Linux Integrity
Thread Index
[
Prev Page
][
Next Page
]
Re: [PATCH v2 2/6] fs-verity: define a function to return the integrity protected file digest
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[GIT PULL] integrity subsystem updates for v5.17
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v4 6/6] module: Move duplicate mod_check_sig users code to mod_parse_sig
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v7 1/3] certs: export load_certificate_list() to be used outside certs/
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
[PATCH v4 5/6] module: Use key_being_used_for for log messages in verify_appended_signature
From
: Michal Suchanek <msuchanek@xxxxxxx>
[PATCH v4 4/6] module: strip the signature marker in the verification function.
From
: Michal Suchanek <msuchanek@xxxxxxx>
[PATCH v4 3/6] kexec_file: Don't opencode appended signature verification.
From
: Michal Suchanek <msuchanek@xxxxxxx>
[PATCH v4 6/6] module: Move duplicate mod_check_sig users code to mod_parse_sig
From
: Michal Suchanek <msuchanek@xxxxxxx>
[PATCH v4 2/6] powerpc/kexec_file: Add KEXEC_SIG support.
From
: Michal Suchanek <msuchanek@xxxxxxx>
[PATCH v4 1/6] s390/kexec_file: Don't opencode appended signature check.
From
: Michal Suchanek <msuchanek@xxxxxxx>
[PATCH v4 0/6] KEXEC_SIG with appended signature
From
: Michal Suchanek <msuchanek@xxxxxxx>
Re: [PATCH v2 2/6] fs-verity: define a function to return the integrity protected file digest
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 5/6] ima: support fs-verity file digest based signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 5/6] ima: support fs-verity file digest based signatures
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v2 2/6] fs-verity: define a function to return the integrity protected file digest
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v2 5/6] ima: support fs-verity file digest based signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v2 6/6] fsverity: update the documentation
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v2 3/6] ima: define a new template field 'd-type' and a new template 'ima-ngv2'
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v2 4/6] ima: include fsverity's file digests in the IMA measurement list
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v2 2/6] fs-verity: define a function to return the integrity protected file digest
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v2 1/6] ima: rename IMA_ACTION_FLAGS to IMA_NONACTION_FLAGS
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v2 0/6] ima: support fs-verity digests and signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v7 1/3] certs: export load_certificate_list() to be used outside certs/
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3 3/6] kexec_file: Don't opencode appended signature verification.
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v7 1/3] certs: export load_certificate_list() to be used outside certs/
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v7 1/3] certs: export load_certificate_list() to be used outside certs/
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3] tpm: st33zp24: Make st33zp24_remove() a void function
From
: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
Re: [PATCH v3 3/6] kexec_file: Don't opencode appended signature verification.
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
From
: Yael Tiomkin <yaelt@xxxxxxxxxx>
Re: [PATCH v8 0/5] Enable root to update the blacklist keyring
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v3 6/6] module: Move duplicate mod_check_sig users code to mod_parse_sig
From
: Michal Suchanek <msuchanek@xxxxxxx>
[PATCH v3 5/6] module: Use key_being_used_for for log messages in verify_appended_signature
From
: Michal Suchanek <msuchanek@xxxxxxx>
[PATCH v3 4/6] module: strip the signature marker in the verification function.
From
: Michal Suchanek <msuchanek@xxxxxxx>
[PATCH v3 3/6] kexec_file: Don't opencode appended signature verification.
From
: Michal Suchanek <msuchanek@xxxxxxx>
[PATCH v3 2/6] powerpc/kexec_file: Add KEXEC_SIG support.
From
: Michal Suchanek <msuchanek@xxxxxxx>
[PATCH v3 1/6] s390/kexec_file: Don't opencode appended signature check.
From
: Michal Suchanek <msuchanek@xxxxxxx>
[PATCH v3 0/6] KEXEC_SIG with appended signature
From
: Michal Suchanek <msuchanek@xxxxxxx>
Re: [PATCH v3] tpm: st33zp24: Make st33zp24_remove() a void function
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH v2 1/2] tpm: Fix error handling in async work
From
: Tadeusz Struk <tadeusz.struk@xxxxxxxxxx>
[RFC PATCH 2/3] dm verity: add support for IMA target update event
From
: Thore Sommer <public@xxxxxxxx>
[RFC PATCH 0/3] dm ima: allow targets to remeasure their state
From
: Thore Sommer <public@xxxxxxxx>
[RFC PATCH 3/3] dm ima: add documentation target update event
From
: Thore Sommer <public@xxxxxxxx>
[RFC PATCH 1/3] dm ima: allow targets to remeasure their table entry
From
: Thore Sommer <public@xxxxxxxx>
Re: [PATCH v8 0/5] Enable root to update the blacklist keyring
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v8 0/5] Enable root to update the blacklist keyring
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [GIT PULL] TPM DEVICE DRIVER updates for v5.17
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
From
: Yael Tiomkin <yaelt@xxxxxxxxxx>
Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v8 08/19] ima: Use mac_admin_ns_capable() to check corresponding capability
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
From
: Yael Tiomkin <yaelt@xxxxxxxxxx>
Re: [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH 2/2] selftests: tpm: add async space test with noneexisting handle
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2 1/2] tpm: Fix error handling in async work
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[PATCH v7 3/3] integrity: support including firmware ".platform" keys at build time
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v7 1/3] certs: export load_certificate_list() to be used outside certs/
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v7 2/3] integrity: make integrity_keyring_from_id() non-static
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v7 0/3] integrity: support including firmware ".platform" keys at build time
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
Re: [PATCH 2/3] selftests/kexec: Enable secureboot tests for PowerPC
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v8 16/19] ima: Enable re-auditing of modified files
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v4] ima: silence measurement list hexdump during kexec
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v8 01/19] securityfs: Extend securityfs with namespacing support
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v8 01/19] securityfs: Extend securityfs with namespacing support
From
: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
[PATCH v3] tpm: st33zp24: Make st33zp24_remove() a void function
From
: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
[PATCH v8 14/19] integrity/ima: Define ns_status for storing namespaced iint data
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v8 16/19] ima: Enable re-auditing of modified files
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v8 09/19] ima: Only accept AUDIT rules for non-init_ima_ns namespaces for now
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v8 05/19] ima: Move measurement list related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v8 17/19] ima: Setup securityfs for IMA namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v8 18/19] ima: Show owning user namespace's uid and gid when displaying policy
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v8 12/19] userns: Add pointer to ima_namespace to user_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v8 04/19] ima: Move ima_htable into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v8 03/19] ima: Move policy related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v8 13/19] ima: Add functions for creation and freeing of an ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v8 15/19] ima: Namespace audit status flags
