Linux Integrity
Thread Index
[
Prev Page
][
Next Page
]
Re: [PATCH] tpm_tis_spi: add missing SPI device ID entries
From
: Javier Martinez Canillas <javierm@xxxxxxxxxx>
Re: [PATCH v4] IMA: support for duplicate measurement records
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] tpm_tis_spi: add missing SPI device ID entries
From
: Jason Gunthorpe <jgg@xxxxxxxx>
Re: Recent tpm_tis IRQ handling changes are causing kernel backtraces
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH] tpm_tis_spi: add missing SPI device ID entries
From
: Javier Martinez Canillas <javierm@xxxxxxxxxx>
Re: Recent tpm_tis IRQ handling changes are causing kernel backtraces
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[PATCH v2 7/7] crypto: add eddsa test vector
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
[PATCH v2 6/7] crypto: ed25519 cert verification
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
[PATCH v2 5/7] crypto: move common code in sm2 to ec_mpi.c and ec_mpi.h
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
[PATCH v2 4/7] x509: add support for eddsa
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
[PATCH v2 3/7] lib/mpi: export some common function
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
[PATCH v2 2/7] lib/mpi: use kcalloc in mpi_resize
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
[PATCH v2 1/7] crypto: fix a memory leak in sm2
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
[PATCH v2 0/7] crypto: add eddsa support for x509
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
RE: EVM gives no_label error due to security_kernfs_init_security
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: EVM gives no_label error due to security_kernfs_init_security
From
: Bighead Wang <ex200208049@xxxxxxxxx>
Re: Recent tpm_tis IRQ handling changes are causing kernel backtraces
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
Re: [PATCH v3] ima-evm-utils: Support SM2 algorithm for sign and verify
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
[PATCH ima-evm-utils v3] ima-evm-utils: Support SM2 algorithm for sign and verify
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
[PATCH v3] ima-evm-utils: Support SM2 algorithm for sign and verify
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
Re: [PATCH ima-evm-utils v2] ima-evm-utils: Support SM2 algorithm for sign and verify
From
: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
Re: [PATCH v4] tpm2: add longer timeout for verify signature command
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v4] tpm2: add longer timeout for verify signature command
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [ANNOUNCE][CFP] Linux Security Summit 2021
From
: James Morris <jmorris@xxxxxxxxx>
[PATCH v4] add longer timeout for verify signature command
From
: amirmizi6@xxxxxxxxx
[PATCH v4] tpm2: add longer timeout for verify signature command
From
: amirmizi6@xxxxxxxxx
RE: EVM gives no_label error due to security_kernfs_init_security
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
EVM gives no_label error due to security_kernfs_init_security
From
: Bighead Wang <ex200208049@xxxxxxxxx>
[PATCH v2 1/1] doc: add draft RFC for TPM Key format
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v2 0/1] draft RFC for TPM key format
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3] tpm2: add longer timeout for verify signature command
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH 6/7] ima: Introduce template field evmxattrs
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 5/7] evm: Verify portable signatures against all protected xattrs
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 0/1] draft RFC for TPM key format
From
: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
Re: [RFC PATCH 0/3] Add additional MOK vars
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [RFC PATCH 0/3] Add additional MOK vars
From
: "Dr. Greg" <greg@xxxxxxxxxxxx>
Re: [PATCH 0/1] draft RFC for TPM key format
From
: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
Re: [RFC PATCH 0/3] Add additional MOK vars
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[PATCH v3] tpm2: add longer timeout for verify signature command
From
: amirmizi6@xxxxxxxxx
[PATCH v3] add longer timeout for verify signature command
From
: amirmizi6@xxxxxxxxx
Re: [PATCH 0/1] draft RFC for TPM key format
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH 0/4] Trusted Key policy for TPM 2.0
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH 2/4] security: keys: trusted: add ability to specify arbitrary policy
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH 1/4] security: keys: trusted: add PCR policy to TPM2 keys
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[PATCH 1/1] doc: add draft RFC for TPM Key format
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH 0/1] draft RFC for TPM key format
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v26 15/25] LSM: Ensure the correct LSM context releaser
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH 0/4] Trusted Key policy for TPM 2.0
From
: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
Re: [PATCH v7 00/12] evm: Improve usability of portable signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 0/4] Trusted Key policy for TPM 2.0
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 0/4] Trusted Key policy for TPM 2.0
From
: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
Re: [PATCH 0/4] Trusted Key policy for TPM 2.0
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 0/4] Trusted Key policy for TPM 2.0
From
: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
Re: [PATCH 0/4] Trusted Key policy for TPM 2.0
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 0/4] Trusted Key policy for TPM 2.0
From
: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
Re: [RFC PATCH 0/3] Add additional MOK vars
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 00/16] Rid W=1 warnings from Char
From
: Lee Jones <lee.jones@xxxxxxxxxx>
Re: [PATCH 00/16] Rid W=1 warnings from Char
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 00/16] Rid W=1 warnings from Char
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 00/16] Rid W=1 warnings from Char
From
: Lee Jones <lee.jones@xxxxxxxxxx>
RE: [PATCH v7 00/12] evm: Improve usability of portable signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v3] char: tpm: move to use request_irq by IRQF_NO_AUTOEN flag
From
: "tiantao (H)" <tiantao6@xxxxxxxxxx>
[PATCH 4/4] security: keys: trusted: implement authorization policy
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH 3/4] security: keys: trusted: implement counter/timer policy
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH 2/4] security: keys: trusted: add ability to specify arbitrary policy
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH 1/4] security: keys: trusted: add PCR policy to TPM2 keys
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH 0/4] Trusted Key policy for TPM 2.0
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH 0/3] Add additional MOK vars
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [PATCH v4] IMA: support for duplicate measurement records
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v7 00/12] evm: Improve usability of portable signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 08/16] char: tpm: tpm_ftpm_tee: Fix a couple of kernel-doc misdemeanours
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH 07/16] char: tpm: tpm1-cmd: Fix a couple of misnamed functions
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2] tpm2: add longer timeout for verify signature command
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3] char: tpm: move to use request_irq by IRQF_NO_AUTOEN flag
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [RFC PATCH 1/3] keys: Add ability to trust the platform keyring
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH 00/16] Rid W=1 warnings from Char
From
: Arnd Bergmann <arnd@xxxxxxxx>
[PATCH 08/16] char: tpm: tpm_ftpm_tee: Fix a couple of kernel-doc misdemeanours
From
: Lee Jones <lee.jones@xxxxxxxxxx>
[PATCH 07/16] char: tpm: tpm1-cmd: Fix a couple of misnamed functions
From
: Lee Jones <lee.jones@xxxxxxxxxx>
[PATCH 00/16] Rid W=1 warnings from Char
From
: Lee Jones <lee.jones@xxxxxxxxxx>
Re: [RFC PATCH 0/3] Add additional MOK vars
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
RE: [PATCH 3/7] ima: Introduce template fields mntuidmap and mntgidmap
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH 3/7] ima: Introduce template fields mntuidmap and mntgidmap
