Linux Integrity
[Prev Page][Next Page]
- Re: [GIT PULL] Asymmetric keys fix for v6.4-rc5
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [GIT PULL] Asymmetric keys fix for v6.4-rc5
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [GIT PULL] Asymmetric keys fix for v6.4-rc5
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v5 2/2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: New kernel warning after updating from LTS 5.15.110 to 5.15.112 (and 5.15.113)
- From: Chris Packham <Chris.Packham@xxxxxxxxxxxxxxxxxxx>
- Re: New kernel warning after updating from LTS 5.15.110 to 5.15.112 (and 5.15.113)
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH v5 2/2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [Patch V10 2/3] tpm_tis-spi: Add hardware wait polling
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [Patch V10 2/3] tpm_tis-spi: Add hardware wait polling
- From: Thierry Reding <thierry.reding@xxxxxxxxx>
- Re: [Patch V10 2/3] tpm_tis-spi: Add hardware wait polling
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [Patch V10 2/3] tpm_tis-spi: Add hardware wait polling
- From: Thierry Reding <thierry.reding@xxxxxxxxx>
- [PATCH v2] integrity: Fix possible multiple allocation in integrity_inode_get()
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v2] tpm: tpm_vtpm_proxy: do not reference kernel memory as user memory
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH RFC v2] tpm: tpm_vtpm_proxy: do not reference kernel memory as user memory
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: factor out the user space mm from tpm_vtpm_set_locality()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: factor out the user space mm from tpm_vtpm_set_locality()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: factor out the user space mm from tpm_vtpm_set_locality()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: factor out the user space mm from tpm_vtpm_set_locality()
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] tpm: factor out the user space mm from tpm_vtpm_set_locality()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- RE: [PATCH RFC v2] tpm: tpm_vtpm_proxy: do not reference kernel memory as user memory
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH] tpm: factor out the user space mm from tpm_vtpm_set_locality()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] tpm: factor out the user space mm from tpm_vtpm_set_locality()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [PATCH v2] tpm,tpm_tis: Handle interrupt storm
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH RFC v2] tpm: tpm_vtpm_proxy: do not reference kernel memory as user memory
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH RFC v2] tpm: tpm_vtpm_proxy: do not reference kernel memory as user memory
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH] tpm, tpm_tis: correct tpm_tis_flags enumeration values
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [linus:master] [tpm, tpm_tis] e644b2f498: RIP:acpi_safe_halt
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [linus:master] [tpm, tpm_tis] e644b2f498: RIP:acpi_safe_halt
- From: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
- Re: [PATCH] integrity: Fix possible multiple allocation in integrity_inode_get()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] integrity: Fix possible multiple allocation in integrity_inode_get()
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH] tpm: tpm_tis: Disable interrupts *only* for AEON UPX-i11
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH RFC v2] tpm: tpm_vtpm_proxy: do not reference kernel memory as user memory
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH RFC] tpm: tpm_vtpm_proxy: fix a race condition in the locality change
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [linus:master] [tpm, tpm_tis] e644b2f498: RIP:acpi_safe_halt
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [linus:master] [tpm, tpm_tis] e644b2f498: RIP:acpi_safe_halt
- From: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Péter Ujfalusi <peter.ujfalusi@xxxxxxxxxxxxxxx>
- Re: New kernel warning after updating from LTS 5.15.110 to 5.15.112 (and 5.15.113)
- From: Chris Packham <Chris.Packham@xxxxxxxxxxxxxxxxxxx>
- Re: New kernel warning after updating from LTS 5.15.110 to 5.15.112 (and 5.15.113)
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- New kernel warning after updating from LTS 5.15.110 to 5.15.112 (and 5.15.113)
- From: Chris Packham <Chris.Packham@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- [PATCH] tpm: Switch i2c drivers back to use .probe()
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 3/4] of: kexec: Refactor IMA buffer related functions to make them reusable
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v9 3/4] of: kexec: Refactor IMA buffer related functions to make them reusable
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v9 2/4] tpm: of: Make of-tree specific function commonly available
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v9 1/4] drivers: of: kexec ima: Support 32-bit platforms
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH 2/2] tpm: tis_i2c: Limit write bursts to I2C_SMBUS_BLOCK_MAX (32) bytes
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm: tis_i2c: Limit read bursts to I2C_SMBUS_BLOCK_MAX (32) bytes
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm: tis_i2c: Limit read bursts to I2C_SMBUS_BLOCK_MAX (32) bytes
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 2/2] tpm: tis_i2c: Limit write bursts to I2C_SMBUS_BLOCK_MAX (32) bytes
- From: "A. Sverdlin" <alexander.sverdlin@xxxxxxxxxxx>
- [PATCH 1/2] tpm: tis_i2c: Limit read bursts to I2C_SMBUS_BLOCK_MAX (32) bytes
- From: "A. Sverdlin" <alexander.sverdlin@xxxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: tpm_tis: Narrow the AAEON DMI quirk to UPX-i11 only
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- RE: [Patch V10 2/3] tpm_tis-spi: Add hardware wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v2] tpm: tpm_tis: Narrow the AAEON DMI quirk to UPX-i11 only
- From: Peter Ujfalusi <peter.ujfalusi@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: tpm_tis: Narrow the AAEON DMI quirk to UPX-i11 only
- From: Péter Ujfalusi <peter.ujfalusi@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: tpm_tis: Narrow the AAEON DMI quirk to UPX-i11 only
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH] tpm: tpm_tis: Narrow the AAEON DMI quirk to UPX-i11 only
- From: Peter Ujfalusi <peter.ujfalusi@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] tpm_tis_spi: Release chip select when flow control fails
