Linux Integrity
[Prev Page][Next Page]
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: "Limonciello, Mario" <mario.limonciello@xxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: "Limonciello, Mario" <mario.limonciello@xxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: "Limonciello, Mario" <mario.limonciello@xxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] integrity: Always reference the blacklist keyring with appraisal
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm/tpm_tis: Disable interrupts for TUXEDO InfinityBook S 15/17 Gen7
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: Daniil Stas <daniil.stas@xxxxxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm/tpm_tis: Disable interrupts for TUXEDO InfinityBook S 15/17 Gen7
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH] tpm/tpm_tis: Disable interrupts for TUXEDO InfinityBook S 15/17 Gen7
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [GIT PULL] tpmdd changes for v6.5-rc4
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: "Limonciello, Mario" <mario.limonciello@xxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: "Limonciello, Mario" <mario.limonciello@xxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: Daniil Stas <daniil.stas@xxxxxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm/tpm_tis: Disable interrupts for TUXEDO InfinityBook S 15/17 Gen7
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [GIT PULL] tpmdd changes for v6.5-rc4
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v3] tpm: Explicitly include correct DT includes
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v2] ima: require signed IMA policy when UEFI secure boot is enabled
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4] integrity: Always reference the blacklist keyring with appraisal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: Remove deprecated IMA_TRUSTED_KEYRING Kconfig
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: Daniil Stas <daniil.stas@xxxxxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: Daniil Stas <daniil.stas@xxxxxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: Daniil Stas <daniil.stas@xxxxxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- Re: [PATCH 1/1] tpm: disable hwrng for fTPM on some AMD designs
- From: Daniil Stas <daniil.stas@xxxxxxxxxx>
- [PATCH v2] char: Explicitly include correct DT includes
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH v4] integrity: Always reference the blacklist keyring with appraisal
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH] tpm/tpm_tis: Disable interrupts for TUXEDO InfinityBook S 15/17 Gen7
- From: Takashi Iwai <tiwai@xxxxxxx>
- [PATCH v2] ima: require signed IMA policy when UEFI secure boot is enabled
- From: Coiby Xu <coxu@xxxxxxxxxx>
- Re: [PATCH -next] trusted-keys: Fix kernel-doc warnings in trusted-keys
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v10 11/17] dm-verity: consume root hash digest and signature data via LSM hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2] kexec_lock: Replace kexec_mutex() by kexec_lock() in two comments
- From: Wenyu Liu <liuwenyu7@xxxxxxxxxx>
- Re: [PATCH] kexec_lock:Fix comment for kexec_lock
- From: "Wenyu Liu(D)" <liuwenyu7@xxxxxxxxxx>
- Re: [PATCH] kexec_lock:Fix comment for kexec_lock
- From: "Wenyu Liu(D)" <liuwenyu7@xxxxxxxxxx>
- Re: [PATCH] kexec_lock:Fix comment for kexec_lock
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: [PATCH] kexec_lock:Fix comment for kexec_lock
- From: Baoquan He <bhe@xxxxxxxxxx>
- [PATCH] kexec_lock:Fix comment for kexec_lock
- From: "Wenyu Liu(D)" <liuwenyu7@xxxxxxxxxx>
- [RFC][PATCH 01/12] ima: Introduce hook DIGEST_LIST_CHECK
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 03/12] integrity/digest_cache: Add functions to populate and search
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 00/12] integrity: Introduce a digest cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 07/12] ima: Add digest_cache policy keyword
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 12/12] tools/digest-lists: Add rpm digest list generator and parser
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 11/12] tools/digest-lists: Add tlv digest list generator and parser
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 10/12] tools: Add tool to manage digest lists
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 09/12] ima: Use digest cache for appraisal
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 08/12] ima: Use digest cache for measurement
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 05/12] integrity/digest_cache: Parse tlv digest lists
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 06/12] integrity/digest_cache: Parse rpm digest lists
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 02/12] integrity: Introduce a digest cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 04/12] integrity/digest_cache: Iterate over digest lists in same dir
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC][PATCH v3 0/9] KEYS: Introduce user asymmetric keys and signatures
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC][PATCH v3 0/9] KEYS: Introduce user asymmetric keys and signatures
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [RFC][GNUPG][PATCH v3 2/2] Convert PGP signatures to the user asymmetric key signatures format
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][GNUPG][PATCH v3 1/2] Convert PGP keys to the user asymmetric keys format
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v3 9/9] ima: Support non-PKCS#7 modsig types
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v3 8/9] KEYS: Introduce load_uasym_keyring()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v3 7/9] KEYS: asymmetric: Preload user asymmetric keys from a keyring blob
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v3 6/9] verification: Add verify_uasym_signature() and verify_uasym_sig_message()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v3 2/9] crypto: Export public key algorithm information
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v3 5/9] KEYS: asymmetric: Introduce the user asymmetric key signature parser
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v3 3/9] crypto: Export signature encoding information
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v3 4/9] KEYS: asymmetric: Introduce the user asymmetric key parser
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v3 0/9] KEYS: Introduce user asymmetric keys and signatures
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v3 1/9] lib: Add TLV parser
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] ima: require signed IMA policy when UEFI secure boot is enabled
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Switch i2c drivers back to use .probe()
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: Switch i2c drivers back to use .probe()
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd changes for v6.5-rc3
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] tpmdd changes for v6.5-rc3
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] tpmdd changes for v6.5-rc2
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] char: Explicitly include correct DT includes
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/2] powerpc/tpm: Create linux,sml-base/size as big endian
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] tpmdd changes for v6.5-rc2
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v10 9/17] ipe: add permissive toggle
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v10 8/17] uapi|audit|ipe: add ipe auditing support
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v10 7/17] ipe: add userspace interface
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v10 6/17] security: add new securityfs delete function
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v10 5/17] ipe: introduce 'boot_verified' as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v10 4/17] ipe: add LSM hooks on execution and kernel read
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v10 3/17] ipe: add evaluation loop
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [GIT PULL] tpmdd changes for v6.5-rc2
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] char: Explicitly include correct DT includes
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [GIT PULL] tpmdd changes for v6.5-rc2
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] kexec_file: ima: allow loading a kernel with its IMA signature verified
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH 3/6] integrity: remove global variable from machine_keyring.c
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH 5/6] integrity: PowerVM machine keyring enablement.
