Linux Integrity
Thread Index
[
Prev Page
][
Next Page
]
[PATCH v11 00/27] ima: Namespace IMA with audit support in IMA-ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 04/27] ima: Define ima_namespace struct and start moving variables into it
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 02/27] securityfs: rework dentry creation
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 03/27] securityfs: Extend securityfs with namespacing support
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 05/27] ima: Move arch_policy_entry into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 06/27] ima: Move ima_htable into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 13/27] ima: Only accept AUDIT rules for non-init_ima_ns namespaces for now
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 20/27] ima: Namespace audit status flags
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 08/27] ima: Move some IMA policy and filesystem related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 24/27] ima: Show owning user namespace's uid and gid when displaying policy
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 09/27] ima: Move IMA securityfs files into ima_namespace or onto stack
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 23/27] ima: Introduce securityfs file to activate an IMA namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 07/27] ima: Move measurement list related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 19/27] integrity: Add optional callback function to integrity_inode_free()
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 01/27] ima: Return error code obtained from securityfs functions
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 26/27] ima: Restrict informational audit messages to init_ima_ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 27/27] ima: Enable IMA namespaces
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 17/27] ima: Add functions for creating and freeing of an ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 21/27] ima: Remove unused iints from the integrity_iint_cache
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 18/27] integrity/ima: Define ns_status for storing namespaced iint data
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 12/27] ima: Define mac_admin_ns_capable() as a wrapper for ns_capable()
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 10/27] ima: Move ima_lsm_policy_notifier into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 11/27] ima: Switch to lazy lsm policy updates for better performance
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 25/27] ima: Limit number of policy rules in non-init_ima_ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 16/27] ima: Implement ima_free_policy_rules() for freeing of an ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v11 15/27] ima: Implement hierarchical processing of file accesses
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v3 5/9] selftests/bpf: Add test for bpf_ima_file_hash()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v3 6/9] selftests/bpf: Check if the digest is refreshed after a file write
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v3 9/9] selftests/bpf: Check that bpf_kernel_read_file() denies reading IMA policy
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v3 8/9] selftests/bpf: Add test for bpf_lsm_kernel_read_file()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v3 7/9] bpf-lsm: Make bpf_lsm_kernel_read_file() as sleepable
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v3 3/9] bpf-lsm: Introduce new helper bpf_ima_file_hash()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v3 4/9] selftests/bpf: Move sample generation code to ima_test_common()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v3 2/9] ima: Always return a file measurement in ima_file_hash()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v3 0/9] bpf-lsm: Extend interoperability with IMA
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v3 1/9] ima: Fix documentation-related warnings in ima_main.c
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v9 0/1] This patch fixes a reference count issue in the TPM core code
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
[PATCH v9 1/1] tpm: fix reference counting for struct tpm_chip
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
Re: [PATCH 5/5] spi: make remove callback a void function
From
: Pavel Machek <pavel@xxxxxx>
RE: [EXT] Re: [PATCH v5 3/5] KEYS: trusted: allow trust sources to use kernel RNG for key material
From
: Pankaj Gupta <pankaj.gupta@xxxxxxx>
RE: [EXT] [PATCH v5 5/5] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Pankaj Gupta <pankaj.gupta@xxxxxxx>
Re: [PATCH v8 0/3] integrity: support including firmware ".platform" keys at build time
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v8 1/1] tpm: fix reference counting for struct tpm_chip
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
Re: [PATCH v8 0/1] tpm: fix reference counting for struct tpm_chip
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
Re: [PATCH v8 1/1] tpm: fix reference counting for struct tpm_chip
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
Re: [PATCH v8 1/1] tpm: fix reference counting for struct tpm_chip
From
: Jason Gunthorpe <jgg@xxxxxxxx>
Re: [PATCH v8 0/1] tpm: fix reference counting for struct tpm_chip
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v8 1/1] tpm: fix reference counting for struct tpm_chip
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH] ima: remove redundant initialization of pointer 'file'.
From
: Colin Ian King <colin.i.king@xxxxxxxxx>
[PATCH v8 1/1] tpm: fix reference counting for struct tpm_chip
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
[PATCH v8 0/1] tpm: fix reference counting for struct tpm_chip
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
Re: [PATCH 2/2] integrity: double check iint_cache was initialized
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 2/2] integrity: double check iint_cache was initialized
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH] MAINTAINERS: add missing security/integrity/platform_certs
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v5 4/5] crypto: caam - add in-kernel interface for blob generator
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2 0/6] bpf-lsm: Extend interoperability with IMA
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
RE: [PATCH v2 0/6] bpf-lsm: Extend interoperability with IMA
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
RE: [PATCH v2 0/6] bpf-lsm: Extend interoperability with IMA
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v2 0/6] bpf-lsm: Extend interoperability with IMA
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 0/6] bpf-lsm: Extend interoperability with IMA
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v5 4/8] ima: define a new template field 'd-type' and a new template 'ima-ngv2'
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 2/2] integrity: double check iint_cache was initialized
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [RFC PATCH] KEYS: Double max_size to make keyctl pkey_verify work
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v2 0/6] bpf-lsm: Extend interoperability with IMA
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5 00/12] x86: Trenchboot secure dynamic launch Linux kernel support
From
: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
RE: [EXT] [PATCH v5 5/5] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Pankaj Gupta <pankaj.gupta@xxxxxxx>
RE: [EXT] Re: [PATCH v5 4/5] crypto: caam - add in-kernel interface for blob generator
From
: Pankaj Gupta <pankaj.gupta@xxxxxxx>
RE: [EXT] Re: [PATCH v5 3/5] KEYS: trusted: allow trust sources to use kernel RNG for key material
From
: Pankaj Gupta <pankaj.gupta@xxxxxxx>
RE: [PATCH v2 0/6] bpf-lsm: Extend interoperability with IMA
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v2 0/6] bpf-lsm: Extend interoperability with IMA
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 2/2] integrity: double check iint_cache was initialized
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH v5 4/8] ima: define a new template field 'd-type' and a new template 'ima-ngv2'
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH 2/2] integrity: double check iint_cache was initialized
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH 2/2] integrity: double check iint_cache was initialized
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH v5 4/8] ima: define a new template field 'd-type' and a new template 'ima-ngv2'
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 2/2] integrity: double check iint_cache was initialized
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH v10 18/27] integrity/ima: Define ns_status for storing namespaced iint data
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v10 18/27] integrity/ima: Define ns_status for storing namespaced iint data
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v5 3/8] fs-verity: define a function to return the integrity protected file digest
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5 3/8] fs-verity: define a function to return the integrity protected file digest
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5 6/8] ima: define signature version 3
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v5 3/8] fs-verity: define a function to return the integrity protected file digest
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v5 7/8] ima: support fs-verity file digest based version 3 signatures
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v5 5/8] ima: permit fsverity's file digests in the IMA measurement list
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v5 4/8] ima: define a new template field 'd-type' and a new template 'ima-ngv2'
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v5 3/8] fs-verity: define a function to return the integrity protected file digest
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v10 24/27] ima: Introduce securityfs file to activate an IMA namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v10 26/27] ima: Limit number of policy rules in non-init_ima_ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v10 26/27] ima: Limit number of policy rules in non-init_ima_ns
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v10 27/27] ima: Enable IMA namespaces
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v10 26/27] ima: Limit number of policy rules in non-init_ima_ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v4] syscalls/keyctl09: test encrypted keys with provided decrypted data.
