Linux Integrity
[Prev Page][Next Page]
- [PATCH v3 05/16] ima: Move IMA's keys queue related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 14/16] ima: Use mac_admin_ns_capable() to check corresponding capability
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 01/16] ima: Add IMA namespace support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 07/16] ima: Move ima_htable into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 12/16] securityfs: Extend securityfs with namespacing support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 09/16] ima: Only accept AUDIT rules for IMA non-init_ima_ns namespaces for now
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 11/16] securityfs: Move vfsmount into user_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 02/16] ima: Define ns_status for storing namespaced iint data
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 15/16] ima: Move dentries into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 08/16] ima: Move measurement list related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 10/16] ima: Implement hierarchical processing of file accesses
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3] char: tpm: cr50: Set TPM_FIRMWARE_POWER_MANAGED based on device property
- From: Rob Barnes <robbarnes@xxxxxxxxxx>
- Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- RE: [RFC][PATCH] device mapper: Add builtin function dm_get_status()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/2] integrity: support including firmware ".platform" keys at build time
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 1/2] certs: export load_certificate_list() to be used outside certs/
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 4/5] crypto: caam - add in-kernel interface for blob generator
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 2/5] KEYS: trusted: allow users to use kernel RNG for key material
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 1/5] KEYS: trusted: allow use of TEE as backend without TCG_TPM support
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] char: tpm: cr50: Set TPM_FIRMWARE_POWER_MANAGED based on device property
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 09/17] KEYS: Rename get_builtin_and_secondary_restriction
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v4 04/14] Documentation/x86: Secure Launch kernel documentation
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [RFC v2 15/19] capabilities: Introduce CAP_INTEGRITY_ADMIN
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [RFC v2 15/19] capabilities: Introduce CAP_INTEGRITY_ADMIN
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 04/14] Documentation/x86: Secure Launch kernel documentation
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCH v4 04/14] Documentation/x86: Secure Launch kernel documentation
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [RFC v2 19/19] ima: Setup securityfs for IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- RE: [RFC][PATCH] device mapper: Add builtin function dm_get_status()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [RFC][PATCH] device mapper: Add builtin function dm_get_status()
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- [RFC v2 18/19] ima/userns: Define early teardown function for IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC v2 05/19] ima: Move IMA's keys queue related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC v2 19/19] ima: Setup securityfs for IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC v2 17/19] userns: Introduce a refcount variable for calling early teardown function
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC v2 15/19] capabilities: Introduce CAP_INTEGRITY_ADMIN
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC v2 09/19] ima: Only accept AUDIT rules for IMA non-init_ima_ns namespaces for now
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC v2 13/19] securityfs: Extend securityfs with namespacing support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC v2 16/19] ima: Use integrity_admin_ns_capable() to check corresponding capability
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC v2 11/19] securityfs: Prefix global variables with securityfs_
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC v2 08/19] ima: Move measurement list related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC v2 14/19] ima: Move some IMA policy and filesystem related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC v2 10/19] ima: Implement hierarchical processing of file accesses
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC v2 12/19] securityfs: Pass static variables as parameters from top level functions
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC v2 03/19] ima: Namespace audit status flags
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC v2 04/19] ima: Move delayed work queue and variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC v2 07/19] ima: Move ima_htable into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC v2 06/19] ima: Move policy related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC v2 02/19] ima: Define ns_status for storing namespaced iint data
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC v2 00/19] ima: Namespace IMA with audit support in IMA-ns
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC v2 01/19] ima: Add IMA namespace support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v1 3/5] ima: limit including fs-verity's file digest in measurement list
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v1 3/5] ima: limit including fs-verity's file digest in measurement list
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v1 1/5] fs-verity: define a function to return the integrity protected file digest
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v1 5/5] fsverity: update the documentation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v1 4/5] ima: support fs-verity file digest based signatures
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v1 0/5] ima: support fs-verity signatures stored as
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/4] ima: define a new signature type named IMA_VERITY_DIGSIG
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v1 5/5] fsverity: update the documentation
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v1 4/5] ima: support fs-verity file digest based signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v1 3/5] ima: limit including fs-verity's file digest in measurement list
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v1 2/5] ima: define a new signature type named IMA_VERITY_DIGSIG
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v1 1/5] fs-verity: define a function to return the integrity protected file digest
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/4] ima: define a new signature type named IMA_VERITY_DIGSIG
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v2] char: tpm: cr50: Set TPM_FIRMWARE_POWER_MANAGED based on device property
- From: Rob Barnes <robbarnes@xxxxxxxxxx>
- Re: [RFC 08/20] ima: Move measurement list related variables into ima_namespace
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [RFC 08/20] ima: Move measurement list related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC 17/20] ima: Use integrity_admin_ns_capable() to check corresponding capability
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC 08/20] ima: Move measurement list related variables into ima_namespace
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH v4 04/14] Documentation/x86: Secure Launch kernel documentation
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [RFC 08/20] ima: Move measurement list related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC 08/20] ima: Move measurement list related variables into ima_namespace
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH v4 00/14] x86: Trenchboot secure dynamic launch Linux kernel support
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/4] ima: define a new signature type named IMA_VERITY_DIGSIG
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC 17/20] ima: Use integrity_admin_ns_capable() to check corresponding capability
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC 20/20] ima: Setup securityfs_ns for IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC 13/20] securityfs: Build securityfs_ns for namespacing support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC 08/20] ima: Move measurement list related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC 13/20] securityfs: Build securityfs_ns for namespacing support
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC 20/20] ima: Setup securityfs_ns for IMA namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC 17/20] ima: Use integrity_admin_ns_capable() to check corresponding capability