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH 6/6] integrity: PowerVM support for loading third party code signing keys
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH 4/6] integrity: check whether imputed trust is enabled
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH 2/6] integrity: ignore keys failing CA restrictions on non-UEFI platform
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH 1/6] integrity: PowerVM support for loading CA keys on machine keyring
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH 0/6] Enable loading local and third party keys on PowerVM guest
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [PATCH] kexec_file: ima: allow loading a kernel with its IMA signature verified
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3] integrity: Always reference the blacklist keyring with apprasial
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [GIT PULL] tpmdd changes for v6.5-rc2
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 RESEND] tpm,tpm_tis: Disable interrupts after 1000 unhandled IRQs
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH v3] integrity: Always reference the blacklist keyring with apprasial
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH RFC v10 2/17] ipe: add policy parser
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 RESEND] tpm,tpm_tis: Disable interrupts after 1000 unhandled IRQs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] kexec_file: ima: allow loading a kernel with its IMA signature verified
- From: Coiby Xu <coxu@xxxxxxxxxx>
- Re: [PATCH] kexec_file: ima: allow loading a kernel with its IMA signature verified
- From: Coiby Xu <coxu@xxxxxxxxxx>
- Re: [PATCH] ima: require signed IMA policy when UEFI secure boot is enabled
- From: Coiby Xu <coxu@xxxxxxxxxx>
- [PATCH v3] integrity: Always reference the blacklist keyring with apprasial
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH RFC v10 1/17] security: add ipe lsm
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 RESEND] tpm,tpm_tis: Disable interrupts after 1000 unhandled IRQs
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH] kexec_file: ima: allow loading a kernel with its IMA signature verified
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v4] tpm,tpm_tis: Disable interrupts after 1000 unhandled IRQs
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [linux-next:master] BUILD REGRESSION e3262265625831348cfb3128d35907ead75d8bf7
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH v2] integrity: Always reference the blacklist keyring with apprasial
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH 3] tpm,tpm_tis: Disable interrupts after 1000 unhandled IRQs
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH v2] integrity: Always reference the blacklist keyring with apprasial
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] integrity: Always reference the blacklist keyring with apprasial
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH 05/10] kexec: implement functions to map and unmap segment to kimage
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/10] ima: implement function to allocate buffer at kexec load
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 03/10] ima: allocate buffer at kexec load to hold ima measurements
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 10/10] kexec: update kexec_file_load syscall to call ima_kexec_post_load
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] kexec_file: ima: allow loading a kernel with its IMA signature verified
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] integrity: Always reference the blacklist keyring with apprasial
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH 06/10] ima: update buffer at kexec execute with ima measurements
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] powerpc/tpm: Create linux,sml-base/size as big endian
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] powerpc/tpm: Create linux,sml-base/size as big endian
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: Christian Hesse <list@xxxxxxxx>
- Re: [RFC PATCH v10 11/17] dm-verity: consume root hash digest and signature data via LSM hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 10/10] kexec: update kexec_file_load syscall to call ima_kexec_post_load
- From: RuiRui Yang <ruyang@xxxxxxxxxx>
- Re: [PATCH v2 1/2] powerpc/tpm: Create linux,sml-base/size as big endian
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 01/10] ima: implement function to allocate buffer at kexec load
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 03/10] ima: allocate buffer at kexec load to hold ima measurements
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 05/10] kexec: implement functions to map and unmap segment to kimage
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 10/10] kexec: update kexec_file_load syscall to call ima_kexec_post_load
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 07/10] ima: remove function ima_dump_measurement_list
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 06/10] ima: update buffer at kexec execute with ima measurements
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 06/10] ima: update buffer at kexec execute with ima measurements
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 05/10] kexec: implement functions to map and unmap segment to kimage
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 03/10] ima: allocate buffer at kexec load to hold ima measurements
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 02/10] ima: implement function to populate buffer at kexec execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/10] ima: implement function to allocate buffer at kexec load
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/10] ima: measure events between kexec load and execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/10] ima: measure events between kexec load and execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH] ima: Remove deprecated IMA_TRUSTED_KEYRING Kconfig
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: "Linux regression tracking (Thorsten Leemhuis)" <regressions@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] powerpc/tpm: Create linux,sml-base/size as big endian
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: Grundik <ggrundik@xxxxxxxxx>
- Re: [PATCH v12 1/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH] kexec_file: ima: allow loading a kernel with its IMA signature verified
- From: Coiby Xu <coxu@xxxxxxxxxx>
- Re: [PATCH] tpm: make all 'class' structures const
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm/tpm_tis: Disable interrupts for Lenovo L590 devices
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 3] tpm,tpm_tis: Disable interrupts after 1000 unhandled IRQs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH][next] tpm: remove redundant variable len
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] tpm: Do not remap from ACPI resouces again for Pluton TPM
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/2] powerpc/tpm: Create linux,sml-base/size as big endian
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: Christian Hesse <list@xxxxxxxx>
- [PATCH v3 2/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 13th gen
- From: Christian Hesse <mail@xxxxxxxx>
- [PATCH v3 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: Christian Hesse <mail@xxxxxxxx>
- [PATCH v3] tpm: Do not remap from ACPI resouces again for Pluton TPM
- From: Valentin David <valentin.david@xxxxxxxxx>
- Re: [PATCH] security: keys: Modify mismatched function name
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v12 1/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v3 4/4] tpm_tis: Resend command to recover from data transfer errors
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 3/4] tpm_tis: Use responseRetry to recover from data transfer errors
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 1/4] tpm_tis: Explicitly check for error code
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: "Linux regression tracking (Thorsten Leemhuis)" <regressions@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: Christian Hesse <mail@xxxxxxxx>
- [PATCH v2 2/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 13th gen
- From: Christian Hesse <mail@xxxxxxxx>
- Re: [PATCH 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: "Linux regression tracking (Thorsten Leemhuis)" <regressions@xxxxxxxxxxxxx>
- [PATCH 2/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 13th gen
- From: Christian Hesse <mail@xxxxxxxx>
- [PATCH 1/2] tpm/tpm_tis: Disable interrupts for Framework Laptop Intel 12th gen
- From: Christian Hesse <mail@xxxxxxxx>
