Linux Integrity
[Prev Page][Next Page]
- Re: [PATCH v2 2/2] ima: Free IMA measurement buffer after kexec syscall
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] ima: Free IMA measurement buffer on error
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: fix reference counting for struct tpm_chip
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: fix reference counting for struct tpm_chip
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v3 1/2] tpm: fix reference counting for struct tpm_chip
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v3 1/2] tpm: fix reference counting for struct tpm_chip
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v3 1/2] tpm: fix reference counting for struct tpm_chip
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: fix reference counting for struct tpm_chip
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH 1/1] tpm_tis: handle -EPROBE_DEFER in tpm_tis_plat_probe()
- From: Dirk Gouders <dirk@xxxxxxxxxxx>
- [PATCH 0/1] tpm_tis: handle -EPROBE_DEFER in tpm_tis_plat_probe()
- From: Dirk Gouders <dirk@xxxxxxxxxxx>
- Re: [PATCH v3 2/2] tpm: in tpm2_del_space check if ops pointer is still valid
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] ima: Free IMA measurement buffer on error
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] tpm: in tpm2_del_space check if ops pointer is still valid
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] ima-evm-utils: Improve ima_measurement matching on busy system with >1 banks
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] ima: Free IMA measurement buffer on error
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] ima: Free IMA measurement buffer on error
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v3 1/2] tpm: fix reference counting for struct tpm_chip
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH v7 4/4] ima: Support EC keys for signature verification
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: fix reference counting for struct tpm_chip
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: fix reference counting for struct tpm_chip
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH v3 2/2] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- [PATCH v2] tpm_tis_spi_main: set cs_change = 0 when timesout
- From: wanghongzhe <wanghongzhe@xxxxxxxxxx>
- Re: [PATCH v1] tpm_tis_spi_main: set cs_change = 0 when timesout
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: fix reference counting for struct tpm_chip
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v1] tpm_tis_spi_main: set cs_change = 0 when timesout
- From: wanghongzhe <wanghongzhe@xxxxxxxxxx>
- Re: [PATCH v3 2/2] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm/ppi: Constify static struct attribute_group
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: fix reference counting for struct tpm_chip
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: fix reference counting for struct tpm_chip
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: fix reference counting for struct tpm_chip
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] tpm: in tpm2_del_space check if ops pointer is still valid
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v3 2/2] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v3 1/2] tpm: fix reference counting for struct tpm_chip
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v3 0/2] TPM fixes
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH v16 11/12] powerpc: Use OF alloc and free for FDT
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v16 11/12] powerpc: Use OF alloc and free for FDT
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v16 11/12] powerpc: Use OF alloc and free for FDT
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH] tpm/ppi: Constify static struct attribute_group
- From: Rikard Falkeborn <rikard.falkeborn@xxxxxxxxx>
- [PATCH v16 04/12] powerpc: Use common of_kexec_setup_new_fdt()
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v16 11/12] powerpc: Use OF alloc and free for FDT
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH v16 03/12] arm64: Use common of_kexec_setup_new_fdt()
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 00/12] Carry forward IMA measurement log on kexec on ARM64
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v16 10/12] arm64: Use OF alloc and free functions for FDT
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v2 1/2] ima: Free IMA measurement buffer on error
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/2] ima: Free IMA measurement buffer after kexec syscall
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 02/12] of: Add a common kexec FDT setup function
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 11/12] powerpc: Use OF alloc and free for FDT
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 12/12] arm64: Enable passing IMA log to next kernel on kexec
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 08/12] powerpc: Delete unused function delete_fdt_mem_rsv()
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 09/12] of: Define functions to allocate and free FDT
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 06/12] powerpc: Move arch independent ima kexec functions to drivers/of/kexec.c
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 07/12] kexec: Use fdt_appendprop_addrrange() to add ima buffer to FDT
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 05/12] powerpc: Move ima buffer fields to struct kimage
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 10/12] arm64: Use OF alloc and free functions for FDT
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v16 01/12] powerpc: Rename kexec elfcorehdr_addr to elf_headers_mem
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 1/4] crypto: Add support for ECDSA signature verification
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] vio: make remove callback return void
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] ima_evm_utils: Add tests for ECDSA signature checking
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 1/4] crypto: Add support for ECDSA signature verification
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v7 1/4] crypto: Add support for ECDSA signature verification
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/3] tpm: fix reference counting for struct tpm_chip
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC] Persist ima logs to disk
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] ima: Free IMA measurement buffer on error