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC 17/20] ima: Use integrity_admin_ns_capable() to check corresponding capability
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC 08/20] ima: Move measurement list related variables into ima_namespace
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [RFC 17/20] ima: Use integrity_admin_ns_capable() to check corresponding capability
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- RE: [RFC][PATCH] device mapper: Add builtin function dm_get_status()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [RFC][PATCH] device mapper: Add builtin function dm_get_status()
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- RE: [RFC][PATCH] device mapper: Add builtin function dm_get_status()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [RFC][PATCH] device mapper: Add builtin function dm_get_status()
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- RE: [RFC 17/20] ima: Use integrity_admin_ns_capable() to check corresponding capability
- From: Denis Semakin <denis.semakin@xxxxxxxxxx>
- Re: [RFC 20/20] ima: Setup securityfs_ns for IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC 20/20] ima: Setup securityfs_ns for IMA namespace
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [RFC 20/20] ima: Setup securityfs_ns for IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC 20/20] ima: Setup securityfs_ns for IMA namespace
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [RFC 20/20] ima: Setup securityfs_ns for IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC 20/20] ima: Setup securityfs_ns for IMA namespace
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [RFC 20/20] ima: Setup securityfs_ns for IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC 17/20] ima: Use integrity_admin_ns_capable() to check corresponding capability
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [RFC 20/20] ima: Setup securityfs_ns for IMA namespace
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [RFC 20/20] ima: Setup securityfs_ns for IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC 20/20] ima: Setup securityfs_ns for IMA namespace
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [RFC 17/20] ima: Use integrity_admin_ns_capable() to check corresponding capability
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC 17/20] ima: Use integrity_admin_ns_capable() to check corresponding capability
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- RE: [RFC][PATCH] device mapper: Add builtin function dm_get_status()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v17 0/3] Add trusted_for(2) (was O_MAYEXEC)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [RFC][PATCH] device mapper: Add builtin function dm_get_status()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v4 2/2] selftests: tpm2: Reset the dictionary attack lock
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v8 09/17] KEYS: Rename get_builtin_and_secondary_restriction
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC v2 3/3] ima: make the integrity inode cache per namespace
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [RFC v2 2/3] ima: show the namespace label in the ima-ns template
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [RFC v2 1/3] userns: add ima_ns_info field containing a settable namespace label
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [RFC v2 0/3] Namespace IMA log entries
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v17 0/3] Add trusted_for(2) (was O_MAYEXEC)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/6] KEXEC_SIG with appended signature
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: [PATCH v4] KEYS: trusted: Fix trusted key backends when building as module
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v4] KEYS: trusted: Fix trusted key backends when building as module
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 09/17] KEYS: Rename get_builtin_and_secondary_restriction
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 2/2] selftests: tpm2: Reset the dictionary attack lock
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 2/2] selftests: tpm2: Reset the dictionary attack lock
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v4] KEYS: trusted: Fix trusted key backends when building as module
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v17 0/3] Add trusted_for(2) (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH] char: tpm: cr50: Set TPM_FIRMWARE_POWER_MANAGED based on device property
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 0/6] KEXEC_SIG with appended signature
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v4 00/14] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] char: tpm: cr50: Set TPM_FIRMWARE_POWER_MANAGED based on device property
- From: Rob Barnes <robbarnes@xxxxxxxxxx>
- Re: [PATCH 0/4] ima: support fs-verity signatures stored as
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v17 0/3] Add trusted_for(2) (was O_MAYEXEC)
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [RFC PATCH v7 11/16] ipe: add support for dm-verity as a trust provider
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/4] ima: define a new signature type named IMA_VERITY_DIGSIG
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC 15/20] capabilities: Introduce CAP_INTEGRITY_ADMIN
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC 15/20] capabilities: Introduce CAP_INTEGRITY_ADMIN
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v8 09/17] KEYS: Rename get_builtin_and_secondary_restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC 15/20] capabilities: Introduce CAP_INTEGRITY_ADMIN
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [RFC 06/20] ima: Move policy related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC 19/20] ima/userns: Define early teardown function for IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC 05/20] ima: Move IMA's keys queue related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC 08/20] ima: Move measurement list related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC 04/20] ima: Move delayed work queue and variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC 15/20] capabilities: Introduce CAP_INTEGRITY_ADMIN
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC 11/20] securityfs: Prefix global variables with securityfs_
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC 03/20] ima: Namespace audit status flags
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC 12/20] securityfs: Pass static variables as parameters from top level functions
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC 18/20] userns: Introduce a refcount variable for calling early teardown function
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC 16/20] ima: Use ns_capable() for namespace policy access
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC 02/20] ima: Define ns_status for storing namespaced iint data
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC 07/20] ima: Move ima_htable into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC 13/20] securityfs: Build securityfs_ns for namespacing support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC 17/20] ima: Use integrity_admin_ns_capable() to check corresponding capability
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC 09/20] ima: Only accept AUDIT rules for IMA non-init_ima_ns namespaces for now
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC 10/20] ima: Implement hierarchical processing of file accesses
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC 14/20] ima: Move some IMA policy and filesystem related variables into ima_namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC 00/20] ima: Namespace IMA with audit support in IMA-ns
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC 01/20] ima: Add IMA namespace support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC 20/20] ima: Setup securityfs_ns for IMA namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/6] KEXEC_SIG with appended signature
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 4/4] ima: support fs-verity file digest based signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 3/4] ima: limit including fs-verity's file digest in measurement list
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC 1/3] userns: add uuid field
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] ima: support fs-verity signatures stored as
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v17 0/3] Add trusted_for(2) (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH 1/4] fs-verity: define a function to return the integrity protected file digest
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 4/4] ima: support fs-verity file digest based signatures
