Linux Integrity
[Prev Page][Next Page]
- Re: [PATCH v3 1/4] x86/sev: add SVSM vTPM probe/send_command functions
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v2 03/13] ima: invalidate unsupported PCR banks
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 07/13] tpm: enable bank selection for PCR extend
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 10/13] tpm: authenticate tpm2_pcr_read()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 10/13] tpm: authenticate tpm2_pcr_read()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v1 6/7] ima: invalidate unsupported PCR banks once at first use
- From: Nicolai Stange <nstange@xxxxxxx>
- [no subject]
- [RFC PATCH v2 12/13] ima: make ima_free_tfm()'s linkage extern
- From: Nicolai Stange <nstange@xxxxxxx>
- [RFC PATCH v2 11/13] ima: introduce ima_pcr_invalidated_banks() helper
- From: Nicolai Stange <nstange@xxxxxxx>
- [RFC PATCH v2 13/13] ima: don't re-invalidate unsupported PCR banks after kexec
- From: Nicolai Stange <nstange@xxxxxxx>
- [RFC PATCH v2 09/13] ima: invalidate unsupported PCR banks only once
- From: Nicolai Stange <nstange@xxxxxxx>
- [RFC PATCH v2 10/13] tpm: authenticate tpm2_pcr_read()
- From: Nicolai Stange <nstange@xxxxxxx>
- [RFC PATCH v2 03/13] ima: invalidate unsupported PCR banks
- From: Nicolai Stange <nstange@xxxxxxx>
- [RFC PATCH v2 08/13] ima: track the set of PCRs ever extended
- From: Nicolai Stange <nstange@xxxxxxx>
- [RFC PATCH v2 06/13] ima: move INVALID_PCR() to ima.h
- From: Nicolai Stange <nstange@xxxxxxx>
- [RFC PATCH v2 01/13] ima: don't expose runtime_measurements for unsupported hashes
- From: Nicolai Stange <nstange@xxxxxxx>
- [RFC PATCH v2 07/13] tpm: enable bank selection for PCR extend
- From: Nicolai Stange <nstange@xxxxxxx>
- [RFC PATCH v2 05/13] ima: select CRYPTO_SHA256 from Kconfig
- From: Nicolai Stange <nstange@xxxxxxx>
- [RFC PATCH v2 04/13] ima: make SHA1 non-mandatory
- From: Nicolai Stange <nstange@xxxxxxx>
- [RFC PATCH v2 02/13] ima: always create runtime_measurements sysfs file for ima_hash
- From: Nicolai Stange <nstange@xxxxxxx>
- [RFC PATCH v2 00/13] ima: get rid of hard dependency on SHA-1
- From: Nicolai Stange <nstange@xxxxxxx>
- Re: [GIT PULL] KEYS: keys-next-6.14-rc8
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH] Revert "integrity: Do not load MOK and MOKx when secure boot be disabled"
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm, tpm_tis: Workaround failed command reception on Infineon devices
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 1/4] x86/sev: add SVSM vTPM probe/send_command functions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [GIT PULL] KEYS: keys-next-6.14-rc8
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/4] x86/sev: add SVSM vTPM probe/send_command functions
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm, tpm_tis: Workaround failed command reception on Infineon devices
- From: Jonathan McDowell <noodles@xxxxxxxx>
- Re: [PATCH v10 8/8] ima: measure kexec load and exec events as critical data
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 7/8] ima: make the kexec extra memory configurable
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v10 6/8] ima: kexec: move IMA log copy from kexec load to execute
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 6/8] ima: kexec: move IMA log copy from kexec load to execute
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/8] ima: define and call ima_alloc_kexec_file_buf()
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 1/8] ima: rename variable the ser_file "file" to "ima_kexec_file"
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 1/8] ima: rename variable the ser_file "file" to "ima_kexec_file"
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Revert "integrity: Do not load MOK and MOKx when secure boot be disabled"
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/4] x86/sev: add SVSM vTPM probe/send_command functions
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH] Revert "integrity: Do not load MOK and MOKx when secure boot be disabled"
- From: Lennart Poettering <mzxreary@xxxxxxxxxxx>
- Re: [PATCH] Revert "integrity: Do not load MOK and MOKx when secure boot be disabled"
- From: lee joey <joeyli.kernel@xxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/4] x86/sev: add SVSM vTPM probe/send_command functions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 1/4] x86/sev: add SVSM vTPM probe/send_command functions
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH] tpm: End any active auth session before shutdown
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 0/2] tpm: add send_recv() op and use it in tpm_ftpm_tee driver
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH 2/2] tpm/tpm_ftpm_tee: use send_recv() op
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH 1/2] tpm: add send_recv() op in tpm_class_ops
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: dcp: Use kfree_sensitive() to fix Coccinelle warnings
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 1/4] x86/sev: add SVSM vTPM probe/send_command functions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 4/4] x86/sev: register tpm-svsm platform device
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 3/4] tpm: add SNP SVSM vTPM driver
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 3/4] tpm: add SNP SVSM vTPM driver
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] Revert "integrity: Do not load MOK and MOKx when secure boot be disabled"
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v10 2/8] ima: define and call ima_alloc_kexec_file_buf()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] Revert "integrity: Do not load MOK and MOKx when secure boot be disabled"
- From: Lennart Poettering <mzxreary@xxxxxxxxxxx>
- Re: [PATCH v3 3/4] tpm: add SNP SVSM vTPM driver
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH 3/3] tpm/tpm_svsm: use send_recv() op
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH] KEYS: trusted: dcp: Use kfree_sensitive() to fix Coccinelle warnings
- From: Bo Liu <liubo03@xxxxxxxxxx>
- Re: [PATCH v10 8/8] ima: measure kexec load and exec events as critical data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 7/8] ima: make the kexec extra memory configurable
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v10 6/8] ima: kexec: move IMA log copy from kexec load to execute
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v10 2/8] ima: define and call ima_alloc_kexec_file_buf()
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v3 3/4] tpm: add SNP SVSM vTPM driver
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v10 6/8] ima: kexec: move IMA log copy from kexec load to execute
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH 3/3] tpm/tpm_svsm: use send_recv() op
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v10 2/8] ima: define and call ima_alloc_kexec_file_buf()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: End any active auth session before shutdown
- From: Jonathan McDowell <noodles@xxxxxxxx>
- Re: [PATCH v10 1/8] ima: rename variable the ser_file "file" to "ima_kexec_file"
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 4/8] ima: kexec: skip IMA segment validation after kexec soft reboot
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v10 3/8] kexec: define functions to map and unmap segments
