Linux Integrity
[Prev Page][Next Page]
- Re: [PATCH] tpm: Drop warning when an auth session is active
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v12 04/19] x86: Secure Launch main header file
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v12 03/19] x86: Secure Launch Resource Table header file
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v12 10/19] x86: Secure Launch kernel late boot stub
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v12 09/19] x86: Secure Launch kernel early boot stub
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v12 17/19] tpm, sysfs: Show locality used by kernel
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v12 04/19] x86: Secure Launch main header file
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v12 15/19] tpm, tpm_tis: Address positive localities in tpm_tis_request_locality()
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v12 08/19] x86/boot: Place TXT MLE header in the kernel_info section
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v12 03/19] x86: Secure Launch Resource Table header file
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v12 07/19] x86/msr: Add variable MTRR base/mask and x2apic ID registers
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v12 04/19] x86: Secure Launch main header file
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v12 03/19] x86: Secure Launch Resource Table header file
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH] tpm: Drop warning when an auth session is active
- From: Jonathan McDowell <noodles@xxxxxxxx>
- Re: [PATCH] tpm, tpm_tis: Workaround failed command reception on Infineon devices
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm, tpm_tis: Workaround failed command reception on Infineon devices
- From: Jonathan McDowell <noodles@xxxxxxxx>
- Re: [PATCH] tpm: Drop warning when an auth session is active
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: Lazily flush auth session when getting random data
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 3/6] tpm: add send_recv() ops in tpm_class_ops
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 3/6] tpm: add send_recv() ops in tpm_class_ops
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v2 3/6] tpm: add send_recv() ops in tpm_class_ops
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH] tpm: End any active auth session before shutdown
- From: Jonathan McDowell <noodles@xxxxxxxx>
- [PATCH] tpm: Lazily flush auth session when getting random data
- From: Jonathan McDowell <noodles@xxxxxxxx>
- [PATCH] tpm: Drop warning when an auth session is active
- From: Jonathan McDowell <noodles@xxxxxxxx>
- Re: [RFC PATCH] IMA: Remove evm_overlay.sh
- From: Petr Vorel <pvorel@xxxxxxx>
- Bounce probe for linux-integrity@xxxxxxxxxxxxxxx (no action required)
- From: linux-integrity+owner@xxxxxxxxxxxxxxx
- Re: [PATCH v12 17/19] tpm, sysfs: Show locality used by kernel
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v12 16/19] tpm, tpm_tis: Allow locality to be set to a different value
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v12 15/19] tpm, tpm_tis: Address positive localities in tpm_tis_request_locality()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v12 14/19] tpm, tpm_tis: Close all localities
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v12 10/19] x86: Secure Launch kernel late boot stub
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v12 09/19] x86: Secure Launch kernel early boot stub
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v12 08/19] x86/boot: Place TXT MLE header in the kernel_info section
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v12 07/19] x86/msr: Add variable MTRR base/mask and x2apic ID registers
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v12 06/19] x86: Add early SHA-256 support for Secure Launch early measurements
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v12 05/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v12 04/19] x86: Secure Launch main header file
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v12 03/19] x86: Secure Launch Resource Table header file
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v12 01/19] Documentation/x86: Secure Launch kernel documentation
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v12 01/19] Documentation/x86: Secure Launch kernel documentation
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 1/7] ima: copy only complete measurement records across kexec
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 1/7] ima: copy only complete measurement records across kexec
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 0/5] Add support for the TPM FF-A start method
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 1/5] tpm_crb: implement driver compliant to CRB over FF-A
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm, tpm_tis: Fix timeout handling when waiting for TPM status
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH] tpm, tpm_tis: Workaround failed command reception on Infineon devices
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 3/6] tpm: add send_recv() ops in tpm_class_ops
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 3/6] tpm: add send_recv() ops in tpm_class_ops
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: Unbalanced TPM2 HMAC session calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: Unbalanced TPM2 HMAC session calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 5/5] ima_violations.sh: require kernel v6.14 for minimizing violations tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Unbalanced TPM2 HMAC session calls
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Unbalanced TPM2 HMAC session calls
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] tpm: Remove duplicate documentation
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: Unbalanced TPM2 HMAC session calls
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] ima_setup.sh: Check 'cat' exit code when loading policy
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v3 5/5] ima_violations.sh: require kernel v6.14 for minimizing violations tests
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v3 1/5] ima_violations.sh: force $LOG ToMToU violation earlier
- From: Petr Vorel <pvorel@xxxxxxx>
- Unbalanced TPM2 HMAC session calls
- From: Jonathan McDowell <noodles@xxxxxxxx>
- Re: [RFC][PATCH] ima: add measurement for first unverified write on ima policy file
- From: "Enrico Bravi" <enrico.bravi@xxxxxxxxx>
- [PATCH] tpm, tpm_tis: Workaround failed command reception on Infineon devices
- From: Jonathan McDowell <noodles@xxxxxxxx>
- Re: [RFC][PATCH] ima: add measurement for first unverified write on ima policy file
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC][PATCH] ima: add measurement for first unverified write on ima policy file
- From: "Enrico Bravi" <enrico.bravi@xxxxxxxxx>
- Re: [PATCH v9 2/7] kexec: define functions to map and unmap segments
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH v2 3/6] tpm: add send_recv() ops in tpm_class_ops
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH v6 5/5] Documentation: tpm: add documentation for the CRB FF-A interface
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v6 4/5] tpm_crb: add support for the Arm FF-A start method
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v6 1/5] tpm_crb: implement driver compliant to CRB over FF-A
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v6 3/5] ACPICA: add start method for Arm FF-A
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v6 2/5] tpm_crb: clean-up and refactor check for idle support
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v6 0/5] Add support for the TPM FF-A start method
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- Re: [PATCH v4 0/5] Add support for the TPM FF-A start method
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v3 2/5] ima_violations.sh: Update validate() to support multiple violations
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 5/5] ima_violations.sh: require kernel v6.14 for minimizing violations tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 4/5] ima_violations.sh: additional ToMToU violation tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 3/5] ima_violations.sh: additional open-writer violation tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 1/5] ima_violations.sh: force $LOG ToMToU violation earlier
