Linux Integrity
Thread Index
[
Prev Page
][
Next Page
]
Re: [PATCH] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [PATCH v3] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Lukas Wunner <lukas@xxxxxxxxx>
Re: [PATCH] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
Re: [PATCH] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
[PATCH v5 8/8] fsverity: update the documentation
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v5 1/8] ima: rename IMA_ACTION_FLAGS to IMA_NONACTION_FLAGS
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v5 5/8] ima: permit fsverity's file digests in the IMA measurement list
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v5 2/8] ima: define ima_max_digest_data struct without a flexible array variable
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v5 4/8] ima: define a new template field 'd-type' and a new template 'ima-ngv2'
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v5 3/8] fs-verity: define a function to return the integrity protected file digest
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v5 6/8] ima: define signature version 3
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v5 0/8] ima: support fs-verity digests and signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v5 7/8] ima: support fs-verity file digest based version 3 signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
Re: [PATCH v5 2/6] powerpc/kexec_file: Add KEXEC_SIG support.
From
: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
Re: [PATCH] ima: Calculate digest in ima_inode_hash() if not available
From
: Florent Revest <revest@xxxxxxxxxxxx>
RE: [PATCH] ima: Calculate digest in ima_inode_hash() if not available
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH] ima: Calculate digest in ima_inode_hash() if not available
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH] ima: Calculate digest in ima_inode_hash() if not available
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [PATCH v4 7/8] ima: support fs-verity file digest based version 3 signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5 0/6] KEXEC_SIG with appended signature
From
: Luis Chamberlain <mcgrof@xxxxxxxxxx>
Re: [PATCH] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
Re: [PATCH v10 04/27] securityfs: rework dentry creation
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v10 01/27] ima: Remove ima_policy file before directory
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v10 03/27] ima: Return error code obtained from securityfs functions
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [PATCH v2] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Ard Biesheuvel <ardb@xxxxxxxxxx>
[PATCH v3] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
[PATCH v2] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [PATCH] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [PATCH] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [PATCH] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [PATCH] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [PATCH] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
Re: [PATCH] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
Re: [PATCH] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [PATCH] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
RE: [PATCH] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: David Laight <David.Laight@xxxxxxxxxx>
[PATCH] efi: Do not import certificates from UEFI Secure Boot for T2 Macs
From
: Aditya Garg <gargaditya08@xxxxxxxx>
Re: [PATCH v5 2/6] powerpc/kexec_file: Add KEXEC_SIG support.
From
: Michal Suchánek <msuchanek@xxxxxxx>
Re: [PATCH v5 2/6] powerpc/kexec_file: Add KEXEC_SIG support.
From
: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
Re: [PATCH v5 2/6] powerpc/kexec_file: Add KEXEC_SIG support.
From
: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
Re: [PATCH v5 0/6] KEXEC_SIG with appended signature
From
: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
Re: Problem with commit ccf11dbaa07b ("evm: Fix memleak in init_desc")
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
Re: Problem with commit ccf11dbaa07b ("evm: Fix memleak in init_desc")
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v4 0/8] ima: support fs-verity digests and signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 5/5] spi: make remove callback a void function
From
: Mark Brown <broonie@xxxxxxxxxx>
Re: [PATCH] KEYS: asymmetric: enforce SM2 signature use pkey algo
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
[PATCH v2] KEYS: asymmetric: enforce SM2 signature use pkey algo
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
Re: [PATCH v2 2/2] KEYS: asymmetric: properly validate hash_algo and encoding
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v2 1/2] KEYS: asymmetric: enforce that sig algo matches key algo
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Problem with commit ccf11dbaa07b ("evm: Fix memleak in init_desc")
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
Re: [PATCH v4 0/8] ima: support fs-verity digests and signatures
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH] KEYS: asymmetric: enforce SM2 signature use pkey algo
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v2 0/2] Fix bugs in public_key_verify_signature()
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v2 2/2] KEYS: asymmetric: properly validate hash_algo and encoding
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v2 1/2] KEYS: asymmetric: enforce that sig algo matches key algo
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v4 7/8] ima: support fs-verity file digest based version 3 signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v4 2/8] ima: define ima_max_digest_data struct without a flexible array variable
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v4 5/8] ima: permit fsverity's file digests in the IMA measurement list
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v4 3/8] fs-verity: define a function to return the integrity protected file digest
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v4 6/8] ima: define signature version 3
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v4 8/8] fsverity: update the documentation
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v4 0/8] ima: support fs-verity digests and signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v4 1/8] ima: rename IMA_ACTION_FLAGS to IMA_NONACTION_FLAGS
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v4 4/8] ima: define a new template field 'd-type' and a new template 'ima-ngv2'
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] KEYS: trusted: fix crash when TPM/TEE are built as module
From
: Tong Zhang <ztong0001@xxxxxxxxx>
[ANNOUNCE][CFP] Linux Security Summit North America 2022
From
: James Morris <jmorris@xxxxxxxxx>
Re: [GIT PULL] integrity: subsystem fixes for v5.17
From
: pr-tracker-bot@xxxxxxxxxx
Re: [PATCH v10 12/27] ima: Define mac_admin_ns_capable() as a wrapper for ns_capable()
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH] KEYS: trusted: Avoid calling null function trusted_key_exit
From
: Dave Kleikamp <dave.kleikamp@xxxxxxxxxx>
[PATCH] KEYS: asymmetric: enforce SM2 signature use pkey algo
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
Re: [PATCH 0/2] Fix bugs in public_key_verify_signature()
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
[GIT PULL] integrity: subsystem fixes for v5.17
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v10 12/27] ima: Define mac_admin_ns_capable() as a wrapper for ns_capable()
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH] KEYS: trusted: fix crash when TPM/TEE are built as module
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH v10 12/27] ima: Define mac_admin_ns_capable() as a wrapper for ns_capable()
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
[PATCH] KEYS: trusted: fix crash when TPM/TEE are built as module
From
: Tong Zhang <ztong0001@xxxxxxxxx>
Re: [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v5 3/6] kexec_file: Don't opencode appended signature verification.
