Linux Integrity
[Prev Page][Next Page]
- [PATCH v1 5/9] PKCS#7: Fix missing include
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v1 7/9] certs: Allow root user to append signed hashes to the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v1 9/9] tools/certs: Add print-cert-tbs-hash.sh
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v1 8/9] certs: Replace K{U,G}IDT_INIT() with GLOBAL_ROOT_{U,G}ID
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v1 4/9] certs: Check that builtin blacklist hashes are valid
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v1 0/9] Enable root to update the blacklist keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v2] char: tpm: add i2c driver for cr50
- From: Adrian Ratiu <adrian.ratiu@xxxxxxxxxxxxx>
- Re: [PATCH v6 8/8] selinux: measure state and hash of the policy using IMA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Re: [PATCH v3 1/2] tpm_tis_core: add optional max xfer size check
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 7/8] IMA: add a built-in policy rule for critical data measurement
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v6 0/8] IMA: support for measuring kernel integrity critical data
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH v2 00/39] fs: idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 00/39] fs: idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v2 00/39] fs: idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 00/39] fs: idmapped mounts
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- [PATCH v6 8/8] selinux: measure state and hash of the policy using IMA
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 7/8] IMA: add a built-in policy rule for critical data measurement
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 1/8] IMA: generalize keyring specific measurement constructs
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 2/8] IMA: add support to measure buffer data hash
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 0/8] IMA: support for measuring kernel integrity critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 3/8] IMA: define a hook to measure kernel integrity critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 6/8] IMA: add support to critical data hook to limit data sources for measurement
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 4/8] IMA: add policy rule to measure critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 5/8] IMA: extend policy to add data sources as a critical data measurement constraint
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Disable interrupts on ThinkPad T490s
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: Disable interrupts on ThinkPad T490s
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: Re: [PATCH v3 1/2] tpm_tis_core: add optional max xfer size check
- From: Dafna Hirschfeld <dafna.hirschfeld@xxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Disable interrupts on ThinkPad T490s
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 08/11] evm: Allow setxattr() and setattr() for unmodified metadata
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 00/39] fs: idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 00/39] fs: idmapped mounts
- From: Stephen Barber <smbarber@xxxxxxxxxxxx>
- Re: [PATCH v2 00/39] fs: idmapped mounts
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- RE: [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- RE: [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 35/39] ecryptfs: do not mount on top of idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 21/39] af_unix: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 27/39] would_dump: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 34/39] ext4: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 26/39] ioctl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 23/39] fcntl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 30/39] apparmor: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 20/39] open: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 22/39] utimes: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 25/39] init: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 32/39] ima: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 28/39] exec: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 38/39] selftests: add idmapped mounts xattr selftest
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 24/39] notify: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 37/39] fs: introduce MOUNT_ATTR_IDMAP
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 33/39] fat: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 31/39] audit: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 36/39] overlayfs: do not mount on top of idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 15/39] stat: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 13/39] xattr: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 19/39] open: handle idmapped mounts in do_truncate()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 18/39] namei: prepare for idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 16/39] namei: handle idmapped mounts in may_*() helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 17/39] namei: introduce struct renamedata
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 12/39] acl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 14/39] commoncap: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 11/39] attr: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 10/39] inode: add idmapped mount aware init and permission helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 09/39] namei: add idmapped mount aware permission helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 07/39] mount: attach mappings to mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 05/39] tests: add mount_setattr() selftests
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 08/39] capability: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 06/39] fs: add id translation helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 00/39] fs: idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 04/39] fs: add mount_setattr()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 02/39] mount: make {lock,unlock}_mount_hash() static
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 01/39] namespace: take lock_mount_hash() directly when changing flags
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 03/39] namespace: only take read lock in do_reconfigure_mnt()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 13/13] security/integrity/ima: converts stats to seqnum_ops
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v4 3/3] arm64/ima: add ima_arch support
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- [PATCH v9 5/8] powerpc: Move remove_ima_buffer() to drivers/of
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 3/8] ima: Define get_ima_kexec_buffer() in drivers/of
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 0/8] Carry forward IMA measurement log on kexec on ARM64
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 2/8] powerpc: Move delete_fdt_mem_rsv() to drivers/of
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 6/8] powerpc: Move ima_get_kexec_buffer() and ima_free_kexec_buffer() to ima
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 7/8] arm64: Store IMA log information in kimage used for kexec
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 8/8] arm64: Add IMA kexec buffer to DTB
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 4/8] powerpc: Use get_ima_kexec_buffer to get ima kexec buffer
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 1/8] powerpc: fix compiler warnings and errors
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 13/13] security/integrity/ima: converts stats to seqnum_ops
- From: Shuah Khan <skhan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 00/13] Introduce seqnum_ops
- From: Shuah Khan <skhan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/7] IMA: add hook to measure critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] ima: select ima-buf template for buffer measurement