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v8 19/19] ima: Enable IMA namespaces
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v8 08/19] ima: Use mac_admin_ns_capable() to check corresponding capability
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v8 06/19] ima: Move some IMA policy and filesystem related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v8 07/19] ima: Move dentry into ima_namespace and others onto stack
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v8 11/19] ima: Implement ima_free_policy_rules() for freeing of an ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v8 02/19] ima: Define ima_namespace structure and implement basic functions
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v8 00/19] ima: Namespace IMA with audit support in IMA-ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v8 01/19] securityfs: Extend securityfs with namespacing support
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v8 10/19] ima: Implement hierarchical processing of file accesses
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v18 4/4] selftest/interpreter: Add tests for trusted_for(2) policies
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v18 3/4] arch: Wire up trusted_for(2)
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v18 2/4] fs: Add trusted_for(2) syscall implementation and related sysctl
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCH v8 0/5] Enable root to update the blacklist keyring
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v18 0/4] Add trusted_for(2) (was O_MAYEXEC)
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v18 1/4] printk: Move back proc_dointvec_minmax_sysadmin() to sysctl.c
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [oss-security] IMA gadgets
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v7 10/14] securityfs: Extend securityfs with namespacing support
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [oss-security] IMA gadgets
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [oss-security] IMA gadgets
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH ima-evm-utils] ci: Replace groovy -> impish
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
[PATCH v4] KEYS: encrypted: Instantiate key with user-provided decrypted data
From
: Yael Tiomkin <yaelt@xxxxxxxxxx>
[PATCH 2/2] selftests: tpm: add async space test with noneexisting handle
From
: Tadeusz Struk <tstruk@xxxxxxxxx>
[PATCH v2 1/2] tpm: Fix error handling in async work
From
: Tadeusz Struk <tstruk@xxxxxxxxx>
[GIT PULL] TPM DEVICE DRIVER updates for v5.17
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[PATCH v4] ima: silence measurement list hexdump during kexec
From
: Bruno Meneguele <bmeneg@xxxxxxxxxx>
Re: [PATCH v2] tpm: fix potential NULL pointer access in tpm_del_char_device
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
Re: [PATCH v2] tpm: fix potential NULL pointer access in tpm_del_char_device
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH 1/2] tpm: Fix error handling in async work
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2] tpm: fix potential NULL pointer access in tpm_del_char_device
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
Re: [PATCH] tpm: fix NPE on probe for missing device
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v6 3/3] integrity: support including firmware ".platform" keys at build time
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v6 1/3] certs: export load_certificate_list() to be used outside certs/
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3] Instantiate key with user-provided decrypted data.
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2] tpm: fix potential NULL pointer access in tpm_del_char_device
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] tpm: Fix kexec crash due to access to ops NULL pointer (powerpc)
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] security:trusted_tpm2: Fix memory leak in tpm2_key_encode()
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH 1/2] tpm: Fix error handling in async work
From
: Tadeusz Struk <tstruk@xxxxxxxxx>
Re: [PATCH 1/2] tpm: Fix error handling in async work
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [oss-security] IMA gadgets
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [oss-security] IMA gadgets
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [RFC 05/32] char: impi, tpm: depend on HAS_IOPORT
From
: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
Re: [RFC 05/32] char: impi, tpm: depend on HAS_IOPORT
From
: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
Re: [PATCH v7 00/14] ima: Namespace IMA with audit support in IMA-ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[RFC 05/32] char: impi, tpm: depend on HAS_IOPORT
From
: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
Re: [PATCH v3] ima: silence measurement list hexdump during kexec
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v3] ima: silence measurement list hexdump during kexec
From
: Bruno Meneguele <bmeneg@xxxxxxxxxx>
Re: [PATCH v2] ima: silence measurement list hexdump during kexec
From
: Bruno Meneguele <bmeneg@xxxxxxxxxx>
Re: [PATCH v2] ima: silence measurement list hexdump during kexec
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v2] ima: silence measurement list hexdump during kexec
From
: Bruno Meneguele <bmeneg@xxxxxxxxxx>
Re: [PATCH] ima: silence measurement list hexdump during kexec
From
: Bruno Meneguele <bmeneg@xxxxxxxxxx>
Re: [PATCH v4 1/2] selftests: tpm2: Determine available PCR bank
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH] tpm: fix NPE on probe for missing device
From
: Patrick Williams <patrick@xxxxxxxxx>
Re: [PATCH v1 1/2] selftest/kexec: fix "ignored null byte in input" warning
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH v1 2/2] selftests/kexec: update searching for the Kconfig
From
: Petr Vorel <pvorel@xxxxxxx>
RE: [PATCH v4 5/5] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: "Pankaj Gupta (OSS)" <pankaj.gupta@xxxxxxxxxxx>
RE: [EXT] [PATCH v4 2/5] KEYS: trusted: allow users to use kernel RNG for key material
From
: Pankaj Gupta <pankaj.gupta@xxxxxxx>
RE: [EXT] [PATCH v4 4/5] crypto: caam - add in-kernel interface for blob generator
From
: "Pankaj Gupta (OSS)" <pankaj.gupta@xxxxxxxxxxx>
[PATCH v3] tpm: fix potential NULL pointer access in tpm_del_char_device
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
[PATCH v6 3/3] integrity: support including firmware ".platform" keys at build time
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v6 2/3] integrity: make integrity_keyring_from_id() non-static
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v6 1/3] certs: export load_certificate_list() to be used outside certs/
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v6 0/3] integrity: support including firmware ".platform" keys at build time
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
Re: [PATCH] ima: silence measurement list hexdump during kexec
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v1 1/2] selftest/kexec: fix "ignored null byte in input" warning
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v1 0/2] selftest/kexec: minor update to the existing test
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v1 2/2] selftests/kexec: update searching for the Kconfig
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH] ima: silence measurement list hexdump during kexec
From
: Bruno Meneguele <bmeneg@xxxxxxxxxx>
Re: [PATCH] ima: Fix undefined arch_ima_get_secureboot() and co
From
: Takashi Iwai <tiwai@xxxxxxx>
Re: [PATCH v2] Instantiate key with user-provided decrypted data.
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v3] Instantiate key with user-provided decrypted data.
From
: Yael Tiomkin <yaelt@xxxxxxxxxx>
Re: [PATCH] ima: Fix undefined arch_ima_get_secureboot() and co
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2] Instantiate key with user-provided decrypted data.