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 05/44] char: tpm: handle HAS_IOPORT dependencies
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 08/14] x86: Secure Launch kernel late boot stub
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm_tis_spi: fix:release chip select when flow control fails
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH - for 6.4] tpm: tpm_tis: Disable interrupts for AEON UPX-i11
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH - for 6.4] tpm: tpm_tis: Disable interrupts for AEON UPX-i11
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] tpmdd changes for v6.4-rc4
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v3] tpm_tis_spi: Release chip select when flow control fails
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [GIT PULL] tpmdd changes for v6.4-rc4
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/2] tpm, tpm_tis: reuse code in disable_interrupts()
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 2/3] integrity: Enforce digitalSignature usage in the ima and evm keyrings
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 2/3] integrity: Enforce digitalSignature usage in the ima and evm keyrings
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 05/44] char: tpm: handle HAS_IOPORT dependencies
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: hash_info.h appreviations
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 2/3] integrity: Enforce digitalSignature usage in the ima and evm keyrings
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] KEYS: DigitalSignature link restriction
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- hash_info.h appreviations
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] tpm, tpm_tis: reuse code in disable_interrupts()
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/2] tpm, tpm_tis: reuse code in disable_interrupts()
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Péter Ujfalusi <peter.ujfalusi@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Péter Ujfalusi <peter.ujfalusi@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH 2/2] tpm, tpm_tis: reuse code in disable_interrupts()
- From: Péter Ujfalusi <peter.ujfalusi@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Péter Ujfalusi <peter.ujfalusi@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Péter Ujfalusi <peter.ujfalusi@xxxxxxxxxxxxxxx>
- Re: Re: [PATCH v2] tpm_tis_spi: fix:release chip select when flow control fails
- From: shaopeijie@xxxxxxxx
- [PATCH v3] tpm_tis_spi: Release chip select when flow control fails
- From: shaopeijie@xxxxxxxx
- Re: Re: [PATCH v2] tpm_tis_spi: fix:release chip select when flow control fails
- From: shaopeijie@xxxxxxxx
- [PATCH v2 0/3] Add digitalSignature enforcement keyring restrictions
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v2 3/3] integrity: Remove EXPERIMENTAL from Kconfig
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v2 1/3] KEYS: DigitalSignature link restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v2 2/3] integrity: Enforce digitalSignature usage in the ima and evm keyrings
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH 2/2] tpm, tpm_tis: reuse code in disable_interrupts()
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [PATCH 2/2] tpm, tpm_tis: reuse code in disable_interrupts()
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v5 05/44] char: tpm: handle HAS_IOPORT dependencies
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm_tis_spi: fix:release chip select when flow control fails
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: [PATCH - for 6.4] tpm: tpm_tis: Disable interrupts for AEON UPX-i11
- From: Péter Ujfalusi <peter.ujfalusi@xxxxxxxxxxxxxxx>
- [PATCH v2] tpm_tis_spi: fix:release chip select when flow control fails
- From: shaopeijie@xxxxxxxx
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v2] tpm: tpm_vtpm_proxy: fix a race condition in /dev/vtpmx creation
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH - for 6.4] tpm: tpm_tis: Disable interrupts for AEON UPX-i11
- From: Péter Ujfalusi <peter.ujfalusi@xxxxxxxxxxxxxxx>
- Re: [PATCH - for 6.4] tpm: tpm_tis: Disable interrupts for AEON UPX-i11
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH - for 6.4] tpm: tpm_tis: Disable interrupts for AEON UPX-i11
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH - for 6.4] tpm: tpm_tis: Disable interrupts for AEON UPX-i11
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH - for 6.4] tpm: tpm_tis: Disable interrupts for AEON UPX-i11
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm/tpm_tis: Disable interrupts for more Lenovo devices
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [GIT PULL] tpmdd: three bug fixes for v6.4-rc2
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] tpmdd: three bug fixes for v6.4-rc2
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [GIT PULL] tpmdd: three bug fixes for v6.4-rc2
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH - for 6.4] tpm: tpm_tis: Disable interrupts for AEON UPX-i11
- From: Péter Ujfalusi <peter.ujfalusi@xxxxxxxxxxxxxxx>
- [PATCH - for 6.4] tpm: tpm_tis: Disable interrupts for AEON UPX-i11
- From: Peter Ujfalusi <peter.ujfalusi@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] integrity: Remove EXPERIMENTAL from Kconfig
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] integrity: Enforce digitalSignature usage in the ima and evm keyrings
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] KEYS: DigitalSignature link restriction
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 03/41] char: impi, tpm: depend on HAS_IOPORT
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [PATCH v4 03/41] char: impi, tpm: depend on HAS_IOPORT
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 03/41] char: impi, tpm: depend on HAS_IOPORT
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [PATCH v4 03/41] char: impi, tpm: depend on HAS_IOPORT
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- [PATCH v4 03/41] char: impi, tpm: depend on HAS_IOPORT
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 04/14] x86: Secure Launch Resource Table header file
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 13/14] tpm: Allow locality 2 to be set when initializing the TPM for Secure Launch
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 11/14] reboot: Secure Launch SEXIT support on reboot paths
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 04/14] x86: Secure Launch Resource Table header file