From
: Yael Tzur <yaelt@xxxxxxxxxx>
[PATCH] MAINTAINERS: add missing security/integrity/platform_certs
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v10 12/27] ima: Define mac_admin_ns_capable() as a wrapper for ns_capable()
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: [PATCH v10 27/27] ima: Enable IMA namespaces
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: [PATCH v5 00/12] x86: Trenchboot secure dynamic launch Linux kernel support
From
: Dave Hansen <dave.hansen@xxxxxxxxx>
Re: [PATCH v10 24/27] ima: Introduce securityfs file to activate an IMA namespace
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v10 24/27] ima: Introduce securityfs file to activate an IMA namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v10 26/27] ima: Limit number of policy rules in non-init_ima_ns
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v10 26/27] ima: Limit number of policy rules in non-init_ima_ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v5 3/5] KEYS: trusted: allow trust sources to use kernel RNG for key material
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH v5 4/5] crypto: caam - add in-kernel interface for blob generator
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH v10 18/27] integrity/ima: Define ns_status for storing namespaced iint data
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: Unintended file entry addition in commit 7ed88a03b15b ("certs: Check that builtin blacklist hashes are valid")?
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v10 22/27] securityfs: Extend securityfs with namespacing support
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v5 2/5] KEYS: trusted: allow users to use kernel RNG for key material
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v5 4/5] crypto: caam - add in-kernel interface for blob generator
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v10 26/27] ima: Limit number of policy rules in non-init_ima_ns
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [LTP] [PATCH v3] syscalls/keyctl09: test encrypted keys with provided decrypted data.
From
: Cyril Hrubis <chrubis@xxxxxxx>
Re: [PATCH v10 25/27] ima: Show owning user namespace's uid and gid when displaying policy
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v10 24/27] ima: Introduce securityfs file to activate an IMA namespace
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Unintended file entry addition in commit 7ed88a03b15b ("certs: Check that builtin blacklist hashes are valid")?
From
: Lukas Bulwahn <lukas.bulwahn@xxxxxxxxx>
Re: [PATCH v3] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [PATCH v10 23/27] ima: Setup securityfs for IMA namespace
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v10 22/27] securityfs: Extend securityfs with namespacing support
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [EXTERNAL] [PATCH] EVM: fix the evm= __setup handler return value
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v10 22/27] securityfs: Extend securityfs with namespacing support
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v32 05/28] IMA: avoid label collisions with stacked LSMs
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH] EVM: fix the evm= __setup handler return value
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
[PATCH v5 1/5] KEYS: trusted: allow use of TEE as backend without TCG_TPM support
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH v5 5/5] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH v5 2/5] KEYS: trusted: allow users to use kernel RNG for key material
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH v5 3/5] KEYS: trusted: allow trust sources to use kernel RNG for key material
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH v5 0/5] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH v5 4/5] crypto: caam - add in-kernel interface for blob generator
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH v3] syscalls/keyctl09: test encrypted keys with provided decrypted data.
From
: Yael Tzur <yaelt@xxxxxxxxxx>
Re: [EXT] Re: [PATCH v4 5/5] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: init_ima() adds 8 % to boot time
From
: Petr Vorel <pvorel@xxxxxxx>
RE: [EXT] Re: [PATCH v4 5/5] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Pankaj Gupta <pankaj.gupta@xxxxxxx>
Re: [PATCH v5] KEYS: encrypted: Instantiate key with user-provided decrypted data
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] KEYS: asymmetric: enforce SM2 signature use pkey algo
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH 2/2] KEYS: asymmetric: properly validate hash_algo and encoding
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: init_ima() adds 8 % to boot time
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v8 0/3] integrity: support including firmware ".platform" keys at build time
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v5] KEYS: encrypted: Instantiate key with user-provided decrypted data
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5] KEYS: encrypted: Instantiate key with user-provided decrypted data
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH 2/2] KEYS: asymmetric: properly validate hash_algo and encoding
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [RFC PATCH] KEYS: Double max_size to make keyctl pkey_verify work
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH] KEYS: asymmetric: enforce SM2 signature use pkey algo
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
Re: [PATCH 2/2] KEYS: asymmetric: properly validate hash_algo and encoding
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH 1/2] KEYS: asymmetric: enforce that sig algo matches key algo
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] KEYS: trusted: Avoid calling null function trusted_key_exit
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] KEYS: asymmetric: enforce SM2 signature use pkey algo
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [RFC PATCH] KEYS: Double max_size to make keyctl pkey_verify work
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [RFC PATCH] KEYS: Double max_size to make keyctl pkey_verify work
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [RFC PATCH] KEYS: Double max_size to make keyctl pkey_verify work
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v8 00/17] Enroll kernel keys thru MOK
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: init_ima() adds 8 % to boot time
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] KEYS: trusted: fix crash when TPM/TEE are built as module
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] KEYS: trusted: fix crash when TPM/TEE are built as module
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v8 0/3] integrity: support including firmware ".platform" keys at build time
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: init_ima() adds 8 % to boot time
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: init_ima() adds 8 % to boot time
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v8 0/5] Enable root to update the blacklist keyring
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
init_ima() adds 8 % to boot time
From
: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
Re: [PATCH v10 16/27] ima: Implement ima_free_policy_rules() for freeing of an ima_namespace
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v10 17/27] ima: Add functions for creating and freeing of an ima_namespace
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v10 16/27] ima: Implement ima_free_policy_rules() for freeing of an ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v10 16/27] ima: Implement ima_free_policy_rules() for freeing of an ima_namespace
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v10 15/27] ima: Implement hierarchical processing of file accesses
