Linux Integrity
[Prev Page][Next Page]
- Re: TPM operation times out (very rarely)
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: TPM operation times out (very rarely)
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 4/6] ima: Mark concurrent accesses to the iint pointer in the inode security blob
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/6] ima: Remove inode lock
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/6] fs: ima: Remove S_IMA and IS_IMA()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 5/6] ima: Defer fixing security.ima to __fput()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 3/6] ima: Detect if lock is held when iint pointer is set in inode security blob
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: [LTP] [PATCH v3 10/10] tst_test.sh: IMA: Allow to disable LSM warnings and use it for IMA
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: TPM operation times out (very rarely)
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [LTP] [PATCH v3 10/10] tst_test.sh: IMA: Allow to disable LSM warnings and use it for IMA
- From: Cyril Hrubis <chrubis@xxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: TPM operation times out (very rarely)
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 3/7] ima: kexec: skip IMA segment validation after kexec soft reboot
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Jonathan McDowell <noodles@xxxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Jonathan McDowell <noodles@xxxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Michal Suchánek <msuchanek@xxxxxxx>
- TPM operation times out (very rarely)
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: [PATCH 7/7] ima: measure kexec load and exec events as critical data
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 6/7] ima: make the kexec extra memory configurable
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 7/7] ima: measure kexec load and exec events as critical data
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 7/7] ima: measure kexec load and exec events as critical data
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v6 3/7] ima: kexec: skip IMA segment validation after kexec soft reboot
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v6 6/7] ima: make the kexec extra memory configurable
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v1] selftests: Handle old glibc without execveat(2)
- From: Kees Cook <kees@xxxxxxxxxx>
- Re: [PATCH v4] selftests: tpm2: create a dedicated .gitignore
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 00/34] address all -Wunused-const warnings
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxx>
- [PATCH v4] selftests: tpm2: create a dedicated .gitignore
- From: Khaled Elnaggar <khaledelnaggarlinux@xxxxxxxxx>
- Re: [PATCH v3] selftests: tpm2: create a dedicated .gitignore
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH v3] selftests: tpm2: create a dedicated .gitignore
- From: Khaled Elnaggar <khaledelnaggarlinux@xxxxxxxxx>
- Re: [PATCH v2] selftests: tpm2: create a dedicated .gitignore
- From: Khaled Elnaggar <khaledelnaggarlinux@xxxxxxxxx>
- Re: [PATCH v2] selftests: tpm2: create a dedicated .gitignore
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] selftests: tpm2: create a dedicated .gitignore
- From: Khaled Elnaggar <khaledelnaggarlinux@xxxxxxxxx>
- [PATCH v6 6/7] ima: make the kexec extra memory configurable
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 5/7] ima: kexec: move IMA log copy from kexec load to execute
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH 7/7] ima: measure kexec load and exec events as critical data
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 4/7] ima: kexec: define functions to copy IMA log at soft boot
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 3/7] ima: kexec: skip IMA segment validation after kexec soft reboot
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 1/7] ima: define and call ima_alloc_kexec_file_buf
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 2/7] kexec: define functions to map and unmap segments
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 0/7] ima: kexec: measure events between kexec load and excute
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 5/7] ima: kexec: move IMA log copy from kexec load to execute
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH 7/7] ima: measure kexec load and exec events as critical data
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 6/7] ima: make the kexec extra memory configurable
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 0/7] *** SUBJECT HERE ***
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 4/7] ima: kexec: define functions to copy IMA log at soft boot
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 3/7] ima: kexec: skip IMA segment validation after kexec soft reboot
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 2/7] kexec: define functions to map and unmap segments
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 1/7] ima: define and call ima_alloc_kexec_file_buf
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] selftests: tpm2: create a dedicated .gitignore
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] selftests: tpm2: create a dedicated .gitignore
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] TPM DEVICE DRIVER: tpmdd-next-6.14-rc1
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v2] selftests: tpm2: create a dedicated .gitignore
- From: Khaled Elnaggar <khaledelnaggarlinux@xxxxxxxxx>
- [PATCH] integrity: fix typos and spelling errors
- From: Tanya Agarwal <tanyaagarwal25699@xxxxxxxxx>
- Re: [PATCH v3 06/10] ima_violations.sh: Declare tcb builtin policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 09/10] ima_measurements.sh: Check policy for test3
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 10/10] tst_test.sh: IMA: Allow to disable LSM warnings and use it for IMA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 05/10] IMA: Read required policy from file
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 03/10] IMA: Move requirement check to ima_setup.sh
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 02/10] IMA: Add TCB policy as an example for ima_measurements.sh
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 01/10] ima_violations.sh: Fix log detection
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 00/10] LTP tests: load predefined policy, enhancements
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] selftests: tpm2: create a dedicated .gitignore
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [GIT PULL] TPM DEVICE DRIVER: tpmdd-next-6.14-rc1
- From: "Jarkko Sakkinen" <jarkko.sakkinen@xxxxxx>
- Re: [GIT PULL] KEYS: keys-next-6.13-rc1
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- [PATCH v3 6/6] ima: Reset IMA_NONACTION_RULE_FLAGS after post_setattr
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 5/6] ima: Defer fixing security.ima to __fput()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 4/6] ima: Mark concurrent accesses to the iint pointer in the inode security blob
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 3/6] ima: Detect if lock is held when iint pointer is set in inode security blob
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 2/6] ima: Remove inode lock
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 1/6] fs: ima: Remove S_IMA and IS_IMA()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 0/6] ima: Remove unnecessary inode locks
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v2] selftests: tpm2: create a dedicated .gitignore
- From: Khaled Elnaggar <khaledelnaggarlinux@xxxxxxxxx>
- Re: [GIT PULL] integrity: subsystem updates for v6.13
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v6 01/15] lib: Add TLV parser
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- Re: [PATCH v6 01/15] lib: Add TLV parser
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 01/15] lib: Add TLV parser
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 01/15] lib: Add TLV parser
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- Re: [PATCH v6 01/15] lib: Add TLV parser
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 01/15] lib: Add TLV parser