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] ima: Free IMA measurement buffer after kexec syscall
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH v2 2/3] tpm: Provide a function tpm_chip_free() to free tpm chips
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH v2 1/3] tpm: fix reference counting for struct tpm_chip
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: Jan Lübbe <jlu@xxxxxxxxxxxxxx>
- Re: [PATCH v3] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Lukasz Majczak <lma@xxxxxxxxxxxx>
- Re: [PATCH v3] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Dirk Gouders <dirk@xxxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [RFC] Persist ima logs to disk
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v2 2/3] tpm: Provide a function tpm_chip_free() to free tpm chips
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 3/3] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/3] tpm: fix reference counting for struct tpm_chip
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC] Persist ima logs to disk
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: WARN_ONCE() -> pr_warn_once() in tpm_tis_status()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: WARN_ONCE() -> pr_warn_once() in tpm_tis_status()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: WARN_ONCE() -> pr_warn_once() in tpm_tis_status()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: WARN_ONCE() -> pr_warn_once() in tpm_tis_status()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: WARN_ONCE() -> pr_warn_once() in tpm_tis_status()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2] tpm: WARN_ONCE() -> dev_warn_once() in tpm_tis_status()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2 2/3] tpm: Provide a function tpm_chip_free() to free tpm chips
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v2 1/3] tpm: fix reference counting for struct tpm_chip
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v2 0/3] TPM fixes
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH v2 3/3] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH] tpm: WARN_ONCE() -> pr_warn_once() in tpm_tis_status()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: WARN_ONCE() -> pr_warn_once() in tpm_tis_status()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v4] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Lukasz Majczak <lma@xxxxxxxxxxxx>
- Re: [PATCH v3] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Dirk Gouders <dirk@xxxxxxxxxxx>
- Re: [RFC] Persist ima logs to disk
- From: Raphael Gianotti <raphgi@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: WARN_ONCE() -> pr_warn_once() in tpm_tis_status()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] ima_evm_utils: Add tests for ECDSA signature checking
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: WARN_ONCE() -> pr_warn_once() in tpm_tis_status()
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH] tpm: WARN_ONCE() -> pr_warn_once() in tpm_tis_status()
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v3] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH v5 3/3] KEYS: trusted: Reserve TPM for seal and unseal operations
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: WARN_ONCE() -> pr_warn_once() in tpm_tis_status()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 1/2] ima_evm_utils: Fix calculation of keyid for older distros
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 2/2] ima_evm_utils: Add testing with elliptic curves prime192v1 and 256v1
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 0/2] ima_evm_utils: Add tests for ECDSA signature checking
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Lukasz Majczak <lma@xxxxxxxxxxxx>
- Re: [PATCH 2/2] dm crypt: support using trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH] tpm: WARN_ONCE() -> pr_warn_once() in tpm_tis_status()
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] tpm: WARN_ONCE() -> pr_warn_once() in tpm_tis_status()
- Re: [GIT PULL] tpmdd updates for v5.12-rc1
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC] Persist ima logs to disk
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: Jan Lübbe <jlu@xxxxxxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v5 2/4] x509: Detect sm2 keys by their parameters OID
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v5 2/4] x509: Detect sm2 keys by their parameters OID
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/4] x509: Detect sm2 keys by their parameters OID
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v5 2/4] x509: Detect sm2 keys by their parameters OID
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/4] x509: Detect sm2 keys by their parameters OID
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [RFC] Persist ima logs to disk
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v7 0/4] Add support for x509 certs with NIST p256 and p192 keys
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/4] x509: Detect sm2 keys by their parameters OID
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] ima_evm_utils: Add testing with elliptic curves prime192v1 and 256v1
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH] ima_evm_utils: Add testing with elliptic curves prime192v1 and 256v1
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC] Persist ima logs to disk
- From: Raphael Gianotti <raphgi@xxxxxxxxxxxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v15 09/10] arm64: Call kmalloc() to allocate DTB buffer
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v5 0/5] Enable root to update the blacklist keyring
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v5 0/5] Enable root to update the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v5 0/5] Enable root to update the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v7 0/4] Add support for x509 certs with NIST p256 and p192 keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: Jan Lübbe <jlu@xxxxxxxxxxxxxx>
- Re: [PATCH v7 0/4] Add support for x509 certs with NIST p256 and p192 keys
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v7 0/4] Add support for x509 certs with NIST p256 and p192 keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v7 0/4] Add support for x509 certs with NIST p256 and p192 keys
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: Jan Lübbe <jlu@xxxxxxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: Jan Lübbe <jlu@xxxxxxxxxxxxxx>