From
: Michal Suchánek <msuchanek@xxxxxxx>
Re: [RFC PATCH] KEYS: Double max_size to make keyctl pkey_verify work
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [RFC PATCH] KEYS: Double max_size to make keyctl pkey_verify work
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [RFC PATCH] KEYS: Double max_size to make keyctl pkey_verify work
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v32 15/28] LSM: Ensure the correct LSM context releaser
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v32 13/28] LSM: Use lsmblob in security_cred_getsecid
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v32 12/28] LSM: Use lsmblob in security_inode_getsecid
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [RFC PATCH] KEYS: Double max_size to make keyctl pkey_verify work
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v32 11/28] LSM: Use lsmblob in security_current_getsecid
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [RFC PATCH] KEYS: Double max_size to make keyctl pkey_verify work
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v10 00/27] ima: Namespace IMA with audit support in IMA-ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [RFC PATCH] KEYS: Double max_size to make keyctl pkey_verify work
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v10 00/27] ima: Namespace IMA with audit support in IMA-ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v10 00/27] ima: Namespace IMA with audit support in IMA-ns
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v10 00/27] ima: Namespace IMA with audit support in IMA-ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v10 02/27] ima: Do not print policy rule with inactive LSM labels
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v10 00/27] ima: Namespace IMA with audit support in IMA-ns
From
: Christian Brauner <brauner@xxxxxxxxxx>
[PATCH] ima: fix semicolon.cocci warnings
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v10 15/27] ima: Implement hierarchical processing of file accesses
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [RFC PATCH] KEYS: Double max_size to make keyctl pkey_verify work
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[RFC PATCH] KEYS: Double max_size to make keyctl pkey_verify work
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH 1/2] KEYS: asymmetric: enforce that sig algo matches key algo
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH 1/2] KEYS: asymmetric: enforce that sig algo matches key algo
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH 1/2] KEYS: asymmetric: enforce that sig algo matches key algo
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH 1/2] KEYS: asymmetric: enforce that sig algo matches key algo
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v10 02/27] ima: Do not print policy rule with inactive LSM labels
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 04/27] securityfs: rework dentry creation
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 25/27] ima: Show owning user namespace's uid and gid when displaying policy
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 14/27] userns: Add pointer to ima_namespace to user_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 09/27] ima: Move some IMA policy and filesystem related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 16/27] ima: Implement ima_free_policy_rules() for freeing of an ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 00/27] ima: Namespace IMA with audit support in IMA-ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 08/27] ima: Move measurement list related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 05/27] ima: Define ima_namespace struct and start moving variables into it
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 15/27] ima: Implement hierarchical processing of file accesses
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 24/27] ima: Introduce securityfs file to activate an IMA namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 10/27] ima: Move IMA securityfs files into ima_namespace or onto stack
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 17/27] ima: Add functions for creating and freeing of an ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 27/27] ima: Enable IMA namespaces
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 20/27] ima: Namespace audit status flags
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 22/27] securityfs: Extend securityfs with namespacing support
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 12/27] ima: Define mac_admin_ns_capable() as a wrapper for ns_capable()
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 13/27] ima: Only accept AUDIT rules for non-init_ima_ns namespaces for now
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 19/27] integrity: Add optional callback function to integrity_inode_free()
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 07/27] ima: Move ima_htable into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 06/27] ima: Move arch_policy_entry into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 23/27] ima: Setup securityfs for IMA namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 11/27] ima: Move ima_lsm_policy_notifier into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 01/27] ima: Remove ima_policy file before directory
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 18/27] integrity/ima: Define ns_status for storing namespaced iint data
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 21/27] ima: Remove unused iints from the integrity_iint_cache
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 26/27] ima: Limit number of policy rules in non-init_ima_ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v10 03/27] ima: Return error code obtained from securityfs functions
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v3 0/8] ima: support fs-verity digests and signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 7/8] ima: support fs-verity file digest based version 3 signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 0/2] Fix bugs in public_key_verify_signature()
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v3 7/8] ima: support fs-verity file digest based version 3 signatures
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v3 5/8] ima: include fsverity's file digests in the IMA measurement list
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v3 3/8] fs-verity: define a function to return the integrity protected file digest
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v3 0/8] ima: support fs-verity digests and signatures
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH 1/2] KEYS: asymmetric: enforce that sig algo matches key algo
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH 2/2] KEYS: asymmetric: properly validate hash_algo and encoding
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH 0/2] Fix bugs in public_key_verify_signature()
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v9 04/23] securityfs: Extend securityfs with namespacing support
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v9 04/23] securityfs: Extend securityfs with namespacing support
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [RFC][PATCH v3a 00/11] ima: support fs-verity digests and signatures (alternative)
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [RFC][PATCH v3a 00/11] ima: support fs-verity digests and signatures (alternative)
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [RFC][PATCH v3a 00/11] ima: support fs-verity digests and signatures (alternative)
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [RFC][PATCH v3a 00/11] ima: support fs-verity digests and signatures (alternative)
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH] ima: Allow template selection with ima_template[_fmt]= after ima_hash=
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v9 16/23] ima: Implement ima_free_policy_rules() for freeing of an ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH] ima: Allow template selection with ima_template[_fmt]= after ima_hash=
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
RE: [RFC][PATCH v3a 00/11] ima: support fs-verity digests and signatures (alternative)
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v8 0/5] Enable root to update the blacklist keyring
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [RFC][PATCH v3a 00/11] ima: support fs-verity digests and signatures (alternative)
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v9 00/23] ima: Namespace IMA with audit support in IMA-ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v9 09/23] ima: Move some IMA policy and filesystem related variables into ima_namespace
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
RE: [RESEND][PATCH] Documentation: added order requirement for ima_hash=
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v9 09/23] ima: Move some IMA policy and filesystem related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [RESEND][PATCH] Documentation: added order requirement for ima_hash=
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v9 08/23] ima: Move measurement list related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v9 16/23] ima: Implement ima_free_policy_rules() for freeing of an ima_namespace
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
RE: [RESEND][PATCH] Documentation: added order requirement for ima_hash=
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [RESEND][PATCH] Documentation: added order requirement for ima_hash=
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
RE: [RFC][PATCH v3a 00/11] ima: support fs-verity digests and signatures (alternative)
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v9 10/23] ima: Move IMA securityfs files into ima_namespace or onto stack
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v9 09/23] ima: Move some IMA policy and filesystem related variables into ima_namespace
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v9 08/23] ima: Move measurement list related variables into ima_namespace
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v9 06/23] ima: Move arch_policy_entry into ima_namespace
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [RFC][PATCH v3a 00/11] ima: support fs-verity digests and signatures (alternative)
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [RFC][PATCH v3a 00/11] ima: support fs-verity digests and signatures (alternative)
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[RFC][PATCH v3a 10/11] evm: Include fsverity formatted digest in the HMAC/digest calculation
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[RFC][PATCH v3a 09/11] ima: Add support for fsverity signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[RFC][PATCH v3a 00/11] ima: support fs-verity digests and signatures (alternative)