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- Re: [PATCH v2 0/6] module: Introduce hash-based integrity checking
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/6] module: Introduce hash-based integrity checking
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- Re: [PATCH v2 0/6] module: Introduce hash-based integrity checking
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [GIT PULL] KEYS: keys-next-6.14-rc1
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] KEYS: keys-next-6.13-rc1
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [GIT PULL] KEYS: keys-next-6.13-rc1
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v1] selftests: Handle old glibc without execveat(2)
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH v10] tpm: Map the ACPI provided event log
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH v10] tpm: Map the ACPI provided event log
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] ima: kexec: silence RCU list traversal warning
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [GIT PULL] integrity: subsystem updates for v6.14
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [GIT PULL] integrity: subsystem updates for v6.13 (please ignore)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [GIT PULL] integrity: subsystem updates for v6.13
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 5/7] ima: Set security.ima on file close when ima_appraise=fix
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v1] selftests: Handle old glibc without execveat(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v1] selftests: Handle old glibc without execveat(2)
- From: Günther Noack <gnoack3000@xxxxxxxxx>
- Re: [PATCH v10] tpm: Map the ACPI provided event log
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH v10] tpm: Map the ACPI provided event log
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v10] tpm: Map the ACPI provided event log
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH v2 7/7] ima: Reset IMA_NONACTION_RULE_FLAGS after post_setattr
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 6/7] ima: Discard files opened with O_PATH
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] ima: kexec: silence RCU list traversal warning
- From: Breno Leitao <leitao@xxxxxxxxxx>
- Re: [PATCH v10] tpm: Map the ACPI provided event log
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v9] tpm: Map the ACPI provided event log
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH v10] tpm: Map the ACPI provided event log
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v9] tpm: Map the ACPI provided event log
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v9] tpm: Map the ACPI provided event log
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v23 7/8] samples/check-exec: Add an enlighten "inc" interpreter and 28 tests
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v1] selftests: Handle old glibc without execveat(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v2 5/7] ima: Set security.ima on file close when ima_appraise=fix
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/7] ima: Ensure lock is held when setting iint pointer in inode security blob
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/7] ima: Remove inode lock
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] ima: limit the builtin 'tcb' dont_measure tmpfs policy rule
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH V2] security: fix typos and spelling errors
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v23 7/8] samples/check-exec: Add an enlighten "inc" interpreter and 28 tests
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH V2] security: fix typos and spelling errors
- From: Tanya Agarwal <tanyaagarwal25699@xxxxxxxxx>
- Re: [PATCH v2 4/7] ima: Mark concurrent accesses to the iint pointer in the inode security blob
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/7] ima: Ensure lock is held when setting iint pointer in inode security blob
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/7] ima: Remove inode lock
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [RFC PATCH] IMA: Remove evm_overlay.sh
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v3 07/10] ima_setup.sh: Add digest index detection for ima-buf format
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v3 08/10] ima_setup.sh: Allow to load predefined policy
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v3 06/10] ima_violations.sh: Declare tcb builtin policy
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v3 09/10] ima_measurements.sh: Check policy for test3
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v3 10/10] tst_test.sh: IMA: Allow to disable LSM warnings and use it for IMA
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v3 02/10] IMA: Add TCB policy as an example for ima_measurements.sh
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v3 05/10] IMA: Read required policy from file
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v3 00/10] LTP tests: load predefined policy, enhancements
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v3 04/10] IMA: Add example policy for ima_violations.sh
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v3 01/10] ima_violations.sh: Fix log detection
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v3 03/10] IMA: Move requirement check to ima_setup.sh
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH] ima_violations.sh: Fix log detection
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH V2] security: fix typos and spelling errors
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH V2] security: fix typos and spelling errors
- From: Günther Noack <gnoack3000@xxxxxxxxx>
- Re: [PATCH V2] security: fix typos and spelling errors
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V2] security: fix typos and spelling errors
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V2] security: fix typos and spelling errors
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH V2] security: fix typos and spelling errors
- From: Tanya Agarwal <tanyaagarwal25699@xxxxxxxxx>
- Re: [PATCH] security: fix typos and spelling errors
- From: Günther Noack <gnoack3000@xxxxxxxxx>
- [PATCH] security: fix typos and spelling errors
- From: Tanya Agarwal <tanyaagarwal25699@xxxxxxxxx>
- Re: [PATCH] KEYS: trusted: dcp: fix improper sg use with CONFIG_VMAP_STACK=y
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: dcp: fix improper sg use with CONFIG_VMAP_STACK=y
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 6/8] IMA: Add example policy for ima_violations.sh
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: dcp: fix improper sg use with CONFIG_VMAP_STACK=y
- From: David Gstir <david@xxxxxxxxxxxxx>
- Re: [PATCH v5] tpm: Map the ACPI provided event log
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v8] tpm: Map the ACPI provided event log
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v5] tpm: Map the ACPI provided event log
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 08/13] clavis: Introduce new LSM called clavis
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 03/13] clavis: Introduce a new system keyring called clavis
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 08/13] clavis: Introduce new LSM called clavis
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH v3 04/13] keys: Add new verification type (VERIFYING_CLAVIS_SIGNATURE)
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH v3 03/13] clavis: Introduce a new system keyring called clavis
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH v3 01/13] certs: Remove CONFIG_INTEGRITY_PLATFORM_KEYRING check
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v2 6/8] IMA: Add example policy for ima_violations.sh
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v8] tpm: Map the ACPI provided event log
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH v2 2/8] ima_setup.sh: Allow to load predefined policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: ignore suffixed policy rule comments
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 2/8] ima_setup.sh: Allow to load predefined policy