- [PATCH v7 3/4] x509: Add support for parsing x509 certs with ECDSA keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v7 4/4] ima: Support EC keys for signature verification
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v7 2/4] x509: Detect sm2 keys by their parameters OID
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v7 1/4] crypto: Add support for ECDSA signature verification
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v7 0/4] Add support for x509 certs with NIST p256 and p192 keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/4] x509: Detect sm2 keys by their parameters OID
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/4] x509: Detect sm2 keys by their parameters OID
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v5 2/4] x509: Detect sm2 keys by their parameters OID
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/4] x509: Detect sm2 keys by their parameters OID
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v5 4/4] ima: Support EC keys for signature verification
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v5 0/5] Enable root to update the blacklist keyring
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v6 1/4] crypto: Add support for ECDSA signature verification
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v6 2/4] x509: Detect sm2 keys by their parameters OID
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] ima-evm-utils: ima_sign supports SM2 and SM3 algorithm combination
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for v5.12-rc1
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 2/4] x509: Detect sm2 keys by their parameters OID
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 4/4] ima: Support EC keys for signature verification
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] ima-evm-utils: ima_sign supports SM2 and SM3 algorithm combination
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 1/4] crypto: Add support for ECDSA signature verification
- From: yumeng <yumeng18@xxxxxxxxxx>
- [PATCH v6 1/4] crypto: Add support for ECDSA signature verification
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v6 4/4] ima: Support EC keys for signature verification
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v6 2/4] x509: Detect sm2 keys by their parameters OID
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v6 3/4] x509: Add support for parsing x509 certs with ECDSA keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v6 0/4] Add support for x509 certs with NIST p256 and p192 keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] ima-evm-utils: ima_sign supports SM2 and SM3 algorithm combination
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] ima-evm-utils: ima_sign supports SM2 and SM3 algorithm combination
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] ima-evm-utils: ima_sign supports SM2 and SM3 algorithm combination
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v5 1/3] KEYS: trusted: Fix incorrect handling of tpm_get_random()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 3/3] KEYS: trusted: Reserve TPM for seal and unseal operations
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: Jan Lübbe <jlu@xxxxxxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/3] KEYS: trusted: Fix migratable=1 failing
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Dirk Gouders <dirk@xxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- [PATCH ima-evm-utils] ima-evm-utils: ima_sign supports SM2 and SM3 algorithm combination
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH v5 3/3] KEYS: trusted: Reserve TPM for seal and unseal operations
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 3/3] KEYS: trusted: Reserve TPM for seal and unseal operations
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm: ibmvtpm: fix error return code in tpm_ibmvtpm_probe()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 0/5] Enable root to update the blacklist keyring
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 00/10] Enable root to update the blacklist keyring
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for v5.12-rc1
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: Migration to trusted keys: sealing user-provided key?
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for v5.12-rc1
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for v5.12-rc1
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v15 4/5] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v15 4/5] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 3/3] IMA: add support to measure duplicate buffer for critical data hook
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/3] IMA: update functions to read allow_dup policy condition
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/3] IMA: add policy condition to measure duplicate critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/3] support for duplicate measurement of integrity critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: TPM V2: kernel panic on linux reboot
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 1/4] crypto: Add support for ECDSA signature verification
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] vio: make remove callback return void
- From: Lijun Pan <lijunp213@xxxxxxxxx>
- Re: [PATCH] vio: make remove callback return void
- From: Tyrel Datwyler <tyreld@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: ibmvtpm: fix error return code in tpm_ibmvtpm_probe()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: ibmvtpm: fix error return code in tpm_ibmvtpm_probe()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2] selinux: measure state and policy capabilities
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for v5.12-rc1
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [GIT PULL] tpmdd updates for v5.12-rc1
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v5 3/3] KEYS: trusted: Reserve TPM for seal and unseal operations
- [PATCH v5 2/3] KEYS: trusted: Fix migratable=1 failing
- [PATCH v5 1/3] KEYS: trusted: Fix incorrect handling of tpm_get_random()
- [PATCH v5 0/3] KEYS, trusted: a bunch of bug fixes
- Re: [PATCH] vio: make remove callback return void
- From: Uwe Kleine-König <uwe@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/10] Enable root to update the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v4 00/10] Enable root to update the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v2] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Migration to trusted keys: sealing user-provided key?