- Re: [PATCH v2] tpm: Do not remap from ACPI resouces again for Pluton TPM
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: return false from tpm_amd_is_rng_defective on non-x86 platforms
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [regression] Kernel 6.4 failing to access TPM on Framework Laptop 12th gen
- From: Thorsten Leemhuis <regressions@xxxxxxxxxxxxx>
- Re: [PATCH RFC v10 8/17] uapi|audit|ipe: add ipe auditing support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v10 12/17] ipe: add support for dm-verity as a trust provider
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v10 9/17] ipe: add permissive toggle
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v10 7/17] ipe: add userspace interface
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v10 6/17] security: add new securityfs delete function
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v10 5/17] ipe: introduce 'boot_verified' as a trust provider
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v10 3/17] ipe: add evaluation loop
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v10 4/17] ipe: add LSM hooks on execution and kernel read
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v10 2/17] ipe: add policy parser
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v10 1/17] security: add ipe lsm
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v12 1/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] tpm: return false from tpm_amd_is_rng_defective on non-x86 platforms
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH 06/10] ima: update buffer at kexec execute with ima measurements
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 04/14] x86: Secure Launch Resource Table header file
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v12 1/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: return false from tpm_amd_is_rng_defective on non-x86 platforms
- From: "Linux regression tracking (Thorsten Leemhuis)" <regressions@xxxxxxxxxxxxx>
- Re: [PATCH 00/10] ima: measure events between kexec load and execute
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 06/10] ima: update buffer at kexec execute with ima measurements
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v10 11/17] dm-verity: consume root hash digest and signature data via LSM hook
- From: Mike Snitzer <snitzer@xxxxxxxxxx>
- Re: [PATCH v12 1/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v12 1/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 07/10] ima: remove function ima_dump_measurement_list
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 03/10] ima: allocate buffer at kexec load to hold ima measurements
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 02/10] ima: implement function to populate buffer at kexec execute
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 01/10] ima: implement function to allocate buffer at kexec load
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 05/10] kexec: implement functions to map and unmap segment to kimage
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 10/10] kexec: update kexec_file_load syscall to call ima_kexec_post_load
- From: RuiRui Yang <ruyang@xxxxxxxxxx>
- Re: [PATCH 00/10] ima: measure events between kexec load and execute
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [RFC][PATCH 00/10] KEYS: Introduce user asymmetric keys and signatures
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- RE: [PATCH v12 1/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v12 1/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC][PATCH 00/10] KEYS: Introduce user asymmetric keys and signatures
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- [PATCH v2] tpm: Do not remap from ACPI resouces again for Pluton TPM
- From: Valentin David <valentin.david@xxxxxxxxx>
- Re: [QUESTION] Full user space process isolation?
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][GNUPG][PATCH 2/2] Convert PGP signatures to the user asymmetric key signatures format
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][GNUPG][PATCH 1/2] Convert PGP keys to the user asymmetric keys format
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 10/10] selftests/bpf: Prepare a test for user asymmetric key signatures
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 09/10] bpf: Introduce bpf_verify_uasym_signature() kfunc
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 08/10] KEYS: Introduce load_uasym_keyring()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 07/10] KEYS: asymmetric: Preload user asymmetric keys from a keyring blob
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 06/10] verification: Add verify_uasym_signature() and verify_uasym_sig_message()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 05/10] KEYS: asymmetric: Introduce the user asymmetric key signature parser
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 04/10] KEYS: asymmetric: Introduce the user asymmetric key parser
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 03/10] KEYS: asymmetric: Introduce a parser for user asymmetric keys and sigs
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 02/10] crypto: Export signature encoding information
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 01/10] crypto: Export public key algorithm information
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 00/10] KEYS: Introduce user asymmetric keys and signatures
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [QUESTION] Full user space process isolation?
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [QUESTION] Full user space process isolation?
- From: "Dr. Greg" <greg@xxxxxxxxxxxx>
- [PATCH v2] integrity: Always reference the blacklist keyring with apprasial
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH] integrity: Always reference the blacklist keyring with apprasial
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH] tpm: return false from tpm_amd_is_rng_defective on non-x86 platforms
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [PATCH] tpm/tpm_tis_synquacer: do some cleanup
- From: Yangtao Li <frank.li@xxxxxxxx>
- Re: [QUESTION] Full user space process isolation?
- From: "Dr. Greg" <greg@xxxxxxxxxxxx>
- Re: [QUESTION] Full user space process isolation?
- From: Petr Tesarik <petr.tesarik.ext@xxxxxxxxxx>
- Re: [PATCH] ima: require signed IMA policy when UEFI secure boot is enabled
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] integrity: Always reference the blacklist keyring with apprasial
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 10/10] kexec: update kexec_file_load syscall to call ima_kexec_post_load
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 08/10] ima: implement and register a reboot notifier function to update kexec buffer
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 09/10] ima: suspend measurements while the kexec buffer is being copied
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 07/10] ima: remove function ima_dump_measurement_list
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 06/10] ima: update buffer at kexec execute with ima measurements
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 05/10] kexec: implement functions to map and unmap segment to kimage
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 03/10] ima: allocate buffer at kexec load to hold ima measurements
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 04/10] ima: implement functions to suspend and resume measurements
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 02/10] ima: implement function to populate buffer at kexec execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 01/10] ima: implement function to allocate buffer at kexec load
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 00/10] ima: measure events between kexec load and execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [QUESTION] Full user space process isolation?
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [QUESTION] Full user space process isolation?
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [QUESTION] Full user space process isolation?
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [QUESTION] Full user space process isolation?
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [QUESTION] Full user space process isolation?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] ima: require signed IMA policy when UEFI secure boot is enabled
- From: Coiby Xu <coxu@xxxxxxxxxx>
- Re: [QUESTION] Full user space process isolation?
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] security/integrity: fix pointer to ESL data and its size on pseries
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [QUESTION] Full user space process isolation?
