Linux Integrity
[Prev Page][Next Page]
- Re: [PATCH] selinux: measure state and policy capabilities
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v15 10/10] arm64: Add IMA log information in kimage used for kexec
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH] vio: make remove callback return void
- From: Uwe Kleine-König <uwe@xxxxxxxxxxxxxxxxx>
- [PATCH v15 5/5] security: keys: trusted: Make sealed key properly interoperable
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v15 4/5] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v15 3/5] security: keys: trusted: fix TPM2 authorizations
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v15 2/5] oid_registry: Add TCG defined OIDS for TPM keys
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v15 1/5] lib: add ASN.1 encoder
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v15 0/5] TPM 2.0 trusted key rework
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v15 09/10] arm64: Call kmalloc() to allocate DTB buffer
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v15 10/10] arm64: Add IMA log information in kimage used for kexec
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v15 10/10] arm64: Add IMA log information in kimage used for kexec
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: Bug: TPM returned invalid status
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v15 10/10] arm64: Add IMA log information in kimage used for kexec
- From: Will Deacon <will@xxxxxxxxxx>
- Re: Bug: TPM returned invalid status
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v15 09/10] arm64: Call kmalloc() to allocate DTB buffer
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: Bug: TPM returned invalid status
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v15 10/10] arm64: Add IMA log information in kimage used for kexec
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v15 10/10] arm64: Add IMA log information in kimage used for kexec
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v15 09/10] arm64: Call kmalloc() to allocate DTB buffer
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH 3/4] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- AW: TPM V2: kernel panic on linux reboot
- From: "florian.manoel@xxxxxxxxxxx" <florian.manoel@xxxxxxxxxxx>
- Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 00/40] idmapped mounts
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v6 23/40] exec: handle idmapped mounts
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [PATCH v24 10/25] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4] IMA: Measure kernel version in early boot
- From: Raphael Gianotti <raphgi@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
- From: "Tj (Elloe Linux)" <ml.linux@elloe.vision>
- [PATCH v24 15/25] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v24 11/25] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2] tpm: ibmvtpm: fix error return code in tpm_ibmvtpm_probe()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3] IMA: Measure kernel version in early boot
- From: Raphael Gianotti <raphgi@xxxxxxxxxxxxxxxxxxx>
- [PATCH v24 05/25] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v24 13/25] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v24 12/25] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3] IMA: Measure kernel version in early boot
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
- From: Łukasz Majczak <lma@xxxxxxxxxxxx>
- Re: [PATCH 3/4] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 23/40] exec: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v6 23/40] exec: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH v6 23/40] exec: handle idmapped mounts
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v6 23/40] exec: handle idmapped mounts
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Bug: TPM returned invalid status
- From: "Tj (Elloe Linux)" <ml.linux@elloe.vision>
- Re: [PATCH v6 05/39] namei: make permission helpers idmapped mount aware
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v6 05/39] namei: make permission helpers idmapped mount aware
- From: "J. Bruce Fields" <bfields@xxxxxxxxxxxx>
- Re: [PATCH] selinux: measure state and policy capabilities
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH v2] IMA: Measure kernel version in early boot
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: include a consumer of the new IMA critical data hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 05/39] namei: make permission helpers idmapped mount aware
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
- From: Lukasz Majczak <lma@xxxxxxxxxxxx>
- [PATCH v2] IMA: Measure kernel version in early boot
- From: Raphael Gianotti <raphgi@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] ima: Free IMA measurement buffer after kexec syscall
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] ima: Free IMA measurement buffer on error
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v6 05/39] namei: make permission helpers idmapped mount aware
- From: bfields@xxxxxxxxxxxx (J. Bruce Fields)
- Re: [PATCH] selinux: measure state and policy capabilities
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: include a consumer of the new IMA critical data hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] dm crypt: support using trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/2] dm crypt: support using trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 20/40] init: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v6 16/40] open: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH 2/2] dm crypt: support using trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 35/40] fs: introduce MOUNT_ATTR_IDMAP
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v6 35/40] fs: introduce MOUNT_ATTR_IDMAP
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v6 15/40] open: handle idmapped mounts in do_truncate()
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 2/2] dm crypt: support using trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v6 28/40] overlayfs: do not mount on top of idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 27/40] ecryptfs: do not mount on top of idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 23/40] exec: handle idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 21/40] ioctl: handle idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 19/40] fcntl: handle idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 18/40] utimes: handle idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 17/40] af_unix: handle idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 16/40] open: handle idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 12/40] namei: handle idmapped mounts in may_*() helpers
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 11/40] stat: handle idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 10/40] commoncap: handle idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 09/40] xattr: handle idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 06/40] inode: make init and permission helpers idmapped mount aware
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 05/39] namei: make permission helpers idmapped mount aware
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 04/40] capability: handle idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 03/40] fs: add file and path permissions helpers
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH] selinux: measure state and policy capabilities
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 05/39] namei: make permission helpers idmapped mount aware
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 2/2] ima: Free IMA measurement buffer after kexec syscall
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] ima: Free IMA measurement buffer on error
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] ima: Free IMA measurement buffer after kexec syscall
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] ima: Free IMA measurement buffer on error
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 04/10] certs: Fix blacklist flag type confusion
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 05/10] certs: Replace K{U,G}IDT_INIT() with GLOBAL_ROOT_{U,G}ID
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 03/10] certs: Fix blacklisted hexadecimal hash string check
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 07/10] certs/blacklist: fix kernel doc interface issue
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 06/10] certs: Make blacklist_vet_description() more strict
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 08/10] certs: Factor out the blacklist hash creation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Jerome Forissier <jerome@xxxxxxxxxxxxx>
- [PATCH v4 01/10] tools/certs: Add print-cert-tbs-hash.sh
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 10/10] certs: Allow root user to append signed hashes to the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 09/10] PKCS#7: Fix missing include