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v4 00/10] Enable root to update the blacklist keyring
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH v2] tpm_tis: Add missing tpm_request/relinquish_locality calls
- From: Lukasz Majczak <lma@xxxxxxxxxxxx>
- Re: [PATCH v15 0/5] TPM 2.0 trusted key rework
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: Bug: TPM returned invalid status
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v15 09/10] arm64: Call kmalloc() to allocate DTB buffer
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH v15 09/10] arm64: Call kmalloc() to allocate DTB buffer
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v15 09/10] arm64: Call kmalloc() to allocate DTB buffer
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v15 09/10] arm64: Call kmalloc() to allocate DTB buffer
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v15 10/10] arm64: Add IMA log information in kimage used for kexec
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v15 09/10] arm64: Call kmalloc() to allocate DTB buffer
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: measure state and policy capabilities
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v15 10/10] arm64: Add IMA log information in kimage used for kexec
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH] vio: make remove callback return void
- From: Uwe Kleine-König <uwe@xxxxxxxxxxxxxxxxx>
- [PATCH v15 5/5] security: keys: trusted: Make sealed key properly interoperable
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v15 4/5] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v15 3/5] security: keys: trusted: fix TPM2 authorizations
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v15 2/5] oid_registry: Add TCG defined OIDS for TPM keys
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v15 1/5] lib: add ASN.1 encoder
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v15 0/5] TPM 2.0 trusted key rework
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v15 09/10] arm64: Call kmalloc() to allocate DTB buffer
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v15 10/10] arm64: Add IMA log information in kimage used for kexec
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v15 10/10] arm64: Add IMA log information in kimage used for kexec
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: Bug: TPM returned invalid status
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v15 10/10] arm64: Add IMA log information in kimage used for kexec
- From: Will Deacon <will@xxxxxxxxxx>
- Re: Bug: TPM returned invalid status
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v15 09/10] arm64: Call kmalloc() to allocate DTB buffer
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: Bug: TPM returned invalid status
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v15 10/10] arm64: Add IMA log information in kimage used for kexec
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v15 10/10] arm64: Add IMA log information in kimage used for kexec
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v15 09/10] arm64: Call kmalloc() to allocate DTB buffer
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH 3/4] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- AW: TPM V2: kernel panic on linux reboot
- From: "florian.manoel@xxxxxxxxxxx" <florian.manoel@xxxxxxxxxxx>
- Re: [PATCH v4] certs: Add EFI_CERT_X509_GUID support for dbx entries
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 00/40] idmapped mounts
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v6 23/40] exec: handle idmapped mounts
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [PATCH v24 10/25] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v4] IMA: Measure kernel version in early boot
- From: Raphael Gianotti <raphgi@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
- From: "Tj (Elloe Linux)" <ml.linux@elloe.vision>
- [PATCH v24 15/25] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v24 11/25] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v2] tpm: ibmvtpm: fix error return code in tpm_ibmvtpm_probe()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v3] IMA: Measure kernel version in early boot
- From: Raphael Gianotti <raphgi@xxxxxxxxxxxxxxxxxxx>
- [PATCH v24 05/25] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v24 13/25] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v24 12/25] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3] IMA: Measure kernel version in early boot
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
- From: Łukasz Majczak <lma@xxxxxxxxxxxx>
- Re: [PATCH 3/4] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 23/40] exec: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v6 23/40] exec: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH v6 23/40] exec: handle idmapped mounts
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v6 23/40] exec: handle idmapped mounts
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Bug: TPM returned invalid status
- From: "Tj (Elloe Linux)" <ml.linux@elloe.vision>
- Re: [PATCH v6 05/39] namei: make permission helpers idmapped mount aware
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v6 05/39] namei: make permission helpers idmapped mount aware
- From: "J. Bruce Fields" <bfields@xxxxxxxxxxxx>
- Re: [PATCH] selinux: measure state and policy capabilities
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH v2] IMA: Measure kernel version in early boot
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: include a consumer of the new IMA critical data hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 05/39] namei: make permission helpers idmapped mount aware
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH] tpm_tis: Add missing start/stop_tpm_chip calls
- From: Lukasz Majczak <lma@xxxxxxxxxxxx>
- [PATCH v2] IMA: Measure kernel version in early boot
- From: Raphael Gianotti <raphgi@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] ima: Free IMA measurement buffer after kexec syscall
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] ima: Free IMA measurement buffer on error
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v6 05/39] namei: make permission helpers idmapped mount aware
- From: bfields@xxxxxxxxxxxx (J. Bruce Fields)
- Re: [PATCH] selinux: measure state and policy capabilities
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: include a consumer of the new IMA critical data hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] dm crypt: support using trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/2] dm crypt: support using trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 20/40] init: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v6 16/40] open: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH 2/2] dm crypt: support using trusted keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 35/40] fs: introduce MOUNT_ATTR_IDMAP
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v6 35/40] fs: introduce MOUNT_ATTR_IDMAP
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v6 15/40] open: handle idmapped mounts in do_truncate()