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v10 2/8] ima: define and call ima_alloc_kexec_file_buf()
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v10 1/8] ima: rename variable the ser_file "file" to "ima_kexec_file"
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [RFC PATCH v1 6/7] ima: invalidate unsupported PCR banks once at first use
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 3/4] tpm: add SNP SVSM vTPM driver
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v1 6/7] ima: invalidate unsupported PCR banks once at first use
- From: Nicolai Stange <nstange@xxxxxxx>
- Re: [PATCH v10 1/8] ima: rename variable the ser_file "file" to "ima_kexec_file"
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3 3/4] tpm: add SNP SVSM vTPM driver
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v1 6/7] ima: invalidate unsupported PCR banks once at first use
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v1 0/7] ima: get rid of hard dependency on SHA-1
- From: Nicolai Stange <nstange@xxxxxxx>
- Re: [RFC PATCH v1 0/7] ima: get rid of hard dependency on SHA-1
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/3] tpm/tpm_ftpm_tee: use send_recv() op
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v3 4/4] x86/sev: register tpm-svsm platform device
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v3 3/4] tpm: add SNP SVSM vTPM driver
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v1 6/7] ima: invalidate unsupported PCR banks once at first use
- From: Nicolai Stange <nstange@xxxxxxx>
- Re: [PATCH v3 1/4] x86/sev: add SVSM vTPM probe/send_command functions
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v1 3/7] ima: move INVALID_PCR() to ima.h
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v1 6/7] ima: invalidate unsupported PCR banks once at first use
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v10 7/8] ima: make the kexec extra memory configurable
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 6/8] ima: kexec: move IMA log copy from kexec load to execute
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 8/8] ima: measure kexec load and exec events as critical data
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 4/8] ima: kexec: skip IMA segment validation after kexec soft reboot
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 5/8] ima: kexec: define functions to copy IMA log at soft boot
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 1/8] ima: rename variable the ser_file "file" to "ima_kexec_file"
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 3/8] kexec: define functions to map and unmap segments
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 2/8] ima: define and call ima_alloc_kexec_file_buf()
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 0/8] ima: kexec: measure events between kexec load and execute
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 2/7] kexec: define functions to map and unmap segments
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/4] tpm: add SNP SVSM vTPM driver
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 1/4] x86/sev: add SVSM vTPM probe/send_command functions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 4/4] x86/sev: register tpm-svsm platform device
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 0/6] Drivers for Loongson security engine
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [PATCH v3 4/4] x86/sev: register tpm-svsm platform device
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v3 3/4] tpm: add SNP SVSM vTPM driver
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v3 1/4] x86/sev: add SVSM vTPM probe/send_command functions
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH] MAINTAINERS: Add include/linux/tpm*.h to TPM maintainers
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 1/4] x86/sev: add SVSM vTPM probe/send_command functions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 1/5] tpm_crb: ffa_tpm: implement driver compliant to CRB over FF-A
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm/tpm_ftpm_tee: fix struct ftpm_tee_private documentation
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 5/6] tpm: Add a driver for Loongson TPM device
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] ima_violations.sh: Fix condition evaluation
- From: Petr Vorel <pvorel@xxxxxxx>
- [RFC PATCH v1 7/7] ima: make SHA1 non-mandatory
- From: Nicolai Stange <nstange@xxxxxxx>
- [RFC PATCH v1 6/7] ima: invalidate unsupported PCR banks once at first use
- From: Nicolai Stange <nstange@xxxxxxx>
- [RFC PATCH v1 5/7] tpm: enable bank selection for PCR extend
- From: Nicolai Stange <nstange@xxxxxxx>
- [RFC PATCH v1 4/7] ima: track the set of PCRs ever extended
- From: Nicolai Stange <nstange@xxxxxxx>
- [RFC PATCH v1 3/7] ima: move INVALID_PCR() to ima.h
- From: Nicolai Stange <nstange@xxxxxxx>
- [RFC PATCH v1 2/7] ima: always create runtime_measurements sysfs file for ima_hash
- From: Nicolai Stange <nstange@xxxxxxx>
- [RFC PATCH v1 1/7] ima: don't expose runtime_measurements for unsupported hashes
- From: Nicolai Stange <nstange@xxxxxxx>
- [RFC PATCH v1 0/7] ima: get rid of hard dependency on SHA-1
- From: Nicolai Stange <nstange@xxxxxxx>
- Re: [RFC PATCH 2/3] tpm/tpm_ftpm_tee: use send_recv() op
- From: Jens Wiklander <jens.wiklander@xxxxxxxxxx>
- Re: [PATCH v5 0/6] Drivers for Loongson security engine
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- [PATCH] tpm/tpm_ftpm_tee: fix struct ftpm_tee_private documentation
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v5 0/6] Drivers for Loongson security engine
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [RFC PATCH 2/3] tpm/tpm_ftpm_tee: use send_recv() op
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v5 5/6] tpm: Add a driver for Loongson TPM device
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- [PATCH v5 6/6] MAINTAINERS: Add tpm_lsse.c to LOONGSON CRYPTO DRIVER entry
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- [PATCH v5 4/6] MAINTAINERS: Add entry for Loongson RNG driver
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- [PATCH v5 1/6] mfd: Add support for Loongson Security Module
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- [PATCH v5 3/6] crypto: loongson - add Loongson RNG driver support
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- [PATCH v5 2/6] MAINTAINERS: Add entry for Loongson Security Module driver
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- [PATCH v5 0/6] Drivers for Loongson security engine
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- [PATCH v8 2/5] tpm_crb: clean-up and refactor check for idle support
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v8 5/5] Documentation: tpm: add documentation for the CRB FF-A interface
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v8 1/5] tpm_crb: ffa_tpm: implement driver compliant to CRB over FF-A
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v8 4/5] tpm_crb: add support for the Arm FF-A start method
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- tFrom 1dc5533382b9951c70b1a38f02065b41453b175a Mon Sep 17 00:00:00 2001
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v8 3/5] ACPICA: add start method for Arm FF-A
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- Re: Build error on -next due to tpm_crb.c changes?