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] ima: limit including fs-verity's file digest in measurement list
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] fs-verity: define a function to return the integrity protected file digest
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 0/4] ima: support fs-verity signatures stored as
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 3/4] ima: limit including fs-verity's file digest in measurement list
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 2/4] ima: define a new signature type named IMA_VERITY_DIGSIG
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 1/4] fs-verity: define a function to return the integrity protected file digest
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v4 2/2] selftests: tpm2: Reset the dictionary attack lock
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] selftests: tpm2: Reset the dictionary attack lock
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 1/2] selftests: tpm2: Determine available PCR bank
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/4] fs-verity: define a function to return the integrity protected file digest
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v3 1/3] selftests: tpm2: Probe for available PCR bank
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/4] fs-verity: define a function to return the integrity protected file digest
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] tpm: make const pointer desc a static const array
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 03/17] integrity: Introduce a Linux keyring called machine
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 1/4] fs-verity: define a function to return the integrity protected file digest
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 2/4] ima: define a new signature type named IMA_VERITY_DIGSIG
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 4/4] ima: support fs-verity file digest based signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 3/4] ima: limit including fs-verity's file digest in measurement list
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 0/4] ima: support fs-verity signatures stored as
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC 1/3] userns: add uuid field
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC 1/3] userns: add uuid field
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC 1/3] userns: add uuid field
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC 1/3] userns: add uuid field
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC 1/3] userns: add uuid field
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH] fix iint inode add race resulting in duplication of iint entries
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] use SM3 instead of SM3_256
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: ima-evm-utils: version 1.4 released
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [RFC 3/3] ima: make the integrity inode cache per namespace
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RFC 2/3] ima: Namespace IMA
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RFC 1/3] userns: add uuid field
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RFC 1/3] userns: add uuid field
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC 1/3] userns: add uuid field
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RFC 1/3] userns: add uuid field
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC 1/3] userns: add uuid field
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RFC 1/3] userns: add uuid field
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC 1/3] userns: add uuid field
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RFC 1/3] userns: add uuid field
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC 1/3] userns: add uuid field
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [PATCH v4 2/2] selftests: tpm2: Reset the dictionary attack lock
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 1/2] selftests: tpm2: Determine available PCR bank
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 0/2] selftests: tpm2: Determine available PCR bank
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH] tpm: make const pointer desc a static const array
- From: Colin Ian King <colin.i.king@xxxxxxxxxxxxxx>
- [RFC 3/3] ima: make the integrity inode cache per namespace
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [RFC 2/3] ima: Namespace IMA
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [RFC 1/3] userns: add uuid field
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [RFC 0/3] Namespace IMA
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/3] selftests: tpm2: Probe for available PCR bank
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v8 09/17] KEYS: Rename get_builtin_and_secondary_restriction
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 08/17] integrity: add new keyring handler for mok keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 06/17] KEYS: CA link restriction
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 05/17] X.509: Parse Basic Constraints for CA
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 04/17] integrity: Do not allow machine keyring updates following init
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 03/17] integrity: Introduce a Linux keyring called machine
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 1/3] selftests: tpm2: Probe for available PCR bank
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/3] selftests: tpm2: Probe for available PCR bank
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2 3/6] kexec_file: Don't opencode appended signature verification.
- From: Michal Suchanek <msuchanek@xxxxxxx>
- [PATCH v2 4/6] module: strip the signature marker in the verification function.
- From: Michal Suchanek <msuchanek@xxxxxxx>
- [PATCH v2 5/6] module: Use key_being_used_for for log messages in verify_appended_signature
- From: Michal Suchanek <msuchanek@xxxxxxx>
- [PATCH v2 6/6] module: Move duplicate mod_check_sig users code to mod_parse_sig
- From: Michal Suchanek <msuchanek@xxxxxxx>
- [PATCH v2 2/6] powerpc/kexec_file: Add KEXEC_SIG support.
- From: Michal Suchanek <msuchanek@xxxxxxx>
- [PATCH v2 1/6] s390/kexec_file: Don't opencode appended signature check.
- From: Michal Suchanek <msuchanek@xxxxxxx>
- [PATCH v2 0/6] KEXEC_SIG with appended signature
- From: Michal Suchanek <msuchanek@xxxxxxx>
- RE: [RFC PATCH v7 11/16] ipe: add support for dm-verity as a trust provider
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v8 03/17] integrity: Introduce a Linux keyring called machine
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 3/3] selftests: tpm2: Add support for SHA-384 and SHA-512
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 2/3] selftests: tpm2: Reset the dictionary attack lock
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 0/3] selftests: tpm2: Probe for available PCR bank
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 1/3] selftests: tpm2: Probe for available PCR bank
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] selftests: tpm2: Probe for available PCR bank
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] selftests: tpm2: Probe for available PCR bank
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] ima: Fix trivial typos in the comments
- From: Austin Kim <austindh.kim@xxxxxxxxx>
- [PATCH v5 2/2] integrity: support including firmware ".platform" keys at build time
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v5 1/2] certs: export load_certificate_list() to be used outside certs/
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v5 0/2] integrity: support including firmware ".platform" keys at build time
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: ima-evm-utils: version 1.4 released
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] security:trusted_tpm2: Fix memory leak in tpm2_key_encode()
- From: Jianglei Nie <niejianglei2021@xxxxxxx>
- [PATCH v2 1/3] selftests: tpm2: Probe for available PCR bank
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 3/3] selftests: tpm2: Add support for SHA-384 and SHA-512
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 2/3] selftests: tpm2: Reset the dictionary attack lock
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 0/3] selftests: tpm2: Probe for available PCR bank
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v4 5/5] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v4 4/5] crypto: caam - add in-kernel interface for blob generator
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] selftests: tpm: Probe for available PCR bank
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 3/3] Add tests to verify kexec of blacklist and non blacklist kernel
- From: Nageswara R Sastry <rnsastry@xxxxxxxxxxxxx>
- [PATCH 2/3] selftests/kexec: Enable secureboot tests for PowerPC