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH 3/7] ima: Introduce template fields mntuidmap and mntgidmap
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH 7/7] evm: Don't return an error in evm_write_xattrs() if audit is not enabled
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 6/7] ima: Introduce template field evmxattrs
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 5/7] evm: Verify portable signatures against all protected xattrs
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 0/7] ima: Add template fields to verify EVM portable signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 4/7] ima: Introduce template field imode
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 3/7] ima: Introduce template fields mntuidmap and mntgidmap
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 2/7] ima: Introduce template fields iuid and igid
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 1/7] ima: Add ima_show_template_uint() template library function
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
RE: [RESEND][PATCH 05/12] evm: Introduce evm_hmac_disabled() to safely ignore verification errors
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[RESEND][PATCH 05/12] evm: Introduce evm_hmac_disabled() to safely ignore verification errors
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [RFC PATCH 0/3] Add additional MOK vars
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Re: [RFC PATCH 0/3] Add additional MOK vars
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v2] add longer timeout for verify signature command
From
: amirmizi6@xxxxxxxxx
[PATCH v2] tpm2: add longer timeout for verify signature command
From
: amirmizi6@xxxxxxxxx
Re: [RFC PATCH 0/3] Add additional MOK vars
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[PATCH v3] char: tpm: move to use request_irq by IRQF_NO_AUTOEN flag
From
: Tian Tao <tiantao6@xxxxxxxxxxxxx>
Re: [RESEND PATCH v2 1/1] char: tpm: move to use request_irq by IRQF_NO_AUTOEN flag
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[RFC PATCH 2/3] keys: Trust platform keyring if MokTrustPlatform found
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[RFC PATCH 3/3] ima: Enable IMA SB Policy if MokIMAPolicy found
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[RFC PATCH 1/3] keys: Add ability to trust the platform keyring
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
[RFC PATCH 0/3] Add additional MOK vars
From
: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
Changes for module stacking in Linux integrity
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[RESEND PATCH v2 1/1] char: tpm: move to use request_irq by IRQF_NO_AUTOEN flag
From
: Tian Tao <tiantao6@xxxxxxxxxxxxx>
Re: [PATCH v2 00/40] Use ASCII subset instead of UTF-8 alternate symbols
From
: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
Re: [PATCH v2 00/40] Use ASCII subset instead of UTF-8 alternate symbols
From
: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
Re: [PATCH v2 00/40] Use ASCII subset instead of UTF-8 alternate symbols
From
: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
Re: [PATCH v2 00/40] Use ASCII subset instead of UTF-8 alternate symbols
From
: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
[PATCH v7 12/12] ima: Don't remove security.ima if file must not be appraised
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v7 11/12] ima: Introduce template field evmsig and write to field sig as fallback
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v7 10/12] ima: Allow imasig requirement to be satisfied by EVM portable signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v7 09/12] evm: Deprecate EVM_ALLOW_METADATA_WRITES
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v7 07/12] evm: Pass user namespace to set/remove xattr hooks
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v7 08/12] evm: Allow setxattr() and setattr() for unmodified metadata
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v7 06/12] evm: Allow xattr/attr operations for portable signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v7 05/12] evm: Introduce evm_hmac_disabled() to safely ignore verification errors
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v7 04/12] evm: Introduce evm_revalidate_status()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v7 03/12] evm: Refuse EVM_ALLOW_METADATA_WRITES only if an HMAC key is loaded
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v7 01/12] evm: Execute evm_inode_init_security() only when an HMAC key is loaded
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v7 02/12] evm: Load EVM key in ima_load_x509() to avoid appraisal
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v7 00/12] evm: Improve usability of portable signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v2 00/40] Use ASCII subset instead of UTF-8 alternate symbols
From
: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
Re: [PATCH v2 00/40] Use ASCII subset instead of UTF-8 alternate symbols
From
: Edward Cree <ecree.xilinx@xxxxxxxxx>
Re: [PATCH v2 00/40] Use ASCII subset instead of UTF-8 alternate symbols
From
: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
Re: [PATCH v2 00/40] Use ASCII subset instead of UTF-8 alternate symbols
From
: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
[PATCH v26 15/25] LSM: Ensure the correct LSM context releaser
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v26 13/25] IMA: Change internal interfaces to use lsmblobs
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v26 12/25] LSM: Use lsmblob in security_cred_getsecid
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v26 11/25] LSM: Use lsmblob in security_inode_getsecid
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v26 10/25] LSM: Use lsmblob in security_task_getsecid
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH v26 05/25] LSM: Use lsmblob in security_audit_rule_match
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [GIT PULL] TPM DEVICE DRIVER changes for v5.13-rc2
From
: pr-tracker-bot@xxxxxxxxxx
[GIT PULL] TPM DEVICE DRIVER changes for v5.13-rc2
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2 1/1] tpm: fix error return code in tpm2_get_cc_attrs_tbl()
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2 00/40] Use ASCII subset instead of UTF-8 alternate symbols
From
: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
Re: [PATCH v2 00/40] Use ASCII subset instead of UTF-8 alternate symbols
From
: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
Re: [PATCH v2 00/40] Use ASCII subset instead of UTF-8 alternate symbols
From
: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
Re: [PATCH v2 00/40] Use ASCII subset instead of UTF-8 alternate symbols
From
: "Theodore Ts'o" <tytso@xxxxxxx>
[PATCH v2 0/1] tpm: fix error return code in tpm2_get_cc_attrs_tbl()
From
: Zhen Lei <thunder.leizhen@xxxxxxxxxx>
[PATCH v2 1/1] tpm: fix error return code in tpm2_get_cc_attrs_tbl()
From
: Zhen Lei <thunder.leizhen@xxxxxxxxxx>
[PATCH v2 23/40] docs: security: keys: trusted-encrypted.rst: Use ASCII subset instead of UTF-8 alternate symbols
From
: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
[PATCH v2 00/40] Use ASCII subset instead of UTF-8 alternate symbols
From
: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
RE: [PATCH v6 10/11] ima: Introduce template field evmsig and write to field sig as fallback
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH 1/1] tpm: fix error return code in tpm2_get_cc_attrs_tbl()
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] tpm_tis_spi: set default probe function if device id not match
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH 1/1] tpm: fix error return code in tpm2_get_cc_attrs_tbl()
From
: "Leizhen (ThunderTown)" <thunder.leizhen@xxxxxxxxxx>
Re: [PATCH] tpm_tis_spi: set default probe function if device id not match
From
: 乱石 <zhangliguang@xxxxxxxxxxxxxxxxx>
Re: [PATCH v2 1/1] trusted-keys: match tpm_get_ops on all return paths
From
: Ben Boeckel <me@xxxxxxxxxxxxxx>
Re: Recent tpm_tis IRQ handling changes are causing kernel backtraces
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2 1/1] trusted-keys: match tpm_get_ops on all return paths
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2 1/1] trusted-keys: match tpm_get_ops on all return paths
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH 1/2] tpm, tpm_tis: Extend locality handling to TPM2 in tpm_tis_gen_interrupt()
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v6 10/11] ima: Introduce template field evmsig and write to field sig as fallback