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2 2/8] ima_setup.sh: Allow to load predefined policy
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2 1/8] IMA: Add TCB policy as an example for ima_measurements.sh
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2 1/8] IMA: Add TCB policy as an example for ima_measurements.sh
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 6/8] IMA: Add example policy for ima_violations.sh
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/8] ima_setup.sh: Allow to load predefined policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 6/8] IMA: Add example policy for ima_violations.sh
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2 6/8] IMA: Add example policy for ima_violations.sh
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2 2/8] ima_setup.sh: Allow to load predefined policy
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH] ima: limit the builtin 'tcb' dont_measure tmpfs policy rule
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH] ima: ignore suffixed policy rule comments
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2 6/8] IMA: Add example policy for ima_violations.sh
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 7/8] ima_violations.sh: Check for a required policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/8] ima_setup.sh: Allow to load predefined policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] ima: ignore suffixed policy rule comments
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] ima: limit the builtin 'tcb' dont_measure tmpfs policy rule
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [syzbot] [integrity?] [lsm?] INFO: task hung in process_measurement (2)
- From: "Yuezhang.Mo@xxxxxxxx" <Yuezhang.Mo@xxxxxxxx>
- Re: [syzbot] [integrity?] [lsm?] INFO: task hung in process_measurement (2)
- From: syzbot <syzbot+1de5a37cb85a2d536330@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] dt-bindings: tpm: Add st,st33tphf2ei2c
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH] dt-bindings: tpm: Add st,st33tphf2ei2c
- From: Marek Vasut <marex@xxxxxxx>
- [PATCH v8] tpm: Map the ACPI provided event log
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 2/2] tpm: Map the ACPI provided event log
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 2/2] tpm: Map the ACPI provided event log
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 2/2] tpm: Map the ACPI provided event log
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 2/2] tpm: Map the ACPI provided event log
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] dt-bindings: tpm: Add st,st33tphf2ei2c
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- [PATCH v7 2/2] tpm: Map the ACPI provided event log
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v7 1/2] tpm: Map the ACPI provided event log
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] dt-bindings: tpm: Add st,st33tphf2ei2c
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] dt-bindings: tpm: Add st,st33tphf2ei2c
- From: Marek Vasut <marex@xxxxxxx>
- Re: [PATCH v6 1/2] tpm: Map the ACPI provided event log
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] dt-bindings: tpm: Add st,st33tphf2ei2c
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH] dt-bindings: tpm: Add st,st33tphf2ei2c
- From: Marek Vasut <marex@xxxxxxx>
- Re: [PATCH v6 1/2] tpm: Map the ACPI provided event log
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH v6 2/2] tpm: Map the ACPI provided event log
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v6 1/2] tpm: Map the ACPI provided event log
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5] tpm: Map the ACPI provided event log
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Повідомлення від ТОВ Нова Пошта
- From: Нова Пошта <hskim@xxxxxxxxxxxx>
- Re: [RFC PATCH v3 08/13] clavis: Introduce new LSM called clavis
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5] tpm: Map the ACPI provided event log
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v5] tpm: Map the ACPI provided event log
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH v5] tpm: Map the ACPI provided event log
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v4] tpm: Map the ACPI provided event log
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v3 13/13] clavis: Kunit support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 04/13] keys: Add new verification type (VERIFYING_CLAVIS_SIGNATURE)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 03/13] clavis: Introduce a new system keyring called clavis
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3] tpm: Map the ACPI provided event log
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v3 02/13] certs: Introduce ability to link to a system key
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 01/13] certs: Remove CONFIG_INTEGRITY_PLATFORM_KEYRING check
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Map the ACPI provided event log
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: Map the ACPI provided event log
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Map the ACPI provided event log
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: Map the ACPI provided event log
- From: "Jarkko Sakkinen" <jarkko.sakkinen@xxxxxx>
- Re: [PATCH] tpm: Map the ACPI provided event log
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v3] tpm: Map the ACPI provided event log
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: Map the ACPI provided event log
- From: "Jarkko Sakkinen" <jarkko.sakkinen@xxxxxx>
- Re: [PATCH] tpm: Map the ACPI provided event log
- From: "Jarkko Sakkinen" <jarkko.sakkinen@xxxxxx>
- Re: [PATCH] tpm: Map the ACPI provided event log
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Map the ACPI provided event log
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2] tpm: Map the ACPI provided event log
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] tpm: Map the ACPI provided event log
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm/eventlog: Limit memory allocations for event logs with excessive size
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH] tpm/eventlog: Limit memory allocations for event logs with excessive size
- From: "Liang, Andy (Linux Ecosystem Engineering)" <andy.liang@xxxxxxx>
- [PATCH v12 19/19] x86/efi: EFI stub DRTM launch support for Secure Launch
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 14/19] tpm, tpm_tis: Close all localities
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 16/19] tpm, tpm_tis: Allow locality to be set to a different value
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 13/19] x86/reboot: Secure Launch SEXIT support on reboot paths
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 12/19] kexec: Secure Launch kexec SEXIT support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 18/19] x86: Secure Launch late initcall platform module
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 17/19] tpm, sysfs: Show locality used by kernel
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 08/19] x86/boot: Place TXT MLE header in the kernel_info section
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 15/19] tpm, tpm_tis: Address positive localities in tpm_tis_request_locality()
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 05/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 11/19] x86: Secure Launch SMP bringup support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 09/19] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 10/19] x86: Secure Launch kernel late boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 03/19] x86: Secure Launch Resource Table header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 02/19] x86: Secure Launch Kconfig
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 07/19] x86/msr: Add variable MTRR base/mask and x2apic ID registers
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 01/19] Documentation/x86: Secure Launch kernel documentation
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 00/19] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 04/19] x86: Secure Launch main header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 06/19] x86: Add early SHA-256 support for Secure Launch early measurements