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v10 14/27] userns: Add pointer to ima_namespace to user_namespace
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v5 01/12] x86/boot: Place kernel_info at a fixed offset
From
: Ross Philipson <ross.philipson@xxxxxxxxxx>
[PATCH v5 02/12] Documentation/x86: Secure Launch kernel documentation
From
: Ross Philipson <ross.philipson@xxxxxxxxxx>
[PATCH v5 11/12] x86: Secure Launch late initcall platform module
From
: Ross Philipson <ross.philipson@xxxxxxxxxx>
[PATCH v5 06/12] x86: Secure Launch kernel early boot stub
From
: Ross Philipson <ross.philipson@xxxxxxxxxx>
[PATCH v5 09/12] kexec: Secure Launch kexec SEXIT support
From
: Ross Philipson <ross.philipson@xxxxxxxxxx>
[PATCH v5 04/12] x86: Secure Launch main header file
From
: Ross Philipson <ross.philipson@xxxxxxxxxx>
[PATCH v5 10/12] reboot: Secure Launch SEXIT support on reboot paths
From
: Ross Philipson <ross.philipson@xxxxxxxxxx>
[PATCH v5 07/12] x86: Secure Launch kernel late boot stub
From
: Ross Philipson <ross.philipson@xxxxxxxxxx>
[PATCH v5 12/12] tpm: Allow locality 2 to be set when initializing the TPM for Secure Launch
From
: Ross Philipson <ross.philipson@xxxxxxxxxx>
[PATCH v5 00/12] x86: Trenchboot secure dynamic launch Linux kernel support
From
: Ross Philipson <ross.philipson@xxxxxxxxxx>
[PATCH v5 03/12] x86: Secure Launch Kconfig
From
: Ross Philipson <ross.philipson@xxxxxxxxxx>
[PATCH v5 05/12] x86: Add early SHA support for Secure Launch early measurements
From
: Ross Philipson <ross.philipson@xxxxxxxxxx>
[PATCH v5 08/12] x86: Secure Launch SMP bringup support
From
: Ross Philipson <ross.philipson@xxxxxxxxxx>
RE: [PATCH v2 0/6] bpf-lsm: Extend interoperability with IMA
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH 5/5] spi: make remove callback a void function
From
: Hans Verkuil <hverkuil@xxxxxxxxx>
Re: [PATCH v10 13/27] ima: Only accept AUDIT rules for non-init_ima_ns namespaces for now
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v10 11/27] ima: Move ima_lsm_policy_notifier into ima_namespace
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v10 11/27] ima: Move ima_lsm_policy_notifier into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v10 11/27] ima: Move ima_lsm_policy_notifier into ima_namespace
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v8 0/5] Enable root to update the blacklist keyring
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v10 08/27] ima: Move measurement list related variables into ima_namespace
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v10 10/27] ima: Move IMA securityfs files into ima_namespace or onto stack
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v10 09/27] ima: Move some IMA policy and filesystem related variables into ima_namespace
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v10 06/27] ima: Move arch_policy_entry into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v10 06/27] ima: Move arch_policy_entry into ima_namespace
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v10 06/27] ima: Move arch_policy_entry into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v10 05/27] ima: Define ima_namespace struct and start moving variables into it
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v10 06/27] ima: Move arch_policy_entry into ima_namespace
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v10 05/27] ima: Define ima_namespace struct and start moving variables into it
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v10 07/27] ima: Move ima_htable into ima_namespace
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5 1/8] ima: rename IMA_ACTION_FLAGS to IMA_NONACTION_FLAGS
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v10 03/27] ima: Return error code obtained from securityfs functions
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
RE: [PATCH v2 3/6] bpf-lsm: Introduce new helper bpf_ima_file_hash()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v2 3/6] bpf-lsm: Introduce new helper bpf_ima_file_hash()
From
: Yonghong Song <yhs@xxxxxx>
RE: [PATCH v2 6/6] selftests/bpf: Add test for bpf_lsm_kernel_read_file()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v4 00/14] x86: Trenchboot secure dynamic launch Linux kernel support
From
: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 6/6] selftests/bpf: Add test for bpf_lsm_kernel_read_file()
From
: Shuah Khan <skhan@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 4/6] selftests/bpf: Add test for bpf_ima_file_hash()
From
: Shuah Khan <skhan@xxxxxxxxxxxxxxxxxxx>
RE: [PATCH v2 1/6] ima: Fix documentation-related warnings in ima_main.c
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v2 1/6] ima: Fix documentation-related warnings in ima_main.c
From
: Shuah Khan <skhan@xxxxxxxxxxxxxxxxxxx>
[PATCH v5] KEYS: encrypted: Instantiate key with user-provided decrypted data
From
: Yael Tzur <yaelt@xxxxxxxxxx>
[PATCH v2 6/6] selftests/bpf: Add test for bpf_lsm_kernel_read_file()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v2 5/6] bpf-lsm: Make bpf_lsm_kernel_read_file() as sleepable
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v2 4/6] selftests/bpf: Add test for bpf_ima_file_hash()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v2 2/6] ima: Always return a file measurement in ima_file_hash()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v2 0/6] bpf-lsm: Extend interoperability with IMA
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v2 1/6] ima: Fix documentation-related warnings in ima_main.c
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v2 3/6] bpf-lsm: Introduce new helper bpf_ima_file_hash()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH] ima: Calculate digest in ima_inode_hash() if not available
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
RE: [PATCH] ima: Calculate digest in ima_inode_hash() if not available
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 1/1] ci: Remove CentOS 8
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH] ima: Calculate digest in ima_inode_hash() if not available
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5 2/8] ima: define ima_max_digest_data struct without a flexible array variable
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v5 4/8] ima: define a new template field 'd-type' and a new template 'ima-ngv2'
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v5 1/8] ima: rename IMA_ACTION_FLAGS to IMA_NONACTION_FLAGS
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v5 2/6] powerpc/kexec_file: Add KEXEC_SIG support.
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
RE: [PATCH] ima: Calculate digest in ima_inode_hash() if not available
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v5 2/6] powerpc/kexec_file: Add KEXEC_SIG support.
From
: Michal Suchánek <msuchanek@xxxxxxx>
Re: [PATCH v5 2/6] powerpc/kexec_file: Add KEXEC_SIG support.
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v8 07/17] integrity: restrict INTEGRITY_KEYRING_MACHINE to restrict_link_by_ca
From
: Darren Kenny <darren.kenny@xxxxxxxxxx>
Re: [PATCH v8 17/17] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true
From
: Darren Kenny <darren.kenny@xxxxxxxxxx>
Re: [PATCH v8 16/17] integrity: Trust MOK keys if MokListTrustedRT found
From
: Darren Kenny <darren.kenny@xxxxxxxxxx>
Re: [PATCH v8 15/17] efi/mokvar: move up init order
From
: Darren Kenny <darren.kenny@xxxxxxxxxx>
Re: [PATCH v8 14/17] KEYS: link machine trusted keys to secondary_trusted_keys
From
: Darren Kenny <darren.kenny@xxxxxxxxxx>
Re: [PATCH v8 13/17] integrity: store reference to machine keyring
From
: Darren Kenny <darren.kenny@xxxxxxxxxx>
Re: [PATCH v8 11/17] KEYS: Introduce link restriction for machine keys
From
: Darren Kenny <darren.kenny@xxxxxxxxxx>
Re: [PATCH v8 10/17] KEYS: add a reference to machine keyring
From
: Darren Kenny <darren.kenny@xxxxxxxxxx>
Re: [PATCH v5 2/6] powerpc/kexec_file: Add KEXEC_SIG support.
