Linux Integrity
Thread Index
[
Prev Page
][
Next Page
]
Re: [PATCH v3 0/4] Fixes for TPM interrupt handling
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[GIT PULL] TPM DEVICE DRIVER updates for tpmdd-next-v5.18-rc4
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] tpm: cr50: Add new device/vendor ID 0x504a6666
From
: Jes Klinke <jbk@xxxxxxxxxx>
[PATCH v2] tpm: cr50: Add new device/vendor ID 0x504a6666
From
: "Jes B. Klinke" <jbk@xxxxxxxxxxxx>
Re: [PATCH v35 05/29] IMA: avoid label collisions with stacked LSMs
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH v35 13/29] LSM: Use lsmblob in security_cred_getsecid
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v35 13/29] LSM: Use lsmblob in security_cred_getsecid
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v35 13/29] LSM: Use lsmblob in security_cred_getsecid
From
: kernel test robot <lkp@xxxxxxxxx>
[PATCH v35 15/29] LSM: Ensure the correct LSM context releaser
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v35 12/29] LSM: Use lsmblob in security_inode_getsecid
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v35 13/29] LSM: Use lsmblob in security_cred_getsecid
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v35 11/29] LSM: Use lsmblob in security_current_getsecid
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH v7 3/6] crypto: caam - add in-kernel interface for blob generator
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH v7 4/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v7 3/6] crypto: caam - add in-kernel interface for blob generator
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[PATCH v34 13/29] LSM: Use lsmblob in security_cred_getsecid
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v34 15/29] LSM: Ensure the correct LSM context releaser
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v34 12/29] LSM: Use lsmblob in security_inode_getsecid
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v34 11/29] LSM: Use lsmblob in security_current_getsecid
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v7 2/6] KEYS: trusted: allow use of kernel RNG for key material
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH v7 6/6] MAINTAINERS: add myself as CAAM trusted key maintainer
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH v7 4/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH v7 3/6] crypto: caam - add in-kernel interface for blob generator
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH v7 1/6] KEYS: trusted: allow use of TEE as backend without TCG_TPM support
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH v7 5/6] doc: trusted-encrypted: describe new CAAM trust source
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH v7 0/6] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [EXT] [PATCH v6 3/4] crypto: caam - add in-kernel interface for blob generator
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [EXT] [PATCH v6 4/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH v7] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [PATCH v6] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [PATCH v6] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 4/7] KEYS: Introduce a builtin root of trust key flag
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] char: tpm: Prepare cleanup of powerpc's asm/prom.h
From
: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
[PATCH v2] char: tpm: Prepare cleanup of powerpc's asm/prom.h
From
: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
[PATCH v6] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [PATCH v5] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [PATCH 4/7] KEYS: Introduce a builtin root of trust key flag
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH 4/7] KEYS: Introduce a builtin root of trust key flag
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] tpm: cr50: Add new device/vendor ID 0x504a6666
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH 4/7] KEYS: Introduce a builtin root of trust key flag
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH] tpm: cr50: Add new device/vendor ID 0x504a6666
From
: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
Re: [PATCH v5] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 1/5] tpm: add functions to set and unset the tpm chips reset state
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] tpm: cr50: Add new device/vendor ID 0x504a6666
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] tpm: cr50: Add new device/vendor ID 0x504a6666
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[PATCH] ima: simplify if-if to if-else
From
: Yihao Han <hanyihao@xxxxxxxx>
[PATCH v5] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [PATCH v4 RESEND] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [PATCH v4 RESEND] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v4 RESEND] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
[PATCH v4] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [PATCH v3 RESEND] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [PATCH v3 RESEND] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [PATCH v3 RESEND] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 RESEND] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [PATCH v3 RESEND] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 4/7] KEYS: Introduce a builtin root of trust key flag
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 1/4] tpm: Add tpm_tis_i2c backend for tpm_tis_core
From
: Johannes Holland <johannes.holland@xxxxxxxxxxxx>
Re: [PATCH 1/5] tpm: add functions to set and unset the tpm chips reset state
From
: Jason Gunthorpe <jgg@xxxxxxxx>
Re: [PATCH 4/4] tpm: Add YAML schema for the TPM TIS I2C options
From
: Johannes Holland <johannes.holland@xxxxxxxxxxxx>
Re: [PATCH 4/4] tpm: Add YAML schema for the TPM TIS I2C options
From
: Johannes Holland <johannes.holland@xxxxxxxxxxxx>
Re: [PATCH 5/5] tpm: tpm_tis_spi_slb_9670: implement set_reset and unset_reset functions
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
Re: [PATCH 5/5] tpm: tpm_tis_spi_slb_9670: implement set_reset and unset_reset functions
From
: Lukas Wunner <lukas@xxxxxxxxx>
Re: [PATCH 1/5] tpm: add functions to set and unset the tpm chips reset state
From
: Lukas Wunner <lukas@xxxxxxxxx>
[PATCH v3 RESEND] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [PATCH 1/5] tpm: add functions to set and unset the tpm chips reset state
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
Re: [PATCH 4/7] KEYS: Introduce a builtin root of trust key flag
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH 4/7] KEYS: Introduce a builtin root of trust key flag
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 4/7] KEYS: Introduce a builtin root of trust key flag
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH 4/7] KEYS: Introduce a builtin root of trust key flag
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 2/7] KEYS: X.509: Parse Basic Constraints for CA
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH 4/7] KEYS: Introduce a builtin root of trust key flag
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH 0/7] Add CA enforcement keyring restrictions
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 4/7] KEYS: Introduce a builtin root of trust key flag
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 3/7] KEYS: X.509: Parse Key Usage
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 2/7] KEYS: X.509: Parse Basic Constraints for CA
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v34 13/29] LSM: Use lsmblob in security_cred_getsecid
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v34 11/29] LSM: Use lsmblob in security_current_getsecid
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v34 11/29] LSM: Use lsmblob in security_current_getsecid
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v3 0/1] ima: fix boot command line issue
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
[PATCH v34 15/29] LSM: Ensure the correct LSM context releaser
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v34 13/29] LSM: Use lsmblob in security_cred_getsecid
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v34 12/29] LSM: Use lsmblob in security_inode_getsecid
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v34 11/29] LSM: Use lsmblob in security_current_getsecid
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH v3 1/1] ima: remove the IMA_TEMPLATE Kconfig option
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 1/5] tpm: add functions to set and unset the tpm chips reset state
From
: Jason Gunthorpe <jgg@xxxxxxxx>
Re: [PATCH v3 0/1] ima: fix boot command line issue