- From: "Dr. Greg" <greg@xxxxxxxxxxxx>
- [PATCH] tpm: Do not remap from ACPI resouces again for Pluton TPM
- From: Valentin David <valentin.david@xxxxxxxxx>
- [PATCH] integrity: Always reference the blacklist keyring with apprasial
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- RE: [PATCH] tpm: return false from tpm_amd_is_rng_defective on non-x86 platforms
- From: "Limonciello, Mario" <Mario.Limonciello@xxxxxxx>
- Re: [PATCH] tpm: return false from tpm_amd_is_rng_defective on non-x86 platforms
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- RE: [PATCH] tpm: Ensure that tpm chip has ops to check if it's defective
- From: "Limonciello, Mario" <Mario.Limonciello@xxxxxxx>
- Re: [PATCH] tpm: Ensure that tpm chip has ops to check if it's defective
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- RE: [PATCH] tpm: Ensure that tpm chip has ops to check if it's defective
- From: "Limonciello, Mario" <Mario.Limonciello@xxxxxxx>
- [PATCH] tpm: return false from tpm_amd_is_rng_defective on non-x86 platforms
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- RE: [6.4-rc6] Crash during a kexec operation (tpm_amd_is_rng_defective)
- From: "Limonciello, Mario" <Mario.Limonciello@xxxxxxx>
- Re: [6.4-rc6] Crash during a kexec operation (tpm_amd_is_rng_defective)
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- RE: [6.4-rc6] Crash during a kexec operation (tpm_amd_is_rng_defective)
- From: "Limonciello, Mario" <Mario.Limonciello@xxxxxxx>
- Re: [6.4-rc6] Crash during a kexec operation (tpm_amd_is_rng_defective)
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH][next] tpm: remove redundant variable len
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] tpm/tpm_tis: Disable interrupts for Lenovo L590 devices
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [QUESTION] Full user space process isolation?
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [QUESTION] Full user space process isolation?
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v9 2/4] tpm: of: Make of-tree specific function commonly available
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [RFC PATCH v10 10/17] block|security: add LSM blob to block_device
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v10 16/17] ipe: kunit test for parser
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v10 09/17] ipe: add permissive toggle
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v10 06/17] security: add new securityfs delete function
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v10 00/17] Integrity Policy Enforcement LSM (IPE)
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v10 07/17] ipe: add userspace interface
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v10 05/17] ipe: introduce 'boot_verified' as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v10 17/17] documentation: add ipe documentation
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v10 15/17] scripts: add boot policy generation program
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v10 03/17] ipe: add evaluation loop
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v10 08/17] uapi|audit|ipe: add ipe auditing support
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v10 11/17] dm-verity: consume root hash digest and signature data via LSM hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v10 04/17] ipe: add LSM hooks on execution and kernel read
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v10 02/17] ipe: add policy parser
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v10 14/17] ipe: enable support for fs-verity as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v10 13/17] fsverity: consume builtin signature via LSM hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v10 01/17] security: add ipe lsm
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v10 12/17] ipe: add support for dm-verity as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] integrity: susbystem updates for v6.5
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] integrity: susbystem updates for v6.5
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: MSI B350M MORTAR: tpm tpm0: AMD fTPM version 0x3005700000004 causes system stutter; hwrng disabled
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- MSI B350M MORTAR: tpm tpm0: AMD fTPM version 0x3005700000004 causes system stutter; hwrng disabled
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: [PATCH v11 2/4] smack: Set the SMACK64TRANSMUTE xattr in smack_inode_init_security()
- From: Mengchi Cheng <mengcc@xxxxxxxxxx>
- Re: [PATCH v3 ima-evm-utils 4/4] Add simple tests to check EVM HMAC calculation
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Ensure that tpm chip has ops to check if it's defective
- From: "Limonciello, Mario" <mario.limonciello@xxxxxxx>
- Re: [PATCH v3 ima-evm-utils 4/4] Add simple tests to check EVM HMAC calculation
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 ima-evm-utils 4/4] Add simple tests to check EVM HMAC calculation
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Ensure that tpm chip has ops to check if it's defective
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH] tpm: Ensure that tpm chip has ops to check if it's defective
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- Re: [6.4-rc6] Crash during a kexec operation (tpm_amd_is_rng_defective)
- From: Sachin Sant <sachinp@xxxxxxxxxxxxx>
- [QUESTION] Full user space process isolation?
