface to allow setting and querying the preferred locality
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 11/15] reboot: Secure Launch SEXIT support on reboot paths
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 12/15] tpm: Add ability to set the preferred locality the TPM chip uses
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 10/15] kexec: Secure Launch kexec SEXIT support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 09/15] x86: Secure Launch SMP bringup support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 07/15] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 02/15] Documentation/x86: Secure Launch kernel documentation
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 15/15] x86: EFI stub DRTM launch support for Secure Launch
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 08/15] x86: Secure Launch kernel late boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 14/15] x86: Secure Launch late initcall platform module
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 05/15] x86: Secure Launch main header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 01/15] x86/boot: Place kernel_info at a fixed offset
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 04/15] x86: Secure Launch Resource Table header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 00/15] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 03/15] x86: Secure Launch Kconfig
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v9 12/25] security: Introduce file_post_open hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 8/8] ima: measure kexec load and exec events as critical data
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 8/8] ima: measure kexec load and exec events as critical data
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 5/8] ima: kexec: move IMA log copy from kexec load to execute
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 4/8] ima: kexec: define functions to copy IMA log at soft boot
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v9 12/25] security: Introduce file_post_open hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/8] kexec: define functions to map and unmap segments
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v5 7/8] ima: make the kexec extra memory configurable
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 1/8] ima: define and call ima_alloc_kexec_file_buf
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 5/8] ima: kexec: move IMA log copy from kexec load to execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 8/8] ima: measure kexec load and exec events as critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 6/8] ima: suspend measurements during buffer copy at kexec execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 2/8] kexec: define functions to map and unmap segments
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 3/8] ima: kexec: skip IMA segment validation after kexec soft reboot
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 4/8] ima: kexec: define functions to copy IMA log at soft boot
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 0/8] ima: kexec: measure events between kexec load and execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- init_tis() takes 50 ms on Dell XPS 13 9360 – almost 10 % of whole time until initrd
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- [RFC][PATCH 8/8] ima: Detect if digest cache changed since last measurement/appraisal
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 7/8] ima: Use digest cache for appraisal
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 6/8] ima: Use digest cache for measurement
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 5/8] ima: Record IMA verification result of digest lists in digest cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 4/8] ima: Add digest_cache_measure and digest_cache_appraise boot-time policies
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 3/8] ima: Add digest_cache policy keyword
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 2/8] ima: Nest iint mutex for DIGEST_LIST_CHECK hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 1/8] ima: Introduce hook DIGEST_LIST_CHECK
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 0/8] ima: Integrate with digest_cache LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- Re: [PATCH v7 00/21] add integrity and security to TPM2 transactions
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 9/9] ima: Record i_version of real_inode for change detection
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v1 ima-evm-utils 4/6] Add support for OpenSSL provider to the library and evmctl
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v7 21/21] tpm: disable the TPM if NULL name changes
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 20/21] Documentation: add tpm-security.rst
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 19/21] tpm: add the null key name as a sysfs export
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 18/21] KEYS: trusted: Add session encryption protection to the seal/unseal path
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 17/21] tpm: add session encryption protection to tpm2_get_random()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 16/21] tpm: add hmac checks to tpm2_pcr_extend()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 15/21] tpm: Add the rest of the session HMAC API
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 14/21] tpm: Add HMAC session name/handle append
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 13/21] tpm: Add HMAC session start and end functions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 12/21] tpm: Add NULL primary creation
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 11/21] tpm: export the context save and load commands
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 10/21] tpm: add buffer function to point to returned parameters
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 09/21] crypto: lib - implement library version of AES in CFB mode
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 08/21] KEYS: trusted: tpm2: Use struct tpm_buf for sized buffers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 07/21] tpm: Add tpm_buf_read_{u8,u16,u32}
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 06/21] tpm: TPM2B formatted buffers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 05/21] tpm: Store the length of the tpm_buf data separately.