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH 0/5] Support TPM Reset GPIO
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
[PATCH 3/5] tpm: tpm_tis: get optionally defined reset gpio
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
[PATCH 4/5] tpm: tpm_tis: make functions available for external linkage
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
[PATCH 5/5] tpm: tpm_tis_spi_slb_9670: implement set_reset and unset_reset functions
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
[PATCH 2/5] dt-bindings: tpm: document reset gpio property
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
[PATCH 1/5] tpm: add functions to set and unset the tpm chips reset state
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
Re: [PATCH] tpm: cr50: Add new device/vendor ID 0x504a6666
From
: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
Re: [PATCH] tpm: cr50: Add new device/vendor ID 0x504a6666
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH 1/4] tpm: Add tpm_tis_i2c backend for tpm_tis_core
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2] ima: remove the IMA_TEMPLATE Kconfig option
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
[PATCH v3 0/1] ima: fix boot command line issue
From
: GUO Zihua <guozihua@xxxxxxxxxx>
[PATCH v3 1/1] ima: remove the IMA_TEMPLATE Kconfig option
From
: GUO Zihua <guozihua@xxxxxxxxxx>
Re: [PATCH 6/7] KEYS: X.509: Flag Intermediate CA certs as built in
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH 0/7] Add CA enforcement keyring restrictions
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH 0/7] Add CA enforcement keyring restrictions
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 5/7] KEYS: Introduce sig restriction that validates root of trust
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH] ima: remove template "ima" as the compiled default
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
[PATCH 4/7] KEYS: Introduce a builtin root of trust key flag
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH v2] ima: remove the IMA_TEMPLATE Kconfig option
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH 3/7] KEYS: X.509: Parse Key Usage
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH 2/7] KEYS: X.509: Parse Basic Constraints for CA
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH 1/7] KEYS: Create static version of public_key_verify_signature
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH 5/7] KEYS: Introduce sig restriction that validates root of trust
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH 0/7] Add CA enforcement keyring restrictions
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
RE: [POC][USER SPACE][PATCH] Introduce LSM to protect pinned objects
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v2 0/1] ima: fix boot command line issue
From
: GUO Zihua <guozihua@xxxxxxxxxx>
[PATCH v2 1/1] ima: remove the IMA_TEMPLATE Kconfig option
From
: GUO Zihua <guozihua@xxxxxxxxxx>
[PATCH 6/7] KEYS: X.509: Flag Intermediate CA certs as built in
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v2] ima: remove the IMA_TEMPLATE Kconfig option
From
: GUO Zihua <guozihua@xxxxxxxxxx>
[PATCH v2] ima: remove the IMA_TEMPLATE Kconfig option
From
: GUO Zihua <guozihua@xxxxxxxxxx>
[PATCH 7/7] integrity: Use root of trust signature restriction
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
RE: [PATCH 00/18] bpf: Secure and authenticated preloading of eBPF programs
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v7 3/5] ima: permit fsverity's file digests in the IMA measurement list
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH 00/18] bpf: Secure and authenticated preloading of eBPF programs
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH v7 2/5] ima: define a new template field named 'd-ngv2' and templates
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
From
: "Theodore Ts'o" <tytso@xxxxxxx>
Re: [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCH v7 5/5] fsverity: update the documentation
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH 00/18] bpf: Secure and authenticated preloading of eBPF programs
From
: KP Singh <kpsingh@xxxxxxxxxx>
Re: [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
From
: "Theodore Ts'o" <tytso@xxxxxxx>
Re: [POC][USER SPACE][PATCH] Introduce LSM to protect pinned objects
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH 00/18] bpf: Secure and authenticated preloading of eBPF programs
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCH v7 4/5] ima: support fs-verity file digest based version 3 signatures
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
From
: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
[PATCH] tpm: cr50: Add new device/vendor ID 0x504a6666
From
: "Jes B. Klinke" <jbk@xxxxxxxxxxxx>
[POC][USER SPACE][PATCH] Introduce LSM to protect pinned objects
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH] ima: remove redundant initialization of pointer 'file'.
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH 5.15 235/913] KEYS: trusted: Avoid calling null function trusted_key_exit
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
[PATCH 5.16 0248/1017] KEYS: trusted: Avoid calling null function trusted_key_exit
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
[PATCH 5.17 0255/1126] KEYS: trusted: Avoid calling null function trusted_key_exit
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] drivers/char/tpm: Google TPM, additional DID:VID
From
: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
Re: PATCH: Google security chip, additional DID:VID
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH 00/18] bpf: Secure and authenticated preloading of eBPF programs
From
: KP Singh <kpsingh@xxxxxxxxxx>
Re: PATCH: Google security chip, additional DID:VID
From
: Jes Klinke <jbk@xxxxxxxxxx>
[PATCH] drivers/char/tpm: Google TPM, additional DID:VID
From
: Jes Klinke <jbk@xxxxxxxxxx>
Re: [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
From
: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
Re: PATCH: Google security chip, additional DID:VID
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
PATCH: Google security chip, additional DID:VID
From
: Jes Klinke <jbk@xxxxxxxxxx>
Re: [PATCH 00/18] bpf: Secure and authenticated preloading of eBPF programs
From
: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
Re: [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
From
: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
Re: [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
From
: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 4/4] tpm: Add YAML schema for the TPM TIS I2C options
From
: Rob Herring <robh@xxxxxxxxxx>
Re: [PATCH 4/4] tpm: Add YAML schema for the TPM TIS I2C options
From
: Rob Herring <robh@xxxxxxxxxx>
Re: [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [PATCH] ima: remove template "ima" as the compiled default
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
From
: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
RE: [PATCH 00/18] bpf: Secure and authenticated preloading of eBPF programs
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
RE: [PATCH 00/18] bpf: Secure and authenticated preloading of eBPF programs
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH 3/4] tpm: Implement command and response retry in tpm_tis_core
From
: Johannes Holland <johannes.holland@xxxxxxxxxxxx>
[PATCH 4/4] tpm: Add YAML schema for the TPM TIS I2C options
From
: Johannes Holland <johannes.holland@xxxxxxxxxxxx>
[PATCH 2/4] tpm: Add tpm_tis_verify_crc to the tpm_tis_phy_ops protocol layer
From
: Johannes Holland <johannes.holland@xxxxxxxxxxxx>
[PATCH 1/4] tpm: Add tpm_tis_i2c backend for tpm_tis_core
From
: Johannes Holland <johannes.holland@xxxxxxxxxxxx>
Re: [PATCH 00/18] bpf: Secure and authenticated preloading of eBPF programs
From
: Djalal Harouni <tixxdz@xxxxxxxxx>
Re: [PATCH 05/18] bpf-preload: Generate static variables
From
: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
Re: [PATCH] char: tpm: Prepare cleanup of powerpc's asm/prom.h
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[PATCH] char: tpm: Prepare cleanup of powerpc's asm/prom.h
From
: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
Re: [PATCH 00/18] bpf: Secure and authenticated preloading of eBPF programs
From
: KP Singh <kpsingh@xxxxxxxxxx>
Re: [PATCH 00/18] bpf: Secure and authenticated preloading of eBPF programs
From
: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
Re: Progress about SM2-with-SM3 signature support for PKCS #7.
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
Progress about SM2-with-SM3 signature support for PKCS #7.