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
- From: Song Liu <songliubraving@xxxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: "Jarkko Sakkinen" <jarkko.sakkinen@xxxxxx>
- Re: [PATCH] tpm/eventlog: Limit memory allocations for event logs with excessive size
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH] tpm/eventlog: Limit memory allocations for event logs with excessive size
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v23 0/8] Script execution control (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v23 0/8] Script execution control (was O_MAYEXEC)
- From: Kees Cook <kees@xxxxxxxxxx>
- Re: [RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
- From: Song Liu <songliubraving@xxxxxxxx>
- Re: [RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
- From: Song Liu <songliubraving@xxxxxxxx>
- Re: [RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v23 0/8] Script execution control (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH] lsm: integrity: Allow enable/disable ima and evm with lsm= cmdline
- From: Song Liu <song@xxxxxxxxxx>
- Re: [RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
- From: Song Liu <songliubraving@xxxxxxxx>
- Re: [RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
- From: Song Liu <songliubraving@xxxxxxxx>
- Re: [RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
- From: Song Liu <songliubraving@xxxxxxxx>
- Re: [RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
- From: Song Liu <songliubraving@xxxxxxxx>
- Re: [RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
- From: Song Liu <songliubraving@xxxxxxxx>
- Re: [RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [RFC 2/2] evm: Add kernel parameter to disable EVM
- From: Song Liu <song@xxxxxxxxxx>
- [RFC 1/2] ima: Add kernel parameter to disable IMA
- From: Song Liu <song@xxxxxxxxxx>
- [RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
- From: Song Liu <song@xxxxxxxxxx>
- Re: [PATCH] tpm/eventlog: Limit memory allocations for event logs with excessive size
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3] doc: correct the build steps for open_posix_testsuite
- From: Cyril Hrubis <chrubis@xxxxxxx>
- Re: [syzbot] [integrity?] [lsm?] INFO: task hung in process_measurement (2)
- From: "Yuezhang.Mo@xxxxxxxx" <Yuezhang.Mo@xxxxxxxx>
- Re: [syzbot] [integrity?] [lsm?] INFO: task hung in process_measurement (2)
- From: syzbot <syzbot+1de5a37cb85a2d536330@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: TPM/EFI issue [Was: Linux 6.12]
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm/eventlog: Limit memory allocations for event logs with excessive size
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- [PATCH v2 8/8] [RFC] ima_kexec.sh: Relax result on unreadable policy to TCONF
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v2 3/8] tst_test.sh: IMA: Allow to disable LSM warnings and use it for IMA
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v2 1/8] IMA: Add TCB policy as an example for ima_measurements.sh
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v2 7/8] ima_violations.sh: Check for a required policy
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v2 6/8] IMA: Add example policy for ima_violations.sh
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v2 2/8] ima_setup.sh: Allow to load predefined policy
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v2 5/8] ima_kexec.sh: Move checking policy if readable to ima_setup.sh
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v2 4/8] ima_setup: Print warning when policy not readable
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v2 0/8] LTP tests: load predefined policy, enhancements
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- [PATCH v23 6/8] selftests: ktap_helpers: Fix uninitialized variable
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v23 8/8] ima: instantiate the bprm_creds_for_exec() hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v23 5/8] samples/check-exec: Add set-exec
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v23 3/8] selftests/exec: Add 32 tests for AT_EXECVE_CHECK and exec securebits
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v23 0/8] Script execution control (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v23 4/8] selftests/landlock: Add tests for execveat + AT_EXECVE_CHECK
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v23 7/8] samples/check-exec: Add an enlighten "inc" interpreter and 28 tests
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v23 1/8] exec: Add a new AT_EXECVE_CHECK flag to execveat(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v23 2/8] security: Add EXEC_RESTRICT_FILE and EXEC_DENY_INTERACTIVE securebits
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH 1/3] tpm: add generic platform device
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: add generic platform device
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] tpm: add generic platform device
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH 2/3] ima_setup.sh: Allow to load predefined policy
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 1/3] tpm: add generic platform device
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] ima_setup.sh: Allow to load predefined policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [syzbot] [lsm?] [integrity?] KMSAN: uninit-value in ima_add_template_entry (2)
- From: syzbot <syzbot+91ae49e1c1a2634d20c0@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] tpm: add generic platform device
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [syzbot] [integrity?] [lsm?] KMSAN: uninit-value in ima_add_template_entry (2)
- From: "Yuezhang.Mo@xxxxxxxx" <Yuezhang.Mo@xxxxxxxx>
- Re: [PATCH 1/3] ima: Add TCB policy as an example
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 3/3] ima_{kexec,keys,selinux}: Set minimal kernel version
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 2/3] ima_setup.sh: Allow to load predefined policy
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH 3/3] ima_{kexec,keys,selinux}: Set minimal kernel version
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] ima: Add TCB policy as an example
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] ima_setup.sh: Allow to load predefined policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [syzbot] Monthly integrity report (Dec 2024)
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v22 2/8] security: Add EXEC_RESTRICT_FILE and EXEC_DENY_INTERACTIVE securebits
- From: Jeff Xu <jeffxu@xxxxxxxxxxxx>
- Re: [PATCH v22 1/8] exec: Add a new AT_EXECVE_CHECK flag to execveat(2)
- From: Jeff Xu <jeffxu@xxxxxxxxxxxx>
- Re: [PATCH v22 0/8] Script execution control (was O_MAYEXEC)
- From: jeffxu <jeffxu@xxxxxxxxxxxx>
- Re: [syzbot] [integrity?] [lsm?] INFO: task hung in process_measurement (2)
- From: syzbot <syzbot+1de5a37cb85a2d536330@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [syzbot] [integrity?] [lsm?] INFO: task hung in process_measurement (2)
- From: "Yuezhang.Mo@xxxxxxxx" <Yuezhang.Mo@xxxxxxxx>
- Re: [LTP] [PATCH v3] doc: correct the build steps for open_posix_testsuite
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [LTP] [PATCH] doc: correct the build steps for open_posix_testsuite
- From: Xiubo Li <xiubli@xxxxxxxxxx>
- [PATCH v3] doc: correct the build steps for open_posix_testsuite
- [PATCH] tpm/eventlog: Limit memory allocations for event logs with excessive size
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v22 8/8] ima: instantiate the bprm_creds_for_exec() hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] ima: instantiate the bprm_creds_for_exec() hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v22 2/8] security: Add EXEC_RESTRICT_FILE and EXEC_DENY_INTERACTIVE securebits
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v2] ima: instantiate the bprm_creds_for_exec() hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH 2/3] x86/sev: add SVSM call macros for the vTPM protocol
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH 1/3] tpm: add generic platform device
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH 0/3] Enlightened vTPM support for SVSM on SEV-SNP