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 3/7] ima: kexec: skip IMA segment validation after kexec soft reboot
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v9 1/7] ima: copy only complete measurement records across kexec
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 2/7] kexec: define functions to map and unmap segments
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: [PATCH v9 1/7] ima: copy only complete measurement records across kexec
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v9 1/7] ima: copy only complete measurement records across kexec
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] tpm, tpm_tis: Fix timeout handling when waiting for TPM status
- From: Jonathan McDowell <noodles@xxxxxxxx>
- Re: [RFC PATCH v2 5/6] tpm: add SNP SVSM vTPM driver
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v2 3/6] tpm: add send_recv() ops in tpm_class_ops
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC][PATCH] ima: add measurement for first unverified write on ima policy file
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 1/7] ima: copy only complete measurement records across kexec
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] arch/x86: Fix size overflows in sgx_encl_create()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 7/7] ima: measure kexec load and exec events as critical data
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 2/7] kexec: define functions to map and unmap segments
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] arch/x86: Fix size overflows in sgx_encl_create()
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 7/7] ima: measure kexec load and exec events as critical data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] arch/x86: Fix size overflows in sgx_encl_create()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] arch/x86: Fix size overflows in sgx_encl_create()
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v2] arch/x86: Fix size overflows in sgx_encl_create()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2] arch/x86: Fix size overflows in sgx_encl_create()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 2/7] kexec: define functions to map and unmap segments
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 2/4] ima_violations.sh: Update validate() to support multiple violations
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2 3/6] tpm: add send_recv() ops in tpm_class_ops
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v9 6/7] ima: make the kexec extra memory configurable
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 3/7] ima: kexec: skip IMA segment validation after kexec soft reboot
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 5/7] ima: kexec: move IMA log copy from kexec load to execute
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 7/7] ima: measure kexec load and exec events as critical data
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 0/7] ima: kexec: measure events between kexec load and execute
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 4/7] ima: kexec: define functions to copy IMA log at soft boot
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 2/7] kexec: define functions to map and unmap segments
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 1/7] ima: copy only complete measurement records across kexec
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 4/6] tpm: add interface to interact with devices based on TCG Simulator
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 2/4] ima_violations.sh: Update validate() to support multiple violations
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [RFC PATCH v2 5/6] tpm: add SNP SVSM vTPM driver
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 3/6] tpm: add send_recv() ops in tpm_class_ops
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 2/7] kexec: define functions to map and unmap segments
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 0/5] Add support for the TPM FF-A start method
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 4/6] tpm: add interface to interact with devices based on TCG Simulator
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v2 2/4] ima_violations.sh: Update validate() to support multiple violations
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/4] ima_violations.sh: Update validate() to support multiple violations
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v2 1/4] ima_violations.sh: force $LOG ToMToU violation earlier
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2 2/4] ima_violations.sh: Update validate() to support multiple violations
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2 1/4] ima_violations.sh: force $LOG ToMToU violation earlier
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] ima_violations.sh: force $LOG ToMToU violation earlier
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 4/4] ima_violations.sh: additional ToMToU violation tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 2/4] ima_violations.sh: Update validate() to support multiple violations
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 3/4] ima_violations.sh: additional open-writer violation tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 1/4] ima_violations.sh: force $LOG ToMToU violation earlier
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima_selinux.sh: Require ima_policy=critical_data kernel cmdline
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH] ima_kexec.sh: Detect kernel image from BOOT_IMAGE from /proc/cmdline
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 5/6] tpm: add SNP SVSM vTPM driver
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [RFC PATCH v2 4/6] tpm: add interface to interact with devices based on TCG Simulator
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v2 3/6] tpm: add send_recv() ops in tpm_class_ops
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v4 0/5] Add support for the TPM FF-A start method
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [RFC PATCH v2 4/6] tpm: add interface to interact with devices based on TCG Simulator
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v2 5/6] tpm: add SNP SVSM vTPM driver
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v2 3/6] tpm: add send_recv() ops in tpm_class_ops
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v2 0/6] Enlightened vTPM support for SVSM on SEV-SNP
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v2 5/6] tpm: add SNP SVSM vTPM driver
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v2 4/6] tpm: add interface to interact with devices based on TCG Simulator
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v2 3/6] tpm: add send_recv() ops in tpm_class_ops
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC][PATCH] ima: add measurement for first unverified write on ima policy file
- From: "Enrico Bravi" <enrico.bravi@xxxxxxxxx>
- Re: [PATCH v2 0/2] ima: minimize open-writers and ToMToU violations
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/5] Add support for the TPM FF-A start method
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: ftpm_tee: remove incorrect of_match_ptr annotation
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 5/6] tpm: add SNP SVSM vTPM driver
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: ftpm_tee: remove incorrect of_match_ptr annotation
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 5/6] tpm: add SNP SVSM vTPM driver
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 4/6] tpm: add interface to interact with devices based on TCG Simulator
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 3/6] tpm: add send_recv() ops in tpm_class_ops
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 0/6] Enlightened vTPM support for SVSM on SEV-SNP
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [RFC PATCH v2 5/6] tpm: add SNP SVSM vTPM driver
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH v2 2/2] ima: limit the number of ToMToU integrity violations
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 1/2] ima: limit the number of open-writers integrity violations
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 0/2] ima: minimize open-writers and ToMToU violations
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC PATCH v2 6/6] x86/sev: register tpm-svsm platform device
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [RFC PATCH v2 5/6] tpm: add SNP SVSM vTPM driver