- From: Nageswara R Sastry <rnsastry@xxxxxxxxxxxxx>
- [PATCH 1/3] selftest/kexec: fix "ignored null byte in input" warning
- From: Nageswara R Sastry <rnsastry@xxxxxxxxxxxxx>
- [PATCH v8 01/17] KEYS: Create static version of public_key_verify_signature
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v8 08/17] integrity: add new keyring handler for mok keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v8 16/17] integrity: Trust MOK keys if MokListTrustedRT found
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v8 15/17] efi/mokvar: move up init order
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v8 11/17] KEYS: Introduce link restriction for machine keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v8 09/17] KEYS: Rename get_builtin_and_secondary_restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v8 17/17] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v8 02/17] integrity: Fix warning about missing prototypes
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v8 14/17] KEYS: link machine trusted keys to secondary_trusted_keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v8 10/17] KEYS: add a reference to machine keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v8 12/17] KEYS: integrity: change link restriction to trust the machine keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v8 13/17] integrity: store reference to machine keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v8 03/17] integrity: Introduce a Linux keyring called machine
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v8 06/17] KEYS: CA link restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v8 05/17] X.509: Parse Basic Constraints for CA
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v8 07/17] integrity: restrict INTEGRITY_KEYRING_MACHINE to restrict_link_by_ca
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v8 04/17] integrity: Do not allow machine keyring updates following init
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v8 00/17] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v30 15/28] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v30 13/28] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v30 12/28] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v30 11/28] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] selftests: tpm2: Reset the dictionary attack lock
- From: Marc-André Lureau <marcandre.lureau@xxxxxxxxxx>
- Re: [PATCH 1/2] selftests: tpm: Probe for available PCR bank
- From: Marc-André Lureau <marcandre.lureau@xxxxxxxxxx>
- Re: [PATCH v7 06/17] integrity: restrict INTEGRITY_KEYRING_MACHINE to restrict_link_by_ca
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH 2/2] selftests: tpm2: Reset the dictionary attack lock
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 1/2] selftests: tpm: Probe for available PCR bank
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 0/2] selftests: tpm2: Probe for available PCR bank
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] integrity: support including firmware ".platform" keys at build time
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 11/17] KEYS: Introduce link restriction for machine keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v7 12/17] KEYS: integrity: change link restriction to trust the machine keyring
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 11/17] KEYS: Introduce link restriction for machine keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 09/17] KEYS: Rename get_builtin_and_secondary_restriction
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 08/17] integrity: add new keyring handler for mok keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 04/17] X.509: Parse Basic Constraints for CA
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v7 04/17] X.509: Parse Basic Constraints for CA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 13/17] KEYS: link secondary_trusted_keys to machine trusted keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v7 13/17] KEYS: link secondary_trusted_keys to machine trusted keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 00/17] Enroll kernel keys thru MOK
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 00/17] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v7 00/17] Enroll kernel keys thru MOK
- From: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>
- Re: [PATCH v7 07/17] integrity: Fix warning about missing prototypes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 03/17] KEYS: Create static version of public_key_verify_signature
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 03/17] KEYS: Create static version of public_key_verify_signature
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 02/17] integrity: Do not allow machine keyring updates following init
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 01/17] integrity: Introduce a Linux keyring called machine
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v19 4/5] tpm: tpm_tis: Add tpm_tis_i2c driver
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v19 3/5] tpm: tpm_tis: Verify TPM_STS register is valid after locality request
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v19 3/5] tpm: tpm_tis: Verify TPM_STS register is valid after locality request
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v19 2/5] tpm: tpm_tis: Rewrite "tpm_tis_req_canceled()"
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 00/17] Enroll kernel keys thru MOK
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 00/17] Enroll kernel keys thru MOK
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] char: tpm: cr50_i2c: Drop if with an always false condition
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH v7 00/17] Enroll kernel keys thru MOK
- From: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>
- Re: [PATCH v7 00/17] Enroll kernel keys thru MOK
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 00/17] Enroll kernel keys thru MOK
- From: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>
- Re: [PATCH v7 00/17] Enroll kernel keys thru MOK
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] char: tpm: cr50_i2c: Drop if with an always false condition
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- RE: [RFC][PATCH 5/5] shmem: Add fsverity support
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: ima-evm-utils: version 1.4 released
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [RFC][PATCH 5/5] shmem: Add fsverity support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v17 1/3] fs: Add trusted_for(2) syscall implementation and related sysctl
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v7 03/17] KEYS: Create static version of public_key_verify_signature
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v7 08/17] integrity: add new keyring handler for mok keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v7 09/17] KEYS: Rename get_builtin_and_secondary_restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v7 17/17] integrity: Only use machine keyring when uefi_check_trust_mok_keys is true
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v7 11/17] KEYS: Introduce link restriction for machine keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v7 10/17] KEYS: add a reference to machine keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v7 16/17] integrity: Trust MOK keys if MokListTrustedRT found
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v7 14/17] integrity: store reference to machine keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v7 15/17] efi/mokvar: move up init order
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v7 13/17] KEYS: link secondary_trusted_keys to machine trusted keys
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v7 07/17] integrity: Fix warning about missing prototypes
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v7 00/17] Enroll kernel keys thru MOK
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v7 02/17] integrity: Do not allow machine keyring updates following init
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v7 06/17] integrity: restrict INTEGRITY_KEYRING_MACHINE to restrict_link_by_ca
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v7 01/17] integrity: Introduce a Linux keyring called machine
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v7 04/17] X.509: Parse Basic Constraints for CA
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v7 12/17] KEYS: integrity: change link restriction to trust the machine keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v7 05/17] KEYS: CA link restriction
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v17 2/3] arch: Wire up trusted_for(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v17 3/3] selftest/interpreter: Add tests for trusted_for(2) policies