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 04/21] tpm: Update struct tpm_buf documentation comments
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 03/21] tpm: Move buffer handling from static inlines to real functions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 02/21] tpm: Remove tpm_send()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 01/21] tpm: Remove unused tpm_buf_tag()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 00/21] add integrity and security to TPM2 transactions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
- From: Mikko Ylinen <mikko.ylinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 19/25] integrity: Move integrity_kernel_module_request() to IMA
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 12/25] security: Introduce file_post_open hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 12/25] security: Introduce file_post_open hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/6] DCP as trusted keys backend
- From: Richard Weinberger <richard@xxxxxxxxxxxxx>
- Re: [PATCH v9 19/25] integrity: Move integrity_kernel_module_request() to IMA
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- Re: [PATCH v9 12/25] security: Introduce file_post_open hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 12/25] security: Introduce file_post_open hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 19/25] integrity: Move integrity_kernel_module_request() to IMA
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 25/25] integrity: Remove LSM
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v9 24/25] ima: Make it independent from 'integrity' LSM
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v9 23/25] evm: Make it independent from 'integrity' LSM
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v9 22/25] evm: Move to LSM infrastructure
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v9 19/25] integrity: Move integrity_kernel_module_request() to IMA
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 19/25] integrity: Move integrity_kernel_module_request() to IMA
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v9 20/25] ima: Move to LSM infrastructure
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v9 14/25] security: Introduce path_post_mknod hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v9 15/25] security: Introduce inode_post_create_tmpfile hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v9 13/25] security: Introduce file_release hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: (subset) [PATCH v2 00/33] spi: get rid of some legacy macros
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v3 02/13] security: Introduce the digest_cache LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: encrypted: Add check for strsep
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 02/13] security: Introduce the digest_cache LSM
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v3 00/17] kexec: Allow preservation of ftrace buffers
- From: Philipp Rudo <prudo@xxxxxxxxxx>
- [PATCH v3 13/13] docs: Add documentation of the digest_cache LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 12/13] selftests/digest_cache: Add selftests for digest_cache LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 11/13] digest_cache: Reset digest cache on file/directory change
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 10/13] digest cache: Prefetch digest lists if requested
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 09/13] digest_cache: Add support for directories
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 08/13] digest_cache: Add management of verification data
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 07/13] digest_cache: Parse rpm digest lists
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 06/13] digest_cache: Parse tlv digest lists
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 05/13] digest_cache: Populate the digest cache from a digest list
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 04/13] digest_cache: Add hash tables and operations
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 03/13] digest_cache: Add securityfs interface
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 02/13] security: Introduce the digest_cache LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 01/13] lib: Add TLV parser
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 00/13] security: digest_cache LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 12/25] security: Introduce file_post_open hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 12/25] security: Introduce file_post_open hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v9 12/25] security: Introduce file_post_open hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 10/25] security: Introduce inode_post_setattr hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v9 11/25] security: Introduce inode_post_removexattr hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v9 13/25] security: Introduce file_release hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v9 12/25] security: Introduce file_post_open hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v9 12/25] security: Introduce file_post_open hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v9 12/25] security: Introduce file_post_open hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v9 14/25] security: Introduce path_post_mknod hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v9 15/25] security: Introduce inode_post_create_tmpfile hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v9 17/25] security: Introduce inode_post_remove_acl hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v9 16/25] security: Introduce inode_post_set_acl hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v9 20/25] ima: Move to LSM infrastructure
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v9 22/25] evm: Move to LSM infrastructure
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v9 21/25] ima: Move IMA-Appraisal to LSM infrastructure
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v3 00/32] spi: get rid of some legacy macros
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v9 0/25] security: Move IMA and EVM to the LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 0/25] security: Move IMA and EVM to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 25/25] integrity: Remove LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 23/25] evm: Make it independent from 'integrity' LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 22/25] evm: Move to LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 19/25] integrity: Move integrity_kernel_module_request() to IMA