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RESEND][PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v5 5/7] IMA: validate supported kernel data sources before measurement
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 3/7] IMA: add hook to measure critical data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/7] IMA: update process_buffer_measurement to measure buffer hash
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/7] IMA: update process_buffer_measurement to measure buffer hash
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 0/7] IMA: Infrastructure for measurement of critical kernel data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 5/7] IMA: validate supported kernel data sources before measurement
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/7] IMA: add policy to measure critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/7] IMA: add hook to measure critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/7] IMA: update process_buffer_measurement to measure buffer hash
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/7] IMA: update process_buffer_measurement to measure buffer hash
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] ima: select ima-buf template for buffer measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] ima: select ima-buf template for buffer measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH] ima: Set and clear FMODE_CAN_READ in ima_calc_file_hash()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH] ima: select ima-buf template for buffer measurement
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] ima: select ima-buf template for buffer measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/13] Introduce seqnum_ops
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH 00/13] Introduce seqnum_ops
- From: Shuah Khan <skhan@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 11/11] ima: Don't remove security.ima if file must not be appraised
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 10/11] ima: Introduce template field evmsig and write to field sig as fallback
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 08/11] evm: Allow setxattr() and setattr() for unmodified metadata
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 09/11] ima: Allow imasig requirement to be satisfied by EVM portable signatures
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 05/11] evm: Introduce evm_status_revalidate()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 06/11] evm: Ignore INTEGRITY_NOLABEL if no HMAC key is loaded
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 07/11] evm: Allow xattr/attr operations for portable signatures
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 02/11] evm: Load EVM key in ima_load_x509() to avoid appraisal
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 00/11] evm: Improve usability of portable signatures
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 01/11] evm: Execute evm_inode_init_security() only when an HMAC key is loaded
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 03/11] evm: Refuse EVM_ALLOW_METADATA_WRITES only if an HMAC key is loaded
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 04/11] ima: Move ima_reset_appraise_flags() call to post hooks
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH 13/13] security/integrity/ima: converts stats to seqnum_ops
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 00/13] Introduce seqnum_ops
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH 00/13] Introduce seqnum_ops
- From: Shuah Khan <skhan@xxxxxxxxxxxxxxxxxxx>
- Re: Selinux policy for x509_ima.der public certificate loaded by kernel during boot
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 00/13] Introduce seqnum_ops
- From: Alan Stern <stern@xxxxxxxxxxxxxxxxxxx>
- [PATCH 13/13] security/integrity/ima: converts stats to seqnum_ops
- From: Shuah Khan <skhan@xxxxxxxxxxxxxxxxxxx>
- [PATCH 00/13] Introduce seqnum_ops
- From: Shuah Khan <skhan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/5] ima-evm-utils: Change tpm2_pcr_read() to use C code
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH AUTOSEL 5.9 52/55] tpm_tis: Disable interrupts on ThinkPad T490s
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.4 40/42] tpm_tis: Disable interrupts on ThinkPad T490s
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 20/21] tpm_tis: Disable interrupts on ThinkPad T490s
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v5 6/7] IMA: add critical_data to the built-in policy rules
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: Selinux policy for x509_ima.der public certificate loaded by kernel during boot
- From: rishi gupta <gupt21@xxxxxxxxx>
- Re: [PATCH v5 6/7] IMA: add critical_data to the built-in policy rules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: possible deadlock in mnt_want_write
- From: syzbot <syzbot+ae82084b07d0297e566b@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 6/7] IMA: add critical_data to the built-in policy rules
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: Selinux policy for x509_ima.der public certificate loaded by kernel during boot
- From: Mikhail Novosyolov <m.novosyolov@xxxxxxxxxxxx>
- Re: [PATCH v2 4/5] tpm_tis: fix IRQ probing
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for v5.10-rc4
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] tpmdd updates for v5.10-rc4
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 4/5] tpm_tis: fix IRQ probing
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: Selinux policy for x509_ima.der public certificate loaded by kernel during boot
- From: rishi gupta <gupt21@xxxxxxxxx>
- Re: [PATCH v5 7/7] selinux: measure state and hash of the policy using IMA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 6/7] IMA: add critical_data to the built-in policy rules
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/5] tpm_tis: fix IRQ probing
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 6/7] IMA: add critical_data to the built-in policy rules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Selinux policy for x509_ima.der public certificate loaded by kernel during boot
- From: Mikhail Novosyolov <m.novosyolov@xxxxxxxxxxxx>
- Re: [PATCH v8 0/4] Introduce TEE based Trusted Keys support
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 5/7] IMA: validate supported kernel data sources before measurement
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 4/7] IMA: add policy to measure critical data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 3/7] IMA: add hook to measure critical data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Selinux policy for x509_ima.der public certificate loaded by kernel during boot
- From: rishi gupta <gupt21@xxxxxxxxx>
- Re: [PATCH v5 2/7] IMA: update process_buffer_measurement to measure buffer hash
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 0/4] Introduce TEE based Trusted Keys support
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v4 2/3] ima: generalize x86/EFI arch glue for other EFI architectures
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 2/3] ima: generalize x86/EFI arch glue for other EFI architectures
- From: Chester Lin <clin@xxxxxxxx>
- Re: [PATCH v8 1/4] powerpc: Refactor kexec functions to move arch independent code to drivers/of
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/1] ima: Update doc for TPM 2.0 for calculating boot_aggregate
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v8 1/4] powerpc: Refactor kexec functions to move arch independent code to drivers/of
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v5 2/7] IMA: update process_buffer_measurement to measure buffer hash
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 0/3] wire up IMA secure boot for arm64
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v8 0/4] Introduce TEE based Trusted Keys support