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 00/10] Enable root to update the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 02/10] certs: Check that builtin blacklist hashes are valid
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v6 00/40] idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 02/40] fs: add id translation helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 01/40] mount: attach mappings to mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 03/40] fs: add file and path permissions helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 04/40] capability: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 09/40] xattr: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 06/40] inode: make init and permission helpers idmapped mount aware
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 07/40] attr: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 16/40] open: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 15/40] open: handle idmapped mounts in do_truncate()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v6 30/40] mount: make {lock,unlock}_mount_hash() static
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 12/40] namei: handle idmapped mounts in may_*() helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 13/40] namei: introduce struct renamedata
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 08/10] certs: Check that builtin blacklist hashes are valid
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v6 38/40] ext4: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 20/40] init: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v6 26/39] ima: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 33/40] fs: add attr_flags_to_mnt_flags helper
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 28/40] overlayfs: do not mount on top of idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 31/40] namespace: only take read lock in do_reconfigure_mnt()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 25/40] apparmor: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 21/40] ioctl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 39/40] xfs: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 34/40] fs: add mount_setattr()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 23/40] exec: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 22/40] would_dump: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 35/40] fs: introduce MOUNT_ATTR_IDMAP
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 29/40] namespace: take lock_mount_hash() directly when changing flags
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 36/40] tests: add mount_setattr() selftests
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 37/40] fat: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 32/40] fs: split out functions to hold writers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 27/40] ecryptfs: do not mount on top of idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 18/40] utimes: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 19/40] fcntl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 14/40] namei: prepare for idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 17/40] af_unix: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 11/40] stat: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 10/40] commoncap: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 08/40] acl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 08/10] certs: Check that builtin blacklist hashes are valid
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Jerome Forissier <jerome@xxxxxxxxxxxxx>
- Re: [PATCH v3 02/10] certs: Fix blacklisted hexadecimal hash string check
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 04/10] certs: Fix blacklist flag type confusion
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 05/10] certs: Replace K{U,G}IDT_INIT() with GLOBAL_ROOT_{U,G}ID
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 08/10] certs: Check that builtin blacklist hashes are valid
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] doc: trusted-encrypted: updates with TEE as a new trust source (update)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] doc: trusted-encrypted: updates with TEE as a new trust source (update)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v3 02/10] certs: Fix blacklisted hexadecimal hash string check
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3 05/10] certs: Replace K{U,G}IDT_INIT() with GLOBAL_ROOT_{U,G}ID
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3 06/10] certs: Make blacklist_vet_description() more strict
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3 09/10] certs: Allow root user to append signed hashes to the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v5 15/42] fs: add file_user_ns() helper
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 08/10] certs: Check that builtin blacklist hashes are valid
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3 04/10] certs: Fix blacklist flag type confusion
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v3 09/10] certs: Allow root user to append signed hashes to the blacklist keyring
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 08/10] certs: Check that builtin blacklist hashes are valid
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 05/10] certs: Replace K{U,G}IDT_INIT() with GLOBAL_ROOT_{U,G}ID
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 06/10] certs: Make blacklist_vet_description() more strict
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm/tpm_tis: Fix variable reset during IRQ probing
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 04/10] certs: Fix blacklist flag type confusion
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 03/10] PKCS#7: Fix missing include
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 02/10] certs: Fix blacklisted hexadecimal hash string check
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 01/10] certs/blacklist: fix kernel doc interface issue
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 05/13] x86: Add early TPM1.2/TPM2.0 interface support for Secure Launch
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 13/42] attr: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 11/42] namei: make permission helpers idmapped mount aware
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 23/42] open: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 18/42] stat: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 17/42] commoncap: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 15/42] fs: add file_user_ns() helper
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 24/42] af_unix: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 32/42] fs: make helpers idmap mount aware
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 40/42] fs: introduce MOUNT_ATTR_IDMAP
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v5 15/42] fs: add file_user_ns() helper
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v5 23/42] open: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v5 40/42] fs: introduce MOUNT_ATTR_IDMAP
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 30/42] would_dump: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 31/42] exec: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 29/42] ioctl: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 27/42] notify: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 26/42] fcntl: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 25/42] utimes: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 22/42] open: handle idmapped mounts in do_truncate()
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 21/42] namei: prepare for idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 20/42] namei: introduce struct renamedata
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 19/42] namei: handle idmapped mounts in may_*() helpers
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 16/42] xattr: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 14/42] acl: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 12/42] inode: make init and permission helpers idmapped mount aware
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 10/42] capability: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 09/42] mount: attach mappings to mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH] doc: trusted-encrypted: updates with TEE as a new trust source (update)
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v5 37/42] xfs: support idmapped mounts
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: TPM V2: kernel panic on linux reboot
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 3/4] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/4] tpm: fix reference counting for struct tpm_chip
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/4] tpm: in case of error properly cleanup in tpmm_chip_alloc