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 21/25] ima: Move IMA-Appraisal to LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 20/25] ima: Move to LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 18/25] security: Introduce key_post_create_or_update hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 17/25] security: Introduce inode_post_remove_acl hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 15/25] security: Introduce inode_post_create_tmpfile hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 16/25] security: Introduce inode_post_set_acl hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 14/25] security: Introduce path_post_mknod hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 13/25] security: Introduce file_release hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 12/25] security: Introduce file_post_open hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 11/25] security: Introduce inode_post_removexattr hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 10/25] security: Introduce inode_post_setattr hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 9/25] security: Align inode_setattr hook definition with EVM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 8/25] evm: Align evm_inode_post_setxattr() definition with LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 7/25] evm: Align evm_inode_setxattr() definition with LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 4/25] ima: Align ima_inode_removexattr() definition with LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 6/25] evm: Align evm_inode_post_setattr() definition with LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 5/25] ima: Align ima_post_read_file() definition with LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 3/25] ima: Align ima_inode_setxattr() definition with LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 2/25] ima: Align ima_file_mprotect() definition with LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 1/25] ima: Align ima_inode_post_setattr() definition with LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 0/25] security: Move IMA and EVM to the LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
- From: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- [PATCH v3 00/32] spi: get rid of some legacy macros
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH v3 26/32] tpm_tis_spi: Follow renaming of SPI "master" to "controller"
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH v2 4/9] ima: Reset EVM status upon detecting changes to the real file
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH RFC v12 15/20] ipe: add support for dm-verity as a trust provider
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 5/9] evm: Use the inode holding the metadata to calculate metadata hash
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 0/2] Decomplicate file_dentry()
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 9/9] ima: Record i_version of real_inode for change detection
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH v2 4/9] ima: Reset EVM status upon detecting changes to the real file
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v2 1/9] ima: Rename backing_inode to real_inode
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v2 5/9] evm: Use the inode holding the metadata to calculate metadata hash
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH 2/2] fs: remove the inode argument to ->d_real() method
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v2 2/9] security: allow finer granularity in permitting copy-up of security xattrs
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v2 9/9] ima: Record i_version of real_inode for change detection
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v2 7/9] fs: Rename SB_I_EVM_UNSUPPORTED to SB_I_EVM_HMAC_UNSUPPORTED
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v2 4/9] ima: Reset EVM status upon detecting changes to the real file
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- Re: [PATCH RFC v12 8/20] ipe: add userspace interface
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v12 15/20] ipe: add support for dm-verity as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v12 8/20] ipe: add userspace interface
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v12 8/20] ipe: add userspace interface
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v12 6/20] ipe: introduce 'boot_verified' as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v12 5/20] initramfs|security: Add security hook to initramfs unpack
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 4/9] ima: Reset EVM status upon detecting changes to the real file
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 6/9] evm: Enforce signatures on unsupported filesystem for EVM_INIT_X509
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 5/9] evm: Use the inode holding the metadata to calculate metadata hash
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 1/9] ima: Rename backing_inode to real_inode
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 8/9] evm: Rename is_unsupported_fs to is_unsupported_hmac_fs
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 3/9] evm: Implement per signature type decision in security_inode_copy_up_xattr
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 7/9] fs: Rename SB_I_EVM_UNSUPPORTED to SB_I_EVM_HMAC_UNSUPPORTED
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 2/9] security: allow finer granularity in permitting copy-up of security xattrs
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 0/9] evm: Support signatures on stacked filesystem
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 9/9] ima: Record i_version of real_inode for change detection
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v1 ima-evm-utils 0/6] Deprecate sign_hash and add provider support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v1 ima-evm-utils 1/6] headers: Remove usage of CONFIG_IMA_EVM_ENGINE from public header
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v1 ima-evm-utils 3/6] evmctl: Replace deprecated sign_hash with imaevm_signhash
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v1 ima-evm-utils 6/6] ci: Install pkcs11-provider where available
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v1 ima-evm-utils 4/6] Add support for OpenSSL provider to the library and evmctl
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v1 ima-evm-utils 2/6] Pass ENGINE and keyid through to function using them
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v1 ima-evm-utils 5/6] tests: Add pkcs11 test using provider
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 0/6] DCP as trusted keys backend
- From: David Gstir <david@xxxxxxxxxxxxx>
- [ANNOUNCE] CFP: Linux Security Summit Europe 2024
- From: "Reshetova, Elena" <elena.reshetova@xxxxxxxxx>
- Re: [PATCH RFC v12 17/20] ipe: enable support for fs-verity as a trust provider
