Linux Integrity
[Prev Page][Next Page]
- [PATCH v7 6/8] IMA: extend critical data hook to limit the measurement based on a label
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 5/8] IMA: limit critical data measurement based on a label
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 3/4] doc: trusted-encrypted: updates with TEE as a new trust source
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] doc: trusted-encrypted: updates with TEE as a new trust source (update)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6] char: tpm: add i2c driver for cr50
- From: Adrian Ratiu <adrian.ratiu@xxxxxxxxxxxxx>
- Re: [PATCH v1 4/9] certs: Check that builtin blacklist hashes are valid
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v8 3/4] doc: trusted-encrypted: updates with TEE as a new trust source
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 3/4] tpm_tis: Disable interrupts if interrupt storm detected
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 3/4] tpm_tis: Disable interrupts if interrupt storm detected
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v6] char: tpm: add i2c driver for cr50
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm: ignore failed selftest in probe
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxx>
- Re: [PATCH v8 3/4] doc: trusted-encrypted: updates with TEE as a new trust source
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 3/4] doc: trusted-encrypted: updates with TEE as a new trust source
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 06/40] fs: add mount_setattr()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v4 06/40] fs: add mount_setattr()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v4 06/40] fs: add mount_setattr()
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v8 3/4] doc: trusted-encrypted: updates with TEE as a new trust source
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils][PATCH 0/2] support verifying EVM portable signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils][PATCH 2/2] tests: add test to verify EVM portable and immutable signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils][PATCH 1/2] Add support for verifying portable EVM signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 0/4] Introduce TEE based Trusted Keys support
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v14 4/5] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH][RFC] tpm: Rework open/close/shutdown to avoid races
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 06/40] fs: add mount_setattr()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [Regression] Can only do S3 once after "tpm: take TPM chip power gating out of tpm_transmit()"
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 05/40] fs: add attr_flags_to_mnt_flags helper
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 2/4] drm/i915/pmu: Use kstat_irqs to get interrupt count
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: (subset) [PATCH 000/141] Fix fall-through warnings for Clang
- From: "Martin K. Petersen" <martin.petersen@xxxxxxxxxx>
- Re: [PATCH v3 3/4] tpm_tis: Disable interrupts if interrupt storm detected
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/4] tpm_tis: Disable interrupts if interrupt storm detected
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v4 06/40] fs: add mount_setattr()
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v4 05/40] fs: add attr_flags_to_mnt_flags helper
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v4 04/40] fs: split out functions to hold writers
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v14 4/5] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 7/8] powerpc: Move arch_ima_add_kexec_buffer to ima
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v6] char: tpm: add i2c driver for cr50
- From: Adrian Ratiu <adrian.ratiu@xxxxxxxxxxxxx>
- [PATCH v2] tpm: ignore failed selftest in probe
- From: Dafna Hirschfeld <dafna.hirschfeld@xxxxxxxxxxxxx>
- [Regression] Can only do S3 once after "tpm: take TPM chip power gating out of tpm_transmit()"
- From: Kai-Heng Feng <kai.heng.feng@xxxxxxxxxxxxx>
- Re: [PATCH v10 8/8] arm64: Add IMA log information in kimage used for kexec
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 7/8] powerpc: Move arch_ima_add_kexec_buffer to ima
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 6/8] powerpc: Move ima_get_kexec_buffer() and ima_free_kexec_buffer() to ima
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 5/8] powerpc: Move remove_ima_buffer() to drivers/of/kexec.c
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 4/8] powerpc: Use ima kexec node functions
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 3/8] powerpc: Move ima buffer functions to drivers/of/kexec.c
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/8] powerpc: Move delete_fdt_mem_rsv() to drivers/of/kexec.c
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/4] drm/i915/pmu: Use kstat_irqs to get interrupt count
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/4] drm/i915/pmu: Use kstat_irqs to get interrupt count
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v3 1/4] irq: export kstat_irqs
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v3 2/4] drm/i915/pmu: Use kstat_irqs to get interrupt count
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/4] irq: export kstat_irqs
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v3 3/4] tpm_tis: Disable interrupts if interrupt storm detected
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v8 3/4] doc: trusted-encrypted: updates with TEE as a new trust source
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/4] irq: export kstat_irqs
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/4] irq: export kstat_irqs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/4] irq: export kstat_irqs
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/4] drm/i915/pmu: Use kstat_irqs to get interrupt count
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v10 8/8] arm64: Add IMA log information in kimage used for kexec
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v10 7/8] powerpc: Move arch_ima_add_kexec_buffer to ima
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v10 6/8] powerpc: Move ima_get_kexec_buffer() and ima_free_kexec_buffer() to ima
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v10 5/8] powerpc: Move remove_ima_buffer() to drivers/of/kexec.c
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v10 4/8] powerpc: Use ima kexec node functions
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v10 3/8] powerpc: Move ima buffer functions to drivers/of/kexec.c
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/4] irq: export kstat_irqs
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v10 2/8] powerpc: Move delete_fdt_mem_rsv() to drivers/of/kexec.c
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v3 1/4] irq: export kstat_irqs
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [PATCH v3 3/4] tpm_tis: Disable interrupts if interrupt storm detected
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [PATCH v3 0/4] tpm_tis: Detect interrupt storms
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [PATCH v3 4/4] tpm_tis: Disable Interrupts on the ThinkPad L490
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [PATCH v3 2/4] drm/i915/pmu: Use kstat_irqs to get interrupt count
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v10 1/8] powerpc: fix compiler warnings and errors
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm_tis: Disable interrupts if interrupt storm detected