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[RFC][PATCH v3a 06/11] fsverity: Introduce fsverity_get_formatted_digest()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[RFC][PATCH v3a 07/11] fsverity: Introduce fsverity_get_signature()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[RFC][PATCH v3a 08/11] fsverity: Completely disable signature verification if not requested
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v9 10/23] ima: Move IMA securityfs files into ima_namespace or onto stack
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v9 04/23] securityfs: Extend securityfs with namespacing support
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v9 21/23] ima: Introduce securityfs file to activate an IMA namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v8 1/3] certs: export load_certificate_list() to be used outside certs/
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v9 02/23] ima: Do not print policy rule with inactive LSM labels
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [RESEND][PATCH] Documentation: added order requirement for ima_hash=
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [RESEND][PATCH] Documentation: added order requirement for ima_hash=
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
Re: [PATCH v2] KEYS: trusted: Avoid calling null function trusted_key_exit
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH v4] integrity: check the return value of audit_log_start()
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v4] integrity: check the return value of audit_log_start()
From
: "Xiaoke Wang" <xkernel.wang@xxxxxxxxxxx>
Re: [PATCH v9 22/23] ima: Show owning user namespace's uid and gid when displaying policy
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v9 08/23] ima: Move measurement list related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v9 15/23] ima: Implement hierarchical processing of file accesses
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v9 11/23] ima: Move ima_lsm_policy_notifier into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
From
: Yael Tiomkin <yaelt@xxxxxxxxxx>
[PATCH v2] KEYS: trusted: Avoid calling null function trusted_key_exit
From
: Dave Kleikamp <dave.kleikamp@xxxxxxxxxx>
Re: [PATCH] KEYS: trusted: Avoid calling null function trusted_key_exit
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[PATCH] KEYS: trusted: Avoid calling null function trusted_key_exit
From
: Dave Kleikamp <dave.kleikamp@xxxxxxxxxx>
Re: [PATCH v9 00/23] ima: Namespace IMA with audit support in IMA-ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
RE: [RESEND][PATCH] Documentation: added order requirement for ima_hash=
From
: Jonathan Corbet <corbet@xxxxxxx>
Re: [PATCH v9 23/23] ima: Enable IMA namespaces
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v9 14/23] userns: Add pointer to ima_namespace to user_namespace
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v9 22/23] ima: Show owning user namespace's uid and gid when displaying policy
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v9 22/23] ima: Show owning user namespace's uid and gid when displaying policy
From
: Christian Brauner <brauner@xxxxxxxxxx>
RE: [RESEND][PATCH] Documentation: added order requirement for ima_hash=
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH][next] tpm: xen-tpmfront: Use struct_size() helper
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [RESEND][PATCH] Documentation: added order requirement for ima_hash=
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v9 21/23] ima: Introduce securityfs file to activate an IMA namespace
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v9 20/23] ima: Setup securityfs for IMA namespace
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v9 17/23] ima: Add functions for creating and freeing of an ima_namespace
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v9 13/23] ima: Only accept AUDIT rules for non-init_ima_ns namespaces for now
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v9 12/23] ima: Define mac_admin_ns_capable() as a wrapper for ns_capable()
From
: Christian Brauner <brauner@xxxxxxxxxx>
RE: [RESEND][PATCH] Documentation: added order requirement for ima_hash=
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v9 00/23] ima: Namespace IMA with audit support in IMA-ns
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v9 11/23] ima: Move ima_lsm_policy_notifier into ima_namespace
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [RESEND][PATCH] Documentation: added order requirement for ima_hash=
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v9 15/23] ima: Implement hierarchical processing of file accesses
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v9 10/23] ima: Move IMA securityfs files into ima_namespace or onto stack
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v9 09/23] ima: Move some IMA policy and filesystem related variables into ima_namespace
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v9 08/23] ima: Move measurement list related variables into ima_namespace
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v9 07/23] ima: Move ima_htable into ima_namespace
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v9 06/23] ima: Move arch_policy_entry into ima_namespace
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v9 05/23] ima: Define ima_namespace struct and start moving variables into it
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v9 02/23] ima: Do not print policy rule with inactive LSM labels
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v9 01/23] ima: Remove ima_policy file before directory
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [RESEND][PATCH] Documentation: added order requirement for ima_hash=
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
Re: [RESEND][PATCH] Documentation: added order requirement for ima_hash=
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [RESEND][PATCH] Documentation: added order requirement for ima_hash=
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
Re: [RESEND][PATCH] Documentation: added order requirement for ima_hash=
From
: "Guozihua (Scott)" <guozihua@xxxxxxxxxx>
Re: [RESEND][PATCH] Documentation: added order requirement for ima_hash=
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH ima-evm-utils] Signing fs-verity file digest based on existing evmctl commands
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [RESEND][PATCH] Documentation: added order requirement for ima_hash=
From
: Jonathan Corbet <corbet@xxxxxxx>
[PATCH v3 7/8] ima: support fs-verity file digest based version 3 signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v3 6/8] ima: define signature version 3
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v3 8/8] fsverity: update the documentation
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v3 5/8] ima: include fsverity's file digests in the IMA measurement list
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v3 3/8] fs-verity: define a function to return the integrity protected file digest
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v3 4/8] ima: define a new template field 'd-type' and a new template 'ima-ngv2'
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v3 2/8] ima: define ima_max_digest_data struct without a flexible array variable
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v3 1/8] ima: rename IMA_ACTION_FLAGS to IMA_NONACTION_FLAGS
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v3 0/8] ima: support fs-verity digests and signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 1/1] ci/travis: Replace groovy -> impish
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v9 06/23] ima: Move arch_policy_entry into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 09/23] ima: Move some IMA policy and filesystem related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 23/23] ima: Enable IMA namespaces
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 22/23] ima: Show owning user namespace's uid and gid when displaying policy
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 07/23] ima: Move ima_htable into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 1/1] ci/travis: Replace groovy -> impish
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v9 18/23] integrity/ima: Define ns_status for storing namespaced iint data
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 05/23] ima: Define ima_namespace struct and start moving variables into it
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 03/23] securityfs: rework dentry creation
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 10/23] ima: Move IMA securityfs files into ima_namespace or onto stack
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 13/23] ima: Only accept AUDIT rules for non-init_ima_ns namespaces for now
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 08/23] ima: Move measurement list related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 14/23] userns: Add pointer to ima_namespace to user_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 16/23] ima: Implement ima_free_policy_rules() for freeing of an ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 00/23] ima: Namespace IMA with audit support in IMA-ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 17/23] ima: Add functions for creating and freeing of an ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 12/23] ima: Define mac_admin_ns_capable() as a wrapper for ns_capable()
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 20/23] ima: Setup securityfs for IMA namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 01/23] ima: Remove ima_policy file before directory
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 02/23] ima: Do not print policy rule with inactive LSM labels
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 11/23] ima: Move ima_lsm_policy_notifier into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 21/23] ima: Introduce securityfs file to activate an IMA namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 19/23] ima: Namespace audit status flags
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 04/23] securityfs: Extend securityfs with namespacing support
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v9 15/23] ima: Implement hierarchical processing of file accesses
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v5 0/6] KEXEC_SIG with appended signature
From
: Luis Chamberlain <mcgrof@xxxxxxxxxx>
Re: [PATCH v5 6/6] module: Move duplicate mod_check_sig users code to mod_parse_sig
From
: Luis Chamberlain <mcgrof@xxxxxxxxxx>
Re: [PATCH v5 5/6] module: Use key_being_used_for for log messages in verify_appended_signature
From
: Luis Chamberlain <mcgrof@xxxxxxxxxx>
Re: [PATCH v5 4/6] module: strip the signature marker in the verification function.