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v17 0/3] Add trusted_for(2) (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- RE: [RFC][PATCH 2/5] fsverity: Revalidate built-in signatures at file open
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- RE: [RFC][PATCH 5/5] shmem: Add fsverity support
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- RE: [RFC][PATCH 4/5] shmem: Avoid segfault in shmem_read_mapping_page_gfp()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v16 1/3] fs: Add trusted_for(2) syscall implementation and related sysctl
- From: "Alejandro Colomar (man-pages)" <alx.manpages@xxxxxxxxx>
- Re: [PATCH v16 1/3] fs: Add trusted_for(2) syscall implementation and related sysctl
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH v16 1/3] fs: Add trusted_for(2) syscall implementation and related sysctl
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH] char: tpm: cr50_i2c: Drop if with an always false condition
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH v16 1/3] fs: Add trusted_for(2) syscall implementation and related sysctl
- From: "Alejandro Colomar (man-pages)" <alx.manpages@xxxxxxxxx>
- Re: [PATCH v16 1/3] fs: Add trusted_for(2) syscall implementation and related sysctl
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH] char: tpm: cr50_i2c: Drop if with an always false condition
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] char: tpm: cr50_i2c: Drop if with an always false condition
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH v16 1/3] fs: Add trusted_for(2) syscall implementation and related sysctl
- From: "Alejandro Colomar (man-pages)" <alx.manpages@xxxxxxxxx>
- Re: [RFC][PATCH 2/5] fsverity: Revalidate built-in signatures at file open
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC][PATCH 5/5] shmem: Add fsverity support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC][PATCH 4/5] shmem: Avoid segfault in shmem_read_mapping_page_gfp()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2] tpm: ibmvtpm: Make use of dma_alloc_noncoherent()
- From: kernel test robot <lkp@xxxxxxxxx>
- RE: [RFC][PATCH 4/5] shmem: Avoid segfault in shmem_read_mapping_page_gfp()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [RFC][PATCH 4/5] shmem: Avoid segfault in shmem_read_mapping_page_gfp()
- From: Ajay Garg <ajaygargnsit@xxxxxxxxx>
- [RFC][PATCH 5/5] shmem: Add fsverity support
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 4/5] shmem: Avoid segfault in shmem_read_mapping_page_gfp()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 3/5] fsverity: Do initialization earlier
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 2/5] fsverity: Revalidate built-in signatures at file open
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 1/5] fsverity: Introduce fsverity_get_file_digest()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 0/5] shmem/fsverity: Prepare for mandatory integrity enforcement
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [fs] a0918006f9: netperf.Throughput_tps -11.6% regression
- From: Yin Fengwei <fengwei.yin@xxxxxxxxx>
- Re: [fs] a0918006f9: netperf.Throughput_tps -11.6% regression
- From: Yin Fengwei <fengwei.yin@xxxxxxxxx>
- [PATCH v4 2/2] integrity: support including firmware ".platform" keys at build time
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v4 1/2] certs: export load_certificate_list() to be used outside certs/
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v4 0/2] integrity: support including firmware ".platform" keys at build time
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [PATCH v3] integrity: support including firmware ".platform" keys at build time
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v16 3/3] selftest/interpreter: Add tests for trusted_for(2) policies
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v16 2/3] arch: Wire up trusted_for(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v16 1/3] fs: Add trusted_for(2) syscall implementation and related sysctl
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v16 0/3] Add trusted_for(2) (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH] ima: differentiate overlay, pivot_root, and other pathnames
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [fs] a0918006f9: netperf.Throughput_tps -11.6% regression
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [fs] a0918006f9: netperf.Throughput_tps -11.6% regression
- From: Yin Fengwei <fengwei.yin@xxxxxxxxx>
- Re: [fs] a0918006f9: netperf.Throughput_tps -11.6% regression
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: ima-evm-utils: version 1.4 released
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: ima-evm-utils: version 1.4 released
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: ima-evm-utils: version 1.4 released
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: ima-evm-utils: version 1.4 released
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: ima-evm-utils: version 1.4 released
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- [RFC PATCH] ima: differentiate overlay, pivot_root, and other pathnames
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: ima-evm-utils: version 1.4 released
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH] tpm_tis: Fix an error handling path in 'tpm_tis_core_init()'
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] tpm_tis: Fix an error handling path in 'tpm_tis_core_init()'
- From: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
- Re: ima-evm-utils: version 1.4 released
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: ima-evm-utils: version 1.4 released
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] integrity: support including firmware ".platform" keys at build time
- From: Dimitri John Ledkov <dimitri.ledkov@xxxxxxxxxxxxx>
- [PATCH 1/2] module: Use key_being_used_for for log messages in verify_appended_signature
- From: Michal Suchanek <msuchanek@xxxxxxx>
- [PATCH 2/2] module: Move duplicate mod_check_sig users code to mod_parse_sig
- From: Michal Suchanek <msuchanek@xxxxxxx>
- [PATCH 0/2] Additional appended signature cleanup
- From: Michal Suchanek <msuchanek@xxxxxxx>
- Re: ima-evm-utils: version 1.4 released
- From: Petr Vorel <pvorel@xxxxxxx>
- ima-evm-utils: version 1.4 released
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH RFC] integrity: disassociate ima_filter_rule from security_audit_rule
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH RFC] integrity: disassociate ima_filter_rule from security_audit_rule
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Disassociating ima_filter_rule* from security_audit_rule*
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Disassociating ima_filter_rule* from security_audit_rule*
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v7 12/16] fsverity|security: add security hooks to fsverity digest and signature
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v7 14/16] scripts: add boot policy generation program
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v7 04/16] ipe: add userspace interface
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [PATCH v19 1/5] tpm_tis: Fix expected bit handling
- From: amirmizi6@xxxxxxxxx
- [PATCH v19 4/5] tpm: tpm_tis: Add tpm_tis_i2c driver
- From: amirmizi6@xxxxxxxxx
- [PATCH v19 3/5] tpm: tpm_tis: Verify TPM_STS register is valid after locality request
- From: amirmizi6@xxxxxxxxx
- [PATCH v19 5/5] tpm: Add YAML schema for TPM TIS I2C options
- From: amirmizi6@xxxxxxxxx
- [PATCH v19 0/5] Add tpm i2c ptp driver
- From: amirmizi6@xxxxxxxxx
- [PATCH v19 2/5] tpm: tpm_tis: Rewrite "tpm_tis_req_canceled()"
- From: amirmizi6@xxxxxxxxx
- RE: [RFC PATCH v7 14/16] scripts: add boot policy generation program
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- RE: [RFC PATCH v7 14/16] scripts: add boot policy generation program
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils] travis: use alt:sisyphus from docker.io
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- RE: [RFC PATCH v7 12/16] fsverity|security: add security hooks to fsverity digest and signature
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- RE: [RFC PATCH v7 04/16] ipe: add userspace interface
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils] travis: use alt:sisyphus from docker.io
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] travis: use alt:sisyphus from docker.io
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] travis: use alt:sisyphus from docker.io
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH ima-evm-utils] travis: use alt:sisyphus from docker.io
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v18 5/6] tpm: tpm_tis: Add tpm_tis_i2c driver
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v18 4/6] tpm: tpm_tis: Verify TPM_STS register is valid after locality request
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v18 3/6] tpm: Handle an exception for TPM Firmware Update mode.