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v12 15/20] ipe: add support for dm-verity as a trust provider
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v12 10/20] ipe: add permissive toggle
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v12 9/20] uapi|audit|ipe: add ipe auditing support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v12 8/20] ipe: add userspace interface
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v12 6/20] ipe: introduce 'boot_verified' as a trust provider
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v12 5/20] initramfs|security: Add security hook to initramfs unpack
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
- From: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v12 12/20] dm verity: set DM_TARGET_SINGLETON feature flag
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
- From: Dan Middleton <dan.middleton@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] fs: remove the inode argument to ->d_real() method
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v12 12/20] dm verity: set DM_TARGET_SINGLETON feature flag
- From: Mike Snitzer <snitzer@xxxxxxxxxx>
- Re: [PATCH 2/2] fs: remove the inode argument to ->d_real() method
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] fs: remove the inode argument to ->d_real() method
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] fs: remove the inode argument to ->d_real() method
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] fs: remove the inode argument to ->d_real() method
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 4/5] evm: Use the real inode's metadata to calculate metadata hash
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 4/5] evm: Use the real inode's metadata to calculate metadata hash
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH 2/2] fs: remove the inode argument to ->d_real() method
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/5] evm: Use the real inode's metadata to calculate metadata hash
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] fs: remove the inode argument to ->d_real() method
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/5] evm: Use the real inode's metadata to calculate metadata hash
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH 2/2] fs: remove the inode argument to ->d_real() method
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] fs: make file_dentry() a simple accessor
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] tpm: tis-i2c: Add more compatible strings
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH 4/5] evm: Use the real inode's metadata to calculate metadata hash
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] fs: remove the inode argument to ->d_real() method
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v3 00/17] kexec: Allow preservation of ftrace buffers
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [PATCH 2/2] fs: remove the inode argument to ->d_real() method
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH 2/2] fs: remove the inode argument to ->d_real() method
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH 1/5] security: allow finer granularity in permitting copy-up of security xattrs
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH 1/2] fs: make file_dentry() a simple accessor
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH 2/2] fs: remove the inode argument to ->d_real() method
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH 0/2] Decomplicate file_dentry()
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH 4/5] evm: Use the real inode's metadata to calculate metadata hash
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 3/4] tsm: Map RTMRs to TCG TPM PCRs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH] tpm: make locality handling resilient
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH] tpm,tpm_tis: Avoid warning splat at shutdown
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH] KEYS: encrypted: Add check for strsep
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: make locality handling resilient
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm,tpm_tis: Avoid warning splat at shutdown
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm,tpm_tis: Avoid warning splat at shutdown
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: tpm_tis_remove: `WARNING: CPU: 6 PID: 265 at kernel/workqueue.c:3397 __flush_work.isra.0+0x29f/0x2c0`
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 3/3] tpm: make locality request return value consistent
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/3] tpm: ensure tpm is in known state at startup
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 2/4] tsm: Add RTMRs to the configfs-tsm hierarchy
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 1/4] tsm: Runtime measurement register support
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 00/33] spi: get rid of some legacy macros
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] KEYS: encrypted: Add check for strsep
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 4/5] evm: Use the real inode's metadata to calculate metadata hash
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 5/5] evm: Enforce signatures on unsupported filesystem for EVM_INIT_X509
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: [PATCH] tpm,tpm_tis: Avoid warning splat at shutdown
- From: "Elliott, Robert (Servers)" <elliott@xxxxxxx>
- Re: [PATCH 1/5] security: allow finer granularity in permitting copy-up of security xattrs
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 1/5] security: allow finer granularity in permitting copy-up of security xattrs
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH 4/5] evm: Use the real inode's metadata to calculate metadata hash
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH 4/5] evm: Use the real inode's metadata to calculate metadata hash
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 1/5] security: allow finer granularity in permitting copy-up of security xattrs
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH 4/5] evm: Use the real inode's metadata to calculate metadata hash
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH] tpm,tpm_tis: Avoid warning splat at shutdown
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH v7 02/13] Documentation/x86: Secure Launch kernel documentation
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/5] security: allow finer granularity in permitting copy-up of security xattrs
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 4/5] evm: Use the real inode's metadata to calculate metadata hash
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/5] evm: Use the real inode's metadata to calculate metadata hash
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 3/3] tpm: make locality request return value consistent