From
: Luis Chamberlain <mcgrof@xxxxxxxxxx>
Re: [PATCH v5 3/6] kexec_file: Don't opencode appended signature verification.
From
: Luis Chamberlain <mcgrof@xxxxxxxxxx>
Re: [PATCH v4 1/6] s390/kexec_file: Don't opencode appended signature check.
From
: Luis Chamberlain <mcgrof@xxxxxxxxxx>
Re: [PATCH 5/5] spi: make remove callback a void function
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
Re: [PATCH 5/5] spi: make remove callback a void function
From
: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
Re: [PATCH 5/5] spi: make remove callback a void function
From
: Miquel Raynal <miquel.raynal@xxxxxxxxxxx>
Re: [PATCH 5/5] spi: make remove callback a void function
From
: Stefan Schmidt <stefan@xxxxxxxxxxxxxxxxxx>
Re: [PATCH 0/5] spi: make remove callback a void function
From
: Lee Jones <lee.jones@xxxxxxxxxx>
[RESEND][PATCH] Documentation: added order requirement for ima_hash=
From
: GUO Zihua <guozihua@xxxxxxxxxx>
Re: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
From
: Antony Vennard <antony@xxxxxxxxxx>
[PATCH 0/5] spi: make remove callback a void function
From
: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
[PATCH 3/5] tpm: st33zp24: Make st33zp24_remove() a void function
From
: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
Re: [PATCH v4 00/14] x86: Trenchboot secure dynamic launch Linux kernel support
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
RE: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v3 1/1] ci/travis: Replace groovy -> impish
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH][next] tpm: xen-tpmfront: Use struct_size() helper
From
: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
[PATCH v3] tpm: vtpm_proxy: Check length to avoid compiler warning
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v8 03/19] ima: Move policy related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
RE: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v8 19/19] ima: Enable IMA namespaces
From
: Christian Brauner <brauner@xxxxxxxxxx>
RE: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v8 19/19] ima: Enable IMA namespaces
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v8 05/19] ima: Move measurement list related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v2 1/1] ci: Replace groovy -> impish
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH v8 19/19] ima: Enable IMA namespaces
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v8 18/19] ima: Show owning user namespace's uid and gid when displaying policy
From
: Christian Brauner <brauner@xxxxxxxxxx>
[PATCH v2 1/1] ci: Replace groovy -> impish
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH] MAINTAINERS: add missing "security/integrity" directory
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v2] tpm: vtpm_proxy: Double-check to avoid buffer overflow
From
: Jann Horn <jannh@xxxxxxxxxx>
Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH] ima: fix reference leak in asymmetric_verify()
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] ima: fix reference leak in asymmetric_verify()
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v2] tpm: vtpm_proxy: Double-check to avoid buffer overflow
From
: Jason Gunthorpe <jgg@xxxxxxxx>
Re: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v2] tpm: vtpm_proxy: Double-check to avoid buffer overflow
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
From
: Antony Vennard <antony@xxxxxxxxxx>
Re: [PATCH v8 07/19] ima: Move dentry into ima_namespace and others onto stack
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v8 07/19] ima: Move dentry into ima_namespace and others onto stack
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v8 07/19] ima: Move dentry into ima_namespace and others onto stack
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v2] tpm: vtpm_proxy: Double-check to avoid buffer overflow
From
: Jason Gunthorpe <jgg@xxxxxxxx>
Re: [PATCH v2] tpm: vtpm_proxy: Double-check to avoid buffer overflow
From
: Jann Horn <jannh@xxxxxxxxxx>
Re: [PATCH ima-evm-utils] ci: Replace groovy -> impish
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
[PATCH v2] tpm: vtpm_proxy: Double-check to avoid buffer overflow
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [PATCH] tpm: vtpm_proxy: Avoid device-originated buffer overflow
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
From
: Martin Ross <mross@xxxxxxxxx>
Re: [PATCH v8 10/19] ima: Implement hierarchical processing of file accesses
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v8 19/19] ima: Enable IMA namespaces
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v8 19/19] ima: Enable IMA namespaces
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v8 18/19] ima: Show owning user namespace's uid and gid when displaying policy
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
[PATCH] MAINTAINERS: add missing "security/integrity" directory
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
From
: Konstantin Ryabitsev <konstantin@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
From
: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
From
: Konstantin Ryabitsev <konstantin@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
From
: Konstantin Ryabitsev <konstantin@xxxxxxxxxxxxxxxxxxx>
RE: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
From
: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
Re: [PATCH v3 2/2] selftests: tpm: add async space test with noneexisting handle
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3 2/2] selftests: tpm: add async space test with noneexisting handle
From
: Tadeusz Struk <tstruk@xxxxxxxxx>
Re: [PATCH v3 2/2] selftests: tpm: add async space test with noneexisting handle
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3 2/2] selftests: tpm: add async space test with noneexisting handle
From
: Tadeusz Struk <tstruk@xxxxxxxxx>
Re: [PATCH v3 2/2] selftests: tpm: add async space test with noneexisting handle
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 2/2] selftests: tpm: add async space test with noneexisting handle
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v4 1/2] tpm: Fix error handling in async work
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v3 2/2] selftests: tpm: add async space test with noneexisting handle
From
: Tadeusz Struk <tstruk@xxxxxxxxx>
[PATCH v4 1/2] tpm: Fix error handling in async work
From
: Tadeusz Struk <tstruk@xxxxxxxxx>
Re: [PATCH v3 1/2] tpm: Fix error handling in async work
From
: Tadeusz Struk <tstruk@xxxxxxxxx>
Re: [PATCH v4 1/2] selftests: tpm2: Determine available PCR bank
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v4 1/2] selftests: tpm2: Determine available PCR bank
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH] ima: Fix trivial typos in the comments
From
: Joe Perches <joe@xxxxxxxxxxx>
Re: [PATCH v3 1/2] tpm: Fix error handling in async work
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3 1/2] tpm: Fix error handling in async work
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v8 19/19] ima: Enable IMA namespaces
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v8 18/19] ima: Show owning user namespace's uid and gid when displaying policy
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH] ima: Fix trivial typos in the comments
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v8 19/19] ima: Enable IMA namespaces
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v8 13/19] ima: Add functions for creation and freeing of an ima_namespace
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v8 10/19] ima: Implement hierarchical processing of file accesses
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v8 03/19] ima: Move policy related variables into ima_namespace
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH 1/1] ima_measurements.sh: Use /proc/uptime instead of date
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH] ima: Fix trivial typos in the comments
From