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v22 13/23] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 11/23] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 10/23] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 09/23] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 08/23] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v8 1/4] powerpc: Refactor kexec functions to move arch independent code to drivers/of
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/7] IMA: Infrastructure for measurement of critical kernel data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v22 13/23] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 11/23] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 10/23] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 08/23] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 09/23] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v8 1/4] powerpc: Refactor kexec functions to move arch independent code to drivers/of
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v4 0/3] wire up IMA secure boot for arm64
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 0/3] wire up IMA secure boot for arm64
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 0/3] wire up IMA secure boot for arm64
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 0/3] wire up IMA secure boot for arm64
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v4 0/3] wire up IMA secure boot for arm64
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 3/3,RESEND 2] KEYS: trusted: Reserve TPM for seal and unseal operations
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 3/3,RESEND 2] KEYS: trusted: Reserve TPM for seal and unseal operations
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH] tpm: efi: Don't create binary_bios_measurements file for an empty log
- From: "Kenneth R. Crudup" <kenny@xxxxxxxxx>
- [PATCH v4 3/3,RESEND 2] KEYS: trusted: Reserve TPM for seal and unseal operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v4 2/3,RESEND 2] KEYS: trusted: Fix migratable=1 failing
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v4 1/3,RESEND 2] KEYS: trusted: Fix incorrect handling of tpm_get_random()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v4 0/3,RESEND 2] KEYS, trusted: a bunch of bug fixes
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/5] tpm_tis: fix IRQ probing
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 4/5] tpm_tis: fix IRQ probing
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v8 1/4] powerpc: Refactor kexec functions to move arch independent code to drivers/of
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 2/4] powerpc: Refactor kexec functions to move arch independent code to ima
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/3] efi: generalize efi_get_secureboot
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 1/4] powerpc: Refactor kexec functions to move arch independent code to drivers/of
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 2/4] powerpc: Refactor kexec functions to move arch independent code to ima
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 0/4] Carry forward IMA measurement log on kexec on ARM64
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 2/4] powerpc: Refactor kexec functions to move arch independent code to ima
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 1/4] powerpc: Refactor kexec functions to move arch independent code to drivers/of
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/3] efi: generalize efi_get_secureboot
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC] Finding the right target branch for patches that span IMA and SeLinux
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/3] efi: generalize efi_get_secureboot
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v8 4/4] MAINTAINERS: Add myself as Trusted Keys co-maintainer
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v8 3/4] doc: trusted-encrypted: updates with TEE as a new trust source
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v8 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v8 1/4] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v8 0/4] Introduce TEE based Trusted Keys support
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v8 0/4] Carry forward IMA measurement log on kexec on ARM64
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 2/4] powerpc: Refactor kexec functions to move arch independent code to ima
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 1/4] powerpc: Refactor kexec functions to move arch independent code to drivers/of
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: Alban Crequy <alban@xxxxxxxxxx>
- Re: [RFC] Finding the right target branch for patches that span IMA and SeLinux
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 4/5] tpm_tis: fix IRQ probing
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 4/5] tpm_tis: fix IRQ probing
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 3/5] tpm_tis: Fix interrupts for TIS TPMs without legacy cycles
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC] Finding the right target branch for patches that span IMA and SeLinux
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v4 3/3] arm64/ima: add ima_arch support
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v4 2/3] ima: generalize x86/EFI arch glue for other EFI architectures
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v4 1/3] efi: generalize efi_get_secureboot
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v4 0/3] wire up IMA secure boot for arm64
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC] Finding the right target branch for patches that span IMA and SeLinux
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Finding the right target branch for patches that span IMA and SeLinux
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 03/34] fs: add mount_setattr()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 01/34] namespace: take lock_mount_hash() directly when changing flags
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 05/34] fs: introduce MOUNT_ATTR_IDMAP
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 06/34] fs: add id translation helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 07/34] capability: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC PATCH 4/4] x86: Add early PCR extend support for Secure Launch
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 3/4] tpm: Conditionally use static buffer in TPM buffer management
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] arm64/ima: add ima_arch support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH 2/4] tpm: Move core definitions and buffer management out of main TPM header
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] arm64/ima: add ima_arch support
- From: Chester Lin <clin@xxxxxxxx>
- Re: [PATCH v3 1/3] efi: generalize efi_get_secureboot
- From: Chester Lin <clin@xxxxxxxx>
- [PATCH v5 0/7] IMA: Infrastructure for measurement of critical kernel data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 1/7] IMA: generalize keyring specific measurement constructs
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 2/7] IMA: update process_buffer_measurement to measure buffer hash
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 4/7] IMA: add policy to measure critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 3/7] IMA: add hook to measure critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 6/7] IMA: add critical_data to the built-in policy rules
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 5/7] IMA: validate supported kernel data sources before measurement
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 7/7] selinux: measure state and hash of the policy using IMA
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 07/34] capability: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 06/34] fs: add id translation helpers
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 05/34] fs: introduce MOUNT_ATTR_IDMAP
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 03/34] fs: add mount_setattr()