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: TPM/EFI issue [Was: Linux 6.12]
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [LTP] [PATCH] doc: correct the build steps for open_posix_testsuite
- From: Cyril Hrubis <chrubis@xxxxxxx>
- Re: [syzbot] [integrity?] [lsm?] INFO: task hung in process_measurement (2)
- From: syzbot <syzbot+1de5a37cb85a2d536330@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [syzbot] [integrity?] [lsm?] INFO: task hung in process_measurement (2)
- From: "Yuezhang.Mo@xxxxxxxx" <Yuezhang.Mo@xxxxxxxx>
- Re: TPM/EFI issue [Was: Linux 6.12]
- From: Jiri Slaby <jirislaby@xxxxxxxxxx>
- Re: [syzbot] [integrity?] [lsm?] INFO: task hung in process_measurement (2)
- From: syzbot <syzbot+1de5a37cb85a2d536330@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [REGRESSION][BISECTED] tpm: Popping noise in USB headphones since 1b6d7f9eb150
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: TPM/EFI issue [Was: Linux 6.12]
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: TPM/EFI issue [Was: Linux 6.12]
- From: Jiri Slaby <jirislaby@xxxxxxxxxx>
- Re: [syzbot] [integrity?] [lsm?] INFO: task hung in process_measurement (2)
- From: syzbot <syzbot+1de5a37cb85a2d536330@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [syzbot] Monthly integrity report (Dec 2024)
- From: syzbot <syzbot+list2eccd137a466e6acfa54@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: TPM/EFI issue [Was: Linux 6.12]
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 1/5] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/5] LSM: Ensure the correct LSM context releaser
- From: Kees Bakker <kees@xxxxxxxxxxxx>
- Re: [PATCH v6 00/15] integrity: Introduce the Integrity Digest Cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 00/15] integrity: Introduce the Integrity Digest Cache
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v6 00/15] integrity: Introduce the Integrity Digest Cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] ima: instantiate the bprm_creds_for_exec() hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] ima: instantiate the bprm_creds_for_exec() hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v6 00/15] integrity: Introduce the Integrity Digest Cache
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v22 0/8] Script execution control (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v6 00/15] integrity: Introduce the Integrity Digest Cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v22 7/8] samples/check-exec: Add an enlighten "inc" interpreter and 28 tests
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v22 5/8] samples/check-exec: Add set-exec
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v22 8/8] ima: instantiate the bprm_creds_for_exec() hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v22 6/8] selftests: ktap_helpers: Fix uninitialized variable
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v22 4/8] selftests/landlock: Add tests for execveat + AT_EXECVE_CHECK
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v22 3/8] selftests/exec: Add 32 tests for AT_EXECVE_CHECK and exec securebits
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v22 2/8] security: Add EXEC_RESTRICT_FILE and EXEC_DENY_INTERACTIVE securebits
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v22 0/8] Script execution control (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v22 1/8] exec: Add a new AT_EXECVE_CHECK flag to execveat(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v2] ima: instantiate the bprm_creds_for_exec() hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2] ima: instantiate the bprm_creds_for_exec() hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: QEMU launch failure with TPM passthrough
- From: Yuvaraj Ranganathan <quic_yrangana@xxxxxxxxxxx>
- Re: [PATCH v6 00/15] integrity: Introduce the Integrity Digest Cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v21 1/6] exec: Add a new AT_EXECVE_CHECK flag to execveat(2)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v6 00/15] integrity: Introduce the Integrity Digest Cache
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: QEMU launch failure with TPM passthrough
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2] ima: instantiate the bprm_creds_for_exec() hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] ima: instantiate the bprm_creds_for_exec() hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] ima: instantiate the bprm_creds_for_exec() hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2] ima: instantiate the bprm_creds_for_exec() hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v2] ima: instantiate the bprm_creds_for_exec() hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 00/15] integrity: Introduce the Integrity Digest Cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] ima: instantiate the bprm_creds_for_exec() hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v2] ima: instantiate the bprm_creds_for_exec() hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 00/15] integrity: Introduce the Integrity Digest Cache
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH] ima: instantiate the bprm_creds_for_exec() hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: instantiate the bprm_creds_for_exec() hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH] ima: instantiate the bprm_creds_for_exec() hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH] ima: instantiate the bprm_creds_for_exec() hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- QEMU launch failure with TPM passthrough
- From: Yuvaraj Ranganathan <quic_yrangana@xxxxxxxxxxx>
- Re: [REGRESSION][BISECTED] tpm: Popping noise in USB headphones since 1b6d7f9eb150
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [LTP] [PATCH] doc: correct the build steps for open_posix_testsuite
- From: Xiubo Li <xiubli@xxxxxxxxxx>
- Re: [REGRESSION][BISECTED] tpm: Popping noise in USB headphones since 1b6d7f9eb150
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] ima: instantiate the bprm_creds_for_exec() hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] ima: instantiate the bprm_creds_for_exec() hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [LTP] [PATCH] doc: correct the build steps for open_posix_testsuite
- From: Cyril Hrubis <chrubis@xxxxxxx>
- Re: TPM/EFI issue [Was: Linux 6.12]
- From: Jiri Slaby <jirislaby@xxxxxxxxxx>
- Re: TPM/EFI issue [Was: Linux 6.12]
- From: Jiri Slaby <jirislaby@xxxxxxxxxx>
- Re: [PATCH v2] doc: correct the build steps for open_posix_testsuite
- From: Xiubo Li <xiubli@xxxxxxxxxx>
- Re: [LTP] [PATCH] doc: correct the build steps for open_posix_testsuite
- From: Xiubo Li <xiubli@xxxxxxxxxx>
- [PATCH v2] doc: correct the build steps for open_posix_testsuite
- Re: TPM/EFI issue [Was: Linux 6.12]
- From: Jiri Slaby <jirislaby@xxxxxxxxxx>
- Re: TPM/EFI issue [Was: Linux 6.12]
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: TPM/EFI issue [Was: Linux 6.12]
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [REGRESSION][BISECTED] tpm: Popping noise in USB headphones since 1b6d7f9eb150
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: regression: kernel log "flooded" with tpm tpm0: A TPM error (2306) occurred attempting to create NULL primary
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: TPM/EFI issue [Was: Linux 6.12]
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: TPM/EFI issue [Was: Linux 6.12]
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] ima: instantiate the bprm_creds_for_exec() hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [LTP] [PATCH] doc: correct the build steps for open_posix_testsuite
- From: Cyril Hrubis <chrubis@xxxxxxx>
- Re: [PATCH v6 07/15] digest_cache: Allow registration of digest list parsers
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: TPM/EFI issue [Was: Linux 6.12]
- From: Jiri Slaby <jirislaby@xxxxxxxxxx>
- Re: [PATCH] ima: instantiate the bprm_creds_for_exec() hook
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v6 07/15] digest_cache: Allow registration of digest list parsers
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v2 6/7] ima: Discard files opened with O_PATH