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [RFC PATCH v2 4/6] tpm: add interface to interact with devices based on TCG Simulator
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [RFC PATCH v2 2/6] x86/sev: add SVSM vTPM probe/send_command functions
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [RFC PATCH v2 3/6] tpm: add send_recv() ops in tpm_class_ops
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [RFC PATCH v2 1/6] x86/sev: add SVSM call macros for the vTPM protocol
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [RFC PATCH v2 0/6] Enlightened vTPM support for SVSM on SEV-SNP
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 0/6] Drivers for Loongson security engine
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 2/7] kexec: define functions to map and unmap segments
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 2/7] kexec: define functions to map and unmap segments
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] ima: add measurement for first unverified write on ima policy file
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC][PATCH] ima: add measurement for first unverified write on ima policy file
- From: "Enrico Bravi" <enrico.bravi@xxxxxxxxx>
- [PATCH] MAINTAINERS: .mailmap: Update Sumit Garg's email address
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH] tpm: ftpm_tee: remove incorrect of_match_ptr annotation
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH 2/2] ima: limit the number of ToMToU integrity violations
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC][PATCH] ima: add measurement for first unverified write on ima policy file
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] ima: add measurement for first unverified write on ima policy file
- From: "Enrico Bravi" <enrico.bravi@xxxxxxxxx>
- Re: [GIT PULL] integrity: subsystem fixes for v6.14
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH 2/2] ima: limit the number of ToMToU integrity violations
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [GIT PULL] integrity: subsystem fixes for v6.14
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4 6/6] MAINTAINERS: Add tpm_lsse.c to LOONGSON CRYPTO DRIVER entry
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- [PATCH v4 5/6] tpm: Add a driver for Loongson TPM device
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- [PATCH v4 4/6] MAINTAINERS: Add entry for Loongson RNG driver
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- [PATCH v4 2/6] MAINTAINERS: Add entry for Loongson Security Module driver
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- [PATCH v4 1/6] mfd: Add support for Loongson Security Module
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- [PATCH v4 3/6] crypto: loongson - add Loongson RNG driver support
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- [PATCH v4 0/6] Drivers for Loongson security engine
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- Re: [RFC][PATCH] ima: add measurement for first unverified write on ima policy file
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 2/7] kexec: define functions to map and unmap segments
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v8 2/7] kexec: define functions to map and unmap segments
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH] tpm: ftpm_tee: remove incorrect of_match_ptr annotation
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [RFC][PATCH] ima: add measurement for first unverified write on ima policy file
- From: Enrico Bravi <enrico.bravi@xxxxxxxxx>
- Re: [RFC PATCH 3/3] ima: additional ToMToU violation tests
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v8 2/7] kexec: define functions to map and unmap segments
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v8 2/7] kexec: define functions to map and unmap segments
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 3/3] ima: additional ToMToU violation tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] ima_kexec.sh: Detect kernel image from BOOT_IMAGE from /proc/cmdline
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Michal Suchánek <msuchanek@xxxxxxx>
- [PATCH] ima_selinux.sh: Require ima_policy=critical_data kernel cmdline
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v8 2/7] kexec: define functions to map and unmap segments
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH 0/4] Add support for the TPM FF-A start method
- From: Sudeep Holla <sudeep.holla@xxxxxxx>
- Re: [PATCH v8 7/7] ima: measure kexec load and exec events as critical data
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 3/7] ima: kexec: skip IMA segment validation after kexec soft reboot
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 2/7] kexec: define functions to map and unmap segments
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 1/7] ima: define and call ima_alloc_kexec_file_buf
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 4/7] ima: kexec: define functions to copy IMA log at soft boot
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v8 4/7] ima: kexec: define functions to copy IMA log at soft boot
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] Add support for the TPM FF-A start method
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- Re: [PATCH 2/2] ima: limit the number of ToMToU integrity violations
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] ima: limit the number of open-writers integrity violations
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] ima: limit both open-writers and ToMToU violations
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 3/7] ima: kexec: skip IMA segment validation after kexec soft reboot
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] Add support for the TPM FF-A start method
- From: Sudeep Holla <sudeep.holla@xxxxxxx>
- Re: [PATCH 0/4] Add support for the TPM FF-A start method
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Jonathan McDowell <noodles@xxxxxxxx>
- Re: [PATCH 2/2] ima: limit the number of ToMToU integrity violations
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 1/2] ima: limit the number of open-writers integrity violations
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [RFC PATCH 3/3] ima: additional ToMToU violation tests
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [RFC PATCH 3/3] ima: additional ToMToU violation tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 7/7] ima: measure kexec load and exec events as critical data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH 3/3] ima: additional ToMToU violation tests
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v8 6/7] ima: make the kexec extra memory configurable
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/5] tpm_crb: clean-up and refactor check for idle support
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 2/5] tpm_crb: clean-up and refactor check for idle support
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH 3/3] ima: additional ToMToU violation tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH 3/3] ima: additional ToMToU violation tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH 3/3] ima: additional ToMToU violation tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH 3/3] ima: additional ToMToU violation tests
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v5 2/5] tpm_crb: clean-up and refactor check for idle support
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: [PATCH v5 1/5] tpm_crb: implement driver compliant to CRB over FF-A
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- Re: [RFC PATCH 2/3] ima: additional open-writer violation tests
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v5 2/5] tpm_crb: clean-up and refactor check for idle support
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- Re: [RFC PATCH 3/3] ima: additional ToMToU violation tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH 1/3] Update validate() to support multiple violations
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [RFC PATCH 3/3] ima: additional ToMToU violation tests
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 2/2] ima: limit the number of ToMToU integrity violations
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 1/2] ima: limit the number of open-writers integrity violations
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [RFC PATCH 3/3] ima: additional ToMToU violation tests
