Linux Integrity
[Prev Page][Next Page]
- [RFC][PATCH 0/8] ima: Integrate with digest_cache LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- Re: [PATCH v7 00/21] add integrity and security to TPM2 transactions
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 9/9] ima: Record i_version of real_inode for change detection
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v1 ima-evm-utils 4/6] Add support for OpenSSL provider to the library and evmctl
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v7 21/21] tpm: disable the TPM if NULL name changes
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 20/21] Documentation: add tpm-security.rst
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 19/21] tpm: add the null key name as a sysfs export
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 18/21] KEYS: trusted: Add session encryption protection to the seal/unseal path
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 17/21] tpm: add session encryption protection to tpm2_get_random()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 16/21] tpm: add hmac checks to tpm2_pcr_extend()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 15/21] tpm: Add the rest of the session HMAC API
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 14/21] tpm: Add HMAC session name/handle append
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 13/21] tpm: Add HMAC session start and end functions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 12/21] tpm: Add NULL primary creation
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 11/21] tpm: export the context save and load commands
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 10/21] tpm: add buffer function to point to returned parameters
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 09/21] crypto: lib - implement library version of AES in CFB mode
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 08/21] KEYS: trusted: tpm2: Use struct tpm_buf for sized buffers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 07/21] tpm: Add tpm_buf_read_{u8,u16,u32}
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 06/21] tpm: TPM2B formatted buffers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 05/21] tpm: Store the length of the tpm_buf data separately.
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 04/21] tpm: Update struct tpm_buf documentation comments
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 03/21] tpm: Move buffer handling from static inlines to real functions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 02/21] tpm: Remove tpm_send()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 01/21] tpm: Remove unused tpm_buf_tag()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 00/21] add integrity and security to TPM2 transactions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
- From: Mikko Ylinen <mikko.ylinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 19/25] integrity: Move integrity_kernel_module_request() to IMA
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 12/25] security: Introduce file_post_open hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 12/25] security: Introduce file_post_open hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/6] DCP as trusted keys backend
- From: Richard Weinberger <richard@xxxxxxxxxxxxx>
- Re: [PATCH v9 19/25] integrity: Move integrity_kernel_module_request() to IMA
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- Re: [PATCH v9 12/25] security: Introduce file_post_open hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 12/25] security: Introduce file_post_open hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 19/25] integrity: Move integrity_kernel_module_request() to IMA
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 25/25] integrity: Remove LSM
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v9 24/25] ima: Make it independent from 'integrity' LSM
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v9 23/25] evm: Make it independent from 'integrity' LSM
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v9 22/25] evm: Move to LSM infrastructure
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v9 19/25] integrity: Move integrity_kernel_module_request() to IMA
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 19/25] integrity: Move integrity_kernel_module_request() to IMA
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v9 20/25] ima: Move to LSM infrastructure
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v9 14/25] security: Introduce path_post_mknod hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v9 15/25] security: Introduce inode_post_create_tmpfile hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v9 13/25] security: Introduce file_release hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: (subset) [PATCH v2 00/33] spi: get rid of some legacy macros
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v3 02/13] security: Introduce the digest_cache LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: encrypted: Add check for strsep
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 02/13] security: Introduce the digest_cache LSM
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v3 00/17] kexec: Allow preservation of ftrace buffers
- From: Philipp Rudo <prudo@xxxxxxxxxx>
- [PATCH v3 13/13] docs: Add documentation of the digest_cache LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 12/13] selftests/digest_cache: Add selftests for digest_cache LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 11/13] digest_cache: Reset digest cache on file/directory change
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 10/13] digest cache: Prefetch digest lists if requested
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 09/13] digest_cache: Add support for directories
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 08/13] digest_cache: Add management of verification data
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 07/13] digest_cache: Parse rpm digest lists
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 06/13] digest_cache: Parse tlv digest lists
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 05/13] digest_cache: Populate the digest cache from a digest list
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 04/13] digest_cache: Add hash tables and operations
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 03/13] digest_cache: Add securityfs interface
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 02/13] security: Introduce the digest_cache LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 01/13] lib: Add TLV parser
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 00/13] security: digest_cache LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 12/25] security: Introduce file_post_open hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 12/25] security: Introduce file_post_open hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v9 12/25] security: Introduce file_post_open hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 10/25] security: Introduce inode_post_setattr hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v9 11/25] security: Introduce inode_post_removexattr hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v9 13/25] security: Introduce file_release hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v9 12/25] security: Introduce file_post_open hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v9 12/25] security: Introduce file_post_open hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v9 12/25] security: Introduce file_post_open hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v9 14/25] security: Introduce path_post_mknod hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v9 15/25] security: Introduce inode_post_create_tmpfile hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v9 17/25] security: Introduce inode_post_remove_acl hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v9 16/25] security: Introduce inode_post_set_acl hook
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v9 20/25] ima: Move to LSM infrastructure
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v9 22/25] evm: Move to LSM infrastructure
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v9 21/25] ima: Move IMA-Appraisal to LSM infrastructure
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v3 00/32] spi: get rid of some legacy macros
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v9 0/25] security: Move IMA and EVM to the LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 0/25] security: Move IMA and EVM to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 25/25] integrity: Remove LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 23/25] evm: Make it independent from 'integrity' LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 22/25] evm: Move to LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 19/25] integrity: Move integrity_kernel_module_request() to IMA