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v18 1/6] tpm_tis: Fix expected bit handling and send all bytes in one shot without last byte in exception
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] integrity subsystem updates for v5.16
- From: pr-tracker-bot@xxxxxxxxxx
- [PATCH v18 6/6] tpm: Add YAML schema for TPM TIS I2C options
- From: amirmizi6@xxxxxxxxx
- [PATCH v18 1/6] tpm_tis: Fix expected bit handling and send all bytes in one shot without last byte in exception
- From: amirmizi6@xxxxxxxxx
- [PATCH v18 0/6] Add tpm i2c ptp driver
- From: amirmizi6@xxxxxxxxx
- [PATCH v18 5/6] tpm: tpm_tis: Add tpm_tis_i2c driver
- From: amirmizi6@xxxxxxxxx
- [PATCH v18 2/6] tpm: tpm_tis: Rewrite "tpm_tis_req_canceled()"
- From: amirmizi6@xxxxxxxxx
- [PATCH v18 3/6] tpm: Handle an exception for TPM Firmware Update mode.
- From: amirmizi6@xxxxxxxxx
- [PATCH v18 4/6] tpm: tpm_tis: Verify TPM_STS register is valid after locality request
- From: amirmizi6@xxxxxxxxx
- [GIT PULL] integrity subsystem updates for v5.16
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH RESEND] KEYS: trusted: Fix trusted key backends when building as module
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH RESEND] KEYS: trusted: Fix trusted key backends when building as module
- From: andreas@xxxxxxxxxxx
- Re: [PATCH ima-evm-utils 1/2] switch to using crun for podman
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [GIT PULL] TPM DEVICE DRIVER changes for v5.16
- From: pr-tracker-bot@xxxxxxxxxx
- Re: IMA testsuite?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 4/5] crypto: caam - add in-kernel interface for blob generator
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils 2/2] upgrade to glibc-2.34 uses clone3 causing CI to fail
- From: "Dmitry V. Levin" <ldv@xxxxxxxxxxxx>
- Re: [PATCH v2] tpm: tpm_tis_spi_cr50: Add default RNG quality
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm: tpm_tis_spi_cr50: Add default RNG quality
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- IMA testsuite?
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2] tpm: tpm_tis_spi_cr50: Add default RNG quality
- From: AngeloGioacchino Del Regno <angelogioacchino.delregno@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: tpm_tis_spi_cr50: Add default RNG quality
- From: AngeloGioacchino Del Regno <angelogioacchino.delregno@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: tpm_tis_spi_cr50: Add default RNG quality
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] evm: mark evm_fixmode as __ro_after_init
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v7 00/16] Integrity Policy Enforcement (IPE)
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] use SM3 instead of SM3_256
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] tpm: use SM3 instead of SM3_256
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- [PATCH] evm: mark evm_fixmode as __ro_after_init
- From: Austin Kim <austindh.kim@xxxxxxxxx>
- RE: [PATCH v3 00/13] integrity: Introduce DIGLIM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH] tpm: tpm_tis_spi_cr50: Add default RNG quality
- From: AngeloGioacchino Del Regno <angelogioacchino.delregno@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: tpm_tis_spi_cr50: Add default RNG quality
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 1/2] crypto: use SM3 instead of SM3_256
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] ima/evm: mark evm_fixmode as __ro_after_init
- From: Austin Kim <austindh.kim@xxxxxxxxx>
- Re: [PATCH] ima/evm: mark evm_fixmode as __ro_after_init
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RESEND PATCH] tpm: tpm_tis_spi_cr50: Add default RNG quality
- From: AngeloGioacchino Del Regno <angelogioacchino.delregno@xxxxxxxxxxxxx>
- [PATCH] tpm: tpm_tis_spi_cr50: Add default RNG quality
- From: AngeloGioacchino Del Regno <angelogioacchino.delregno@xxxxxxxxxxxxx>
- RE: [RFC PATCH v7 12/16] fsverity|security: add security hooks to fsverity digest and signature
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- RE: [RFC PATCH v7 00/16] Integrity Policy Enforcement (IPE)
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH] ima/evm: mark evm_fixmode as __ro_after_init
- From: Austin Kim <austindh.kim@xxxxxxxxx>
- Re: [PATCH ima-evm-utils 2/2] upgrade to glibc-2.34 uses clone3 causing CI to fail
- From: Petr Vorel <petr.vorel@xxxxxxxxx>
- Re: [RFC PATCH v7 12/16] fsverity|security: add security hooks to fsverity digest and signature
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v7 00/16] Integrity Policy Enforcement (IPE)
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] use SM3 instead of SM3_256
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils 2/2] upgrade to glibc-2.34 uses clone3 causing CI to fail
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils 1/2] switch to using crun for podman
- From: Petr Vorel <petr.vorel@xxxxxxxxx>
- [PATCH v3 2/2] tpm: use SM3 instead of SM3_256
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v3 0/2] use SM3 instead of SM3_256
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v3 1/2] crypto: use SM3 instead of SM3_256
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH ima-evm-utils 2/2] upgrade to glibc-2.34 uses clone3 causing CI to fail
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils 1/2] switch to using crun for podman
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm/st33zp24: drop unneeded over-commenting
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/1] tpm: add request_locality before write TPM_INT_ENABLE
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [GIT PULL] TPM DEVICE DRIVER changes for v5.16
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxx>
- Re: [PATCH v17 4/6] tpm: tpm_tis: Verify TPM_STS register is valid after locality request
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v17 2/6] tpm: tpm_tis: Rewrite "tpm_tis_req_canceled()"
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v17 1/6] tpm_tis: Fix expected bit handling and send all bytes in one shot without last byte in exception
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- RE: [RFC PATCH v7 00/16] Integrity Policy Enforcement (IPE)
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v2 1/2] crypto: use SM3 instead of SM3_256
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v17 5/6] tpm: tpm_tis: Add tpm_tis_i2c driver
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH v17 4/6] tpm: tpm_tis: Verify TPM_STS register is valid after locality request
- From: amirmizi6@xxxxxxxxx
- [PATCH v17 2/6] tpm: tpm_tis: Rewrite "tpm_tis_req_canceled()"
- From: amirmizi6@xxxxxxxxx
- [PATCH v17 1/6] tpm_tis: Fix expected bit handling and send all bytes in one shot without last byte in exception
- From: amirmizi6@xxxxxxxxx
- [PATCH v17 5/6] tpm: tpm_tis: Add tpm_tis_i2c driver
- From: amirmizi6@xxxxxxxxx
- [PATCH v17 6/6] tpm: Add YAML schema for TPM TIS I2C options
- From: amirmizi6@xxxxxxxxx
- [PATCH v17 0/6] Add tpm i2c ptp driver
- From: amirmizi6@xxxxxxxxx
- [PATCH v17 3/6] tpm: Handle an exception for TPM Firmware Update mode.