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 01/34] namespace: take lock_mount_hash() directly when changing flags
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [RFC] Finding the right target branch for patches that span IMA and SeLinux
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [RFC PATCH 4/4] x86: Add early PCR extend support for Secure Launch
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- [RFC PATCH 3/4] tpm: Conditionally use static buffer in TPM buffer management
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- [RFC PATCH 2/4] tpm: Move core definitions and buffer management out of main TPM header
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- [RFC PATCH 1/4] tpm: Move TPM TIS definitions out of TIS core header
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- [RFC PATCH 0/4] Secure Launch early PCR extend support
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/5] tpm_tis: Clean up locality release
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC] Finding the right target branch for patches that span IMA and SeLinux
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v8 0/4] Carry forward IMA measurement log on kexec on ARM64
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 1/4] powerpc: Refactor kexec functions to move arch independent code to drivers/of
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 2/4] powerpc: Refactor kexec functions to move arch independent code to ima
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 4/4] arm64: Add IMA kexec buffer to DTB
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 3/4] arm64: Store IMA log information in kimage used for kexec
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] Finding the right target branch for patches that span IMA and SeLinux
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v2 4/5] tpm_tis: fix IRQ probing
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v2 3/5] tpm_tis: Fix interrupts for TIS TPMs without legacy cycles
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v2 4/5] tpm_tis: fix IRQ probing
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/5] tpm_tis: Clean up locality release
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- Re: [PATCH v2 4/5] tpm_tis: fix IRQ probing
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 3/5] tpm_tis: Fix interrupts for TIS TPMs without legacy cycles
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 2/5] tpm_tis: Clean up locality release
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/5] tpm_tis: Fix check_locality for correct locality acquisition
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 1/3] efi: generalize efi_get_secureboot
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 3/3] arm64/ima: add ima_arch support
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3 2/3] ima: replace arch-specific get_sb_mode() with a common helper ima_get_efi_secureboot()
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v4 0/3,RESEND] KEYS, trusted: a bunch of bug fixes
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 33/34] overlayfs: handle idmapped merged mounts
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH v4 1/3,RESEND] KEYS: trusted: Fix incorrect handling of tpm_get_random()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v4 3/3,RESEND] KEYS: trusted: Reserve TPM for seal and unseal operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v4 2/3,RESEND] KEYS: trusted: Fix migratable=1 failing
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v4 0/3,RESEND] KEYS, trusted: a bunch of bug fixes
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: efi: Don't create binary_bios_measurements file for an empty log
- From: Kai-Heng Feng <kai.heng.feng@xxxxxxxxxxxxx>
- [PATCH v3 3/3] arm64/ima: add ima_arch support
- From: Chester Lin <clin@xxxxxxxx>
- [PATCH v3 2/3] ima: replace arch-specific get_sb_mode() with a common helper ima_get_efi_secureboot()
- From: Chester Lin <clin@xxxxxxxx>
- [PATCH v3 1/3] efi: generalize efi_get_secureboot
- From: Chester Lin <clin@xxxxxxxx>
- [PATCH v3 0/3] add ima_arch support for ARM64
- From: Chester Lin <clin@xxxxxxxx>
- Re: [PATCH] tpm: efi: Don't create binary_bios_measurements file for an empty log
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RFC] Finding the right target branch for patches that span IMA and SeLinux
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC] Finding the right target branch for patches that span IMA and SeLinux
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: Stéphane Graber <stgraber@xxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 00/34] fs: idmapped mounts
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 00/34] fs: idmapped mounts
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 00/34] fs: idmapped mounts
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 00/34] fs: idmapped mounts
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: Lennart Poettering <lennart@xxxxxxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- ima-evm-utils: version 1.3.2 released
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 01/34] namespace: take lock_mount_hash() directly when changing flags
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 06/34] fs: add id translation helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 07/34] capability: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 09/34] inode: add idmapped mount aware init and permission helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 00/34] fs: idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 08/34] namei: add idmapped mount aware permission helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 03/34] fs: add mount_setattr()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 12/34] xattr: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 15/34] stat: add mapped_generic_fillattr()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 14/34] commoncap: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 30/34] ext4: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 33/34] overlayfs: handle idmapped merged mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 29/34] ima: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 26/34] fs: add helpers for idmap mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 34/34] fat: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 21/34] open: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 16/34] namei: handle idmapped mounts in may_*() helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 27/34] apparmor: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 32/34] overlayfs: handle idmapped lower directories
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 17/34] namei: introduce struct renamedata
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 20/34] open: handle idmapped mounts in do_truncate()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 28/34] audit: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 23/34] utimes: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 24/34] would_dump: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 18/34] namei: prepare for idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 19/34] namei: add lookup helpers with idmapped mounts aware permission checking
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 25/34] exec: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 31/34] expfs: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 22/34] af_unix: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 13/34] selftests: add idmapped mounts xattr selftest
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 10/34] attr: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 04/34] tests: add mount_setattr() selftests
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 11/34] acl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 05/34] fs: introduce MOUNT_ATTR_IDMAP
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 02/34] namespace: only take read lock in do_reconfigure_mnt()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- evmctl argument parsing, HMAC algorithm, HMAC replacement