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 21/25] ima: Move IMA-Appraisal to LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 20/25] ima: Move to LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 18/25] security: Introduce key_post_create_or_update hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 17/25] security: Introduce inode_post_remove_acl hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 15/25] security: Introduce inode_post_create_tmpfile hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 16/25] security: Introduce inode_post_set_acl hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 14/25] security: Introduce path_post_mknod hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 13/25] security: Introduce file_release hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 12/25] security: Introduce file_post_open hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 11/25] security: Introduce inode_post_removexattr hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 10/25] security: Introduce inode_post_setattr hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 9/25] security: Align inode_setattr hook definition with EVM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 8/25] evm: Align evm_inode_post_setxattr() definition with LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 7/25] evm: Align evm_inode_setxattr() definition with LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 4/25] ima: Align ima_inode_removexattr() definition with LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 6/25] evm: Align evm_inode_post_setattr() definition with LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 5/25] ima: Align ima_post_read_file() definition with LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 3/25] ima: Align ima_inode_setxattr() definition with LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 2/25] ima: Align ima_file_mprotect() definition with LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 1/25] ima: Align ima_inode_post_setattr() definition with LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 0/25] security: Move IMA and EVM to the LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
- From: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- [PATCH v3 00/32] spi: get rid of some legacy macros
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH v3 26/32] tpm_tis_spi: Follow renaming of SPI "master" to "controller"
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH v2 4/9] ima: Reset EVM status upon detecting changes to the real file
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH RFC v12 15/20] ipe: add support for dm-verity as a trust provider
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 5/9] evm: Use the inode holding the metadata to calculate metadata hash
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 0/2] Decomplicate file_dentry()
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 9/9] ima: Record i_version of real_inode for change detection
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH v2 4/9] ima: Reset EVM status upon detecting changes to the real file
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v2 1/9] ima: Rename backing_inode to real_inode
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v2 5/9] evm: Use the inode holding the metadata to calculate metadata hash
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH 2/2] fs: remove the inode argument to ->d_real() method
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v2 2/9] security: allow finer granularity in permitting copy-up of security xattrs
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v2 9/9] ima: Record i_version of real_inode for change detection
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v2 7/9] fs: Rename SB_I_EVM_UNSUPPORTED to SB_I_EVM_HMAC_UNSUPPORTED
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v2 4/9] ima: Reset EVM status upon detecting changes to the real file
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- Re: [PATCH RFC v12 8/20] ipe: add userspace interface
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v12 15/20] ipe: add support for dm-verity as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v12 8/20] ipe: add userspace interface
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v12 8/20] ipe: add userspace interface
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v12 6/20] ipe: introduce 'boot_verified' as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v12 5/20] initramfs|security: Add security hook to initramfs unpack
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 4/9] ima: Reset EVM status upon detecting changes to the real file
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 6/9] evm: Enforce signatures on unsupported filesystem for EVM_INIT_X509
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 5/9] evm: Use the inode holding the metadata to calculate metadata hash
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 1/9] ima: Rename backing_inode to real_inode
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 8/9] evm: Rename is_unsupported_fs to is_unsupported_hmac_fs
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 3/9] evm: Implement per signature type decision in security_inode_copy_up_xattr
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 7/9] fs: Rename SB_I_EVM_UNSUPPORTED to SB_I_EVM_HMAC_UNSUPPORTED
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 2/9] security: allow finer granularity in permitting copy-up of security xattrs
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 0/9] evm: Support signatures on stacked filesystem
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 9/9] ima: Record i_version of real_inode for change detection
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v1 ima-evm-utils 0/6] Deprecate sign_hash and add provider support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v1 ima-evm-utils 1/6] headers: Remove usage of CONFIG_IMA_EVM_ENGINE from public header
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v1 ima-evm-utils 3/6] evmctl: Replace deprecated sign_hash with imaevm_signhash
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v1 ima-evm-utils 6/6] ci: Install pkcs11-provider where available
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v1 ima-evm-utils 4/6] Add support for OpenSSL provider to the library and evmctl
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v1 ima-evm-utils 2/6] Pass ENGINE and keyid through to function using them
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v1 ima-evm-utils 5/6] tests: Add pkcs11 test using provider
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 0/6] DCP as trusted keys backend
- From: David Gstir <david@xxxxxxxxxxxxx>
- [ANNOUNCE] CFP: Linux Security Summit Europe 2024
- From: "Reshetova, Elena" <elena.reshetova@xxxxxxxxx>
- Re: [PATCH RFC v12 17/20] ipe: enable support for fs-verity as a trust provider
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v12 15/20] ipe: add support for dm-verity as a trust provider
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v12 10/20] ipe: add permissive toggle
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v12 9/20] uapi|audit|ipe: add ipe auditing support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v12 8/20] ipe: add userspace interface
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v12 6/20] ipe: introduce 'boot_verified' as a trust provider
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v12 5/20] initramfs|security: Add security hook to initramfs unpack
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
- From: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v12 12/20] dm verity: set DM_TARGET_SINGLETON feature flag
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
- From: Dan Middleton <dan.middleton@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] fs: remove the inode argument to ->d_real() method
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v12 12/20] dm verity: set DM_TARGET_SINGLETON feature flag
- From: Mike Snitzer <snitzer@xxxxxxxxxx>
- Re: [PATCH 2/2] fs: remove the inode argument to ->d_real() method
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] fs: remove the inode argument to ->d_real() method
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] fs: remove the inode argument to ->d_real() method
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] fs: remove the inode argument to ->d_real() method
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 4/5] evm: Use the real inode's metadata to calculate metadata hash
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 4/5] evm: Use the real inode's metadata to calculate metadata hash
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH 2/2] fs: remove the inode argument to ->d_real() method
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/5] evm: Use the real inode's metadata to calculate metadata hash
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] fs: remove the inode argument to ->d_real() method
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/5] evm: Use the real inode's metadata to calculate metadata hash
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH 2/2] fs: remove the inode argument to ->d_real() method
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] fs: make file_dentry() a simple accessor
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] tpm: tis-i2c: Add more compatible strings
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH 4/5] evm: Use the real inode's metadata to calculate metadata hash
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] fs: remove the inode argument to ->d_real() method
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v3 00/17] kexec: Allow preservation of ftrace buffers
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [PATCH 2/2] fs: remove the inode argument to ->d_real() method
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH 2/2] fs: remove the inode argument to ->d_real() method
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH 1/5] security: allow finer granularity in permitting copy-up of security xattrs
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH 1/2] fs: make file_dentry() a simple accessor
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH 2/2] fs: remove the inode argument to ->d_real() method
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH 0/2] Decomplicate file_dentry()
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH 4/5] evm: Use the real inode's metadata to calculate metadata hash
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 3/4] tsm: Map RTMRs to TCG TPM PCRs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH] tpm: make locality handling resilient