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
[PATCH 2/5] integrity: Remove redundant assignments
From
: Michal Orzel <michalorzel.eng@xxxxxxxxx>
Re: [PATCH] char: tpm: cr50_i2c: Drop if with an always false condition
From
: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
RE: [PATCH 00/18] bpf: Secure and authenticated preloading of eBPF programs
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH 00/18] bpf: Secure and authenticated preloading of eBPF programs
From
: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
Re: [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCH v3 0/4] Fixes for TPM interrupt handling
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3 0/4] Fixes for TPM interrupt handling
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
RE: [PATCH 05/18] bpf-preload: Generate static variables
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v8 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
From
: David Howells <dhowells@xxxxxxxxxx>
RE: [PATCH 05/18] bpf-preload: Generate static variables
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
RE: [PATCH 00/18] bpf: Secure and authenticated preloading of eBPF programs
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH 05/18] bpf-preload: Generate static variables
From
: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
Re: [PATCH 00/18] bpf: Secure and authenticated preloading of eBPF programs
From
: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
Re: [PATCH 16/18] bpf-preload: Do kernel mount to ensure that pinned objects don't disappear
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH 14/18] bpf-preload: Switch to new preload registration method
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH 14/18] bpf-preload: Switch to new preload registration method
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH 16/18] bpf-preload: Do kernel mount to ensure that pinned objects don't disappear
From
: kernel test robot <lkp@xxxxxxxxx>
[PATCH 17/18] bpf-preload/selftests: Add test for automatic generation of preload methods
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 18/18] bpf-preload/selftests: Preload a test eBPF program and check pinned objects
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 16/18] bpf-preload: Do kernel mount to ensure that pinned objects don't disappear
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 15/18] bpf-preload: Generate code of kernel module to preload
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 13/18] bpf-preload: Move pinned links and maps to a dedicated directory in bpffs
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 10/18] bpf-preload: Generate bpf_preload_ops
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 12/18] bpf-preload: Implement new registration method for preloading eBPF programs
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 11/18] bpf-preload: Store multiple bpf_preload_ops structures in a linked list
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 14/18] bpf-preload: Switch to new preload registration method
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 07/18] bpf-preload: Generate preload()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 08/18] bpf-preload: Generate load_skel()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 09/18] bpf-preload: Generate code to pin non-internal maps
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 06/18] bpf-preload: Generate free_objs_and_skel()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 05/18] bpf-preload: Generate static variables
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 02/18] bpf-preload: Move bpf_preload.h to include/linux
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 01/18] bpf: Export bpf_link_inc()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 00/18] bpf: Secure and authenticated preloading of eBPF programs
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 03/18] bpf-preload: Generalize object pinning from the kernel
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 04/18] bpf-preload: Export and call bpf_obj_do_pin_kernel()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v7 1/5] fs-verity: define a function to return the integrity protected file digest
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v7 2/5] ima: define a new template field named 'd-ngv2' and templates
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
RE: [EXT] [PATCH v6 4/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Pankaj Gupta <pankaj.gupta@xxxxxxx>
RE: [EXT] [PATCH v6 3/4] crypto: caam - add in-kernel interface for blob generator
From
: Pankaj Gupta <pankaj.gupta@xxxxxxx>
Re: [PATCH v7 2/5] ima: define a new template field named 'd-ngv2' and templates
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
Re: [PATCH v7 1/5] fs-verity: define a function to return the integrity protected file digest
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
Re: [PATCH v3 0/4] Fixes for TPM interrupt handling
From
: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
Re: [PATCH v3 0/4] Fixes for TPM interrupt handling
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
[PATCH v7 3/5] ima: permit fsverity's file digests in the IMA measurement list
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v7 2/5] ima: define a new template field named 'd-ngv2' and templates
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v7 5/5] fsverity: update the documentation
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v7 1/5] fs-verity: define a function to return the integrity protected file digest
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v7 4/5] ima: support fs-verity file digest based version 3 signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v7 0/5] ima: support fs-verity digests and signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH 5.16 14/37] tpm: Fix error handling in async work
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
[PATCH 5.15 03/37] tpm: Fix error handling in async work
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
[PATCH 5.17 01/39] tpm: Fix error handling in async work
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
[PATCH 5.10 07/38] tpm: Fix error handling in async work
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
[PATCH 5.4 06/29] tpm: Fix error handling in async work
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v6 4/5] ima: support fs-verity file digest based version 3 signatures
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v2] tpm: Fix regression in tpm_tis_synquacer.c
From
: Johannes Holland <johannes.holland@xxxxxxxxxxxx>
Re: [PATCH v3 0/4] Fixes for TPM interrupt handling
From
: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
Re: [PATCH v6 4/5] ima: support fs-verity file digest based version 3 signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 0/4] Fixes for TPM interrupt handling
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3 0/4] Fixes for TPM interrupt handling
From
: Michael Niewöhner <linux@xxxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils] travis: include CentOS stream 8
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils] travis: include CentOS stream 8
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [LTP] [PATCH v4] syscalls/keyctl09: test encrypted keys with provided decrypted data.
From
: Cyril Hrubis <chrubis@xxxxxxx>
Re: [EXT] [PATCH v6 3/4] crypto: caam - add in-kernel interface for blob generator
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
RE: [EXT] [PATCH v6 3/4] crypto: caam - add in-kernel interface for blob generator
From
: Pankaj Gupta <pankaj.gupta@xxxxxxx>
Re: [PATCH] ima: remove template "ima" as the compiled default
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
[PATCH ima-evm-utils] travis: include CentOS stream 8
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [LTP] [PATCH v4] syscalls/keyctl09: test encrypted keys with provided decrypted data.