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- Re: [RFC PATCH] IMA: Remove evm_overlay.sh
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v3 2/4] svsm: add header with SVSM_VTPM_CMD helpers
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v3 1/4] x86/sev: add SVSM vTPM probe/send_command functions
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v9 4/7] ima: kexec: define functions to copy IMA log at soft boot
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v4 1/6] mfd: Add support for Loongson Security Module
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- Re: [PATCH v4 1/6] mfd: Add support for Loongson Security Module
- From: Lee Jones <lee@xxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: Add include/linux/tpm*.h to TPM maintainers
- From: WangYuli <wangyuli@xxxxxxxxxxxxx>
- Re: Build error on -next due to tpm_crb.c changes?
- From: Thorsten Leemhuis <linux@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: eventlog: Declare mapping_size __maybe_unused
- From: WangYuli <wangyuli@xxxxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: Add include/linux/tpm*.h to TPM maintainers
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: eventlog: Declare mapping_size __maybe_unused
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: eventlog: Declare mapping_size __maybe_unused
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 0/5] Add support for the TPM FF-A start method
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: Build error on -next due to tpm_crb.c changes?
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: Build error on -next due to tpm_crb.c changes? (was: Re: [PATCH v6 0/5] Add support for the TPM FF-A start method)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: Build error on -next due to tpm_crb.c changes?
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- Re: [PATCH v9 1/7] ima: copy only complete measurement records across kexec
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: Build error on -next due to tpm_crb.c changes?
- From: Sudeep Holla <sudeep.holla@xxxxxxx>
- Re: Build error on -next due to tpm_crb.c changes?
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- Re: Build error on -next due to tpm_crb.c changes?
- From: Thorsten Leemhuis <linux@xxxxxxxxxxxxx>
- Re: Build error on -next due to tpm_crb.c changes?
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- Re: [PATCH v6 0/5] Add support for the TPM FF-A start method
- From: Sudeep Holla <sudeep.holla@xxxxxxx>
- Build error on -next due to tpm_crb.c changes? (was: Re: [PATCH v6 0/5] Add support for the TPM FF-A start method)
- From: Thorsten Leemhuis <linux@xxxxxxxxxxxxx>
- [PATCH] MAINTAINERS: Add include/linux/tpm*.h to TPM maintainers
- From: WangYuli <wangyuli@xxxxxxxxxxxxx>
- Re: [PATCH v9 1/7] ima: copy only complete measurement records across kexec
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] tpm: eventlog: Declare mapping_size __maybe_unused
- From: WangYuli <wangyuli@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/4] svsm: add header with SVSM_VTPM_CMD helpers
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [RFC PATCH 2/3] tpm/tpm_ftpm_tee: use send_recv() op
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [RFC PATCH 3/3] tpm/tpm_svsm: use send_recv() op
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [RFC PATCH 0/3] tpm: add send_recv() op and use it in tpm_ftpm_tee and tpm_svsm drivers
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [RFC PATCH 1/3] tpm: add send_recv() op in tpm_class_ops
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v3 1/4] x86/sev: add SVSM vTPM probe/send_command functions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm, tpm_tis: Fix timeout handling when waiting for TPM status
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm, tpm_tis: Workaround failed command reception on Infineon devices
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v3 4/4] x86/sev: register tpm-svsm platform device
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH v3 3/4] tpm: add SNP SVSM vTPM driver
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH v3 2/4] svsm: add header with SVSM_VTPM_CMD helpers
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH v3 1/4] x86/sev: add SVSM vTPM probe/send_command functions
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH v3 0/4] Enlightened vTPM support for SVSM on SEV-SNP
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH] tpm: Clarify "auth session active" message
- From: Andrew Sayers <kernel.org@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH] IMA: Remove evm_overlay.sh
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm, tpm_tis: Workaround failed command reception on Infineon devices
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2 2/6] x86/sev: add SVSM vTPM probe/send_command functions
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v2 2/6] x86/sev: add SVSM vTPM probe/send_command functions
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v2 2/6] x86/sev: add SVSM vTPM probe/send_command functions
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v2 2/6] x86/sev: add SVSM vTPM probe/send_command functions
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v2 2/6] x86/sev: add SVSM vTPM probe/send_command functions
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v2 2/6] x86/sev: add SVSM vTPM probe/send_command functions
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v2 2/6] x86/sev: add SVSM vTPM probe/send_command functions
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH v2] tpm, tpm_tis: Fix timeout handling when waiting for TPM status
- From: Jonathan McDowell <noodles@xxxxxxxx>
- [PATCH v2] tpm, tpm_tis: Workaround failed command reception on Infineon devices
- From: Jonathan McDowell <noodles@xxxxxxxx>
- Re: [RFC PATCH v2 1/6] x86/sev: add SVSM call macros for the vTPM protocol
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v2 2/6] x86/sev: add SVSM vTPM probe/send_command functions
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v6 0/5] Add support for the TPM FF-A start method
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 1/6] x86/sev: add SVSM call macros for the vTPM protocol
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH] tpm: efi: Improve exception handling in tpm_read_log_efi()
- From: Markus Elfring <Markus.Elfring@xxxxxx>
- Re: [PATCH] tpm: Drop warning when an auth session is active
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v12 04/19] x86: Secure Launch main header file
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v12 03/19] x86: Secure Launch Resource Table header file
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v12 10/19] x86: Secure Launch kernel late boot stub
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v12 09/19] x86: Secure Launch kernel early boot stub
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v12 17/19] tpm, sysfs: Show locality used by kernel
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v12 04/19] x86: Secure Launch main header file
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v12 15/19] tpm, tpm_tis: Address positive localities in tpm_tis_request_locality()
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v12 08/19] x86/boot: Place TXT MLE header in the kernel_info section
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v12 03/19] x86: Secure Launch Resource Table header file
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v12 07/19] x86/msr: Add variable MTRR base/mask and x2apic ID registers
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v12 04/19] x86: Secure Launch main header file
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v12 03/19] x86: Secure Launch Resource Table header file
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH] tpm: Drop warning when an auth session is active
- From: Jonathan McDowell <noodles@xxxxxxxx>
- Re: [PATCH] tpm, tpm_tis: Workaround failed command reception on Infineon devices
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm, tpm_tis: Workaround failed command reception on Infineon devices
- From: Jonathan McDowell <noodles@xxxxxxxx>
- Re: [PATCH] tpm: Drop warning when an auth session is active
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: Lazily flush auth session when getting random data
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 3/6] tpm: add send_recv() ops in tpm_class_ops
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 3/6] tpm: add send_recv() ops in tpm_class_ops
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v2 3/6] tpm: add send_recv() ops in tpm_class_ops
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH] tpm: End any active auth session before shutdown
- From: Jonathan McDowell <noodles@xxxxxxxx>
- [PATCH] tpm: Lazily flush auth session when getting random data
- From: Jonathan McDowell <noodles@xxxxxxxx>
- [PATCH] tpm: Drop warning when an auth session is active
- From: Jonathan McDowell <noodles@xxxxxxxx>