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH] tpm,tpm_tis: Avoid warning splat at shutdown
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH] KEYS: encrypted: Add check for strsep
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: make locality handling resilient
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm,tpm_tis: Avoid warning splat at shutdown
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm,tpm_tis: Avoid warning splat at shutdown
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: tpm_tis_remove: `WARNING: CPU: 6 PID: 265 at kernel/workqueue.c:3397 __flush_work.isra.0+0x29f/0x2c0`
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 3/3] tpm: make locality request return value consistent
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/3] tpm: ensure tpm is in known state at startup
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 2/4] tsm: Add RTMRs to the configfs-tsm hierarchy
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 1/4] tsm: Runtime measurement register support
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 00/33] spi: get rid of some legacy macros
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] KEYS: encrypted: Add check for strsep
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 4/5] evm: Use the real inode's metadata to calculate metadata hash
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 5/5] evm: Enforce signatures on unsupported filesystem for EVM_INIT_X509
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: [PATCH] tpm,tpm_tis: Avoid warning splat at shutdown
- From: "Elliott, Robert (Servers)" <elliott@xxxxxxx>
- Re: [PATCH 1/5] security: allow finer granularity in permitting copy-up of security xattrs
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 1/5] security: allow finer granularity in permitting copy-up of security xattrs
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH 4/5] evm: Use the real inode's metadata to calculate metadata hash
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH 4/5] evm: Use the real inode's metadata to calculate metadata hash
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 1/5] security: allow finer granularity in permitting copy-up of security xattrs
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH 4/5] evm: Use the real inode's metadata to calculate metadata hash
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH] tpm,tpm_tis: Avoid warning splat at shutdown
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH v7 02/13] Documentation/x86: Secure Launch kernel documentation
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/5] security: allow finer granularity in permitting copy-up of security xattrs
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 4/5] evm: Use the real inode's metadata to calculate metadata hash
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/5] evm: Use the real inode's metadata to calculate metadata hash
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 3/3] tpm: make locality request return value consistent
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/5] evm: Use the real inode's metadata to calculate metadata hash
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH v2 0/3] tpm: make locality handling resilient
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- [no subject]
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 2/3] tpm: ensure tpm is in known state at startup
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/5] security: allow finer granularity in permitting copy-up of security xattrs
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 4/5] evm: Use the real inode's metadata to calculate metadata hash
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH 1/5] security: allow finer granularity in permitting copy-up of security xattrs
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 0/5] evm: Support signatures on stacked filesystem
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 3/5] ima: Reset EVM status upon detecting changes to overlay backing file
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 4/5] evm: Use the real inode's metadata to calculate metadata hash
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 1/5] security: allow finer granularity in permitting copy-up of security xattrs
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH 5/5] evm: Enforce signatures on unsupported filesystem for EVM_INIT_X509
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH 3/5] ima: Reset EVM status upon detecting changes to overlay backing file
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH 2/5] evm: Implement per signature type decision in security_inode_copy_up_xattr
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH 1/5] security: allow finer granularity in permitting copy-up of security xattrs
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH 0/5] evm: Support signatures on stacked filesystem
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH 4/5] evm: Use the real inode's metadata to calculate metadata hash
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH 4/5] evm: Use the real inode's metadata to calculate metadata hash
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC PATCH v12 20/20] documentation: add ipe documentation
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v12 19/20] ipe: kunit test for parser
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v12 17/20] ipe: enable support for fs-verity as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v12 08/20] ipe: add userspace interface
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v12 18/20] scripts: add boot policy generation program
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v12 15/20] ipe: add support for dm-verity as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v12 11/20] block|security: add LSM blob to block_device
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v12 09/20] uapi|audit|ipe: add ipe auditing support
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v12 10/20] ipe: add permissive toggle
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v12 16/20] fsverity: consume builtin signature via LSM hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v12 14/20] dm verity: consume root hash digest and signature data via LSM hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v12 12/20] dm verity: set DM_TARGET_SINGLETON feature flag
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v12 13/20] dm: add finalize hook to target_type
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v12 07/20] security: add new securityfs delete function
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v12 06/20] ipe: introduce 'boot_verified' as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v12 05/20] initramfs|security: Add security hook to initramfs unpack
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v12 04/20] ipe: add LSM hooks on execution and kernel read
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v12 03/20] ipe: add evaluation loop
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v12 02/20] ipe: add policy parser
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v12 00/20] Integrity Policy Enforcement LSM (IPE)
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v12 01/20] security: add ipe lsm
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH] MAINTAINERS: Add TPM DT bindings to TPM maintainers
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH 1/5] security: allow finer granularity in permitting copy-up of security xattrs
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 0/5] evm: Support signatures on stacked filesystem
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 4/5] evm: Use the real inode's metadata to calculate metadata hash
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 3/5] ima: Reset EVM status upon detecting changes to overlay backing file
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 2/5] evm: Implement per signature type decision in security_inode_copy_up_xattr
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 5/5] evm: Enforce signatures on unsupported filesystem for EVM_INIT_X509
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] KEYS: encrypted: Add check for strsep
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH] KEYS: encrypted: Add check for strsep
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] KEYS: encrypted: Add check for strsep
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] KEYS: encrypted: Add check for strsep
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] KEYS: encrypted: Add check for strsep
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 1/4] tsm: Runtime measurement register support
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH v3 00/17] kexec: Allow preservation of ftrace buffers
- From: Philipp Rudo <prudo@xxxxxxxxxx>
- Re: [RFC PATCH v2 3/4] tsm: Map RTMRs to TCG TPM PCRs
- From: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 2/4] tsm: Add RTMRs to the configfs-tsm hierarchy
- From: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- [RFC PATCH v2 4/4] tsm: Allow for extending and reading configured RTMRs
- From: Samuel Ortiz <sameo@xxxxxxxxxxxx>
- [RFC PATCH v2 3/4] tsm: Map RTMRs to TCG TPM PCRs
- From: Samuel Ortiz <sameo@xxxxxxxxxxxx>
- [RFC PATCH v2 2/4] tsm: Add RTMRs to the configfs-tsm hierarchy
- From: Samuel Ortiz <sameo@xxxxxxxxxxxx>
- [RFC PATCH v2 1/4] tsm: Runtime measurement register support
- From: Samuel Ortiz <sameo@xxxxxxxxxxxx>
- [RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
- From: Samuel Ortiz <sameo@xxxxxxxxxxxx>
- Re: [PATCH v4 1/7] ima: define and call ima_alloc_kexec_file_buf
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: ref leak in request_asymmetric_key ?