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/5] evm: Use the real inode's metadata to calculate metadata hash
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH v2 0/3] tpm: make locality handling resilient
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- [no subject]
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 2/3] tpm: ensure tpm is in known state at startup
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/5] security: allow finer granularity in permitting copy-up of security xattrs
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 4/5] evm: Use the real inode's metadata to calculate metadata hash
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH 1/5] security: allow finer granularity in permitting copy-up of security xattrs
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 0/5] evm: Support signatures on stacked filesystem
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 3/5] ima: Reset EVM status upon detecting changes to overlay backing file
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 4/5] evm: Use the real inode's metadata to calculate metadata hash
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 1/5] security: allow finer granularity in permitting copy-up of security xattrs
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH 5/5] evm: Enforce signatures on unsupported filesystem for EVM_INIT_X509
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH 3/5] ima: Reset EVM status upon detecting changes to overlay backing file
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH 2/5] evm: Implement per signature type decision in security_inode_copy_up_xattr
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH 1/5] security: allow finer granularity in permitting copy-up of security xattrs
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH 0/5] evm: Support signatures on stacked filesystem
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH 4/5] evm: Use the real inode's metadata to calculate metadata hash
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH 4/5] evm: Use the real inode's metadata to calculate metadata hash
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC PATCH v12 20/20] documentation: add ipe documentation
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v12 19/20] ipe: kunit test for parser
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v12 17/20] ipe: enable support for fs-verity as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v12 08/20] ipe: add userspace interface
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v12 18/20] scripts: add boot policy generation program
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v12 15/20] ipe: add support for dm-verity as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v12 11/20] block|security: add LSM blob to block_device
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v12 09/20] uapi|audit|ipe: add ipe auditing support
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v12 10/20] ipe: add permissive toggle
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v12 16/20] fsverity: consume builtin signature via LSM hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v12 14/20] dm verity: consume root hash digest and signature data via LSM hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v12 12/20] dm verity: set DM_TARGET_SINGLETON feature flag
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v12 13/20] dm: add finalize hook to target_type
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v12 07/20] security: add new securityfs delete function
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v12 06/20] ipe: introduce 'boot_verified' as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v12 05/20] initramfs|security: Add security hook to initramfs unpack
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v12 04/20] ipe: add LSM hooks on execution and kernel read
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v12 03/20] ipe: add evaluation loop
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v12 02/20] ipe: add policy parser
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v12 00/20] Integrity Policy Enforcement LSM (IPE)
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v12 01/20] security: add ipe lsm
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH] MAINTAINERS: Add TPM DT bindings to TPM maintainers
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH 1/5] security: allow finer granularity in permitting copy-up of security xattrs
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 0/5] evm: Support signatures on stacked filesystem
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 4/5] evm: Use the real inode's metadata to calculate metadata hash
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 3/5] ima: Reset EVM status upon detecting changes to overlay backing file
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 2/5] evm: Implement per signature type decision in security_inode_copy_up_xattr
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 5/5] evm: Enforce signatures on unsupported filesystem for EVM_INIT_X509
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] KEYS: encrypted: Add check for strsep
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH] KEYS: encrypted: Add check for strsep
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] KEYS: encrypted: Add check for strsep
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] KEYS: encrypted: Add check for strsep
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] KEYS: encrypted: Add check for strsep
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 1/4] tsm: Runtime measurement register support
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH v3 00/17] kexec: Allow preservation of ftrace buffers
- From: Philipp Rudo <prudo@xxxxxxxxxx>
- Re: [RFC PATCH v2 3/4] tsm: Map RTMRs to TCG TPM PCRs
- From: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 2/4] tsm: Add RTMRs to the configfs-tsm hierarchy
- From: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- [RFC PATCH v2 4/4] tsm: Allow for extending and reading configured RTMRs
- From: Samuel Ortiz <sameo@xxxxxxxxxxxx>
- [RFC PATCH v2 3/4] tsm: Map RTMRs to TCG TPM PCRs
- From: Samuel Ortiz <sameo@xxxxxxxxxxxx>
- [RFC PATCH v2 2/4] tsm: Add RTMRs to the configfs-tsm hierarchy
- From: Samuel Ortiz <sameo@xxxxxxxxxxxx>
- [RFC PATCH v2 1/4] tsm: Runtime measurement register support
- From: Samuel Ortiz <sameo@xxxxxxxxxxxx>
- [RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
- From: Samuel Ortiz <sameo@xxxxxxxxxxxx>
- Re: [PATCH v4 1/7] ima: define and call ima_alloc_kexec_file_buf
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: ref leak in request_asymmetric_key ?
- From: "Billie Alsup (balsup)" <balsup@xxxxxxxxx>
- ref leak in request_asymmetric_key ?