- Re: [RFC PATCH] IMA: Remove evm_overlay.sh
- From: Petr Vorel <pvorel@xxxxxxx>
- Bounce probe for linux-integrity@xxxxxxxxxxxxxxx (no action required)
- From: linux-integrity+owner@xxxxxxxxxxxxxxx
- Re: [PATCH v12 17/19] tpm, sysfs: Show locality used by kernel
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v12 16/19] tpm, tpm_tis: Allow locality to be set to a different value
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v12 15/19] tpm, tpm_tis: Address positive localities in tpm_tis_request_locality()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v12 14/19] tpm, tpm_tis: Close all localities
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v12 10/19] x86: Secure Launch kernel late boot stub
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v12 09/19] x86: Secure Launch kernel early boot stub
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v12 08/19] x86/boot: Place TXT MLE header in the kernel_info section
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v12 07/19] x86/msr: Add variable MTRR base/mask and x2apic ID registers
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v12 06/19] x86: Add early SHA-256 support for Secure Launch early measurements
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v12 05/19] x86: Add early SHA-1 support for Secure Launch early measurements
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v12 04/19] x86: Secure Launch main header file
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v12 03/19] x86: Secure Launch Resource Table header file
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v12 01/19] Documentation/x86: Secure Launch kernel documentation
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v12 01/19] Documentation/x86: Secure Launch kernel documentation
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 1/7] ima: copy only complete measurement records across kexec
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 1/7] ima: copy only complete measurement records across kexec
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 0/5] Add support for the TPM FF-A start method
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 1/5] tpm_crb: implement driver compliant to CRB over FF-A
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm, tpm_tis: Fix timeout handling when waiting for TPM status
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH] tpm, tpm_tis: Workaround failed command reception on Infineon devices
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 3/6] tpm: add send_recv() ops in tpm_class_ops
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 3/6] tpm: add send_recv() ops in tpm_class_ops
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: Unbalanced TPM2 HMAC session calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: Unbalanced TPM2 HMAC session calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 5/5] ima_violations.sh: require kernel v6.14 for minimizing violations tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Unbalanced TPM2 HMAC session calls
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Unbalanced TPM2 HMAC session calls
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] tpm: Remove duplicate documentation
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: Unbalanced TPM2 HMAC session calls
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] ima_setup.sh: Check 'cat' exit code when loading policy
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v3 5/5] ima_violations.sh: require kernel v6.14 for minimizing violations tests
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v3 1/5] ima_violations.sh: force $LOG ToMToU violation earlier
- From: Petr Vorel <pvorel@xxxxxxx>
- Unbalanced TPM2 HMAC session calls
- From: Jonathan McDowell <noodles@xxxxxxxx>
- Re: [RFC][PATCH] ima: add measurement for first unverified write on ima policy file
- From: "Enrico Bravi" <enrico.bravi@xxxxxxxxx>
- [PATCH] tpm, tpm_tis: Workaround failed command reception on Infineon devices
- From: Jonathan McDowell <noodles@xxxxxxxx>
- Re: [RFC][PATCH] ima: add measurement for first unverified write on ima policy file
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC][PATCH] ima: add measurement for first unverified write on ima policy file
- From: "Enrico Bravi" <enrico.bravi@xxxxxxxxx>
- Re: [PATCH v9 2/7] kexec: define functions to map and unmap segments
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH v2 3/6] tpm: add send_recv() ops in tpm_class_ops
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH v6 5/5] Documentation: tpm: add documentation for the CRB FF-A interface
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v6 4/5] tpm_crb: add support for the Arm FF-A start method
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v6 1/5] tpm_crb: implement driver compliant to CRB over FF-A
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v6 3/5] ACPICA: add start method for Arm FF-A
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v6 2/5] tpm_crb: clean-up and refactor check for idle support
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v6 0/5] Add support for the TPM FF-A start method
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- Re: [PATCH v4 0/5] Add support for the TPM FF-A start method
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v3 2/5] ima_violations.sh: Update validate() to support multiple violations
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 5/5] ima_violations.sh: require kernel v6.14 for minimizing violations tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 4/5] ima_violations.sh: additional ToMToU violation tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 3/5] ima_violations.sh: additional open-writer violation tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 1/5] ima_violations.sh: force $LOG ToMToU violation earlier
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 3/7] ima: kexec: skip IMA segment validation after kexec soft reboot
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v9 1/7] ima: copy only complete measurement records across kexec
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 2/7] kexec: define functions to map and unmap segments
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: [PATCH v9 1/7] ima: copy only complete measurement records across kexec
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v9 1/7] ima: copy only complete measurement records across kexec
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] tpm, tpm_tis: Fix timeout handling when waiting for TPM status
- From: Jonathan McDowell <noodles@xxxxxxxx>
- Re: [RFC PATCH v2 5/6] tpm: add SNP SVSM vTPM driver
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v2 3/6] tpm: add send_recv() ops in tpm_class_ops
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC][PATCH] ima: add measurement for first unverified write on ima policy file
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 1/7] ima: copy only complete measurement records across kexec
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] arch/x86: Fix size overflows in sgx_encl_create()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 7/7] ima: measure kexec load and exec events as critical data
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 2/7] kexec: define functions to map and unmap segments
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] arch/x86: Fix size overflows in sgx_encl_create()
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 7/7] ima: measure kexec load and exec events as critical data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] arch/x86: Fix size overflows in sgx_encl_create()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] arch/x86: Fix size overflows in sgx_encl_create()
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v2] arch/x86: Fix size overflows in sgx_encl_create()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2] arch/x86: Fix size overflows in sgx_encl_create()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 2/7] kexec: define functions to map and unmap segments
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 2/4] ima_violations.sh: Update validate() to support multiple violations
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2 3/6] tpm: add send_recv() ops in tpm_class_ops
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v9 6/7] ima: make the kexec extra memory configurable
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 3/7] ima: kexec: skip IMA segment validation after kexec soft reboot
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 5/7] ima: kexec: move IMA log copy from kexec load to execute
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 7/7] ima: measure kexec load and exec events as critical data
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 0/7] ima: kexec: measure events between kexec load and execute
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 4/7] ima: kexec: define functions to copy IMA log at soft boot