- From: "Billie Alsup (balsup)" <balsup@xxxxxxxxx>
- ref leak in request_asymmetric_key ?
- From: "Billie Alsup (balsup)" <balsup@xxxxxxxxx>
- [PATCH v5 0/2] Add device tree for IBM system1 BMC
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- Re: [PATCH v4 3/3] ARM: dts: aspeed: System1: IBM system1 BMC board
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- [PATCH v5 2/2] ARM: dts: aspeed: System1: IBM system1 BMC board
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- [PATCH v5 1/2] dt-bindings: arm: aspeed: add IBM system1-bmc
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- Re: [PATCH v1 1/1] tpm: tis-i2c: Add more compatible strings
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- Re: [PATCH v4 7/7] ima: measure kexec load and exec events as critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 6/7] ima: make the kexec extra memory configurable
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 4/7] ima: kexec: move ima log copy from kexec load to execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/7] ima: define and call ima_alloc_kexec_file_buf
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] ima: add crypto agility support for template-hash algorithm
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] ima: add crypto agility support for template-hash algorithm
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [GIT PULL] integrity: subsystem updates for v6.8-rc1
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH] tpm: make locality handling resilient
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: make locality handling resilient
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- [GIT PULL] integrity: subsystem updates for v6.8-rc1
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] KEYS: encrypted: Add check for strsep
- From: "Verma, Vishal L" <vishal.l.verma@xxxxxxxxx>
- Re: [PATCH] KEYS: encrypted: Add check for strsep
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] KEYS: encrypted: Add check for strsep
- From: "Verma, Vishal L" <vishal.l.verma@xxxxxxxxx>
- Re: [PATCH v2 00/33] spi: get rid of some legacy macros
- From: Jonathan Cameron <jic23@xxxxxxxxxx>
- [PATCH v3] ima: add crypto agility support for template-hash algorithm
- From: Enrico Bravi <enrico.bravi@xxxxxxxxx>
- Re: [PATCH] KEYS: encrypted: Add check for strsep
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] KEYS: encrypted: Add check for strsep
- From: "Verma, Vishal L" <vishal.l.verma@xxxxxxxxx>
- Re: [PATCH v2 00/33] spi: get rid of some legacy macros
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v2 00/33] spi: get rid of some legacy macros
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/33] spi: get rid of some legacy macros
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 4/7] ima: kexec: move ima log copy from kexec load to execute
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 7/7] ima: measure kexec load and exec events as critical data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 6/7] ima: make the kexec extra memory configurable
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/7] ima: define and call ima_alloc_kexec_file_buf
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/7] ima: define and call ima_alloc_kexec_file_buf
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/7] ima: define and call ima_alloc_kexec_file_buf
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v4 6/7] ima: make the kexec extra memory configurable
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v4 6/7] ima: make the kexec extra memory configurable
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 5/7] ima: suspend measurements during buffer copy at kexec execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/7] kexec: define functions to map and unmap segments
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 6/7] ima: make the kexec extra memory configurable
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v4 5/7] ima: suspend measurements during buffer copy at kexec execute
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/7] kexec: define functions to map and unmap segments
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2] ima: add crypto agility support for template-hash algorithm
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/33] spi: get rid of some legacy macros
- From: Jonathan Cameron <jic23@xxxxxxxxxx>
- [PATCH v4 7/7] ima: measure kexec load and exec events as critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 1/7] ima: define and call ima_alloc_kexec_file_buf
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 6/7] ima: make the kexec extra memory configurable
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 4/7] ima: kexec: move ima log copy from kexec load to execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 5/7] ima: suspend measurements during buffer copy at kexec execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 3/7] ima: kexec: skip IMA segment validation after kexec soft reboot
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 2/7] kexec: define functions to map and unmap segments
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 0/7] ima: kexec: measure events between kexec load and execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/33] spi: get rid of some legacy macros
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v2 00/33] spi: get rid of some legacy macros
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH v2 27/33] tpm_tis_spi: Follow renaming of SPI "master" to "controller"
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH v2] ima: add crypto agility support for template-hash algorithm
- From: Enrico Bravi <enrico.bravi@xxxxxxxxx>
- Re: [PATCH v2] ima: add crypto agility support for template-hash algorithm
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v2] ima: add crypto agility support for template-hash algorithm
- From: Enrico Bravi <enrico.bravi@xxxxxxxxx>
- Re: [PATCH v4 2/3] dt-bindings: Add DPS310 as trivial device
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- Re: tpm_tis_remove: `WARNING: CPU: 6 PID: 265 at kernel/workqueue.c:3397 __flush_work.isra.0+0x29f/0x2c0`
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm/tpm_ftpm_tee: fix all kernel-doc warnings
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: make locality handling resilient
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 27/33] tpm_tis_spi: Follow renaming of SPI "master" to "controller"
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: make locality handling resilient
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 2/3] dt-bindings: Add DPS310 as trivial device
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH] tpm: make locality handling resilient
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- Re: [PATCH v9 25/25] integrity: Remove LSM
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v9 24/25] ima: Make it independent from 'integrity' LSM
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v9 23/25] evm: Make it independent from 'integrity' LSM
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v9 21/25] ima: Move IMA-Appraisal to LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 3/3] ARM: dts: aspeed: System1: IBM system1 BMC board
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [PATCH v9 20/25] ima: Move to LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4 3/3] ARM: dts: aspeed: System1: IBM system1 BMC board
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- [PATCH v4 2/3] dt-bindings: Add DPS310 as trivial device
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- [PATCH v4 1/3] dt-bindings: arm: aspeed: add IBM system1-bmc
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- [PATCH v4 0/3] Add device tree for IBM system1 BMC
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] dt-bindings: tpm: Add compatible string atmel,attpm20p
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v2 1/4] dt-bindings: tpm: Add compatible string atmel,attpm20p
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v9 13/25] security: Introduce file_release hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2 0/1] Add more compatibility strings to tpm-tis-i2c
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- [PATCH v2 1/1] tpm: tis-i2c: Add more compatible strings