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v6 08/11] evm: Allow setxattr() and setattr() for unmodified metadata
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v6 03/11] evm: Refuse EVM_ALLOW_METADATA_WRITES only if an HMAC key is loaded
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
RE: [PATCH v6 08/11] evm: Allow setxattr() and setattr() for unmodified metadata
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v6 08/11] evm: Allow setxattr() and setattr() for unmodified metadata
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
RE: [PATCH v6 08/11] evm: Allow setxattr() and setattr() for unmodified metadata
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
RE: [PATCH v6 03/11] evm: Refuse EVM_ALLOW_METADATA_WRITES only if an HMAC key is loaded
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v6 08/11] evm: Allow setxattr() and setattr() for unmodified metadata
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [RESEND][PATCH v6 05/11] evm: Introduce evm_hmac_disabled() to safely ignore verification errors
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v6 04/11] evm: Introduce evm_status_revalidate()
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v6 03/11] evm: Refuse EVM_ALLOW_METADATA_WRITES only if an HMAC key is loaded
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v6 3/3] ima-evm-utils: Read keyid from the cert appended to the key file
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v6 2/3] ima-evm-utils: Allow manual setting keyid from a cert file
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v6 1/3] ima-evm-utils: Allow manual setting keyid for signing
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v6 0/3] ima-evm-utils: Add --keyid option
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH 00/53] Get rid of UTF-8 chars that can be mapped as ASCII
From
: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
Re: [PATCH 00/53] Get rid of UTF-8 chars that can be mapped as ASCII
From
: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
Re: [PATCH 00/53] Get rid of UTF-8 chars that can be mapped as ASCII
From
: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
Re: [PATCH 00/53] Get rid of UTF-8 chars that can be mapped as ASCII
From
: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
Re: Recent tpm_tis IRQ handling changes are causing kernel backtraces
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
Re: [PATCH v2 1/1] trusted-keys: match tpm_get_ops on all return paths
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/2] tpm, tpm_tis: Extend locality handling to TPM2 in tpm_tis_gen_interrupt()
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
Re: [PATCH 00/53] Get rid of UTF-8 chars that can be mapped as ASCII
From
: Adam Borowski <kilobyte@xxxxxxxxxx>
Re: [PATCH v2 1/1] trusted-keys: match tpm_get_ops on all return paths
From
: Ben Boeckel <me@xxxxxxxxxxxxxx>
Re: [PATCH 00/53] Get rid of UTF-8 chars that can be mapped as ASCII
From
: "Theodore Ts'o" <tytso@xxxxxxx>
[PATCH v4] IMA: support for duplicate measurement records
From
: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v1] tpm2: add longer timeout for verify signature command
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v4 1/3] ima_keys.sh: Check policy only once
From
: Petr Vorel <pvorel@xxxxxxx>
Re: Recent tpm_tis IRQ handling changes are causing kernel backtraces
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2 0/3] ima-evm-utils: Implement function to only create IMA signature
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 00/53] Get rid of UTF-8 chars that can be mapped as ASCII
From
: Edward Cree <ecree.xilinx@xxxxxxxxx>
Re: [PATCH v4 1/3] ima_keys.sh: Check policy only once
From
: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
[PATCH v1] tpm2: add longer timeout for verify signature command
From
: amirmizi6@xxxxxxxxx
[PATCH v1] add longer timeout for verify signature command
From
: amirmizi6@xxxxxxxxx
Re: [PATCH 00/53] Get rid of UTF-8 chars that can be mapped as ASCII
From
: Matthew Wilcox <willy@xxxxxxxxxxxxx>
Re: [PATCH 00/53] Get rid of UTF-8 chars that can be mapped as ASCII
From
: Edward Cree <ecree.xilinx@xxxxxxxxx>
Re: [PATCH 00/53] Get rid of UTF-8 chars that can be mapped as ASCII
From
: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
Re: [PATCH 00/53] Get rid of UTF-8 chars that can be mapped as ASCII
From
: Ben Boeckel <me@xxxxxxxxxxxxxx>
Re: [PATCH v2 0/3] ima-evm-utils: Implement function to only create IMA signature
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH 00/53] Get rid of UTF-8 chars that can be mapped as ASCII
From
: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
Re: [PATCH 00/53] Get rid of UTF-8 chars that can be mapped as ASCII
From
: Edward Cree <ecree.xilinx@xxxxxxxxx>
[PATCH 1/2] tpm, tpm_tis: Extend locality handling to TPM2 in tpm_tis_gen_interrupt()
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[PATCH 2/2] tpm, tpm_tis: Reserve locality in tpm_tis_resume()
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH 00/53] Get rid of UTF-8 chars that can be mapped as ASCII
From
: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
[syzbot] possible deadlock in process_measurement (3)
From
: syzbot <syzbot+ccfcdc8958f74084f16d@xxxxxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 00/53] Get rid of UTF-8 chars that can be mapped as ASCII
From
: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
Re: [PATCH 00/53] Get rid of UTF-8 chars that can be mapped as ASCII
From
: Thorsten Leemhuis <linux@xxxxxxxxxxxxx>
Re: [PATCH 00/53] Get rid of UTF-8 chars that can be mapped as ASCII
From
: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
Re: [PATCH 00/53] Get rid of UTF-8 chars that can be mapped as ASCII
From
: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
[PATCH 00/53] Get rid of UTF-8 chars that can be mapped as ASCII
From
: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
[PATCH 32/53] docs: security: keys: trusted-encrypted.rst: avoid using UTF-8 chars
From
: Mauro Carvalho Chehab <mchehab+huawei@xxxxxxxxxx>
Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
From
: Hao Wu <hao.wu@xxxxxxxxxx>
Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] tpm_tis_spi: set default probe function if device id not match
From
: 乱石 <zhangliguang@xxxxxxxxxxxxxxxxx>
Re: [PATCH 1/1] tpm: fix error return code in tpm2_get_cc_attrs_tbl()
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] tpm_tis_spi: set default probe function if device id not match
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
From
: Hao Wu <hao.wu@xxxxxxxxxx>
Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
From
: Hao Wu <hao.wu@xxxxxxxxxx>
Re: Recent tpm_tis IRQ handling changes are causing kernel backtraces
From
: Hans de Goede <hdegoede@xxxxxxxxxx>
[PATCH 1/1] tpm: fix error return code in tpm2_get_cc_attrs_tbl()
From
: Zhen Lei <thunder.leizhen@xxxxxxxxxx>
Re: [PATCH] tpm_tis_spi: set default probe function if device id not match
From
: 乱石 <zhangliguang@xxxxxxxxxxxxxxxxx>
Re: [PATCH] tpm_tis_spi: set default probe function if device id not match
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[PATCH v4 3/3] IMA: Add test for dm-crypt measurement
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH v4 2/3] IMA: Generalize key measurement tests
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH v4 1/3] ima_keys.sh: Check policy only once
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH v4 0/3] IMA: Add test for dm-crypt measurement
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH] tpm_tis_spi: set default probe function if device id not match
From
: Liguang Zhang <zhangliguang@xxxxxxxxxxxxxxxxx>
Re: [PATCH v5 0/3] ima-evm-utils: Add --keyid option
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[RESEND][PATCH v6 05/11] evm: Introduce evm_hmac_disabled() to safely ignore verification errors
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v5 0/3] ima-evm-utils: Add --keyid option
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v5 2/3] ima-evm-utils: Allow manual setting keyid from a cert file
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v5 0/3] ima-evm-utils: Add --keyid option
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v2 2/2] IMA: Add test for dm-crypt measurement
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH v5 3/3] ima-evm-utils: Read keyid from the cert appended to the key file
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v5 2/3] ima-evm-utils: Allow manual setting keyid from a cert file