From
: Petr Vorel <pvorel@xxxxxxx>
[no subject]
From
: Unknown
[PATCH v2 1/1] ci/GitHub: Remove CentOS 8
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH 1/1] ci: Remove CentOS 8
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH 1/1] ci: Remove CentOS 8
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH 1/1] ci: Remove CentOS 8
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v1] tpm: Fix regression in tpm_tis_synquacer.c
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH 1/1] ci: Remove CentOS 8
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH 1/1] ci: Remove CentOS 8
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v1] tpm: Fix regression in tpm_tis_synquacer.c
From
: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
[PATCH v1] tpm: Fix regression in tpm_tis_synquacer.c
From
: Johannes Holland <johannes.holland@xxxxxxxxxxxx>
Re: [EXT] [PATCH v6 3/4] crypto: caam - add in-kernel interface for blob generator
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH v6 4/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [EXT] [PATCH v6 3/4] crypto: caam - add in-kernel interface for blob generator
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH v6 4/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
RE: [EXT] [PATCH v6 3/4] crypto: caam - add in-kernel interface for blob generator
From
: Pankaj Gupta <pankaj.gupta@xxxxxxx>
Re: [GIT PULL] integrity: subsystem fixes for v5.18
From
: pr-tracker-bot@xxxxxxxxxx
Re: [PATCH v4] tpm: Remove read16/read32/write32 calls from tpm_tis_phy_ops
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
From
: Luis Chamberlain <mcgrof@xxxxxxxxxx>
Re: [PATCH v6 2/5] ima: define a new template field named 'd-ngv2' and templates
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v6 3/5] ima: permit fsverity's file digests in the IMA measurement list
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v6 2/5] ima: define a new template field named 'd-ngv2' and templates
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: Re: [GIT PULL] TPM DEVICE DRIVER updates for v5.18
From
: pr-tracker-bot@xxxxxxxxxx
[GIT PULL] integrity: subsystem fixes for v5.18
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
From
: Luis Chamberlain <mcgrof@xxxxxxxxxx>
[GIT PULL] Add trusted_for(2) (was O_MAYEXEC)
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCH v6 4/5] ima: support fs-verity file digest based version 3 signatures
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v6 3/5] ima: permit fsverity's file digests in the IMA measurement list
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v6 5/5] fsverity: update the documentation
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v6 2/5] ima: define a new template field named 'd-ngv2' and templates
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v4] tpm: Remove read16/read32/write32 calls from tpm_tis_phy_ops
From
: Johannes Holland <johannes.holland@xxxxxxxxxxxx>
[PATCH] ima: remove template "ima" as the compiled default
From
: GUO Zihua <guozihua@xxxxxxxxxx>
Re: [PATCH v11 0/4] integrity: support including firmware ".platform" keys at build time
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3] tpm: Remove read16/read32/write32 calls from tpm_tis_phy_ops
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH -next] tpm: ibmvtpm: Correct the return value in tpm_ibmvtpm_probe()
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH -next] tpm: ibmvtpm: Correct the return value in tpm_ibmvtpm_probe()
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] tpm/tpm_ftpm_tee: Return true/false (not 1/0) from bool functions
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v12 1/4] certs: export load_certificate_list() to be used outside certs/
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v6 4/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [ANNOUNCE][CFP] Linux Security Summit North America 2022
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH v11 0/4] integrity: support including firmware ".platform" keys at build time
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v6 5/5] fsverity: update the documentation
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v6 5/5] fsverity: update the documentation
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v6 4/5] ima: support fs-verity file digest based version 3 signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v6 3/5] ima: permit fsverity's file digests in the IMA measurement list
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v6 1/5] fs-verity: define a function to return the integrity protected file digest
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v6 2/5] ima: define a new template field named 'd-ngv2' and templates
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v6 0/5] ima: support fs-verity digests and signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v3] tpm: Remove read16/read32/write32 calls from tpm_tis_phy_ops
From
: Johannes Holland <johannes.holland@xxxxxxxxxxxx>
Re: [PATCH -next] tpm: ibmvtpm: Correct the return value in tpm_ibmvtpm_probe()
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH -next] tpm: ibmvtpm: Correct the return value in tpm_ibmvtpm_probe()
From
: Xiu Jianfeng <xiujianfeng@xxxxxxxxxx>
[PATCH] tpm/tpm_ftpm_tee: Return true/false (not 1/0) from bool functions
From
: Haowen Bai <baihaowen@xxxxxxxxx>
Re: [LTP] [PATCH v4] syscalls/keyctl09: test encrypted keys with provided decrypted data.
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH v5 5/8] ima: permit fsverity's file digests in the IMA measurement list
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5 7/8] ima: support fs-verity file digest based version 3 signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2] tpm: Make implementation of read16/read32/write32 optional
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v11 0/4] integrity: support including firmware ".platform" keys at build time
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] tpm: Fix memory leak in tpmm_chip_alloc
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] tpm: Fix memory leak in tpmm_chip_alloc
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[PATCH -next] char: tpm: cr50: Fix tpm_cr50_i2c_probe() kernel-doc comment
From
: Yang Li <yang.lee@xxxxxxxxxxxxxxxxx>
Re: [LTP] [PATCH v4] syscalls/keyctl09: test encrypted keys with provided decrypted data.
From
: Yael Tzur <yaelt@xxxxxxxxxx>
Re: [PATCH v5 4/5] crypto: caam - add in-kernel interface for blob generator
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH v6 2/4] KEYS: trusted: allow use of kernel RNG for key material
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH v6 3/4] crypto: caam - add in-kernel interface for blob generator
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH v6 4/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH v6 1/4] KEYS: trusted: allow use of TEE as backend without TCG_TPM support
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH v6 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH v2] tpm: Make implementation of read16/read32/write32 optional
From
: Johannes Holland <johannes.holland@xxxxxxxxxxxx>
Re: [PATCH] tpm: Fix memory leak in tpmm_chip_alloc
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
Re: [PATCH] tpm: Fix memory leak in tpmm_chip_alloc
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
Re: [PATCH] tpm: Fix memory leak in tpmm_chip_alloc
From
: Jason Gunthorpe <jgg@xxxxxxxx>
Re: [EXT] Re: [PATCH v5 4/5] crypto: caam - add in-kernel interface for blob generator
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH v12 3/4] Revert "certs: move scripts/extract-cert to certs/"
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v11 0/4] integrity: support including firmware ".platform" keys at build time
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] tpm: Fix memory leak in tpmm_chip_alloc
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
[GIT PULL] TPM DEVICE DRIVER updates for v5.18
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxx>
Re: [GIT PULL] TPM DEVICE DRIVER updates for v5.18
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[GIT PULL] TPM DEVICE DRIVER updates for v5.18
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v33 13/29] LSM: Use lsmblob in security_cred_getsecid
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v12 0/4] integrity: support including firmware ".platform" keys at build time
From
: Nageswara Sastry <rnsastry@xxxxxxxxxxxxx>
[PATCH v12 0/4] integrity: support including firmware ".platform" keys at build time
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v12 4/4] integrity: support including firmware ".platform" keys at build time
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v12 2/4] integrity: make integrity_keyring_from_id() non-static
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v12 1/4] certs: export load_certificate_list() to be used outside certs/
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v12 3/4] Revert "certs: move scripts/extract-cert to certs/"
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
Re: [PATCH v11 0/4] integrity: support including firmware ".platform" keys at build time
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v8 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v11 0/4] integrity: support including firmware ".platform" keys at build time
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v11 0/4] integrity: support including firmware ".platform" keys at build time
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v8 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCH] tpm: Fix memory leak in tpmm_chip_alloc
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH 2/2] xen/grant-table: remove readonly parameter from functions
From
: Jan Beulich <jbeulich@xxxxxxxx>
[PATCH 2/2] xen/grant-table: remove readonly parameter from functions
From
: Juergen Gross <jgross@xxxxxxxx>