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm_tis: Disable interrupts if interrupt storm detected
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [PATCH v10 6/8] powerpc: Move ima_get_kexec_buffer() and ima_free_kexec_buffer() to ima
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 7/8] powerpc: Move arch_ima_add_kexec_buffer to ima
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 5/8] powerpc: Move remove_ima_buffer() to drivers/of/kexec.c
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 8/8] arm64: Add IMA log information in kimage used for kexec
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 3/8] powerpc: Move ima buffer functions to drivers/of/kexec.c
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 4/8] powerpc: Use ima kexec node functions
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 2/8] powerpc: Move delete_fdt_mem_rsv() to drivers/of/kexec.c
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 1/8] powerpc: fix compiler warnings and errors
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 0/8] Carry forward IMA measurement log on kexec on ARM64
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v14 2/5] oid_registry: Add TCG defined OIDS for TPM keys
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/9] Enable root to update the blacklist keyring
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: ignore failed selftest in probe
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 3/4] doc: trusted-encrypted: updates with TEE as a new trust source
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5] char: tpm: add i2c driver for cr50
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- RE: [PATCH v3 06/11] evm: Ignore INTEGRITY_NOLABEL if no HMAC key is loaded
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v1 2/9] certs: Make blacklist_vet_description() more strict
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v1 5/9] PKCS#7: Fix missing include
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v1 1/9] certs: Fix blacklisted hexadecimal hash string check
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v1 8/9] certs: Replace K{U,G}IDT_INIT() with GLOBAL_ROOT_{U,G}ID
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v1 2/9] certs: Make blacklist_vet_description() more strict
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v1 5/9] PKCS#7: Fix missing include
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v1 1/9] certs: Fix blacklisted hexadecimal hash string check
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v1 0/9] Enable root to update the blacklist keyring
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH] tpm: ignore failed selftest in probe
- From: Dafna Hirschfeld <dafna.hirschfeld@xxxxxxxxxxxxx>
- Re: [PATCH v14 2/5] oid_registry: Add TCG defined OIDS for TPM keys
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v14 1/5] lib: add ASN.1 encoder
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v3 06/11] evm: Ignore INTEGRITY_NOLABEL if no HMAC key is loaded
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH][RFC] tpm: Rework open/close/shutdown to avoid races
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH][RFC] tpm: Rework open/close/shutdown to avoid races
- From: Sergey Temerkhanov <s.temerkhanov@xxxxxxxxx>
- RE: [PATCH v3 06/11] evm: Ignore INTEGRITY_NOLABEL if no HMAC key is loaded
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v8 0/4] Introduce TEE based Trusted Keys support
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RESEND v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v14 4/5] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v14 4/5] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v14 1/5] lib: add ASN.1 encoder
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v14 1/5] lib: add ASN.1 encoder
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm_tis: Disable interrupts if interrupt storm detected
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v4 34/40] fat: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 30/40] exec: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 28/40] ioctl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 26/40] notify: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 25/40] fcntl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 32/40] apparmor: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 27/40] init: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 39/40] tests: extend mount_setattr tests
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 35/40] ext4: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 22/40] open: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 33/40] ima: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 20/40] namei: prepare for idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 36/40] ecryptfs: do not mount on top of idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 37/40] overlayfs: do not mount on top of idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 21/40] open: handle idmapped mounts in do_truncate()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 23/40] af_unix: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 29/40] would_dump: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 38/40] fs: introduce MOUNT_ATTR_IDMAP
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 24/40] utimes: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 00/40] idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 16/40] commoncap: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 18/40] namei: handle idmapped mounts in may_*() helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 14/40] acl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 13/40] attr: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 19/40] namei: introduce struct renamedata
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 17/40] stat: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 15/40] xattr: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 12/40] inode: make init and permission helpers idmapped mount aware
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 11/40] namei: make permission helpers idmapped mount aware
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 01/40] namespace: take lock_mount_hash() directly when changing flags
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 02/40] mount: make {lock,unlock}_mount_hash() static
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 07/40] tests: add mount_setattr() selftests
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 05/40] fs: add attr_flags_to_mnt_flags helper
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 06/40] fs: add mount_setattr()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 10/40] capability: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 09/40] mount: attach mappings to mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 08/40] fs: add id translation helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 03/40] namespace: only take read lock in do_reconfigure_mnt()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 04/40] fs: split out functions to hold writers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5] char: tpm: add i2c driver for cr50
- From: Adrian Ratiu <adrian.ratiu@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm_tis: Disable interrupts if interrupt storm detected
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 04/11] ima: Move ima_reset_appraise_flags() call to post hooks
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 06/11] evm: Ignore INTEGRITY_NOLABEL if no HMAC key is loaded