: Austin Kim <austindh.kim@xxxxxxxxx>
Re: [PATCH v19 4/5] tpm: tpm_tis: Add tpm_tis_i2c driver
From
: Joel Stanley <joel@xxxxxxxxx>
Re: [PATCH] ima: fix reference leak in asymmetric_verify()
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
Re: [PATCH] ima: Fix trivial typos in the comments
From
: Joe Perches <joe@xxxxxxxxxxx>
Re: [PATCH] ima: fix reference leak in asymmetric_verify()
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] ima: Fix trivial typos in the comments
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 1/1] ima_measurements.sh: Use /proc/uptime instead of date
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] tpm: vtpm_proxy: Avoid device-originated buffer overflow
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH] ima: fix reference leak in asymmetric_verify()
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v8 08/19] ima: Use mac_admin_ns_capable() to check corresponding capability
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v8 07/19] ima: Move dentry into ima_namespace and others onto stack
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v8 05/19] ima: Move measurement list related variables into ima_namespace
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v8 03/19] ima: Move policy related variables into ima_namespace
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH] ima: fix reference leak in asymmetric_verify()
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
From
: Yael Tiomkin <yaelt@xxxxxxxxxx>
Re: [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
From
: Yael Tiomkin <yaelt@xxxxxxxxxx>
Re: [PATCH v4 1/2] selftests: tpm2: Determine available PCR bank
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
RE: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH] tpm: vtpm_proxy: Avoid device-originated buffer overflow
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
From
: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 1/2] tpm: Fix error handling in async work
From
: Tadeusz Struk <tadeusz.struk@xxxxxxxxxx>
Re: [PATCH v3 1/2] tpm: Fix error handling in async work
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[PATCH 1/1] ima_measurements.sh: Use /proc/uptime instead of date
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH v8 0/3] IMA: Add tests for uid, gid, fowner, and fgroup options
From
: Petr Vorel <pvorel@xxxxxxx>
RE: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH] ima: Fix trivial typos in the comments
From
: Austin Kim <austinkernel.kim@xxxxxxxxx>
Re: [GIT PULL] integrity subsystem updates for v5.17
From
: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
Re: [GIT PULL] integrity subsystem updates for v5.17
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [GIT PULL] integrity subsystem updates for v5.17
From
: pr-tracker-bot@xxxxxxxxxx
Re: [GIT PULL] TPM DEVICE DRIVER updates for v5.17 (fixed)
From
: pr-tracker-bot@xxxxxxxxxx
Re: [GIT PULL] integrity subsystem updates for v5.17
From
: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 00/14] KEYS: Add support for PGP keys and signatures
From
: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v8 3/3] integrity: support including firmware ".platform" keys at build time
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v8 2/3] integrity: make integrity_keyring_from_id() non-static
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v8 1/3] certs: export load_certificate_list() to be used outside certs/
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v8 0/3] integrity: support including firmware ".platform" keys at build time
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH 14/14] KEYS: Introduce load_pgp_public_keyring()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 05/14] PGPLIB: Signature parser
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 08/14] KEYS: PGP-based public key signature verification
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 12/14] PGP: Provide a key type for testing PGP signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 11/14] verification: introduce verify_pgp_signature()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 06/14] KEYS: PGP data parser
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 07/14] KEYS: Provide PGP key description autogeneration
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 04/14] PGPLIB: Basic packet parser
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 03/14] PGPLIB: PGP definitions (RFC 4880)
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 13/14] KEYS: Provide a function to load keys from a PGP keyring blob
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 10/14] KEYS: Calculate key digest and get signature of the key
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 09/14] KEYS: Retry asym key search with partial ID in restrict_link_by_signature()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 02/14] rsa: add parser of raw format
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 00/14] KEYS: Add support for PGP keys and signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 01/14] mpi: Introduce mpi_key_length()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v8 01/19] securityfs: Extend securityfs with namespacing support
From
: Christian Brauner <brauner@xxxxxxxxxx>
Re: [PATCH v8 01/19] securityfs: Extend securityfs with namespacing support
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v5 3/6] kexec_file: Don't opencode appended signature verification.
From
: Michal Suchanek <msuchanek@xxxxxxx>
[PATCH v5 6/6] module: Move duplicate mod_check_sig users code to mod_parse_sig
From
: Michal Suchanek <msuchanek@xxxxxxx>
[PATCH v5 5/6] module: Use key_being_used_for for log messages in verify_appended_signature
From
: Michal Suchanek <msuchanek@xxxxxxx>
[PATCH v5 4/6] module: strip the signature marker in the verification function.
From
: Michal Suchanek <msuchanek@xxxxxxx>
[PATCH v5 2/6] powerpc/kexec_file: Add KEXEC_SIG support.
From
: Michal Suchanek <msuchanek@xxxxxxx>
[PATCH v5 1/6] s390/kexec_file: Don't opencode appended signature check.
From
: Michal Suchanek <msuchanek@xxxxxxx>
[PATCH v5 0/6] KEXEC_SIG with appended signature
From
: Michal Suchanek <msuchanek@xxxxxxx>
[PATCH v2 2/2] selftests: tpm: add async space test with noneexisting handle
From
: Tadeusz Struk <tstruk@xxxxxxxxx>
[PATCH v3 1/2] tpm: Fix error handling in async work
From
: Tadeusz Struk <tstruk@xxxxxxxxx>
Re: [PATCH v2 5/6] ima: support fs-verity file digest based signatures
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v2 5/6] ima: support fs-verity file digest based signatures
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v7 1/3] certs: export load_certificate_list() to be used outside certs/
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v7 1/3] certs: export load_certificate_list() to be used outside certs/
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v7 1/3] certs: export load_certificate_list() to be used outside certs/
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[GIT PULL] TPM DEVICE DRIVER updates for v5.17 (fixed)
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2 5/6] ima: support fs-verity file digest based signatures
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v2 2/6] fs-verity: define a function to return the integrity protected file digest
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[GIT PULL] integrity subsystem updates for v5.17
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v4 6/6] module: Move duplicate mod_check_sig users code to mod_parse_sig
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v7 1/3] certs: export load_certificate_list() to be used outside certs/
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
[PATCH v4 5/6] module: Use key_being_used_for for log messages in verify_appended_signature
From
: Michal Suchanek <msuchanek@xxxxxxx>
[PATCH v4 4/6] module: strip the signature marker in the verification function.