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v5 1/3] ima-evm-utils: Allow manual setting keyid for signing
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v5 0/3] ima-evm-utils: Add --keyid option
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v4 2/3] ima-evm-utils: Allow manual setting keyid from a cert file
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v4 2/3] ima-evm-utils: Allow manual setting keyid from a cert file
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v4 3/3] ima-evm-utils: Read keyid from the cert appended to the key file
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v4 2/3] ima-evm-utils: Allow manual setting keyid from a cert file
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v3 2/4] tpm: Simplify locality handling
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3 1/4] tpm: Use a threaded interrupt handler
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2 1/3] ima-evm-utils: Allow manual setting keyid for signing
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v4 2/3] ima-evm-utils: Allow manual setting keyid from a cert file
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v4 2/3] ima-evm-utils: Allow manual setting keyid from a cert file
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v4 3/3] ima-evm-utils: Read keyid from the cert appended to the key file
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v4 3/3] ima-evm-utils: Read keyid from the cert appended to the key file
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v4 3/3] ima-evm-utils: Read keyid from the cert appended to the key file
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v4 2/3] ima-evm-utils: Allow manual setting keyid from a cert file
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH 6/9] pm: hibernate: Optionally store and verify a hash of the image
From
: Evan Green <evgreen@xxxxxxxxxxxx>
Re: [PATCH 0/9] Enable hibernation when Lockdown is enabled
From
: Evan Green <evgreen@xxxxxxxxxxxx>
[PATCH v6 11/11] ima: Don't remove security.ima if file must not be appraised
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v6 10/11] ima: Introduce template field evmsig and write to field sig as fallback
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v6 09/11] ima: Allow imasig requirement to be satisfied by EVM portable signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v6 08/11] evm: Allow setxattr() and setattr() for unmodified metadata
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v6 07/11] evm: Pass user namespace to set/remove xattr hooks
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v6 06/11] evm: Allow xattr/attr operations for portable signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v6 05/11] evm: Introduce evm_hmac_disabled() to safely ignore verification errors
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v6 04/11] evm: Introduce evm_status_revalidate()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v6 00/11] evm: Improve usability of portable signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v6 03/11] evm: Refuse EVM_ALLOW_METADATA_WRITES only if an HMAC key is loaded
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v6 01/11] evm: Execute evm_inode_init_security() only when an HMAC key is loaded
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v6 02/11] evm: Load EVM key in ima_load_x509() to avoid appraisal
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v4 3/3] ima-evm-utils: Read keyid from the cert appended to the key file
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v4 2/3] ima-evm-utils: Allow manual setting keyid from a cert file
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v4 1/3] ima-evm-utils: Allow manual setting keyid for signing
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v4 0/3] ima-evm-utils: Add --keyid option
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v2 3/3] ima-evm-utils: Read keyid from the cert appended to the key file
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v3 3/3] ima-evm-utils: Read keyid from the cert appended to the key file
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v3 2/3] ima-evm-utils: Allow manual setting keyid from a cert file
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v3 1/3] ima-evm-utils: Allow manual setting keyid for signing
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v3 0/3] ima-evm-utils: Add --keyid option
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH 0/9] Enable hibernation when Lockdown is enabled
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH 0/9] Enable hibernation when Lockdown is enabled
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2 3/3] ima-evm-utils: Read keyid from the cert appended to the key file
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v2 3/3] ima-evm-utils: Read keyid from the cert appended to the key file
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v2 1/3] ima-evm-utils: Allow manual setting keyid for signing
From
: "Dmitry V. Levin" <ldv@xxxxxxxxxxxx>
Re: [PATCH v2 2/3] ima-evm-utils: Allow manual setting keyid from a cert file
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v3 3/4] tpm: Fix test for interrupts
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
Re: [PATCH v2 1/3] ima-evm-utils: Allow manual setting keyid for signing
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v3 2/4] tpm: Simplify locality handling
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
Re: [PATCH v3 1/4] tpm: Use a threaded interrupt handler
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
Re: [PATCH v2 3/3] ima-evm-utils: Read keyid from the cert appended to the key file
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH 0/9] Enable hibernation when Lockdown is enabled
From
: Evan Green <evgreen@xxxxxxxxxxxx>
Re: [PATCH v5 07/12] evm: Allow xattr/attr operations for portable signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
RE: [PATCH v5 07/12] evm: Allow xattr/attr operations for portable signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v5 06/12] evm: Ignore INTEGRITY_NOLABEL/INTEGRITY_NOXATTRS if conditions are safe
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 3/3] ima-evm-utils: Read keyid from the cert appended to the key file
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v2 2/3] ima-evm-utils: Allow manual setting keyid from a cert file
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
RE: [PATCH v5 06/12] evm: Ignore INTEGRITY_NOLABEL/INTEGRITY_NOXATTRS if conditions are safe
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v2 2/3] ima-evm-utils: Allow manual setting keyid from a cert file
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v2 1/3] ima-evm-utils: Allow manual setting keyid for signing
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v7 0/5] Enable root to update the blacklist keyring
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
[PATCH v2 3/3] ima-evm-utils: Read keyid from the cert appended to the key file
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v2 2/3] ima-evm-utils: Allow manual setting keyid from a cert file
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v2 1/3] ima-evm-utils: Allow manual setting keyid for signing
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v2 0/3] ima-evm-utils: Add --keyid option
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [RFC PATCH] ima-evm-utils: Allow manual setting keyid for signing
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH 2/2] ima-evm-utils: Allow manual setting keyid from a cert file
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH 1/2] ima-evm-utils: Allow manual setting keyid for signing
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH 0/2] ima-evm-utils: Add --keyid option
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [RFC PATCH] ima-evm-utils: Allow manual setting keyid for signing
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v3 4/4] tpm: Only enable supported irqs
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3 3/4] tpm: Fix test for interrupts
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3 2/4] tpm: Simplify locality handling
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v5 09/12] evm: Allow setxattr() and setattr() for unmodified metadata
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
RE: [PATCH v5 09/12] evm: Allow setxattr() and setattr() for unmodified metadata
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
RE: [PATCH v5 09/12] evm: Allow setxattr() and setattr() for unmodified metadata