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 2/2] dm crypt: support using trusted keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v6 28/40] overlayfs: do not mount on top of idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 27/40] ecryptfs: do not mount on top of idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 23/40] exec: handle idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 21/40] ioctl: handle idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 19/40] fcntl: handle idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 18/40] utimes: handle idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 17/40] af_unix: handle idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 16/40] open: handle idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 12/40] namei: handle idmapped mounts in may_*() helpers
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 11/40] stat: handle idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 10/40] commoncap: handle idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 09/40] xattr: handle idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 06/40] inode: make init and permission helpers idmapped mount aware
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 05/39] namei: make permission helpers idmapped mount aware
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 04/40] capability: handle idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 03/40] fs: add file and path permissions helpers
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH] selinux: measure state and policy capabilities
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 05/39] namei: make permission helpers idmapped mount aware
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 2/2] ima: Free IMA measurement buffer after kexec syscall
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] ima: Free IMA measurement buffer on error
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] ima: Free IMA measurement buffer after kexec syscall
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] ima: Free IMA measurement buffer on error
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 04/10] certs: Fix blacklist flag type confusion
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 05/10] certs: Replace K{U,G}IDT_INIT() with GLOBAL_ROOT_{U,G}ID
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 03/10] certs: Fix blacklisted hexadecimal hash string check
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 07/10] certs/blacklist: fix kernel doc interface issue
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 06/10] certs: Make blacklist_vet_description() more strict
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 08/10] certs: Factor out the blacklist hash creation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Jerome Forissier <jerome@xxxxxxxxxxxxx>
- [PATCH v4 01/10] tools/certs: Add print-cert-tbs-hash.sh
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 10/10] certs: Allow root user to append signed hashes to the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 09/10] PKCS#7: Fix missing include
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 00/10] Enable root to update the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 02/10] certs: Check that builtin blacklist hashes are valid
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v6 00/40] idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 02/40] fs: add id translation helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 01/40] mount: attach mappings to mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 03/40] fs: add file and path permissions helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 04/40] capability: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 09/40] xattr: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 06/40] inode: make init and permission helpers idmapped mount aware
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 07/40] attr: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 16/40] open: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 15/40] open: handle idmapped mounts in do_truncate()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v6 30/40] mount: make {lock,unlock}_mount_hash() static
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 12/40] namei: handle idmapped mounts in may_*() helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 13/40] namei: introduce struct renamedata
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 08/10] certs: Check that builtin blacklist hashes are valid
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v6 38/40] ext4: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 20/40] init: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v6 26/39] ima: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 33/40] fs: add attr_flags_to_mnt_flags helper
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 28/40] overlayfs: do not mount on top of idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 31/40] namespace: only take read lock in do_reconfigure_mnt()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 25/40] apparmor: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 21/40] ioctl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 39/40] xfs: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 34/40] fs: add mount_setattr()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 23/40] exec: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 22/40] would_dump: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 35/40] fs: introduce MOUNT_ATTR_IDMAP
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 29/40] namespace: take lock_mount_hash() directly when changing flags
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 36/40] tests: add mount_setattr() selftests
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 37/40] fat: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 32/40] fs: split out functions to hold writers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 27/40] ecryptfs: do not mount on top of idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 18/40] utimes: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 19/40] fcntl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 14/40] namei: prepare for idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 17/40] af_unix: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 11/40] stat: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 10/40] commoncap: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 08/40] acl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 08/10] certs: Check that builtin blacklist hashes are valid
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Jerome Forissier <jerome@xxxxxxxxxxxxx>
- Re: [PATCH v3 02/10] certs: Fix blacklisted hexadecimal hash string check
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 04/10] certs: Fix blacklist flag type confusion