- From: "Billie Alsup (balsup)" <balsup@xxxxxxxxx>
- [PATCH v5 0/2] Add device tree for IBM system1 BMC
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- Re: [PATCH v4 3/3] ARM: dts: aspeed: System1: IBM system1 BMC board
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- [PATCH v5 2/2] ARM: dts: aspeed: System1: IBM system1 BMC board
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- [PATCH v5 1/2] dt-bindings: arm: aspeed: add IBM system1-bmc
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- Re: [PATCH v1 1/1] tpm: tis-i2c: Add more compatible strings
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- Re: [PATCH v4 7/7] ima: measure kexec load and exec events as critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 6/7] ima: make the kexec extra memory configurable
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 4/7] ima: kexec: move ima log copy from kexec load to execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/7] ima: define and call ima_alloc_kexec_file_buf
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] ima: add crypto agility support for template-hash algorithm
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] ima: add crypto agility support for template-hash algorithm
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [GIT PULL] integrity: subsystem updates for v6.8-rc1
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH] tpm: make locality handling resilient
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: make locality handling resilient
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- [GIT PULL] integrity: subsystem updates for v6.8-rc1
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] KEYS: encrypted: Add check for strsep
- From: "Verma, Vishal L" <vishal.l.verma@xxxxxxxxx>
- Re: [PATCH] KEYS: encrypted: Add check for strsep
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] KEYS: encrypted: Add check for strsep
- From: "Verma, Vishal L" <vishal.l.verma@xxxxxxxxx>
- Re: [PATCH v2 00/33] spi: get rid of some legacy macros
- From: Jonathan Cameron <jic23@xxxxxxxxxx>
- [PATCH v3] ima: add crypto agility support for template-hash algorithm
- From: Enrico Bravi <enrico.bravi@xxxxxxxxx>
- Re: [PATCH] KEYS: encrypted: Add check for strsep
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] KEYS: encrypted: Add check for strsep
- From: "Verma, Vishal L" <vishal.l.verma@xxxxxxxxx>
- Re: [PATCH v2 00/33] spi: get rid of some legacy macros
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v2 00/33] spi: get rid of some legacy macros
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/33] spi: get rid of some legacy macros
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 4/7] ima: kexec: move ima log copy from kexec load to execute
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 7/7] ima: measure kexec load and exec events as critical data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 6/7] ima: make the kexec extra memory configurable
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/7] ima: define and call ima_alloc_kexec_file_buf
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/7] ima: define and call ima_alloc_kexec_file_buf
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/7] ima: define and call ima_alloc_kexec_file_buf
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v4 6/7] ima: make the kexec extra memory configurable
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v4 6/7] ima: make the kexec extra memory configurable
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 5/7] ima: suspend measurements during buffer copy at kexec execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/7] kexec: define functions to map and unmap segments
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 6/7] ima: make the kexec extra memory configurable
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v4 5/7] ima: suspend measurements during buffer copy at kexec execute
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/7] kexec: define functions to map and unmap segments
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2] ima: add crypto agility support for template-hash algorithm
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/33] spi: get rid of some legacy macros
- From: Jonathan Cameron <jic23@xxxxxxxxxx>
- [PATCH v4 7/7] ima: measure kexec load and exec events as critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 1/7] ima: define and call ima_alloc_kexec_file_buf
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 6/7] ima: make the kexec extra memory configurable
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 4/7] ima: kexec: move ima log copy from kexec load to execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 5/7] ima: suspend measurements during buffer copy at kexec execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 3/7] ima: kexec: skip IMA segment validation after kexec soft reboot
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 2/7] kexec: define functions to map and unmap segments
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 0/7] ima: kexec: measure events between kexec load and execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/33] spi: get rid of some legacy macros
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v2 00/33] spi: get rid of some legacy macros
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH v2 27/33] tpm_tis_spi: Follow renaming of SPI "master" to "controller"
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH v2] ima: add crypto agility support for template-hash algorithm
- From: Enrico Bravi <enrico.bravi@xxxxxxxxx>
- Re: [PATCH v2] ima: add crypto agility support for template-hash algorithm
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v2] ima: add crypto agility support for template-hash algorithm
- From: Enrico Bravi <enrico.bravi@xxxxxxxxx>
- Re: [PATCH v4 2/3] dt-bindings: Add DPS310 as trivial device
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- Re: tpm_tis_remove: `WARNING: CPU: 6 PID: 265 at kernel/workqueue.c:3397 __flush_work.isra.0+0x29f/0x2c0`
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm/tpm_ftpm_tee: fix all kernel-doc warnings
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: make locality handling resilient
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 27/33] tpm_tis_spi: Follow renaming of SPI "master" to "controller"
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: make locality handling resilient
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 2/3] dt-bindings: Add DPS310 as trivial device