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v5 09/12] evm: Allow setxattr() and setattr() for unmodified metadata
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 1/4] tpm: Use a threaded interrupt handler
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v5 09/12] evm: Allow setxattr() and setattr() for unmodified metadata
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
RE: [PATCH v5 09/12] evm: Allow setxattr() and setattr() for unmodified metadata
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH] KEYS: trusted: fix memory leak
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] KEYS: trusted: Fix memory leak on object td
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] KEYS: trusted: Fix memory leak on object td
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2] tpm_crb: Use IOMEM_ERR_PTR when function returns iomem
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
RE: [PATCH v5 09/12] evm: Allow setxattr() and setattr() for unmodified metadata
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: calc_keyid_v2 producing different keyid for non-sha1 SKIDs
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v5 06/12] evm: Ignore INTEGRITY_NOLABEL/INTEGRITY_NOXATTRS if conditions are safe
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
RE: [PATCH v5 06/12] evm: Ignore INTEGRITY_NOLABEL/INTEGRITY_NOXATTRS if conditions are safe
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v4 04/11] ima: Move ima_reset_appraise_flags() call to post hooks
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5 09/12] evm: Allow setxattr() and setattr() for unmodified metadata
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5 06/12] evm: Ignore INTEGRITY_NOLABEL/INTEGRITY_NOXATTRS if conditions are safe
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
RE: [PATCH v5 06/12] evm: Ignore INTEGRITY_NOLABEL/INTEGRITY_NOXATTRS if conditions are safe
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
RE: [PATCH v4 04/11] ima: Move ima_reset_appraise_flags() call to post hooks
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v5 07/12] evm: Allow xattr/attr operations for portable signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5 06/12] evm: Ignore INTEGRITY_NOLABEL/INTEGRITY_NOXATTRS if conditions are safe
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [GIT PULL] integrity subsystem updates for v5.13
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 4/4] tpm: Only enable supported irqs
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
Re: [GIT PULL] integrity subsystem updates for v5.13
From
: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
Re: [GIT PULL] integrity subsystem updates for v5.13
From
: pr-tracker-bot@xxxxxxxxxx
Re: [PATCH v3 4/4] tpm: Only enable supported irqs
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v3 4/4] tpm: Only enable supported irqs
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
[PATCH v3 3/4] tpm: Fix test for interrupts
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
[PATCH v3 0/4] Fixes for TPM interrupt handling
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
[PATCH v3 1/4] tpm: Use a threaded interrupt handler
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
[PATCH v3 2/4] tpm: Simplify locality handling
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
Re: [PATCH v2 1/4] tpm: Use a threaded interrupt handler
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
Re: [PATCH] KEYS: trusted: Fix memory leak on object td
From
: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
Re: [PATCH] KEYS: trusted: fix memory leak
From
: Tom Rix <trix@xxxxxxxxxx>
Re: [PATCH v5 03/12] evm: Refuse EVM_ALLOW_METADATA_WRITES only if an HMAC key is loaded
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[RFC PATCH] ima-evm-utils: Allow manual setting keyid for signing
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH] KEYS: trusted: fix memory leak
From
: Ben Boeckel <me@xxxxxxxxxxxxxx>
Re: [PATCH 1/1] travis: Fix Fedora
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH 1/1] travis: Fix Fedora
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH] KEYS: trusted: fix memory leak
From
: trix@xxxxxxxxxx
Re: calc_keyid_v2 producing different keyid for non-sha1 SKIDs
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v4 04/11] ima: Move ima_reset_appraise_flags() call to post hooks
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: calc_keyid_v2 producing different keyid for non-sha1 SKIDs
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH 1/1] travis: Fix Fedora
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 1/1] travis: Fix Fedora
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH 1/1] travis: Fix Fedora
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH] KEYS: trusted: Fix memory leak on object td
From
: Colin King <colin.king@xxxxxxxxxxxxx>
Re: [PATCH] evm: fix writing <securityfs>/evm overflow
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH] evm: fix writing <securityfs>/evm overflow
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v2 1/1] trusted-keys: match tpm_get_ops on all return paths
From
: Ben Boeckel <me@xxxxxxxxxxxxxx>
[PATCH v2 0/1] trusted-keys: match tpm_get_ops on all return paths
From
: Ben Boeckel <me@xxxxxxxxxxxxxx>
Re: [PATCH 1/1] trusted-keys: match tpm_get_ops on all return paths
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/1] trusted-keys: match tpm_get_ops on all return paths
From
: Ben Boeckel <me@xxxxxxxxxxxxxx>
Re: [PATCH 1/1] trusted-keys: match tpm_get_ops on all return paths
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH 1/1] trusted-keys: match tpm_get_ops on all return paths
From
: Ben Boeckel <me@xxxxxxxxxxxxxx>
[PATCH 0/1] trusted-keys: match tpm_get_ops on all return paths
From
: Ben Boeckel <me@xxxxxxxxxxxxxx>
[PATCH v2] tpm_crb: Use IOMEM_ERR_PTR when function returns iomem
From
: Tian Tao <tiantao6@xxxxxxxxxxxxx>
Re: [PATCH v2 1/4] tpm: Use a threaded interrupt handler
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] tpm_crb: Use IOMEM_ERR_PTR when function returns iomem
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[PATCH 1/1] travis: Fix Fedora
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH v2 2/4] tpm: Simplify locality handling
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
Re: [PATCH v2 1/4] tpm: Use a threaded interrupt handler
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
Re: [PATCH v2 3/4] tpm: Fix test for interrupts
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
RE: [PATCH v4 04/11] ima: Move ima_reset_appraise_flags() call to post hooks
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[GIT PULL] integrity subsystem updates for v5.13
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] tpm_crb: Use IOMEM_ERR_PTR when function returns iomem
From
: "tiantao (H)" <tiantao6@xxxxxxxxxx>
RE: [PATCH v4 04/11] ima: Move ima_reset_appraise_flags() call to post hooks
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
RE: [PATCH v2 2/4] tpm: Simplify locality handling
From
: <Peter.Huewe@xxxxxxxxxxxx>
Re: [PATCH v2 2/3] tests: Add program to create IMA signature with new API call
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v2 1/4] tpm: Use a threaded interrupt handler
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2 2/4] tpm: Simplify locality handling
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v4 0/2] Add support for ECDSA-signed kernel modules
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v3 2/2] certs: Add support for using elliptic curve keys for signing modules
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] tpm_crb: Use IOMEM_ERR_PTR when function returns iomem
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [GIT PULL] TPM DEVICE DRIVER updates for v5.13 (updated)
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2 2/3] tests: Add program to create IMA signature with new API call
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v2 2/3] tests: Add program to create IMA signature with new API call
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v2 3/3] libimaevm: Have sign_hash_v2 call sign_hash_v2_pkey after reading key file
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v2 1/3] libimaevm: Implement imaevm_create_ima_signature
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v2 0/3] ima-evm-utils: Implement function to only create IMA signature
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH 1/3] libimaevm: Implement imaevm_create_ima_signature
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH 1/3] libimaevm: Implement imaevm_create_ima_signature