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [6.4-rc6] Crash during a kexec operation (tpm_amd_is_rng_defective)
- From: "Limonciello, Mario" <mario.limonciello@xxxxxxx>
- Re: [6.4-rc6] Crash during a kexec operation (tpm_amd_is_rng_defective)
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH -next] trusted-keys: Fix kernel-doc warnings in trusted-keys
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH -next] trusted-keys: Fix kernel-doc warnings in trusted-keys
- From: Gaosheng Cui <cuigaosheng1@xxxxxxxxxx>
- Re: [PATCH v3] fsverity: improve documentation for builtin signature support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2] fsverity: improve documentation for builtin signature support
- From: Luca Boccassi <bluca@xxxxxxxxxx>
- Re: [PATCH v3] fsverity: improve documentation for builtin signature support
- From: Luca Boccassi <bluca@xxxxxxxxxx>
- Re: [PATCH v2] fsverity: improve documentation for builtin signature support
- From: Luca Boccassi <bluca@xxxxxxxxxx>
- Re: [PATCH v2] fsverity: improve documentation for builtin signature support
- From: "Colin Walters" <walters@xxxxxxxxxx>
- Re: [PATCH v2] fsverity: improve documentation for builtin signature support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] tpm/tpm_tis: Disable interrupts for Lenovo L590 devices
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH] tpm: make all 'class' structures const
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] fsverity: improve documentation for builtin signature support
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: New kernel warning after updating from LTS 5.15.110 to 5.15.112 (and 5.15.113)
- From: "Linux regression tracking #update (Thorsten Leemhuis)" <regressions@xxxxxxxxxxxxx>
- Re: [PATCH v2] security/integrity: fix pointer to ESL data and its size on pseries
- From: R Nageswara Sastry <rnsastry@xxxxxxxxxxxxx>
- [PATCH] tpm/tpm_tis: Disable interrupts for Lenovo L590 devices
- From: Florian Bezdeka <florian@xxxxxxxxxx>
- Re: [PATCH v2] fsverity: improve documentation for builtin signature support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3] fsverity: improve documentation for builtin signature support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2] fsverity: improve documentation for builtin signature support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2] fsverity: improve documentation for builtin signature support
- From: Luca Boccassi <bluca@xxxxxxxxxx>
- Re: [PATCH v2] fsverity: improve documentation for builtin signature support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2] fsverity: improve documentation for builtin signature support
- From: Luca Boccassi <bluca@xxxxxxxxxx>
- Re: [PATCH v2] fsverity: improve documentation for builtin signature support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2] fsverity: improve documentation for builtin signature support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] fsverity: improve documentation for builtin signature support
- From: Luca Boccassi <bluca@xxxxxxxxxx>
- Re: [PATCH v3 ima-evm-utils 2/4] Restore correct HMAC calculation for directories
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 ima-evm-utils 3/4] Add --hmackey option for evmctl
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3 ima-evm-utils 2/4] Restore correct HMAC calculation for directories
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3 ima-evm-utils 1/4] Include the filesystem UUID in HMAC calculation
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 3] tpm,tpm_tis: Disable interrupts after 1000 unhandled IRQs
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH v2 2/2] powerpc/tpm: Reserve SML log when kexec'ing with kexec_file_load()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] fsverity: improve documentation for builtin signature support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v6 04/14] x86: Secure Launch Resource Table header file
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 04/14] x86: Secure Launch Resource Table header file
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- [PATCH v3 ima-evm-utils 4/4] Add simple tests to check EVM HMAC calculation
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 ima-evm-utils 2/4] Restore correct HMAC calculation for directories
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 ima-evm-utils 3/4] Add --hmackey option for evmctl
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 ima-evm-utils 1/4] Include the filesystem UUID in HMAC calculation
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 ima-evm-utils 0/4] Simple EVM HMAC calculation tests
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 02/14] Documentation/x86: Secure Launch kernel documentation
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- [PATCH][next] tpm: remove redundant variable len
- From: Colin Ian King <colin.i.king@xxxxxxxxx>
- Re: [PATCH v6 02/14] Documentation/x86: Secure Launch kernel documentation
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 02/14] Documentation/x86: Secure Launch kernel documentation
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] fsverity: improve documentation for builtin signature support
- From: Luca Boccassi <bluca@xxxxxxxxxx>
- Re: [PATCH] fsverity: improve documentation for builtin signature support
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] fsverity: improve documentation for builtin signature support
- From: Luca Boccassi <bluca@xxxxxxxxxx>
- Re: [PATCH] fsverity: improve documentation for builtin signature support
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 ima-evm-utils 4/4] Add simple test to check EVM HMAC calculation
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 ima-evm-utils 0/4] Simple EVM HMAC calculation tests
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] fsverity: improve documentation for builtin signature support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] fsverity: improve documentation for builtin signature support
- From: Luca Boccassi <bluca@xxxxxxxxxx>
- Re: Avoiding EBUSY on TPM writes
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: Avoiding EBUSY on TPM writes
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] fsverity: improve documentation for builtin signature support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Avoiding EBUSY on TPM writes
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v2 1/2] powerpc/tpm: Create linux,sml-base/size as big endian
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- [PATCH v2 2/2] powerpc/tpm: Reserve SML log when kexec'ing with kexec_file_load()
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v2] integrity: Fix possible multiple allocation in integrity_inode_get()
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 ima-evm-utils 4/4] Add simple test to check EVM HMAC calculation
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 ima-evm-utils 3/4] Add --hmackey option for evmctl
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v12 4/4] evm: Support multiple LSMs providing an xattr
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v12 3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 ima-evm-utils 0/4] Simple EVM HMAC calculation tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] security: keys: Modify mismatched function name
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 ima-evm-utils 0/4] Simple EVM HMAC calculation tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [linux-next:master] BUILD REGRESSION b16049b21162bb649cdd8519642a35972b7910fe
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] fsverity: rework fsverity_get_digest() again
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] fsverity: rework fsverity_get_digest() again
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] security: keys: Modify mismatched function name
- From: Jiapeng Chong <jiapeng.chong@xxxxxxxxxxxxxxxxx>
- [PATCH v3 1/4] tpm_tis: Explicitly check for error code
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- [PATCH v3 3/4] tpm_tis: Use responseRetry to recover from data transfer errors
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- [PATCH v3 4/4] tpm_tis: Resend command to recover from data transfer errors
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- [PATCH v3 2/4] tpm_tis: Move CRC check to generic send routine
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- [PATCH v3 0/4] Recovery from data transfer errors for tpm_tis
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- Re: [PATCH v2 3/4] tpm_tis: Use responseRetry to recover from data transfer errors
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- [PATCH ima-evm-utils 2/2] Add note that when -p is used password must not be provided