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 6/7] ima: Discard files opened with O_PATH
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: TPM/EFI issue [Was: Linux 6.12]
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] ima: instantiate the bprm_creds_for_exec() hook
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 1/7] fs: ima: Remove S_IMA and IS_IMA()
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 1/7] fs: ima: Remove S_IMA and IS_IMA()
- From: Jan Kara <jack@xxxxxxx>
- [PATCH v2 7/7] ima: Reset IMA_NONACTION_RULE_FLAGS after post_setattr
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v2 6/7] ima: Discard files opened with O_PATH
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v2 5/7] ima: Set security.ima on file close when ima_appraise=fix
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v2 4/7] ima: Mark concurrent accesses to the iint pointer in the inode security blob
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v2 2/7] ima: Remove inode lock
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v2 3/7] ima: Ensure lock is held when setting iint pointer in inode security blob
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v2 0/7] ima: Remove unnecessary inode locks
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v2 1/7] fs: ima: Remove S_IMA and IS_IMA()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 07/15] digest_cache: Allow registration of digest list parsers
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: TPM/EFI issue [Was: Linux 6.12]
- From: Jiri Slaby <jirislaby@xxxxxxxxxx>
- [PATCH] ima: instantiate the bprm_creds_for_exec() hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 07/15] digest_cache: Allow registration of digest list parsers
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v6 00/15] integrity: Introduce the Integrity Digest Cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 00/15] integrity: Introduce the Integrity Digest Cache
- From: "Dr. Greg" <greg@xxxxxxxxxxxx>
- Re: [PATCH] IMA,LSM: Uncover hidden variable in ima_match_rules()
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: TPM/EFI issue [Was: Linux 6.12]
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] ima: Remove inode lock
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v21 6/6] samples/check-exec: Add an enlighten "inc" interpreter and 28 tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v21 1/6] exec: Add a new AT_EXECVE_CHECK flag to execveat(2)
- From: Jeff Xu <jeffxu@xxxxxxxxxx>
- [RFC PATCH] ima: instantiate the bprm_creds_for_exec() hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v21 1/6] exec: Add a new AT_EXECVE_CHECK flag to execveat(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v21 6/6] samples/check-exec: Add an enlighten "inc" interpreter and 28 tests
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v6 07/15] digest_cache: Allow registration of digest list parsers
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- TPM/EFI issue [Was: Linux 6.12]
- From: Jiri Slaby <jirislaby@xxxxxxxxxx>
- Re: [PATCH] IMA,LSM: Uncover hidden variable in ima_match_rules()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: ima: property parameter unused in ima_match_rules()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/3] ima_setup.sh: Allow to load predefined policy
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v6 07/15] digest_cache: Allow registration of digest list parsers
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- [PATCH] IMA,LSM: Uncover hidden variable in ima_match_rules()
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v21 6/6] samples/check-exec: Add an enlighten "inc" interpreter and 28 tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 0/3] LTP tests: load predefined policy
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH 1/3] ima: Add TCB policy as an example
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH 3/3] ima_{kexec,keys,selinux}: Set minimal kernel version
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH 2/3] ima_setup.sh: Allow to load predefined policy
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: ima: property parameter unused in ima_match_rules()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: ima: property parameter unused in ima_match_rules()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [REGRESSION][BISECTED] tpm: Popping noise in USB headphones since 1b6d7f9eb150
- From: Christian Heusel <christian@xxxxxxxxx>
- Re: [PATCH v6 00/15] integrity: Introduce the Integrity Digest Cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 07/15] digest_cache: Allow registration of digest list parsers
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 02/15] module: Introduce ksys_finit_module()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: ima: property parameter unused in ima_match_rules()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 00/15] integrity: Introduce the Integrity Digest Cache
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v6 07/15] digest_cache: Allow registration of digest list parsers
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v6 02/15] module: Introduce ksys_finit_module()
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: ima: property parameter unused in ima_match_rules()
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: ima: property parameter unused in ima_match_rules()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v21 1/6] exec: Add a new AT_EXECVE_CHECK flag to execveat(2)
- From: Jeff Xu <jeffxu@xxxxxxxxxx>
- Re: ima: property parameter unused in ima_match_rules()
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: ima: property parameter unused in ima_match_rules()
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: ima: property parameter unused in ima_match_rules()
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: regression: kernel log "flooded" with tpm tpm0: A TPM error (2306) occurred attempting to create NULL primary
- From: Christoph Anton Mitterer <calestyo@xxxxxxxxxxxx>
- Re: ima: property parameter unused in ima_match_rules()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- ima: property parameter unused in ima_match_rules()
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [GIT PULL] TPM DEVICE DRIVER: linux-next-6.13-rc1
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v21 6/6] samples/check-exec: Add an enlighten "inc" interpreter and 28 tests
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v21 1/6] exec: Add a new AT_EXECVE_CHECK flag to execveat(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [GIT PULL] TPM DEVICE DRIVER: linux-next-6.13-rc1
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v21 6/6] samples/check-exec: Add an enlighten "inc" interpreter and 28 tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v21 1/6] exec: Add a new AT_EXECVE_CHECK flag to execveat(2)
- From: Jeff Xu <jeffxu@xxxxxxxxxxxx>
- Re: [PATCH v21 1/6] exec: Add a new AT_EXECVE_CHECK flag to execveat(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v2] ima: kexec: silence RCU list traversal warning
- From: Breno Leitao <leitao@xxxxxxxxxx>
- Re: [PATCH v21 0/6] Script execution control (was O_MAYEXEC)
- From: Kees Cook <kees@xxxxxxxxxx>
- Re: [PATCH] ima: kexec: Add RCU read lock protection for ima_measurements list traversal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: kexec: Add RCU read lock protection for ima_measurements list traversal
- From: Breno Leitao <leitao@xxxxxxxxxx>
- Re: [PATCH v21 1/6] exec: Add a new AT_EXECVE_CHECK flag to execveat(2)
- From: Jeff Xu <jeffxu@xxxxxxxxxxxx>
- [PATCH AUTOSEL 6.11 01/10] integrity: Use static_assert() to check struct sizes
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v21 2/6] security: Add EXEC_RESTRICT_FILE and EXEC_DENY_INTERACTIVE securebits
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v21 1/6] exec: Add a new AT_EXECVE_CHECK flag to execveat(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v6 02/15] module: Introduce ksys_finit_module()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 02/15] module: Introduce ksys_finit_module()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v21 2/6] security: Add EXEC_RESTRICT_FILE and EXEC_DENY_INTERACTIVE securebits
