Linux Integrity
[Prev Page][Next Page]
- Re: [PATCH v2 1/8] IMA: Add TCB policy as an example for ima_measurements.sh
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 6/8] IMA: Add example policy for ima_violations.sh
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/8] ima_setup.sh: Allow to load predefined policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 6/8] IMA: Add example policy for ima_violations.sh
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2 6/8] IMA: Add example policy for ima_violations.sh
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2 2/8] ima_setup.sh: Allow to load predefined policy
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH] ima: limit the builtin 'tcb' dont_measure tmpfs policy rule
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH] ima: ignore suffixed policy rule comments
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2 6/8] IMA: Add example policy for ima_violations.sh
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 7/8] ima_violations.sh: Check for a required policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/8] ima_setup.sh: Allow to load predefined policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] ima: ignore suffixed policy rule comments
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] ima: limit the builtin 'tcb' dont_measure tmpfs policy rule
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [syzbot] [integrity?] [lsm?] INFO: task hung in process_measurement (2)
- From: "Yuezhang.Mo@xxxxxxxx" <Yuezhang.Mo@xxxxxxxx>
- Re: [syzbot] [integrity?] [lsm?] INFO: task hung in process_measurement (2)
- From: syzbot <syzbot+1de5a37cb85a2d536330@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] dt-bindings: tpm: Add st,st33tphf2ei2c
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- Re: [PATCH] dt-bindings: tpm: Add st,st33tphf2ei2c
- From: Marek Vasut <marex@xxxxxxx>
- [PATCH v8] tpm: Map the ACPI provided event log
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 2/2] tpm: Map the ACPI provided event log
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 2/2] tpm: Map the ACPI provided event log
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 2/2] tpm: Map the ACPI provided event log
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 2/2] tpm: Map the ACPI provided event log
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] dt-bindings: tpm: Add st,st33tphf2ei2c
- From: Krzysztof Kozlowski <krzk@xxxxxxxxxx>
- [PATCH v7 2/2] tpm: Map the ACPI provided event log
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v7 1/2] tpm: Map the ACPI provided event log
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] dt-bindings: tpm: Add st,st33tphf2ei2c
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] dt-bindings: tpm: Add st,st33tphf2ei2c
- From: Marek Vasut <marex@xxxxxxx>
- Re: [PATCH v6 1/2] tpm: Map the ACPI provided event log
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] dt-bindings: tpm: Add st,st33tphf2ei2c
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH] dt-bindings: tpm: Add st,st33tphf2ei2c
- From: Marek Vasut <marex@xxxxxxx>
- Re: [PATCH v6 1/2] tpm: Map the ACPI provided event log
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH v6 2/2] tpm: Map the ACPI provided event log
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v6 1/2] tpm: Map the ACPI provided event log
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5] tpm: Map the ACPI provided event log
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Повідомлення від ТОВ Нова Пошта
- From: Нова Пошта <hskim@xxxxxxxxxxxx>
- Re: [RFC PATCH v3 08/13] clavis: Introduce new LSM called clavis
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5] tpm: Map the ACPI provided event log
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v5] tpm: Map the ACPI provided event log
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH v5] tpm: Map the ACPI provided event log
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v4] tpm: Map the ACPI provided event log
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v3 13/13] clavis: Kunit support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 04/13] keys: Add new verification type (VERIFYING_CLAVIS_SIGNATURE)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 03/13] clavis: Introduce a new system keyring called clavis
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3] tpm: Map the ACPI provided event log
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v3 02/13] certs: Introduce ability to link to a system key
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 01/13] certs: Remove CONFIG_INTEGRITY_PLATFORM_KEYRING check
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Map the ACPI provided event log
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: Map the ACPI provided event log
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Map the ACPI provided event log
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: Map the ACPI provided event log
- From: "Jarkko Sakkinen" <jarkko.sakkinen@xxxxxx>
- Re: [PATCH] tpm: Map the ACPI provided event log
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v3] tpm: Map the ACPI provided event log
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: Map the ACPI provided event log
- From: "Jarkko Sakkinen" <jarkko.sakkinen@xxxxxx>
- Re: [PATCH] tpm: Map the ACPI provided event log
- From: "Jarkko Sakkinen" <jarkko.sakkinen@xxxxxx>
- Re: [PATCH] tpm: Map the ACPI provided event log
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Map the ACPI provided event log
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v2] tpm: Map the ACPI provided event log
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] tpm: Map the ACPI provided event log
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm/eventlog: Limit memory allocations for event logs with excessive size
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH] tpm/eventlog: Limit memory allocations for event logs with excessive size
- From: "Liang, Andy (Linux Ecosystem Engineering)" <andy.liang@xxxxxxx>
- [PATCH v12 19/19] x86/efi: EFI stub DRTM launch support for Secure Launch
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 14/19] tpm, tpm_tis: Close all localities
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 16/19] tpm, tpm_tis: Allow locality to be set to a different value
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 13/19] x86/reboot: Secure Launch SEXIT support on reboot paths
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 12/19] kexec: Secure Launch kexec SEXIT support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 18/19] x86: Secure Launch late initcall platform module
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 17/19] tpm, sysfs: Show locality used by kernel
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 08/19] x86/boot: Place TXT MLE header in the kernel_info section
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 15/19] tpm, tpm_tis: Address positive localities in tpm_tis_request_locality()
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 05/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 11/19] x86: Secure Launch SMP bringup support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 09/19] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 10/19] x86: Secure Launch kernel late boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 03/19] x86: Secure Launch Resource Table header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 02/19] x86: Secure Launch Kconfig
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 07/19] x86/msr: Add variable MTRR base/mask and x2apic ID registers
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 01/19] Documentation/x86: Secure Launch kernel documentation
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 00/19] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 04/19] x86: Secure Launch main header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v12 06/19] x86: Add early SHA-256 support for Secure Launch early measurements
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
- From: Song Liu <songliubraving@xxxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: "Jarkko Sakkinen" <jarkko.sakkinen@xxxxxx>
- Re: [PATCH] tpm/eventlog: Limit memory allocations for event logs with excessive size
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH] tpm/eventlog: Limit memory allocations for event logs with excessive size