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [PATCH] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
Re: [PATCH v5 0/6] KEXEC_SIG with appended signature
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5 0/6] KEXEC_SIG with appended signature
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5 2/6] powerpc/kexec_file: Add KEXEC_SIG support.
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] ima: Calculate digest in ima_inode_hash() if not available
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [PATCH] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [PATCH v3] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Lukas Wunner <lukas@xxxxxxxxx>
Re: [PATCH] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
Re: [PATCH] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
[PATCH v5 8/8] fsverity: update the documentation
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v5 1/8] ima: rename IMA_ACTION_FLAGS to IMA_NONACTION_FLAGS
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v5 5/8] ima: permit fsverity's file digests in the IMA measurement list
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v5 2/8] ima: define ima_max_digest_data struct without a flexible array variable
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v5 4/8] ima: define a new template field 'd-type' and a new template 'ima-ngv2'
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v5 3/8] fs-verity: define a function to return the integrity protected file digest
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v5 6/8] ima: define signature version 3
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v5 0/8] ima: support fs-verity digests and signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v5 7/8] ima: support fs-verity file digest based version 3 signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
Re: [PATCH v5 2/6] powerpc/kexec_file: Add KEXEC_SIG support.
From
: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
Re: [PATCH] ima: Calculate digest in ima_inode_hash() if not available
From
: Florent Revest <revest@xxxxxxxxxxxx>
RE: [PATCH] ima: Calculate digest in ima_inode_hash() if not available
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH] ima: Calculate digest in ima_inode_hash() if not available
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH] ima: Calculate digest in ima_inode_hash() if not available
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [PATCH v4 7/8] ima: support fs-verity file digest based version 3 signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5 0/6] KEXEC_SIG with appended signature
From
: Luis Chamberlain <mcgrof@xxxxxxxxxx>
Re: [PATCH] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
Re: [PATCH v10 04/27] securityfs: rework dentry creation
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v10 01/27] ima: Remove ima_policy file before directory
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v10 03/27] ima: Return error code obtained from securityfs functions
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [PATCH v2] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
[PATCH v2] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [PATCH] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [PATCH] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [PATCH] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [PATCH] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [PATCH] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
Re: [PATCH] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
Re: [PATCH] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [PATCH] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
RE: [PATCH] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: David Laight <David.Laight@xxxxxxxxxx>
[PATCH] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [PATCH v5 2/6] powerpc/kexec_file: Add KEXEC_SIG support.
From
: Michal Suchánek <msuchanek@xxxxxxx>
Re: [PATCH v5 2/6] powerpc/kexec_file: Add KEXEC_SIG support.
From
: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
Re: [PATCH v5 2/6] powerpc/kexec_file: Add KEXEC_SIG support.
From
: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
Re: [PATCH v5 0/6] KEXEC_SIG with appended signature
From
: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
Re: Problem with commit ccf11dbaa07b ("evm: Fix memleak in init_desc")
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
Re: Problem with commit ccf11dbaa07b ("evm: Fix memleak in init_desc")
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v4 0/8] ima: support fs-verity digests and signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 5/5] spi: make remove callback a void function
From
: Mark Brown <broonie@xxxxxxxxxx>
Re: [PATCH] KEYS: asymmetric: enforce SM2 signature use pkey algo
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
[PATCH v2] KEYS: asymmetric: enforce SM2 signature use pkey algo
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
Re: [PATCH v2 2/2] KEYS: asymmetric: properly validate hash_algo and encoding
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v2 1/2] KEYS: asymmetric: enforce that sig algo matches key algo
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Problem with commit ccf11dbaa07b ("evm: Fix memleak in init_desc")
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
Re: [PATCH v4 0/8] ima: support fs-verity digests and signatures
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH] KEYS: asymmetric: enforce SM2 signature use pkey algo
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v2 0/2] Fix bugs in public_key_verify_signature()
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v2 2/2] KEYS: asymmetric: properly validate hash_algo and encoding
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v2 1/2] KEYS: asymmetric: enforce that sig algo matches key algo
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v4 7/8] ima: support fs-verity file digest based version 3 signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v4 2/8] ima: define ima_max_digest_data struct without a flexible array variable
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v4 5/8] ima: permit fsverity's file digests in the IMA measurement list
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v4 3/8] fs-verity: define a function to return the integrity protected file digest
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v4 6/8] ima: define signature version 3
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v4 8/8] fsverity: update the documentation
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v4 0/8] ima: support fs-verity digests and signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v4 1/8] ima: rename IMA_ACTION_FLAGS to IMA_NONACTION_FLAGS
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v4 4/8] ima: define a new template field 'd-type' and a new template 'ima-ngv2'
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] KEYS: trusted: fix crash when TPM/TEE are built as module
From
: Tong Zhang <ztong0001@xxxxxxxxx>
[ANNOUNCE][CFP] Linux Security Summit North America 2022
From
: James Morris <jmorris@xxxxxxxxx>
Re: [GIT PULL] integrity: subsystem fixes for v5.17
From
: pr-tracker-bot@xxxxxxxxxx
Re: [PATCH v10 12/27] ima: Define mac_admin_ns_capable() as a wrapper for ns_capable()
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH] KEYS: trusted: Avoid calling null function trusted_key_exit
From
: Dave Kleikamp <dave.kleikamp@xxxxxxxxxx>
[PATCH] KEYS: asymmetric: enforce SM2 signature use pkey algo
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
Re: [PATCH 0/2] Fix bugs in public_key_verify_signature()
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
[GIT PULL] integrity: subsystem fixes for v5.17
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v10 12/27] ima: Define mac_admin_ns_capable() as a wrapper for ns_capable()
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH] KEYS: trusted: fix crash when TPM/TEE are built as module
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH v10 12/27] ima: Define mac_admin_ns_capable() as a wrapper for ns_capable()
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
[PATCH] KEYS: trusted: fix crash when TPM/TEE are built as module
From
: Tong Zhang <ztong0001@xxxxxxxxx>
Re: [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v5 3/6] kexec_file: Don't opencode appended signature verification.