From
: Michal Suchanek <msuchanek@xxxxxxx>
[PATCH v4 3/6] kexec_file: Don't opencode appended signature verification.
From
: Michal Suchanek <msuchanek@xxxxxxx>
[PATCH v4 6/6] module: Move duplicate mod_check_sig users code to mod_parse_sig
From
: Michal Suchanek <msuchanek@xxxxxxx>
[PATCH v4 2/6] powerpc/kexec_file: Add KEXEC_SIG support.
From
: Michal Suchanek <msuchanek@xxxxxxx>
[PATCH v4 1/6] s390/kexec_file: Don't opencode appended signature check.
From
: Michal Suchanek <msuchanek@xxxxxxx>
[PATCH v4 0/6] KEXEC_SIG with appended signature
From
: Michal Suchanek <msuchanek@xxxxxxx>
Re: [PATCH v2 2/6] fs-verity: define a function to return the integrity protected file digest
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 5/6] ima: support fs-verity file digest based signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 5/6] ima: support fs-verity file digest based signatures
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v2 2/6] fs-verity: define a function to return the integrity protected file digest
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v2 5/6] ima: support fs-verity file digest based signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v2 6/6] fsverity: update the documentation
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v2 3/6] ima: define a new template field 'd-type' and a new template 'ima-ngv2'
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v2 4/6] ima: include fsverity's file digests in the IMA measurement list
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v2 2/6] fs-verity: define a function to return the integrity protected file digest
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v2 1/6] ima: rename IMA_ACTION_FLAGS to IMA_NONACTION_FLAGS
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v2 0/6] ima: support fs-verity digests and signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v7 1/3] certs: export load_certificate_list() to be used outside certs/
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3 3/6] kexec_file: Don't opencode appended signature verification.
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v7 1/3] certs: export load_certificate_list() to be used outside certs/
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v7 1/3] certs: export load_certificate_list() to be used outside certs/
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3] tpm: st33zp24: Make st33zp24_remove() a void function
From
: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
Re: [PATCH v3 3/6] kexec_file: Don't opencode appended signature verification.
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
From
: Yael Tiomkin <yaelt@xxxxxxxxxx>
Re: [PATCH v8 0/5] Enable root to update the blacklist keyring
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v3 6/6] module: Move duplicate mod_check_sig users code to mod_parse_sig
From
: Michal Suchanek <msuchanek@xxxxxxx>
[PATCH v3 5/6] module: Use key_being_used_for for log messages in verify_appended_signature
From
: Michal Suchanek <msuchanek@xxxxxxx>
[PATCH v3 4/6] module: strip the signature marker in the verification function.
From
: Michal Suchanek <msuchanek@xxxxxxx>
[PATCH v3 3/6] kexec_file: Don't opencode appended signature verification.
From
: Michal Suchanek <msuchanek@xxxxxxx>
[PATCH v3 2/6] powerpc/kexec_file: Add KEXEC_SIG support.
From
: Michal Suchanek <msuchanek@xxxxxxx>
[PATCH v3 1/6] s390/kexec_file: Don't opencode appended signature check.
From
: Michal Suchanek <msuchanek@xxxxxxx>
[PATCH v3 0/6] KEXEC_SIG with appended signature
From
: Michal Suchanek <msuchanek@xxxxxxx>
Re: [PATCH v3] tpm: st33zp24: Make st33zp24_remove() a void function
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH v2 1/2] tpm: Fix error handling in async work
From
: Tadeusz Struk <tadeusz.struk@xxxxxxxxxx>
[RFC PATCH 2/3] dm verity: add support for IMA target update event
From
: Thore Sommer <public@xxxxxxxx>
[RFC PATCH 0/3] dm ima: allow targets to remeasure their state
From
: Thore Sommer <public@xxxxxxxx>
[RFC PATCH 3/3] dm ima: add documentation target update event
From
: Thore Sommer <public@xxxxxxxx>
[RFC PATCH 1/3] dm ima: allow targets to remeasure their table entry
From
: Thore Sommer <public@xxxxxxxx>
Re: [PATCH v8 0/5] Enable root to update the blacklist keyring
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v8 0/5] Enable root to update the blacklist keyring
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [GIT PULL] TPM DEVICE DRIVER updates for v5.17
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
From
: Yael Tiomkin <yaelt@xxxxxxxxxx>
Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v8 08/19] ima: Use mac_admin_ns_capable() to check corresponding capability
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
From
: Yael Tiomkin <yaelt@xxxxxxxxxx>
Re: [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH 2/2] selftests: tpm: add async space test with noneexisting handle
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2 1/2] tpm: Fix error handling in async work
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[PATCH v7 3/3] integrity: support including firmware ".platform" keys at build time
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v7 1/3] certs: export load_certificate_list() to be used outside certs/
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v7 2/3] integrity: make integrity_keyring_from_id() non-static
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v7 0/3] integrity: support including firmware ".platform" keys at build time
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
Re: [PATCH 2/3] selftests/kexec: Enable secureboot tests for PowerPC
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v8 16/19] ima: Enable re-auditing of modified files
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v4] ima: silence measurement list hexdump during kexec
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v8 01/19] securityfs: Extend securityfs with namespacing support
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v8 01/19] securityfs: Extend securityfs with namespacing support
From
: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
[PATCH v3] tpm: st33zp24: Make st33zp24_remove() a void function
From
: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
[PATCH v8 14/19] integrity/ima: Define ns_status for storing namespaced iint data
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v8 16/19] ima: Enable re-auditing of modified files
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v8 09/19] ima: Only accept AUDIT rules for non-init_ima_ns namespaces for now
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v8 05/19] ima: Move measurement list related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v8 17/19] ima: Setup securityfs for IMA namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v8 18/19] ima: Show owning user namespace's uid and gid when displaying policy
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v8 12/19] userns: Add pointer to ima_namespace to user_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v8 04/19] ima: Move ima_htable into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v8 03/19] ima: Move policy related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v8 13/19] ima: Add functions for creation and freeing of an ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v8 15/19] ima: Namespace audit status flags
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v8 19/19] ima: Enable IMA namespaces
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v8 08/19] ima: Use mac_admin_ns_capable() to check corresponding capability
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v8 06/19] ima: Move some IMA policy and filesystem related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v8 07/19] ima: Move dentry into ima_namespace and others onto stack