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v4 04/11] ima: Move ima_reset_appraise_flags() call to post hooks
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v4 04/11] ima: Move ima_reset_appraise_flags() call to post hooks
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH v4 04/11] ima: Move ima_reset_appraise_flags() call to post hooks
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
RE: [PATCH v4 04/11] ima: Move ima_reset_appraise_flags() call to post hooks
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v4 04/11] ima: Move ima_reset_appraise_flags() call to post hooks
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v3 6/6] evm: Support multiple LSMs providing an xattr
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v3 5/6] evm: Align evm_inode_init_security() definition with LSM infrastructure
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v3 0/6] evm: Prepare for moving to the LSM infrastructure
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v3 1/6] reiserfs: Add missing calls to reiserfs_security_free()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v3 2/6] security: Rewrite security_old_inode_init_security()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v3 3/6] security: Pass xattrs allocated by LSMs to the inode_init_security hook
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v3 4/6] security: Support multiple LSMs implementing the inode_init_security hook
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
RE: [PATCH v4 04/11] ima: Move ima_reset_appraise_flags() call to post hooks
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH 1/3] libimaevm: Implement imaevm_create_ima_signature
From
: "Colin Walters" <walters@xxxxxxxxxx>
Re: calc_keyid_v2 producing different keyid for non-sha1 SKIDs
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: calc_keyid_v2 producing different keyid for non-sha1 SKIDs
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: calc_keyid_v2 producing different keyid for non-sha1 SKIDs
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v5 04/12] ima: Move ima_reset_appraise_flags() call to post hooks
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v4 04/11] ima: Move ima_reset_appraise_flags() call to post hooks
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
calc_keyid_v2 producing different keyid for non-sha1 SKIDs
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [GIT PULL] TPM DEVICE DRIVER updates for v5.13 (updated)
From
: pr-tracker-bot@xxxxxxxxxx
Re: [GIT PULL] TPM DEVICE DRIVER updates for v5.13
From
: pr-tracker-bot@xxxxxxxxxx
Re: [PATCH v2 3/4] tpm: Fix test for interrupts
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v2 1/4] tpm: Use a threaded interrupt handler
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v2 4/4] tpm: Only enable supported irqs
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v2 4/4] tpm: Only enable supported irqs
From
: kernel test robot <lkp@xxxxxxxxx>
[PATCH v2 4/4] tpm: Only enable supported irqs
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
[PATCH v2 3/4] tpm: Fix test for interrupts
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
[PATCH v2 1/4] tpm: Use a threaded interrupt handler
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
[PATCH v2 2/4] tpm: Simplify locality handling
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
[PATCH v2 0/4] Fixes for TPM interrupt handling
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
[GIT PULL] TPM DEVICE DRIVER updates for v5.13 (updated)
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v4 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v4 2/2] certs: Add support for using elliptic curve keys for signing modules
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v4 0/2] Add support for ECDSA-signed kernel modules
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH] ima: ensure IMA_APPRAISE_MODSIG has necessary dependencies
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
[PATCH] ima: ensure IMA_APPRAISE_MODSIG has necessary dependencies
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
Re: [PATCH v2 3/6] security: Pass xattrs allocated by LSMs to the inode_init_security hook
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [GIT PULL] KEYS: trusted fixes for 5.12-rc7
From
: pr-tracker-bot@xxxxxxxxxx
Re: [GIT PULL] KEYS: trusted fixes for 5.12-rc7
From
: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
[GIT PULL] KEYS: trusted fixes for 5.12-rc7
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH] ima: require CONFIG_MODULES for IMA_APPRAISE_MODSIG
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
RE: [PATCH v2 3/6] security: Pass xattrs allocated by LSMs to the inode_init_security hook
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v2 3/6] security: Pass xattrs allocated by LSMs to the inode_init_security hook
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
RE: [PATCH v2 3/6] security: Pass xattrs allocated by LSMs to the inode_init_security hook
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH] ima: require CONFIG_MODULES for IMA_APPRAISE_MODSIG
From
: Arnd Bergmann <arnd@xxxxxxxxxx>
Re: [PATCH] KEYS: trusted: fix TPM trusted keys for generic framework
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH v9 1/4] KEYS: trusted: Add generic trusted keys framework
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH] KEYS: trusted: Fix TPM reservation for seal/unseal
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 4/6] security: Support multiple LSMs implementing the inode_init_security hook
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH] KEYS: trusted: fix TPM trusted keys for generic framework
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 3/6] security: Pass xattrs allocated by LSMs to the inode_init_security hook
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
[PATCH] KEYS: trusted: Fix TPM reservation for seal/unseal
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
[PATCH v3 2/2] certs: Add support for using elliptic curve keys for signing modules
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v3 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v3 0/2] Add support for ECDSA-signed kernel modules
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v9 1/4] KEYS: trusted: Add generic trusted keys framework
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
[PATCH v2 6/6] evm: Support multiple LSMs providing an xattr
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v2 5/6] evm: Align evm_inode_init_security() definition with LSM infrastructure
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v2 4/6] security: Support multiple LSMs implementing the inode_init_security hook
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v2 2/6] reiserfs: Add missing calls to reiserfs_security_free()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v2 3/6] security: Pass xattrs allocated by LSMs to the inode_init_security hook
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v2 1/6] xattr: Complete constify ->name member of "struct xattr"
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v2 0/6] evm: Prepare for moving to the LSM infrastructure
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v2 2/2] certs: Add support for using elliptic curve keys for signing modules
From
: Jessica Yu <jeyu@xxxxxxxxxx>
Re: [PATCH v2 2/2] certs: Add support for using elliptic curve keys for signing modules
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v2 2/2] certs: Add support for using elliptic curve keys for signing modules
From
: Jessica Yu <jeyu@xxxxxxxxxx>
Re: [PATCH v9 1/4] KEYS: trusted: Add generic trusted keys framework
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH v9 1/4] KEYS: trusted: Add generic trusted keys framework
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [PATCH 010/141] ima: Fix fall-through warnings for Clang
From
: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
Re: [PATCH 010/141] ima: Fix fall-through warnings for Clang
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 2/2] certs: Add support for using elliptic curve keys for signing modules
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH 010/141] ima: Fix fall-through warnings for Clang
From
: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
[PATCH 3/3] libimaevm: Have sign_hash_v2 call sign_hash_v2_pkey after reading key file
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH 1/3] libimaevm: Implement imaevm_create_ima_signature