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- [GIT PULL] tpmdd: three bug fixes for v6.4-rc2
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2] tpm: tpm_vtpm_proxy: fix a race condition in /dev/vtpmx creation
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 04/14] x86: Secure Launch Resource Table header file
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 04/14] x86: Secure Launch Resource Table header file
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 04/14] x86: Secure Launch Resource Table header file
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 09/14] x86: Secure Launch SMP bringup support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 08/14] x86: Secure Launch kernel late boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 11/14] reboot: Secure Launch SEXIT support on reboot paths
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] tpm_vtpm_proxy: fix race condition in /dev/vtpmx creation
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] tpm_vtpm_proxy: fix race condition in /dev/vtpmx creation
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH] tpm_vtpm_proxy: fix race condition in /dev/vtpmx creation
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxx>
- Re: [PATCH v6 13/14] tpm: Allow locality 2 to be set when initializing the TPM for Secure Launch
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 02/14] Documentation/x86: Secure Launch kernel documentation
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v6 08/14] x86: Secure Launch kernel late boot stub
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v6 12/14] x86: Secure Launch late initcall platform module
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 05/14] x86: Secure Launch main header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 12/14] x86: Secure Launch late initcall platform module
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 08/14] x86: Secure Launch kernel late boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 09/14] x86: Secure Launch SMP bringup support
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Andrew Cooper <andyhhp@xxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v6 13/14] tpm: Allow locality 2 to be set when initializing the TPM for Secure Launch
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 11/14] reboot: Secure Launch SEXIT support on reboot paths
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v6 05/14] x86: Secure Launch main header file
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 02/14] Documentation/x86: Secure Launch kernel documentation
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 04/14] x86: Secure Launch Resource Table header file
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] KEYS: DigitalSignature link restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v6 09/14] x86: Secure Launch SMP bringup support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [linus:master] [tpm, tpm_tis] e644b2f498: RIP:acpi_safe_halt
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: tpm_sis IRQ storm on ThinkStation P360 Tiny
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [linus:master] [tpm, tpm_tis] e644b2f498: RIP:acpi_safe_halt
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [linus:master] [tpm, tpm_tis] e644b2f498: RIP:acpi_safe_halt
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [linus:master] [tpm, tpm_tis] e644b2f498: RIP:acpi_safe_halt
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH] char: tpm: ftpm_tee: use kernel login identifier
- From: Etienne Carriere <etienne.carriere@xxxxxxxxxx>
- Re: [PATCH] char: tpm: ftpm_tee: use kernel login identifier
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH] char: tpm: ftpm_tee: use kernel login identifier
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH] char: tpm: ftpm_tee: use kernel login identifier
- From: Etienne Carriere <etienne.carriere@xxxxxxxxxx>
- Re: [PATCH] char: tpm: ftpm_tee: use kernel login identifier
- From: Etienne Carriere <etienne.carriere@xxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] tpm/tpm_tis: Disable interrupts for more Lenovo devices
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: tpm_sis IRQ storm on ThinkStation P360 Tiny
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 04/14] x86: Secure Launch Resource Table header file
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 08/14] x86: Secure Launch kernel late boot stub
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 09/14] x86: Secure Launch SMP bringup support
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 3/3] integrity: Remove EXPERIMENTAL from Kconfig
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 12/14] x86: Secure Launch late initcall platform module
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 12/14] x86: Secure Launch late initcall platform module
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] KEYS: DigitalSignature link restriction
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 0/3] Add digitalSignature enforcement keyring restrictions
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] char: tpm: ftpm_tee: use kernel login identifier
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 0/2] Fix TPM 1.2 resume
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [linus:master] [tpm, tpm_tis] e644b2f498: RIP:acpi_safe_halt
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 02/14] Documentation/x86: Secure Launch kernel documentation
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- RE: [Patch V10 2/3] tpm_tis-spi: Add hardware wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- Re: [PATCH] char: tpm: ftpm_tee: use kernel login identifier
- From: Etienne Carriere <etienne.carriere@xxxxxxxxxx>
- Re: [PATCH] char: tpm: ftpm_tee: use kernel login identifier
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Mengchi Cheng <mengcc@xxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 3/3] integrity: Remove EXPERIMENTAL from Kconfig
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH 2/3] integrity: Enforce digitalSignature usage in the ima and evm keyrings
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH 1/3] KEYS: DigitalSignature link restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH 0/3] Add digitalSignature enforcement keyring restrictions
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v6 12/14] x86: Secure Launch late initcall platform module
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 02/14] Documentation/x86: Secure Launch kernel documentation