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- Re: [PATCH v1 1/1] tpm: tis-i2c: Add more compatible strings
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- Re: [PATCH v9 13/25] security: Introduce file_release hook
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 13/25] security: Introduce file_release hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 00/33] spi: get rid of some legacy macros
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- tpm_tis_remove: `WARNING: CPU: 6 PID: 265 at kernel/workqueue.c:3397 __flush_work.isra.0+0x29f/0x2c0`
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: [PATCH 00/33] spi: get rid of some legacy macros
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH] arm64: dts: Fix TPM schema violations
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v9 13/25] security: Introduce file_release hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 00/33] spi: get rid of some legacy macros
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 27/33] tpm_tis_spi: Follow renaming of SPI "master" to "controller"
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH] arm64: dts: Fix TPM schema violations
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- [PATCH] tpm/tpm_ftpm_tee: fix all kernel-doc warnings
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v9 13/25] security: Introduce file_release hook
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [PATCH v9 13/25] security: Introduce file_release hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 04/25] ima: Align ima_inode_removexattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 25/25] integrity: Remove LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 24/25] ima: Make it independent from 'integrity' LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 23/25] evm: Make it independent from 'integrity' LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 22/25] evm: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 21/25] ima: Move IMA-Appraisal to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 20/25] ima: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 19/25] integrity: Move integrity_kernel_module_request() to IMA
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 18/25] security: Introduce key_post_create_or_update hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 17/25] security: Introduce inode_post_remove_acl hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 16/25] security: Introduce inode_post_set_acl hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 15/25] security: Introduce inode_post_create_tmpfile hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 14/25] security: Introduce path_post_mknod hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 12/25] security: Introduce file_post_open hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 11/25] security: Introduce inode_post_removexattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 10/25] security: Introduce inode_post_setattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 09/25] security: Align inode_setattr hook definition with EVM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 08/25] evm: Align evm_inode_post_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 07/25] evm: Align evm_inode_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 06/25] evm: Align evm_inode_post_setattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 05/25] ima: Align ima_post_read_file() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 03/25] ima: Align ima_inode_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 02/25] ima: Align ima_file_mprotect() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 01/25] ima: Align ima_inode_post_setattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 00/25] security: Move IMA and EVM to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/4] arch/x86: Remove unnecessary dependencies on bootparam.h
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v5 0/4] arch/x86: Remove unnecessary dependencies on bootparam.h
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] arm64: dts: Fix TPM schema violations
- From: AngeloGioacchino Del Regno <angelogioacchino.delregno@xxxxxxxxxxxxx>
- Re: [PATCH v5 0/4] arch/x86: Remove unnecessary dependencies on bootparam.h
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH] tpm: make locality handling resilient
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] arm64: dts: Fix TPM schema violations
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v2 4/4] tpm: tis_i2c: Add compatible string nuvoton,npct75x
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 3/4] tpm_tis: Add compatible string atmel,at97sc3204
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/4] dt-bindings: tpm: Add compatible string atmel,attpm20p
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] arm64: dts: Fix TPM schema violations
- From: Heiko Stübner <heiko@xxxxxxxxx>
- [PATCH] arm64: dts: Fix TPM schema violations
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH v2 4/4] tpm: tis_i2c: Add compatible string nuvoton,npct75x
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH] ARM: dts: Fix TPM schema violations
- From: Bruno Thomsen <bruno.thomsen@xxxxxxxxx>
- [PATCH v2 3/4] tpm_tis: Add compatible string atmel,at97sc3204
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH v2 2/4] tpm_tis_spi: Add compatible string atmel,attpm20p
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH v2 1/4] dt-bindings: tpm: Add compatible string atmel,attpm20p
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH v2 0/4] Add missing TPM compatible strings
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH] ARM: dts: Fix TPM schema violations
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v3 6/7] ima: configure memory to log events between kexec load and execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 6/7] ima: configure memory to log events between kexec load and execute
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 0/4] arch/x86: Remove unnecessary dependencies on bootparam.h
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3 2/7] ima: kexec: move ima log copy from kexec load to execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 1/1] tpm: tis-i2c: Add more compatible strings
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH v3 2/7] ima: kexec: move ima log copy from kexec load to execute
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v5 4/4] arch/x86: Do not include <asm/bootparam.h> in several files
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v5 3/4] arch/x86: Implement arch_ima_efi_boot_mode() in source file
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v5 2/4] arch/x86: Move internal setup_data structures into setup_data.h
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v5 1/4] arch/x86: Move UAPI setup structures into setup_data.h
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v5 0/4] arch/x86: Remove unnecessary dependencies on bootparam.h
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [PATCH v3 2/7] ima: kexec: move ima log copy from kexec load to execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/4] arch/x86: Move internal setup_data structures into setup_data.h
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH v3 6/7] ima: configure memory to log events between kexec load and execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/3] dt-bindings: Add DPS310 as trivial device
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/3] dt-bindings: arm: aspeed: add IBM system1-bmc
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/3] dt-bindings: Add DPS310 as trivial device
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v3 1/3] dt-bindings: arm: aspeed: add IBM system1-bmc
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v3 6/7] ima: configure memory to log events between kexec load and execute
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3 5/7] ima: suspend measurements during buffer copy at kexec execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 3/3] ARM: dts: aspeed: System1: IBM system1 BMC board
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- [PATCH v3 0/3] Add device tree for IBM system1 BMC
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- [PATCH v3 1/3] dt-bindings: arm: aspeed: add IBM system1-bmc