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm_tis: Disable interrupts if interrupt storm detected
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [PATCH v12 2/3] arch: Wire up trusted_for(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v12 1/3] fs: Add trusted_for(2) syscall implementation and related sysctl
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v12 3/3] selftest/interpreter: Add tests for trusted_for(2) policies
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v12 0/3] Add trusted_for(2) (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v2] tpm_tis: Disable interrupts if interrupt storm detected
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v2] tpm_tis: Disable interrupts if interrupt storm detected
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH AUTOSEL 5.7 03/30] ima: extend boot_aggregate with kernel measurements
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v3 03/11] evm: Refuse EVM_ALLOW_METADATA_WRITES only if an HMAC key is loaded
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4] char: tpm: add i2c driver for cr50
- From: Adrian Ratiu <adrian.ratiu@xxxxxxxxxxxxx>
- Re: [PATCH v8 3/4] doc: trusted-encrypted: updates with TEE as a new trust source
- From: gmail Elaine Palmer <erpalmerny@xxxxxxxxx>
- Re: [PATCH v3 02/11] evm: Load EVM key in ima_load_x509() to avoid appraisal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] drivers: char: tpm: remove unneeded MODULE_VERSION() usage
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 01/11] evm: Execute evm_inode_init_security() only when an HMAC key is loaded
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4] char: tpm: add i2c driver for cr50
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm_tis: Disable interrupts if interrupt storm detected
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v1 0/9] Enable root to update the blacklist keyring
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: Disable interrupts on ThinkPad T490s
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] drivers: char: tpm: remove unneeded MODULE_VERSION() usage
- From: "Enrico Weigelt, metux IT consult" <info@xxxxxxxxx>
- RE: [PATCH v3 04/11] ima: Move ima_reset_appraise_flags() call to post hooks
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v4] char: tpm: add i2c driver for cr50
- From: Adrian Ratiu <adrian.ratiu@xxxxxxxxxxxxx>
- Re: [PATCH v3 04/38] fs: add mount_setattr()
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 04/38] fs: add mount_setattr()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 04/38] fs: add mount_setattr()
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 04/38] fs: add mount_setattr()
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 04/38] fs: add mount_setattr()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 07/38] mount: attach mappings to mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 17/38] namei: introduce struct renamedata
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 10/38] inode: add idmapped mount aware init and permission helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 06/38] fs: add id translation helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 03/38] namespace: only take read lock in do_reconfigure_mnt()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 02/38] mount: make {lock,unlock}_mount_hash() static
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 01/38] namespace: take lock_mount_hash() directly when changing flags
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v9 0/8] Carry forward IMA measurement log on kexec on ARM64
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/5] tpm_tis: Fix interrupts for TIS TPMs without legacy cycles
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v2 3/5] tpm_tis: Fix interrupts for TIS TPMs without legacy cycles
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 00/11] evm: Improve usability of portable signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm_tis: Disable interrupts if interrupt storm detected
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v2 3/5] tpm_tis: Fix interrupts for TIS TPMs without legacy cycles
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v9 0/8] Carry forward IMA measurement log on kexec on ARM64
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 0/8] Carry forward IMA measurement log on kexec on ARM64
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 7/8] arm64: Store IMA log information in kimage used for kexec
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 6/8] powerpc: Move ima_get_kexec_buffer() and ima_free_kexec_buffer() to ima
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 3/8] ima: Define get_ima_kexec_buffer() in drivers/of
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/5] tpm_tis: Fix interrupts for TIS TPMs without legacy cycles
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH v3 07/38] mount: attach mappings to mounts
- From: Tycho Andersen <tycho@tycho.pizza>
- Re: [PATCH v9 7/8] arm64: Store IMA log information in kimage used for kexec
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 6/8] powerpc: Move ima_get_kexec_buffer() and ima_free_kexec_buffer() to ima
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 3/8] ima: Define get_ima_kexec_buffer() in drivers/of
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 0/8] Carry forward IMA measurement log on kexec on ARM64
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 33/38] ext4: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 33/38] ext4: support idmapped mounts
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 33/38] ext4: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 09/38] namei: add idmapped mount aware permission helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 09/38] namei: add idmapped mount aware permission helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 33/38] ext4: support idmapped mounts
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 17/38] namei: introduce struct renamedata
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 10/38] inode: add idmapped mount aware init and permission helpers
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 09/38] namei: add idmapped mount aware permission helpers
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 07/38] mount: attach mappings to mounts
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 06/38] fs: add id translation helpers
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 04/38] fs: add mount_setattr()
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 03/38] namespace: only take read lock in do_reconfigure_mnt()
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 02/38] mount: make {lock,unlock}_mount_hash() static
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 01/38] namespace: take lock_mount_hash() directly when changing flags
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 33/38] ext4: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 32/38] fat: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 00/38] idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: "Martin K. Petersen" <martin.petersen@xxxxxxxxxx>
- Re: [PATCH v2] tpm_tis: Disable interrupts if interrupt storm detected
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v9 1/8] powerpc: fix compiler warnings and errors
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH AUTOSEL 5.7 03/30] ima: extend boot_aggregate with kernel measurements
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2] tpm_tis: Disable interrupts if interrupt storm detected
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH AUTOSEL 5.7 03/30] ima: extend boot_aggregate with kernel measurements