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH 2/3] tests: Add program to create IMA signature with new API call
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH 0/3] ima-evm-utils: Implement function to only create IMA signature
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
RE: [PATCH 0/5] evm: Prepare for moving to the LSM infrastructure
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v2 2/2] certs: Add support for using elliptic curve keys for signing modules
From
: Jessica Yu <jeyu@xxxxxxxxxx>
[PATCH] tpm_crb: Use IOMEM_ERR_PTR when function returns iomem
From
: Tian Tao <tiantao6@xxxxxxxxxxxxx>
[RFC PATCH] integrity: fix null ptr dereference in integrity_inode_free()
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 3/6] libimaevm: Rename variable returned from readlink to len
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH 6/6] libimaevm: Use function parameter algo for name of hash
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH 4/6] libimaevm: Rename variable from cr to newline
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH 5/6] libimaevm: Report unsupported filetype using log_err
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH 3/6] libimaevm: Rename variable returned from readlink to len
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH 1/6] libimaevm: Properly check for error returned by EVP_DigestUpdate
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH 2/6] libimaevm: Remove unused off variable
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH 0/6] ima-evm-utils: Some cleanups and bugfixes
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH 0/5] evm: Prepare for moving to the LSM infrastructure
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: linux-next: Tree for Apr 16 (IMA appraise causing build error)
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
Re: linux-next: Tree for Apr 16 (IMA appraise causing build error)
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
Re: linux-next: Tree for Apr 16 (IMA appraise causing build error)
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
RE: [PATCH 0/5] evm: Prepare for moving to the LSM infrastructure
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH] KEYS: trusted: fix a couple error pointer dereferences
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Re: [PATCH] KEYS: trusted: fix a couple error pointer dereferences
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH] KEYS: trusted: fix a couple error pointer dereferences
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH 0/5] evm: Prepare for moving to the LSM infrastructure
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH v3 1/2] travis: Fix openSUSE Tumbleweed
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH v3 1/2] travis: Fix openSUSE Tumbleweed
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH 1/1] travis: Add Docker Hub pull rate limit workaround
From
: Petr Vorel <pvorel@xxxxxxx>
RE: [PATCH 1/5] xattr: Complete constify ->name member of "struct xattr"
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v3 2/2] tests/install-swtpm.sh: Add tar option --no-same-owner
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH v3 1/2] travis: Fix openSUSE Tumbleweed
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH 1/5] xattr: Complete constify ->name member of "struct xattr"
From
: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
[PATCH 5/5] evm: Support multiple LSMs providing an xattr
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 4/5] evm: Align evm_inode_init_security() definition with LSM infrastructure
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 3/5] security: Pass xattrs allocated by LSMs to the inode_init_security hook
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 2/5] security: Support multiple LSMs implementing the inode_init_security hook
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 1/5] xattr: Complete constify ->name member of "struct xattr"
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 0/5] evm: Prepare for moving to the LSM infrastructure
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: null-ptr-deref in integrity_inode_free()
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: null-ptr-deref in integrity_inode_free()
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: null-ptr-deref in integrity_inode_free()
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: null-ptr-deref in integrity_inode_free()
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] KEYS: trusted: fix a couple error pointer dereferences
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
[GIT PULL] TPM DEVICE DRIVER updates for v5.13
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH][next] KEYS: trusted: Fix missing null return from kzalloc call
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: Re: Bug: TPM returned invalid status
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[PATCH] KEYS: trusted: fix a couple error pointer dereferences
From
: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
[PATCH] security: keys: trusted: prevent memory leak in error path
From
: Muhammad Usama Anjum <musamaanjum@xxxxxxxxx>
Re: [PATCH ima-evm-utils] travis: Fix openSUSE Tumbleweed
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH ima-evm-utils] travis: Fix openSUSE Tumbleweed
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v6 24/40] fs: make helpers idmap mount aware
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH][next] KEYS: trusted: Fix missing null return from kzalloc call
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH][next] KEYS: trusted: Fix missing null return from kzalloc call
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH][next] KEYS: trusted: Fix missing null return from kzalloc call
From
: Colin Ian King <colin.king@xxxxxxxxxxxxx>
Re: [PATCH][next] KEYS: trusted: Fix missing null return from kzalloc call
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [PATCH v6 24/40] fs: make helpers idmap mount aware
From
: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
[PATCH][next] KEYS: trusted: Fix missing null return from kzalloc call
From
: Colin King <colin.king@xxxxxxxxxxxxx>
[PATCH -next] KEYS: trusted: Switch to kmemdup_nul()
From
: Wei Yongjun <weiyongjun1@xxxxxxxxxx>
Re: [PATCH v6 24/40] fs: make helpers idmap mount aware
From
: Anton Altaparmakov <anton@xxxxxxxxxx>
Re: [PATCH v2] integrity: Add declarations to init_once void arguments.
From
: Jiele Zhao <unclexiaole@xxxxxxxxx>
Re: [PATCH v2] integrity: Add declarations to init_once void arguments.
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v4 0/3] ima: kernel build support for loading the kernel module signing key
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v12 0/3] Add trusted_for(2) (was O_MAYEXEC)
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
Re: [PATCH v12 0/3] Add trusted_for(2) (was O_MAYEXEC)
From
: bauen1 <j2468h@xxxxxxxxxxxxxx>
[PATCH v4 3/3] ima: enable loading of build time generated key on .ima keyring
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v4 1/3] keys: cleanup build time module signing keys
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v4 2/3] ima: enable signing of modules with build time generated key
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v4 0/3] ima: kernel build support for loading the kernel module signing key
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH 6/7] evm: Allow choice of hash algorithm for HMAC
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 7/7] evm: Extend evm= with allow_metadata_writes and complete values
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 5/7] ima: Introduce appraise_exec_immutable policy
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 4/7] ima: Introduce appraise_exec_tcb and appraise_tmpfs policies
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 2/7] ima: Add meta_immutable appraisal type
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 3/7] ima: Introduce exec_tcb and tmpfs policies
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 1/7] ima: Avoid measurement and audit if access to the file will be denied
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 0/7] ima/evm: Small enhancements
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Aw: Re: Bug: TPM returned invalid status
From
: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
Re: [PATCH v2] char: tpm: fix error return code in tpm_cr50_i2c_tis_recv()
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v2] integrity: Add declarations to init_once void arguments.