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 2/7] kexec: define functions to map and unmap segments
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 1/7] ima: copy only complete measurement records across kexec
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 4/6] tpm: add interface to interact with devices based on TCG Simulator
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 2/4] ima_violations.sh: Update validate() to support multiple violations
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [RFC PATCH v2 5/6] tpm: add SNP SVSM vTPM driver
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 3/6] tpm: add send_recv() ops in tpm_class_ops
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 2/7] kexec: define functions to map and unmap segments
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 0/5] Add support for the TPM FF-A start method
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 4/6] tpm: add interface to interact with devices based on TCG Simulator
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v2 2/4] ima_violations.sh: Update validate() to support multiple violations
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/4] ima_violations.sh: Update validate() to support multiple violations
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v2 1/4] ima_violations.sh: force $LOG ToMToU violation earlier
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2 2/4] ima_violations.sh: Update validate() to support multiple violations
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2 1/4] ima_violations.sh: force $LOG ToMToU violation earlier
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] ima_violations.sh: force $LOG ToMToU violation earlier
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 4/4] ima_violations.sh: additional ToMToU violation tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 2/4] ima_violations.sh: Update validate() to support multiple violations
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 3/4] ima_violations.sh: additional open-writer violation tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 1/4] ima_violations.sh: force $LOG ToMToU violation earlier
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima_selinux.sh: Require ima_policy=critical_data kernel cmdline
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH] ima_kexec.sh: Detect kernel image from BOOT_IMAGE from /proc/cmdline
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 5/6] tpm: add SNP SVSM vTPM driver
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [RFC PATCH v2 4/6] tpm: add interface to interact with devices based on TCG Simulator
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v2 3/6] tpm: add send_recv() ops in tpm_class_ops
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v4 0/5] Add support for the TPM FF-A start method
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [RFC PATCH v2 4/6] tpm: add interface to interact with devices based on TCG Simulator
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v2 5/6] tpm: add SNP SVSM vTPM driver
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v2 3/6] tpm: add send_recv() ops in tpm_class_ops
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v2 0/6] Enlightened vTPM support for SVSM on SEV-SNP
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v2 5/6] tpm: add SNP SVSM vTPM driver
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v2 4/6] tpm: add interface to interact with devices based on TCG Simulator
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v2 3/6] tpm: add send_recv() ops in tpm_class_ops
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC][PATCH] ima: add measurement for first unverified write on ima policy file
- From: "Enrico Bravi" <enrico.bravi@xxxxxxxxx>
- Re: [PATCH v2 0/2] ima: minimize open-writers and ToMToU violations
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/5] Add support for the TPM FF-A start method
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: ftpm_tee: remove incorrect of_match_ptr annotation
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 5/6] tpm: add SNP SVSM vTPM driver
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: ftpm_tee: remove incorrect of_match_ptr annotation
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 5/6] tpm: add SNP SVSM vTPM driver
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 4/6] tpm: add interface to interact with devices based on TCG Simulator
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 3/6] tpm: add send_recv() ops in tpm_class_ops
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 0/6] Enlightened vTPM support for SVSM on SEV-SNP
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [RFC PATCH v2 5/6] tpm: add SNP SVSM vTPM driver
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH v2 2/2] ima: limit the number of ToMToU integrity violations
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 1/2] ima: limit the number of open-writers integrity violations
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 0/2] ima: minimize open-writers and ToMToU violations
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC PATCH v2 6/6] x86/sev: register tpm-svsm platform device
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [RFC PATCH v2 5/6] tpm: add SNP SVSM vTPM driver
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [RFC PATCH v2 4/6] tpm: add interface to interact with devices based on TCG Simulator
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [RFC PATCH v2 2/6] x86/sev: add SVSM vTPM probe/send_command functions
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [RFC PATCH v2 3/6] tpm: add send_recv() ops in tpm_class_ops
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [RFC PATCH v2 1/6] x86/sev: add SVSM call macros for the vTPM protocol
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [RFC PATCH v2 0/6] Enlightened vTPM support for SVSM on SEV-SNP
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 0/6] Drivers for Loongson security engine
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 2/7] kexec: define functions to map and unmap segments
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 00/13] Clavis LSM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 2/7] kexec: define functions to map and unmap segments
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] ima: add measurement for first unverified write on ima policy file
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC][PATCH] ima: add measurement for first unverified write on ima policy file
- From: "Enrico Bravi" <enrico.bravi@xxxxxxxxx>
- [PATCH] MAINTAINERS: .mailmap: Update Sumit Garg's email address
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH] tpm: ftpm_tee: remove incorrect of_match_ptr annotation
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH 2/2] ima: limit the number of ToMToU integrity violations
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC][PATCH] ima: add measurement for first unverified write on ima policy file
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] ima: add measurement for first unverified write on ima policy file
- From: "Enrico Bravi" <enrico.bravi@xxxxxxxxx>
- Re: [GIT PULL] integrity: subsystem fixes for v6.14
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH 2/2] ima: limit the number of ToMToU integrity violations
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [GIT PULL] integrity: subsystem fixes for v6.14
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4 6/6] MAINTAINERS: Add tpm_lsse.c to LOONGSON CRYPTO DRIVER entry
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- [PATCH v4 5/6] tpm: Add a driver for Loongson TPM device
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- [PATCH v4 4/6] MAINTAINERS: Add entry for Loongson RNG driver
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- [PATCH v4 2/6] MAINTAINERS: Add entry for Loongson Security Module driver
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- [PATCH v4 1/6] mfd: Add support for Loongson Security Module
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- [PATCH v4 3/6] crypto: loongson - add Loongson RNG driver support
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- [PATCH v4 0/6] Drivers for Loongson security engine
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- Re: [RFC][PATCH] ima: add measurement for first unverified write on ima policy file
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 2/7] kexec: define functions to map and unmap segments
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v8 2/7] kexec: define functions to map and unmap segments
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH] tpm: ftpm_tee: remove incorrect of_match_ptr annotation
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [RFC][PATCH] ima: add measurement for first unverified write on ima policy file
- From: Enrico Bravi <enrico.bravi@xxxxxxxxx>
- Re: [RFC PATCH 3/3] ima: additional ToMToU violation tests