From
: Michal Suchánek <msuchanek@xxxxxxx>
Re: [RFC PATCH] KEYS: Double max_size to make keyctl pkey_verify work
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [RFC PATCH] KEYS: Double max_size to make keyctl pkey_verify work
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [RFC PATCH] KEYS: Double max_size to make keyctl pkey_verify work
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v32 15/28] LSM: Ensure the correct LSM context releaser
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v32 13/28] LSM: Use lsmblob in security_cred_getsecid
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v32 12/28] LSM: Use lsmblob in security_inode_getsecid
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [RFC PATCH] KEYS: Double max_size to make keyctl pkey_verify work
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v32 11/28] LSM: Use lsmblob in security_current_getsecid
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [RFC PATCH] KEYS: Double max_size to make keyctl pkey_verify work
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v10 00/27] ima: Namespace IMA with audit support in IMA-ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [RFC PATCH] KEYS: Double max_size to make keyctl pkey_verify work
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v10 00/27] ima: Namespace IMA with audit support in IMA-ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v10 00/27] ima: Namespace IMA with audit support in IMA-ns
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v10 00/27] ima: Namespace IMA with audit support in IMA-ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v10 02/27] ima: Do not print policy rule with inactive LSM labels
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v10 00/27] ima: Namespace IMA with audit support in IMA-ns
From
: Christian Brauner <brauner@xxxxxxxxxx>
[PATCH] ima: fix semicolon.cocci warnings
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v10 15/27] ima: Implement hierarchical processing of file accesses
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [RFC PATCH] KEYS: Double max_size to make keyctl pkey_verify work
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[RFC PATCH] KEYS: Double max_size to make keyctl pkey_verify work
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH 1/2] KEYS: asymmetric: enforce that sig algo matches key algo
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH 1/2] KEYS: asymmetric: enforce that sig algo matches key algo
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH 1/2] KEYS: asymmetric: enforce that sig algo matches key algo
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH 1/2] KEYS: asymmetric: enforce that sig algo matches key algo
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v10 02/27] ima: Do not print policy rule with inactive LSM labels
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 04/27] securityfs: rework dentry creation
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 25/27] ima: Show owning user namespace's uid and gid when displaying policy
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 14/27] userns: Add pointer to ima_namespace to user_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 09/27] ima: Move some IMA policy and filesystem related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 16/27] ima: Implement ima_free_policy_rules() for freeing of an ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 00/27] ima: Namespace IMA with audit support in IMA-ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 08/27] ima: Move measurement list related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 05/27] ima: Define ima_namespace struct and start moving variables into it
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 15/27] ima: Implement hierarchical processing of file accesses
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 24/27] ima: Introduce securityfs file to activate an IMA namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 10/27] ima: Move IMA securityfs files into ima_namespace or onto stack
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 17/27] ima: Add functions for creating and freeing of an ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 27/27] ima: Enable IMA namespaces
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 20/27] ima: Namespace audit status flags
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 22/27] securityfs: Extend securityfs with namespacing support
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 12/27] ima: Define mac_admin_ns_capable() as a wrapper for ns_capable()
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 13/27] ima: Only accept AUDIT rules for non-init_ima_ns namespaces for now
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 19/27] integrity: Add optional callback function to integrity_inode_free()
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 07/27] ima: Move ima_htable into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 06/27] ima: Move arch_policy_entry into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 23/27] ima: Setup securityfs for IMA namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 11/27] ima: Move ima_lsm_policy_notifier into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 01/27] ima: Remove ima_policy file before directory
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 18/27] integrity/ima: Define ns_status for storing namespaced iint data
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 21/27] ima: Remove unused iints from the integrity_iint_cache
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 26/27] ima: Limit number of policy rules in non-init_ima_ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 03/27] ima: Return error code obtained from securityfs functions
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v3 0/8] ima: support fs-verity digests and signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 7/8] ima: support fs-verity file digest based version 3 signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 0/2] Fix bugs in public_key_verify_signature()
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v3 7/8] ima: support fs-verity file digest based version 3 signatures
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v3 5/8] ima: include fsverity's file digests in the IMA measurement list
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v3 3/8] fs-verity: define a function to return the integrity protected file digest
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v3 0/8] ima: support fs-verity digests and signatures
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH 1/2] KEYS: asymmetric: enforce that sig algo matches key algo
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH 2/2] KEYS: asymmetric: properly validate hash_algo and encoding
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH 0/2] Fix bugs in public_key_verify_signature()
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v9 04/23] securityfs: Extend securityfs with namespacing support
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v9 04/23] securityfs: Extend securityfs with namespacing support
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [RFC][PATCH v3a 00/11] ima: support fs-verity digests and signatures (alternative)
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [RFC][PATCH v3a 00/11] ima: support fs-verity digests and signatures (alternative)
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [RFC][PATCH v3a 00/11] ima: support fs-verity digests and signatures (alternative)
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [RFC][PATCH v3a 00/11] ima: support fs-verity digests and signatures (alternative)
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH] ima: Allow template selection with ima_template[_fmt]= after ima_hash=
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v9 16/23] ima: Implement ima_free_policy_rules() for freeing of an ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH] ima: Allow template selection with ima_template[_fmt]= after ima_hash=
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
RE: [RFC][PATCH v3a 00/11] ima: support fs-verity digests and signatures (alternative)
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v8 0/5] Enable root to update the blacklist keyring
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [RFC][PATCH v3a 00/11] ima: support fs-verity digests and signatures (alternative)
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v9 00/23] ima: Namespace IMA with audit support in IMA-ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v9 09/23] ima: Move some IMA policy and filesystem related variables into ima_namespace
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
RE: [RESEND][PATCH] Documentation: added order requirement for ima_hash=
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v9 09/23] ima: Move some IMA policy and filesystem related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [RESEND][PATCH] Documentation: added order requirement for ima_hash=
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v9 08/23] ima: Move measurement list related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v9 16/23] ima: Implement ima_free_policy_rules() for freeing of an ima_namespace
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
RE: [RESEND][PATCH] Documentation: added order requirement for ima_hash=
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [RESEND][PATCH] Documentation: added order requirement for ima_hash=
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
RE: [RFC][PATCH v3a 00/11] ima: support fs-verity digests and signatures (alternative)
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v9 10/23] ima: Move IMA securityfs files into ima_namespace or onto stack
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v9 09/23] ima: Move some IMA policy and filesystem related variables into ima_namespace
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v9 08/23] ima: Move measurement list related variables into ima_namespace
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v9 06/23] ima: Move arch_policy_entry into ima_namespace
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [RFC][PATCH v3a 00/11] ima: support fs-verity digests and signatures (alternative)
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [RFC][PATCH v3a 00/11] ima: support fs-verity digests and signatures (alternative)
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[RFC][PATCH v3a 10/11] evm: Include fsverity formatted digest in the HMAC/digest calculation
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[RFC][PATCH v3a 09/11] ima: Add support for fsverity signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[RFC][PATCH v3a 00/11] ima: support fs-verity digests and signatures (alternative)