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v8 2/7] kexec: define functions to map and unmap segments
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 1/7] ima: define and call ima_alloc_kexec_file_buf
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC PATCH 1/3] Update validate() to support multiple violations
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC PATCH 3/3] ima: additional ToMToU violation tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC PATCH 2/3] ima: additional open-writer violation tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] ima: limit the number of ToMToU integrity violations
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] ima: limit the number of open-writers integrity violations
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v8 1/7] ima: define and call ima_alloc_kexec_file_buf
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 1/7] ima: define and call ima_alloc_kexec_file_buf
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH V3 5/6] tpm: Add a driver for Loongson TPM device
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V3 5/6] tpm: Add a driver for Loongson TPM device
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- Re: [PATCH V3 2/6] MAINTAINERS: Add maintainer for Loongson Security Module driver
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- Re: [PATCH v5 1/5] tpm_crb: implement driver compliant to CRB over FF-A
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 5/5] Documentation: tpm: add documentation for the CRB FF-A interface
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 2/5] tpm_crb: clean-up and refactor check for idle support
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 1/5] tpm_crb: implement driver compliant to CRB over FF-A
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: [PATCH v8 5/7] ima: kexec: move IMA log copy from kexec load to execute
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v8 2/7] kexec: define functions to map and unmap segments
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Jonathan McDowell <noodles@xxxxxxxx>
- [PATCH v5 5/5] Documentation: tpm: add documentation for the CRB FF-A interface
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v5 2/5] tpm_crb: clean-up and refactor check for idle support
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v5 4/5] tpm_crb: add support for the Arm FF-A start method
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v5 1/5] tpm_crb: implement driver compliant to CRB over FF-A
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v5 3/5] ACPICA: add start method for Arm FF-A
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v5 0/5] Add support for the TPM FF-A start method
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- Re: [PATCH v8 7/7] ima: measure kexec load and exec events as critical data
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 4/7] ima: kexec: define functions to copy IMA log at soft boot
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 5/7] ima: kexec: move IMA log copy from kexec load to execute
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] ima_setup.sh: Postpone loading policy after test setup
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH 2/2] ima_setup.sh: Check 'cat' exit code when loading policy
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH 2/2] ima: limit the number of ToMToU integrity violations
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 7/7] ima: measure kexec load and exec events as critical data
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 1/2] ima: limit the number of open-writers integrity violations
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 0/2] ima: limit both open-writers and ToMToU violations
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 5/7] ima: kexec: move IMA log copy from kexec load to execute
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v8 4/7] ima: kexec: define functions to copy IMA log at soft boot
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH V3 5/6] tpm: Add a driver for Loongson TPM device
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V3 2/6] MAINTAINERS: Add maintainer for Loongson Security Module driver
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- [PATCH V3 3/6] crypto: loongson - add Loongson RNG driver support
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- [PATCH V3 4/6] MAINTAINERS: Add maintainer for Loongson RNG driver
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- [PATCH V3 6/6] MAINTAINERS: Add tpm_lsse.c to LOONGSON CRYPTO DRIVER entry
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- [PATCH V3 5/6] tpm: Add a driver for Loongson TPM device
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- [PATCH V3 0/6] Drivers for Loongson security engine
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- [PATCH V3 0/6] Drivers for Loongson security engine
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- [PATCH V3 1/6] mfd: Add support for Loongson Security Module
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- [PATCH V3 2/6] MAINTAINERS: Add maintainer for Loongson Security Module driver
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- [Announce] Linux Security Summit Europe 2025 CfP
- From: "Reshetova, Elena" <elena.reshetova@xxxxxxxxx>
- [PATCH v8 7/7] ima: measure kexec load and exec events as critical data
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 0/7] ima: kexec: measure events between kexec load and execute
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 4/7] ima: kexec: define functions to copy IMA log at soft boot
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 5/7] ima: kexec: move IMA log copy from kexec load to execute
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 6/7] ima: make the kexec extra memory configurable
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 3/7] ima: kexec: skip IMA segment validation after kexec soft reboot
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 2/7] kexec: define functions to map and unmap segments
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 1/7] ima: define and call ima_alloc_kexec_file_buf
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Issue of historical file and script invocation when using IMA for runtime attestation
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v12 00/19] x86: Trenchboot secure dynamic launch Linux kernel support
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v7 0/7] ima: kexec: measure events between kexec load and execute
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC] Issue of historical file and script invocation when using IMA for runtime attestation
- From: "Wang, Nicholas" <chenkai3@xxxxxxxxxxxx>
- Re: [PATCH v12 00/19] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v12 00/19] x86: Trenchboot secure dynamic launch Linux kernel support
- From: ross.philipson@xxxxxxxxxx
- [PATCH v7 6/7] ima: make the kexec extra memory configurable
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 7/7] ima: measure kexec load and exec events as critical data
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 5/7] ima: kexec: move IMA log copy from kexec load to execute
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 2/7] kexec: define functions to map and unmap segments
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 4/7] ima: kexec: define functions to copy IMA log at soft boot
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 1/7] ima: define and call ima_alloc_kexec_file_buf
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 0/7] ima: kexec: measure events between kexec load and execute
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 3/7] ima: kexec: skip IMA segment validation after kexec soft reboot
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] mailmap: remove never used @parity.io email
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] MAINTAINERS: remove never used @parity.io email
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 4/5] tpm_crb: add support for the Arm FF-A start method
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxx>
- Re: [PATCH v4 3/5] ACPICA: add start method for Arm FF-A
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxx>
- Re: [PATCH v4 2/5] tpm_crb: clean-up and refactor check for idle support
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxx>
- Re: [PATCH v4 1/5] tpm_crb: implement driver compliant to CRB over FF-A