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH v6 00/14] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [PATCH v6 12/14] x86: Secure Launch late initcall platform module
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [PATCH v6 09/14] x86: Secure Launch SMP bringup support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 08/14] x86: Secure Launch kernel late boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH] char: tpm: ftpm_tee: use kernel login identifier
- From: Etienne Carriere <etienne.carriere@xxxxxxxxxx>
- Re: [PATCH v6 09/14] x86: Secure Launch SMP bringup support
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [PATCH v6 08/14] x86: Secure Launch kernel late boot stub
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [PATCH v6 05/14] x86: Secure Launch main header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 04/14] x86: Secure Launch Resource Table header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v6 02/14] Documentation/x86: Secure Launch kernel documentation
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: tpm_sis IRQ storm on ThinkStation P360 Tiny
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: tpm_sis IRQ storm on ThinkStation P360 Tiny
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [PATCH v6 05/14] x86: Secure Launch main header file
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [PATCH v6 04/14] x86: Secure Launch Resource Table header file
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [PATCH v6 02/14] Documentation/x86: Secure Launch kernel documentation
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [PATCH v6 00/14] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: tpm_sis IRQ storm on ThinkStation P360 Tiny
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- tpm_sis IRQ storm on ThinkStation P360 Tiny
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v6 00/14] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- [PATCH v6 12/14] x86: Secure Launch late initcall platform module
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 14/14] x86: EFI stub DRTM launch support for Secure Launch
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 11/14] reboot: Secure Launch SEXIT support on reboot paths
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 13/14] tpm: Allow locality 2 to be set when initializing the TPM for Secure Launch
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 09/14] x86: Secure Launch SMP bringup support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 10/14] kexec: Secure Launch kexec SEXIT support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 08/14] x86: Secure Launch kernel late boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 02/14] Documentation/x86: Secure Launch kernel documentation
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 05/14] x86: Secure Launch main header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 04/14] x86: Secure Launch Resource Table header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 03/14] x86: Secure Launch Kconfig
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 00/14] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v6 01/14] x86/boot: Place kernel_info at a fixed offset
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [syzbot] [integrity?] [lsm?] possible deadlock in ima_file_free
- From: syzbot <syzbot+a2bbe9020e59fdeab932@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 06/13] tpm: add buffer function to point to returned parameters
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 04/13] tpm: add buffer handling for TPM2B types
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 04/13] tpm: add buffer handling for TPM2B types
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v4 07/13] tpm: export the context save and load commands
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v4 06/13] tpm: add buffer function to point to returned parameters
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC PATCH v1 0/1] ima: obtain child measurement list from init namespace
- From: Denis Semakin <denis.semakin@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 05/13] tpm: add cursor based buffer functions for response parsing
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC PATCH v1 0/1] ima: obtain child measurement list from init namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] Fix TPM 1.2 resume
- From: Vlastimil Babka <vbabka@xxxxxxx>
- [PATCH v2 2/2] tpm: Prevent hwrng from activating during resume
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2 1/2] tpm_tis: Use tpm_chip_{start,stop} decoration inside tpm_tis_resume
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2 0/2] Fix TPM 1.2 resume
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] tpmdd: a critical bug fix for v6.4-rc1 (v2)
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] tpmdd: a critical bug fix for v6.4-rc1 (v2)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/2] tpm: Prevent hwrng from activating during resume
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/2] tpm: Prevent hwrng from activating during resume
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] tpm: Re-enable TPM chip boostrapping non-tpm_tis TPM drivers
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] tpmdd: a critical bug fix for v6.4-rc1
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm_tis: Use tpm_chip_{start,stop} decoration inside tpm_tis_resume
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [GIT PULL] tpmdd: a critical bug fix for v6.4-rc1
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Re-enable TPM chip boostrapping non-tpm_tis TPM drivers
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils v3 0/4] Update README and examples and add EC key support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Re-enable TPM chip boostrapping non-tpm_tis TPM drivers
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [GIT PULL] tpmdd: a critical bug fix for v6.4-rc1
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: Re-enable TPM chip boostrapping non-tpm_tis TPM drivers
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH ima-evm-utils v3 4/4] Add example scripts for EC key and certs generation
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v3 0/4] Update README and examples and add EC key support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v3 2/4] Update OpenSSL config files for support for .machine keyring