- From: Jeff Xu <jeffxu@xxxxxxxxxxxx>
- Re: [PATCH v21 1/6] exec: Add a new AT_EXECVE_CHECK flag to execveat(2)
- From: Jeff Xu <jeffxu@xxxxxxxxxxxx>
- Re: [PATCH v6 02/15] module: Introduce ksys_finit_module()
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v6 00/15] integrity: Introduce the Integrity Digest Cache
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH] ima: kexec: Add RCU read lock protection for ima_measurements list traversal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 07/15] digest_cache: Allow registration of digest list parsers
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v6 01/15] lib: Add TLV parser
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v6 07/15] digest_cache: Allow registration of digest list parsers
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 02/15] module: Introduce ksys_finit_module()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 02/15] module: Introduce ksys_finit_module()
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH v6 01/15] lib: Add TLV parser
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v4 9/9] ima: Use digest caches for appraisal
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v4 8/9] ima: Use digest caches for measurement
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v4 7/9] ima: Load verified usage from digest cache found from query
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v4 6/9] ima: Store verified usage in digest cache based on integrity metadata flags
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v4 5/9] ima: Retrieve digest cache and check if changed
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v4 4/9] ima: Modify existing boot-time built-in policies with digest cache policies
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v4 3/9] ima: Add digest_cache_measure/appraise boot-time built-in policies
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v4 2/9] ima: Add digest_cache policy keyword
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v4 1/9] ima: Introduce hook DIGEST_LIST_CHECK
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v4 0/9] ima: Integrate with Integrity Digest Cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 15/15] docs: Add documentation of the Integrity Digest Cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 14/15] selftests/digest_cache: Add selftests for the Integrity Digest Cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 13/15] digest_cache: Reset digest cache on file/directory change
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 12/15] digest cache: Prefetch digest lists if requested
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 11/15] digest_cache: Add support for directories
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 10/15] digest_cache: Add management of verification data
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 09/15] digest_cache: Populate the digest cache from a digest list
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 08/15] digest_cache: Parse tlv digest lists
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 07/15] digest_cache: Allow registration of digest list parsers
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 06/15] digest_cache: Add hash tables and operations
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 05/15] digest_cache: Add securityfs interface
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 04/15] digest_cache: Initialize digest caches
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 03/15] integrity: Introduce the Integrity Digest Cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 02/15] module: Introduce ksys_finit_module()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 00/15] integrity: Introduce the Integrity Digest Cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH] doc: correct the build steps for open_posix_testsuite
- Re: [PATCH v3] ima: Suspend PCR extends and log appends when rebooting
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [PATCH v3] ima: Suspend PCR extends and log appends when rebooting
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] ima_boot_aggregate: Fix openssl 3.0 deprecation warnings
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: regression: kernel log "flooded" with tpm tpm0: A TPM error (2306) occurred attempting to create NULL primary
- From: Christoph Anton Mitterer <calestyo@xxxxxxxxxxxx>
- Re: [PATCH 2/2] ima_boot_aggregate: TBROK on fread() failure
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: regression: kernel log "flooded" with tpm tpm0: A TPM error (2306) occurred attempting to create NULL primary
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: regression: kernel log "flooded" with tpm tpm0: A TPM error (2306) occurred attempting to create NULL primary
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: regression: kernel log "flooded" with tpm tpm0: A TPM error (2306) occurred attempting to create NULL primary
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: regression: kernel log "flooded" with tpm tpm0: A TPM error (2306) occurred attempting to create NULL primary
- From: Christoph Anton Mitterer <calestyo@xxxxxxxxxxxx>
- Re: regression: kernel log "flooded" with tpm tpm0: A TPM error (2306) occurred attempting to create NULL primary
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: regression: kernel log "flooded" with tpm tpm0: A TPM error (2306) occurred attempting to create NULL primary
- From: Christoph Anton Mitterer <calestyo@xxxxxxxxxxxx>
- Re: regression: kernel log "flooded" with tpm tpm0: A TPM error (2306) occurred attempting to create NULL primary
- From: Christoph Anton Mitterer <calestyo@xxxxxxxxxxxx>
- Re: regression: kernel log "flooded" with tpm tpm0: A TPM error (2306) occurred attempting to create NULL primary
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: regression: kernel log "flooded" with tpm tpm0: A TPM error (2306) occurred attempting to create NULL primary
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] TPM DEVICE DRIVER: tpmdd-next-6.12-rc8
- From: pr-tracker-bot@xxxxxxxxxx
- [PATCH] KEYS: trusted: dcp: fix improper sg use with CONFIG_VMAP_STACK=y
- From: David Gstir <david@xxxxxxxxxxxxx>
- [GIT PULL] TPM DEVICE DRIVER: tpmdd-next-6.12-rc8
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: regression: kernel log "flooded" with tpm tpm0: A TPM error (2306) occurred attempting to create NULL primary
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: regression: kernel log "flooded" with tpm tpm0: A TPM error (2306) occurred attempting to create NULL primary
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH] tpm: Disable TPM on tpm2_create_primary() failure
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: regression: kernel log "flooded" with tpm tpm0: A TPM error (2306) occurred attempting to create NULL primary
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- regression: kernel log "flooded" with tpm tpm0: A TPM error (2306) occurred attempting to create NULL primary
- From: Christoph Anton Mitterer <calestyo@xxxxxxxxxxxx>
- Re: regression: kernel log "flooded" with tpm tpm0: A TPM error (2306) occurred attempting to create NULL primary
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] tpm: Opt-in in disable PCR integrity protection
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] ima: Suspend PCR extends and log appends when rebooting
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3] tpm: Opt-in in disable PCR integrity protection
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] tpm: Opt-in in disable PCR integrity protection
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: [PATCH] tpm/eventlog: Use kvmalloc() for event log buffer
- From: "Liang, Andy (Linux Ecosystem Engineering)" <andy.liang@xxxxxxx>
- Re: [PATCH v2] ima: Suspend PCR extends and log appends when rebooting
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2] ima: Suspend PCR extends and log appends when rebooting
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3] tpm: Opt-in in disable PCR integrity protection
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v21 4/6] selftests/landlock: Add tests for execveat + AT_EXECVE_CHECK