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v15 09/10] arm64: Call kmalloc() to allocate DTB buffer
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 3/4] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH 2/4] tpm: fix reference counting for struct tpm_chip
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH 1/4] tpm: in case of error properly cleanup in tpmm_chip_alloc
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH 4/4] tpm: Provide a function tpm_chip_free() to free tpm chips
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH 0/4] TPM fixes
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH v5 00/42] idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH] doc: trusted-encrypted: updates with TEE as a new trust source (update)
- From: Elaine Palmer <erpalmerny@xxxxxxxxx>
- Re: [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 00/42] idmapped mounts
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- [PATCH v15 07/10] kexec: Use fdt_appendprop_addrrange() to add ima buffer to FDT
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v15 05/10] ima: Move arch_ima_add_kexec_buffer() to ima
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v15 06/10] powerpc: Move arch independent ima kexec functions to drivers/of/kexec.c
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v15 10/10] arm64: Add IMA log information in kimage used for kexec
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v15 08/10] powerpc: Delete unused function delete_fdt_mem_rsv()
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v15 00/10] Carry forward IMA measurement log on kexec on ARM64
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v15 09/10] arm64: Call kmalloc() to allocate DTB buffer
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v15 02/10] of: Add a common kexec FDT setup function
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v15 04/10] powerpc: Use common of_kexec_setup_new_fdt()
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v15 03/10] arm64: Use common of_kexec_setup_new_fdt()
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v15 01/10] powerpc: Rename kexec elfcorehdr_addr to elf_headers_mem
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 0/8] IMA: support for measuring kernel integrity critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 00/42] idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 37/42] xfs: support idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH v3 09/10] certs: Allow root user to append signed hashes to the blacklist keyring
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 0/8] IMA: support for measuring kernel integrity critical data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 00/10] Enable root to update the blacklist keyring
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm/tpm_tis: Fix variable reset during IRQ probing
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: evmctl import -EPERM in initrd (dracut), but works after system boot
- From: Mikhail Novosyolov <m.novosyolov@xxxxxxxxxxxx>
- AW: TPM V2: kernel panic on linux reboot
- From: "florian.manoel@xxxxxxxxxxx" <florian.manoel@xxxxxxxxxxx>
- Re: [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 2/2] ABI: add sysfs description for tpm exports of PCR registers
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 37/42] xfs: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v5 00/42] idmapped mounts
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH v5 37/42] xfs: support idmapped mounts
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: include a consumer of the new IMA critical data hook
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: include a consumer of the new IMA critical data hook
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: include a consumer of the new IMA critical data hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH] selinux: include a consumer of the new IMA critical data hook
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 5/8] IMA: limit critical data measurement based on a label
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 00/42] idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 00/42] idmapped mounts
- From: "Darrick J. Wong" <djwong@xxxxxxxxxx>
- Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 05/10] certs: Replace K{U,G}IDT_INIT() with GLOBAL_ROOT_{U,G}ID
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 03/10] PKCS#7: Fix missing include
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 00/10] Enable root to update the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 01/10] certs/blacklist: fix kernel doc interface issue
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 09/10] certs: Allow root user to append signed hashes to the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 07/10] certs: Factor out the blacklist hash creation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 06/10] certs: Make blacklist_vet_description() more strict
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 04/10] certs: Fix blacklist flag type confusion
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 02/10] certs: Fix blacklisted hexadecimal hash string check
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 10/10] tools/certs: Add print-cert-tbs-hash.sh
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 08/10] certs: Check that builtin blacklist hashes are valid
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH v2 0/5] Enable root to update the blacklist keyring
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm/tpm_tis: Fix variable reset during IRQ probing
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm/tpm_tis: Fix variable reset during IRQ probing
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v10 5/8] IMA: limit critical data measurement based on a label
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v5 2/2] ABI: add sysfs description for tpm exports of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v5 0/2] add sysfs exports for TPM 2 PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v5 0/2] add sysfs exports for TPM 2 PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] doc: trusted-encrypted: updates with TEE as a new trust source (update)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 0/1] add sysfs exports for TPM 2 PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/1] add sysfs exports for TPM 2 PCR registers
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] [v2] evm: Fix memleak in init_desc
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: evmctl import -EPERM in initrd (dracut), but works after system boot
- From: Mikhail Novosyolov <m.novosyolov@xxxxxxxxxxxx>
- evmctl import -EPERM in initrd (dracut), but works after system boot
- From: Mikhail Novosyolov <m.novosyolov@xxxxxxxxxxxx>
- [PATCH] tpm/tpm_tis: Fix variable reset during IRQ probing
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v5 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH v5 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH v14 6/6] arm64: Add IMA log information in kimage used for kexec
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v14 4/6] powerpc: Delete unused functions
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v14 2/6] powerpc: Move arch independent ima kexec functions to drivers/of/kexec.c
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v5 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v5 0/1] add sysfs exports for TPM 2 PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 41/42] tests: extend mount_setattr tests
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v14 4/6] powerpc: Delete unused functions
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v14 6/6] arm64: Add IMA log information in kimage used for kexec
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v14 4/6] powerpc: Delete unused functions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v14 6/6] arm64: Add IMA log information in kimage used for kexec
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] IMA: Add test for dm-crypt measurement
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v5 29/42] ioctl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 26/42] fcntl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 33/42] apparmor: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 23/42] open: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 22/42] open: handle idmapped mounts in do_truncate()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 38/42] ecryptfs: do not mount on top of idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 35/42] fat: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 30/42] would_dump: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 34/42] ima: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 21/42] namei: prepare for idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: IMA appraisal with TPMv2?