From
: Yael Tiomkin <yaelt@xxxxxxxxxx>
Re: [PATCH v2] syscalls/keyctl09: test encrypted keys.
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v2] syscalls/keyctl09: test encrypted keys.
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[zohar-integrity:next-integrity-testing 1/1] security/integrity/platform_certs/load_uefi.c:181:14: error: implicit declaration of function 'arch_ima_get_secureboot'
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v2] syscalls/keyctl09: test encrypted keys.
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH v2] tpm: fix potential NULL pointer access in tpm_del_char_device
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
Re: [PATCH v2] syscalls/keyctl09: test encrypted keys.
From
: Nageswara Sastry <rnsastry@xxxxxxxxxxxxx>
Re: [PATCH v2] tpm: fix potential NULL pointer access in tpm_del_char_device
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v2] tpm: fix potential NULL pointer access in tpm_del_char_device
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
Fw: TCTI poll with kernel 5.10
From
: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
Re: [PATCH] tpm: Fix kexec crash due to access to ops NULL pointer (powerpc)
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH] tpm: Fix kexec crash due to access to ops NULL pointer (powerpc)
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v2] Instantiate key with user-provided decrypted data.
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2] syscalls/keyctl09: test encrypted keys.
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH v2] syscalls/keyctl09: test encrypted keys.
From
: Nageswara Sastry <rnsastry@xxxxxxxxxxxxx>
[PATCH] security:trusted_tpm2: Fix memory leak in tpm2_key_encode()
From
: Jianglei Nie <niejianglei2021@xxxxxxx>
Re: [PATCH v2] syscalls/keyctl09: test encrypted keys.
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH v8 0/5] Enable root to update the blacklist keyring
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] tpm: Fix kexec crash due to access to ops NULL pointer (powerpc)
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v8] tpm: Add Upgrade/Reduced mode support for TPM2 modules
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] security:trusted_tpm2: Fix memory leak in tpm2_key_encode()
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2] Instantiate key with user-provided decrypted data.
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2] Instantiate key with user-provided decrypted data.
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[PATCH v2] syscalls/keyctl09: test encrypted keys.
From
: Yael Tiomkin <yaelt@xxxxxxxxxx>
Re: [PATCH] tpm: Fix kexec crash due to access to ops NULL pointer (powerpc)
From
: Tyrel Datwyler <tyreld@xxxxxxxxxxxxx>
Re: [PATCH] tpm: Fix kexec crash due to access to ops NULL pointer (powerpc)
From
: Tyrel Datwyler <tyreld@xxxxxxxxxxxxx>
Re: [PATCH] tpm: Fix kexec crash due to access to ops NULL pointer (powerpc)
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH] tpm: Fix kexec crash due to access to ops NULL pointer (powerpc)
From
: Jason Gunthorpe <jgg@xxxxxxxx>
Re: [PATCH] tpm: Fix kexec crash due to access to ops NULL pointer (powerpc)
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH] tpm: Fix kexec crash due to access to ops NULL pointer (powerpc)
From
: Tyrel Datwyler <tyreld@xxxxxxxxxxxxx>
[PATCH 2/2] selftests: tpm: add async space test with noneexisting handle
From
: Tadeusz Struk <tstruk@xxxxxxxxx>
[PATCH 1/2] tpm: Fix error handling in async work
From
: Tadeusz Struk <tstruk@xxxxxxxxx>
[PATCH v2] tpm: fix potential NULL pointer access in tpm_del_char_device
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
Re: [PATCH] tpm: Fix kexec crash due to access to ops NULL pointer (powerpc)
From
: Sachin Sant <sachinp@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v7 00/14] ima: Namespace IMA with audit support in IMA-ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH] ima: Fix undefined arch_ima_get_secureboot() and co
From
: joeyli <jlee@xxxxxxxx>
Re: [PATCH v7 10/14] securityfs: Extend securityfs with namespacing support
From
: kernel test robot <lkp@xxxxxxxxx>
[RFC PATCH] securityfs: securityfs_dir_inode_operations can be static
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH] syscalls/keyctl09: test encrypted keys.
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH v7 00/14] ima: Namespace IMA with audit support in IMA-ns
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v7 00/14] ima: Namespace IMA with audit support in IMA-ns
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v7 01/14] ima: Add IMA namespace support
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH] syscalls/keyctl09: test encrypted keys.
From
: Yael Tiomkin <yaelt@xxxxxxxxxx>
Re: [PATCH v7 01/14] ima: Add IMA namespace support
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v7 14/14] ima: Setup securityfs for IMA namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v7 00/14] ima: Namespace IMA with audit support in IMA-ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v7 00/14] ima: Namespace IMA with audit support in IMA-ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v7 10/14] securityfs: Extend securityfs with namespacing support
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v7 04/14] ima: Move policy related variables into ima_namespace
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v7 01/14] ima: Add IMA namespace support
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v7 14/14] ima: Setup securityfs for IMA namespace
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v7 10/14] securityfs: Extend securityfs with namespacing support
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v7 00/14] ima: Namespace IMA with audit support in IMA-ns
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH] ima: Fix undefined arch_ima_get_secureboot() and co
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v7 00/14] ima: Namespace IMA with audit support in IMA-ns
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v7 14/14] ima: Setup securityfs for IMA namespace
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v7 14/14] ima: Setup securityfs for IMA namespace
From
: kernel test robot <lkp@xxxxxxxxx>
[PATCH v7 01/14] ima: Add IMA namespace support
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v7 14/14] ima: Setup securityfs for IMA namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v7 04/14] ima: Move policy related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v7 10/14] securityfs: Extend securityfs with namespacing support
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v7 12/14] ima: Use mac_admin_ns_capable() to check corresponding capability
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v7 02/14] ima: Define ns_status for storing namespaced iint data
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v7 11/14] ima: Move some IMA policy and filesystem related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v7 00/14] ima: Namespace IMA with audit support in IMA-ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v7 06/14] ima: Move measurement list related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v7 13/14] ima: Move dentry into ima_namespace and others onto stack
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v7 09/14] securityfs: Only use simple_pin_fs/simple_release_fs for init_user_ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v7 03/14] ima: Namespace audit status flags
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v7 05/14] ima: Move ima_htable into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v7 07/14] ima: Only accept AUDIT rules for IMA non-init_ima_ns namespaces for now
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
[PATCH v7 08/14] ima: Implement hierarchical processing of file accesses
From
: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
Re: [PATCH] ima: Fix undefined arch_ima_get_secureboot() and co
From
: joeyli <jlee@xxxxxxxx>
Re: [PATCH v6 02/17] ima: Define ns_status for storing namespaced iint data
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v6 03/17] ima: Namespace audit status flags
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v6 02/17] ima: Define ns_status for storing namespaced iint data
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v4 10/16] ima: Implement hierarchical processing of file accesses
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v6 17/17] ima: Setup securityfs for IMA namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v6 03/17] ima: Namespace audit status flags
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v6 02/17] ima: Define ns_status for storing namespaced iint data
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v6 01/17] ima: Add IMA namespace support
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v4 10/16] ima: Implement hierarchical processing of file accesses
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v6 17/17] ima: Setup securityfs for IMA namespace
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v6 03/17] ima: Namespace audit status flags
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v6 02/17] ima: Define ns_status for storing namespaced iint data
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v6 01/17] ima: Add IMA namespace support
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v8 09/17] KEYS: Rename get_builtin_and_secondary_restriction
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v6 01/17] ima: Add IMA namespace support
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] ima: Fix undefined arch_ima_get_secureboot() and co
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v8 09/17] KEYS: Rename get_builtin_and_secondary_restriction
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH] ima: Fix undefined arch_ima_get_secureboot() and co
From
: joeyli <jlee@xxxxxxxx>
Re: [PATCH] ima: Fix undefined arch_ima_get_secureboot() and co
From
: Takashi Iwai <tiwai@xxxxxxx>
Re: [PATCH] ima: Fix undefined arch_ima_get_secureboot() and co
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2] Instantiate key with user-provided decrypted data.