[PATCH 0/2] xen/grant-table: do some cleanup
From
: Juergen Gross <jgross@xxxxxxxx>
Re: [PATCH v33 13/29] LSM: Use lsmblob in security_cred_getsecid
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v33 13/29] LSM: Use lsmblob in security_cred_getsecid
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v11 3/4] certs: conditionally build extract-cert if platform keyring is enabled
From
: Masahiro Yamada <masahiroy@xxxxxxxxxx>
Re: [PATCH v11 0/4] integrity: support including firmware ".platform" keys at build time
From
: Nageswara Sastry <rnsastry@xxxxxxxxxxxxx>
Re: [PATCH v3 0/9] bpf-lsm: Extend interoperability with IMA
From
: patchwork-bot+netdevbpf@xxxxxxxxxx
[PATCH v33 15/29] LSM: Ensure the correct LSM context releaser
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v33 13/29] LSM: Use lsmblob in security_cred_getsecid
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v33 12/29] LSM: Use lsmblob in security_inode_getsecid
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v33 11/29] LSM: Use lsmblob in security_current_getsecid
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v11 2/4] integrity: make integrity_keyring_from_id() non-static
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v11 1/4] certs: export load_certificate_list() to be used outside certs/
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v11 4/4] integrity: support including firmware ".platform" keys at build time
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v11 0/4] integrity: support including firmware ".platform" keys at build time
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v11 3/4] certs: conditionally build extract-cert if platform keyring is enabled
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
Re: [GIT PULL] TPM DEVICE DRIVER updates for v5.18
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH] tpm: Fix memory leak in tpmm_chip_alloc
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
Re: [GIT PULL] TPM DEVICE DRIVER updates for v5.18
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v8 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v8 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[LSF/MM/BPF TOPIC] DIGLIM eBPF
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v8 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [GIT PULL] TPM DEVICE DRIVER updates for v5.18
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [GIT PULL] TPM DEVICE DRIVER updates for v5.18
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v8 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCH v8 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[GIT PULL] TPM DEVICE DRIVER updates for v5.18
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v8 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCH v8 5/5] certs: Allow root user to append signed hashes to the blacklist keyring
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v10 3/3] integrity: support including firmware ".platform" keys at build time
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] tpm: use try_get_ops() in tpm-space.c
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v10 3/3] integrity: support including firmware ".platform" keys at build time
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH] tpm: use try_get_ops() in tpm-space.c
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 0/9] bpf-lsm: Extend interoperability with IMA
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2] tpm: Rework open/close/shutdown to avoid races
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2] tpm: Rework open/close/shutdown to avoid races
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2] tpm: Rework open/close/shutdown to avoid races
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH] tpm: use try_get_ops() in tpm-space.c
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] tpm: Rework open/close/shutdown to avoid races
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] tpm: Fix memory leak in tpmm_chip_alloc
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3 0/9] bpf-lsm: Extend interoperability with IMA
From
: KP Singh <kpsingh@xxxxxxxxxx>
Re: [PATCH v10 3/3] integrity: support including firmware ".platform" keys at build time
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v10 3/3] integrity: support including firmware ".platform" keys at build time
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[PATCH] tpm: Fix memory leak in tpmm_chip_alloc
From
: GUO Zihua <guozihua@xxxxxxxxxx>
RE: [PATCH v3 0/9] bpf-lsm: Extend interoperability with IMA
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
RE: [EXT] [PATCH v5 5/5] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Pankaj Gupta <pankaj.gupta@xxxxxxx>
Re: [PATCH v3 0/9] bpf-lsm: Extend interoperability with IMA
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v10 3/3] integrity: support including firmware ".platform" keys at build time
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v10 2/3] integrity: make integrity_keyring_from_id() non-static
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v10 1/3] certs: export load_certificate_list() to be used outside certs/
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v10 0/3] integrity: support including firmware ".platform" keys at build time
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
Re: [PATCH v3 2/9] ima: Always return a file measurement in ima_file_hash()
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 1/9] ima: Fix documentation-related warnings in ima_main.c
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 0/9] bpf-lsm: Extend interoperability with IMA
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v9 0/3] integrity: support including firmware ".platform" keys at build time
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v9 0/3] integrity: support including firmware ".platform" keys at build time
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/2] KEYS: asymmetric: enforce that sig algo matches key algo
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v9 0/3] integrity: support including firmware ".platform" keys at build time
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v9 0/3] integrity: support including firmware ".platform" keys at build time
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v9 1/1] tpm: fix reference counting for struct tpm_chip
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v9 1/1] tpm: fix reference counting for struct tpm_chip
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v9 0/3] integrity: support including firmware ".platform" keys at build time
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH 1/2] KEYS: asymmetric: enforce that sig algo matches key algo
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v9 1/1] tpm: fix reference counting for struct tpm_chip
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v9 3/3] integrity: support including firmware ".platform" keys at build time
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v9 1/3] certs: export load_certificate_list() to be used outside certs/
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v9 2/3] integrity: make integrity_keyring_from_id() non-static
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v9 0/3] integrity: support including firmware ".platform" keys at build time
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
Re: [PATCH v9 1/1] tpm: fix reference counting for struct tpm_chip
From
: Jason Gunthorpe <jgg@xxxxxxxx>
Re: [PATCH v9 1/1] tpm: fix reference counting for struct tpm_chip
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v8 1/1] tpm: fix reference counting for struct tpm_chip
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3 0/9] bpf-lsm: Extend interoperability with IMA
From
: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
Re: [PATCH v3 0/9] bpf-lsm: Extend interoperability with IMA
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 0/9] bpf-lsm: Extend interoperability with IMA
From
: KP Singh <kpsingh@xxxxxxxxxx>
Re: [PATCH v3 0/9] bpf-lsm: Extend interoperability with IMA
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 0/9] bpf-lsm: Extend interoperability with IMA
From
: KP Singh <kpsingh@xxxxxxxxxx>
Re: [PATCH v3 0/9] bpf-lsm: Extend interoperability with IMA
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [LTP] [PATCH v4] syscalls/keyctl09: test encrypted keys with provided decrypted data.
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [LTP] [PATCH v4] syscalls/keyctl09: test encrypted keys with provided decrypted data.
From
: Cyril Hrubis <chrubis@xxxxxxx>
Re: [LTP] [PATCH v4] syscalls/keyctl09: test encrypted keys with provided decrypted data.
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [LTP] [PATCH v4] syscalls/keyctl09: test encrypted keys with provided decrypted data.
From
: Cyril Hrubis <chrubis@xxxxxxx>
RE: [PATCH v3 0/9] bpf-lsm: Extend interoperability with IMA
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [LTP] [PATCH v4] syscalls/keyctl09: test encrypted keys with provided decrypted data.
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH 2/2] tpm: Fix crash on tmprm release
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v11 26/27] ima: Restrict informational audit messages to init_ima_ns
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v3 0/9] bpf-lsm: Extend interoperability with IMA
From
: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
Re: [LTP] [PATCH v4] syscalls/keyctl09: test encrypted keys with provided decrypted data.
From
: Yael Tzur <yaelt@xxxxxxxxxx>
[LitExtension] Thank You For Registering For The "Change To Grow" Program
From
: LitExtension Contact Form <noreply@xxxxxxxxxxxxxxxx>
Re: [PATCH v11 23/27] ima: Introduce securityfs file to activate an IMA namespace
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [LTP] [PATCH v4] syscalls/keyctl09: test encrypted keys with provided decrypted data.