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v8 11/19] ima: Implement ima_free_policy_rules() for freeing of an ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v8 02/19] ima: Define ima_namespace structure and implement basic functions
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v8 00/19] ima: Namespace IMA with audit support in IMA-ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v8 01/19] securityfs: Extend securityfs with namespacing support
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v8 10/19] ima: Implement hierarchical processing of file accesses
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v18 4/4] selftest/interpreter: Add tests for trusted_for(2) policies
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v18 3/4] arch: Wire up trusted_for(2)
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v18 2/4] fs: Add trusted_for(2) syscall implementation and related sysctl
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCH v8 0/5] Enable root to update the blacklist keyring
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v18 0/4] Add trusted_for(2) (was O_MAYEXEC)
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v18 1/4] printk: Move back proc_dointvec_minmax_sysadmin() to sysctl.c
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [oss-security] IMA gadgets
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v7 10/14] securityfs: Extend securityfs with namespacing support
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [oss-security] IMA gadgets
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [oss-security] IMA gadgets
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH ima-evm-utils] ci: Replace groovy -> impish
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
[PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
From
: Yael Tiomkin <yaelt@xxxxxxxxxx>
[PATCH 2/2] selftests: tpm: add async space test with noneexisting handle
From
: Tadeusz Struk <tstruk@xxxxxxxxx>
[PATCH v2 1/2] tpm: Fix error handling in async work
From
: Tadeusz Struk <tstruk@xxxxxxxxx>
[GIT PULL] TPM DEVICE DRIVER updates for v5.17
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[PATCH v4] ima: silence measurement list hexdump during kexec
From
: Bruno Meneguele <bmeneg@xxxxxxxxxx>
Re: [PATCH v2] tpm: fix potential NULL pointer access in tpm_del_char_device
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
Re: [PATCH v2] tpm: fix potential NULL pointer access in tpm_del_char_device
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH 1/2] tpm: Fix error handling in async work
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2] tpm: fix potential NULL pointer access in tpm_del_char_device
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
Re: [PATCH] tpm: fix NPE on probe for missing device
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v6 3/3] integrity: support including firmware ".platform" keys at build time
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v6 1/3] certs: export load_certificate_list() to be used outside certs/
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3] Instantiate key with user-provided decrypted data.
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2] tpm: fix potential NULL pointer access in tpm_del_char_device
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] tpm: Fix kexec crash due to access to ops NULL pointer (powerpc)
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] security:trusted_tpm2: Fix memory leak in tpm2_key_encode()
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH 1/2] tpm: Fix error handling in async work
From
: Tadeusz Struk <tstruk@xxxxxxxxx>
Re: [PATCH 1/2] tpm: Fix error handling in async work
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [oss-security] IMA gadgets
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [oss-security] IMA gadgets
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [RFC 05/32] char: impi, tpm: depend on HAS_IOPORT
From
: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
Re: [RFC 05/32] char: impi, tpm: depend on HAS_IOPORT
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
Re: [PATCH v7 00/14] ima: Namespace IMA with audit support in IMA-ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[RFC 05/32] char: impi, tpm: depend on HAS_IOPORT
From
: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
Re: [PATCH v3] ima: silence measurement list hexdump during kexec
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v3] ima: silence measurement list hexdump during kexec
From
: Bruno Meneguele <bmeneg@xxxxxxxxxx>
Re: [PATCH v2] ima: silence measurement list hexdump during kexec
From
: Bruno Meneguele <bmeneg@xxxxxxxxxx>
Re: [PATCH v2] ima: silence measurement list hexdump during kexec
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v2] ima: silence measurement list hexdump during kexec
From
: Bruno Meneguele <bmeneg@xxxxxxxxxx>
Re: [PATCH] ima: silence measurement list hexdump during kexec
From
: Bruno Meneguele <bmeneg@xxxxxxxxxx>
Re: [PATCH v4 1/2] selftests: tpm2: Determine available PCR bank
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH] tpm: fix NPE on probe for missing device
From
: Patrick Williams <patrick@xxxxxxxxx>
Re: [PATCH v1 1/2] selftest/kexec: fix "ignored null byte in input" warning
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH v1 2/2] selftests/kexec: update searching for the Kconfig
From
: Petr Vorel <pvorel@xxxxxxx>
RE: [PATCH v4 5/5] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: "Pankaj Gupta (OSS)" <pankaj.gupta@xxxxxxxxxxx>
RE: [EXT] [PATCH v4 2/5] KEYS: trusted: allow users to use kernel RNG for key material
From
: Pankaj Gupta <pankaj.gupta@xxxxxxx>
RE: [EXT] [PATCH v4 4/5] crypto: caam - add in-kernel interface for blob generator
From
: "Pankaj Gupta (OSS)" <pankaj.gupta@xxxxxxxxxxx>
[PATCH v3] tpm: fix potential NULL pointer access in tpm_del_char_device
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
[PATCH v6 3/3] integrity: support including firmware ".platform" keys at build time
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v6 2/3] integrity: make integrity_keyring_from_id() non-static
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v6 1/3] certs: export load_certificate_list() to be used outside certs/
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v6 0/3] integrity: support including firmware ".platform" keys at build time
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
Re: [PATCH] ima: silence measurement list hexdump during kexec
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v1 1/2] selftest/kexec: fix "ignored null byte in input" warning
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v1 0/2] selftest/kexec: minor update to the existing test
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v1 2/2] selftests/kexec: update searching for the Kconfig
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH] ima: silence measurement list hexdump during kexec
From
: Bruno Meneguele <bmeneg@xxxxxxxxxx>
Re: [PATCH] ima: Fix undefined arch_ima_get_secureboot() and co
From
: Takashi Iwai <tiwai@xxxxxxx>
Re: [PATCH v2] Instantiate key with user-provided decrypted data.
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v3] Instantiate key with user-provided decrypted data.
From
: Yael Tiomkin <yaelt@xxxxxxxxxx>
Re: [PATCH] ima: Fix undefined arch_ima_get_secureboot() and co
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2] Instantiate key with user-provided decrypted data.
From
: Yael Tiomkin <yaelt@xxxxxxxxxx>
Re: [PATCH v2] syscalls/keyctl09: test encrypted keys.
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v2] syscalls/keyctl09: test encrypted keys.
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[zohar-integrity:next-integrity-testing 1/1] security/integrity/platform_certs/load_uefi.c:181:14: error: implicit declaration of function 'arch_ima_get_secureboot'
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v2] syscalls/keyctl09: test encrypted keys.