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v3 3/4] Add openssl command line examples for creation of EC keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v3 1/4] Update default key sizes and hash to up-to-date values
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2 2/2] examples: Add examples for elliptic curve key and certs generation
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] tpm: Re-enable TPM chip boostrapping non-tpm_tis TPM drivers
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 1/2] tpm_tis: Use tpm_chip_{start,stop} decoration inside tpm_tis_resume
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 2/2] tpm: Prevent hwrng from activating during resume
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 0/2] Fix TPM 1.2 resume
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2 2/2] examples: Add examples for elliptic curve key and certs generation
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2 2/2] examples: Add examples for elliptic curve key and certs generation
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH ima-evm-utils v2 1/2] Add openssl command line examples for creation of EC keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v2 0/2] Update README and examples for ECC key support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v2 2/2] examples: Add examples for elliptic curve key and certs generation
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [GIT PULL] integrity: subsystem updates for v6.4
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd: changes for v6.4-rc1
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH ima-evm-utils 1/2] Add --hmackey option for evmctl
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils 2/2] Add simple test to check EVM HMAC calculation
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [Patch V10 2/3] tpm_tis-spi: Add hardware wait polling
- From: Thierry Reding <thierry.reding@xxxxxxxxx>
- Re: [Patch V10 2/3] tpm_tis-spi: Add hardware wait polling
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [Patch V10 2/3] tpm_tis-spi: Add hardware wait polling
- From: Thierry Reding <thierry.reding@xxxxxxxxx>
- [GIT PULL] tpmdd: changes for v6.4-rc1
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: (subset) [Patch V10 0/3] Tegra TPM driver with HW flow control
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [Patch V10 2/3] tpm_tis-spi: Add hardware wait polling
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: Add !tpm_amd_is_rng_defective() to the hwrng_unregister() call site
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils 2/2] Add simple test to check EVM HMAC calculation
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [Patch V10 2/3] tpm_tis-spi: Add hardware wait polling
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH] tpm_tis_spi: fix:release chip select when flow control fails
- From: shaopeijie@xxxxxxxx
- Re: [PATCH v11 00/14] TPM IRQ fixes
- From: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
- [PATCH] tpm: Add !tpm_amd_is_rng_defective() to the hwrng_unregister() call site
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 0/3] tpm: Convert to platform remove callback returning void
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 00/14] TPM IRQ fixes
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 00/14] TPM IRQ fixes
- From: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm_tis: fix stall after iowrite*()s
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [Patch V10 2/3] tpm_tis-spi: Add hardware wait polling
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 00/14] TPM IRQ fixes
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- bug in "tpm_chip_unregister"
- From: "Martin Dimov" <martin@xxxxxxxxxx>
- Re: [PATCH 0/3] tpm: Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH 0/3] tpm: Convert to platform remove callback returning void
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 00/13] add integrity and security to TPM2 transactions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 12/13] tpm: add the null key name as a sysfs export
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 09/13] tpm: add hmac checks to tpm2_pcr_extend()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 08/13] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 0/3] tpm: Convert to platform remove callback returning void
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 05/13] tpm: add cursor based buffer functions for response parsing
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 04/13] tpm: add buffer handling for TPM2B types
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 03/13] tpm: add kernel doc to buffer handling functions
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 02/13] tpm: move buffer handling from static inlines to real functions
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 01/13] crypto: lib - implement library version of AES in CFB mode
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 00/14] TPM IRQ fixes
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH] tpm_tis_spi: fix:release chip select when flow control fails
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 5/6] KEYS: CA link restriction
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 00/14] TPM IRQ fixes
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 00/14] TPM IRQ fixes
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v11 00/14] TPM IRQ fixes
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [Patch V10 0/3] Tegra TPM driver with HW flow control
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [Patch V10 3/3] spi: tegra210-quad: Enable TPM wait polling
- From: Jon Hunter <jonathanh@xxxxxxxxxx>
- [Patch V10 3/3] spi: tegra210-quad: Enable TPM wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V10 2/3] tpm_tis-spi: Add hardware wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V10 0/3] Tegra TPM driver with HW flow control
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V10 1/3] spi: Add TPM HW flow flag
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- RE: [Patch V9 2/3] tpm_tis-spi: Add hardware wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [Patch V9 2/3] tpm_tis-spi: Add hardware wait polling
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [Patch V9 2/3] tpm_tis-spi: Add hardware wait polling
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [Patch V8 1/3] spi: Add TPM HW flow flag
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Mengchi Cheng <mengcc@xxxxxxxxxx>
- [PATCH v2] tpm_tis: fix stall after iowrite*()s