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils 1/2] Strip trailing newline from password entered via prompt
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils 0/2] Fix issues related to password
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH] fsverity: rework fsverity_get_digest() again
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v12 2/4] smack: Set the SMACK64TRANSMUTE xattr in smack_inode_init_security()
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v9 2/4] tpm: of: Make of-tree specific function commonly available
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 0/4] evm: Do HMAC of multiple per LSM xattrs for new inodes
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v12 4/4] evm: Support multiple LSMs providing an xattr
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v12 3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v12 2/4] smack: Set the SMACK64TRANSMUTE xattr in smack_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v12 1/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v12 0/4] evm: Do HMAC of multiple per LSM xattrs for new inodes
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v11 2/4] smack: Set the SMACK64TRANSMUTE xattr in smack_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v11 2/4] smack: Set the SMACK64TRANSMUTE xattr in smack_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v11 0/4] evm: Do HMAC of multiple per LSM xattrs for new inodes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v11 1/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v11 3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v11 2/4] smack: Set the SMACK64TRANSMUTE xattr in smack_inode_init_security()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 2/4] tpm: of: Make of-tree specific function commonly available
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: tpm_tis: Narrow the AAEON DMI quirk to UPX-i11 only
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 2/4] tpm: of: Make of-tree specific function commonly available
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: Switch i2c drivers back to use .probe()
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm,tpm_tis: Handle interrupt storm
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm,tpm_tis: Handle interrupt storm
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [Patch V10 2/3] tpm_tis-spi: Add hardware wait polling
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm,tpm_tis: Handle interrupt storm
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm,tpm_tis: Handle interrupt storm
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] integrity: Fix possible multiple allocation in integrity_inode_get()
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [Patch V10 2/3] tpm_tis-spi: Add hardware wait polling
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [Patch V10 2/3] tpm_tis-spi: Add hardware wait polling
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 2/4] smack: Set the SMACK64TRANSMUTE xattr in smack_inode_init_security()
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: New kernel warning after updating from LTS 5.15.110 to 5.15.112 (and 5.15.113)
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: New kernel warning after updating from LTS 5.15.110 to 5.15.112 (and 5.15.113)
- From: Chris Packham <Chris.Packham@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: factor out the user space mm from tpm_vtpm_set_locality()
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: factor out the user space mm from tpm_vtpm_set_locality()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH] tpm: Redefine pr_fmt
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 3/4] tpm_tis: Use responseRetry to recover from data transfer errors
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] security/integrity: fix pointer to ESL data and its size on pseries
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: factor out the user space mm from tpm_vtpm_set_locality()
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH v2] security/integrity: fix pointer to ESL data and its size on pseries
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: New kernel warning after updating from LTS 5.15.110 to 5.15.112 (and 5.15.113)
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] tpm_tis: Use responseRetry to recover from data transfer errors
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- [PATCH] tpm: Check for availability of chip->ops before requesting locality
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: New kernel warning after updating from LTS 5.15.110 to 5.15.112 (and 5.15.113)
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] security/integrity: fix pointer to ESL data and its size on pseries
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: New kernel warning after updating from LTS 5.15.110 to 5.15.112 (and 5.15.113)
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: New kernel warning after updating from LTS 5.15.110 to 5.15.112 (and 5.15.113)
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH] security/integrity: fix pointer to ESL data and its size on pseries
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: New kernel warning after updating from LTS 5.15.110 to 5.15.112 (and 5.15.113)
- From: Chris Packham <Chris.Packham@xxxxxxxxxxxxxxxxxxx>
- Re: New kernel warning after updating from LTS 5.15.110 to 5.15.112 (and 5.15.113)
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH 2/2] tpm: tis_i2c: Limit write bursts to I2C_SMBUS_BLOCK_MAX (32) bytes
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm: tis_i2c: Limit read bursts to I2C_SMBUS_BLOCK_MAX (32) bytes
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 4/4] tpm_tis: Resend command to recover from data transfer errors
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 3/4] tpm_tis: Use responseRetry to recover from data transfer errors
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 3/4] tpm_tis: Use responseRetry to recover from data transfer errors
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 2/4] tpm_tis: Move CRC check to generic send routine
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/4] tpm_tis: Explicitly check for error code
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: New kernel warning after updating from LTS 5.15.110 to 5.15.112 (and 5.15.113)
- From: Chris Packham <Chris.Packham@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] security/integrity: fix pointer to ESL data and its size on pseries
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH] security/integrity: fix pointer to ESL data and its size on pseries
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 0/4] evm: Do HMAC of multiple per LSM xattrs for new inodes
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v11 0/4] evm: Do HMAC of multiple per LSM xattrs for new inodes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] ima: Fix build warnings
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 06/13] tpm: add buffer function to point to returned parameters
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/2] evm: Fix build warnings
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [GIT PULL] Asymmetric keys fix for v6.4-rc5
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: New kernel warning after updating from LTS 5.15.110 to 5.15.112 (and 5.15.113)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: possible deadlock in ovl_maybe_copy_up
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: possible deadlock in process_measurement (2)
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [syzbot] possible deadlock in mnt_want_write (2)
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [syzbot] possible deadlock in mnt_want_write (2)
- From: syzbot <syzbot+b42fe626038981fb7bfa@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [syzbot] possible deadlock in mnt_want_write (2)
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- [PATCH 2/2] ima: Fix build warnings
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 1/2] evm: Fix build warnings
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: New kernel warning after updating from LTS 5.15.110 to 5.15.112 (and 5.15.113)
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH v4 06/13] tpm: add buffer function to point to returned parameters
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: New kernel warning after updating from LTS 5.15.110 to 5.15.112 (and 5.15.113)
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: New kernel warning after updating from LTS 5.15.110 to 5.15.112 (and 5.15.113)