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v8 2/7] kexec: define functions to map and unmap segments
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v8 2/7] kexec: define functions to map and unmap segments
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 3/3] ima: additional ToMToU violation tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] ima_kexec.sh: Detect kernel image from BOOT_IMAGE from /proc/cmdline
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Michal Suchánek <msuchanek@xxxxxxx>
- [PATCH] ima_selinux.sh: Require ima_policy=critical_data kernel cmdline
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v8 2/7] kexec: define functions to map and unmap segments
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH 0/4] Add support for the TPM FF-A start method
- From: Sudeep Holla <sudeep.holla@xxxxxxx>
- Re: [PATCH v8 7/7] ima: measure kexec load and exec events as critical data
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 3/7] ima: kexec: skip IMA segment validation after kexec soft reboot
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 2/7] kexec: define functions to map and unmap segments
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 1/7] ima: define and call ima_alloc_kexec_file_buf
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 4/7] ima: kexec: define functions to copy IMA log at soft boot
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v8 4/7] ima: kexec: define functions to copy IMA log at soft boot
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] Add support for the TPM FF-A start method
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- Re: [PATCH 2/2] ima: limit the number of ToMToU integrity violations
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] ima: limit the number of open-writers integrity violations
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] ima: limit both open-writers and ToMToU violations
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 3/7] ima: kexec: skip IMA segment validation after kexec soft reboot
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] Add support for the TPM FF-A start method
- From: Sudeep Holla <sudeep.holla@xxxxxxx>
- Re: [PATCH 0/4] Add support for the TPM FF-A start method
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Jonathan McDowell <noodles@xxxxxxxx>
- Re: [PATCH 2/2] ima: limit the number of ToMToU integrity violations
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 1/2] ima: limit the number of open-writers integrity violations
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [RFC PATCH 3/3] ima: additional ToMToU violation tests
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [RFC PATCH 3/3] ima: additional ToMToU violation tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 7/7] ima: measure kexec load and exec events as critical data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH 3/3] ima: additional ToMToU violation tests
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v8 6/7] ima: make the kexec extra memory configurable
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/5] tpm_crb: clean-up and refactor check for idle support
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 2/5] tpm_crb: clean-up and refactor check for idle support
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH 3/3] ima: additional ToMToU violation tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH 3/3] ima: additional ToMToU violation tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH 3/3] ima: additional ToMToU violation tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH 3/3] ima: additional ToMToU violation tests
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v5 2/5] tpm_crb: clean-up and refactor check for idle support
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: [PATCH v5 1/5] tpm_crb: implement driver compliant to CRB over FF-A
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- Re: [RFC PATCH 2/3] ima: additional open-writer violation tests
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v5 2/5] tpm_crb: clean-up and refactor check for idle support
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- Re: [RFC PATCH 3/3] ima: additional ToMToU violation tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH 1/3] Update validate() to support multiple violations
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [RFC PATCH 3/3] ima: additional ToMToU violation tests
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 2/2] ima: limit the number of ToMToU integrity violations
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 1/2] ima: limit the number of open-writers integrity violations
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [RFC PATCH 3/3] ima: additional ToMToU violation tests
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v8 2/7] kexec: define functions to map and unmap segments
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 1/7] ima: define and call ima_alloc_kexec_file_buf
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC PATCH 1/3] Update validate() to support multiple violations
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC PATCH 3/3] ima: additional ToMToU violation tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC PATCH 2/3] ima: additional open-writer violation tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] ima: limit the number of ToMToU integrity violations
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] ima: limit the number of open-writers integrity violations
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v8 1/7] ima: define and call ima_alloc_kexec_file_buf
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 1/7] ima: define and call ima_alloc_kexec_file_buf
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH V3 5/6] tpm: Add a driver for Loongson TPM device
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V3 5/6] tpm: Add a driver for Loongson TPM device
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- Re: [PATCH V3 2/6] MAINTAINERS: Add maintainer for Loongson Security Module driver
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- Re: [PATCH v5 1/5] tpm_crb: implement driver compliant to CRB over FF-A
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 5/5] Documentation: tpm: add documentation for the CRB FF-A interface
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 2/5] tpm_crb: clean-up and refactor check for idle support
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 1/5] tpm_crb: implement driver compliant to CRB over FF-A
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: [PATCH v8 5/7] ima: kexec: move IMA log copy from kexec load to execute
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v8 2/7] kexec: define functions to map and unmap segments
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Jonathan McDowell <noodles@xxxxxxxx>
- [PATCH v5 5/5] Documentation: tpm: add documentation for the CRB FF-A interface
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v5 2/5] tpm_crb: clean-up and refactor check for idle support
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v5 4/5] tpm_crb: add support for the Arm FF-A start method
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v5 1/5] tpm_crb: implement driver compliant to CRB over FF-A
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v5 3/5] ACPICA: add start method for Arm FF-A
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v5 0/5] Add support for the TPM FF-A start method
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- Re: [PATCH v8 7/7] ima: measure kexec load and exec events as critical data
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 4/7] ima: kexec: define functions to copy IMA log at soft boot
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 5/7] ima: kexec: move IMA log copy from kexec load to execute
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] ima_setup.sh: Postpone loading policy after test setup
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH 2/2] ima_setup.sh: Check 'cat' exit code when loading policy
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH 2/2] ima: limit the number of ToMToU integrity violations
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 7/7] ima: measure kexec load and exec events as critical data
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 1/2] ima: limit the number of open-writers integrity violations
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 0/2] ima: limit both open-writers and ToMToU violations
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 5/7] ima: kexec: move IMA log copy from kexec load to execute
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v8 4/7] ima: kexec: define functions to copy IMA log at soft boot
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH V3 5/6] tpm: Add a driver for Loongson TPM device
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V3 2/6] MAINTAINERS: Add maintainer for Loongson Security Module driver