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH ima-evm-utils] Add openssl command line examples for creation of EC keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v9 4/4] tpm/kexec: Duplicate TPM measurement log in of-tree for kexec
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v9 4/4] tpm/kexec: Duplicate TPM measurement log in of-tree for kexec
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [PATCH v9 4/4] tpm/kexec: Duplicate TPM measurement log in of-tree for kexec
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH ima-evm-utils] Do not get 'generation' using ioctl when evm_portable is true
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v9 1/4] drivers: of: kexec ima: Support 32-bit platforms
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v9 4/4] tpm/kexec: Duplicate TPM measurement log in of-tree for kexec
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v9 2/4] tpm: of: Make of-tree specific function commonly available
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v9 3/4] of: kexec: Refactor IMA buffer related functions to make them reusable
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v9 0/4] tpm: Preserve TPM measurement log across kexec (ppc64)
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] IMA: use vfs_getattr_nosec to get the i_version
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 05/16] ipe: add userspace interface
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 05/16] ipe: add userspace interface
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 05/16] ipe: add userspace interface
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 05/16] ipe: add userspace interface
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH] IMA: use vfs_getattr_nosec to get the i_version
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- [ANNOUNCE] [CFP] Linux Security Summit Europe (LSS-EU)
- From: "Reshetova, Elena" <elena.reshetova@xxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH 0/3] tpm: Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC PATCH v9 05/16] ipe: add userspace interface
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 05/16] ipe: add userspace interface
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 07/16] uapi|audit|ipe: add ipe auditing support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 07/16] uapi|audit|ipe: add ipe auditing support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 05/16] ipe: add userspace interface
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 03/16] ipe: add evaluation loop and introduce 'boot_verified' as a trust provider
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 02/16] ipe: add policy parser
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH] Smack modifications for: security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v10 3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 4/4] evm: Support multiple LSMs providing an xattr
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v9 06/16] ipe: add LSM hooks on execution and kernel read
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 05/16] ipe: add userspace interface
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 03/16] ipe: add evaluation loop and introduce 'boot_verified' as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH] tpm_tis_spi: fix:release chip select when flow control fails
- From: Peijie Shao <shaopeijie@xxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v4 00/13] add integrity and security to TPM2 transactions
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC PATCH v9 02/16] ipe: add policy parser
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [RFC PATCH v9 01/16] security: add ipe lsm
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 00/13] add integrity and security to TPM2 transactions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/13] add integrity and security to TPM2 transactions
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/13] add integrity and security to TPM2 transactions
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v4 00/13] add integrity and security to TPM2 transactions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/13] add integrity and security to TPM2 transactions
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v4 00/13] add integrity and security to TPM2 transactions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/13] add integrity and security to TPM2 transactions
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v4 00/13] add integrity and security to TPM2 transactions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 00/13] add integrity and security to TPM2 transactions
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v10 1/4] reiserfs: Add security prefix to xattr name in reiserfs_security_write()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 08/13] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v4 13/13] Documentation: add tpm-security.rst
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v4 12/13] tpm: add the null key name as a sysfs export
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v4 11/13] KEYS: trusted: Add session encryption protection to the seal/unseal path
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v4 10/13] tpm: add session encryption protection to tpm2_get_random()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v4 09/13] tpm: add hmac checks to tpm2_pcr_extend()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v4 08/13] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v4 07/13] tpm: export the context save and load commands
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v4 06/13] tpm: add buffer function to point to returned parameters
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v4 05/13] tpm: add cursor based buffer functions for response parsing
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v4 04/13] tpm: add buffer handling for TPM2B types
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v4 03/13] tpm: add kernel doc to buffer handling functions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v4 02/13] tpm: move buffer handling from static inlines to real functions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v4 01/13] crypto: lib - implement library version of AES in CFB mode
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v4 00/13] add integrity and security to TPM2 transactions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 06/12] tpm: export the context save and load commands
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 0/4] evm: Do HMAC of multiple per LSM xattrs for new inodes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v10 4/4] evm: Support multiple LSMs providing an xattr