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v21 0/6] Script execution control (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v21 2/6] security: Add EXEC_RESTRICT_FILE and EXEC_DENY_INTERACTIVE securebits
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v21 5/6] samples/check-exec: Add set-exec
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [GIT PULL] integrity: subsystem fixes for v6.12
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v2] tpm: Opt-in in disable PCR integrity protection
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Opt-in in disable PCR integrity protection
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH v21 6/6] samples/check-exec: Add an enlighten "inc" interpreter and 28 tests
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v21 3/6] selftests/exec: Add 32 tests for AT_EXECVE_CHECK and exec securebits
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v21 1/6] exec: Add a new AT_EXECVE_CHECK flag to execveat(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v2] ima: Suspend PCR extends and log appends when rebooting
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm/eventlog: Use kvmalloc() for event log buffer
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH v2] ima: Suspend PCR extends and log appends when rebooting
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [GIT PULL] integrity: subsystem fixes for v6.12
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Opt-in in disable PCR integrity protection
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Opt-in in disable PCR integrity protection
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: Suspend PCR extends and log appends when rebooting
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: [PATCH] tpm/eventlog: Use kvmalloc() for event log buffer
- From: "Liang, Andy (Linux Ecosystem Engineering)" <andy.liang@xxxxxxx>
- Re: Reading public key portion of asymmetric keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm/eventlog: Use kvmalloc() for event log buffer
- From: Takashi Iwai <tiwai@xxxxxxx>
- RE: [PATCH] tpm/eventlog: Use kvmalloc() for event log buffer
- From: "Liang, Andy (Linux Ecosystem Engineering)" <andy.liang@xxxxxxx>
- Re: [PATCH] tpm/eventlog: Use kvmalloc() for event log buffer
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH] tpm/eventlog: Use kvmalloc() for event log buffer
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH] tpm/eventlog: Use kvmalloc() for event log buffer
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH] tpm/eventlog: Use kvmalloc() for event log buffer
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm: Opt-in in disable PCR integrity protection
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] tpm/eventlog: Use kvmalloc() for event log buffer
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm/eventlog: Use kvmalloc() for event log buffer
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm/eventlog: Use kvmalloc() for event log buffer
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] tpm/eventlog: Use kvmalloc() for event log buffer
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Opt-in in disable PCR integrity protection
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm: Opt-in in disable PCR integrity protection
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Opt-in in disable PCR integrity protection
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Remove the documentation from tpm2-sessions.c
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm: Opt-in in disable PCR integrity protection
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm: Opt-in in disable PCR integrity protection
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm: Opt-in in disable PCR integrity protection
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2] tpm: Opt-in in disable PCR integrity protection
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Opt-in in disable PCR integrity protection
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm/eventlog: Use kvmalloc() for event log buffer
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH] tpm/eventlog: Use kvmalloc() for event log buffer
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- [PATCH] tpm/eventlog: Use kvmalloc() for event log buffer
- From: Takashi Iwai <tiwai@xxxxxxx>
- [PATCH] tpm: Remove the documentation from tpm2-sessions.c
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2] tpm: Opt-in in disable PCR integrity protection
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH] tpm: Allow the TPM2 pcr_extend HMAC capability to be disabled on boot
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: Opt-in in disable PCR encryption on TPM2 chips
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: Opt-in in disable PCR encryption on TPM2 chips
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH] tpm: Allow the TPM2 pcr_extend HMAC capability to be disabled on boot
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Opt-in in disable PCR encryption on TPM2 chips
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH] tpm: Allow the TPM2 pcr_extend HMAC capability to be disabled on boot
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH] tpm: Allow the TPM2 pcr_extend HMAC capability to be disabled on boot
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Opt-in in disable PCR encryption on TPM2 chips
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: Opt-in in disable PCR encryption on TPM2 chips
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH] tpm: Opt-in in disable PCR encryption on TPM2 chips
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH] tpm: Allow the TPM2 pcr_extend HMAC capability to be disabled on boot
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH] tpm: Allow the TPM2 pcr_extend HMAC capability to be disabled on boot
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH] tpm: Allow the TPM2 pcr_extend HMAC capability to be disabled on boot
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH] tpm: Allow the TPM2 pcr_extend HMAC capability to be disabled on boot
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH] tpm: Allow the TPM2 pcr_extend HMAC capability to be disabled on boot
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH] tpm: Allow the TPM2 pcr_extend HMAC capability to be disabled on boot
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] tpm: Allow the TPM2 pcr_extend HMAC capability to be disabled on boot
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] KEYS: keys-next-6.12-rc7
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH] tpm: atmel: Drop PPC64 specific MMIO setup
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] KEYS: keys-next-6.12-rc7
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [GIT PULL] KEYS: keys-next-6.12-rc7
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: atmel: Drop PPC64 specific MMIO setup
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH] tpm: atmel: Drop PPC64 specific MMIO setup
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: atmel: Drop PPC64 specific MMIO setup
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: atmel: Drop PPC64 specific MMIO setup
- From: Rob Herring <robh@xxxxxxxxxx>
- [syzbot] Monthly integrity report (Nov 2024)
- From: syzbot <syzbot+list4e5402cbee6a192e1e9e@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/4] Alternative TPM patches for Trenchboot
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH] ima: Suspend PCR extends and log appends when rebooting
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/4] Alternative TPM patches for Trenchboot
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH 0/4] Alternative TPM patches for Trenchboot
- From: ross.philipson@xxxxxxxxxx
- Re: [RFC PATCH 0/4] Alternative TPM patches for Trenchboot
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/4] Alternative TPM patches for Trenchboot
- From: ross.philipson@xxxxxxxxxx
- Re: [RFC PATCH 0/4] Alternative TPM patches for Trenchboot
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] TPM DEVICE DRIVER: tpmdd-next-6.12-rc7
- From: pr-tracker-bot@xxxxxxxxxx
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]