From
: Jiele Zhao <unclexiaole@xxxxxxxxx>
[PATCH v2] char: tpm: fix error return code in tpm_cr50_i2c_tis_recv()
From
: Zhihao Cheng <chengzhihao1@xxxxxxxxxx>
Re: [PATCH v2 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: Question about the available tests for IMA apprise
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 2/2] certs: Add support for using elliptic curve keys for signing modules
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] char: tpm: fix error return code in tpm_cr50_i2c_tis_recv()
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[PATCH v2 1/2] certs: Trigger creation of RSA module signing key if it's not an RSA key
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v2 0/2] Add support for ECDSA-signed kernel modules
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v2 2/2] certs: Add support for using elliptic curve keys for signing modules
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v4 2/4] crypto: support rsa-pss encoding
From
: kernel test robot <lkp@xxxxxxxxx>
[PATCH] char: tpm: fix error return code in tpm_cr50_i2c_tis_recv()
From
: Zhihao Cheng <chengzhihao1@xxxxxxxxxx>
Re: Bug: TPM returned invalid status
From
: "Tj (Elloe Linux)" <ml.linux@elloe.vision>
Re: [PATCH v2 2/4] crypto: support rsa-pss encoding
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH 0/2] Add support for ECDSA-signed kernel modules
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[RESEND][PATCH v5 09/12] evm: Allow setxattr() and setattr() for unmodified metadata
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v5 09/12] evm: Allow setxattr() and setattr() for unmodified metadata
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH 0/2] Add support for ECDSA-signed kernel modules
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v7 0/5] Enable root to update the blacklist keyring
From
: Mickaël Salaün <mic@xxxxxxxxxxx>
RE: [PATCH v5 04/12] ima: Move ima_reset_appraise_flags() call to post hooks
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v5 04/12] ima: Move ima_reset_appraise_flags() call to post hooks
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH 0/2] Add support for ECDSA-signed kernel modules
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 0/2] Add support for ECDSA-signed kernel modules
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v5 09/12] evm: Allow setxattr() and setattr() for unmodified metadata
From
: kernel test robot <lkp@xxxxxxxxx>
[PATCH v4 4/4] ima: add support for rsa pss verification
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
[PATCH v4 3/4] crypto: add rsa pss test vector
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
[PATCH v4 2/4] crypto: support rsa-pss encoding
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
[PATCH v4 1/4] x509: add support for rsa-pss
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
[PATCH v4 0/4] crypto: add rsa pss support for x509
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
Re: [PATCH v5 08/12] evm: Pass user namespace to set/remove xattr hooks
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
Re: [PATCH v5 09/12] evm: Allow setxattr() and setattr() for unmodified metadata
From
: Christian Brauner <christian.brauner@xxxxxxxxxx>
[PATCH v5 12/12] ima: Don't remove security.ima if file must not be appraised
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v5 11/12] ima: Introduce template field evmsig and write to field sig as fallback
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v5 10/12] ima: Allow imasig requirement to be satisfied by EVM portable signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v5 09/12] evm: Allow setxattr() and setattr() for unmodified metadata
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v5 06/12] evm: Ignore INTEGRITY_NOLABEL/INTEGRITY_NOXATTRS if conditions are safe
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v5 08/12] evm: Pass user namespace to set/remove xattr hooks
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v5 07/12] evm: Allow xattr/attr operations for portable signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v5 05/12] evm: Introduce evm_status_revalidate()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v5 04/12] ima: Move ima_reset_appraise_flags() call to post hooks
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v5 03/12] evm: Refuse EVM_ALLOW_METADATA_WRITES only if an HMAC key is loaded
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v5 02/12] evm: Load EVM key in ima_load_x509() to avoid appraisal
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v5 01/12] evm: Execute evm_inode_init_security() only when an HMAC key is loaded
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v5 00/12] evm: Improve usability of portable signatures
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH 0/5] crypto: add rsa pss support for x509(Internet mail)
From
: herberthbli(李弘博) <herberthbli@xxxxxxxxxxx>
Re: [PATCH v3 2/4] crypto: support rsa-pss encoding
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH 0/5] crypto: add rsa pss support for x509
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
[PATCH v3 4/4] ima: add support for rsa pss verification
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
[PATCH v3 3/4] crypto: add rsa pss test vector
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
[PATCH v3 2/4] crypto: support rsa-pss encoding
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
[PATCH v3 1/4] x509: add support for rsa-pss
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
[PATCH v3 0/4] crypto: add rsa pss support for x509
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
[PATCH v2 0/4] crypto: add rsa pss support for x509
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
[PATCH v2 4/4] ima: add support for rsa pss verification
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
[PATCH v2 3/4] crypto: add rsa pss test vector
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
[PATCH v2 2/4] crypto: support rsa-pss encoding
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
[PATCH v2 1/4] x509: add support for rsa-pss
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
[PATCH 0/5] crypto: add rsa pss support for x509
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
[PATCH v2] integrity: Add declarations to init_once void arguments.
From
: Jiele Zhao <unclexiaole@xxxxxxxxx>
[PATCH 2/2] certs: Add support for using elliptic curve keys for signing modules
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH 1/2] certs: Trigger recreation of module signing key if it's not an RSA key
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH 0/2] Add support for ECDSA-signed kernel modules
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH 2/5] crypto: support rsa-pss encoding
From
: kernel test robot <lkp@xxxxxxxxx>
Re: [PATCH 1/5] x509: add support for rsa-pss
From
: kernel test robot <lkp@xxxxxxxxx>
[PATCH] rsa: add pss encoding support
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
[PATCH 5/5] ima: add support for rsa pss verification
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
[PATCH 4/5] crypto: ecdsa ima support
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
[PATCH 3/5] crypto: add rsa pss test vector
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
[PATCH 2/5] crypto: support rsa-pss encoding
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
[PATCH 1/5] x509: add support for rsa-pss
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
[PATCH 0/5] crypto: add rsa pss support for x509
From
: Hongbo Li <herbert.tencent@xxxxxxxxx>
Re: [PATCH v3 3/3] ima: enable loading of build time generated key on .ima keyring
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v3 2/3] ima: enable signing of modules with build time generated key
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: "Serge E. Hallyn" <serge@xxxxxxxxxx>
Question about the available tests for IMA apprise
From
: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Richard Weinberger <richard@xxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Richard Weinberger <richard@xxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Richard Weinberger <richard@xxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: David Howells <dhowells@xxxxxxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Richard Weinberger <richard@xxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Richard Weinberger <richard@xxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Richard Weinberger <richard@xxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Richard Weinberger <richard@xxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Richard Weinberger <richard@xxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Richard Weinberger <richard@xxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Richard Weinberger <richard.weinberger@xxxxxxxxx>
Re: [PATCH v3 1/3] keys: cleanup build time module signing keys
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] IMA: Fix error in comment
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH] ima: Fix function name error in comment.
From
: Jiele Zhao <unclexiaole@xxxxxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Richard Weinberger <richard.weinberger@xxxxxxxxx>
Re: [PATCH v1 0/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Richard Weinberger <richard.weinberger@xxxxxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Richard Weinberger <richard.weinberger@xxxxxxxxx>
[PATCH v3 0/3] ima: kernel build support for loading the kernel module signing key
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v3 3/3] ima: enable loading of build time generated key on .ima keyring
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v3 2/3] ima: enable signing of modules with build time generated key
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v3 1/3] keys: cleanup build time module signing keys
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
[PATCH] IMA: Fix error in comment
From
: Ricardo Ribalda <ribalda@xxxxxxxxxxxx>
Re: Bug: TPM returned invalid status
From
: Kees Cook <keescook@xxxxxxxxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
Re: [PATCH v1 3/3] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys
From
: David Gstir <david@xxxxxxxxxxxxx>
Re: [PATCH v12 00/10] Add support for x509 certs with NIST P384/256/192 keys
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [GIT PULL] integrity subsystem fix for v5.12
From
: pr-tracker-bot@xxxxxxxxxx
[GIT PULL] integrity subsystem fix for v5.12
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]