From
: Cyril Hrubis <chrubis@xxxxxxx>
[PATCH v11 22/27] ima: Setup securityfs for IMA namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 14/27] userns: Add pointer to ima_namespace to user_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 00/27] ima: Namespace IMA with audit support in IMA-ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 04/27] ima: Define ima_namespace struct and start moving variables into it
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 02/27] securityfs: rework dentry creation
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 03/27] securityfs: Extend securityfs with namespacing support
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 05/27] ima: Move arch_policy_entry into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 06/27] ima: Move ima_htable into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 13/27] ima: Only accept AUDIT rules for non-init_ima_ns namespaces for now
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 20/27] ima: Namespace audit status flags
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 08/27] ima: Move some IMA policy and filesystem related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 24/27] ima: Show owning user namespace's uid and gid when displaying policy
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 09/27] ima: Move IMA securityfs files into ima_namespace or onto stack
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 23/27] ima: Introduce securityfs file to activate an IMA namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 07/27] ima: Move measurement list related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 19/27] integrity: Add optional callback function to integrity_inode_free()
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 01/27] ima: Return error code obtained from securityfs functions
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 26/27] ima: Restrict informational audit messages to init_ima_ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 27/27] ima: Enable IMA namespaces
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 17/27] ima: Add functions for creating and freeing of an ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 21/27] ima: Remove unused iints from the integrity_iint_cache
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 18/27] integrity/ima: Define ns_status for storing namespaced iint data
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 12/27] ima: Define mac_admin_ns_capable() as a wrapper for ns_capable()
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 10/27] ima: Move ima_lsm_policy_notifier into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 11/27] ima: Switch to lazy lsm policy updates for better performance
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 25/27] ima: Limit number of policy rules in non-init_ima_ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 16/27] ima: Implement ima_free_policy_rules() for freeing of an ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 15/27] ima: Implement hierarchical processing of file accesses
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v3 5/9] selftests/bpf: Add test for bpf_ima_file_hash()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v3 6/9] selftests/bpf: Check if the digest is refreshed after a file write
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v3 9/9] selftests/bpf: Check that bpf_kernel_read_file() denies reading IMA policy
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v3 8/9] selftests/bpf: Add test for bpf_lsm_kernel_read_file()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v3 7/9] bpf-lsm: Make bpf_lsm_kernel_read_file() as sleepable
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v3 3/9] bpf-lsm: Introduce new helper bpf_ima_file_hash()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v3 4/9] selftests/bpf: Move sample generation code to ima_test_common()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v3 2/9] ima: Always return a file measurement in ima_file_hash()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v3 0/9] bpf-lsm: Extend interoperability with IMA
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v3 1/9] ima: Fix documentation-related warnings in ima_main.c
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v9 0/1] This patch fixes a reference count issue in the TPM core code
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
[PATCH v9 1/1] tpm: fix reference counting for struct tpm_chip
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
Re: [PATCH 5/5] spi: make remove callback a void function
From
: Pavel Machek <pavel@xxxxxx>
RE: [EXT] Re: [PATCH v5 3/5] KEYS: trusted: allow trust sources to use kernel RNG for key material
From
: Pankaj Gupta <pankaj.gupta@xxxxxxx>
RE: [EXT] [PATCH v5 5/5] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Pankaj Gupta <pankaj.gupta@xxxxxxx>
Re: [PATCH v8 0/3] integrity: support including firmware ".platform" keys at build time
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v8 1/1] tpm: fix reference counting for struct tpm_chip
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
Re: [PATCH v8 0/1] tpm: fix reference counting for struct tpm_chip
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
Re: [PATCH v8 1/1] tpm: fix reference counting for struct tpm_chip
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
Re: [PATCH v8 1/1] tpm: fix reference counting for struct tpm_chip
From
: Jason Gunthorpe <jgg@xxxxxxxx>
Re: [PATCH v8 0/1] tpm: fix reference counting for struct tpm_chip
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v8 1/1] tpm: fix reference counting for struct tpm_chip
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH] ima: remove redundant initialization of pointer 'file'.
From
: Colin Ian King <colin.i.king@xxxxxxxxx>
[PATCH v8 1/1] tpm: fix reference counting for struct tpm_chip
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
[PATCH v8 0/1] tpm: fix reference counting for struct tpm_chip
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
Re: [PATCH 2/2] integrity: double check iint_cache was initialized
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 2/2] integrity: double check iint_cache was initialized
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH] MAINTAINERS: add missing security/integrity/platform_certs
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v5 4/5] crypto: caam - add in-kernel interface for blob generator
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2 0/6] bpf-lsm: Extend interoperability with IMA
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
RE: [PATCH v2 0/6] bpf-lsm: Extend interoperability with IMA
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
RE: [PATCH v2 0/6] bpf-lsm: Extend interoperability with IMA
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v2 0/6] bpf-lsm: Extend interoperability with IMA
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 0/6] bpf-lsm: Extend interoperability with IMA
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v5 4/8] ima: define a new template field 'd-type' and a new template 'ima-ngv2'
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 2/2] integrity: double check iint_cache was initialized
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [RFC PATCH] KEYS: Double max_size to make keyctl pkey_verify work
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v2 0/6] bpf-lsm: Extend interoperability with IMA
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5 00/12] x86: Trenchboot secure dynamic launch Linux kernel support
From
: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
RE: [EXT] [PATCH v5 5/5] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Pankaj Gupta <pankaj.gupta@xxxxxxx>
RE: [EXT] Re: [PATCH v5 4/5] crypto: caam - add in-kernel interface for blob generator
From
: Pankaj Gupta <pankaj.gupta@xxxxxxx>
RE: [EXT] Re: [PATCH v5 3/5] KEYS: trusted: allow trust sources to use kernel RNG for key material
From
: Pankaj Gupta <pankaj.gupta@xxxxxxx>
RE: [PATCH v2 0/6] bpf-lsm: Extend interoperability with IMA
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v2 0/6] bpf-lsm: Extend interoperability with IMA
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 2/2] integrity: double check iint_cache was initialized
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH v5 4/8] ima: define a new template field 'd-type' and a new template 'ima-ngv2'
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH 2/2] integrity: double check iint_cache was initialized
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH 2/2] integrity: double check iint_cache was initialized
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH v5 4/8] ima: define a new template field 'd-type' and a new template 'ima-ngv2'
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 2/2] integrity: double check iint_cache was initialized
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH v10 18/27] integrity/ima: Define ns_status for storing namespaced iint data
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v10 18/27] integrity/ima: Define ns_status for storing namespaced iint data
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v5 3/8] fs-verity: define a function to return the integrity protected file digest
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5 3/8] fs-verity: define a function to return the integrity protected file digest
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5 6/8] ima: define signature version 3
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v5 3/8] fs-verity: define a function to return the integrity protected file digest
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v5 7/8] ima: support fs-verity file digest based version 3 signatures
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v5 5/8] ima: permit fsverity's file digests in the IMA measurement list
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v5 4/8] ima: define a new template field 'd-type' and a new template 'ima-ngv2'
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v5 3/8] fs-verity: define a function to return the integrity protected file digest
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v10 24/27] ima: Introduce securityfs file to activate an IMA namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v10 26/27] ima: Limit number of policy rules in non-init_ima_ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v10 26/27] ima: Limit number of policy rules in non-init_ima_ns
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v10 27/27] ima: Enable IMA namespaces
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v10 26/27] ima: Limit number of policy rules in non-init_ima_ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v4] syscalls/keyctl09: test encrypted keys with provided decrypted data.