- From: "Ahmed, Safayet (GE Research, US)" <Safayet.Ahmed@xxxxxx>
- [PATCH] tpm: efi: Don't create binary_bios_measurements file for an empty log
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: efi: Don't create binary_bios_measurements file for an empty log
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: efi: Don't create binary_bios_measurements file for an empty log
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: ima-evm-utils: version 1.3.2 released
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils] boot_aggregate.test: Skip if CONFIG_IMA not enabled
- From: Petr Vorel <petr.vorel@xxxxxxxxx>
- Re: [PATCH ima-evm-utils] boot_aggregate.test: Skip if CONFIG_IMA not enabled
- From: Mikhail Novosyolov <m.novosyolov@xxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] boot_aggregate.test: Skip if CONFIG_IMA not enabled
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] boot_aggregate.test: Skip if CONFIG_IMA not enabled
- From: Mikhail Novosyolov <m.novosyolov@xxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] boot_aggregate.test: Skip if CONFIG_IMA not enabled
- From: Mikhail Novosyolov <m.novosyolov@xxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] boot_aggregate.test: Skip if CONFIG_IMA not enabled
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [RESEND PATCH v11 0/3] Add trusted_for(2) (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v4 0/6] IMA: Infrastructure for measurement of critical kernel data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils] boot_aggregate.test: Skip if CONFIG_IMA not enabled
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] tpm_tis_core: Add the error log when the chip startup failed
- From: Tian Tao <tiantao6@xxxxxxxxxxxxx>
- Re: [Regression] "tpm: Require that all digests are present in TCG_PCR_EVENT2 structures" causes null pointer dereference
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] security: remove unneeded break
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 1/4] powerpc: Refactor kexec functions to move arch independent code to kernel
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [RFC PATCH 00/30] ima: Introduce IMA namespace
- From: "Dr. Greg" <greg@xxxxxxxxxxxx>
- Re: [PATCH v4 0/6] IMA: Infrastructure for measurement of critical kernel data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 4/5] tpm_tis: fix IRQ probing
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 3/5] tpm_tis: Fix interrupts for TIS TPMs without legacy cycles
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 2/5] tpm_tis: Clean up locality release
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/5] tpm_tis: Fix check_locality for correct locality acquisition
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] IMA: Measure kernel version in early boot
- From: Raphael Gianotti <raphgi@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 5/6] IMA: add hook to measure critical data from kernel components
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 4/6] IMA: add policy to measure critical data from kernel components
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/6] IMA: conditionally allow empty rule data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/6] IMA: generalize keyring specific measurement constructs
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3] dm verity: Add support for signature verification with 2nd keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v2] dm verity: Add support for signature verification with 2nd keyring
- From: Mike Snitzer <snitzer@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils] boot_aggregate.test: Skip if CONFIG_IMA not enabled
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] dm verity: Add support for signature verification with 2nd keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v7 1/4] powerpc: Refactor kexec functions to move arch independent code to kernel
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v4 5/6] IMA: add hook to measure critical data from kernel components
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 4/6] IMA: add policy to measure critical data from kernel components
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/6] IMA: conditionally allow empty rule data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/6] IMA: generalize keyring specific measurement constructs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 1/4] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH 07/13] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: Measuring kernel modules with IMA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 1/4] powerpc: Refactor kexec functions to move arch independent code to kernel
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 2/4] powerpc: Refactor kexec functions to move arch independent code to ima
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 07/13] x86: Secure Launch kernel early boot stub
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH 07/13] x86: Secure Launch kernel early boot stub
- From: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
- Re: [PATCH v7 1/4] KEYS: trusted: Add generic trusted keys framework
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [Regression] "tpm: Require that all digests are present in TCG_PCR_EVENT2 structures" causes null pointer dereference
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 1/4] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v7 2/4] powerpc: Refactor kexec functions to move arch independent code to ima
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 1/4] KEYS: trusted: Add generic trusted keys framework
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 1/4] powerpc: Refactor kexec functions to move arch independent code to kernel
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 2/4] powerpc: Refactor kexec functions to move arch independent code to ima
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 1/4] powerpc: Refactor kexec functions to move arch independent code to kernel
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [Regression] "tpm: Require that all digests are present in TCG_PCR_EVENT2 structures" causes null pointer dereference
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] security: remove unneeded break
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 2/4] powerpc: Refactor kexec functions to move arch independent code to ima
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 1/4] powerpc: Refactor kexec functions to move arch independent code to kernel
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC] treewide: cleanup unreachable breaks
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] boot_aggregate.test: Skip if CONFIG_IMA not enabled
- From: Petr Vorel <petr.vorel@xxxxxxxxx>
- Re: [RFC] treewide: cleanup unreachable breaks
- From: Tom Rix <trix@xxxxxxxxxx>
- Re: [RFC] treewide: cleanup unreachable breaks
- From: Tom Rix <trix@xxxxxxxxxx>
- Re: [Ocfs2-devel] [RFC] treewide: cleanup unreachable breaks
- From: John Haxby <john.haxby@xxxxxxxxxx>
- Re: [PATCH] file2bin: Pass the right values to size and count parameters for fread()
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH] security: remove unneeded break
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v2 3/5] tpm_tis: Fix interrupts for TIS TPMs without legacy cycles
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v2 4/5] tpm_tis: fix IRQ probing
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v2 5/5] Revert "tpm: Revert "tpm_tis_core: Turn on the TPM before probing IRQ's""
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v2 2/5] tpm_tis: Clean up locality release
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v2 1/5] tpm_tis: Fix check_locality for correct locality acquisition
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils] boot_aggregate.test: Skip if CONFIG_IMA not enabled
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC] treewide: cleanup unreachable breaks
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] file2bin: Pass the right values to size and count parameters for fread()