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 2/7] kexec: define functions to map and unmap segments
- From: Baoquan He <bhe@xxxxxxxxxx>
- [PATCH v4 5/5] Documentation: tpm: add documentation for the CRB FF-A interface
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v4 4/5] tpm_crb: add support for the Arm FF-A start method
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v4 3/5] ACPICA: add start method for Arm FF-A
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v4 1/5] tpm_crb: implement driver compliant to CRB over FF-A
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v4 2/5] tpm_crb: clean-up and refactor check for idle support
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v4 0/5] Add support for the TPM FF-A start method
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH COMMITTED] ima_setup.sh: Quit the test on unsuitable IMA policy
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 0/4] Add support for the TPM FF-A start method
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- Re: [Announce] Linux Security Summit North America 2025 CfP
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/5] tpm_crb: implement driver compliant to CRB over FF-A
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 4/5] tpm_crb: add support for the Arm FF-A start method
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- Re: [PATCH v3 2/5] tpm_crb: refactor check for idle support into TPM into inline function
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- Re: [PATCH v3 1/5] tpm_crb: implement driver compliant to CRB over FF-A
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- Re: [LTP] [PATCH 1/2] tst_security.sh: Fix SELinux detection
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [LTP] [PATCH 2/2] ima_selinux.sh: Detect SELinux before loading policy
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 2/2] ima_selinux.sh: Detect SELinux before loading policy
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [LTP] [PATCH 2/2] ima_selinux.sh: Detect SELinux before loading policy
- From: Andrea Cervesato <andrea.cervesato@xxxxxxxx>
- Re: [LTP] [PATCH 1/2] tst_security.sh: Fix SELinux detection
- From: Andrea Cervesato <andrea.cervesato@xxxxxxxx>
- [PATCH 2/2] ima_selinux.sh: Detect SELinux before loading policy
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH 1/2] tst_security.sh: Fix SELinux detection
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [Announce] Linux Security Summit North America 2025 CfP
- From: "Dr. Greg" <greg@xxxxxxxxxxxx>
- Re: [robertosassu:evm-iint-ptr-v1-devel-v3] [evm] e38e699a42: will-it-scale.per_process_ops 160.4% improvement
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [robertosassu:evm-iint-ptr-v1-devel-v3] [evm] e38e699a42: will-it-scale.per_process_ops 160.4% improvement
- From: Mateusz Guzik <mjguzik@xxxxxxxxx>
- [robertosassu:evm-iint-ptr-v1-devel-v3] [evm] e38e699a42: will-it-scale.per_process_ops 160.4% improvement
- From: kernel test robot <oliver.sang@xxxxxxxxx>
- Re: [PATCH 0/4] Add support for the TPM FF-A start method
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v2 1/5] tpm_crb: implement driver compliant to CRB over FF-A
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v3 4/5] tpm_crb: add support for the Arm FF-A start method
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 2/5] tpm_crb: refactor check for idle support into TPM into inline function
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 1/5] tpm_crb: implement driver compliant to CRB over FF-A
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC] Issue of historical file and script invocation when using IMA for runtime attestation
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] tpm: Add a driver for Loongson TPM device
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- [PATCH v3 5/5] Documentation: tpm: add documentation for the CRB FF-A interface
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v3 2/5] tpm_crb: refactor check for idle support into TPM into inline function
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v3 0/5] Add support for the TPM FF-A start method
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v3 4/5] tpm_crb: add support for the Arm FF-A start method
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v3 1/5] tpm_crb: implement driver compliant to CRB over FF-A
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v3 3/5] ACPICA: add start method for Arm FF-A
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- Re: [PATCH v2 5/5] Documentation: tpm: add documentation for the CRB FF-A interface
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/5] tpm_crb: implement driver compliant to CRB over FF-A
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/5] tpm_crb: implement driver compliant to CRB over FF-A
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- Re: [PATCH v2 2/5] tpm_crb: refactor check for idle support into TPM into inline function
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- Re: [PATCH v2 5/5] Documentation: tpm: add documentation for the CRB FF-A interface
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- Re: [PATCH v2 1/5] tpm_crb: implement driver compliant to CRB over FF-A
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 2/5] tpm_crb: refactor check for idle support into TPM into inline function
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 5/5] Documentation: tpm: add documentation for the CRB FF-A interface
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 3/3] tpm: Add a driver for Loongson TPM device
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 0/4] Add support for the TPM FF-A start method
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- Re: [RFC] Issue of historical file and script invocation when using IMA for runtime attestation
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC] Issue of historical file and script invocation when using IMA for runtime attestation
- From: "Wang, Nicholas" <chenkai3@xxxxxxxxxxxx>
- Re: [PATCH 0/4] Add support for the TPM FF-A start method
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v2 3/3] tpm: Add a driver for Loongson TPM device
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- [PATCH v2 5/5] Documentation: tpm: add documentation for the CRB FF-A interface
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v2 3/5] ACPICA: add start method for Arm FF-A
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v2 4/5] tpm_crb: add support for the Arm FF-A start method
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v2 1/5] tpm_crb: implement driver compliant to CRB over FF-A
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v2 0/5] Add support for the TPM FF-A start method
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v2 2/5] tpm_crb: refactor check for idle support into TPM into inline function
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- Re: [PATCH 0/4] Add support for the TPM FF-A start method
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- Re: [PATCH v2 3/3] tpm: Add a driver for Loongson TPM device
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 2/7] kexec: define functions to map and unmap segments
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 07/13] keys: Add ability to track intended usage of the public key
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] Add support for the TPM FF-A start method
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v2 2/3] crypto: loongson - add Loongson RNG driver support
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- [PATCH v2 3/3] tpm: Add a driver for Loongson TPM device
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- [PATCH v2 1/3] mfd: Add support for Loongson Security Module
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- [PATCH v2 0/3] Drivers for Loongson security engine
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- Re: [PATCH v4] selftests: tpm2: test_smoke: use POSIX-conformant expression operator
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] selftests: tpm2: test_smoke: use POSIX-conformant expression operator
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/4] tpm_crb: implement driver compliant to CRB over FF-A
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- Re: [PATCH 0/4] Add support for the TPM FF-A start method
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v4] selftests: tpm2: test_smoke: use POSIX-conformant expression operator