From
: Yael Tzur <yaelt@xxxxxxxxxx>
[PATCH] MAINTAINERS: add missing security/integrity/platform_certs
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v10 12/27] ima: Define mac_admin_ns_capable() as a wrapper for ns_capable()
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: [PATCH v10 27/27] ima: Enable IMA namespaces
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: [PATCH v5 00/12] x86: Trenchboot secure dynamic launch Linux kernel support
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH v10 24/27] ima: Introduce securityfs file to activate an IMA namespace
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v10 24/27] ima: Introduce securityfs file to activate an IMA namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v10 26/27] ima: Limit number of policy rules in non-init_ima_ns
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v10 26/27] ima: Limit number of policy rules in non-init_ima_ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v5 3/5] KEYS: trusted: allow trust sources to use kernel RNG for key material
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH v5 4/5] crypto: caam - add in-kernel interface for blob generator
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH v10 18/27] integrity/ima: Define ns_status for storing namespaced iint data
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: Unintended file entry addition in commit 7ed88a03b15b ("certs: Check that builtin blacklist hashes are valid")?
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v10 22/27] securityfs: Extend securityfs with namespacing support
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v5 2/5] KEYS: trusted: allow users to use kernel RNG for key material
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v5 4/5] crypto: caam - add in-kernel interface for blob generator
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v10 26/27] ima: Limit number of policy rules in non-init_ima_ns
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [LTP] [PATCH v3] syscalls/keyctl09: test encrypted keys with provided decrypted data.
From
: Cyril Hrubis <chrubis@xxxxxxx>
Re: [PATCH v10 25/27] ima: Show owning user namespace's uid and gid when displaying policy
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v10 24/27] ima: Introduce securityfs file to activate an IMA namespace
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Unintended file entry addition in commit 7ed88a03b15b ("certs: Check that builtin blacklist hashes are valid")?
From
: Lukas Bulwahn <lukas.bulwahn@xxxxxxxxx>
Re: [PATCH v3] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [PATCH v10 23/27] ima: Setup securityfs for IMA namespace
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v10 22/27] securityfs: Extend securityfs with namespacing support
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [EXTERNAL] [PATCH] EVM: fix the evm= __setup handler return value
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v10 22/27] securityfs: Extend securityfs with namespacing support
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v32 05/28] IMA: avoid label collisions with stacked LSMs
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH] EVM: fix the evm= __setup handler return value
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
[PATCH v5 1/5] KEYS: trusted: allow use of TEE as backend without TCG_TPM support
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH v5 5/5] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH v5 2/5] KEYS: trusted: allow users to use kernel RNG for key material
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH v5 3/5] KEYS: trusted: allow trust sources to use kernel RNG for key material
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH v5 0/5] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH v5 4/5] crypto: caam - add in-kernel interface for blob generator
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH v3] syscalls/keyctl09: test encrypted keys with provided decrypted data.
From
: Yael Tzur <yaelt@xxxxxxxxxx>
Re: [EXT] Re: [PATCH v4 5/5] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: init_ima() adds 8 % to boot time
From
: Petr Vorel <pvorel@xxxxxxx>
RE: [EXT] Re: [PATCH v4 5/5] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Pankaj Gupta <pankaj.gupta@xxxxxxx>
Re: [PATCH v5] KEYS: encrypted: Instantiate key with user-provided decrypted data
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] KEYS: asymmetric: enforce SM2 signature use pkey algo
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH 2/2] KEYS: asymmetric: properly validate hash_algo and encoding
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: init_ima() adds 8 % to boot time
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v8 0/3] integrity: support including firmware ".platform" keys at build time
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v5] KEYS: encrypted: Instantiate key with user-provided decrypted data
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5] KEYS: encrypted: Instantiate key with user-provided decrypted data
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH 2/2] KEYS: asymmetric: properly validate hash_algo and encoding
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [RFC PATCH] KEYS: Double max_size to make keyctl pkey_verify work
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH] KEYS: asymmetric: enforce SM2 signature use pkey algo
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
Re: [PATCH 2/2] KEYS: asymmetric: properly validate hash_algo and encoding
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH 1/2] KEYS: asymmetric: enforce that sig algo matches key algo
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] KEYS: trusted: Avoid calling null function trusted_key_exit
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] KEYS: asymmetric: enforce SM2 signature use pkey algo
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [RFC PATCH] KEYS: Double max_size to make keyctl pkey_verify work
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [RFC PATCH] KEYS: Double max_size to make keyctl pkey_verify work
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [RFC PATCH] KEYS: Double max_size to make keyctl pkey_verify work
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v8 00/17] Enroll kernel keys thru MOK
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: init_ima() adds 8 % to boot time
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] KEYS: trusted: fix crash when TPM/TEE are built as module
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] KEYS: trusted: fix crash when TPM/TEE are built as module
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v8 0/3] integrity: support including firmware ".platform" keys at build time
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: init_ima() adds 8 % to boot time
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: init_ima() adds 8 % to boot time
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v8 0/5] Enable root to update the blacklist keyring
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
init_ima() adds 8 % to boot time
From
: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
Re: [PATCH v10 16/27] ima: Implement ima_free_policy_rules() for freeing of an ima_namespace
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v10 17/27] ima: Add functions for creating and freeing of an ima_namespace
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v10 16/27] ima: Implement ima_free_policy_rules() for freeing of an ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v10 16/27] ima: Implement ima_free_policy_rules() for freeing of an ima_namespace
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v10 15/27] ima: Implement hierarchical processing of file accesses
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v10 14/27] userns: Add pointer to ima_namespace to user_namespace
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v5 01/12] x86/boot: Place kernel_info at a fixed offset
From
: Ross Philipson <ross.philipson@xxxxxxxxxx>
[PATCH v5 02/12] Documentation/x86: Secure Launch kernel documentation
From
: Ross Philipson <ross.philipson@xxxxxxxxxx>
[PATCH v5 11/12] x86: Secure Launch late initcall platform module