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- [PATCH v5 41/42] tests: extend mount_setattr tests
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 39/42] overlayfs: do not mount on top of idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 27/42] notify: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 20/42] namei: introduce struct renamedata
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 24/42] af_unix: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 40/42] fs: introduce MOUNT_ATTR_IDMAP
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 13/42] attr: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 15/42] fs: add file_user_ns() helper
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 36/42] ext4: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 01/42] namespace: take lock_mount_hash() directly when changing flags
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 37/42] xfs: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 31/42] exec: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 18/42] stat: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 25/42] utimes: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 16/42] xattr: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 28/42] init: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 02/42] mount: make {lock,unlock}_mount_hash() static
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 19/42] namei: handle idmapped mounts in may_*() helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 14/42] acl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 17/42] commoncap: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 12/42] inode: make init and permission helpers idmapped mount aware
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 11/42] namei: make permission helpers idmapped mount aware
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 08/42] fs: add id translation helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 06/42] fs: add mount_setattr()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 10/42] capability: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 07/42] tests: add mount_setattr() selftests
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 09/42] mount: attach mappings to mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 00/42] idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 04/42] fs: split out functions to hold writers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 05/42] fs: add attr_flags_to_mnt_flags helper
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 03/42] namespace: only take read lock in do_reconfigure_mnt()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v14 0/6] Carry forward IMA measurement log on kexec on ARM64
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v14 0/6] Carry forward IMA measurement log on kexec on ARM64
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v14 0/6] Carry forward IMA measurement log on kexec on ARM64
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v14 0/6] Carry forward IMA measurement log on kexec on ARM64
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH AUTOSEL 5.7 03/30] ima: extend boot_aggregate with kernel measurements
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH AUTOSEL 5.7 03/30] ima: extend boot_aggregate with kernel measurements
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v14 0/6] Carry forward IMA measurement log on kexec on ARM64
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [RFC PATCH 3/4] arm64: Use common of_kexec_setup_new_fdt()
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH] doc: trusted-encrypted: updates with TEE as a new trust source (update)
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] evm: Fix memory leak in init_desc
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- evmctl and pkcs#11
- From: Christian Schaubschläger <christian.schaubschlaeger@xxxxxx>
- [PATCH] [v2] evm: Fix memleak in init_desc
- From: Dinghao Liu <dinghao.liu@xxxxxxxxxx>
- Re: Re: Re: [PATCH] evm: Fix memleak in init_desc
- From: dinghao.liu@xxxxxxxxxx
- Re: Re: [PATCH] evm: Fix memleak in init_desc
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: Re: [PATCH] evm: Fix memleak in init_desc
- From: dinghao.liu@xxxxxxxxxx
- Re: [PATCH v2 0/5] Enable root to update the blacklist keyring
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] doc: trusted-encrypted: updates with TEE as a new trust source (update)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] doc: trusted-encrypted: updates with TEE as a new trust source (update)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] evm: Fix memleak in init_desc
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] evm: Fix memleak in init_desc
- From: Dinghao Liu <dinghao.liu@xxxxxxxxxx>
- Re: [RFC] Persist ima logs to disk
- From: Raphael Gianotti <raphgi@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Persist ima logs to disk
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v10 7/8] IMA: define a builtin critical data measurement policy
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 6/8] IMA: extend critical data hook to limit the measurement based on a label
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 5/8] IMA: limit critical data measurement based on a label
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 1/8] IMA: generalize keyring specific measurement constructs
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 4/8] IMA: add policy rule to measure critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 3/8] IMA: define a hook to measure kernel integrity critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 2/8] IMA: add support to measure buffer data hash
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 0/8] IMA: support for measuring kernel integrity critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Persist ima logs to disk
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC] Persist ima logs to disk
- From: Raphael Gianotti <raphgi@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Persist ima logs to disk
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Persist ima logs to disk
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC] Persist ima logs to disk
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Persist ima logs to disk
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC] Persist ima logs to disk
- From: Raphael Gianotti <raphgi@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Persist ima logs to disk
- From: Raphael Gianotti <raphgi@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Persist ima logs to disk
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Persist ima logs to disk
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: [PATCH 1/2] Fix sign_hash not observing the hashalgo argument
- From: Patrick Uiterwijk <patrick@xxxxxxxxxxxxxx>
- Re: [RFC] Persist ima logs to disk
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] Add test for using sign_hash API
- From: Patrick Uiterwijk <patrick@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] Fix sign_hash not observing the hashalgo argument
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] Fix sign_hash not observing the hashalgo argument
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH 1/2] Fix sign_hash not observing the hashalgo argument
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH 2/2] Add test for using sign_hash API
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH 2/2] Add test for using sign_hash API
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] Fix sign_hash not observing the hashalgo argument
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] travis: Use Ubuntu 20.10 groovy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- IMA appraisal with TPMv2?