- From: Ahmed Salem <x0rw3ll@xxxxxxxxx>
- Re: [PATCH v3] selftests: tpm2: test_smoke: use POSIX-conformant expression operator
- From: Ahmed Salem <x0rw3ll@xxxxxxxxx>
- Re: [PATCH 3/4] ACPICA: add start method for Arm FF-A
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- Re: [PATCH 1/4] tpm_crb: implement driver compliant to CRB over FF-A
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 0/4] Add support for the TPM FF-A start method
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] selftests: tpm2: test_smoke: use POSIX-conformant expression operator
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 0/4] Add support for the TPM FF-A start method
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- Re: [PATCH 0/4] Add support for the TPM FF-A start method
- From: Sudeep Holla <sudeep.holla@xxxxxxx>
- Re: [PATCH 3/4] ACPICA: add start method for Arm FF-A
- From: Sudeep Holla <sudeep.holla@xxxxxxx>
- Re: [PATCH 0/4] Add support for the TPM FF-A start method
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v3] selftests: tpm2: test_smoke: use POSIX-conformant expression operator
- From: Ahmed Salem <x0rw3ll@xxxxxxxxx>
- [PATCH v2 RESEND] selftests: tpm2: test_smoke: use POSIX-conformant expression operator
- From: Ahmed Salem <x0rw3ll@xxxxxxxxx>
- [PATCH v2] selftests: tpm2: test_smoke: use POSIX-conformant expression operator
- From: Ahmed Salem <x0rw3ll@xxxxxxxxx>
- [PATCH 4/4] tpm_crb: add support for the Arm FF-A start method
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH 0/4] Add support for the TPM FF-A start method
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH 3/4] ACPICA: add start method for Arm FF-A
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH 1/4] tpm_crb: implement driver compliant to CRB over FF-A
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH 2/4] tpm_crb: refactor check for idle support into TPM into inline function
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [Announce] Linux Security Summit North America 2025 CfP
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] selftests: tpm2: test_smoke: use POSIX-conformant expression operator
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: TPM operation times out (very rarely)
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: TPM operation times out (very rarely)
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 2/7] kexec: define functions to map and unmap segments
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH] selftests: tpm2: test_smoke: use POSIX-conformant expression operator
- From: Ahmed Salem <x0rw3ll@xxxxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Jonathan McDowell <noodles@xxxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Jonathan McDowell <noodles@xxxxxxxx>
- Re: [PATCH v1] trusted_dcp.c: Do not return in case of non-secure mode
- From: Richard Weinberger <richard@xxxxxxxxxxxxx>
- [PATCH v1] trusted_dcp.c: Do not return in case of non-secure mode
- From: Kshitiz Varshney <kshitiz.varshney@xxxxxxx>
- Re: The business loan-
- From: David Song <chrispinerick@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: do not start chip while suspended
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v3 07/13] keys: Add ability to track intended usage of the public key
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v7 0/7] ima: kexec: measure events between kexec load and excute
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 1/7] ima: define and call ima_alloc_kexec_file_buf
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 7/7] ima: measure kexec load and exec events as critical data
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 3/7] ima: kexec: skip IMA segment validation after kexec soft reboot
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 1/7] ima: define and call ima_alloc_kexec_file_buf
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 1/7] ima: define and call ima_alloc_kexec_file_buf
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 2/7] kexec: define functions to map and unmap segments
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 1/7] ima: define and call ima_alloc_kexec_file_buf
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: do not start chip while suspended
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [PATCH v2] tpm: do not start chip while suspended
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxx>
- Re: [PATCH v7 7/7] ima: measure kexec load and exec events as critical data
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v7 7/7] ima: measure kexec load and exec events as critical data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 6/7] ima: make the kexec extra memory configurable
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [no subject]
- Re: [PATCH v7 7/7] ima: measure kexec load and exec events as critical data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Jonathan McDowell <noodles@xxxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Jonathan McDowell <noodles@xxxxxxxx>
- Re: [PATCH] tpm: do not start chip while suspended
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v3 07/13] keys: Add ability to track intended usage of the public key
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxx>
- Re: [PATCH v7 1/7] ima: define and call ima_alloc_kexec_file_buf
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2 1/2] ima: limit the number of open-writers integrity violations
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH COMMITTED 2/2] ima_setup.sh: Quit the test on unsuitable IMA policy
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH COMMITTED 0/2] IMA test fixes
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH COMMITTED 1/2] ima_measurements.sh: Fix exit code condition
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Jonathan McDowell <noodles@xxxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Michal Suchánek <msuchanek@xxxxxxx>
- [PATCH] tpm: do not start chip while suspended
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxx>
- [RFC PATCH v2 2/2] ima: limit the number of ToMToU integrity violations
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC PATCH v2 1/2] ima: limit the number of open-writers integrity violations
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: Reset IMA_NONACTION_RULE_FLAGS after post_setattr
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] integrity: fix typos and spelling errors
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 3/7] ima: kexec: skip IMA segment validation after kexec soft reboot
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/6] module: Introduce hash-based integrity checking
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- Re: [PATCH v7 3/7] ima: kexec: skip IMA segment validation after kexec soft reboot
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 3/7] ima: kexec: skip IMA segment validation after kexec soft reboot
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH] ima: Reset IMA_NONACTION_RULE_FLAGS after post_setattr
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] IMA: measure.policy: limit dont_measure tmpfs policy to func=FILE_CHECK
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v3 05/10] IMA: Read required policy from file
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v7 0/7] ima: kexec: measure events between kexec load and excute
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 0/7] ima: kexec: measure events between kexec load and excute
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] IMA: measure.policy: limit dont_measure tmpfs policy to func=FILE_CHECK
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 0/7] ima: kexec: measure events between kexec load and excute
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 4/7] ima: kexec: define functions to copy IMA log at soft boot
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 6/7] ima: make the kexec extra memory configurable
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 7/7] ima: measure kexec load and exec events as critical data
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 5/7] ima: kexec: move IMA log copy from kexec load to execute
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 2/7] kexec: define functions to map and unmap segments
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 1/7] ima: define and call ima_alloc_kexec_file_buf