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH] tpm_tis: Disable interrupts if interrupt storm detected
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH RESEND v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 33/38] ext4: support idmapped mounts
- From: Mauricio Vásquez Bernal <mauricio@xxxxxxxxxx>
- Re: [PATCH v3 32/38] fat: handle idmapped mounts
- From: Mauricio Vásquez Bernal <mauricio@xxxxxxxxxx>
- RE: [PATCH RESEND v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: "Elliott, Robert (Servers)" <elliott@xxxxxxx>
- Re: [PATCH v14 4/5] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RESEND v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- RE: [PATCH RESEND v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: "Elliott, Robert (Servers)" <elliott@xxxxxxx>
- Re: [PATCH] ima: Don't modify file descriptor mode on the fly
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH RESEND v4 0/1] add sysfs exports for TPM 2 PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RESEND v4 0/1] add sysfs exports for TPM 2 PCR registers
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v1 0/9] Enable root to update the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH RESEND v4 0/1] add sysfs exports for TPM 2 PCR registers
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH RESEND v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH v1 0/9] Enable root to update the blacklist keyring
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v14 4/5] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH RESEND v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH RESEND v4 0/1] add sysfs exports for TPM 2 PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v14 5/5] security: keys: trusted: Make sealed key properly interoperable
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v14 4/5] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v14 3/5] security: keys: trusted: fix TPM2 authorizations
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v14 2/5] oid_registry: Add TCG defined OIDS for TPM keys
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v14 1/5] lib: add ASN.1 encoder
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v14 0/5] TPM 2.0 trusted key rework
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] char: tpm: add i2c driver for cr50
- From: Ezequiel Garcia <ezequiel@xxxxxxxxxxxxx>
- Re: [PATCH AUTOSEL 5.7 03/30] ima: extend boot_aggregate with kernel measurements
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Disable interrupts on ThinkPad T490s
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v3] char: tpm: add i2c driver for cr50
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] char: tpm: add i2c driver for cr50
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: Disable interrupts on ThinkPad T490s
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: Disable interrupts on ThinkPad T490s
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: Disable interrupts on ThinkPad T490s
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 00/38] idmapped mounts
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v3 09/38] namei: add idmapped mount aware permission helpers
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [PATCH v3 18/38] namei: prepare for idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 10/38] inode: add idmapped mount aware init and permission helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 09/38] namei: add idmapped mount aware permission helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 08/38] capability: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 08/38] capability: handle idmapped mounts
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [PATCH v3 05/38] tests: add mount_setattr() selftests
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 07/38] mount: attach mappings to mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 00/38] idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 04/38] fs: add mount_setattr()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 06/38] fs: add id translation helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 13/38] xattr: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 14/38] commoncap: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 11/38] attr: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 19/38] open: handle idmapped mounts in do_truncate()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 17/38] namei: introduce struct renamedata
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 12/38] acl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 15/38] stat: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 01/38] namespace: take lock_mount_hash() directly when changing flags
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 03/38] namespace: only take read lock in do_reconfigure_mnt()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 02/38] mount: make {lock,unlock}_mount_hash() static
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 16/38] namei: handle idmapped mounts in may_*() helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 24/38] notify: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 27/38] would_dump: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 33/38] ext4: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 20/38] open: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 28/38] exec: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 26/38] ioctl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 22/38] utimes: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 31/38] ima: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 36/38] fs: introduce MOUNT_ATTR_IDMAP
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 34/38] ecryptfs: do not mount on top of idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 21/38] af_unix: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 23/38] fcntl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 35/38] overlayfs: do not mount on top of idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 30/38] apparmor: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 37/38] tests: extend mount_setattr tests
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 25/38] init: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 32/38] fat: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 10/39] inode: add idmapped mount aware init and permission helpers
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [PATCH v3] char: tpm: add i2c driver for cr50
- From: Adrian Ratiu <adrian.ratiu@xxxxxxxxxxxxx>
- Re: [PATCH 131/141] tpm: Fix fall-through warnings for Clang
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: Miguel Ojeda <miguel.ojeda.sandonis@xxxxxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: Karol Herbst <kherbst@xxxxxxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: Miguel Ojeda <miguel.ojeda.sandonis@xxxxxxxxx>
- Re: [PATCH] ima: Don't modify file descriptor mode on the fly
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- [PATCH] ima: Don't modify file descriptor mode on the fly
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v2] char: tpm: add i2c driver for cr50
- From: Adrian Ratiu <adrian.ratiu@xxxxxxxxxxxxx>
- Re: [PATCH v2] char: tpm: add i2c driver for cr50
- From: Ezequiel Garcia <ezequiel@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: ibmvtpm: fix error return code in tpm_ibmvtpm_probe()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] char: tpm: add i2c driver for cr50