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v31 15/28] LSM: Ensure the correct LSM context releaser
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v31 13/28] LSM: Use lsmblob in security_cred_getsecid
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v31 12/28] LSM: Use lsmblob in security_inode_getsecid
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v31 11/28] LSM: Use lsmblob in security_task_getsecid
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH 2/3] selftests/kexec: Enable secureboot tests for PowerPC
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v6 06/17] ima: Move policy related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v6 01/17] ima: Add IMA namespace support
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v2] Instantiate key with user-provided decrypted data.
From
: Yael Tiomkin <yaelt@xxxxxxxxxx>
Re: [PATCH v2 2/6] powerpc/kexec_file: Add KEXEC_SIG support.
From
: Michal Suchánek <msuchanek@xxxxxxx>
Re: [PATCH v2 6/6] module: Move duplicate mod_check_sig users code to mod_parse_sig
From
: Michal Suchánek <msuchanek@xxxxxxx>
Re: [PATCH v5 13/16] ima: Move some IMA policy and filesystem related variables into ima_namespace
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v5 13/16] ima: Move some IMA policy and filesystem related variables into ima_namespace
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v5 13/16] ima: Move some IMA policy and filesystem related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH] ima: Fix undefined arch_ima_get_secureboot() and co
From
: Takashi Iwai <tiwai@xxxxxxx>
Re: [PATCH v5 13/16] ima: Move some IMA policy and filesystem related variables into ima_namespace
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v5 13/16] ima: Move some IMA policy and filesystem related variables into ima_namespace
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v5 13/16] ima: Move some IMA policy and filesystem related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v8 0/5] Enable root to update the blacklist keyring
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCH v4 5/5] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Matthias Schiffer <matthias.schiffer@xxxxxxxxxxxxxxx>
Re: [PATCH v4 5/5] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH v5 15/16] ima: Move dentries into ima_namespace
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v4 5/5] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Matthias Schiffer <matthias.schiffer@xxxxxxxxxxxxxxx>
Re: [PATCH v4 4/5] crypto: caam - add in-kernel interface for blob generator
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH v4 2/5] KEYS: trusted: allow users to use kernel RNG for key material
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
[PATCH v8] tpm: Add Upgrade/Reduced mode support for TPM2 modules
From
: Axel Jonsson <axelj@xxxxxxxx>
Re: [PATCH v7] tpm: Add Upgrade/Reduced mode support for TPM2 modules
From
: Axel Jonsson <axelj@xxxxxxxx>
Re: [PATCH v2 2/6] powerpc/kexec_file: Add KEXEC_SIG support.
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
Re: [PATCH] security:trusted_tpm2: Fix memory leak in tpm2_key_encode()
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: [PATCH v5 15/16] ima: Move dentries into ima_namespace
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
[PATCH] security:trusted_tpm2: Fix memory leak in tpm2_key_encode()
From
: Jianglei Nie <niejianglei2021@xxxxxxx>
[PATCH] tpm: Fix kexec crash due to access to ops NULL pointer (powerpc)
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v6 14/17] ima: Tie opened SecurityFS files to the IMA namespace it belongs to
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v6 12/17] securityfs: Extend securityfs with namespacing support
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v6 15/17] ima: Use mac_admin_ns_capable() to check corresponding capability
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [PATCH v6 15/17] ima: Use mac_admin_ns_capable() to check corresponding capability
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: [PATCH v5 14/16] ima: Use mac_admin_ns_capable() to check corresponding capability
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [PATCH v6 15/17] ima: Use mac_admin_ns_capable() to check corresponding capability
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [PATCH] Instantiate key with user-provided decrypted data.
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v5 14/16] ima: Use mac_admin_ns_capable() to check corresponding capability
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v6 15/17] ima: Use mac_admin_ns_capable() to check corresponding capability
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: [PATCH v5 14/16] ima: Use mac_admin_ns_capable() to check corresponding capability
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: [PATCH v4 11/16] securityfs: Only use simple_pin_fs/simple_release_fs for init_user_ns
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v4 11/16] securityfs: Only use simple_pin_fs/simple_release_fs for init_user_ns
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxx>
Re: [PATCH v7] tpm: Add Upgrade/Reduced mode support for TPM2 modules
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v6 14/17] ima: Tie opened SecurityFS files to the IMA namespace it belongs to
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v6 12/17] securityfs: Extend securityfs with namespacing support
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v5 13/16] ima: Move some IMA policy and filesystem related variables into ima_namespace
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v5 13/16] ima: Move some IMA policy and filesystem related variables into ima_namespace
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v5 13/16] ima: Move some IMA policy and filesystem related variables into ima_namespace
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v5 2/2] integrity: support including firmware ".platform" keys at build time
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3] char: tpm: cr50: Set TPM_FIRMWARE_POWER_MANAGED based on device property
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] Instantiate key with user-provided decrypted data.