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 5/5] Revert "tpm: Revert "tpm_tis_core: Turn on the TPM before probing IRQ's""
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] file2bin: Pass the right values to size and count parameters for fread()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] file2bin: Pass the right values to size and count parameters for fread()
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] file2bin: Pass the right values to size and count parameters for fread()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] file2bin: Pass the right values to size and count parameters for fread()
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2 5/5] Revert "tpm: Revert "tpm_tis_core: Turn on the TPM before probing IRQ's""
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [ima-evm-utils][PATCH] file2bin: Pass the right values to size and count parameters for fread()
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH ima-evm-utils] boot_aggregate.test: Skip if CONFIG_IMA not enabled
- From: Petr Vorel <petr.vorel@xxxxxxxxx>
- [PATCH] file2bin: Pass the right values to size and count parameters for fread()
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] treewide: cleanup unreachable breaks
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH 07/13] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH] security: remove unneeded break
- [PATCH v4 1/2] dm-devel: collect target data and submit to IMA to measure
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 2/2] dm-crypt: collect data and submit to DM to measure
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 0/2] dm-devel:dm-crypt: infrastructure for measurement of DM target data using IMA
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 07/13] x86: Secure Launch kernel early boot stub
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH 07/13] x86: Secure Launch kernel early boot stub
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [RESEND PATCH v11 2/3] arch: Wire up trusted_for(2)
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [RESEND PATCH v11 2/3] arch: Wire up trusted_for(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RESEND PATCH v11 3/3] selftest/interpreter: Add tests for trusted_for(2) policies
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RESEND PATCH v11 1/3] fs: Add trusted_for(2) syscall implementation and related sysctl
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RESEND PATCH v11 0/3] Add trusted_for(2) (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Measuring kernel modules with IMA
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 07/13] x86: Secure Launch kernel early boot stub
- From: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
- Re: [PATCH 07/13] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- RE: [RFC PATCH 00/30] ima: Introduce IMA namespace
- From: Krzysztof Struczynski <krzysztof.struczynski@xxxxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxx>
- Re: [PATCH] tpm_tis: Disable interrupts on ThinkPad T490s
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxx>
- Re: [PATCH] tpm_tis: Disable interrupts on ThinkPad T490s
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [Ocfs2-devel] [RFC] treewide: cleanup unreachable breaks
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [Ocfs2-devel] [RFC] treewide: cleanup unreachable breaks
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [Ocfs2-devel] [RFC] treewide: cleanup unreachable breaks
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [Ocfs2-devel] [RFC] treewide: cleanup unreachable breaks
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [Ocfs2-devel] [RFC] treewide: cleanup unreachable breaks
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [RFC] treewide: cleanup unreachable breaks
- From: Tom Rix <trix@xxxxxxxxxx>
- Re: [RFC] treewide: cleanup unreachable breaks
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [RFC] treewide: cleanup unreachable breaks
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC] treewide: cleanup unreachable breaks
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [Cocci] [RFC] treewide: cleanup unreachable breaks
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [Cocci] [RFC] treewide: cleanup unreachable breaks
- From: Julia Lawall <julia.lawall@xxxxxxxx>
- Re: [RFC] treewide: cleanup unreachable breaks
- From: Joe Perches <joe@xxxxxxxxxxx>
- [RFC] treewide: cleanup unreachable breaks
- Re: [PATCH] Fix Atmel TPM crash caused by too frequent queries
- From: Hao Wu <hao.wu@xxxxxxxxxx>
- Re: [PATCH 07/13] x86: Secure Launch kernel early boot stub
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- [ima-evm-utils][PATCH 3/3] travis: properly kill the software TPM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils][PATCH 2/3] travis: rename the software tpm variables
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils][PATCH 1/3] travis: retry sending tssstartup
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils][PATCH 0/3] travis: misc software TPM changes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] dm verity: Add support for signature verification with 2nd keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v2] dm verity: Add support for signature verification with 2nd keyring
- From: Milan Broz <gmazyland@xxxxxxxxx>
- Re: [PATCH v2] dm verity: Add support for signature verification with 2nd keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v2] dm verity: Add support for signature verification with 2nd keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH] tpm_tis: Disable interrupts on ThinkPad T490s
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: Disable interrupts on ThinkPad T490s
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [GIT PULL] integrity subsystem updates for v5.10
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH] tpm_tis: Disable interrupts on ThinkPad T490s
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: Disable interrupts on ThinkPad T490s
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [PATCH] tpm_tis: Disable interrupts on ThinkPad T490s
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH 07/13] x86: Secure Launch kernel early boot stub
- From: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
- Re: [PATCH v2] dm verity: Add support for signature verification with 2nd keyring
- From: Mike Snitzer <snitzer@xxxxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v2] dm verity: Add support for signature verification with 2nd keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v2] MAINTAINERS: jarkko.sakkinen@xxxxxxxxxxxxxxx -> jarkko@xxxxxxxxxx
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] ima-evm-utils: Change env variable TPM_SERVER_TYPE for tpm_server
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] ima-evm-utils: Change env variable TPM_SERVER_TYPE for tpm_server
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] ima-evm-utils: Change env variable TPM_SERVER_TYPE for tpm_server
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] efi: add secure boot get helper
- From: Chester Lin <clin@xxxxxxxx>
- Re: [PATCH v2] ima: defer arch_ima_get_secureboot() call to IMA init time
- From: Chester Lin <clin@xxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v2 1/5] ima-evm-utils: Change env variable TPM_SERVER_TYPE for tpm_server
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] ima-evm-utils: Change env variable TPM_SERVER_TYPE for tpm_server
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] ima-evm-utils: Change env variable TPM_SERVER_TYPE for tpm_server
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: WARN_ONCE triggered: tpm_tis: Add a check for invalid status
- From: Dirk Gouders <dirk@xxxxxxxxxxx>
- RE: QUEMU and TPM2 device emulation
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- RE: QUEMU and TPM2 device emulation
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: WARN_ONCE triggered: tpm_tis: Add a check for invalid status
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- WARN_ONCE triggered: tpm_tis: Add a check for invalid status