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v23 0/8] Script execution control (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v23 0/8] Script execution control (was O_MAYEXEC)
- From: Kees Cook <kees@xxxxxxxxxx>
- Re: [RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
- From: Song Liu <songliubraving@xxxxxxxx>
- Re: [RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
- From: Song Liu <songliubraving@xxxxxxxx>
- Re: [RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v23 0/8] Script execution control (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH] lsm: integrity: Allow enable/disable ima and evm with lsm= cmdline
- From: Song Liu <song@xxxxxxxxxx>
- Re: [RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
- From: Song Liu <songliubraving@xxxxxxxx>
- Re: [RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
- From: Song Liu <songliubraving@xxxxxxxx>
- Re: [RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
- From: Song Liu <songliubraving@xxxxxxxx>
- Re: [RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
- From: Song Liu <songliubraving@xxxxxxxx>
- Re: [RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
- From: Song Liu <songliubraving@xxxxxxxx>
- Re: [RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [RFC 2/2] evm: Add kernel parameter to disable EVM
- From: Song Liu <song@xxxxxxxxxx>
- [RFC 1/2] ima: Add kernel parameter to disable IMA
- From: Song Liu <song@xxxxxxxxxx>
- [RFC 0/2] ima: evm: Add kernel cmdline options to disable IMA/EVM
- From: Song Liu <song@xxxxxxxxxx>
- Re: [PATCH] tpm/eventlog: Limit memory allocations for event logs with excessive size
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3] doc: correct the build steps for open_posix_testsuite
- From: Cyril Hrubis <chrubis@xxxxxxx>
- Re: [syzbot] [integrity?] [lsm?] INFO: task hung in process_measurement (2)
- From: "Yuezhang.Mo@xxxxxxxx" <Yuezhang.Mo@xxxxxxxx>
- Re: [syzbot] [integrity?] [lsm?] INFO: task hung in process_measurement (2)
- From: syzbot <syzbot+1de5a37cb85a2d536330@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: TPM/EFI issue [Was: Linux 6.12]
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm/eventlog: Limit memory allocations for event logs with excessive size
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- [PATCH v2 8/8] [RFC] ima_kexec.sh: Relax result on unreadable policy to TCONF
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v2 3/8] tst_test.sh: IMA: Allow to disable LSM warnings and use it for IMA
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v2 1/8] IMA: Add TCB policy as an example for ima_measurements.sh
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v2 7/8] ima_violations.sh: Check for a required policy
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v2 6/8] IMA: Add example policy for ima_violations.sh
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v2 2/8] ima_setup.sh: Allow to load predefined policy
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v2 5/8] ima_kexec.sh: Move checking policy if readable to ima_setup.sh
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v2 4/8] ima_setup: Print warning when policy not readable
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v2 0/8] LTP tests: load predefined policy, enhancements
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- [PATCH v23 6/8] selftests: ktap_helpers: Fix uninitialized variable
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v23 8/8] ima: instantiate the bprm_creds_for_exec() hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v23 5/8] samples/check-exec: Add set-exec
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v23 3/8] selftests/exec: Add 32 tests for AT_EXECVE_CHECK and exec securebits
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v23 0/8] Script execution control (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v23 4/8] selftests/landlock: Add tests for execveat + AT_EXECVE_CHECK
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v23 7/8] samples/check-exec: Add an enlighten "inc" interpreter and 28 tests
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v23 1/8] exec: Add a new AT_EXECVE_CHECK flag to execveat(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v23 2/8] security: Add EXEC_RESTRICT_FILE and EXEC_DENY_INTERACTIVE securebits
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH 1/3] tpm: add generic platform device
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: add generic platform device
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] tpm: add generic platform device
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH 2/3] ima_setup.sh: Allow to load predefined policy
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 1/3] tpm: add generic platform device
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] ima_setup.sh: Allow to load predefined policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [syzbot] [lsm?] [integrity?] KMSAN: uninit-value in ima_add_template_entry (2)
- From: syzbot <syzbot+91ae49e1c1a2634d20c0@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] tpm: add generic platform device
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [syzbot] [integrity?] [lsm?] KMSAN: uninit-value in ima_add_template_entry (2)
- From: "Yuezhang.Mo@xxxxxxxx" <Yuezhang.Mo@xxxxxxxx>
- Re: [PATCH 1/3] ima: Add TCB policy as an example
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 3/3] ima_{kexec,keys,selinux}: Set minimal kernel version
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 2/3] ima_setup.sh: Allow to load predefined policy
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH 3/3] ima_{kexec,keys,selinux}: Set minimal kernel version
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] ima: Add TCB policy as an example
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] ima_setup.sh: Allow to load predefined policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [syzbot] Monthly integrity report (Dec 2024)
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v22 2/8] security: Add EXEC_RESTRICT_FILE and EXEC_DENY_INTERACTIVE securebits
- From: Jeff Xu <jeffxu@xxxxxxxxxxxx>
- Re: [PATCH v22 1/8] exec: Add a new AT_EXECVE_CHECK flag to execveat(2)
- From: Jeff Xu <jeffxu@xxxxxxxxxxxx>
- Re: [PATCH v22 0/8] Script execution control (was O_MAYEXEC)
- From: jeffxu <jeffxu@xxxxxxxxxxxx>
- Re: [syzbot] [integrity?] [lsm?] INFO: task hung in process_measurement (2)
- From: syzbot <syzbot+1de5a37cb85a2d536330@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [syzbot] [integrity?] [lsm?] INFO: task hung in process_measurement (2)
- From: "Yuezhang.Mo@xxxxxxxx" <Yuezhang.Mo@xxxxxxxx>
- Re: [LTP] [PATCH v3] doc: correct the build steps for open_posix_testsuite
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [LTP] [PATCH] doc: correct the build steps for open_posix_testsuite
- From: Xiubo Li <xiubli@xxxxxxxxxx>
- [PATCH v3] doc: correct the build steps for open_posix_testsuite
- [PATCH] tpm/eventlog: Limit memory allocations for event logs with excessive size
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v22 8/8] ima: instantiate the bprm_creds_for_exec() hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] ima: instantiate the bprm_creds_for_exec() hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v22 2/8] security: Add EXEC_RESTRICT_FILE and EXEC_DENY_INTERACTIVE securebits
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v2] ima: instantiate the bprm_creds_for_exec() hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH 2/3] x86/sev: add SVSM call macros for the vTPM protocol
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH 1/3] tpm: add generic platform device
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH 0/3] Enlightened vTPM support for SVSM on SEV-SNP
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: TPM/EFI issue [Was: Linux 6.12]
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [LTP] [PATCH] doc: correct the build steps for open_posix_testsuite
- From: Cyril Hrubis <chrubis@xxxxxxx>
- Re: [syzbot] [integrity?] [lsm?] INFO: task hung in process_measurement (2)
- From: syzbot <syzbot+1de5a37cb85a2d536330@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [syzbot] [integrity?] [lsm?] INFO: task hung in process_measurement (2)
- From: "Yuezhang.Mo@xxxxxxxx" <Yuezhang.Mo@xxxxxxxx>
- Re: TPM/EFI issue [Was: Linux 6.12]
- From: Jiri Slaby <jirislaby@xxxxxxxxxx>