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 1/4] reiserfs: Add security prefix to xattr name in reiserfs_security_write()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 0/4] evm: Do HMAC of multiple per LSM xattrs for new inodes
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 1/4] reiserfs: Add security prefix to xattr name in reiserfs_security_write()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v9 3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 1/4] reiserfs: Add security prefix to xattr name in reiserfs_security_write()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 5/6] KEYS: CA link restriction
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: fix stall after iowrite*()s
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: tpm: fix build break in tpm-chip.c caused by AMD fTPM quirk
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 5/6] KEYS: CA link restriction
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [Patch V9 2/3] tpm_tis-spi: Add hardware wait polling
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [Patch V9 1/3] spi: Add TPM HW flow flag
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [Patch V9 0/3] Tegra TPM driver with HW flow control
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [no subject]
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 0/6] Add CA enforcement keyring restrictions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH next] tpm: Fix a possible dereference of ERR_PTR in tpm_init()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH next] tpm: Fix a possible dereference of ERR_PTR in tpm_init()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 5/6] KEYS: CA link restriction
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v9 4/4] evm: Support multiple LSMs providing an xattr
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 2/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 1/4] reiserfs: Add security prefix to xattr name in reiserfs_security_write()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v9 0/4] evm: Do HMAC of multiple per LSM xattrs for new inodes
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC PATCH v1 1/1] ima: obtain child measurement list from init namespace
- From: Denis Semakin <denis.semakin@xxxxxxxxxx>
- [RFC PATCH v1 0/1] ima: obtain child measurement list from init namespace
- From: Denis Semakin <denis.semakin@xxxxxxxxxx>
- Re: [PATCH v8 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 03/12] tpm: add buffer handling for TPM2B types
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] ima: Fix potential NULL pointer access in ima_match_rules()
- From: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
- Re: [PATCH v8 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v8 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [Patch V9 3/3] spi: tegra210-quad: Enable TPM wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V9 2/3] tpm_tis-spi: Add hardware wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V9 1/3] spi: Add TPM HW flow flag
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- [Patch V9 0/3] Tegra TPM driver with HW flow control
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- Re: [PATCH v8 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v8 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH ima-evm-utils 2/2] Add simple test to check EVM HMAC calculation
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH ima-evm-utils 1/2] Add --hmackey option for evmctl
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v8 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v8 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v8 3/6] security: Remove security_old_inode_init_security()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v8 2/6] ocfs2: Switch to security_inode_init_security()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v8 1/6] reiserfs: Switch to security_inode_init_security()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] tpm_tis: fix stall after iowrite*()s
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: tpm: fix build break in tpm-chip.c caused by AMD fTPM quirk
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- RE: [Patch V8 2/3] tpm_tis-spi: Add hardware wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- Re: Documentation on IMA for Linux Kernel Documentation
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: Documentation on IMA for Linux Kernel Documentation
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- [PATCH v6 2/6] KEYS: Add missing function documentation
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v6 1/6] KEYS: Create static version of public_key_verify_signature
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v6 4/6] KEYS: X.509: Parse Key Usage
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v6 5/6] KEYS: CA link restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v6 6/6] integrity: machine keyring CA configuration
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v6 3/6] KEYS: X.509: Parse Basic Constraints for CA
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v6 0/6] Add CA enforcement keyring restrictions
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils] Include the filesystem UUID in HMAC calculation
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH ima-evm-utils] Include the filesystem UUID in HMAC calculation
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 03/38] char: impi, tpm: depend on HAS_IOPORT
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH next] tpm: Fix a possible dereference of ERR_PTR in tpm_init()
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH next] tpm: Fix a possible dereference of ERR_PTR in tpm_init()
- From: Harshit Mogalapalli <harshit.m.mogalapalli@xxxxxxxxxx>
- Re: [PATCH v5 5/6] KEYS: CA link restriction
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 5/6] KEYS: CA link restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v5 5/6] KEYS: CA link restriction
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/2] tpm: st33zp24: Mark ACPI and OF related data as maybe unused
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 0/3] tpm: Convert to platform remove callback returning void
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: tpm: fix build break in tpm-chip.c caused by AMD fTPM quirk
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] tpm: changes for v6.3-rc4