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v5 13/16] ima: Move some IMA policy and filesystem related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v6 03/17] ima: Namespace audit status flags
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v6 00/17] ima: Namespace IMA with audit support in IMA-ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v6 10/17] ima: Implement hierarchical processing of file accesses
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v6 04/17] ima: Move delayed work queue and variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v6 05/17] ima: Move IMA's keys queue related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v6 12/17] securityfs: Extend securityfs with namespacing support
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v6 09/17] ima: Only accept AUDIT rules for IMA non-init_ima_ns namespaces for now
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v6 06/17] ima: Move policy related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v6 16/17] ima: Move dentry into ima_namespace and others onto stack
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v6 01/17] ima: Add IMA namespace support
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v6 15/17] ima: Use mac_admin_ns_capable() to check corresponding capability
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v6 14/17] ima: Tie opened SecurityFS files to the IMA namespace it belongs to
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v6 08/17] ima: Move measurement list related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v6 11/17] securityfs: Only use simple_pin_fs/simple_release_fs for init_user_ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v6 13/17] ima: Move some IMA policy and filesystem related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v6 17/17] ima: Setup securityfs for IMA namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v6 07/17] ima: Move ima_htable into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v6 02/17] ima: Define ns_status for storing namespaced iint data
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH] Instantiate key with user-provided decrypted data.
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v5 15/16] ima: Move dentries into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v5 01/16] ima: Add IMA namespace support
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v5 15/16] ima: Move dentries into ima_namespace
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5 15/16] ima: Move dentries into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v5 15/16] ima: Move dentries into ima_namespace
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH] Instantiate key with user-provided decrypted data.
From
: Yael Tiomkin <yaelt@xxxxxxxxxx>
[PATCH] Instantiate key with user-provided decrypted data.
From
: Yael Tiomkin <yaelt@xxxxxxxxxx>
Re: [PATCH v5 15/16] ima: Move dentries into ima_namespace
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [PATCH v5 13/16] ima: Move some IMA policy and filesystem related variables into ima_namespace
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [PATCH v5 15/16] ima: Move dentries into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v5 13/16] ima: Move some IMA policy and filesystem related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v5 15/16] ima: Move dentries into ima_namespace
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5 15/16] ima: Move dentries into ima_namespace
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5 15/16] ima: Move dentries into ima_namespace
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [PATCH v5 15/16] ima: Move dentries into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v5 15/16] ima: Move dentries into ima_namespace
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5 15/16] ima: Move dentries into ima_namespace
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v5 13/16] ima: Move some IMA policy and filesystem related variables into ima_namespace
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v5 13/16] ima: Move some IMA policy and filesystem related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v2 2/6] powerpc/kexec_file: Add KEXEC_SIG support.
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
Re: [PATCH v5 13/16] ima: Move some IMA policy and filesystem related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v5 15/16] ima: Move dentries into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v5 15/16] ima: Move dentries into ima_namespace
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [PATCH v5 13/16] ima: Move some IMA policy and filesystem related variables into ima_namespace
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v5 07/16] ima: Move ima_htable into ima_namespace
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v5 15/16] ima: Move dentries into ima_namespace
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v5 15/16] ima: Move dentries into ima_namespace
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [PATCH v5 04/16] ima: Move delayed work queue and variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v5 15/16] ima: Move dentries into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v2 0/6] KEXEC_SIG with appended signature
From
: Michal Suchánek <msuchanek@xxxxxxx>
Re: [PATCH v5 15/16] ima: Move dentries into ima_namespace
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v5 15/16] ima: Move dentries into ima_namespace
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v5 15/16] ima: Move dentries into ima_namespace
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v5 14/16] ima: Use mac_admin_ns_capable() to check corresponding capability
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [PATCH v5 01/16] ima: Add IMA namespace support
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v5 04/16] ima: Move delayed work queue and variables into ima_namespace
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v5 01/16] ima: Add IMA namespace support
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v2 2/6] powerpc/kexec_file: Add KEXEC_SIG support.
From
: Michal Suchánek <msuchanek@xxxxxxx>
RE: [PATCH v5 14/16] ima: Use mac_admin_ns_capable() to check corresponding capability
From
: Denis Semakin <denis.semakin@xxxxxxxxxx>
RE: [PATCH v5 14/16] ima: Use mac_admin_ns_capable() to check corresponding capability
From
: Denis Semakin <denis.semakin@xxxxxxxxxx>
Re: [PATCH v5 01/16] ima: Add IMA namespace support
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v2 0/6] KEXEC_SIG with appended signature
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
[PATCH v5 15/16] ima: Move dentries into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v5 00/16] ima: Namespace IMA with audit support in IMA-ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v5 03/16] ima: Namespace audit status flags
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v5 09/16] ima: Only accept AUDIT rules for IMA non-init_ima_ns namespaces for now
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v5 01/16] ima: Add IMA namespace support
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v5 16/16] ima: Setup securityfs for IMA namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v5 13/16] ima: Move some IMA policy and filesystem related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v5 06/16] ima: Move policy related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v5 14/16] ima: Use mac_admin_ns_capable() to check corresponding capability
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v5 12/16] securityfs: Extend securityfs with namespacing support
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v5 10/16] ima: Implement hierarchical processing of file accesses
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v5 08/16] ima: Move measurement list related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v5 05/16] ima: Move IMA's keys queue related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v5 11/16] securityfs: Only use simple_pin_fs/simple_release_fs for init_user_ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v5 07/16] ima: Move ima_htable into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v5 04/16] ima: Move delayed work queue and variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v5 02/16] ima: Define ns_status for storing namespaced iint data
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v4 10/16] ima: Implement hierarchical processing of file accesses
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v4 10/16] ima: Implement hierarchical processing of file accesses
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v4 16/16] ima: Setup securityfs for IMA namespace
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v4 16/16] ima: Setup securityfs for IMA namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v4 16/16] ima: Setup securityfs for IMA namespace
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v4 16/16] ima: Setup securityfs for IMA namespace
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v4 01/16] ima: Add IMA namespace support
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v4 16/16] ima: Setup securityfs for IMA namespace
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v4 16/16] ima: Setup securityfs for IMA namespace
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v4 11/16] securityfs: Only use simple_pin_fs/simple_release_fs for init_user_ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v4 16/16] ima: Setup securityfs for IMA namespace