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- [PATCH v3 2/3] dt-bindings: Add DPS310 as trivial device
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- Re: [PATCH v3 6/7] ima: configure memory to log events between kexec load and execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 1/1] tpm: tis-i2c: Add more compatible strings
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- Re: [PATCH v3 7/7] ima: measure kexec load and exec events as critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 5/7] ima: suspend measurements during buffer copy at kexec execute
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v1 1/1] tpm: tis-i2c: Add more compatible strings
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/4] arch/x86: Move internal setup_data structures into setup_data.h
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [PATCH v1 7/8] tpm: tis-i2c: Add more compatible strings
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd changes for v6.8
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v1 7/8] tpm: tis-i2c: Add more compatible strings
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v1 7/8] tpm: tis-i2c: Add more compatible strings
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v1 7/8] tpm: tis-i2c: Add more compatible strings
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH v1 7/8] tpm: tis-i2c: Add more compatible strings
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v1 7/8] tpm: tis-i2c: Add more compatible strings
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH v1 7/8] tpm: tis-i2c: Add more compatible strings
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- Re: [PATCH v1 7/8] tpm: tis-i2c: Add more compatible strings
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v1 7/8] tpm: tis-i2c: Add more compatible strings
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- Re: [PATCH v1 7/8] tpm: tis-i2c: Add more compatible strings
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v1 7/8] tpm: tis-i2c: Add more compatible strings
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- Re: [PATCH v1 7/8] tpm: tis-i2c: Add more compatible strings
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] ARM: dts: aspeed: System1: IBM system1 BMC board
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- Re: [GIT PULL] integrity: subsystem updates for v6.8
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] tpmdd changes for v6.8
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 2/4] arch/x86: Move internal setup_data structures into setup_data.h
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [ima-evm-utils PATCH v3 09/13] Use a local hash algorithm variable when verifying file signatures
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v1 7/8] tpm: tis-i2c: Add more compatible strings
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH v1 1/1] tpm: tis-i2c: Add more compatible strings
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [ima-evm-utils PATCH v3 07/13] Update ima_measurements to define and use a local list of public keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] ima: add crypto agility support for template-hash algorithm
- From: Silvia Sisinni <silvia.sisinni@xxxxxxxxx>
- Re: [ima-evm-utils PATCH v3 06/13] Update cmd_verify_evm to define and use a local list of public keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [ima-evm-utils PATCH v3 05/13] Update cmd_verify_ima() to define and use a local list of public keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [ima-evm-utils PATCH v3 04/13] Update imaevm_verify_hash() definition to include "hash_algo" parameter
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [ima-evm-utils PATCH v3 03/13] Update library function definitions to include a "public_keys" parameter
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [GIT PULL] integrity: subsystem updates for v6.8
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/3] dt-bindings: Add DPS310 as trivial device
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v2 1/3] dt-bindings: arm: aspeed: add IBM system1-bmc
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: Re: Re: [PATCH] integrity: don't throw an error immediately when failed to add a cert to the .machine keyring
- From: Coiby Xu <coxu@xxxxxxxxxx>
- Re: Re: [PATCH] integrity: don't throw an error immediately when failed to add a cert to the .machine keyring
- From: Coiby Xu <coxu@xxxxxxxxxx>
- Re: [PATCH v4 2/4] arch/x86: Move internal setup_data structures into setup_data.h
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v4 4/4] arch/x86: Do not include <asm/bootparam.h> in several files
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v2] integrity: eliminate unnecessary "Problem loading X.509 certificate" msg
- From: Coiby Xu <coxu@xxxxxxxxxx>
- Re: [PATCH v4 4/4] arch/x86: Do not include <asm/bootparam.h> in several files
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 3/3] ARM: dts: aspeed: System1: IBM system1 BMC board
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v2 0/3] Add device tree for IBM system1 BMC
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- [PATCH v2 3/3] ARM: dts: aspeed: System1: IBM system1 BMC board
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- [PATCH v2 2/3] dt-bindings: Add DPS310 as trivial device
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- [PATCH v2 1/3] dt-bindings: arm: aspeed: add IBM system1-bmc
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- Re: [PATCH v1 7/8] tpm: tis-i2c: Add more compatible strings
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- Re: [PATCH v1 7/8] tpm: tis-i2c: Add more compatible strings
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- Re: [PATCH v1 6/8] ARM: dts: aspeed: System1: GPIO, Fan ctrl, Led
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- Re: [PATCH v1 2/8] dt-bindings: tpm: Add schema for TIS I2C devices
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/4] dt-bindings: tpm: Consolidate TCG TIS bindings
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- Re: [RFC V2] IMA Log Snapshotting Design Proposal
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC V2] IMA Log Snapshotting Design Proposal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4 4/4] arch/x86: Do not include <asm/bootparam.h> in several files
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v4 3/4] arch/x86: Implement arch_ima_efi_boot_mode() in source file
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v4 2/4] arch/x86: Move internal setup_data structures into setup_data.h
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v4 1/4] arch/x86: Move UAPI setup structures into setup_data.h
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v4 0/4] arch/x86: Remove unnecessary dependencies on bootparam.h
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [PATCH v3 4/4] arch/x86: Do not include <asm/bootparam.h> in several files
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [RFC V2] IMA Log Snapshotting Design Proposal
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 6/7] ima: configure memory to log events between kexec load and execute
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 7/7] ima: measure kexec load and exec events as critical data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC V2] IMA Log Snapshotting Design Proposal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC V2] IMA Log Snapshotting Design Proposal
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC V2] IMA Log Snapshotting Design Proposal
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 7/7] ima: measure kexec load and exec events as critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 6/7] ima: configure memory to log events between kexec load and execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 5/7] ima: suspend measurements during buffer copy at kexec execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/7] ima: define and call ima_alloc_kexec_file_buf
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] integrity: don't throw an error immediately when failed to add a cert to the .machine keyring
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 13/20] tpm: Add HMAC session start and end functions
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: Re: [PATCH] integrity: don't throw an error immediately when failed to add a cert to the .machine keyring