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[RFC][PATCH v3a 06/11] fsverity: Introduce fsverity_get_formatted_digest()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[RFC][PATCH v3a 07/11] fsverity: Introduce fsverity_get_signature()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[RFC][PATCH v3a 08/11] fsverity: Completely disable signature verification if not requested
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v9 10/23] ima: Move IMA securityfs files into ima_namespace or onto stack
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v9 04/23] securityfs: Extend securityfs with namespacing support
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v9 21/23] ima: Introduce securityfs file to activate an IMA namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v8 1/3] certs: export load_certificate_list() to be used outside certs/
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v9 02/23] ima: Do not print policy rule with inactive LSM labels
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [RESEND][PATCH] Documentation: added order requirement for ima_hash=
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [RESEND][PATCH] Documentation: added order requirement for ima_hash=
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
Re: [PATCH v2] KEYS: trusted: Avoid calling null function trusted_key_exit
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH v4] integrity: check the return value of audit_log_start()
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v4] integrity: check the return value of audit_log_start()
From
: "Xiaoke Wang" <xkernel.wang@xxxxxxxxxxx>
Re: [PATCH v9 22/23] ima: Show owning user namespace's uid and gid when displaying policy
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v9 08/23] ima: Move measurement list related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v9 15/23] ima: Implement hierarchical processing of file accesses
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v9 11/23] ima: Move ima_lsm_policy_notifier into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
From
: Yael Tiomkin <yaelt@xxxxxxxxxx>
[PATCH v2] KEYS: trusted: Avoid calling null function trusted_key_exit
From
: Dave Kleikamp <dave.kleikamp@xxxxxxxxxx>
Re: [PATCH] KEYS: trusted: Avoid calling null function trusted_key_exit
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[PATCH] KEYS: trusted: Avoid calling null function trusted_key_exit
From
: Dave Kleikamp <dave.kleikamp@xxxxxxxxxx>
Re: [PATCH v9 00/23] ima: Namespace IMA with audit support in IMA-ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
RE: [RESEND][PATCH] Documentation: added order requirement for ima_hash=
From
: Jonathan Corbet <corbet@xxxxxxx>
Re: [PATCH v9 23/23] ima: Enable IMA namespaces
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v9 14/23] userns: Add pointer to ima_namespace to user_namespace
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v9 22/23] ima: Show owning user namespace's uid and gid when displaying policy
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v9 22/23] ima: Show owning user namespace's uid and gid when displaying policy
From
: Christian Brauner <brauner@xxxxxxxxxx>
RE: [RESEND][PATCH] Documentation: added order requirement for ima_hash=
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH][next] tpm: xen-tpmfront: Use struct_size() helper
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [RESEND][PATCH] Documentation: added order requirement for ima_hash=
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v9 21/23] ima: Introduce securityfs file to activate an IMA namespace
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v9 20/23] ima: Setup securityfs for IMA namespace
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v9 17/23] ima: Add functions for creating and freeing of an ima_namespace
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v9 13/23] ima: Only accept AUDIT rules for non-init_ima_ns namespaces for now
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v9 12/23] ima: Define mac_admin_ns_capable() as a wrapper for ns_capable()
From
: Christian Brauner <brauner@xxxxxxxxxx>
RE: [RESEND][PATCH] Documentation: added order requirement for ima_hash=
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v9 00/23] ima: Namespace IMA with audit support in IMA-ns
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v9 11/23] ima: Move ima_lsm_policy_notifier into ima_namespace
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [RESEND][PATCH] Documentation: added order requirement for ima_hash=
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v9 15/23] ima: Implement hierarchical processing of file accesses
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v9 10/23] ima: Move IMA securityfs files into ima_namespace or onto stack
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v9 09/23] ima: Move some IMA policy and filesystem related variables into ima_namespace
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v9 08/23] ima: Move measurement list related variables into ima_namespace
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v9 07/23] ima: Move ima_htable into ima_namespace
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v9 06/23] ima: Move arch_policy_entry into ima_namespace
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v9 05/23] ima: Define ima_namespace struct and start moving variables into it
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v9 02/23] ima: Do not print policy rule with inactive LSM labels
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v9 01/23] ima: Remove ima_policy file before directory
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [RESEND][PATCH] Documentation: added order requirement for ima_hash=
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
Re: [RESEND][PATCH] Documentation: added order requirement for ima_hash=
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [RESEND][PATCH] Documentation: added order requirement for ima_hash=
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
Re: [RESEND][PATCH] Documentation: added order requirement for ima_hash=
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
Re: [RESEND][PATCH] Documentation: added order requirement for ima_hash=
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH ima-evm-utils] Signing fs-verity file digest based on existing evmctl commands
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [RESEND][PATCH] Documentation: added order requirement for ima_hash=
From
: Jonathan Corbet <corbet@xxxxxxx>
[PATCH v3 7/8] ima: support fs-verity file digest based version 3 signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v3 6/8] ima: define signature version 3
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v3 8/8] fsverity: update the documentation
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v3 5/8] ima: include fsverity's file digests in the IMA measurement list
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v3 3/8] fs-verity: define a function to return the integrity protected file digest
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v3 4/8] ima: define a new template field 'd-type' and a new template 'ima-ngv2'
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v3 2/8] ima: define ima_max_digest_data struct without a flexible array variable
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v3 1/8] ima: rename IMA_ACTION_FLAGS to IMA_NONACTION_FLAGS
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v3 0/8] ima: support fs-verity digests and signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 1/1] ci/travis: Replace groovy -> impish
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v9 06/23] ima: Move arch_policy_entry into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 09/23] ima: Move some IMA policy and filesystem related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 23/23] ima: Enable IMA namespaces
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 22/23] ima: Show owning user namespace's uid and gid when displaying policy
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 07/23] ima: Move ima_htable into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 1/1] ci/travis: Replace groovy -> impish
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v9 18/23] integrity/ima: Define ns_status for storing namespaced iint data
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 05/23] ima: Define ima_namespace struct and start moving variables into it
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 03/23] securityfs: rework dentry creation
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 10/23] ima: Move IMA securityfs files into ima_namespace or onto stack
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 13/23] ima: Only accept AUDIT rules for non-init_ima_ns namespaces for now
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 08/23] ima: Move measurement list related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 14/23] userns: Add pointer to ima_namespace to user_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 16/23] ima: Implement ima_free_policy_rules() for freeing of an ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 00/23] ima: Namespace IMA with audit support in IMA-ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 17/23] ima: Add functions for creating and freeing of an ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 12/23] ima: Define mac_admin_ns_capable() as a wrapper for ns_capable()
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 20/23] ima: Setup securityfs for IMA namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 01/23] ima: Remove ima_policy file before directory
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 02/23] ima: Do not print policy rule with inactive LSM labels
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 11/23] ima: Move ima_lsm_policy_notifier into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 21/23] ima: Introduce securityfs file to activate an IMA namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 19/23] ima: Namespace audit status flags
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 04/23] securityfs: Extend securityfs with namespacing support
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 15/23] ima: Implement hierarchical processing of file accesses
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v5 0/6] KEXEC_SIG with appended signature
From
: Luis Chamberlain <mcgrof@xxxxxxxxxx>
Re: [PATCH v5 6/6] module: Move duplicate mod_check_sig users code to mod_parse_sig
From
: Luis Chamberlain <mcgrof@xxxxxxxxxx>
Re: [PATCH v5 5/6] module: Use key_being_used_for for log messages in verify_appended_signature
From
: Luis Chamberlain <mcgrof@xxxxxxxxxx>
Re: [PATCH v5 4/6] module: strip the signature marker in the verification function.