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] tpm: changes for v6.3-rc4
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: tpm: fix build break in tpm-chip.c caused by AMD fTPM quirk
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [GIT PULL] tpm: changes for v6.3-rc4
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: tpm: fix build break in tpm-chip.c caused by AMD fTPM quirk
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- tpm: fix build break in tpm-chip.c caused by AMD fTPM quirk
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 2/3] tpm/tpm_tis: Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 0/3] tpm: Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 3/3] tpm/tpm_tis_synquacer: Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 1/3] tpm/tpm_ftpm_tee: Convert to platform remove callback returning void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH v2 2/2] tpm: tpm_tis_spi: Mark ACPI and OF related data as maybe unused
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- [PATCH v2 1/2] tpm: st33zp24: Mark ACPI and OF related data as maybe unused
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v11 00/14] TPM IRQ fixes
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: remove unnecessary (void*) conversions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [Patch V8 2/3] tpm_tis-spi: Add hardware wait polling
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: cr50: i2c: use jiffies to wait for tpm ready irq
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 2/6] ocfs2: Switch to security_inode_init_security()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v9 07/16] uapi|audit|ipe: add ipe auditing support
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 11/16] ipe: add support for dm-verity as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: remove the 'checkreqprot' functionality
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: remove the 'checkreqprot' functionality
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v11 00/14] TPM IRQ fixes
- From: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
- [PATCH] tpm: remove unnecessary (void*) conversions
- From: Yu Zhe <yuzhe@xxxxxxxxxxxx>
- RE: [Patch V8 2/3] tpm_tis-spi: Add hardware wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- Re: [PATCH] ima: Fix potential NULL pointer access in ima_match_rules()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] Fix fsverity.test mount failure for ppc64
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] IMA: allow/fix UML builds
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH] tpm: cr50: i2c: use jiffies to wait for tpm ready irq
- From: Mark Hasemeyer <markhas@xxxxxxxxxxxx>
- Re: [PATCH] IMA: allow/fix UML builds
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] ima: Fix potential NULL pointer access in ima_match_rules()
- From: Roman Danilov <romanosauce57@xxxxxxxxx>
- Re: [PATCH v1 0/2] Add destructor hook to LSM modules
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 03/38] char: impi, tpm: depend on HAS_IOPORT
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH v3 03/38] char: impi, tpm: depend on HAS_IOPORT
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 03/38] char: impi, tpm: depend on HAS_IOPORT
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v3 03/38] char: impi, tpm: depend on HAS_IOPORT
- From: Corey Minyard <minyard@xxxxxxx>
- Re: [PATCH ima-evm-utils] Fix fsverity.test mount failure for ppc64
- From: R Nageswara Sastry <rnsastry@xxxxxxxxxxxxx>
- Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 10/12] tpm: fix up the tpm_class shutdown_pre pointer when created
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH 10/12] tpm: fix up the tpm_class shutdown_pre pointer when created
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 03/38] char: impi, tpm: depend on HAS_IOPORT
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v3 03/38] char: impi, tpm: depend on HAS_IOPORT
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [PATCH v1 0/2] Add destructor hook to LSM modules
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 10/12] tpm: fix up the tpm_class shutdown_pre pointer when created
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v1 0/2] Add destructor hook to LSM modules
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors
- From: Thorsten Leemhuis <regressions@xxxxxxxxxxxxx>
- Re: [PATCH v8 0/6] evm: Do HMAC of multiple per LSM xattrs for new inodes
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 6/6] evm: Support multiple LSMs providing an xattr
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 5/6] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 2/6] ocfs2: Switch to security_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 1/6] reiserfs: Switch to security_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 3/6] security: Remove security_old_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 0/6] evm: Do HMAC of multiple per LSM xattrs for new inodes
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: Documentation on IMA for Linux Kernel Documentation
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: Documentation on IMA for Linux Kernel Documentation
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v1 0/2] Add destructor hook to LSM modules
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH 10/12] tpm: fix up the tpm_class shutdown_pre pointer when created
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 6/6] integrity: machine keyring CA configuration
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v1 0/2] Add destructor hook to LSM modules
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] fsverity.test: Add /usr/sbin into $PATH
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH] IMA: allow/fix UML builds
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [GIT PULL] tpm: changes for v6.3-rc3
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] tpm: changes for v6.3-rc3
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] tpm: disable hwrng for fTPM on some AMD designs
- From: "Linux regression tracking (Thorsten Leemhuis)" <regressions@xxxxxxxxxxxxx>
- Re: [PATCH v3] tpm: disable hwrng for fTPM on some AMD designs
- From: "Linux regression tracking (Thorsten Leemhuis)" <regressions@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] tpm: tpm_tis_spi: Mark ACPI and OF related data as maybe unused
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm: st33zp24: Mark ACPI and OF related data as maybe unused
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]