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 4/7] ima: kexec: define functions to copy IMA log at soft boot
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 3/7] ima: kexec: skip IMA segment validation after kexec soft reboot
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 0/7] ima: kexec: measure events between kexec load and excute
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 0/7] ima: kexec: measure events between kexec load and excute
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH] IMA: measure.policy: limit dont_measure tmpfs policy to func=FILE_CHECK
- From: Petr Vorel <pvorel@xxxxxxx>
- [RFC PATCH] ima: limit the number of open-writers integrity violations
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v7 4/7] ima: kexec: define functions to copy IMA log at soft boot
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 6/7] ima: make the kexec extra memory configurable
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 7/7] ima: measure kexec load and exec events as critical data
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 4/7] ima: kexec: define functions to copy IMA log at soft boot
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 3/7] ima: kexec: skip IMA segment validation after kexec soft reboot
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 2/7] kexec: define functions to map and unmap segments
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 1/7] ima: define and call ima_alloc_kexec_file_buf
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 0/7] ima: kexec: measure events between kexec load and excute
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 08/10] ima_setup.sh: Allow to load predefined policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 07/10] ima_setup.sh: Add digest index detection for ima-buf format
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 04/10] IMA: Add example policy for ima_violations.sh
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 02/10] IMA: Add TCB policy as an example for ima_measurements.sh
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/6] module: Introduce hash-based integrity checking
- From: Christian Heusel <christian@xxxxxxxxx>
- Re: [PATCH v3 6/6] ima: Reset IMA_NONACTION_RULE_FLAGS after post_setattr
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: TPM operation times out (very rarely)
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: TPM operation times out (very rarely)
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 4/6] ima: Mark concurrent accesses to the iint pointer in the inode security blob
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/6] ima: Remove inode lock
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/6] fs: ima: Remove S_IMA and IS_IMA()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 5/6] ima: Defer fixing security.ima to __fput()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 3/6] ima: Detect if lock is held when iint pointer is set in inode security blob
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: [LTP] [PATCH v3 10/10] tst_test.sh: IMA: Allow to disable LSM warnings and use it for IMA
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: TPM operation times out (very rarely)
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [LTP] [PATCH v3 10/10] tst_test.sh: IMA: Allow to disable LSM warnings and use it for IMA
- From: Cyril Hrubis <chrubis@xxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: TPM operation times out (very rarely)
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 3/7] ima: kexec: skip IMA segment validation after kexec soft reboot
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Jonathan McDowell <noodles@xxxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Jonathan McDowell <noodles@xxxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Michal Suchánek <msuchanek@xxxxxxx>
- TPM operation times out (very rarely)
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: [PATCH 7/7] ima: measure kexec load and exec events as critical data
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 6/7] ima: make the kexec extra memory configurable
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 7/7] ima: measure kexec load and exec events as critical data
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 7/7] ima: measure kexec load and exec events as critical data
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v6 3/7] ima: kexec: skip IMA segment validation after kexec soft reboot
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v6 6/7] ima: make the kexec extra memory configurable
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v1] selftests: Handle old glibc without execveat(2)
- From: Kees Cook <kees@xxxxxxxxxx>
- Re: [PATCH v4] selftests: tpm2: create a dedicated .gitignore
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 00/34] address all -Wunused-const warnings
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxx>
- [PATCH v4] selftests: tpm2: create a dedicated .gitignore
- From: Khaled Elnaggar <khaledelnaggarlinux@xxxxxxxxx>
- Re: [PATCH v3] selftests: tpm2: create a dedicated .gitignore
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH v3] selftests: tpm2: create a dedicated .gitignore
- From: Khaled Elnaggar <khaledelnaggarlinux@xxxxxxxxx>
- Re: [PATCH v2] selftests: tpm2: create a dedicated .gitignore
- From: Khaled Elnaggar <khaledelnaggarlinux@xxxxxxxxx>
- Re: [PATCH v2] selftests: tpm2: create a dedicated .gitignore
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] selftests: tpm2: create a dedicated .gitignore
- From: Khaled Elnaggar <khaledelnaggarlinux@xxxxxxxxx>
- [PATCH v6 6/7] ima: make the kexec extra memory configurable
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 5/7] ima: kexec: move IMA log copy from kexec load to execute
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH 7/7] ima: measure kexec load and exec events as critical data
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 4/7] ima: kexec: define functions to copy IMA log at soft boot
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 3/7] ima: kexec: skip IMA segment validation after kexec soft reboot
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 1/7] ima: define and call ima_alloc_kexec_file_buf
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 2/7] kexec: define functions to map and unmap segments
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 0/7] ima: kexec: measure events between kexec load and excute
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 5/7] ima: kexec: move IMA log copy from kexec load to execute
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH 7/7] ima: measure kexec load and exec events as critical data
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 6/7] ima: make the kexec extra memory configurable
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 0/7] *** SUBJECT HERE ***
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 4/7] ima: kexec: define functions to copy IMA log at soft boot
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 3/7] ima: kexec: skip IMA segment validation after kexec soft reboot
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 2/7] kexec: define functions to map and unmap segments
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 1/7] ima: define and call ima_alloc_kexec_file_buf
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] selftests: tpm2: create a dedicated .gitignore
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] selftests: tpm2: create a dedicated .gitignore
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] TPM DEVICE DRIVER: tpmdd-next-6.14-rc1
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v2] selftests: tpm2: create a dedicated .gitignore
- From: Khaled Elnaggar <khaledelnaggarlinux@xxxxxxxxx>
- [PATCH] integrity: fix typos and spelling errors
- From: Tanya Agarwal <tanyaagarwal25699@xxxxxxxxx>
- Re: [PATCH v3 06/10] ima_violations.sh: Declare tcb builtin policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 09/10] ima_measurements.sh: Check policy for test3
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 10/10] tst_test.sh: IMA: Allow to disable LSM warnings and use it for IMA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 05/10] IMA: Read required policy from file
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 03/10] IMA: Move requirement check to ima_setup.sh