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 05/10] certs: Replace K{U,G}IDT_INIT() with GLOBAL_ROOT_{U,G}ID
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 08/10] certs: Check that builtin blacklist hashes are valid
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] doc: trusted-encrypted: updates with TEE as a new trust source (update)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] doc: trusted-encrypted: updates with TEE as a new trust source (update)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v3 02/10] certs: Fix blacklisted hexadecimal hash string check
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3 05/10] certs: Replace K{U,G}IDT_INIT() with GLOBAL_ROOT_{U,G}ID
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3 06/10] certs: Make blacklist_vet_description() more strict
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3 09/10] certs: Allow root user to append signed hashes to the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v5 15/42] fs: add file_user_ns() helper
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 08/10] certs: Check that builtin blacklist hashes are valid
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3 04/10] certs: Fix blacklist flag type confusion
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v3 09/10] certs: Allow root user to append signed hashes to the blacklist keyring
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 08/10] certs: Check that builtin blacklist hashes are valid
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 05/10] certs: Replace K{U,G}IDT_INIT() with GLOBAL_ROOT_{U,G}ID
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 06/10] certs: Make blacklist_vet_description() more strict
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm/tpm_tis: Fix variable reset during IRQ probing
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 04/10] certs: Fix blacklist flag type confusion
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 03/10] PKCS#7: Fix missing include
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 02/10] certs: Fix blacklisted hexadecimal hash string check
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 01/10] certs/blacklist: fix kernel doc interface issue
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 05/13] x86: Add early TPM1.2/TPM2.0 interface support for Secure Launch
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 13/42] attr: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 11/42] namei: make permission helpers idmapped mount aware
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 23/42] open: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 18/42] stat: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 17/42] commoncap: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 15/42] fs: add file_user_ns() helper
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 24/42] af_unix: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 32/42] fs: make helpers idmap mount aware
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 40/42] fs: introduce MOUNT_ATTR_IDMAP
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v5 15/42] fs: add file_user_ns() helper
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v5 23/42] open: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v5 40/42] fs: introduce MOUNT_ATTR_IDMAP
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 30/42] would_dump: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 31/42] exec: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 29/42] ioctl: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 27/42] notify: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 26/42] fcntl: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 25/42] utimes: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 22/42] open: handle idmapped mounts in do_truncate()
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 21/42] namei: prepare for idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 20/42] namei: introduce struct renamedata
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 19/42] namei: handle idmapped mounts in may_*() helpers
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 16/42] xattr: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 14/42] acl: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 12/42] inode: make init and permission helpers idmapped mount aware
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 10/42] capability: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 09/42] mount: attach mappings to mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH] doc: trusted-encrypted: updates with TEE as a new trust source (update)
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v5 37/42] xfs: support idmapped mounts
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: TPM V2: kernel panic on linux reboot
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 3/4] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/4] tpm: fix reference counting for struct tpm_chip
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/4] tpm: in case of error properly cleanup in tpmm_chip_alloc
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v15 09/10] arm64: Call kmalloc() to allocate DTB buffer
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 3/4] tpm: in tpm2_del_space check if ops pointer is still valid
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH 2/4] tpm: fix reference counting for struct tpm_chip
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH 1/4] tpm: in case of error properly cleanup in tpmm_chip_alloc
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH 4/4] tpm: Provide a function tpm_chip_free() to free tpm chips
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- [PATCH 0/4] TPM fixes
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH v5 00/42] idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH] doc: trusted-encrypted: updates with TEE as a new trust source (update)
- From: Elaine Palmer <erpalmerny@xxxxxxxxx>
- Re: [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 00/42] idmapped mounts
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- [PATCH v15 07/10] kexec: Use fdt_appendprop_addrrange() to add ima buffer to FDT
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v15 05/10] ima: Move arch_ima_add_kexec_buffer() to ima
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v15 06/10] powerpc: Move arch independent ima kexec functions to drivers/of/kexec.c
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v15 10/10] arm64: Add IMA log information in kimage used for kexec
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v15 08/10] powerpc: Delete unused function delete_fdt_mem_rsv()
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v15 00/10] Carry forward IMA measurement log on kexec on ARM64
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v15 09/10] arm64: Call kmalloc() to allocate DTB buffer
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v15 02/10] of: Add a common kexec FDT setup function