- From: Chris Packham <Chris.Packham@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 ima-evm-utils 3/4] Add --hmackey option for evmctl
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2 3/4] tpm_tis: Use responseRetry to recover from data transfer errors
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- [PATCH v2 4/4] tpm_tis: Resend command to recover from data transfer errors
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- [PATCH v2 2/4] tpm_tis: Move CRC check to generic send routine
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- [PATCH v2 1/4] tpm_tis: Explicitly check for error code
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- [PATCH 0/4] Recovery from data transfer errors for tpm_tis
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- [PATCH 3/4] tpm_tis: Use responseRetry to recover from data transfer errors
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- [PATCH 4/4] tpm_tis: Resend command to recover from data transfer errors
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- [PATCH 1/4] tpm_tis: Explicitly check for error code
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- [PATCH 0/4] Recovery from data transfer errors for tpm_tis
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- [PATCH 2/4] tpm_tis: Move CRC check to generic send routine
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- [PATCH v2 ima-evm-utils 4/4] Add simple test to check EVM HMAC calculation
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v2 ima-evm-utils 3/4] Add --hmackey option for evmctl
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v2 ima-evm-utils 2/4] Restore correct HMAC calculation for directories
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v2 ima-evm-utils 1/4] Include the filesystem UUID in HMAC calculation
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v2 ima-evm-utils 0/4] Simple EVM HMAC calculation tests
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [GIT PULL] Asymmetric keys fix for v6.4-rc5
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [GIT PULL] Asymmetric keys fix for v6.4-rc5
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] evm: Complete description of evm_inode_setattr()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] evm: Complete description of evm_inode_setattr()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] evm: Complete description of evm_inode_setattr()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] integrity: Fix possible multiple allocation in integrity_inode_get()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [GIT PULL] Asymmetric keys fix for v6.4-rc5
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v11 2/4] smack: Set the SMACK64TRANSMUTE xattr in smack_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v11 4/4] evm: Support multiple LSMs providing an xattr
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v11 3/4] evm: Align evm_inode_init_security() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v11 2/4] smack: Set the SMACK64TRANSMUTE xattr in smack_inode_init_security()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v11 1/4] security: Allow all LSMs to provide xattrs for inode_init_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v11 0/4] evm: Do HMAC of multiple per LSM xattrs for new inodes
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [GIT PULL] Asymmetric keys fix for v6.4-rc5
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [GIT PULL] Asymmetric keys fix for v6.4-rc5
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [GIT PULL] Asymmetric keys fix for v6.4-rc5
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [GIT PULL] Asymmetric keys fix for v6.4-rc5
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm, tpm_tis: correct tpm_tis_flags enumeration values
- From: Pavel Machek <pavel@xxxxxxx>
- Re: [GIT PULL] Asymmetric keys fix for v6.4-rc5
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [GIT PULL] Asymmetric keys fix for v6.4-rc5
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [GIT PULL] Asymmetric keys fix for v6.4-rc5
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v5 2/2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: New kernel warning after updating from LTS 5.15.110 to 5.15.112 (and 5.15.113)
- From: Chris Packham <Chris.Packham@xxxxxxxxxxxxxxxxxxx>
- Re: New kernel warning after updating from LTS 5.15.110 to 5.15.112 (and 5.15.113)
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH v5 2/2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [Patch V10 2/3] tpm_tis-spi: Add hardware wait polling
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [Patch V10 2/3] tpm_tis-spi: Add hardware wait polling
- From: Thierry Reding <thierry.reding@xxxxxxxxx>
- Re: [Patch V10 2/3] tpm_tis-spi: Add hardware wait polling
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [Patch V10 2/3] tpm_tis-spi: Add hardware wait polling
- From: Thierry Reding <thierry.reding@xxxxxxxxx>
- [PATCH v2] integrity: Fix possible multiple allocation in integrity_inode_get()
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v2] tpm: tpm_vtpm_proxy: do not reference kernel memory as user memory
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH RFC v2] tpm: tpm_vtpm_proxy: do not reference kernel memory as user memory
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: factor out the user space mm from tpm_vtpm_set_locality()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: factor out the user space mm from tpm_vtpm_set_locality()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: factor out the user space mm from tpm_vtpm_set_locality()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: factor out the user space mm from tpm_vtpm_set_locality()
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] tpm: factor out the user space mm from tpm_vtpm_set_locality()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- RE: [PATCH RFC v2] tpm: tpm_vtpm_proxy: do not reference kernel memory as user memory
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH] tpm: factor out the user space mm from tpm_vtpm_set_locality()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] tpm: factor out the user space mm from tpm_vtpm_set_locality()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [PATCH v2] tpm,tpm_tis: Handle interrupt storm
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH RFC v2] tpm: tpm_vtpm_proxy: do not reference kernel memory as user memory
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH RFC v2] tpm: tpm_vtpm_proxy: do not reference kernel memory as user memory
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH] tpm, tpm_tis: correct tpm_tis_flags enumeration values
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [linus:master] [tpm, tpm_tis] e644b2f498: RIP:acpi_safe_halt
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [linus:master] [tpm, tpm_tis] e644b2f498: RIP:acpi_safe_halt
- From: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
- Re: [PATCH] integrity: Fix possible multiple allocation in integrity_inode_get()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] integrity: Fix possible multiple allocation in integrity_inode_get()
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH] tpm: tpm_tis: Disable interrupts *only* for AEON UPX-i11
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH RFC v2] tpm: tpm_vtpm_proxy: do not reference kernel memory as user memory
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH RFC] tpm: tpm_vtpm_proxy: fix a race condition in the locality change
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [linus:master] [tpm, tpm_tis] e644b2f498: RIP:acpi_safe_halt
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [linus:master] [tpm, tpm_tis] e644b2f498: RIP:acpi_safe_halt
- From: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Péter Ujfalusi <peter.ujfalusi@xxxxxxxxxxxxxxx>
- Re: New kernel warning after updating from LTS 5.15.110 to 5.15.112 (and 5.15.113)
- From: Chris Packham <Chris.Packham@xxxxxxxxxxxxxxxxxxx>
- Re: New kernel warning after updating from LTS 5.15.110 to 5.15.112 (and 5.15.113)
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- New kernel warning after updating from LTS 5.15.110 to 5.15.112 (and 5.15.113)
- From: Chris Packham <Chris.Packham@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/2] KEYS: asymmetric: Copy sig and digest in public_key_verify_signature()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- [PATCH] tpm: Switch i2c drivers back to use .probe()
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 3/4] of: kexec: Refactor IMA buffer related functions to make them reusable