- From: "Chang, Clay (HPS OE-Linux TDC)" <clayc@xxxxxxx>
- [PATCH 1/2] Fix sign_hash not observing the hashalgo argument
- From: Patrick Uiterwijk <patrick@xxxxxxxxxxxxxx>
- [PATCH 2/2] Add test for using sign_hash API
- From: Patrick Uiterwijk <patrick@xxxxxxxxxxxxxx>
- [PATCH 0/2] ima-evm-utils: Fix use of sign_hash via API
- From: Patrick Uiterwijk <patrick@xxxxxxxxxxxxxx>
- Re: [PATCH v9 2/8] IMA: add support to measure buffer data hash
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 7/8] IMA: define a builtin critical data measurement policy
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 5/8] IMA: limit critical data measurement based on a label
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 3/8] IMA: define a hook to measure kernel integrity critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 3/8] IMA: define a hook to measure kernel integrity critical data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 4/8] IMA: add policy rule to measure critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 3/8] IMA: define a hook to measure kernel integrity critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [RFC] Persist ima logs to disk
- From: Raphael Gianotti <raphgi@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 2/8] IMA: add support to measure buffer data hash
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 1/8] IMA: generalize keyring specific measurement constructs
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH ima-evm-utils] travis: Use Ubuntu 20.10 groovy
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2 0/5] Enable root to update the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH -next] tpm: Use kzalloc for allocating only one thing
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v9 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v14 3/5] security: keys: trusted: fix TPM2 authorizations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v14 6/6] arm64: Add IMA log information in kimage used for kexec
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v14 5/6] arm64: Free DTB buffer if fdt_open_into() fails
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v14 3/6] kexec: Use fdt_appendprop_addrrange() to add ima buffer to FDT
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v14 2/6] powerpc: Move arch independent ima kexec functions to drivers/of/kexec.c
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v14 4/6] powerpc: Delete unused functions
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v14 0/6] Carry forward IMA measurement log on kexec on ARM64
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v14 1/6] ima: Move arch_ima_add_kexec_buffer() to ima
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V2] tpm: Remove tpm_dev_wq_lock
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] doc: trusted-encrypted: updates with TEE as a new trust source (update)
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH] doc: trusted-encrypted: updates with TEE as a new trust source (update)
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: possible deadlock in process_measurement (2)
- From: syzbot <syzbot+18a1619cceea30ed45af@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] tpm_tis: Clean up locality release
- From: Laurent Bigonville <bigon@xxxxxxxxxx>
- Re: [PATCH v13 2/6] powerpc: Move arch independent ima kexec functions to drivers/of/kexec.c
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH -next] tpm: Use kzalloc for allocating only one thing
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH -next] tpm: Use kzalloc for allocating only one thing
- From: Zheng Yongjun <zhengyongjun3@xxxxxxxxxx>
- Re: [PATCH AUTOSEL 5.7 03/30] ima: extend boot_aggregate with kernel measurements
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH AUTOSEL 5.7 03/30] ima: extend boot_aggregate with kernel measurements
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: Security module stacking patches review
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Security module stacking patches review
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 7/8] IMA: define a builtin critical data measurement policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 5/8] IMA: limit critical data measurement based on a label
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 4/8] IMA: add policy rule to measure critical data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 1/8] IMA: generalize keyring specific measurement constructs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 3/8] IMA: define a hook to measure kernel integrity critical data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 2/8] IMA: add support to measure buffer data hash
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v14 3/5] security: keys: trusted: fix TPM2 authorizations
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v13 2/6] powerpc: Move arch independent ima kexec functions to drivers/of/kexec.c
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH RESEND v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH v13 4/6] powerpc: Delete unused function delete_fdt_mem_rsv()
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v13 2/6] powerpc: Move arch independent ima kexec functions to drivers/of/kexec.c
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v13 2/6] powerpc: Move arch independent ima kexec functions to drivers/of/kexec.c
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v13 2/6] powerpc: Move arch independent ima kexec functions to drivers/of/kexec.c
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v13 6/6] arm64: Add IMA log information in kimage used for kexec
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v13 5/6] arm64: Free DTB buffer if fdt_open_into() fails
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v13 4/6] powerpc: Delete unused function delete_fdt_mem_rsv()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v13 3/6] kexec: Use fdt_appendprop_addrrange() to add ima buffer to FDT
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v13 2/6] powerpc: Move arch independent ima kexec functions to drivers/of/kexec.c
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v13 2/6] powerpc: Move arch independent ima kexec functions to drivers/of/kexec.c
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v13 2/6] powerpc: Move arch independent ima kexec functions to drivers/of/kexec.c
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [RFC PATCH 4/4] powerpc: Use common of_kexec_setup_new_fdt()
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v14 3/5] security: keys: trusted: fix TPM2 authorizations