- Re: [syzbot] [integrity?] [lsm?] INFO: task hung in process_measurement (2)
- From: syzbot <syzbot+1de5a37cb85a2d536330@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [REGRESSION][BISECTED] tpm: Popping noise in USB headphones since 1b6d7f9eb150
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: TPM/EFI issue [Was: Linux 6.12]
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: TPM/EFI issue [Was: Linux 6.12]
- From: Jiri Slaby <jirislaby@xxxxxxxxxx>
- Re: [syzbot] [integrity?] [lsm?] INFO: task hung in process_measurement (2)
- From: syzbot <syzbot+1de5a37cb85a2d536330@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [syzbot] Monthly integrity report (Dec 2024)
- From: syzbot <syzbot+list2eccd137a466e6acfa54@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: TPM/EFI issue [Was: Linux 6.12]
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 1/5] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/5] LSM: Ensure the correct LSM context releaser
- From: Kees Bakker <kees@xxxxxxxxxxxx>
- Re: [PATCH v6 00/15] integrity: Introduce the Integrity Digest Cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 00/15] integrity: Introduce the Integrity Digest Cache
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v6 00/15] integrity: Introduce the Integrity Digest Cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] ima: instantiate the bprm_creds_for_exec() hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] ima: instantiate the bprm_creds_for_exec() hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v6 00/15] integrity: Introduce the Integrity Digest Cache
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v22 0/8] Script execution control (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v6 00/15] integrity: Introduce the Integrity Digest Cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v22 7/8] samples/check-exec: Add an enlighten "inc" interpreter and 28 tests
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v22 5/8] samples/check-exec: Add set-exec
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v22 8/8] ima: instantiate the bprm_creds_for_exec() hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v22 6/8] selftests: ktap_helpers: Fix uninitialized variable
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v22 4/8] selftests/landlock: Add tests for execveat + AT_EXECVE_CHECK
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v22 3/8] selftests/exec: Add 32 tests for AT_EXECVE_CHECK and exec securebits
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v22 2/8] security: Add EXEC_RESTRICT_FILE and EXEC_DENY_INTERACTIVE securebits
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v22 0/8] Script execution control (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v22 1/8] exec: Add a new AT_EXECVE_CHECK flag to execveat(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v2] ima: instantiate the bprm_creds_for_exec() hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2] ima: instantiate the bprm_creds_for_exec() hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: QEMU launch failure with TPM passthrough
- From: Yuvaraj Ranganathan <quic_yrangana@xxxxxxxxxxx>
- Re: [PATCH v6 00/15] integrity: Introduce the Integrity Digest Cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v21 1/6] exec: Add a new AT_EXECVE_CHECK flag to execveat(2)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v6 00/15] integrity: Introduce the Integrity Digest Cache
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: QEMU launch failure with TPM passthrough
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2] ima: instantiate the bprm_creds_for_exec() hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] ima: instantiate the bprm_creds_for_exec() hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] ima: instantiate the bprm_creds_for_exec() hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2] ima: instantiate the bprm_creds_for_exec() hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v2] ima: instantiate the bprm_creds_for_exec() hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 00/15] integrity: Introduce the Integrity Digest Cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] ima: instantiate the bprm_creds_for_exec() hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v2] ima: instantiate the bprm_creds_for_exec() hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 00/15] integrity: Introduce the Integrity Digest Cache
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH] ima: instantiate the bprm_creds_for_exec() hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: instantiate the bprm_creds_for_exec() hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH] ima: instantiate the bprm_creds_for_exec() hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH] ima: instantiate the bprm_creds_for_exec() hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- QEMU launch failure with TPM passthrough
- From: Yuvaraj Ranganathan <quic_yrangana@xxxxxxxxxxx>
- Re: [REGRESSION][BISECTED] tpm: Popping noise in USB headphones since 1b6d7f9eb150
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [LTP] [PATCH] doc: correct the build steps for open_posix_testsuite
- From: Xiubo Li <xiubli@xxxxxxxxxx>
- Re: [REGRESSION][BISECTED] tpm: Popping noise in USB headphones since 1b6d7f9eb150
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] ima: instantiate the bprm_creds_for_exec() hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] ima: instantiate the bprm_creds_for_exec() hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [LTP] [PATCH] doc: correct the build steps for open_posix_testsuite
- From: Cyril Hrubis <chrubis@xxxxxxx>
- Re: TPM/EFI issue [Was: Linux 6.12]
- From: Jiri Slaby <jirislaby@xxxxxxxxxx>
- Re: TPM/EFI issue [Was: Linux 6.12]
- From: Jiri Slaby <jirislaby@xxxxxxxxxx>
- Re: [PATCH v2] doc: correct the build steps for open_posix_testsuite
- From: Xiubo Li <xiubli@xxxxxxxxxx>
- Re: [LTP] [PATCH] doc: correct the build steps for open_posix_testsuite
- From: Xiubo Li <xiubli@xxxxxxxxxx>
- [PATCH v2] doc: correct the build steps for open_posix_testsuite
- Re: TPM/EFI issue [Was: Linux 6.12]
- From: Jiri Slaby <jirislaby@xxxxxxxxxx>
- Re: TPM/EFI issue [Was: Linux 6.12]
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: TPM/EFI issue [Was: Linux 6.12]
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [REGRESSION][BISECTED] tpm: Popping noise in USB headphones since 1b6d7f9eb150
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: regression: kernel log "flooded" with tpm tpm0: A TPM error (2306) occurred attempting to create NULL primary
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: TPM/EFI issue [Was: Linux 6.12]
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: TPM/EFI issue [Was: Linux 6.12]
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] ima: instantiate the bprm_creds_for_exec() hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [LTP] [PATCH] doc: correct the build steps for open_posix_testsuite
- From: Cyril Hrubis <chrubis@xxxxxxx>
- Re: [PATCH v6 07/15] digest_cache: Allow registration of digest list parsers
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: TPM/EFI issue [Was: Linux 6.12]
- From: Jiri Slaby <jirislaby@xxxxxxxxxx>
- Re: [PATCH] ima: instantiate the bprm_creds_for_exec() hook
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v6 07/15] digest_cache: Allow registration of digest list parsers
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v2 6/7] ima: Discard files opened with O_PATH
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 6/7] ima: Discard files opened with O_PATH
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: TPM/EFI issue [Was: Linux 6.12]
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] ima: instantiate the bprm_creds_for_exec() hook
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 1/7] fs: ima: Remove S_IMA and IS_IMA()
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 1/7] fs: ima: Remove S_IMA and IS_IMA()
- From: Jan Kara <jack@xxxxxxx>
- [PATCH v2 7/7] ima: Reset IMA_NONACTION_RULE_FLAGS after post_setattr
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v2 6/7] ima: Discard files opened with O_PATH
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v2 5/7] ima: Set security.ima on file close when ima_appraise=fix
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v2 4/7] ima: Mark concurrent accesses to the iint pointer in the inode security blob