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v4 16/16] ima: Setup securityfs for IMA namespace
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v4 11/16] securityfs: Only use simple_pin_fs/simple_release_fs for init_user_ns
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v4 14/16] ima: Use mac_admin_ns_capable() to check corresponding capability
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v4 10/16] ima: Implement hierarchical processing of file accesses
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v4 10/16] ima: Implement hierarchical processing of file accesses
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v4 11/16] securityfs: Only use simple_pin_fs/simple_release_fs for init_user_ns
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v4 01/16] ima: Add IMA namespace support
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v4 01/16] ima: Add IMA namespace support
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v2 0/6] KEXEC_SIG with appended signature
From
: Philipp Rudo <prudo@xxxxxxxxxx>
[PATCH v7] tpm: Add Upgrade/Reduced mode support for TPM2 modules
From
: Axel Jonsson <axel.jonsson@xxxxxxxx>
[PATCH v6] tpm: Add Upgrade/Reduced mode support for TPM2 modules
From
: Axel Jonsson <axel.jonsson@xxxxxxxx>
[PATCH v4 16/16] ima: Setup securityfs for IMA namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v4 15/16] ima: Move dentries into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v4 14/16] ima: Use mac_admin_ns_capable() to check corresponding capability
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v4 13/16] ima: Move some IMA policy and filesystem related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v4 12/16] securityfs: Extend securityfs with namespacing support
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v4 11/16] securityfs: Only use simple_pin_fs/simple_release_fs for init_user_ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v4 10/16] ima: Implement hierarchical processing of file accesses
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v4 09/16] ima: Only accept AUDIT rules for IMA non-init_ima_ns namespaces for now
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v4 08/16] ima: Move measurement list related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v4 07/16] ima: Move ima_htable into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v4 06/16] ima: Move policy related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v4 05/16] ima: Move IMA's keys queue related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v4 04/16] ima: Move delayed work queue and variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v4 03/16] ima: Namespace audit status flags
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v4 02/16] ima: Define ns_status for storing namespaced iint data
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v4 00/16] ima: Namespace IMA with audit support in IMA-ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v4 01/16] ima: Add IMA namespace support
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v2 0/6] KEXEC_SIG with appended signature
From
: Michal Suchánek <msuchanek@xxxxxxx>
Re: [PATCH v3 00/16] ima: Namespace IMA with audit support in IMA-ns
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [PATCH v3 00/16] ima: Namespace IMA with audit support in IMA-ns
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [PATCH v2 4/6] module: strip the signature marker in the verification function.
From
: Philipp Rudo <prudo@xxxxxxxxxx>
Re: [PATCH v2 6/6] module: Move duplicate mod_check_sig users code to mod_parse_sig
From
: Philipp Rudo <prudo@xxxxxxxxxx>
Re: [PATCH v2 0/6] KEXEC_SIG with appended signature
From
: Philipp Rudo <prudo@xxxxxxxxxx>
Re: [PATCH v3 00/16] ima: Namespace IMA with audit support in IMA-ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v3 00/16] ima: Namespace IMA with audit support in IMA-ns
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH v3 00/16] ima: Namespace IMA with audit support in IMA-ns
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [PATCH v3 00/16] ima: Namespace IMA with audit support in IMA-ns
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v3 00/16] ima: Namespace IMA with audit support in IMA-ns
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [PATCH v3 00/16] ima: Namespace IMA with audit support in IMA-ns
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH] char: tpm: cr50: Set TPM_FIRMWARE_POWER_MANAGED based on device property
From
: Rob Barnes <robbarnes@xxxxxxxxxx>
Re: [PATCH v3 00/16] ima: Namespace IMA with audit support in IMA-ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v3 00/16] ima: Namespace IMA with audit support in IMA-ns
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [PATCH v4 00/14] x86: Trenchboot secure dynamic launch Linux kernel support
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
[PATCH v3 04/16] ima: Move delayed work queue and variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v3 06/16] ima: Move policy related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v3 16/16] ima: Setup securityfs for IMA namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v3 00/16] ima: Namespace IMA with audit support in IMA-ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v3 03/16] ima: Namespace audit status flags
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v3 13/16] ima: Move some IMA policy and filesystem related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v3 05/16] ima: Move IMA's keys queue related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v3 14/16] ima: Use mac_admin_ns_capable() to check corresponding capability
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v3 01/16] ima: Add IMA namespace support
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v3 07/16] ima: Move ima_htable into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v3 12/16] securityfs: Extend securityfs with namespacing support
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v3 09/16] ima: Only accept AUDIT rules for IMA non-init_ima_ns namespaces for now
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v3 11/16] securityfs: Move vfsmount into user_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v3 02/16] ima: Define ns_status for storing namespaced iint data
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v3 15/16] ima: Move dentries into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v3 08/16] ima: Move measurement list related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v3 10/16] ima: Implement hierarchical processing of file accesses
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v3] char: tpm: cr50: Set TPM_FIRMWARE_POWER_MANAGED based on device property
From
: Rob Barnes <robbarnes@xxxxxxxxxx>
Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
RE: [RFC][PATCH] device mapper: Add builtin function dm_get_status()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [PATCH v5 2/2] integrity: support including firmware ".platform" keys at build time
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5 1/2] certs: export load_certificate_list() to be used outside certs/
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v4 4/5] crypto: caam - add in-kernel interface for blob generator
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v4 2/5] KEYS: trusted: allow users to use kernel RNG for key material
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v4 1/5] KEYS: trusted: allow use of TEE as backend without TCG_TPM support
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2] char: tpm: cr50: Set TPM_FIRMWARE_POWER_MANAGED based on device property
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v8 09/17] KEYS: Rename get_builtin_and_secondary_restriction
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v4 04/14] Documentation/x86: Secure Launch kernel documentation
From
: Ross Philipson <ross.philipson@xxxxxxxxxx>
Re: [RFC v2 15/19] capabilities: Introduce CAP_INTEGRITY_ADMIN
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [RFC v2 15/19] capabilities: Introduce CAP_INTEGRITY_ADMIN
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH v4 04/14] Documentation/x86: Secure Launch kernel documentation
From
: Robin Murphy <robin.murphy@xxxxxxx>
Re: [PATCH v4 04/14] Documentation/x86: Secure Launch kernel documentation
From
: Ross Philipson <ross.philipson@xxxxxxxxxx>
Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
RE: [RFC][PATCH] device mapper: Add builtin function dm_get_status()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [RFC][PATCH] device mapper: Add builtin function dm_get_status()
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
[RFC v2 18/19] ima/userns: Define early teardown function for IMA namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[RFC v2 05/19] ima: Move IMA's keys queue related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[RFC v2 19/19] ima: Setup securityfs for IMA namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[RFC v2 17/19] userns: Introduce a refcount variable for calling early teardown function
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[RFC v2 15/19] capabilities: Introduce CAP_INTEGRITY_ADMIN
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[RFC v2 09/19] ima: Only accept AUDIT rules for IMA non-init_ima_ns namespaces for now
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[RFC v2 13/19] securityfs: Extend securityfs with namespacing support