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [Intel-wired-lan] [PATCH 000/141] Fix fall-through warnings for Clang
- From: Finn Thain <fthain@xxxxxxxxxxxxxxxxxxx>
- Re: [Intel-wired-lan] [PATCH 000/141] Fix fall-through warnings for Clang
- From: Finn Thain <fthain@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: Edward Cree <ecree.xilinx@xxxxxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: Edward Cree <ecree.xilinx@xxxxxxxxx>
- Re: [Intel-wired-lan] [PATCH 000/141] Fix fall-through warnings for Clang
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [Intel-wired-lan] [PATCH 000/141] Fix fall-through warnings for Clang
- From: Finn Thain <fthain@xxxxxxxxxxxxxxxxxxx>
- Re: [Intel-wired-lan] [PATCH 000/141] Fix fall-through warnings for Clang
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [Intel-wired-lan] [PATCH 000/141] Fix fall-through warnings for Clang
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: Sean Young <sean@xxxxxxxx>
- Re: [Intel-wired-lan] [PATCH 000/141] Fix fall-through warnings for Clang
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [Intel-wired-lan] [PATCH 000/141] Fix fall-through warnings for Clang
- From: Miguel Ojeda <miguel.ojeda.sandonis@xxxxxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: Miguel Ojeda <miguel.ojeda.sandonis@xxxxxxxxx>
- Re: [Intel-wired-lan] [PATCH 000/141] Fix fall-through warnings for Clang
- From: Finn Thain <fthain@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: Miguel Ojeda <miguel.ojeda.sandonis@xxxxxxxxx>
- Re: [Intel-wired-lan] [PATCH 000/141] Fix fall-through warnings for Clang
- From: Miguel Ojeda <miguel.ojeda.sandonis@xxxxxxxxx>
- Re: [Intel-wired-lan] [PATCH 000/141] Fix fall-through warnings for Clang
- From: Finn Thain <fthain@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Disable interrupts on ThinkPad T490s
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [Intel-wired-lan] [PATCH 000/141] Fix fall-through warnings for Clang
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Disable interrupts on ThinkPad T490s
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Disable interrupts on ThinkPad T490s
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
- Re: [PATCH 131/141] tpm: Fix fall-through warnings for Clang
- From: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
- Re: [PATCH] tpm: ibmvtpm: fix error return code in tpm_ibmvtpm_probe()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2 07/39] mount: attach mappings to mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 07/39] mount: attach mappings to mounts
- From: Tycho Andersen <tycho@tycho.pizza>
- [PATCH] tpm: ibmvtpm: fix error return code in tpm_ibmvtpm_probe()
- From: Wang Hai <wanghai38@xxxxxxxxxx>
- Re: [PATCH v2 07/39] mount: attach mappings to mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 07/39] mount: attach mappings to mounts
- From: Tycho Andersen <tycho@tycho.pizza>
- Re: [PATCH v2] char: tpm: add i2c driver for cr50
- From: Ezequiel Garcia <ezequiel@xxxxxxxxxxxxx>
- Re: [PATCH v2 07/39] mount: attach mappings to mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2] char: tpm: add i2c driver for cr50
- From: Adrian Ratiu <adrian.ratiu@xxxxxxxxxxxxx>
- Re: [PATCH v8 4/4] MAINTAINERS: Add myself as Trusted Keys co-maintainer
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 1/4] KEYS: trusted: Add generic trusted keys framework
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: Disable interrupts on ThinkPad T490s
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: Disable interrupts on ThinkPad T490s
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: Disable interrupts on ThinkPad T490s
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: Finn Thain <fthain@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: Finn Thain <fthain@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 131/141] tpm: Fix fall-through warnings for Clang
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 131/141] tpm: Fix fall-through warnings for Clang
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 31/39] audit: handle idmapped mounts
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] char: tpm: add i2c driver for cr50
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v6 0/8] IMA: support for measuring kernel integrity critical data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 8/8] selinux: measure state and hash of the policy using IMA
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: Miguel Ojeda <miguel.ojeda.sandonis@xxxxxxxxx>
- Re: [PATCH v2] char: tpm: add i2c driver for cr50
- From: Adrian Ratiu <adrian.ratiu@xxxxxxxxxxxxx>
- Re: [PATCH v6 0/8] IMA: support for measuring kernel integrity critical data
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [Intel-wired-lan] [PATCH 000/141] Fix fall-through warnings for Clang
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 07/39] mount: attach mappings to mounts
- From: Tycho Andersen <tycho@tycho.pizza>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 07/39] mount: attach mappings to mounts
- From: Tycho Andersen <tycho@tycho.pizza>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: Miguel Ojeda <miguel.ojeda.sandonis@xxxxxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: Miguel Ojeda <miguel.ojeda.sandonis@xxxxxxxxx>
- Re: [PATCH v6 0/8] IMA: support for measuring kernel integrity critical data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [Intel-wired-lan] [PATCH 000/141] Fix fall-through warnings for Clang
- From: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: Disable interrupts on ThinkPad T490s
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v2 14/39] commoncap: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 31/39] audit: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: Finn Thain <fthain@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 31/39] audit: handle idmapped mounts
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: Sam Ravnborg <sam@xxxxxxxxxxxx>
- Re: [PATCH v2 14/39] commoncap: handle idmapped mounts
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v6 0/8] IMA: support for measuring kernel integrity critical data
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH v6 0/8] IMA: support for measuring kernel integrity critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: Miguel Ojeda <miguel.ojeda.sandonis@xxxxxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v9 0/8] Carry forward IMA measurement log on kexec on ARM64
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 0/8] Carry forward IMA measurement log on kexec on ARM64
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 0/8] Carry forward IMA measurement log on kexec on ARM64
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v6 8/8] selinux: measure state and hash of the policy using IMA
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 8/8] selinux: measure state and hash of the policy using IMA
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 7/8] IMA: add a built-in policy rule for critical data measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: Miguel Ojeda <miguel.ojeda.sandonis@xxxxxxxxx>
- Re: [PATCH v2 39/39] tests: add vfs/idmapped mounts test suite
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v23 13/23] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v23 11/23] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v23 10/23] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v23 09/23] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v23 08/23] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v23 03/23] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2] char: tpm: add i2c driver for cr50