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- [PATCH V3 3/6] crypto: loongson - add Loongson RNG driver support
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- [PATCH V3 4/6] MAINTAINERS: Add maintainer for Loongson RNG driver
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- [PATCH V3 6/6] MAINTAINERS: Add tpm_lsse.c to LOONGSON CRYPTO DRIVER entry
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- [PATCH V3 5/6] tpm: Add a driver for Loongson TPM device
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- [PATCH V3 0/6] Drivers for Loongson security engine
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- [PATCH V3 0/6] Drivers for Loongson security engine
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- [PATCH V3 1/6] mfd: Add support for Loongson Security Module
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- [PATCH V3 2/6] MAINTAINERS: Add maintainer for Loongson Security Module driver
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- [Announce] Linux Security Summit Europe 2025 CfP
- From: "Reshetova, Elena" <elena.reshetova@xxxxxxxxx>
- [PATCH v8 7/7] ima: measure kexec load and exec events as critical data
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 0/7] ima: kexec: measure events between kexec load and execute
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 4/7] ima: kexec: define functions to copy IMA log at soft boot
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 5/7] ima: kexec: move IMA log copy from kexec load to execute
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 6/7] ima: make the kexec extra memory configurable
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 3/7] ima: kexec: skip IMA segment validation after kexec soft reboot
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 2/7] kexec: define functions to map and unmap segments
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 1/7] ima: define and call ima_alloc_kexec_file_buf
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Issue of historical file and script invocation when using IMA for runtime attestation
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v12 00/19] x86: Trenchboot secure dynamic launch Linux kernel support
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v7 0/7] ima: kexec: measure events between kexec load and execute
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC] Issue of historical file and script invocation when using IMA for runtime attestation
- From: "Wang, Nicholas" <chenkai3@xxxxxxxxxxxx>
- Re: [PATCH v12 00/19] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v12 00/19] x86: Trenchboot secure dynamic launch Linux kernel support
- From: ross.philipson@xxxxxxxxxx
- [PATCH v7 6/7] ima: make the kexec extra memory configurable
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 7/7] ima: measure kexec load and exec events as critical data
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 5/7] ima: kexec: move IMA log copy from kexec load to execute
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 2/7] kexec: define functions to map and unmap segments
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 4/7] ima: kexec: define functions to copy IMA log at soft boot
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 1/7] ima: define and call ima_alloc_kexec_file_buf
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 0/7] ima: kexec: measure events between kexec load and execute
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 3/7] ima: kexec: skip IMA segment validation after kexec soft reboot
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] mailmap: remove never used @parity.io email
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] MAINTAINERS: remove never used @parity.io email
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 4/5] tpm_crb: add support for the Arm FF-A start method
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxx>
- Re: [PATCH v4 3/5] ACPICA: add start method for Arm FF-A
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxx>
- Re: [PATCH v4 2/5] tpm_crb: clean-up and refactor check for idle support
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxx>
- Re: [PATCH v4 1/5] tpm_crb: implement driver compliant to CRB over FF-A
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 2/7] kexec: define functions to map and unmap segments
- From: Baoquan He <bhe@xxxxxxxxxx>
- [PATCH v4 5/5] Documentation: tpm: add documentation for the CRB FF-A interface
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v4 4/5] tpm_crb: add support for the Arm FF-A start method
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v4 3/5] ACPICA: add start method for Arm FF-A
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v4 1/5] tpm_crb: implement driver compliant to CRB over FF-A
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v4 2/5] tpm_crb: clean-up and refactor check for idle support
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v4 0/5] Add support for the TPM FF-A start method
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH COMMITTED] ima_setup.sh: Quit the test on unsuitable IMA policy
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 0/4] Add support for the TPM FF-A start method
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- Re: [Announce] Linux Security Summit North America 2025 CfP
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/5] tpm_crb: implement driver compliant to CRB over FF-A
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 4/5] tpm_crb: add support for the Arm FF-A start method
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- Re: [PATCH v3 2/5] tpm_crb: refactor check for idle support into TPM into inline function
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- Re: [PATCH v3 1/5] tpm_crb: implement driver compliant to CRB over FF-A
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- Re: [LTP] [PATCH 1/2] tst_security.sh: Fix SELinux detection
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [LTP] [PATCH 2/2] ima_selinux.sh: Detect SELinux before loading policy
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 2/2] ima_selinux.sh: Detect SELinux before loading policy
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [LTP] [PATCH 2/2] ima_selinux.sh: Detect SELinux before loading policy
- From: Andrea Cervesato <andrea.cervesato@xxxxxxxx>
- Re: [LTP] [PATCH 1/2] tst_security.sh: Fix SELinux detection
- From: Andrea Cervesato <andrea.cervesato@xxxxxxxx>
- [PATCH 2/2] ima_selinux.sh: Detect SELinux before loading policy
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH 1/2] tst_security.sh: Fix SELinux detection
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [Announce] Linux Security Summit North America 2025 CfP
- From: "Dr. Greg" <greg@xxxxxxxxxxxx>
- Re: [robertosassu:evm-iint-ptr-v1-devel-v3] [evm] e38e699a42: will-it-scale.per_process_ops 160.4% improvement
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [robertosassu:evm-iint-ptr-v1-devel-v3] [evm] e38e699a42: will-it-scale.per_process_ops 160.4% improvement
- From: Mateusz Guzik <mjguzik@xxxxxxxxx>
- [robertosassu:evm-iint-ptr-v1-devel-v3] [evm] e38e699a42: will-it-scale.per_process_ops 160.4% improvement
- From: kernel test robot <oliver.sang@xxxxxxxxx>
- Re: [PATCH 0/4] Add support for the TPM FF-A start method
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v2 1/5] tpm_crb: implement driver compliant to CRB over FF-A
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v3 4/5] tpm_crb: add support for the Arm FF-A start method
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 2/5] tpm_crb: refactor check for idle support into TPM into inline function
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 1/5] tpm_crb: implement driver compliant to CRB over FF-A
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC] Issue of historical file and script invocation when using IMA for runtime attestation
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] tpm: Add a driver for Loongson TPM device
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- [PATCH v3 5/5] Documentation: tpm: add documentation for the CRB FF-A interface
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v3 2/5] tpm_crb: refactor check for idle support into TPM into inline function
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v3 0/5] Add support for the TPM FF-A start method
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v3 4/5] tpm_crb: add support for the Arm FF-A start method
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v3 1/5] tpm_crb: implement driver compliant to CRB over FF-A
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v3 3/5] ACPICA: add start method for Arm FF-A
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- Re: [PATCH v2 5/5] Documentation: tpm: add documentation for the CRB FF-A interface
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/5] tpm_crb: implement driver compliant to CRB over FF-A