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH v13 1/6] ima: Move arch_ima_add_kexec_buffer() to ima
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [RFC PATCH 4/4] powerpc: Use common of_kexec_setup_new_fdt()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [RFC PATCH 3/4] arm64: Use common of_kexec_setup_new_fdt()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [RFC PATCH 2/4] of: Add a common kexec FDT setup function
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] powerpc: Rename kexec elfcorehdr_addr to elf_headers_mem
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v1 1/1] ima: Add test for selinux measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v13 2/6] powerpc: Move arch independent ima kexec functions to drivers/of/kexec.c
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 1/1] ima: Add test for selinux measurement
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v13 2/6] powerpc: Move arch independent ima kexec functions to drivers/of/kexec.c
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v13 2/6] powerpc: Move arch independent ima kexec functions to drivers/of/kexec.c
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 1/1] ima: Add test for selinux measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v13 2/6] powerpc: Move arch independent ima kexec functions to drivers/of/kexec.c
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v13 1/6] ima: Move arch_ima_add_kexec_buffer() to ima
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: ibmvtpm: fix error return code in tpm_ibmvtpm_probe()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] IMA: generalize key measurement tests
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v2] security: ima: delete a repeated word in comments
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH v13 6/6] arm64: Add IMA log information in kimage used for kexec
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v13 5/6] arm64: Free DTB buffer if fdt_open_into() fails
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v13 0/6] Carry forward IMA measurement log on kexec on ARM64
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v13 4/6] powerpc: Delete unused function delete_fdt_mem_rsv()
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v13 3/6] kexec: Use fdt_appendprop_addrrange() to add ima buffer to FDT
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v13 2/6] powerpc: Move arch independent ima kexec functions to drivers/of/kexec.c
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v13 1/6] ima: Move arch_ima_add_kexec_buffer() to ima
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 1/1] ima: Add test for selinux measurement
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v12 2/4] powerpc: Move arch independent ima kexec functions to drivers/of/kexec.c
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v5 1/4] IMA: Move get_algorithm_digest(), set_digest_index() to ima_setup.sh
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 0/4] TPM 2.0 fixes in IMA tests
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v5 1/4] IMA: Move get_algorithm_digest(), set_digest_index() to ima_setup.sh
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v12 2/4] powerpc: Move arch independent ima kexec functions to drivers/of/kexec.c
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v12 2/4] powerpc: Move arch independent ima kexec functions to drivers/of/kexec.c
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v12 2/4] powerpc: Move arch independent ima kexec functions to drivers/of/kexec.c
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v2] tpm: Rework open/close/shutdown to avoid races
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v12 2/4] powerpc: Move arch independent ima kexec functions to drivers/of/kexec.c
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v12 2/4] powerpc: Move arch independent ima kexec functions to drivers/of/kexec.c
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v5 3/4] ima_tpm.sh: Fix calculating boot aggregate
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v5 0/4] TPM 2.0 fixes in IMA tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 4/4] ima_tpm.sh: Fix calculating PCR aggregate
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v12 4/4] arm64: Add IMA log information in kimage used for kexec
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v12 3/4] arm64: Free DTB buffer if fdt_open_into() fails
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v12 2/4] powerpc: Move arch independent ima kexec functions to drivers/of/kexec.c
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v12 1/4] powerpc: Use fdt_appendprop_addrrange() to add ima buffer to FDT
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/4] ima_tpm.sh: Fix calculating boot aggregate
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v12 0/4] Carry forward IMA measurement log on kexec on ARM64
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v12 4/4] arm64: Add IMA log information in kimage used for kexec
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v12 2/4] powerpc: Move arch independent ima kexec functions to drivers/of/kexec.c
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v12 3/4] arm64: Free DTB buffer if fdt_open_into() fails
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v12 1/4] powerpc: Use fdt_appendprop_addrrange() to add ima buffer to FDT
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v12 0/4] Carry forward IMA measurement log on kexec on ARM64
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/4] IMA: Move get_algorithm_digest(), set_digest_index() to ima_setup.sh
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 0/4] TPM 2.0 fixes in IMA tests
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v5 0/4] TPM 2.0 fixes in IMA tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [GIT PULL] integrity subsystem updates for v5.11
- From: pr-tracker-bot@xxxxxxxxxx
- Security module stacking patches review
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v11 2/8] powerpc: Move ima buffer functions to drivers/of/kexec.c
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Rework open/close/shutdown to avoid races
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v11 2/8] powerpc: Move ima buffer functions to drivers/of/kexec.c
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v2] tpm: Rework open/close/shutdown to avoid races
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v2] tpm: Rework open/close/shutdown to avoid races
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v2] tpm: Rework open/close/shutdown to avoid races