- From: amirmizi6@xxxxxxxxx
- Re: [PATCH v2 1/2] crypto: use SM3 instead of SM3_256
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v16 2/6] tpm: tpm_tis: Rewrite "tpm_tis_req_canceled()"
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v16 1/6] tpm_tis: Fix expected bit handling and send all bytes in one shot without last byte in exception
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] integrity: support including firmware ".platform" keys at build time
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: [RFC PATCH v7 12/16] fsverity|security: add security hooks to fsverity digest and signature
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v16 6/6] tpm: Add YAML schema for TPM TIS I2C options
- From: amirmizi6@xxxxxxxxx
- [PATCH v16 0/6] Add tpm i2c ptp driver
- From: amirmizi6@xxxxxxxxx
- [PATCH v16 5/6] tpm: tpm_tis: add tpm_tis_i2c driver
- From: amirmizi6@xxxxxxxxx
- [PATCH v16 1/6] tpm_tis: Fix expected bit handling and send all bytes in one shot without last byte in exception
- From: amirmizi6@xxxxxxxxx
- [PATCH v16 4/6] tpm: tpm_tis: verify TPM_STS register is valid after locality request
- From: amirmizi6@xxxxxxxxx
- [PATCH v16 2/6] tpm: tpm_tis: Rewrite "tpm_tis_req_canceled()"
- From: amirmizi6@xxxxxxxxx
- [PATCH v16 3/6] tpm: Handle an exception for TPM Firmware Update mode.
- From: amirmizi6@xxxxxxxxx
- Re: [PATCH 0/2] tpm: use SM3 instead of SM3_256
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] tpm: use SM3 instead of SM3_256
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH v3] integrity: support including firmware ".platform" keys at build time
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/2] tpm: use SM3 instead of SM3_256
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v2 0/2] use SM3 instead of SM3_256
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v2 1/2] crypto: use SM3 instead of SM3_256
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: use SM3 instead of SM3_256
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: use SM3 instead of SM3_256
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: use SM3 instead of SM3_256
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: use SM3 instead of SM3_256
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] crypto: use SM3 instead of SM3_256
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/2] crypto: use SM3 instead of SM3_256
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] tpm: use SM3 instead of SM3_256
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/2] tpm: use SM3 instead of SM3_256
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] tpm: use SM3 instead of SM3_256
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v1 2/3] fs: extend the trusted_for syscall to call IMA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v1 3/3] security: define a trusted_for hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v1 1/3] ima: define ima_trusted_for hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: IMA namespaces
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: IMA namespaces
- From: Denis Semakin <0xsemakin@xxxxxxxxx>
- Re: [PATCH 2/2] tpm: use SM3 instead of SM3_256
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm/st33zp24: drop unneeded over-commenting
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/1] tpm: add request_locality before write TPM_INT_ENABLE
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: IMA namespaces
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] fs: extend the trusted_for syscall to call IMA
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] fs: extend the trusted_for syscall to call IMA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] fs: extend the trusted_for syscall to call IMA
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH 1/2] ima: define ima_trusted_for hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 2/2] fs: extend the trusted_for syscall to call IMA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 1/2] ima: define ima_trusted_for hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] tpm/st33zp24: drop unneeded over-commenting
- From: Sohaib Mohamed <sohaib.amhmd@xxxxxxxxx>
- Re: [PATCH v15 1/6] tpm_tis: Fix expected bit handling and send all bytes in one shot without last byte in exception
- From: Amir Mizinski <amirmizi6@xxxxxxxxx>
- [PATCH v2 1/1] tpm: add request_locality before write TPM_INT_ENABLE
- From: Chen Jun <chenjun102@xxxxxxxxxx>
- RE: [PATCH] tpm: ibmvtpm: Make use of dma_alloc_coherent()
- From: David Laight <David.Laight@xxxxxxxxxx>
- [PATCH v15 2/3] arch: Wire up trusted_for(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v15 1/3] fs: Add trusted_for(2) syscall implementation and related sysctl
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v15 3/3] selftest/interpreter: Add tests for trusted_for(2) policies
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v15 0/3] Add trusted_for(2) (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH 13/13] tpm: st33zp24: Make st33zp24_remove() return void
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 13/13] tpm: st33zp24: Make st33zp24_remove() return void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH] tpm: ibmvtpm: Make use of dma_alloc_coherent()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/1] tpm: add request_locality before write TPM_INT_ENABLE
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 13/13] tpm: st33zp24: Make st33zp24_remove() return void
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: ibmvtpm: Make use of dma_alloc_coherent()
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH v2 00/20] Make some spi device drivers return zero in .remove()
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH v2 20/20] tpm: st33zp24: Make st33zp24_remove() return void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH] tpm: ibmvtpm: Make use of dma_alloc_coherent()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/2] tpm: use SM3 instead of SM3_256
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm/st33zp24: Fix typo in st33zp24.c
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2 1/1] tpm: add request_locality before write TPM_INT_ENABLE
- From: Chen Jun <chenjun102@xxxxxxxxxx>
- [PATCH v2] tpm: ibmvtpm: Make use of dma_alloc_noncoherent()
- From: Cai Huoqing <caihuoqing@xxxxxxxxx>
- Re: [PATCH v6 0/2] IMA checkpatch fixes
- From: Alex Henrie <alexh@xxxxxxxxxxx>
- Re: [PATCH v14 0/3] Add trusted_for(2) (was O_MAYEXEC)
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v14 1/3] fs: Add trusted_for(2) syscall implementation and related sysctl
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 13/13] tpm: st33zp24: Make st33zp24_remove() return void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [PATCH v6 0/2] IMA checkpatch fixes
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v6 0/2] IMA checkpatch fixes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3] KEYS: trusted: Fix trusted key backends when building as module
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v4 4/5] crypto: caam - add in-kernel interface for blob generator
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v4 5/5] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v4 2/5] KEYS: trusted: allow users to use kernel RNG for key material
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v4 1/5] KEYS: trusted: allow use of TEE as backend without TCG_TPM support
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v4 3/5] KEYS: trusted: allow trust sources to use kernel RNG for key material
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- [PATCH v4 0/5] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v14 0/3] Add trusted_for(2) (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v14 1/3] fs: Add trusted_for(2) syscall implementation and related sysctl
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH 0/2] tpm: use SM3 instead of SM3_256
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v14 0/3] Add trusted_for(2) (was O_MAYEXEC)
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] tpm: ibmvtpm: Make use of dma_alloc_coherent()
- From: Cai Huoqing <caihuoqing@xxxxxxxxx>
- Re: [PATCH v14 1/3] fs: Add trusted_for(2) syscall implementation and related sysctl
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH 0/2] tpm: use SM3 instead of SM3_256
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- [PATCH 2/2] tpm: use SM3 instead of SM3_256
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH 1/2] crypto: use SM3 instead of SM3_256
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH 0/2] tpm: use SM3 instead of SM3_256
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH] ima: fix deadlock when traversing "ima_default_rules".