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Re: [PATCH] integrity: don't throw an error immediately when failed to add a cert to the .machine keyring
- From: Coiby Xu <coxu@xxxxxxxxxx>
- Re: Re: [PATCH] integrity: don't throw an error immediately when failed to add a cert to the .machine keyring
- From: Coiby Xu <coxu@xxxxxxxxxx>
- Re: Re: [PATCH] integrity: don't throw an error immediately when failed to add a cert to the .machine keyring
- From: Coiby Xu <coxu@xxxxxxxxxx>
- Re: [PATCH v6 13/20] tpm: Add HMAC session start and end functions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] dt-bindings: tpm: Add compatible string atmel,attpm20p
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [ima-evm-utils PATCH v3 13/13] Define and use a file specific "keypass" variable
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v3 11/13] Use a file specific hash algorithm variable for signing files
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v3 12/13] Update sign_hash_v*() definition to include the key password
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v3 03/13] Update library function definitions to include a "public_keys" parameter
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v3 02/13] Free public keys list
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v3 10/13] Update EVM signature verification to use a local hash algorithm variable
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v3 07/13] Update ima_measurements to define and use a local list of public keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v3 09/13] Use a local hash algorithm variable when verifying file signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v3 06/13] Update cmd_verify_evm to define and use a local list of public keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v3 00/13] Address non concurrency-safe libimaevm global variables
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v3 08/13] Define library ima_calc_hash2() function with a hash algorithm parameter
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v3 01/13] Rename "public_keys" to "g_public_keys"
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v3 05/13] Update cmd_verify_ima() to define and use a local list of public keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v3 04/13] Update imaevm_verify_hash() definition to include "hash_algo" parameter
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] dt-bindings: tpm: Add compatible string atmel,attpm20p
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 13/20] tpm: Add HMAC session start and end functions
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 12/20] tpm: Add NULL primary creation
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 4/4] arch/x86: Do not include <asm/bootparam.h> in several files
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] dt-bindings: tpm: Add compatible string atmel,attpm20p
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH v3 4/4] arch/x86: Do not include <asm/bootparam.h> in several files
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v3 3/4] arch/x86: Implement arch_ima_efi_boot_mode() in source file
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v3 2/4] arch/x86: Move internal setup_data structures into setup_data.h
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v3 1/4] arch/x86: Move UAPI setup structures into setup_data.h
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v3 0/4] arch/x86: Remove unnecessary dependencies on bootparam.h
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [PATCH v3 0/4] dt-bindings: tpm: Clean all the things
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH] tpm_tis_spi: Add compatible string atmel,attpm20p
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH] dt-bindings: tpm: Add compatible string atmel,attpm20p
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v6 13/20] tpm: Add HMAC session start and end functions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 12/20] tpm: Add NULL primary creation
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 20/20] Documentation: add tpm-security.rst
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 19/20] tpm: add the null key name as a sysfs export
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 18/20] KEYS: trusted: Add session encryption protection to the seal/unseal path
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 17/20] tpm: add session encryption protection to tpm2_get_random()
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 16/20] tpm: add hmac checks to tpm2_pcr_extend()
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 15/20] tpm: Add the rest of the session HMAC API
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 14/20] tpm: Add HMAC session name/handle append
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 13/20] tpm: Add HMAC session start and end functions
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 12/20] tpm: Add NULL primary creation
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 11/20] tpm: export the context save and load commands
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 10/20] tpm: add buffer function to point to returned parameters
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 09/20] crypto: lib - implement library version of AES in CFB mode
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] integrity: don't throw an error immediately when failed to add a cert to the .machine keyring
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: TPM interrupt patch on LTS
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm_tis_spi: Add compatible string atmel,attpm20p
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm_tis_spi: Add compatible string atmel,attpm20p
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 2/3] arch/x86: Add <asm/ima-efi.h> for arch_ima_efi_boot_mode
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [PATCH] tpm: cr50: fix kernel-doc warning and spelling
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 2/3] arch/x86: Add <asm/ima-efi.h> for arch_ima_efi_boot_mode
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v8] ARM: dts: aspeed: Adding Facebook Bletchley BMC
- From: Patrick Williams <patrick@xxxxxxxxx>
- Re: [PATCH] integrity: don't throw an error immediately when failed to add a cert to the .machine keyring
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 21/24] evm: Move to LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] integrity: don't throw an error immediately when failed to add a cert to the .machine keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v6 20/20] Documentation: add tpm-security.rst
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 19/20] tpm: add the null key name as a sysfs export
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 18/20] KEYS: trusted: Add session encryption protection to the seal/unseal path
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 17/20] tpm: add session encryption protection to tpm2_get_random()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 16/20] tpm: add hmac checks to tpm2_pcr_extend()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 15/20] tpm: Add the rest of the session HMAC API
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 14/20] tpm: Add HMAC session name/handle append
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 13/20] tpm: Add HMAC session start and end functions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 12/20] tpm: Add NULL primary creation
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 11/20] tpm: export the context save and load commands
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 10/20] tpm: add buffer function to point to returned parameters
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 09/20] crypto: lib - implement library version of AES in CFB mode
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 08/20] KEYS: trusted: tpm2: Use struct tpm_buf for sized buffers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 07/20] tpm: Add tpm_buf_read_{u8,u16,u32}
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 06/20] tpm: TPM2B formatted buffers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 05/20] tpm: Store the length of the tpm_buf data separately.