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH] tpm: make locality handling resilient
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- Re: [PATCH v9 25/25] integrity: Remove LSM
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v9 24/25] ima: Make it independent from 'integrity' LSM
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v9 23/25] evm: Make it independent from 'integrity' LSM
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v9 21/25] ima: Move IMA-Appraisal to LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 3/3] ARM: dts: aspeed: System1: IBM system1 BMC board
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [PATCH v9 20/25] ima: Move to LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 3/3] ARM: dts: aspeed: System1: IBM system1 BMC board
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- [PATCH v4 2/3] dt-bindings: Add DPS310 as trivial device
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- [PATCH v4 1/3] dt-bindings: arm: aspeed: add IBM system1-bmc
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- [PATCH v4 0/3] Add device tree for IBM system1 BMC
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] dt-bindings: tpm: Add compatible string atmel,attpm20p
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v2 1/4] dt-bindings: tpm: Add compatible string atmel,attpm20p
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v9 13/25] security: Introduce file_release hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2 0/1] Add more compatibility strings to tpm-tis-i2c
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- [PATCH v2 1/1] tpm: tis-i2c: Add more compatible strings
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- Re: [PATCH v1 1/1] tpm: tis-i2c: Add more compatible strings
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- Re: [PATCH v9 13/25] security: Introduce file_release hook
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 13/25] security: Introduce file_release hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 00/33] spi: get rid of some legacy macros
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- tpm_tis_remove: `WARNING: CPU: 6 PID: 265 at kernel/workqueue.c:3397 __flush_work.isra.0+0x29f/0x2c0`
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: [PATCH 00/33] spi: get rid of some legacy macros
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH] arm64: dts: Fix TPM schema violations
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v9 13/25] security: Introduce file_release hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 00/33] spi: get rid of some legacy macros
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 27/33] tpm_tis_spi: Follow renaming of SPI "master" to "controller"
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH] arm64: dts: Fix TPM schema violations
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- [PATCH] tpm/tpm_ftpm_tee: fix all kernel-doc warnings
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v9 13/25] security: Introduce file_release hook
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [PATCH v9 13/25] security: Introduce file_release hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 04/25] ima: Align ima_inode_removexattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 25/25] integrity: Remove LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 24/25] ima: Make it independent from 'integrity' LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 23/25] evm: Make it independent from 'integrity' LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 22/25] evm: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 21/25] ima: Move IMA-Appraisal to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 20/25] ima: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 19/25] integrity: Move integrity_kernel_module_request() to IMA
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 18/25] security: Introduce key_post_create_or_update hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 17/25] security: Introduce inode_post_remove_acl hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 16/25] security: Introduce inode_post_set_acl hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 15/25] security: Introduce inode_post_create_tmpfile hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 14/25] security: Introduce path_post_mknod hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 12/25] security: Introduce file_post_open hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 11/25] security: Introduce inode_post_removexattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 10/25] security: Introduce inode_post_setattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 09/25] security: Align inode_setattr hook definition with EVM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 08/25] evm: Align evm_inode_post_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 07/25] evm: Align evm_inode_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 06/25] evm: Align evm_inode_post_setattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 05/25] ima: Align ima_post_read_file() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 03/25] ima: Align ima_inode_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 02/25] ima: Align ima_file_mprotect() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 01/25] ima: Align ima_inode_post_setattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 00/25] security: Move IMA and EVM to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/4] arch/x86: Remove unnecessary dependencies on bootparam.h
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v5 0/4] arch/x86: Remove unnecessary dependencies on bootparam.h
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] arm64: dts: Fix TPM schema violations
- From: AngeloGioacchino Del Regno <angelogioacchino.delregno@xxxxxxxxxxxxx>
- Re: [PATCH v5 0/4] arch/x86: Remove unnecessary dependencies on bootparam.h
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH] tpm: make locality handling resilient
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] arm64: dts: Fix TPM schema violations
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v2 4/4] tpm: tis_i2c: Add compatible string nuvoton,npct75x
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 3/4] tpm_tis: Add compatible string atmel,at97sc3204
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/4] dt-bindings: tpm: Add compatible string atmel,attpm20p
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]