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v2 2/7] ima: Remove inode lock
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v2 3/7] ima: Ensure lock is held when setting iint pointer in inode security blob
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v2 0/7] ima: Remove unnecessary inode locks
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v2 1/7] fs: ima: Remove S_IMA and IS_IMA()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 07/15] digest_cache: Allow registration of digest list parsers
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: TPM/EFI issue [Was: Linux 6.12]
- From: Jiri Slaby <jirislaby@xxxxxxxxxx>
- [PATCH] ima: instantiate the bprm_creds_for_exec() hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 07/15] digest_cache: Allow registration of digest list parsers
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v6 00/15] integrity: Introduce the Integrity Digest Cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 00/15] integrity: Introduce the Integrity Digest Cache
- From: "Dr. Greg" <greg@xxxxxxxxxxxx>
- Re: [PATCH] IMA,LSM: Uncover hidden variable in ima_match_rules()
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: TPM/EFI issue [Was: Linux 6.12]
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] ima: Remove inode lock
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v21 6/6] samples/check-exec: Add an enlighten "inc" interpreter and 28 tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v21 1/6] exec: Add a new AT_EXECVE_CHECK flag to execveat(2)
- From: Jeff Xu <jeffxu@xxxxxxxxxx>
- [RFC PATCH] ima: instantiate the bprm_creds_for_exec() hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v21 1/6] exec: Add a new AT_EXECVE_CHECK flag to execveat(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v21 6/6] samples/check-exec: Add an enlighten "inc" interpreter and 28 tests
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v6 07/15] digest_cache: Allow registration of digest list parsers
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- TPM/EFI issue [Was: Linux 6.12]
- From: Jiri Slaby <jirislaby@xxxxxxxxxx>
- Re: [PATCH] IMA,LSM: Uncover hidden variable in ima_match_rules()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: ima: property parameter unused in ima_match_rules()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/3] ima_setup.sh: Allow to load predefined policy
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v6 07/15] digest_cache: Allow registration of digest list parsers
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- [PATCH] IMA,LSM: Uncover hidden variable in ima_match_rules()
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v21 6/6] samples/check-exec: Add an enlighten "inc" interpreter and 28 tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 0/3] LTP tests: load predefined policy
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH 1/3] ima: Add TCB policy as an example
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH 3/3] ima_{kexec,keys,selinux}: Set minimal kernel version
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH 2/3] ima_setup.sh: Allow to load predefined policy
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: ima: property parameter unused in ima_match_rules()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: ima: property parameter unused in ima_match_rules()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [REGRESSION][BISECTED] tpm: Popping noise in USB headphones since 1b6d7f9eb150
- From: Christian Heusel <christian@xxxxxxxxx>
- Re: [PATCH v6 00/15] integrity: Introduce the Integrity Digest Cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 07/15] digest_cache: Allow registration of digest list parsers
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 02/15] module: Introduce ksys_finit_module()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: ima: property parameter unused in ima_match_rules()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 00/15] integrity: Introduce the Integrity Digest Cache
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v6 07/15] digest_cache: Allow registration of digest list parsers
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v6 02/15] module: Introduce ksys_finit_module()
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: ima: property parameter unused in ima_match_rules()
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: ima: property parameter unused in ima_match_rules()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v21 1/6] exec: Add a new AT_EXECVE_CHECK flag to execveat(2)
- From: Jeff Xu <jeffxu@xxxxxxxxxx>
- Re: ima: property parameter unused in ima_match_rules()
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: ima: property parameter unused in ima_match_rules()
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: ima: property parameter unused in ima_match_rules()
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: regression: kernel log "flooded" with tpm tpm0: A TPM error (2306) occurred attempting to create NULL primary
- From: Christoph Anton Mitterer <calestyo@xxxxxxxxxxxx>
- Re: ima: property parameter unused in ima_match_rules()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- ima: property parameter unused in ima_match_rules()
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [GIT PULL] TPM DEVICE DRIVER: linux-next-6.13-rc1
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v21 6/6] samples/check-exec: Add an enlighten "inc" interpreter and 28 tests
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v21 1/6] exec: Add a new AT_EXECVE_CHECK flag to execveat(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [GIT PULL] TPM DEVICE DRIVER: linux-next-6.13-rc1
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v21 6/6] samples/check-exec: Add an enlighten "inc" interpreter and 28 tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v21 1/6] exec: Add a new AT_EXECVE_CHECK flag to execveat(2)
- From: Jeff Xu <jeffxu@xxxxxxxxxxxx>
- Re: [PATCH v21 1/6] exec: Add a new AT_EXECVE_CHECK flag to execveat(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v2] ima: kexec: silence RCU list traversal warning
- From: Breno Leitao <leitao@xxxxxxxxxx>
- Re: [PATCH v21 0/6] Script execution control (was O_MAYEXEC)
- From: Kees Cook <kees@xxxxxxxxxx>
- Re: [PATCH] ima: kexec: Add RCU read lock protection for ima_measurements list traversal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: kexec: Add RCU read lock protection for ima_measurements list traversal
- From: Breno Leitao <leitao@xxxxxxxxxx>
- Re: [PATCH v21 1/6] exec: Add a new AT_EXECVE_CHECK flag to execveat(2)
- From: Jeff Xu <jeffxu@xxxxxxxxxxxx>
- [PATCH AUTOSEL 6.11 01/10] integrity: Use static_assert() to check struct sizes
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v21 2/6] security: Add EXEC_RESTRICT_FILE and EXEC_DENY_INTERACTIVE securebits
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v21 1/6] exec: Add a new AT_EXECVE_CHECK flag to execveat(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v6 02/15] module: Introduce ksys_finit_module()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 02/15] module: Introduce ksys_finit_module()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v21 2/6] security: Add EXEC_RESTRICT_FILE and EXEC_DENY_INTERACTIVE securebits
- From: Jeff Xu <jeffxu@xxxxxxxxxxxx>
- Re: [PATCH v21 1/6] exec: Add a new AT_EXECVE_CHECK flag to execveat(2)
- From: Jeff Xu <jeffxu@xxxxxxxxxxxx>
- Re: [PATCH v6 02/15] module: Introduce ksys_finit_module()
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v6 00/15] integrity: Introduce the Integrity Digest Cache
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH] ima: kexec: Add RCU read lock protection for ima_measurements list traversal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 07/15] digest_cache: Allow registration of digest list parsers
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v6 01/15] lib: Add TLV parser
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v6 07/15] digest_cache: Allow registration of digest list parsers
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 02/15] module: Introduce ksys_finit_module()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 02/15] module: Introduce ksys_finit_module()
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH v6 01/15] lib: Add TLV parser
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v4 9/9] ima: Use digest caches for appraisal