- From: Helen Koike <helen.koike@xxxxxxxxxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- [PATCH 131/141] tpm: Fix fall-through warnings for Clang
- From: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
- Re: [PATCH 000/141] Fix fall-through warnings for Clang
- From: Joe Perches <joe@xxxxxxxxxxx>
- [PATCH 010/141] ima: Fix fall-through warnings for Clang
- From: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
- [PATCH 000/141] Fix fall-through warnings for Clang
- From: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
- [PATCH v1 1/9] certs: Fix blacklisted hexadecimal hash string check
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v1 3/9] certs: Factor out the blacklist hash creation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v1 2/9] certs: Make blacklist_vet_description() more strict
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v1 6/9] certs: Fix blacklist flag type confusion
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v1 5/9] PKCS#7: Fix missing include
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v1 7/9] certs: Allow root user to append signed hashes to the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v1 9/9] tools/certs: Add print-cert-tbs-hash.sh
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v1 8/9] certs: Replace K{U,G}IDT_INIT() with GLOBAL_ROOT_{U,G}ID
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v1 4/9] certs: Check that builtin blacklist hashes are valid
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v1 0/9] Enable root to update the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v2] char: tpm: add i2c driver for cr50
- From: Adrian Ratiu <adrian.ratiu@xxxxxxxxxxxxx>
- Re: [PATCH v6 8/8] selinux: measure state and hash of the policy using IMA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Re: [PATCH v3 1/2] tpm_tis_core: add optional max xfer size check
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 7/8] IMA: add a built-in policy rule for critical data measurement
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v6 0/8] IMA: support for measuring kernel integrity critical data
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH v2 00/39] fs: idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 00/39] fs: idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v2 00/39] fs: idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 00/39] fs: idmapped mounts
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH v6 8/8] selinux: measure state and hash of the policy using IMA
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 7/8] IMA: add a built-in policy rule for critical data measurement
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 1/8] IMA: generalize keyring specific measurement constructs
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 2/8] IMA: add support to measure buffer data hash
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 0/8] IMA: support for measuring kernel integrity critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 3/8] IMA: define a hook to measure kernel integrity critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 6/8] IMA: add support to critical data hook to limit data sources for measurement
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 4/8] IMA: add policy rule to measure critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 5/8] IMA: extend policy to add data sources as a critical data measurement constraint
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Disable interrupts on ThinkPad T490s
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: Disable interrupts on ThinkPad T490s
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: Re: [PATCH v3 1/2] tpm_tis_core: add optional max xfer size check
- From: Dafna Hirschfeld <dafna.hirschfeld@xxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Disable interrupts on ThinkPad T490s
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 08/11] evm: Allow setxattr() and setattr() for unmodified metadata
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 00/39] fs: idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 00/39] fs: idmapped mounts
- From: Stephen Barber <smbarber@xxxxxxxxxxxx>
- Re: [PATCH v2 00/39] fs: idmapped mounts
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- RE: [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- RE: [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 35/39] ecryptfs: do not mount on top of idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 21/39] af_unix: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 27/39] would_dump: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 34/39] ext4: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 26/39] ioctl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 23/39] fcntl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 30/39] apparmor: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 20/39] open: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 22/39] utimes: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 25/39] init: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 32/39] ima: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 28/39] exec: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 38/39] selftests: add idmapped mounts xattr selftest
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 24/39] notify: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 37/39] fs: introduce MOUNT_ATTR_IDMAP
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 33/39] fat: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 31/39] audit: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 36/39] overlayfs: do not mount on top of idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 15/39] stat: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 13/39] xattr: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 19/39] open: handle idmapped mounts in do_truncate()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 18/39] namei: prepare for idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 16/39] namei: handle idmapped mounts in may_*() helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 17/39] namei: introduce struct renamedata
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 12/39] acl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 14/39] commoncap: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 11/39] attr: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 10/39] inode: add idmapped mount aware init and permission helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 09/39] namei: add idmapped mount aware permission helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 07/39] mount: attach mappings to mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 05/39] tests: add mount_setattr() selftests
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 08/39] capability: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 06/39] fs: add id translation helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 00/39] fs: idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 04/39] fs: add mount_setattr()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 02/39] mount: make {lock,unlock}_mount_hash() static
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 01/39] namespace: take lock_mount_hash() directly when changing flags
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 03/39] namespace: only take read lock in do_reconfigure_mnt()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 13/13] security/integrity/ima: converts stats to seqnum_ops
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v4 3/3] arm64/ima: add ima_arch support