From
: Luis Chamberlain <mcgrof@xxxxxxxxxx>
Re: [PATCH v5 3/6] kexec_file: Don't opencode appended signature verification.
From
: Luis Chamberlain <mcgrof@xxxxxxxxxx>
Re: [PATCH v4 1/6] s390/kexec_file: Don't opencode appended signature check.
From
: Luis Chamberlain <mcgrof@xxxxxxxxxx>
Re: [PATCH 5/5] spi: make remove callback a void function
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
Re: [PATCH 5/5] spi: make remove callback a void function
From
: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
Re: [PATCH 5/5] spi: make remove callback a void function
From
: Miquel Raynal <miquel.raynal@xxxxxxxxxxx>
Re: [PATCH 5/5] spi: make remove callback a void function
From
: Stefan Schmidt <stefan@xxxxxxxxxxxxxxxxxx>
Re: [PATCH 0/5] spi: make remove callback a void function
From
: Lee Jones <lee.jones@xxxxxxxxxx>
[RESEND][PATCH] Documentation: added order requirement for ima_hash=
From
: GUO Zihua <guozihua@xxxxxxxxxx>
Re: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
From
: Antony Vennard <antony@xxxxxxxxxx>
[PATCH 0/5] spi: make remove callback a void function
From
: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
[PATCH 3/5] tpm: st33zp24: Make st33zp24_remove() a void function
From
: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
Re: [PATCH v4 00/14] x86: Trenchboot secure dynamic launch Linux kernel support
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
RE: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v3 1/1] ci/travis: Replace groovy -> impish
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH][next] tpm: xen-tpmfront: Use struct_size() helper
From
: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
[PATCH v3] tpm: vtpm_proxy: Check length to avoid compiler warning
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v8 03/19] ima: Move policy related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
RE: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v8 19/19] ima: Enable IMA namespaces
From
: Christian Brauner <brauner@xxxxxxxxxx>
RE: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v8 19/19] ima: Enable IMA namespaces
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v8 05/19] ima: Move measurement list related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v2 1/1] ci: Replace groovy -> impish
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH v8 19/19] ima: Enable IMA namespaces
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v8 18/19] ima: Show owning user namespace's uid and gid when displaying policy
From
: Christian Brauner <brauner@xxxxxxxxxx>
[PATCH v2 1/1] ci: Replace groovy -> impish
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH] MAINTAINERS: add missing "security/integrity" directory
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v2] tpm: vtpm_proxy: Double-check to avoid buffer overflow
From
: Jann Horn <jannh@xxxxxxxxxx>
Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH] ima: fix reference leak in asymmetric_verify()
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] ima: fix reference leak in asymmetric_verify()
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v2] tpm: vtpm_proxy: Double-check to avoid buffer overflow
From
: Jason Gunthorpe <jgg@xxxxxxxx>
Re: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v2] tpm: vtpm_proxy: Double-check to avoid buffer overflow
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
From
: Antony Vennard <antony@xxxxxxxxxx>
Re: [PATCH v8 07/19] ima: Move dentry into ima_namespace and others onto stack
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v8 07/19] ima: Move dentry into ima_namespace and others onto stack
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v8 07/19] ima: Move dentry into ima_namespace and others onto stack
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v2] tpm: vtpm_proxy: Double-check to avoid buffer overflow
From
: Jason Gunthorpe <jgg@xxxxxxxx>
Re: [PATCH v2] tpm: vtpm_proxy: Double-check to avoid buffer overflow
From
: Jann Horn <jannh@xxxxxxxxxx>
Re: [PATCH ima-evm-utils] ci: Replace groovy -> impish
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH v2] tpm: vtpm_proxy: Double-check to avoid buffer overflow
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [PATCH] tpm: vtpm_proxy: Avoid device-originated buffer overflow
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
From
: Martin Ross <mross@xxxxxxxxx>
Re: [PATCH v8 10/19] ima: Implement hierarchical processing of file accesses
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v8 19/19] ima: Enable IMA namespaces
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v8 19/19] ima: Enable IMA namespaces
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v8 18/19] ima: Show owning user namespace's uid and gid when displaying policy
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
[PATCH] MAINTAINERS: add missing "security/integrity" directory
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
From
: Konstantin Ryabitsev <konstantin@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
From
: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
From
: Konstantin Ryabitsev <konstantin@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
From
: Konstantin Ryabitsev <konstantin@xxxxxxxxxxxxxxxxxxx>
RE: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v3 2/2] selftests: tpm: add async space test with noneexisting handle
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3 2/2] selftests: tpm: add async space test with noneexisting handle
From
: Tadeusz Struk <tstruk@xxxxxxxxx>
Re: [PATCH v3 2/2] selftests: tpm: add async space test with noneexisting handle
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3 2/2] selftests: tpm: add async space test with noneexisting handle
From
: Tadeusz Struk <tstruk@xxxxxxxxx>
Re: [PATCH v3 2/2] selftests: tpm: add async space test with noneexisting handle
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 2/2] selftests: tpm: add async space test with noneexisting handle
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v4 1/2] tpm: Fix error handling in async work
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v3 2/2] selftests: tpm: add async space test with noneexisting handle
From
: Tadeusz Struk <tstruk@xxxxxxxxx>
[PATCH v4 1/2] tpm: Fix error handling in async work
From
: Tadeusz Struk <tstruk@xxxxxxxxx>
Re: [PATCH v3 1/2] tpm: Fix error handling in async work
From
: Tadeusz Struk <tstruk@xxxxxxxxx>
Re: [PATCH v4 1/2] selftests: tpm2: Determine available PCR bank
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v4 1/2] selftests: tpm2: Determine available PCR bank
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH] ima: Fix trivial typos in the comments
From
: Joe Perches <joe@xxxxxxxxxxx>
Re: [PATCH v3 1/2] tpm: Fix error handling in async work
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3 1/2] tpm: Fix error handling in async work
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v8 19/19] ima: Enable IMA namespaces
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v8 18/19] ima: Show owning user namespace's uid and gid when displaying policy
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH] ima: Fix trivial typos in the comments
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v8 19/19] ima: Enable IMA namespaces
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v8 13/19] ima: Add functions for creation and freeing of an ima_namespace
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v8 10/19] ima: Implement hierarchical processing of file accesses