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[RFC v2 16/19] ima: Use integrity_admin_ns_capable() to check corresponding capability
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[RFC v2 11/19] securityfs: Prefix global variables with securityfs_
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[RFC v2 08/19] ima: Move measurement list related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[RFC v2 14/19] ima: Move some IMA policy and filesystem related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[RFC v2 10/19] ima: Implement hierarchical processing of file accesses
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[RFC v2 12/19] securityfs: Pass static variables as parameters from top level functions
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[RFC v2 03/19] ima: Namespace audit status flags
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[RFC v2 04/19] ima: Move delayed work queue and variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[RFC v2 07/19] ima: Move ima_htable into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[RFC v2 06/19] ima: Move policy related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[RFC v2 02/19] ima: Define ns_status for storing namespaced iint data
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[RFC v2 00/19] ima: Namespace IMA with audit support in IMA-ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[RFC v2 01/19] ima: Add IMA namespace support
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v1 3/5] ima: limit including fs-verity's file digest in measurement list
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v1 3/5] ima: limit including fs-verity's file digest in measurement list
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v1 1/5] fs-verity: define a function to return the integrity protected file digest
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v1 5/5] fsverity: update the documentation
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v1 0/5] ima: support fs-verity signatures stored as
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 2/4] ima: define a new signature type named IMA_VERITY_DIGSIG
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v1 5/5] fsverity: update the documentation
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v1 4/5] ima: support fs-verity file digest based signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v1 3/5] ima: limit including fs-verity's file digest in measurement list
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v1 2/5] ima: define a new signature type named IMA_VERITY_DIGSIG
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v1 1/5] fs-verity: define a function to return the integrity protected file digest
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 2/4] ima: define a new signature type named IMA_VERITY_DIGSIG
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v2] char: tpm: cr50: Set TPM_FIRMWARE_POWER_MANAGED based on device property
From
: Rob Barnes <robbarnes@xxxxxxxxxx>
Re: [RFC 08/20] ima: Move measurement list related variables into ima_namespace
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [RFC 08/20] ima: Move measurement list related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [RFC 17/20] ima: Use integrity_admin_ns_capable() to check corresponding capability
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [RFC 08/20] ima: Move measurement list related variables into ima_namespace
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [PATCH v4 04/14] Documentation/x86: Secure Launch kernel documentation
From
: Robin Murphy <robin.murphy@xxxxxxx>
Re: [RFC 08/20] ima: Move measurement list related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [RFC 08/20] ima: Move measurement list related variables into ima_namespace
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [PATCH v4 00/14] x86: Trenchboot secure dynamic launch Linux kernel support
From
: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/4] ima: define a new signature type named IMA_VERITY_DIGSIG
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [RFC 17/20] ima: Use integrity_admin_ns_capable() to check corresponding capability
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [RFC 20/20] ima: Setup securityfs_ns for IMA namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [RFC 13/20] securityfs: Build securityfs_ns for namespacing support
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [RFC 08/20] ima: Move measurement list related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [RFC 13/20] securityfs: Build securityfs_ns for namespacing support
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [RFC 20/20] ima: Setup securityfs_ns for IMA namespace
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [RFC 17/20] ima: Use integrity_admin_ns_capable() to check corresponding capability
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [RFC 17/20] ima: Use integrity_admin_ns_capable() to check corresponding capability
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [RFC 08/20] ima: Move measurement list related variables into ima_namespace
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [RFC 17/20] ima: Use integrity_admin_ns_capable() to check corresponding capability
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
RE: [RFC][PATCH] device mapper: Add builtin function dm_get_status()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [RFC][PATCH] device mapper: Add builtin function dm_get_status()
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
RE: [RFC][PATCH] device mapper: Add builtin function dm_get_status()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [RFC][PATCH] device mapper: Add builtin function dm_get_status()
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
RE: [RFC 17/20] ima: Use integrity_admin_ns_capable() to check corresponding capability
From
: Denis Semakin <denis.semakin@xxxxxxxxxx>
Re: [RFC 20/20] ima: Setup securityfs_ns for IMA namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [RFC 20/20] ima: Setup securityfs_ns for IMA namespace
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [RFC 20/20] ima: Setup securityfs_ns for IMA namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [RFC 20/20] ima: Setup securityfs_ns for IMA namespace
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [RFC 20/20] ima: Setup securityfs_ns for IMA namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [RFC 20/20] ima: Setup securityfs_ns for IMA namespace
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [RFC 20/20] ima: Setup securityfs_ns for IMA namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [RFC 17/20] ima: Use integrity_admin_ns_capable() to check corresponding capability
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [RFC 20/20] ima: Setup securityfs_ns for IMA namespace
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [RFC 20/20] ima: Setup securityfs_ns for IMA namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [RFC 20/20] ima: Setup securityfs_ns for IMA namespace
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [RFC 17/20] ima: Use integrity_admin_ns_capable() to check corresponding capability
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [RFC 17/20] ima: Use integrity_admin_ns_capable() to check corresponding capability
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
RE: [RFC][PATCH] device mapper: Add builtin function dm_get_status()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v17 0/3] Add trusted_for(2) (was O_MAYEXEC)
From
: Kees Cook <keescook@xxxxxxxxxxxx>
[RFC][PATCH] device mapper: Add builtin function dm_get_status()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v4 2/2] selftests: tpm2: Reset the dictionary attack lock
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v8 09/17] KEYS: Rename get_builtin_and_secondary_restriction
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[RFC v2 3/3] ima: make the integrity inode cache per namespace
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[RFC v2 2/3] ima: show the namespace label in the ima-ns template
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[RFC v2 1/3] userns: add ima_ns_info field containing a settable namespace label
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[RFC v2 0/3] Namespace IMA log entries
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v17 0/3] Add trusted_for(2) (was O_MAYEXEC)
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 0/6] KEXEC_SIG with appended signature
From
: Michal Suchánek <msuchanek@xxxxxxx>
Re: [PATCH v4] KEYS: trusted: Fix trusted key backends when building as module
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH v4] KEYS: trusted: Fix trusted key backends when building as module
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v8 09/17] KEYS: Rename get_builtin_and_secondary_restriction
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v4 2/2] selftests: tpm2: Reset the dictionary attack lock
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v4 2/2] selftests: tpm2: Reset the dictionary attack lock
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[PATCH v4] KEYS: trusted: Fix trusted key backends when building as module
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH v17 0/3] Add trusted_for(2) (was O_MAYEXEC)
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCH] char: tpm: cr50: Set TPM_FIRMWARE_POWER_MANAGED based on device property