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v4 8/9] ima: Use digest caches for measurement
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v4 7/9] ima: Load verified usage from digest cache found from query
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v4 6/9] ima: Store verified usage in digest cache based on integrity metadata flags
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v4 5/9] ima: Retrieve digest cache and check if changed
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v4 4/9] ima: Modify existing boot-time built-in policies with digest cache policies
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v4 3/9] ima: Add digest_cache_measure/appraise boot-time built-in policies
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v4 2/9] ima: Add digest_cache policy keyword
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v4 1/9] ima: Introduce hook DIGEST_LIST_CHECK
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH v4 0/9] ima: Integrate with Integrity Digest Cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 15/15] docs: Add documentation of the Integrity Digest Cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 14/15] selftests/digest_cache: Add selftests for the Integrity Digest Cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 13/15] digest_cache: Reset digest cache on file/directory change
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 12/15] digest cache: Prefetch digest lists if requested
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 11/15] digest_cache: Add support for directories
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 10/15] digest_cache: Add management of verification data
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 09/15] digest_cache: Populate the digest cache from a digest list
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 08/15] digest_cache: Parse tlv digest lists
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 07/15] digest_cache: Allow registration of digest list parsers
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 06/15] digest_cache: Add hash tables and operations
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 05/15] digest_cache: Add securityfs interface
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 04/15] digest_cache: Initialize digest caches
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 03/15] integrity: Introduce the Integrity Digest Cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 02/15] module: Introduce ksys_finit_module()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 00/15] integrity: Introduce the Integrity Digest Cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH] doc: correct the build steps for open_posix_testsuite
- Re: [PATCH v3] ima: Suspend PCR extends and log appends when rebooting
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [PATCH v3] ima: Suspend PCR extends and log appends when rebooting
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] ima_boot_aggregate: Fix openssl 3.0 deprecation warnings
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: regression: kernel log "flooded" with tpm tpm0: A TPM error (2306) occurred attempting to create NULL primary
- From: Christoph Anton Mitterer <calestyo@xxxxxxxxxxxx>
- Re: [PATCH 2/2] ima_boot_aggregate: TBROK on fread() failure
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: regression: kernel log "flooded" with tpm tpm0: A TPM error (2306) occurred attempting to create NULL primary
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: regression: kernel log "flooded" with tpm tpm0: A TPM error (2306) occurred attempting to create NULL primary
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: regression: kernel log "flooded" with tpm tpm0: A TPM error (2306) occurred attempting to create NULL primary
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: regression: kernel log "flooded" with tpm tpm0: A TPM error (2306) occurred attempting to create NULL primary
- From: Christoph Anton Mitterer <calestyo@xxxxxxxxxxxx>
- Re: regression: kernel log "flooded" with tpm tpm0: A TPM error (2306) occurred attempting to create NULL primary
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: regression: kernel log "flooded" with tpm tpm0: A TPM error (2306) occurred attempting to create NULL primary
- From: Christoph Anton Mitterer <calestyo@xxxxxxxxxxxx>
- Re: regression: kernel log "flooded" with tpm tpm0: A TPM error (2306) occurred attempting to create NULL primary
- From: Christoph Anton Mitterer <calestyo@xxxxxxxxxxxx>
- Re: regression: kernel log "flooded" with tpm tpm0: A TPM error (2306) occurred attempting to create NULL primary
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: regression: kernel log "flooded" with tpm tpm0: A TPM error (2306) occurred attempting to create NULL primary
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] TPM DEVICE DRIVER: tpmdd-next-6.12-rc8
- From: pr-tracker-bot@xxxxxxxxxx
- [PATCH] KEYS: trusted: dcp: fix improper sg use with CONFIG_VMAP_STACK=y
- From: David Gstir <david@xxxxxxxxxxxxx>
- [GIT PULL] TPM DEVICE DRIVER: tpmdd-next-6.12-rc8
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: regression: kernel log "flooded" with tpm tpm0: A TPM error (2306) occurred attempting to create NULL primary
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: regression: kernel log "flooded" with tpm tpm0: A TPM error (2306) occurred attempting to create NULL primary
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH] tpm: Disable TPM on tpm2_create_primary() failure
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: regression: kernel log "flooded" with tpm tpm0: A TPM error (2306) occurred attempting to create NULL primary
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- regression: kernel log "flooded" with tpm tpm0: A TPM error (2306) occurred attempting to create NULL primary
- From: Christoph Anton Mitterer <calestyo@xxxxxxxxxxxx>
- Re: regression: kernel log "flooded" with tpm tpm0: A TPM error (2306) occurred attempting to create NULL primary
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] tpm: Opt-in in disable PCR integrity protection
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] ima: Suspend PCR extends and log appends when rebooting
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3] tpm: Opt-in in disable PCR integrity protection
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] tpm: Opt-in in disable PCR integrity protection
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: [PATCH] tpm/eventlog: Use kvmalloc() for event log buffer
- From: "Liang, Andy (Linux Ecosystem Engineering)" <andy.liang@xxxxxxx>
- Re: [PATCH v2] ima: Suspend PCR extends and log appends when rebooting
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2] ima: Suspend PCR extends and log appends when rebooting
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3] tpm: Opt-in in disable PCR integrity protection
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v21 4/6] selftests/landlock: Add tests for execveat + AT_EXECVE_CHECK
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v21 0/6] Script execution control (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v21 2/6] security: Add EXEC_RESTRICT_FILE and EXEC_DENY_INTERACTIVE securebits
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v21 5/6] samples/check-exec: Add set-exec
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [GIT PULL] integrity: subsystem fixes for v6.12
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v2] tpm: Opt-in in disable PCR integrity protection
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Opt-in in disable PCR integrity protection
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH v21 6/6] samples/check-exec: Add an enlighten "inc" interpreter and 28 tests
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v21 3/6] selftests/exec: Add 32 tests for AT_EXECVE_CHECK and exec securebits
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v21 1/6] exec: Add a new AT_EXECVE_CHECK flag to execveat(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v2] ima: Suspend PCR extends and log appends when rebooting
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm/eventlog: Use kvmalloc() for event log buffer
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH v2] ima: Suspend PCR extends and log appends when rebooting