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v15 04/10] powerpc: Use common of_kexec_setup_new_fdt()
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v15 03/10] arm64: Use common of_kexec_setup_new_fdt()
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v15 01/10] powerpc: Rename kexec elfcorehdr_addr to elf_headers_mem
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 0/8] IMA: support for measuring kernel integrity critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 00/42] idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 37/42] xfs: support idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH v3 09/10] certs: Allow root user to append signed hashes to the blacklist keyring
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 0/8] IMA: support for measuring kernel integrity critical data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 00/10] Enable root to update the blacklist keyring
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm/tpm_tis: Fix variable reset during IRQ probing
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: evmctl import -EPERM in initrd (dracut), but works after system boot
- From: Mikhail Novosyolov <m.novosyolov@xxxxxxxxxxxx>
- AW: TPM V2: kernel panic on linux reboot
- From: "florian.manoel@xxxxxxxxxxx" <florian.manoel@xxxxxxxxxxx>
- Re: [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 2/2] ABI: add sysfs description for tpm exports of PCR registers
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 37/42] xfs: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v5 00/42] idmapped mounts
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH v5 37/42] xfs: support idmapped mounts
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH] selinux: include a consumer of the new IMA critical data hook
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: include a consumer of the new IMA critical data hook
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: include a consumer of the new IMA critical data hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH] selinux: include a consumer of the new IMA critical data hook
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 5/8] IMA: limit critical data measurement based on a label
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 00/42] idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 00/42] idmapped mounts
- From: "Darrick J. Wong" <djwong@xxxxxxxxxx>
- Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 05/10] certs: Replace K{U,G}IDT_INIT() with GLOBAL_ROOT_{U,G}ID
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 03/10] PKCS#7: Fix missing include
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 00/10] Enable root to update the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 01/10] certs/blacklist: fix kernel doc interface issue
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 09/10] certs: Allow root user to append signed hashes to the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 07/10] certs: Factor out the blacklist hash creation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 06/10] certs: Make blacklist_vet_description() more strict
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 04/10] certs: Fix blacklist flag type confusion
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 02/10] certs: Fix blacklisted hexadecimal hash string check
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 10/10] tools/certs: Add print-cert-tbs-hash.sh
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 08/10] certs: Check that builtin blacklist hashes are valid
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH v2 0/5] Enable root to update the blacklist keyring
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm/tpm_tis: Fix variable reset during IRQ probing
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm/tpm_tis: Fix variable reset during IRQ probing
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v10 5/8] IMA: limit critical data measurement based on a label
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v5 2/2] ABI: add sysfs description for tpm exports of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v5 0/2] add sysfs exports for TPM 2 PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v5 0/2] add sysfs exports for TPM 2 PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] doc: trusted-encrypted: updates with TEE as a new trust source (update)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 0/1] add sysfs exports for TPM 2 PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/1] add sysfs exports for TPM 2 PCR registers
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] [v2] evm: Fix memleak in init_desc
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: evmctl import -EPERM in initrd (dracut), but works after system boot
- From: Mikhail Novosyolov <m.novosyolov@xxxxxxxxxxxx>
- evmctl import -EPERM in initrd (dracut), but works after system boot
- From: Mikhail Novosyolov <m.novosyolov@xxxxxxxxxxxx>
- [PATCH] tpm/tpm_tis: Fix variable reset during IRQ probing
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v5 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH v5 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH v14 6/6] arm64: Add IMA log information in kimage used for kexec
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v14 4/6] powerpc: Delete unused functions
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v14 2/6] powerpc: Move arch independent ima kexec functions to drivers/of/kexec.c
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v5 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v5 0/1] add sysfs exports for TPM 2 PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 41/42] tests: extend mount_setattr tests
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v14 4/6] powerpc: Delete unused functions
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v14 6/6] arm64: Add IMA log information in kimage used for kexec
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v14 4/6] powerpc: Delete unused functions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v14 6/6] arm64: Add IMA log information in kimage used for kexec
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] IMA: Add test for dm-crypt measurement
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v5 29/42] ioctl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 26/42] fcntl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 33/42] apparmor: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 23/42] open: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 22/42] open: handle idmapped mounts in do_truncate()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 38/42] ecryptfs: do not mount on top of idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 35/42] fat: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 30/42] would_dump: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 34/42] ima: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 21/42] namei: prepare for idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: IMA appraisal with TPMv2?