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v2 0/6] KEXEC_SIG with appended signature
From
: Baoquan He <bhe@xxxxxxxxxx>
Re: [PATCH v4 00/14] x86: Trenchboot secure dynamic launch Linux kernel support
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
[PATCH] char: tpm: cr50: Set TPM_FIRMWARE_POWER_MANAGED based on device property
From
: Rob Barnes <robbarnes@xxxxxxxxxx>
Re: [PATCH 0/4] ima: support fs-verity signatures stored as
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v17 0/3] Add trusted_for(2) (was O_MAYEXEC)
From
: Florian Weimer <fweimer@xxxxxxxxxx>
Re: [RFC PATCH v7 11/16] ipe: add support for dm-verity as a trust provider
From
: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/4] ima: define a new signature type named IMA_VERITY_DIGSIG
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [RFC 15/20] capabilities: Introduce CAP_INTEGRITY_ADMIN
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [RFC 15/20] capabilities: Introduce CAP_INTEGRITY_ADMIN
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v8 09/17] KEYS: Rename get_builtin_and_secondary_restriction
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [RFC 15/20] capabilities: Introduce CAP_INTEGRITY_ADMIN
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[RFC 06/20] ima: Move policy related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[RFC 19/20] ima/userns: Define early teardown function for IMA namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[RFC 05/20] ima: Move IMA's keys queue related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[RFC 08/20] ima: Move measurement list related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[RFC 04/20] ima: Move delayed work queue and variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[RFC 15/20] capabilities: Introduce CAP_INTEGRITY_ADMIN
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[RFC 11/20] securityfs: Prefix global variables with securityfs_
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[RFC 03/20] ima: Namespace audit status flags
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[RFC 12/20] securityfs: Pass static variables as parameters from top level functions
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[RFC 18/20] userns: Introduce a refcount variable for calling early teardown function
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[RFC 16/20] ima: Use ns_capable() for namespace policy access
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[RFC 02/20] ima: Define ns_status for storing namespaced iint data
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[RFC 07/20] ima: Move ima_htable into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[RFC 13/20] securityfs: Build securityfs_ns for namespacing support
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[RFC 17/20] ima: Use integrity_admin_ns_capable() to check corresponding capability
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[RFC 09/20] ima: Only accept AUDIT rules for IMA non-init_ima_ns namespaces for now
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[RFC 10/20] ima: Implement hierarchical processing of file accesses
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[RFC 14/20] ima: Move some IMA policy and filesystem related variables into ima_namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[RFC 00/20] ima: Namespace IMA with audit support in IMA-ns
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[RFC 01/20] ima: Add IMA namespace support
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[RFC 20/20] ima: Setup securityfs_ns for IMA namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v2 0/6] KEXEC_SIG with appended signature
From
: Heiko Carstens <hca@xxxxxxxxxxxxx>
Re: [RFC 3/3] ima: make the integrity inode cache per namespace
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [RFC 3/3] ima: make the integrity inode cache per namespace
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH 4/4] ima: support fs-verity file digest based signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [RFC 3/3] ima: make the integrity inode cache per namespace
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH 3/4] ima: limit including fs-verity's file digest in measurement list
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [RFC 1/3] userns: add uuid field
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [RFC 3/3] ima: make the integrity inode cache per namespace
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 0/4] ima: support fs-verity signatures stored as
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [RFC 3/3] ima: make the integrity inode cache per namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v17 0/3] Add trusted_for(2) (was O_MAYEXEC)
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCH 1/4] fs-verity: define a function to return the integrity protected file digest
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH 4/4] ima: support fs-verity file digest based signatures
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 3/4] ima: limit including fs-verity's file digest in measurement list
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/4] fs-verity: define a function to return the integrity protected file digest
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [RFC 3/3] ima: make the integrity inode cache per namespace
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: [RFC 3/3] ima: make the integrity inode cache per namespace
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: [RFC 3/3] ima: make the integrity inode cache per namespace
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: [PATCH 0/4] ima: support fs-verity signatures stored as
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH 3/4] ima: limit including fs-verity's file digest in measurement list
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH 2/4] ima: define a new signature type named IMA_VERITY_DIGSIG
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH 1/4] fs-verity: define a function to return the integrity protected file digest
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v4 2/2] selftests: tpm2: Reset the dictionary attack lock
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v4 2/2] selftests: tpm2: Reset the dictionary attack lock
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v4 1/2] selftests: tpm2: Determine available PCR bank
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH 1/4] fs-verity: define a function to return the integrity protected file digest
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH v3 1/3] selftests: tpm2: Probe for available PCR bank
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH 1/4] fs-verity: define a function to return the integrity protected file digest
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH] tpm: make const pointer desc a static const array
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v8 03/17] integrity: Introduce a Linux keyring called machine
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [RFC 3/3] ima: make the integrity inode cache per namespace
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [RFC 3/3] ima: make the integrity inode cache per namespace
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [RFC 3/3] ima: make the integrity inode cache per namespace
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [RFC 3/3] ima: make the integrity inode cache per namespace
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [RFC 3/3] ima: make the integrity inode cache per namespace
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [RFC 3/3] ima: make the integrity inode cache per namespace
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [RFC 3/3] ima: make the integrity inode cache per namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH 1/4] fs-verity: define a function to return the integrity protected file digest
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH 2/4] ima: define a new signature type named IMA_VERITY_DIGSIG
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH 4/4] ima: support fs-verity file digest based signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH 3/4] ima: limit including fs-verity's file digest in measurement list
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH 0/4] ima: support fs-verity signatures stored as
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [RFC 3/3] ima: make the integrity inode cache per namespace
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [RFC 3/3] ima: make the integrity inode cache per namespace
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [RFC 3/3] ima: make the integrity inode cache per namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [RFC 3/3] ima: make the integrity inode cache per namespace
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [RFC 1/3] userns: add uuid field
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [RFC 3/3] ima: make the integrity inode cache per namespace
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: [RFC 3/3] ima: make the integrity inode cache per namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [RFC 1/3] userns: add uuid field
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [RFC 3/3] ima: make the integrity inode cache per namespace
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [RFC 3/3] ima: make the integrity inode cache per namespace
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [RFC 1/3] userns: add uuid field
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]