- From: liqiong <liqiong@xxxxxxxxxxxx>
- Re: [PATCH v14 0/3] Add trusted_for(2) (was O_MAYEXEC)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v14 3/3] selftest/interpreter: Add tests for trusted_for(2) policies
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v13 3/3] selftest/interpreter: Add tests for trusted_for(2) policies
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v14 3/3] selftest/interpreter: Add tests for trusted_for(2) policies
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v14 2/3] arch: Wire up trusted_for(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v14 1/3] fs: Add trusted_for(2) syscall implementation and related sysctl
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v14 0/3] Add trusted_for(2) (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v13 3/3] selftest/interpreter: Add tests for trusted_for(2) policies
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v13 1/3] fs: Add trusted_for(2) syscall implementation and related sysctl
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v6 0/2] IMA checkpatch fixes
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v6 2/2] ima: Use strscpy instead of strlcpy
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v6 1/2] ima_policy: Remove duplicate 'the' in docs comment
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v6 0/2] IMA checkpatch fixes
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v3 2/2] ima: add gid support
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v3 1/2] ima: fix uid code style problems
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v2] IMA: make runtime measurement list pollable
- From: Daiki Ueno <dueno@xxxxxxxxxx>
- [PATCH] tpm/st33zp24: Fix typo in st33zp24.c
- From: Sohaib Mohamed <sohaib.amhmd@xxxxxxxxx>
- [PATCH v3 2/2] ima: add gid support
- From: Alex Henrie <alexh@xxxxxxxxxxx>
- [PATCH v3 1/2] ima: fix uid code style problems
- From: Alex Henrie <alexh@xxxxxxxxxxx>
- Re: [PATCH v13 3/3] selftest/interpreter: Add tests for trusted_for(2) policies
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2] ima: add gid support
- From: Alex Henrie <alexh@xxxxxxxxxxx>
- Re: [PATCH v13 2/3] arch: Wire up trusted_for(2)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v13 1/3] fs: Add trusted_for(2) syscall implementation and related sysctl
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v12 0/3] Add trusted_for(2) (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v12 0/3] Add trusted_for(2) (was O_MAYEXEC)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v13 3/3] selftest/interpreter: Add tests for trusted_for(2) policies
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v13 0/3] Add trusted_for(2) (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v13 2/3] arch: Wire up trusted_for(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v13 1/3] fs: Add trusted_for(2) syscall implementation and related sysctl
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v12 0/3] Add trusted_for(2) (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v2] ima: add gid support
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH] IMA: make runtime measurement list pollable
- From: Daiki Ueno <dueno@xxxxxxxxxx>
- Re: [PATCH] IMA: make runtime measurement list pollable
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v12 0/3] Add trusted_for(2) (was O_MAYEXEC)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2] ima: add gid support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v8 3/3] IMA: Add tests for uid, gid, fowner, and fgroup options
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v8 2/3] IMA: Move ima_check to ima_setup.sh
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v8 1/3] IMA: Move check_policy_writable() to ima_setup.sh and rename it
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v8 0/3] IMA: Add tests for uid, gid, fowner, and fgroup options
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH] IMA: make runtime measurement list pollable
- From: Daiki Ueno <dueno@xxxxxxxxxx>
- [PATCH v2] ima: add gid support
- From: Alex Henrie <alexh@xxxxxxxxxxx>
- Re: [PATCH linux rebase] ima: add gid support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] spi: bcm2835: do not unregister controller in shutdown handler
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] spi: bcm2835: do not unregister controller in shutdown handler
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH] spi: bcm2835: do not unregister controller in shutdown handler
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH] spi: bcm2835: do not unregister controller in shutdown handler
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [PATCH] spi: bcm2835: do not unregister controller in shutdown handler
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] spi: bcm2835: do not unregister controller in shutdown handler
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH] spi: bcm2835: do not unregister controller in shutdown handler
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] spi: bcm2835: do not unregister controller in shutdown handler
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH] spi: bcm2835: do not unregister controller in shutdown handler
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [PATCH] spi: bcm2835: do not unregister controller in shutdown handler
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [PATCH] spi: bcm2835: do not unregister controller in shutdown handler
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH] spi: bcm2835: do not unregister controller in shutdown handler
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] spi: bcm2835: do not unregister controller in shutdown handler
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [PATCH] spi: bcm2835: do not unregister controller in shutdown handler
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH] spi: bcm2835: do not unregister controller in shutdown handler
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH v3] integrity: support including firmware ".platform" keys at build time
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [PATCH] spi: bcm2835: do not unregister controller in shutdown handler
- From: Mark Brown <broonie@xxxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]