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- [PATCH v5 41/42] tests: extend mount_setattr tests
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 39/42] overlayfs: do not mount on top of idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 27/42] notify: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 20/42] namei: introduce struct renamedata
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 24/42] af_unix: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 40/42] fs: introduce MOUNT_ATTR_IDMAP
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 13/42] attr: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 15/42] fs: add file_user_ns() helper
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 36/42] ext4: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 01/42] namespace: take lock_mount_hash() directly when changing flags
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 37/42] xfs: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 31/42] exec: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 18/42] stat: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 25/42] utimes: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 16/42] xattr: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 28/42] init: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 02/42] mount: make {lock,unlock}_mount_hash() static
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 19/42] namei: handle idmapped mounts in may_*() helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 14/42] acl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 17/42] commoncap: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 12/42] inode: make init and permission helpers idmapped mount aware
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 11/42] namei: make permission helpers idmapped mount aware
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 08/42] fs: add id translation helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 06/42] fs: add mount_setattr()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 10/42] capability: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 07/42] tests: add mount_setattr() selftests
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 09/42] mount: attach mappings to mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 00/42] idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 04/42] fs: split out functions to hold writers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 05/42] fs: add attr_flags_to_mnt_flags helper
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 03/42] namespace: only take read lock in do_reconfigure_mnt()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v14 0/6] Carry forward IMA measurement log on kexec on ARM64
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v14 0/6] Carry forward IMA measurement log on kexec on ARM64
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v14 0/6] Carry forward IMA measurement log on kexec on ARM64
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v14 0/6] Carry forward IMA measurement log on kexec on ARM64
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH AUTOSEL 5.7 03/30] ima: extend boot_aggregate with kernel measurements
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH AUTOSEL 5.7 03/30] ima: extend boot_aggregate with kernel measurements
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v14 0/6] Carry forward IMA measurement log on kexec on ARM64
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [RFC PATCH 3/4] arm64: Use common of_kexec_setup_new_fdt()
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH] doc: trusted-encrypted: updates with TEE as a new trust source (update)
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] evm: Fix memory leak in init_desc
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- evmctl and pkcs#11
- From: Christian Schaubschläger <christian.schaubschlaeger@xxxxxx>
- [PATCH] [v2] evm: Fix memleak in init_desc
- From: Dinghao Liu <dinghao.liu@xxxxxxxxxx>
- Re: Re: Re: [PATCH] evm: Fix memleak in init_desc
- From: dinghao.liu@xxxxxxxxxx
- Re: Re: [PATCH] evm: Fix memleak in init_desc
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: Re: [PATCH] evm: Fix memleak in init_desc
- From: dinghao.liu@xxxxxxxxxx
- Re: [PATCH v2 0/5] Enable root to update the blacklist keyring
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] doc: trusted-encrypted: updates with TEE as a new trust source (update)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] doc: trusted-encrypted: updates with TEE as a new trust source (update)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] evm: Fix memleak in init_desc
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] evm: Fix memleak in init_desc
- From: Dinghao Liu <dinghao.liu@xxxxxxxxxx>
- Re: [RFC] Persist ima logs to disk
- From: Raphael Gianotti <raphgi@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Persist ima logs to disk
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v10 7/8] IMA: define a builtin critical data measurement policy
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 8/8] selinux: include a consumer of the new IMA critical data hook
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 6/8] IMA: extend critical data hook to limit the measurement based on a label
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 5/8] IMA: limit critical data measurement based on a label
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 1/8] IMA: generalize keyring specific measurement constructs
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 4/8] IMA: add policy rule to measure critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 3/8] IMA: define a hook to measure kernel integrity critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 2/8] IMA: add support to measure buffer data hash
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 0/8] IMA: support for measuring kernel integrity critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Persist ima logs to disk
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC] Persist ima logs to disk
- From: Raphael Gianotti <raphgi@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Persist ima logs to disk
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Persist ima logs to disk
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC] Persist ima logs to disk
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Persist ima logs to disk
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC] Persist ima logs to disk
- From: Raphael Gianotti <raphgi@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Persist ima logs to disk
- From: Raphael Gianotti <raphgi@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Persist ima logs to disk
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Persist ima logs to disk
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: [PATCH 1/2] Fix sign_hash not observing the hashalgo argument
- From: Patrick Uiterwijk <patrick@xxxxxxxxxxxxxx>
- Re: [RFC] Persist ima logs to disk
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] Add test for using sign_hash API
- From: Patrick Uiterwijk <patrick@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] Fix sign_hash not observing the hashalgo argument
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] Fix sign_hash not observing the hashalgo argument
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH 1/2] Fix sign_hash not observing the hashalgo argument
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH 2/2] Add test for using sign_hash API
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH 2/2] Add test for using sign_hash API
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] Fix sign_hash not observing the hashalgo argument
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] travis: Use Ubuntu 20.10 groovy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- IMA appraisal with TPMv2?
- From: "Chang, Clay (HPS OE-Linux TDC)" <clayc@xxxxxxx>
- [PATCH 1/2] Fix sign_hash not observing the hashalgo argument
- From: Patrick Uiterwijk <patrick@xxxxxxxxxxxxxx>
- [PATCH 2/2] Add test for using sign_hash API
- From: Patrick Uiterwijk <patrick@xxxxxxxxxxxxxx>
- [PATCH 0/2] ima-evm-utils: Fix use of sign_hash via API
- From: Patrick Uiterwijk <patrick@xxxxxxxxxxxxxx>
- Re: [PATCH v9 2/8] IMA: add support to measure buffer data hash
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 7/8] IMA: define a builtin critical data measurement policy
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]