- From: Sergey Temerkhanov <s.temerkhanov@xxxxxxxxx>
- [GIT PULL] integrity subsystem updates for v5.11
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: ignore failed selftest in probe
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v5 4/4] ima_tpm.sh: Fix calculating PCR aggregate
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v5 3/4] ima_tpm.sh: Fix calculating boot aggregate
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v5 2/4] IMA: Rewrite ima_boot_aggregate.c to new API
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v5 1/4] IMA: Move get_algorithm_digest(), set_digest_index() to ima_setup.sh
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v5 0/4] TPM 2.0 fixes in IMA tests
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH V2] tpm: Remove tpm_dev_wq_lock
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- [PATCH v11 2/8] powerpc: Move ima buffer functions to drivers/of/kexec.c
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v11 1/8] powerpc: Fix compiler warnings and errors
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v11 0/8] Carry forward IMA measurement log on kexec on ARM64
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v11 4/8] powerpc: Move remove_ima_buffer() to drivers/of/kexec.c
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v11 3/8] powerpc: Use ima kexec node functions
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH ima-evm-utils] pcr_tsspcrread: Add missing new line
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v11 8/8] arm64: Add IMA log information in kimage used for kexec
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v11 6/8] powerpc: Move arch_ima_add_kexec_buffer to ima
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v11 7/8] arm64: Free DTB buffer if fdt_open_into() fails
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v11 5/8] powerpc: Move ima_get_kexec_buffer() and ima_free_kexec_buffer() to ima
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: ignore failed selftest in probe
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH AUTOSEL 5.7 03/30] ima: extend boot_aggregate with kernel measurements
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6] char: tpm: add i2c driver for cr50
- From: Adrian Ratiu <adrian.ratiu@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: ignore failed selftest in probe
- From: Dafna Hirschfeld <dafna.hirschfeld@xxxxxxxxxxxxx>
- Re: [PATCH AUTOSEL 5.7 03/30] ima: extend boot_aggregate with kernel measurements
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 5/8] IMA: limit critical data measurement based on a label
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 4/8] IMA: add policy rule to measure critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 5/8] IMA: limit critical data measurement based on a label
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 4/8] IMA: add policy rule to measure critical data
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 4/8] IMA: add policy rule to measure critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 7/8] IMA: define a builtin critical data measurement policy
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 6/8] IMA: extend critical data hook to limit the measurement based on a label
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 5/8] IMA: limit critical data measurement based on a label
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 3/8] IMA: define a hook to measure kernel integrity critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 0/8] IMA: support for measuring kernel integrity critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 1/8] IMA: generalize keyring specific measurement constructs
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 2/8] IMA: add support to measure buffer data hash
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 4/8] IMA: add policy rule to measure critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 4/4] powerpc: Use common of_kexec_setup_new_fdt()
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 3/4] arm64: Use common of_kexec_setup_new_fdt()
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 4/8] IMA: add policy rule to measure critical data
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/4] of: Add a common kexec FDT setup function
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/4] of: Add a common kexec FDT setup function
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v10 2/8] powerpc: Move delete_fdt_mem_rsv() to drivers/of/kexec.c
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [RFC PATCH 2/4] of: Add a common kexec FDT setup function
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 4/8] IMA: add policy rule to measure critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] powerpc: Rename kexec elfcorehdr_addr to elf_headers_mem
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 4/8] IMA: add policy rule to measure critical data
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 3/8] IMA: define a hook to measure kernel integrity critical data
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 2/8] IMA: add support to measure buffer data hash
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 1/8] IMA: generalize keyring specific measurement constructs
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 7/8] IMA: define a builtin critical data measurement policy
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 6/8] IMA: extend critical data hook to limit the measurement based on a label
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 5/8] IMA: limit critical data measurement based on a label
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 0/8] IMA: support for measuring kernel integrity critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 2/8] IMA: add support to measure buffer data hash
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 4/8] IMA: add policy rule to measure critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 1/8] IMA: generalize keyring specific measurement constructs
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 3/8] IMA: define a hook to measure kernel integrity critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH 3/4] arm64: Use common of_kexec_setup_new_fdt()
- From: Rob Herring <robh@xxxxxxxxxx>
- [RFC PATCH 4/4] powerpc: Use common of_kexec_setup_new_fdt()
- From: Rob Herring <robh@xxxxxxxxxx>
- [RFC PATCH 2/4] of: Add a common kexec FDT setup function
- From: Rob Herring <robh@xxxxxxxxxx>
- [RFC PATCH 1/4] powerpc: Rename kexec elfcorehdr_addr to elf_headers_mem
- From: Rob Herring <robh@xxxxxxxxxx>
- [RFC PATCH 0/4] Kexec FDT setup consolidation