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- [PATCH v9 5/8] powerpc: Move remove_ima_buffer() to drivers/of
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 3/8] ima: Define get_ima_kexec_buffer() in drivers/of
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 0/8] Carry forward IMA measurement log on kexec on ARM64
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 2/8] powerpc: Move delete_fdt_mem_rsv() to drivers/of
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 6/8] powerpc: Move ima_get_kexec_buffer() and ima_free_kexec_buffer() to ima
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 7/8] arm64: Store IMA log information in kimage used for kexec
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 8/8] arm64: Add IMA kexec buffer to DTB
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 4/8] powerpc: Use get_ima_kexec_buffer to get ima kexec buffer
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 1/8] powerpc: fix compiler warnings and errors
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 13/13] security/integrity/ima: converts stats to seqnum_ops
- From: Shuah Khan <skhan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 00/13] Introduce seqnum_ops
- From: Shuah Khan <skhan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/7] IMA: add hook to measure critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] ima: select ima-buf template for buffer measurement
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v5 5/7] IMA: validate supported kernel data sources before measurement
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 3/7] IMA: add hook to measure critical data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/7] IMA: update process_buffer_measurement to measure buffer hash
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/7] IMA: update process_buffer_measurement to measure buffer hash
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 0/7] IMA: Infrastructure for measurement of critical kernel data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 5/7] IMA: validate supported kernel data sources before measurement
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/7] IMA: add policy to measure critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/7] IMA: add hook to measure critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/7] IMA: update process_buffer_measurement to measure buffer hash
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/7] IMA: update process_buffer_measurement to measure buffer hash
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] ima: select ima-buf template for buffer measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] ima: select ima-buf template for buffer measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH] ima: select ima-buf template for buffer measurement
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] ima: select ima-buf template for buffer measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/13] Introduce seqnum_ops
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH 00/13] Introduce seqnum_ops
- From: Shuah Khan <skhan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 11/11] ima: Don't remove security.ima if file must not be appraised
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 10/11] ima: Introduce template field evmsig and write to field sig as fallback
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 08/11] evm: Allow setxattr() and setattr() for unmodified metadata
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 09/11] ima: Allow imasig requirement to be satisfied by EVM portable signatures
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 05/11] evm: Introduce evm_status_revalidate()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 06/11] evm: Ignore INTEGRITY_NOLABEL if no HMAC key is loaded
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 07/11] evm: Allow xattr/attr operations for portable signatures
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 02/11] evm: Load EVM key in ima_load_x509() to avoid appraisal
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 00/11] evm: Improve usability of portable signatures
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 01/11] evm: Execute evm_inode_init_security() only when an HMAC key is loaded
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 03/11] evm: Refuse EVM_ALLOW_METADATA_WRITES only if an HMAC key is loaded
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 04/11] ima: Move ima_reset_appraise_flags() call to post hooks
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH 13/13] security/integrity/ima: converts stats to seqnum_ops
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 00/13] Introduce seqnum_ops
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH 00/13] Introduce seqnum_ops
- From: Shuah Khan <skhan@xxxxxxxxxxxxxxxxxxx>
- Re: Selinux policy for x509_ima.der public certificate loaded by kernel during boot
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 00/13] Introduce seqnum_ops
- From: Alan Stern <stern@xxxxxxxxxxxxxxxxxxx>
- [PATCH 13/13] security/integrity/ima: converts stats to seqnum_ops
- From: Shuah Khan <skhan@xxxxxxxxxxxxxxxxxxx>
- [PATCH 00/13] Introduce seqnum_ops
- From: Shuah Khan <skhan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/5] ima-evm-utils: Change tpm2_pcr_read() to use C code
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH AUTOSEL 5.9 52/55] tpm_tis: Disable interrupts on ThinkPad T490s
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.4 40/42] tpm_tis: Disable interrupts on ThinkPad T490s
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 20/21] tpm_tis: Disable interrupts on ThinkPad T490s
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v5 6/7] IMA: add critical_data to the built-in policy rules
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: Selinux policy for x509_ima.der public certificate loaded by kernel during boot
- From: rishi gupta <gupt21@xxxxxxxxx>
- Re: [PATCH v5 6/7] IMA: add critical_data to the built-in policy rules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: possible deadlock in mnt_want_write
- From: syzbot <syzbot+ae82084b07d0297e566b@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 6/7] IMA: add critical_data to the built-in policy rules
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: Selinux policy for x509_ima.der public certificate loaded by kernel during boot
- From: Mikhail Novosyolov <m.novosyolov@xxxxxxxxxxxx>
- Re: [PATCH v2 4/5] tpm_tis: fix IRQ probing
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for v5.10-rc4
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] tpmdd updates for v5.10-rc4
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 4/5] tpm_tis: fix IRQ probing
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: Selinux policy for x509_ima.der public certificate loaded by kernel during boot
- From: rishi gupta <gupt21@xxxxxxxxx>
- Re: [PATCH v5 7/7] selinux: measure state and hash of the policy using IMA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 6/7] IMA: add critical_data to the built-in policy rules
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/5] tpm_tis: fix IRQ probing
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 6/7] IMA: add critical_data to the built-in policy rules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Selinux policy for x509_ima.der public certificate loaded by kernel during boot
- From: Mikhail Novosyolov <m.novosyolov@xxxxxxxxxxxx>
- Re: [PATCH v8 0/4] Introduce TEE based Trusted Keys support