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [GIT PULL] integrity: subsystem fixes for v6.12
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Opt-in in disable PCR integrity protection
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Opt-in in disable PCR integrity protection
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: Suspend PCR extends and log appends when rebooting
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: [PATCH] tpm/eventlog: Use kvmalloc() for event log buffer
- From: "Liang, Andy (Linux Ecosystem Engineering)" <andy.liang@xxxxxxx>
- Re: Reading public key portion of asymmetric keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm/eventlog: Use kvmalloc() for event log buffer
- From: Takashi Iwai <tiwai@xxxxxxx>
- RE: [PATCH] tpm/eventlog: Use kvmalloc() for event log buffer
- From: "Liang, Andy (Linux Ecosystem Engineering)" <andy.liang@xxxxxxx>
- Re: [PATCH] tpm/eventlog: Use kvmalloc() for event log buffer
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH] tpm/eventlog: Use kvmalloc() for event log buffer
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH] tpm/eventlog: Use kvmalloc() for event log buffer
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH] tpm/eventlog: Use kvmalloc() for event log buffer
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm: Opt-in in disable PCR integrity protection
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] tpm/eventlog: Use kvmalloc() for event log buffer
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm/eventlog: Use kvmalloc() for event log buffer
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm/eventlog: Use kvmalloc() for event log buffer
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] tpm/eventlog: Use kvmalloc() for event log buffer
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Opt-in in disable PCR integrity protection
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm: Opt-in in disable PCR integrity protection
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Opt-in in disable PCR integrity protection
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Remove the documentation from tpm2-sessions.c
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm: Opt-in in disable PCR integrity protection
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm: Opt-in in disable PCR integrity protection
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm: Opt-in in disable PCR integrity protection
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2] tpm: Opt-in in disable PCR integrity protection
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Opt-in in disable PCR integrity protection
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm/eventlog: Use kvmalloc() for event log buffer
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH] tpm/eventlog: Use kvmalloc() for event log buffer
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- [PATCH] tpm/eventlog: Use kvmalloc() for event log buffer
- From: Takashi Iwai <tiwai@xxxxxxx>
- [PATCH] tpm: Remove the documentation from tpm2-sessions.c
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2] tpm: Opt-in in disable PCR integrity protection
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH] tpm: Allow the TPM2 pcr_extend HMAC capability to be disabled on boot
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: Opt-in in disable PCR encryption on TPM2 chips
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: Opt-in in disable PCR encryption on TPM2 chips
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH] tpm: Allow the TPM2 pcr_extend HMAC capability to be disabled on boot
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Opt-in in disable PCR encryption on TPM2 chips
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH] tpm: Allow the TPM2 pcr_extend HMAC capability to be disabled on boot
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH] tpm: Allow the TPM2 pcr_extend HMAC capability to be disabled on boot
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Opt-in in disable PCR encryption on TPM2 chips
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: Opt-in in disable PCR encryption on TPM2 chips
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH] tpm: Opt-in in disable PCR encryption on TPM2 chips
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH] tpm: Allow the TPM2 pcr_extend HMAC capability to be disabled on boot
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH] tpm: Allow the TPM2 pcr_extend HMAC capability to be disabled on boot
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH] tpm: Allow the TPM2 pcr_extend HMAC capability to be disabled on boot
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH] tpm: Allow the TPM2 pcr_extend HMAC capability to be disabled on boot
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH] tpm: Allow the TPM2 pcr_extend HMAC capability to be disabled on boot
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH] tpm: Allow the TPM2 pcr_extend HMAC capability to be disabled on boot
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] tpm: Allow the TPM2 pcr_extend HMAC capability to be disabled on boot
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] KEYS: keys-next-6.12-rc7
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH] tpm: atmel: Drop PPC64 specific MMIO setup
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] KEYS: keys-next-6.12-rc7
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [GIT PULL] KEYS: keys-next-6.12-rc7
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: atmel: Drop PPC64 specific MMIO setup
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH] tpm: atmel: Drop PPC64 specific MMIO setup
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: atmel: Drop PPC64 specific MMIO setup
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: atmel: Drop PPC64 specific MMIO setup
- From: Rob Herring <robh@xxxxxxxxxx>
- [syzbot] Monthly integrity report (Nov 2024)
- From: syzbot <syzbot+list4e5402cbee6a192e1e9e@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/4] Alternative TPM patches for Trenchboot
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH] ima: Suspend PCR extends and log appends when rebooting
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/4] Alternative TPM patches for Trenchboot
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH 0/4] Alternative TPM patches for Trenchboot
- From: ross.philipson@xxxxxxxxxx
- Re: [RFC PATCH 0/4] Alternative TPM patches for Trenchboot
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/4] Alternative TPM patches for Trenchboot
- From: ross.philipson@xxxxxxxxxx
- Re: [RFC PATCH 0/4] Alternative TPM patches for Trenchboot
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] TPM DEVICE DRIVER: tpmdd-next-6.12-rc7
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [RFC PATCH 0/4] Alternative TPM patches for Trenchboot
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/4] Alternative TPM patches for Trenchboot
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH 0/4] Alternative TPM patches for Trenchboot
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/4] Alternative TPM patches for Trenchboot
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/4] Alternative TPM patches for Trenchboot
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH 0/4] Alternative TPM patches for Trenchboot
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH 0/4] Alternative TPM patches for Trenchboot
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/4] Alternative TPM patches for Trenchboot
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH 0/4] Alternative TPM patches for Trenchboot
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH 0/4] Alternative TPM patches for Trenchboot
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH 0/4] Alternative TPM patches for Trenchboot
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH 0/4] Alternative TPM patches for Trenchboot
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH 0/4] Alternative TPM patches for Trenchboot
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] ima: kexec: Add RCU read lock protection for ima_measurements list traversal
- From: Breno Leitao <leitao@xxxxxxxxxx>
- [GIT PULL] TPM DEVICE DRIVER: tpmdd-next-6.12-rc7
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH 0/4] Alternative TPM patches for Trenchboot
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [RFC PATCH 4/4] tpm: sysfs: Show locality used by kernel