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 04/20] tpm: Update struct tpm_buf documentation comments
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 03/20] tpm: Move buffer handling from static inlines to real functions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 02/20] tpm: Remove tpm_send()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 01/20] tpm: Remove unused tpm_buf_tag()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 00/20] add integrity and security to TPM2 transactions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/3] arch/x86: Add <asm/ima-efi.h> for arch_ima_efi_boot_mode
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [PATCH v2 1/3] arch/x86: Move UAPI setup structures into setup_data.h
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [ima-evm-utils PATCH v2 13/13] Define and use a file specific "keypass" variable
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [ima-evm-utils PATCH v2 12/13] Update sign_hash_v*() definition to include the key password
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [ima-evm-utils PATCH v2 11/13] Use a file specific hash algorithm variable for signing files
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [ima-evm-utils PATCH v2 05/13] Update cmd_verify_ima() to define and use a local list of public keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [ima-evm-utils PATCH v2 03/13] Update library function definitions to include a "public_keys" parameter
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v8 21/24] evm: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 23/24] ima: Make it independent from 'integrity' LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 19/24] ima: Move to LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v8 19/24] ima: Move to LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 23/24] ima: Make it independent from 'integrity' LSM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 23/24] ima: Make it independent from 'integrity' LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC][PATCH] ima: add crypto agility support for template-hash algorithm
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 23/24] ima: Make it independent from 'integrity' LSM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] integrity: don't throw an error immediately when failed to add a cert to the .machine keyring
- From: Coiby Xu <coxu@xxxxxxxxxx>
- Re: [PATCH v8 22/24] evm: Make it independent from 'integrity' LSM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 20/24] ima: Move IMA-Appraisal to LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 21/24] evm: Move to LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 19/24] ima: Move to LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v8 19/24] ima: Move to LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] ima: add crypto agility support for template-hash algorithm
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- TPM interrupt patch on LTS
- From: João Paulo Silva Gonçalves <joao.goncalves@xxxxxxxxxxx>
- Re: [RFC][PATCH] ima: add crypto agility support for template-hash algorithm
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- [PATCH] tpm_tis_spi: Add compatible string atmel,attpm20p
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v8] ARM: dts: aspeed: Adding Facebook Bletchley BMC
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v8] ARM: dts: aspeed: Adding Facebook Bletchley BMC
- From: Patrick Williams <patrick@xxxxxxxxx>
- [PATCH] tpm: cr50: fix kernel-doc warning and spelling
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] ima: add crypto agility support for template-hash algorithm
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] ima: add crypto agility support for template-hash algorithm
- From: Enrico Bravi <enrico.bravi@xxxxxxxxx>
- Re: [PATCH 2/2] reset: Add Infineon SLB9670 TPM reset driver
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- Re: [RFC V2] IMA Log Snapshotting Design Proposal
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH v3 5/7] ima: suspend measurements during buffer copy at kexec execute
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 7/7] ima: measure kexec load and exec events as critical data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 6/7] ima: configure memory to log events between kexec load and execute
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/7] ima: kexec: move ima log copy from kexec load to execute
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/7] ima: define and call ima_alloc_kexec_file_buf
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/4] dt-bindings: tpm: Clean all the things
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v2 0/3] evm: disable EVM on overlayfs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] evm: disable EVM on overlayfs
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 2/3] evm: add support to disable EVM on unsupported filesystems
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v2 3/3] overlay: disable EVM
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [RFC][PATCH] ima: add crypto agility support for template-hash algorithm
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/3] evm: add support to disable EVM on unsupported filesystems
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 2/3] evm: add support to disable EVM on unsupported filesystems
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 3/3] overlay: disable EVM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 1/3] evm: don't copy up 'security.evm' xattr
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 0/3] evm: disable EVM on overlayfs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] evm: add support to disable EVM on unsupported filesystems
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH 1/2] evm: don't copy up 'security.evm' xattr
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH 2/2] evm: add support to disable EVM on unsupported filesystems
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 0/2] evm: disable EVM on overlayfs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 1/2] evm: don't copy up 'security.evm' xattr
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/3] arch/x86: Add <asm/ima-efi.h> for arch_ima_efi_boot_mode
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 1/3] arch/x86: Move UAPI setup structures into setup_data.h
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v5 0/6] DCP as trusted keys backend
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] dt-bindings: tpm: Consolidate TCG TIS bindings
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- Re: IMA performance regression in 5.10.194 when using overlayfs
- From: Robert Kolchmeyer <rkolchmeyer@xxxxxxxxxx>
- Re: [PATCH 2/2] reset: Add Infineon SLB9670 TPM reset driver
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH 2/2] reset: Add Infineon SLB9670 TPM reset driver
- From: Francesco Dolcini <francesco@xxxxxxxxxx>
- Re: IMA performance regression in 5.10.194 when using overlayfs
- From: Greg KH <greg@xxxxxxxxx>
- Re: IMA performance regression in 5.10.194 when using overlayfs
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH v8 23/24] ima: Make it independent from 'integrity' LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v2] tpm: tis_i2c: Add compatible string nuvoton,npct75x
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH v3 4/4] dt-bindings: tpm: Document Microsoft fTPM bindings
- From: Lukas Wunner <lukas@xxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]