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 5/7] IMA: validate supported kernel data sources before measurement
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 4/7] IMA: add policy to measure critical data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 3/7] IMA: add hook to measure critical data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Selinux policy for x509_ima.der public certificate loaded by kernel during boot
- From: rishi gupta <gupt21@xxxxxxxxx>
- Re: [PATCH v5 2/7] IMA: update process_buffer_measurement to measure buffer hash
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 0/4] Introduce TEE based Trusted Keys support
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v4 2/3] ima: generalize x86/EFI arch glue for other EFI architectures
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 2/3] ima: generalize x86/EFI arch glue for other EFI architectures
- From: Chester Lin <clin@xxxxxxxx>
- Re: [PATCH v8 1/4] powerpc: Refactor kexec functions to move arch independent code to drivers/of
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/1] ima: Update doc for TPM 2.0 for calculating boot_aggregate
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v8 1/4] powerpc: Refactor kexec functions to move arch independent code to drivers/of
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v5 2/7] IMA: update process_buffer_measurement to measure buffer hash
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 0/3] wire up IMA secure boot for arm64
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v8 0/4] Introduce TEE based Trusted Keys support
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v22 13/23] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 11/23] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 10/23] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 09/23] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 08/23] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v8 1/4] powerpc: Refactor kexec functions to move arch independent code to drivers/of
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/7] IMA: Infrastructure for measurement of critical kernel data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v22 13/23] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 11/23] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 10/23] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 08/23] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 09/23] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v8 1/4] powerpc: Refactor kexec functions to move arch independent code to drivers/of
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v4 0/3] wire up IMA secure boot for arm64
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 0/3] wire up IMA secure boot for arm64
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 0/3] wire up IMA secure boot for arm64
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 0/3] wire up IMA secure boot for arm64
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 0/3] wire up IMA secure boot for arm64
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 3/3,RESEND 2] KEYS: trusted: Reserve TPM for seal and unseal operations
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 3/3,RESEND 2] KEYS: trusted: Reserve TPM for seal and unseal operations
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH] tpm: efi: Don't create binary_bios_measurements file for an empty log
- From: "Kenneth R. Crudup" <kenny@xxxxxxxxx>
- [PATCH v4 3/3,RESEND 2] KEYS: trusted: Reserve TPM for seal and unseal operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v4 2/3,RESEND 2] KEYS: trusted: Fix migratable=1 failing
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v4 1/3,RESEND 2] KEYS: trusted: Fix incorrect handling of tpm_get_random()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v4 0/3,RESEND 2] KEYS, trusted: a bunch of bug fixes
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/5] tpm_tis: fix IRQ probing
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 4/5] tpm_tis: fix IRQ probing
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v8 1/4] powerpc: Refactor kexec functions to move arch independent code to drivers/of
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 2/4] powerpc: Refactor kexec functions to move arch independent code to ima
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/3] efi: generalize efi_get_secureboot
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 1/4] powerpc: Refactor kexec functions to move arch independent code to drivers/of
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 2/4] powerpc: Refactor kexec functions to move arch independent code to ima
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 0/4] Carry forward IMA measurement log on kexec on ARM64
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 2/4] powerpc: Refactor kexec functions to move arch independent code to ima
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 1/4] powerpc: Refactor kexec functions to move arch independent code to drivers/of
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/3] efi: generalize efi_get_secureboot
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC] Finding the right target branch for patches that span IMA and SeLinux
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/3] efi: generalize efi_get_secureboot
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v8 4/4] MAINTAINERS: Add myself as Trusted Keys co-maintainer
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v8 3/4] doc: trusted-encrypted: updates with TEE as a new trust source
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v8 1/4] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v8 0/4] Introduce TEE based Trusted Keys support
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v8 0/4] Carry forward IMA measurement log on kexec on ARM64
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 2/4] powerpc: Refactor kexec functions to move arch independent code to ima
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 1/4] powerpc: Refactor kexec functions to move arch independent code to drivers/of
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: Alban Crequy <alban@xxxxxxxxxx>
- Re: [RFC] Finding the right target branch for patches that span IMA and SeLinux
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 4/5] tpm_tis: fix IRQ probing
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 4/5] tpm_tis: fix IRQ probing
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 3/5] tpm_tis: Fix interrupts for TIS TPMs without legacy cycles
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC] Finding the right target branch for patches that span IMA and SeLinux
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v4 3/3] arm64/ima: add ima_arch support
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v4 2/3] ima: generalize x86/EFI arch glue for other EFI architectures
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v4 1/3] efi: generalize efi_get_secureboot
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v4 0/3] wire up IMA secure boot for arm64
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC] Finding the right target branch for patches that span IMA and SeLinux
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Finding the right target branch for patches that span IMA and SeLinux
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 03/34] fs: add mount_setattr()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 01/34] namespace: take lock_mount_hash() directly when changing flags
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]