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [RFC PATCH 3/4] tpm, tpm_tis: allow to set locality to a different value
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [RFC PATCH 2/4] tpm, tpm_tis: Address positive localities in tpm_tis_request_locality()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [RFC PATCH 1/4] tpm, tpm_tis: Close all localities
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [RFC PATCH 0/4] Alternative TPM patches for Trenchboot
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [syzbot] [integrity?] [lsm?] [erofs?] INFO: task hung in ima_file_free (4)
- From: syzbot <syzbot+8036326eebe7d0140944@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v11 16/20] tpm: Make locality requests return consistent values
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 1/2] tpm, tpm_tis: Introduce TPM_IOC_SET_LOCALITY
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 15/20] tpm: Ensure tpm is in known state at startup
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 1/2] tpm, tpm_tis: Introduce TPM_IOC_SET_LOCALITY
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 1/2] tpm, tpm_tis: Introduce TPM_IOC_SET_LOCALITY
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH v2 1/2] tpm, tpm_tis: Introduce TPM_IOC_SET_LOCALITY
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 1/2] tpm, tpm_tis: Introduce TPM_IOC_SET_LOCALITY
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 1/2] tpm, tpm_tis: Introduce TPM_IOC_SET_LOCALITY
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH v2 1/2] tpm, tpm_tis: Introduce TPM_IOC_SET_LOCALITY
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [RFC PATCH v2 2/2] tpm: show the default locality in sysfs
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [RFC PATCH v2 1/2] tpm, tpm_tis: Introduce TPM_IOC_SET_LOCALITY
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH] tpm, tpm_tis: Introduce TPM_IOC_SET_LOCALITY
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [RFC PATCH] tpm, tpm_tis: Introduce TPM_IOC_SET_LOCALITY
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 00/20] x86: Trenchboot secure dynamic launch Linux kernel support
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 00/20] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v11 18/20] tpm: Add sysfs interface to allow setting and querying the default locality
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 18/20] tpm: Add sysfs interface to allow setting and querying the default locality
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] tpm: Lock TPM chip in tpm_pm_suspend() first
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 00/20] x86: Trenchboot secure dynamic launch Linux kernel support
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 00/20] x86: Trenchboot secure dynamic launch Linux kernel support
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] tpm: Lock TPM chip in tpm_pm_suspend() first
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v3] tpm: Lock TPM chip in tpm_pm_suspend() first
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 00/20] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v3] tpm: Lock TPM chip in tpm_pm_suspend() first
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- RE: [PATCH v11 01/20] Documentation/x86: Secure Launch kernel documentation
- From: "Elliott, Robert (Servers)" <elliott@xxxxxxx>
- Re: [PATCH v11 00/20] x86: Trenchboot secure dynamic launch Linux kernel support
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [no subject]
- [PATCH 1/2] ima_boot_aggregate: Fix openssl 3.0 deprecation warnings
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH 2/2] ima_boot_aggregate: TBROK on fread() failure
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v11 00/20] x86: Trenchboot secure dynamic launch Linux kernel support
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 18/20] tpm: Add sysfs interface to allow setting and querying the default locality
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 17/20] tpm: Add ability to set the default locality the TPM chip uses
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 16/20] tpm: Make locality requests return consistent values
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 15/20] tpm: Ensure tpm is in known state at startup
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 14/20] tpm: Protect against locality counter underflow
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 00/20] x86: Trenchboot secure dynamic launch Linux kernel support
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 00/20] x86: Trenchboot secure dynamic launch Linux kernel support
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 00/20] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v11 18/20] tpm: Add sysfs interface to allow setting and querying the default locality
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] tpm: Lock TPM chip in tpm_pm_suspend() first
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 00/20] x86: Trenchboot secure dynamic launch Linux kernel support
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 00/20] x86: Trenchboot secure dynamic launch Linux kernel support
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] tpm: Lock TPM chip in tpm_pm_suspend() first
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH v3] tpm: Lock TPM chip in tpm_pm_suspend() first
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 00/20] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/5] LSM: Ensure the correct LSM context releaser
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v11 00/20] x86: Trenchboot secure dynamic launch Linux kernel support
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v11 00/20] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: set TPM_CHIP_FLAG_SUSPENDED early
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: set TPM_CHIP_FLAG_SUSPENDED early
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: set TPM_CHIP_FLAG_SUSPENDED early
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v6] tpm: Add new device/vendor ID 0x50666666
- From: Jett Rink <jettrink@xxxxxxxxxxxx>
- Re: [PATCH] tpm: set TPM_CHIP_FLAG_SUSPENDED early
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [PATCH v2] tpm: Lock TPM chip in tpm_pm_suspend() first
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 2/3] tpm: Rollback tpm2_load_null()
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6] tpm: Add new device/vendor ID 0x50666666
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 2/3] tpm: Rollback tpm2_load_null()
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: set TPM_CHIP_FLAG_SUSPENDED early
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: set TPM_CHIP_FLAG_SUSPENDED early
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [no subject]
- Re: [PATCH v8 2/3] tpm: Rollback tpm2_load_null()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] TPM DEVICE DRIVER: tpmdd-next-6.12-rc6
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH] KEYS: trusted: dcp: fix NULL dereference in AEAD crypto operation
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: dcp: fix NULL dereference in AEAD crypto operation
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH] tpm: set TPM_CHIP_FLAG_SUSPENDED early
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] KEYS: trusted: dcp: fix NULL dereference in AEAD crypto operation
- From: David Gstir <david@xxxxxxxxxxxxx>
- [GIT PULL] TPM DEVICE DRIVER: tpmdd-next-6.12-rc6
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 3/3] tpm: Lazily flush the auth session
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 3/3] tpm: Lazily flush the auth session
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v8 1/3] tpm: Return tpm2_sessions_init() when null key creation fails
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 1/3] tpm: Return tpm2_sessions_init() when null key creation fails
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v8 2/3] tpm: Rollback tpm2_load_null()
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 2/3] tpm: Rollback tpm2_load_null()
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: [PATCH V3 0/2] char: tpm: Adjust cr50_i2c locking mechanism
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 2/3] tpm: Rollback tpm2_load_null()
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH V3 0/2] char: tpm: Adjust cr50_i2c locking mechanism