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH v2] tpm: fix potential NULL pointer access in tpm_del_char_device
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
Re: [PATCH v2] syscalls/keyctl09: test encrypted keys.
From
: Nageswara Sastry <rnsastry@xxxxxxxxxxxxx>
Re: [PATCH v2] tpm: fix potential NULL pointer access in tpm_del_char_device
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v2] tpm: fix potential NULL pointer access in tpm_del_char_device
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
Fw: TCTI poll with kernel 5.10
From
: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
Re: [PATCH] tpm: Fix kexec crash due to access to ops NULL pointer (powerpc)
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH] tpm: Fix kexec crash due to access to ops NULL pointer (powerpc)
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v2] Instantiate key with user-provided decrypted data.
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2] syscalls/keyctl09: test encrypted keys.
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH v2] syscalls/keyctl09: test encrypted keys.
From
: Nageswara Sastry <rnsastry@xxxxxxxxxxxxx>
[PATCH] security:trusted_tpm2: Fix memory leak in tpm2_key_encode()
From
: Jianglei Nie <niejianglei2021@xxxxxxx>
Re: [PATCH v2] syscalls/keyctl09: test encrypted keys.
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH v8 0/5] Enable root to update the blacklist keyring
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] tpm: Fix kexec crash due to access to ops NULL pointer (powerpc)
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v8] tpm: Add Upgrade/Reduced mode support for TPM2 modules
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] security:trusted_tpm2: Fix memory leak in tpm2_key_encode()
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2] Instantiate key with user-provided decrypted data.
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2] Instantiate key with user-provided decrypted data.
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[PATCH v2] syscalls/keyctl09: test encrypted keys.
From
: Yael Tiomkin <yaelt@xxxxxxxxxx>
Re: [PATCH] tpm: Fix kexec crash due to access to ops NULL pointer (powerpc)
From
: Tyrel Datwyler <tyreld@xxxxxxxxxxxxx>
Re: [PATCH] tpm: Fix kexec crash due to access to ops NULL pointer (powerpc)
From
: Tyrel Datwyler <tyreld@xxxxxxxxxxxxx>
Re: [PATCH] tpm: Fix kexec crash due to access to ops NULL pointer (powerpc)
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH] tpm: Fix kexec crash due to access to ops NULL pointer (powerpc)
From
: Jason Gunthorpe <jgg@xxxxxxxx>
Re: [PATCH] tpm: Fix kexec crash due to access to ops NULL pointer (powerpc)
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH] tpm: Fix kexec crash due to access to ops NULL pointer (powerpc)
From
: Tyrel Datwyler <tyreld@xxxxxxxxxxxxx>
[PATCH 2/2] selftests: tpm: add async space test with noneexisting handle
From
: Tadeusz Struk <tstruk@xxxxxxxxx>
[PATCH 1/2] tpm: Fix error handling in async work
From
: Tadeusz Struk <tstruk@xxxxxxxxx>
[PATCH v2] tpm: fix potential NULL pointer access in tpm_del_char_device
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
Re: [PATCH] tpm: Fix kexec crash due to access to ops NULL pointer (powerpc)
From
: Sachin Sant <sachinp@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v7 00/14] ima: Namespace IMA with audit support in IMA-ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH] ima: Fix undefined arch_ima_get_secureboot() and co
From
: joeyli <jlee@xxxxxxxx>
Re: [PATCH v7 10/14] securityfs: Extend securityfs with namespacing support
From
: kernel test robot <lkp@xxxxxxxxx>
[RFC PATCH] securityfs: securityfs_dir_inode_operations can be static
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH] syscalls/keyctl09: test encrypted keys.
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH v7 00/14] ima: Namespace IMA with audit support in IMA-ns
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v7 00/14] ima: Namespace IMA with audit support in IMA-ns
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v7 01/14] ima: Add IMA namespace support
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH] syscalls/keyctl09: test encrypted keys.
From
: Yael Tiomkin <yaelt@xxxxxxxxxx>
Re: [PATCH v7 01/14] ima: Add IMA namespace support
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v7 14/14] ima: Setup securityfs for IMA namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v7 00/14] ima: Namespace IMA with audit support in IMA-ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v7 00/14] ima: Namespace IMA with audit support in IMA-ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v7 10/14] securityfs: Extend securityfs with namespacing support
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v7 04/14] ima: Move policy related variables into ima_namespace
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v7 01/14] ima: Add IMA namespace support
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v7 14/14] ima: Setup securityfs for IMA namespace
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v7 10/14] securityfs: Extend securityfs with namespacing support
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v7 00/14] ima: Namespace IMA with audit support in IMA-ns
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH] ima: Fix undefined arch_ima_get_secureboot() and co
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v7 00/14] ima: Namespace IMA with audit support in IMA-ns
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v7 14/14] ima: Setup securityfs for IMA namespace
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v7 14/14] ima: Setup securityfs for IMA namespace
From
: kernel test robot <lkp@xxxxxxxxx>
[PATCH v7 01/14] ima: Add IMA namespace support
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v7 14/14] ima: Setup securityfs for IMA namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v7 04/14] ima: Move policy related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v7 10/14] securityfs: Extend securityfs with namespacing support
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v7 12/14] ima: Use mac_admin_ns_capable() to check corresponding capability
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v7 02/14] ima: Define ns_status for storing namespaced iint data
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v7 11/14] ima: Move some IMA policy and filesystem related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v7 00/14] ima: Namespace IMA with audit support in IMA-ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v7 06/14] ima: Move measurement list related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v7 13/14] ima: Move dentry into ima_namespace and others onto stack
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v7 09/14] securityfs: Only use simple_pin_fs/simple_release_fs for init_user_ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v7 03/14] ima: Namespace audit status flags
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v7 05/14] ima: Move ima_htable into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v7 07/14] ima: Only accept AUDIT rules for IMA non-init_ima_ns namespaces for now
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v7 08/14] ima: Implement hierarchical processing of file accesses
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
Re: [PATCH] ima: Fix undefined arch_ima_get_secureboot() and co
From
: joeyli <jlee@xxxxxxxx>
Re: [PATCH v6 02/17] ima: Define ns_status for storing namespaced iint data
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v6 03/17] ima: Namespace audit status flags
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v6 02/17] ima: Define ns_status for storing namespaced iint data
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v4 10/16] ima: Implement hierarchical processing of file accesses
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v6 17/17] ima: Setup securityfs for IMA namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v6 03/17] ima: Namespace audit status flags
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v6 02/17] ima: Define ns_status for storing namespaced iint data
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v6 01/17] ima: Add IMA namespace support
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]