- From: Dirk Gouders <dirk@xxxxxxxxxxx>
- [GIT PULL] integrity subsystem updates for v5.10
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: QUEMU and TPM2 device emulation
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: QUEMU and TPM2 device emulation
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- QUEMU and TPM2 device emulation
- From: "Roberts, William C" <william.c.roberts@xxxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH v2 1/2] efi: add secure boot get helper
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] ima: defer arch_ima_get_secureboot() call to IMA init time
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] efi: add secure boot get helper
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 1/2] efi: add secure boot get helper
- From: Chester Lin <clin@xxxxxxxx>
- [PATCH v2 2/2] arm64/ima: add ima_arch support
- From: Chester Lin <clin@xxxxxxxx>
- [PATCH v2 1/2] efi: add secure boot get helper
- From: Chester Lin <clin@xxxxxxxx>
- [PATCH v2 0/2] add ima_arch support for ARM64
- From: Chester Lin <clin@xxxxxxxx>
- Re: [PATCH v2] ima: defer arch_ima_get_secureboot() call to IMA init time
- From: Chester Lin <clin@xxxxxxxx>
- Re: [PATCH v7 1/4] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v7 4/4] MAINTAINERS: Add entry for TEE based Trusted Keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v2] ima: defer arch_ima_get_secureboot() call to IMA init time
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: jarkko.sakkinen@xxxxxxxxxxxxxxx -> jarkko@xxxxxxxxxx
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: jarkko.sakkinen@xxxxxxxxxxxxxxx -> jarkko@xxxxxxxxxx
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [integrity:next-integrity-testing 13/13] security/integrity/ima/ima_appraise.c:21:62: error: expected ')' before numeric constant
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [integrity:next-integrity-testing 13/13] security/integrity/ima/ima_appraise.c:21:62: error: expected ')' before numeric constant
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [integrity:next-integrity-testing 13/13] security/integrity/ima/ima_appraise.c:21:62: error: expected ')' before numeric constant
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2] ima: defer arch_ima_get_secureboot() call to IMA init time
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH][V2] ima: Fix sizeof mismatches
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- Re: [PATCH v2] ima: defer arch_ima_get_secureboot() call to IMA init time
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: Fix sizeof mismatches
- From: Colin Ian King <colin.king@xxxxxxxxxxxxx>
- Re: [PATCH] ima: Fix sizeof mismatches
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: jarkko.sakkinen@xxxxxxxxxxxxxxx -> jarkko@xxxxxxxxxx
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [Regression] "tpm: Require that all digests are present in TCG_PCR_EVENT2 structures" causes null pointer dereference
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [Regression] "tpm: Require that all digests are present in TCG_PCR_EVENT2 structures" causes null pointer dereference
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 4/4] MAINTAINERS: Add entry for TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 1/4] KEYS: trusted: Add generic trusted keys framework
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 4/4] MAINTAINERS: Add entry for TEE based Trusted Keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v7 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v7 1/4] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH] MAINTAINERS: jarkko.sakkinen@xxxxxxxxxxxxxxx -> jarkko@xxxxxxxxxx
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v1] dm verity: Add support for signature verification with 2nd keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v2] ima: defer arch_ima_get_secureboot() call to IMA init time
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] ima: defer arch_ima_get_secureboot() call to IMA init time
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v4 3/3] KEYS: trusted: Reserve TPM for seal and unseal operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v4 2/3] KEYS: trusted: Fix migratable=1 failing
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v4 1/3] KEYS: trusted: Fix incorrect handling of tpm_get_random()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v4 0/3] KEYS, trusted: a bunch of bug fixes
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] KEYS: trusted: Reserve TPM for seal and unseal operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 4/4] MAINTAINERS: Add entry for TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 1/4] KEYS: trusted: Add generic trusted keys framework
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] KEYS: trusted: Reserve TPM for seal and unseal operations
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v3 3/3] KEYS: trusted: Reserve TPM for seal and unseal operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v3 2/3] KEYS: trusted: Fix migratable=1 failing
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v3 1/3] KEYS: trusted: Fix incorrect handling of tpm_get_random()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v3 0/3] KEYS, trusted: a bunch of bug fixes
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v1] dm verity: Add support for signature verification with 2nd keyring
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v2 5/5] ima-evm-utils: Expand the INSTALL instructions.
- From: Ken Goldman <kgoldman@xxxxxxxxxx>
- [PATCH v2 4/5] ima-evm-utils: Correct spelling errors
- From: Ken Goldman <kgoldman@xxxxxxxxxx>
- [PATCH v2 3/5] ima-evm-utils: Change tpm2_pcr_read() to use C code
- From: Ken Goldman <kgoldman@xxxxxxxxxx>
- [PATCH v2 2/5] ima-evm-utils: Change PCR iterater from int to uint32_t
- From: Ken Goldman <kgoldman@xxxxxxxxxx>
- [PATCH v2 1/5] ima-evm-utils: Change env variable TPM_SERVER_TYPE for tpm_server
- From: Ken Goldman <kgoldman@xxxxxxxxxx>
- [PATCH v2 0/5] Updates to use IBM TSS C API rather than command line tools
- From: Ken Goldman <kgoldman@xxxxxxxxxx>
- Re: [PATCH] ima: defer arch_ima_get_secureboot() call to IMA init time
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v21 13/23] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v21 11/23] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v21 10/23] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v21 09/23] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v21 08/23] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for v5.10
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH] ima: Fix sizeof mismatches
- From: Colin Ian King <colin.king@xxxxxxxxxxxxx>
- Re: [PATCH] ima: Fix sizeof mismatches
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH] ima: Fix sizeof mismatches
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] ima: defer arch_ima_get_secureboot() call to IMA init time
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 1/6] efistub: pass uefi secureboot flag via fdt params
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 0/5] tpm_tis: fix interrupts (again)
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Does selinux rule needed for .ima keyring access - integrity: Request for unknown key 'id:87deb3bf' err -13
- From: rishi gupta <gupt21@xxxxxxxxx>
- Re: [PATCH v2 2/3] KEYS: trusted: Reserve TPM for seal and unseal operations
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH RFC PKS/Trusted keys 2/2] keys/trusted: protect trusted keys using PKS
- From: ira.weiny@xxxxxxxxx
- [PATCH RFC PKS/Trusted keys 1/2] vmalloc: Add vmalloc_pks() call
- From: ira.weiny@xxxxxxxxx
- [PATCH RFC PKS/Trusted keys 0/2] trusted keys: Add PKS protection to trusted keys
- From: ira.weiny@xxxxxxxxx
- Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [Regression] "tpm: Require that all digests are present in TCG_PCR_EVENT2 structures" causes null pointer dereference
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH 5/5] ima-evm-utils: Expand the INSTALL instructions.