- From: Grzegorz Bernacki <bernacki@xxxxxxxxxxxx>
- Re: [PATCH v8 2/3] tpm: Rollback tpm2_load_null()
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- [PATCH v8 3/3] tpm: Lazily flush the auth session
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v8 2/3] tpm: Rollback tpm2_load_null()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v8 1/3] tpm: Return tpm2_sessions_init() when null key creation fails
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v8 0/3] Lazy flush for the auth session
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] mailmap: update email addresses
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v6] tpm: Add new device/vendor ID 0x50666666
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [REGRESSION][BISECTED] tpm: Popping noise in USB headphones since 1b6d7f9eb150
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 4/5] tpm: Allocate chip->auth in tpm2_start_auth_session()
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [REGRESSION][BISECTED] tpm: Popping noise in USB headphones since 1b6d7f9eb150
- From: Christian Heusel <christian@xxxxxxxxx>
- Re: [RFC PATCH v3 08/13] clavis: Introduce new LSM called clavis
- Re: [PATCH v7 4/5] tpm: Allocate chip->auth in tpm2_start_auth_session()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v7 4/5] tpm: Allocate chip->auth in tpm2_start_auth_session()
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 3/5] tpm: flush the null key only when /dev/tpm0 is accessed
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 1/5] tpm: Return on tpm2_create_null_primary() failure
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH v1] tpm: tis_i2c: add ST33KTPM2XI2C compatible entry
- From: Heiko Schocher <hs@xxxxxxx>
- [PATCH v3 1/5] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v7 5/5] tpm: flush the auth session only when /dev/tpm0 is open
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 08/13] clavis: Introduce new LSM called clavis
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v7 4/5] tpm: Allocate chip->auth in tpm2_start_auth_session()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v7 3/5] tpm: flush the null key only when /dev/tpm0 is accessed
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v7 1/5] tpm: Return on tpm2_create_null_primary() failure
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v7 2/5] tpm: Implement tpm2_load_null() rollback
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 08/13] clavis: Introduce new LSM called clavis
- Re: [PATCH v2] mm: Split critical region in remap_file_pages() and invoke LSMs in between
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/6] LSM: Ensure the correct LSM context releaser
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [Bug 219383] New: System reboot on S3 sleep/wakeup test
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6] tpm: Add new device/vendor ID 0x50666666
- From: Tzung-Bi Shih <tzungbi@xxxxxxxxxx>
- Re: [PATCH v2] mm: Split critical region in remap_file_pages() and invoke LSMs in between
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/6] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/6] LSM: Ensure the correct LSM context releaser
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [Bug 219383] New: System reboot on S3 sleep/wakeup test
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2] mm: Split critical region in remap_file_pages() and invoke LSMs in between
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v7 5/5] tpm: flush the auth session only when /dev/tpm0 is open
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v7 4/5] tpm: Allocate chip->auth in tpm2_start_auth_session()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v7 3/5] tpm: flush the null key only when /dev/tpm0 is accessed
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v7 2/5] tpm: Implement tpm2_load_null() rollback
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v7 1/5] tpm: Return on tpm2_create_null_primary() failure
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v7 0/5] Lazy flush for the auth session
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 5/5] tpm: flush the auth session only when /dev/tpm0 is open
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 1/5] tpm: Return on tpm2_create_null_primary() failure
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] mm: Split critical region in remap_file_pages() and invoke LSMs in between
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 05/13] clavis: Introduce a new key type called clavis_key_acl
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v2] mm: Split critical region in remap_file_pages() and invoke LSMs in between
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v3 05/13] clavis: Introduce a new key type called clavis_key_acl
- From: Ben Boeckel <me@xxxxxxxxxxxxxx>
- Re: [PATCH v2] mm: Split critical region in remap_file_pages() and invoke LSMs in between
- From: "Liam R. Howlett" <Liam.Howlett@xxxxxxxxxx>
- [PATCH v2] mm: Split critical region in remap_file_pages() and invoke LSMs in between
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC][PATCH] mm: Split locks in remap_file_pages()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 05/13] clavis: Introduce a new key type called clavis_key_acl
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC][PATCH] mm: Split locks in remap_file_pages()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC][PATCH] mm: Split locks in remap_file_pages()
- From: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
- Re: [syzbot] [integrity?] [lsm?] possible deadlock in process_measurement (4)
- From: syzbot <syzbot+1cd571a672400ef3a930@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC][PATCH] mm: Split locks in remap_file_pages()
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [syzbot] [integrity?] [lsm?] possible deadlock in process_measurement (4)
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] ima: Remove inode lock
- From: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
- [RFC][PATCH] mm: Split locks in remap_file_pages()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] ima: Remove inode lock
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH 1/3] ima: Remove inode lock
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] ima: Remove inode lock
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] ima: Remove inode lock
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] ima: Remove inode lock
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] ima: Remove inode lock
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] ima: Remove inode lock
- From: Lorenzo Stoakes <lorenzo.stoakes@xxxxxxxxxx>
- Re: [PATCH 1/3] ima: Remove inode lock
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] ima: Remove inode lock
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] ima: Remove inode lock
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] ima: Remove inode lock
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 05/13] clavis: Introduce a new key type called clavis_key_acl
- From: Ben Boeckel <me@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 04/13] keys: Add new verification type (VERIFYING_CLAVIS_SIGNATURE)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v3 04/13] keys: Add new verification type (VERIFYING_CLAVIS_SIGNATURE)
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH v3 03/13] clavis: Introduce a new system keyring called clavis
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v3 03/13] clavis: Introduce a new system keyring called clavis
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH v3 06/13] clavis: Populate clavis keyring acl with kernel module signature
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v3 04/13] keys: Add new verification type (VERIFYING_CLAVIS_SIGNATURE)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v3 01/13] certs: Remove CONFIG_INTEGRITY_PLATFORM_KEYRING check
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH v3 02/13] certs: Introduce ability to link to a system key
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH v3 03/13] clavis: Introduce a new system keyring called clavis
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v3 02/13] certs: Introduce ability to link to a system key
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v3 01/13] certs: Remove CONFIG_INTEGRITY_PLATFORM_KEYRING check
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]