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v8 03/19] ima: Move policy related variables into ima_namespace
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH 1/1] ima_measurements.sh: Use /proc/uptime instead of date
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH] ima: Fix trivial typos in the comments
From
: Austin Kim <austindh.kim@xxxxxxxxx>
Re: [PATCH v19 4/5] tpm: tpm_tis: Add tpm_tis_i2c driver
From
: Joel Stanley <joel@xxxxxxxxx>
Re: [PATCH] ima: fix reference leak in asymmetric_verify()
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
Re: [PATCH] ima: Fix trivial typos in the comments
From
: Joe Perches <joe@xxxxxxxxxxx>
Re: [PATCH] ima: fix reference leak in asymmetric_verify()
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] ima: Fix trivial typos in the comments
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 1/1] ima_measurements.sh: Use /proc/uptime instead of date
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] tpm: vtpm_proxy: Avoid device-originated buffer overflow
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH] ima: fix reference leak in asymmetric_verify()
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v8 08/19] ima: Use mac_admin_ns_capable() to check corresponding capability
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v8 07/19] ima: Move dentry into ima_namespace and others onto stack
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v8 05/19] ima: Move measurement list related variables into ima_namespace
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v8 03/19] ima: Move policy related variables into ima_namespace
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH] ima: fix reference leak in asymmetric_verify()
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
From
: Yael Tiomkin <yaelt@xxxxxxxxxx>
Re: [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
From
: Yael Tiomkin <yaelt@xxxxxxxxxx>
Re: [PATCH v4 1/2] selftests: tpm2: Determine available PCR bank
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
RE: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH] tpm: vtpm_proxy: Avoid device-originated buffer overflow
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
From
: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 1/2] tpm: Fix error handling in async work
From
: Tadeusz Struk <tadeusz.struk@xxxxxxxxxx>
Re: [PATCH v3 1/2] tpm: Fix error handling in async work
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[PATCH 1/1] ima_measurements.sh: Use /proc/uptime instead of date
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH v8 0/3] IMA: Add tests for uid, gid, fowner, and fgroup options
From
: Petr Vorel <pvorel@xxxxxxx>
RE: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH] ima: Fix trivial typos in the comments
From
: Austin Kim <austinkernel.kim@xxxxxxxxx>
Re: [GIT PULL] integrity subsystem updates for v5.17
From
: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
Re: [GIT PULL] integrity subsystem updates for v5.17
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [GIT PULL] integrity subsystem updates for v5.17
From
: pr-tracker-bot@xxxxxxxxxx
Re: [GIT PULL] TPM DEVICE DRIVER updates for v5.17 (fixed)
From
: pr-tracker-bot@xxxxxxxxxx
Re: [GIT PULL] integrity subsystem updates for v5.17
From
: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
From
: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v8 3/3] integrity: support including firmware ".platform" keys at build time
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v8 2/3] integrity: make integrity_keyring_from_id() non-static
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v8 1/3] certs: export load_certificate_list() to be used outside certs/
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v8 0/3] integrity: support including firmware ".platform" keys at build time
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH 14/14] KEYS: Introduce load_pgp_public_keyring()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 05/14] PGPLIB: Signature parser
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 08/14] KEYS: PGP-based public key signature verification
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 12/14] PGP: Provide a key type for testing PGP signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 11/14] verification: introduce verify_pgp_signature()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 06/14] KEYS: PGP data parser
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 07/14] KEYS: Provide PGP key description autogeneration
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 04/14] PGPLIB: Basic packet parser
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 03/14] PGPLIB: PGP definitions (RFC 4880)
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 13/14] KEYS: Provide a function to load keys from a PGP keyring blob
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 10/14] KEYS: Calculate key digest and get signature of the key
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 09/14] KEYS: Retry asym key search with partial ID in restrict_link_by_signature()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 02/14] rsa: add parser of raw format
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 00/14] KEYS: Add support for PGP keys and signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 01/14] mpi: Introduce mpi_key_length()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v8 01/19] securityfs: Extend securityfs with namespacing support
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v8 01/19] securityfs: Extend securityfs with namespacing support
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v5 3/6] kexec_file: Don't opencode appended signature verification.
From
: Michal Suchanek <msuchanek@xxxxxxx>
[PATCH v5 6/6] module: Move duplicate mod_check_sig users code to mod_parse_sig
From
: Michal Suchanek <msuchanek@xxxxxxx>
[PATCH v5 5/6] module: Use key_being_used_for for log messages in verify_appended_signature
From
: Michal Suchanek <msuchanek@xxxxxxx>
[PATCH v5 4/6] module: strip the signature marker in the verification function.
From
: Michal Suchanek <msuchanek@xxxxxxx>
[PATCH v5 2/6] powerpc/kexec_file: Add KEXEC_SIG support.
From
: Michal Suchanek <msuchanek@xxxxxxx>
[PATCH v5 1/6] s390/kexec_file: Don't opencode appended signature check.
From
: Michal Suchanek <msuchanek@xxxxxxx>
[PATCH v5 0/6] KEXEC_SIG with appended signature
From
: Michal Suchanek <msuchanek@xxxxxxx>
[PATCH v2 2/2] selftests: tpm: add async space test with noneexisting handle
From
: Tadeusz Struk <tstruk@xxxxxxxxx>
[PATCH v3 1/2] tpm: Fix error handling in async work
From
: Tadeusz Struk <tstruk@xxxxxxxxx>
Re: [PATCH v2 5/6] ima: support fs-verity file digest based signatures
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v2 5/6] ima: support fs-verity file digest based signatures
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v7 1/3] certs: export load_certificate_list() to be used outside certs/
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v7 1/3] certs: export load_certificate_list() to be used outside certs/
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v7 1/3] certs: export load_certificate_list() to be used outside certs/
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[GIT PULL] TPM DEVICE DRIVER updates for v5.17 (fixed)
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2 5/6] ima: support fs-verity file digest based signatures
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]