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v10 2/8] powerpc: Move delete_fdt_mem_rsv() to drivers/of/kexec.c
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 4/5] certs: Allow root user to append signed hashes to the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v2 5/5] tools/certs: Add print-cert-tbs-hash.sh
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v2 0/5] Enable root to update the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v2 2/5] certs: Factor out the blacklist hash creation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v2 1/5] certs: Make blacklist_vet_description() more strict
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v2 3/5] certs: Check that builtin blacklist hashes are valid
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v1 2/9] certs: Make blacklist_vet_description() more strict
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v1 4/9] certs: Check that builtin blacklist hashes are valid
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v10 2/8] powerpc: Move delete_fdt_mem_rsv() to drivers/of/kexec.c
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: ignore failed selftest in probe
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH AUTOSEL 5.7 03/30] ima: extend boot_aggregate with kernel measurements
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 3/8] IMA: define a hook to measure kernel integrity critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: ignore failed selftest in probe
- From: Dafna Hirschfeld <dafna.hirschfeld@xxxxxxxxxxxxx>
- Re: [PATCH v7 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/8] powerpc: Move delete_fdt_mem_rsv() to drivers/of/kexec.c
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 3/4] doc: trusted-encrypted: updates with TEE as a new trust source
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] doc: trusted-encrypted: updates with TEE as a new trust source (update)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Away next week (51)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH AUTOSEL 5.7 03/30] ima: extend boot_aggregate with kernel measurements
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH -next] char/tpm: simplify the return expression of tpm_tis_synquacer_module_init()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [Regression] Can only do S3 once after "tpm: take TPM chip power gating out of tpm_transmit()"
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 3/4] doc: trusted-encrypted: updates with TEE as a new trust source
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v6] char: tpm: add i2c driver for cr50
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] doc: trusted-encrypted: updates with TEE as a new trust source (update)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 5/8] IMA: limit critical data measurement based on a label
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 4/8] IMA: add policy rule to measure critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 3/8] IMA: define a hook to measure kernel integrity critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH AUTOSEL 5.7 03/30] ima: extend boot_aggregate with kernel measurements
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 7/8] IMA: define a builtin critical data measurement policy
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 6/8] IMA: extend critical data hook to limit the measurement based on a label
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 2/8] IMA: add support to measure buffer data hash
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 2/8] IMA: add support to measure buffer data hash
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 1/8] IMA: generalize keyring specific measurement constructs
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 7/8] IMA: define a builtin critical data measurement policy
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 6/8] IMA: extend critical data hook to limit the measurement based on a label
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 5/8] IMA: limit critical data measurement based on a label
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 4/8] IMA: add policy rule to measure critical data
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 1/8] IMA: generalize keyring specific measurement constructs
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 3/8] IMA: define a hook to measure kernel integrity critical data
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 2/8] IMA: add support to measure buffer data hash
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [Intel-gfx] [PATCH v3 2/4] drm/i915/pmu: Use kstat_irqs to get interrupt count
- From: Tvrtko Ursulin <tvrtko.ursulin@xxxxxxxxxxxxxxx>
- Re: [Intel-gfx] [PATCH v3 2/4] drm/i915/pmu: Use kstat_irqs to get interrupt count
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [Intel-gfx] [PATCH v3 2/4] drm/i915/pmu: Use kstat_irqs to get interrupt count
- From: Tvrtko Ursulin <tvrtko.ursulin@xxxxxxxxxxxxxxx>
- Re: [Intel-gfx] [PATCH v3 2/4] drm/i915/pmu: Use kstat_irqs to get interrupt count
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- [PATCH -next] char/tpm: simplify the return expression of tpm_tis_synquacer_module_init()
- From: Zheng Yongjun <zhengyongjun3@xxxxxxxxxx>
- Re: [Intel-gfx] [PATCH v3 2/4] drm/i915/pmu: Use kstat_irqs to get interrupt count
- From: Tvrtko Ursulin <tvrtko.ursulin@xxxxxxxxxxxxxxx>
- Re: [Intel-gfx] [PATCH v3 2/4] drm/i915/pmu: Use kstat_irqs to get interrupt count
- From: Joonas Lahtinen <joonas.lahtinen@xxxxxxxxxxxxxxx>
- Re: [Regression] Can only do S3 once after "tpm: take TPM chip power gating out of tpm_transmit()"
- From: Kai-Heng Feng <kai.heng.feng@xxxxxxxxxxxxx>
- [PATCH v7 4/8] IMA: add policy rule to measure critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 0/8] IMA: support for measuring kernel integrity critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 1/8] IMA: generalize keyring specific measurement constructs
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 3/8] IMA: define a hook to measure kernel integrity critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 7/8] IMA: define a builtin critical data measurement policy
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 2/8] IMA: add support to measure buffer data hash
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 6/8] IMA: extend critical data hook to limit the measurement based on a label
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 5/8] IMA: limit critical data measurement based on a label
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]