From
: Ross Philipson <ross.philipson@xxxxxxxxxx>
[PATCH v5 06/12] x86: Secure Launch kernel early boot stub
From
: Ross Philipson <ross.philipson@xxxxxxxxxx>
[PATCH v5 09/12] kexec: Secure Launch kexec SEXIT support
From
: Ross Philipson <ross.philipson@xxxxxxxxxx>
[PATCH v5 04/12] x86: Secure Launch main header file
From
: Ross Philipson <ross.philipson@xxxxxxxxxx>
[PATCH v5 10/12] reboot: Secure Launch SEXIT support on reboot paths
From
: Ross Philipson <ross.philipson@xxxxxxxxxx>
[PATCH v5 07/12] x86: Secure Launch kernel late boot stub
From
: Ross Philipson <ross.philipson@xxxxxxxxxx>
[PATCH v5 12/12] tpm: Allow locality 2 to be set when initializing the TPM for Secure Launch
From
: Ross Philipson <ross.philipson@xxxxxxxxxx>
[PATCH v5 00/12] x86: Trenchboot secure dynamic launch Linux kernel support
From
: Ross Philipson <ross.philipson@xxxxxxxxxx>
[PATCH v5 03/12] x86: Secure Launch Kconfig
From
: Ross Philipson <ross.philipson@xxxxxxxxxx>
[PATCH v5 05/12] x86: Add early SHA support for Secure Launch early measurements
From
: Ross Philipson <ross.philipson@xxxxxxxxxx>
[PATCH v5 08/12] x86: Secure Launch SMP bringup support
From
: Ross Philipson <ross.philipson@xxxxxxxxxx>
RE: [PATCH v2 0/6] bpf-lsm: Extend interoperability with IMA
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH 5/5] spi: make remove callback a void function
From
: Hans Verkuil <hverkuil@xxxxxxxxx>
Re: [PATCH v10 13/27] ima: Only accept AUDIT rules for non-init_ima_ns namespaces for now
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v10 11/27] ima: Move ima_lsm_policy_notifier into ima_namespace
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v10 11/27] ima: Move ima_lsm_policy_notifier into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v10 11/27] ima: Move ima_lsm_policy_notifier into ima_namespace
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v8 0/5] Enable root to update the blacklist keyring
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v10 08/27] ima: Move measurement list related variables into ima_namespace
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v10 10/27] ima: Move IMA securityfs files into ima_namespace or onto stack
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v10 09/27] ima: Move some IMA policy and filesystem related variables into ima_namespace
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v10 06/27] ima: Move arch_policy_entry into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v10 06/27] ima: Move arch_policy_entry into ima_namespace
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v10 06/27] ima: Move arch_policy_entry into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v10 05/27] ima: Define ima_namespace struct and start moving variables into it
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v10 06/27] ima: Move arch_policy_entry into ima_namespace
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v10 05/27] ima: Define ima_namespace struct and start moving variables into it
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v10 07/27] ima: Move ima_htable into ima_namespace
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5 1/8] ima: rename IMA_ACTION_FLAGS to IMA_NONACTION_FLAGS
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v10 03/27] ima: Return error code obtained from securityfs functions
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
RE: [PATCH v2 3/6] bpf-lsm: Introduce new helper bpf_ima_file_hash()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v2 3/6] bpf-lsm: Introduce new helper bpf_ima_file_hash()
From
: Yonghong Song <yhs@xxxxxx>
RE: [PATCH v2 6/6] selftests/bpf: Add test for bpf_lsm_kernel_read_file()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v4 00/14] x86: Trenchboot secure dynamic launch Linux kernel support
From
: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 6/6] selftests/bpf: Add test for bpf_lsm_kernel_read_file()
From
: Shuah Khan <skhan@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 4/6] selftests/bpf: Add test for bpf_ima_file_hash()
From
: Shuah Khan <skhan@xxxxxxxxxxxxxxxxxxx>
RE: [PATCH v2 1/6] ima: Fix documentation-related warnings in ima_main.c
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v2 1/6] ima: Fix documentation-related warnings in ima_main.c
From
: Shuah Khan <skhan@xxxxxxxxxxxxxxxxxxx>
[PATCH v5] KEYS: encrypted: Instantiate key with user-provided decrypted data
From
: Yael Tzur <yaelt@xxxxxxxxxx>
[PATCH v2 6/6] selftests/bpf: Add test for bpf_lsm_kernel_read_file()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v2 5/6] bpf-lsm: Make bpf_lsm_kernel_read_file() as sleepable
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v2 4/6] selftests/bpf: Add test for bpf_ima_file_hash()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v2 2/6] ima: Always return a file measurement in ima_file_hash()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v2 0/6] bpf-lsm: Extend interoperability with IMA
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v2 1/6] ima: Fix documentation-related warnings in ima_main.c
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v2 3/6] bpf-lsm: Introduce new helper bpf_ima_file_hash()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH] ima: Calculate digest in ima_inode_hash() if not available
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
RE: [PATCH] ima: Calculate digest in ima_inode_hash() if not available
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 1/1] ci: Remove CentOS 8
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH] ima: Calculate digest in ima_inode_hash() if not available
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5 2/8] ima: define ima_max_digest_data struct without a flexible array variable
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v5 4/8] ima: define a new template field 'd-type' and a new template 'ima-ngv2'
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v5 1/8] ima: rename IMA_ACTION_FLAGS to IMA_NONACTION_FLAGS
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v5 2/6] powerpc/kexec_file: Add KEXEC_SIG support.
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
RE: [PATCH] ima: Calculate digest in ima_inode_hash() if not available
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v5 2/6] powerpc/kexec_file: Add KEXEC_SIG support.
From
: Michal Suchánek <msuchanek@xxxxxxx>
Re: [PATCH v5 2/6] powerpc/kexec_file: Add KEXEC_SIG support.
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v8 07/17] integrity: restrict INTEGRITY_KEYRING_MACHINE to restrict_link_by_ca
From
: Darren Kenny <darren.kenny@xxxxxxxxxx>
Re: [PATCH v8 17/17] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true
From
: Darren Kenny <darren.kenny@xxxxxxxxxx>
Re: [PATCH v8 16/17] integrity: Trust MOK keys if MokListTrustedRT found
From
: Darren Kenny <darren.kenny@xxxxxxxxxx>
Re: [PATCH v8 15/17] efi/mokvar: move up init order
From
: Darren Kenny <darren.kenny@xxxxxxxxxx>
Re: [PATCH v8 14/17] KEYS: link machine trusted keys to secondary_trusted_keys
From
: Darren Kenny <darren.kenny@xxxxxxxxxx>
Re: [PATCH v8 13/17] integrity: store reference to machine keyring
From
: Darren Kenny <darren.kenny@xxxxxxxxxx>
Re: [PATCH v8 11/17] KEYS: Introduce link restriction for machine keys
From
: Darren Kenny <darren.kenny@xxxxxxxxxx>
Re: [PATCH v8 10/17] KEYS: add a reference to machine keyring
From
: Darren Kenny <darren.kenny@xxxxxxxxxx>
Re: [PATCH v5 2/6] powerpc/kexec_file: Add KEXEC_SIG support.
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [PATCH] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
Re: [PATCH v5 0/6] KEXEC_SIG with appended signature
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5 0/6] KEXEC_SIG with appended signature
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5 2/6] powerpc/kexec_file: Add KEXEC_SIG support.
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] ima: Calculate digest in ima_inode_hash() if not available
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [PATCH] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [PATCH v3] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Lukas Wunner <lukas@xxxxxxxxx>
Re: [PATCH] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
Re: [PATCH] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]