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- [PATCH 4/5] ima-evm-utils: Correct spelling errors
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- [PATCH 3/5] ima-evm-utils: Change tpm2_pcr_read() to use C code
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- [PATCH 2/5] ima-evm-utils: Change PCR iterater from int to uint32_t
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- [PATCH 1/5] ima-evm-utils: Change env variable TPM_SERVER_TYPE for, tpm_server
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- [PATCH 0/5] Updates to use IBM TSS C API rather than command line tools
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH v1] dm verity: Add support for signature verification with 2nd keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [Regression] "tpm: Require that all digests are present in TCG_PCR_EVENT2 structures" causes null pointer dereference
- From: Kai-Heng Feng <kai.heng.feng@xxxxxxxxxxxxx>
- Re: [PATCH] ima: Fix sizeof mismatches
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH] ima: Fix sizeof mismatches
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- RE: [PATCH] ima: Fix sizeof mismatches
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH 3/6] ima-evm-utils: When using the IBM TSS, link in its library
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH] ima: Fix sizeof mismatches
- From: Colin King <colin.king@xxxxxxxxxxxxx>
- [PATCH v7 4/4] MAINTAINERS: Add entry for TEE based Trusted Keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v7 3/4] doc: trusted-encrypted: updates with TEE as a new trust source
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v7 2/4] KEYS: trusted: Introduce TEE based Trusted Keys
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v7 1/4] KEYS: trusted: Add generic trusted keys framework
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- [PATCH v7 0/4] Introduce TEE based Trusted Keys support
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH 3/6] ima-evm-utils: When using the IBM TSS, link in its library
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/4] TPM 2.0 fixes in IMA tests
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH 3/6] ima-evm-utils: When using the IBM TSS, link in its library
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH v5 10/16] module: Call security_kernel_post_load_data()
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v5 11/16] LSM: Add "contents" flag to kernel_read_file hook
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v5 04/16] fs/kernel_read_file: Split into separate source file
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v5 01/16] fs/kernel_read_file: Remove FIRMWARE_PREALLOC_BUFFER enum
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v3 0/4] TPM 2.0 fixes in IMA tests
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/4] TPM 2.0 fixes in IMA tests
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/6] ima-evm-utils: When using the IBM TSS, link in its library
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH 1/1] travis: Fix Tumbleweed installation
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v3 0/4] TPM 2.0 fixes in IMA tests
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2 2/5] tpm_tis: Clean up locality release
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] tpm_tis: Fix check_locality for correct locality acquisition
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH 6/6] ima-evm-utils: Expand the INSTALL instructions.
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- [PATCH 5/6] ima-evm-utils: Correct spelling errors
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- [PATCH 4/6] ima-evm-utils: Change tpm2_pcr_read() to use C code
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- [PATCH 3/6] ima-evm-utils: When using the IBM TSS, link in its library
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- [PATCH 2/6] ima-evm-utils: Change PCR iterater from int to uint32_t
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/5] tpm_tis: Fix interrupts for TIS TPMs without legacy cycles
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/5] tpm_tis: Clean up locality release
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] tpm_tis: Fix check_locality for correct locality acquisition
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/5] tpm_tis: Clean up locality release
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/5] tpm_tis: Clean up locality release
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/5] tpm_tis: fix IRQ probing
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] tpm_tis: Fix check_locality for correct locality acquisition
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v2 3/3] KEYS: trusted: Fix migratable=1 failing
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v2 2/3] KEYS: trusted: Reserve TPM for seal and unseal operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v2 1/3] KEYS: trusted: Fix incorrect handling of tpm_get_random()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v2 0/3] A bunch of trusted keys fixes
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] KEYS: trusted: Reserve TPM for seal and unseal operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] KEYS: trusted: Reserve TPM for seal and unseal operations
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 2/3] KEYS: trusted: Reserve TPM for seal and unseal operations
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 1/6] efistub: pass uefi secureboot flag via fdt params
- From: Chester Lin <clin@xxxxxxxx>
- [PATCH 1/3] KEYS: trusted: Fix incorrect handling of tpm_get_random()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH 3/3] KEYS: trusted: Fix migratable=1 failing
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH 2/3] KEYS: trusted: Reserve TPM for seal and unseal operations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH 0/3] A bunch of trusted keys fixes
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [GIT PULL] tpmdd updates for v5.10
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]