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/5] tpm_crb: implement driver compliant to CRB over FF-A
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- Re: [PATCH v2 2/5] tpm_crb: refactor check for idle support into TPM into inline function
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- Re: [PATCH v2 5/5] Documentation: tpm: add documentation for the CRB FF-A interface
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- Re: [PATCH v2 1/5] tpm_crb: implement driver compliant to CRB over FF-A
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 2/5] tpm_crb: refactor check for idle support into TPM into inline function
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 5/5] Documentation: tpm: add documentation for the CRB FF-A interface
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 3/3] tpm: Add a driver for Loongson TPM device
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 0/4] Add support for the TPM FF-A start method
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- Re: [RFC] Issue of historical file and script invocation when using IMA for runtime attestation
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC] Issue of historical file and script invocation when using IMA for runtime attestation
- From: "Wang, Nicholas" <chenkai3@xxxxxxxxxxxx>
- Re: [PATCH 0/4] Add support for the TPM FF-A start method
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v2 3/3] tpm: Add a driver for Loongson TPM device
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- [PATCH v2 5/5] Documentation: tpm: add documentation for the CRB FF-A interface
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v2 3/5] ACPICA: add start method for Arm FF-A
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v2 4/5] tpm_crb: add support for the Arm FF-A start method
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v2 1/5] tpm_crb: implement driver compliant to CRB over FF-A
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v2 0/5] Add support for the TPM FF-A start method
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v2 2/5] tpm_crb: refactor check for idle support into TPM into inline function
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- Re: [PATCH 0/4] Add support for the TPM FF-A start method
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- Re: [PATCH v2 3/3] tpm: Add a driver for Loongson TPM device
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 2/7] kexec: define functions to map and unmap segments
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 07/13] keys: Add ability to track intended usage of the public key
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] Add support for the TPM FF-A start method
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v2 2/3] crypto: loongson - add Loongson RNG driver support
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- [PATCH v2 3/3] tpm: Add a driver for Loongson TPM device
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- [PATCH v2 1/3] mfd: Add support for Loongson Security Module
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- [PATCH v2 0/3] Drivers for Loongson security engine
- From: Qunqin Zhao <zhaoqunqin@xxxxxxxxxxx>
- Re: [PATCH v4] selftests: tpm2: test_smoke: use POSIX-conformant expression operator
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] selftests: tpm2: test_smoke: use POSIX-conformant expression operator
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/4] tpm_crb: implement driver compliant to CRB over FF-A
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- Re: [PATCH 0/4] Add support for the TPM FF-A start method
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH v4] selftests: tpm2: test_smoke: use POSIX-conformant expression operator
- From: Ahmed Salem <x0rw3ll@xxxxxxxxx>
- Re: [PATCH v3] selftests: tpm2: test_smoke: use POSIX-conformant expression operator
- From: Ahmed Salem <x0rw3ll@xxxxxxxxx>
- Re: [PATCH 3/4] ACPICA: add start method for Arm FF-A
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- Re: [PATCH 1/4] tpm_crb: implement driver compliant to CRB over FF-A
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 0/4] Add support for the TPM FF-A start method
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] selftests: tpm2: test_smoke: use POSIX-conformant expression operator
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 0/4] Add support for the TPM FF-A start method
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- Re: [PATCH 0/4] Add support for the TPM FF-A start method
- From: Sudeep Holla <sudeep.holla@xxxxxxx>
- Re: [PATCH 3/4] ACPICA: add start method for Arm FF-A
- From: Sudeep Holla <sudeep.holla@xxxxxxx>
- Re: [PATCH 0/4] Add support for the TPM FF-A start method
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v3] selftests: tpm2: test_smoke: use POSIX-conformant expression operator
- From: Ahmed Salem <x0rw3ll@xxxxxxxxx>
- [PATCH v2 RESEND] selftests: tpm2: test_smoke: use POSIX-conformant expression operator
- From: Ahmed Salem <x0rw3ll@xxxxxxxxx>
- [PATCH v2] selftests: tpm2: test_smoke: use POSIX-conformant expression operator
- From: Ahmed Salem <x0rw3ll@xxxxxxxxx>
- [PATCH 4/4] tpm_crb: add support for the Arm FF-A start method
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH 0/4] Add support for the TPM FF-A start method
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH 3/4] ACPICA: add start method for Arm FF-A
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH 1/4] tpm_crb: implement driver compliant to CRB over FF-A
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [PATCH 2/4] tpm_crb: refactor check for idle support into TPM into inline function
- From: Stuart Yoder <stuart.yoder@xxxxxxx>
- [Announce] Linux Security Summit North America 2025 CfP
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] selftests: tpm2: test_smoke: use POSIX-conformant expression operator
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: TPM operation times out (very rarely)
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: TPM operation times out (very rarely)
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 2/7] kexec: define functions to map and unmap segments
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- [PATCH] selftests: tpm2: test_smoke: use POSIX-conformant expression operator
- From: Ahmed Salem <x0rw3ll@xxxxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Jonathan McDowell <noodles@xxxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Jonathan McDowell <noodles@xxxxxxxx>
- Re: [PATCH v1] trusted_dcp.c: Do not return in case of non-secure mode
- From: Richard Weinberger <richard@xxxxxxxxxxxxx>
- [PATCH v1] trusted_dcp.c: Do not return in case of non-secure mode
- From: Kshitiz Varshney <kshitiz.varshney@xxxxxxx>
- Re: The business loan-
- From: David Song <chrispinerick@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: do not start chip while suspended
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v3 07/13] keys: Add ability to track intended usage of the public key
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v7 0/7] ima: kexec: measure events between kexec load and excute
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 1/7] ima: define and call ima_alloc_kexec_file_buf
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 7/7] ima: measure kexec load and exec events as critical data
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 3/7] ima: kexec: skip IMA segment validation after kexec soft reboot
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 1/7] ima: define and call ima_alloc_kexec_file_buf
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 1/7] ima: define and call ima_alloc_kexec_file_buf
- From: steven chen <chenste@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 2/7] kexec: define functions to map and unmap segments
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 1/7] ima: define and call ima_alloc_kexec_file_buf
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: do not start chip while suspended
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [PATCH v2] tpm: do not start chip while suspended
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxx>
- Re: [PATCH v7 7/7] ima: measure kexec load and exec events as critical data
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v7 7/7] ima: measure kexec load and exec events as critical data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 6/7] ima: make the kexec extra memory configurable
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [no subject]
- Re: [PATCH v7 7/7] ima: measure kexec load and exec events as critical data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Jonathan McDowell <noodles@xxxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: TPM operation times out (very rarely)
- From: Jonathan McDowell <noodles@xxxxxxxx>
- Re: [PATCH] tpm: do not start chip while suspended
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]