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v9 3/4] of: kexec: Refactor IMA buffer related functions to make them reusable
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v9 2/4] tpm: of: Make of-tree specific function commonly available
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v9 1/4] drivers: of: kexec ima: Support 32-bit platforms
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH 2/2] tpm: tis_i2c: Limit write bursts to I2C_SMBUS_BLOCK_MAX (32) bytes
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm: tis_i2c: Limit read bursts to I2C_SMBUS_BLOCK_MAX (32) bytes
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm: tis_i2c: Limit read bursts to I2C_SMBUS_BLOCK_MAX (32) bytes
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 2/2] tpm: tis_i2c: Limit write bursts to I2C_SMBUS_BLOCK_MAX (32) bytes
- From: "A. Sverdlin" <alexander.sverdlin@xxxxxxxxxxx>
- [PATCH 1/2] tpm: tis_i2c: Limit read bursts to I2C_SMBUS_BLOCK_MAX (32) bytes
- From: "A. Sverdlin" <alexander.sverdlin@xxxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: tpm_tis: Narrow the AAEON DMI quirk to UPX-i11 only
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- RE: [Patch V10 2/3] tpm_tis-spi: Add hardware wait polling
- From: Krishna Yarlagadda <kyarlagadda@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v2] tpm: tpm_tis: Narrow the AAEON DMI quirk to UPX-i11 only
- From: Peter Ujfalusi <peter.ujfalusi@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: tpm_tis: Narrow the AAEON DMI quirk to UPX-i11 only
- From: Péter Ujfalusi <peter.ujfalusi@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: tpm_tis: Narrow the AAEON DMI quirk to UPX-i11 only
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH] tpm: tpm_tis: Narrow the AAEON DMI quirk to UPX-i11 only
- From: Peter Ujfalusi <peter.ujfalusi@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] tpm_tis_spi: Release chip select when flow control fails
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 05/44] char: tpm: handle HAS_IOPORT dependencies
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 08/14] x86: Secure Launch kernel late boot stub
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm_tis_spi: fix:release chip select when flow control fails
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH - for 6.4] tpm: tpm_tis: Disable interrupts for AEON UPX-i11
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH - for 6.4] tpm: tpm_tis: Disable interrupts for AEON UPX-i11
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] tpmdd changes for v6.4-rc4
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v3] tpm_tis_spi: Release chip select when flow control fails
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [GIT PULL] tpmdd changes for v6.4-rc4
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/2] tpm, tpm_tis: reuse code in disable_interrupts()
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 2/3] integrity: Enforce digitalSignature usage in the ima and evm keyrings
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 2/3] integrity: Enforce digitalSignature usage in the ima and evm keyrings
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 05/44] char: tpm: handle HAS_IOPORT dependencies
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: hash_info.h appreviations
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 2/3] integrity: Enforce digitalSignature usage in the ima and evm keyrings
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] KEYS: DigitalSignature link restriction
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- hash_info.h appreviations
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] tpm, tpm_tis: reuse code in disable_interrupts()
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/2] tpm, tpm_tis: reuse code in disable_interrupts()
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Péter Ujfalusi <peter.ujfalusi@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Péter Ujfalusi <peter.ujfalusi@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH 2/2] tpm, tpm_tis: reuse code in disable_interrupts()
- From: Péter Ujfalusi <peter.ujfalusi@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Péter Ujfalusi <peter.ujfalusi@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Péter Ujfalusi <peter.ujfalusi@xxxxxxxxxxxxxxx>
- Re: Re: [PATCH v2] tpm_tis_spi: fix:release chip select when flow control fails
- From: shaopeijie@xxxxxxxx
- [PATCH v3] tpm_tis_spi: Release chip select when flow control fails
- From: shaopeijie@xxxxxxxx
- Re: Re: [PATCH v2] tpm_tis_spi: fix:release chip select when flow control fails
- From: shaopeijie@xxxxxxxx
- [PATCH v2 0/3] Add digitalSignature enforcement keyring restrictions
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v2 3/3] integrity: Remove EXPERIMENTAL from Kconfig
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v2 1/3] KEYS: DigitalSignature link restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v2 2/3] integrity: Enforce digitalSignature usage in the ima and evm keyrings
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH 2/2] tpm, tpm_tis: reuse code in disable_interrupts()
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [PATCH 2/2] tpm, tpm_tis: reuse code in disable_interrupts()
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH 1/2] tpm, tpm_tis: Handle interrupt storm
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v5 05/44] char: tpm: handle HAS_IOPORT dependencies
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm_tis_spi: fix:release chip select when flow control fails
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: [PATCH - for 6.4] tpm: tpm_tis: Disable interrupts for AEON UPX-i11
- From: Péter Ujfalusi <peter.ujfalusi@xxxxxxxxxxxxxxx>
- [PATCH v2] tpm_tis_spi: fix:release chip select when flow control fails
- From: shaopeijie@xxxxxxxx
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v2] tpm: tpm_vtpm_proxy: fix a race condition in /dev/vtpmx creation
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] overlayfs: Trigger file re-evaluation by IMA / EVM after writes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH - for 6.4] tpm: tpm_tis: Disable interrupts for AEON UPX-i11
- From: Péter Ujfalusi <peter.ujfalusi@xxxxxxxxxxxxxxx>
- Re: [PATCH - for 6.4] tpm: tpm_tis: Disable interrupts for AEON UPX-i11
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH - for 6.4] tpm: tpm_tis: Disable interrupts for AEON UPX-i11
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH - for 6.4] tpm: tpm_tis: Disable interrupts for AEON UPX-i11
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH - for 6.4] tpm: tpm_tis: Disable interrupts for AEON UPX-i11
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm/tpm_tis: Disable interrupts for more Lenovo devices
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [GIT PULL] tpmdd: three bug fixes for v6.4-rc2
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] tpmdd: three bug fixes for v6.4-rc2
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [GIT PULL] tpmdd: three bug fixes for v6.4-rc2
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH - for 6.4] tpm: tpm_tis: Disable interrupts for AEON UPX-i11
- From: Péter Ujfalusi <peter.ujfalusi@xxxxxxxxxxxxxxx>
- [PATCH - for 6.4] tpm: tpm_tis: Disable interrupts for AEON UPX-i11
- From: Peter Ujfalusi <peter.ujfalusi@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] integrity: Remove EXPERIMENTAL from Kconfig
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] integrity: Enforce digitalSignature usage in the ima and evm keyrings
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] KEYS: DigitalSignature link restriction
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 03/41] char: impi, tpm: depend on HAS_IOPORT
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [PATCH v4 03/41] char: impi, tpm: depend on HAS_IOPORT
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 03/41] char: impi, tpm: depend on HAS_IOPORT
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [PATCH v4 03/41] char: impi, tpm: depend on HAS_IOPORT
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- [PATCH v4 03/41] char: impi, tpm: depend on HAS_IOPORT
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 04/14] x86: Secure Launch Resource Table header file
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH v6 13/14] tpm: Allow locality 2 to be set when initializing the TPM for Secure Launch
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 11/14] reboot: Secure Launch SEXIT support on reboot paths
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 06/14] x86: Add early SHA support for Secure Launch early measurements
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]