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 02/10] IMA: Add TCB policy as an example for ima_measurements.sh
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 01/10] ima_violations.sh: Fix log detection
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 00/10] LTP tests: load predefined policy, enhancements
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] selftests: tpm2: create a dedicated .gitignore
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [GIT PULL] TPM DEVICE DRIVER: tpmdd-next-6.14-rc1
- From: "Jarkko Sakkinen" <jarkko.sakkinen@xxxxxx>
- Re: [GIT PULL] KEYS: keys-next-6.13-rc1
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- [PATCH v3 6/6] ima: Reset IMA_NONACTION_RULE_FLAGS after post_setattr
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 5/6] ima: Defer fixing security.ima to __fput()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 4/6] ima: Mark concurrent accesses to the iint pointer in the inode security blob
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 3/6] ima: Detect if lock is held when iint pointer is set in inode security blob
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 2/6] ima: Remove inode lock
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 1/6] fs: ima: Remove S_IMA and IS_IMA()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 0/6] ima: Remove unnecessary inode locks
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v2] selftests: tpm2: create a dedicated .gitignore
- From: Khaled Elnaggar <khaledelnaggarlinux@xxxxxxxxx>
- Re: [GIT PULL] integrity: subsystem updates for v6.13
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v6 01/15] lib: Add TLV parser
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- Re: [PATCH v6 01/15] lib: Add TLV parser
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 01/15] lib: Add TLV parser
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 01/15] lib: Add TLV parser
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- Re: [PATCH v6 01/15] lib: Add TLV parser
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 01/15] lib: Add TLV parser
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- Re: [PATCH v2 0/6] module: Introduce hash-based integrity checking
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/6] module: Introduce hash-based integrity checking
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- Re: [PATCH v2 0/6] module: Introduce hash-based integrity checking
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [GIT PULL] KEYS: keys-next-6.14-rc1
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] KEYS: keys-next-6.13-rc1
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [GIT PULL] KEYS: keys-next-6.13-rc1
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v1] selftests: Handle old glibc without execveat(2)
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH v10] tpm: Map the ACPI provided event log
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH v10] tpm: Map the ACPI provided event log
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] ima: kexec: silence RCU list traversal warning
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [GIT PULL] integrity: subsystem updates for v6.14
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [GIT PULL] integrity: subsystem updates for v6.13 (please ignore)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [GIT PULL] integrity: subsystem updates for v6.13
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 5/7] ima: Set security.ima on file close when ima_appraise=fix
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v1] selftests: Handle old glibc without execveat(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v1] selftests: Handle old glibc without execveat(2)
- From: Günther Noack <gnoack3000@xxxxxxxxx>
- Re: [PATCH v10] tpm: Map the ACPI provided event log
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH v10] tpm: Map the ACPI provided event log
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v10] tpm: Map the ACPI provided event log
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH v2 7/7] ima: Reset IMA_NONACTION_RULE_FLAGS after post_setattr
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 6/7] ima: Discard files opened with O_PATH
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] ima: kexec: silence RCU list traversal warning
- From: Breno Leitao <leitao@xxxxxxxxxx>
- Re: [PATCH v10] tpm: Map the ACPI provided event log
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v9] tpm: Map the ACPI provided event log
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH v10] tpm: Map the ACPI provided event log
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v9] tpm: Map the ACPI provided event log
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v9] tpm: Map the ACPI provided event log
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v23 7/8] samples/check-exec: Add an enlighten "inc" interpreter and 28 tests
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v1] selftests: Handle old glibc without execveat(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v2 5/7] ima: Set security.ima on file close when ima_appraise=fix
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/7] ima: Ensure lock is held when setting iint pointer in inode security blob
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/7] ima: Remove inode lock
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] ima: limit the builtin 'tcb' dont_measure tmpfs policy rule
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH V2] security: fix typos and spelling errors
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v23 7/8] samples/check-exec: Add an enlighten "inc" interpreter and 28 tests
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH V2] security: fix typos and spelling errors
- From: Tanya Agarwal <tanyaagarwal25699@xxxxxxxxx>
- Re: [PATCH v2 4/7] ima: Mark concurrent accesses to the iint pointer in the inode security blob
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/7] ima: Ensure lock is held when setting iint pointer in inode security blob
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/7] ima: Remove inode lock
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [RFC PATCH] IMA: Remove evm_overlay.sh
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v3 07/10] ima_setup.sh: Add digest index detection for ima-buf format
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v3 08/10] ima_setup.sh: Allow to load predefined policy
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v3 06/10] ima_violations.sh: Declare tcb builtin policy
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v3 09/10] ima_measurements.sh: Check policy for test3
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v3 10/10] tst_test.sh: IMA: Allow to disable LSM warnings and use it for IMA
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v3 02/10] IMA: Add TCB policy as an example for ima_measurements.sh
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v3 05/10] IMA: Read required policy from file
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v3 00/10] LTP tests: load predefined policy, enhancements
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v3 04/10] IMA: Add example policy for ima_violations.sh
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v3 01/10] ima_violations.sh: Fix log detection
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v3 03/10] IMA: Move requirement check to ima_setup.sh
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 3/3] x86/sev: add a SVSM vTPM platform device
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH] ima_violations.sh: Fix log detection
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH V2] security: fix typos and spelling errors
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH V2] security: fix typos and spelling errors
- From: Günther Noack <gnoack3000@xxxxxxxxx>
- Re: [PATCH V2] security: fix typos and spelling errors
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V2] security: fix typos and spelling errors
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V2] security: fix typos and spelling errors
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH V2] security: fix typos and spelling errors
- From: Tanya Agarwal <tanyaagarwal25699@xxxxxxxxx>
- Re: [PATCH] security: fix typos and spelling errors
- From: Günther Noack <gnoack3000@xxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]