Linux Integrity
[Prev Page][Next Page]
- Re: [PATCH] SELinux: Measure state and hash of policy using IMA
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Measure state and hash of policy using IMA
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 08/11] ima: Allow imasig requirement to be satisfied by EVM portable signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 09/11] ima: Don't remove security.ima if file must not be appraised
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 10/11] ima: Don't ignore errors from crypto_shash_update()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 07/11] evm: Set IMA_CHANGE_XATTR/ATTR bit if EVM_ALLOW_METADATA_WRITES is set
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 06/11] evm: Allow setxattr() and setattr() if metadata digest won't change
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 05/11] evm: Allow xattr/attr operations for portable signatures if check fails
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 04/11] evm: Check size of security.evm before using it
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] security: fix some spelling mistakes in the comments by codespell
- From: Xiaoming Ni <nixiaoming@xxxxxxxxxx>
- [PATCH] SELinux: Measure state and hash of policy using IMA
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/2] dm-crypt: collect data and submit to DM to measure
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 1/2] dm-devel: collect target data and submit to IMA to measure
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/2] dm-devel:dm-crypt: infrastructure for measurement of DM target data using IMA
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH] IMA: Handle early boot data measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 03/11] evm: Refuse EVM_ALLOW_METADATA_WRITES only if the HMAC key is loaded
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 02/11] evm: Load EVM key in ima_load_x509() to avoid appraisal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 01/11] evm: Execute evm_inode_init_security() only when the HMAC key is loaded
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 3/3] IMA: define IMA hook to measure critical data from kernel components
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/3] IMA: add policy to support measuring critical data from kernel components
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 1/3] IMA: generalize keyring specific measurement constructs
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/3] IMA: Infrastructure for measurement of critical kernel data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- RE: [RFC PATCH 00/30] ima: Introduce IMA namespace
- From: Krzysztof Struczynski <krzysztof.struczynski@xxxxxxxxxx>
- RE: [RFC PATCH 00/30] ima: Introduce IMA namespace
- From: Krzysztof Struczynski <krzysztof.struczynski@xxxxxxxxxx>
- RE: [RFC PATCH 00/30] ima: Introduce IMA namespace
- From: Krzysztof Struczynski <krzysztof.struczynski@xxxxxxxxxx>
- [PATCH v4] docs: trusted-encrypted.rst: update parameters for command examples
- From: Coly Li <colyli@xxxxxxx>
- Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [LTP v4 5/5] IMA/ima_keys.sh: Enhance policy checks
- From: Petr Vorel <pvorel@xxxxxxx>
- [LTP v4 4/5] IMA: Add a test to verify measurement of certificate imported into a keyring
- From: Petr Vorel <pvorel@xxxxxxx>
- [LTP v4 3/5] IMA: Refactor datafiles directory
- From: Petr Vorel <pvorel@xxxxxxx>
- [LTP v4 2/5] IMA/ima_keys.sh: Require template=ima-buf, fix grep pattern
- From: Petr Vorel <pvorel@xxxxxxx>
- [LTP v4 1/5] IMA/ima_keys.sh: Fix policy content check usage
- From: Petr Vorel <pvorel@xxxxxxx>
- [LTP v4 0/5] IMA: verify measurement of certificate imported into a keyring
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/2] dt-bindings: Add SynQucer TPM MMIO as a trivial device
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 4/5] arm64: Store IMA log information in kimage used for kexec
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 1/5] powerpc: Refactor kexec functions to move arch independent code to IMA
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 2/5] powerpc: Use libfdt functions to fetch IMA buffer properties
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 3/5] IMA: Refactor do_get_kexec_buffer() to call of_ functions directly
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 5/5] arm64: Add IMA kexec buffer to DTB
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 0/5] Carry forward IMA measurement log on kexec on ARM64
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils 0/9] Docker based Travis CI builds
- From: George Wilson <gcwilson@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils 0/9] Docker based Travis CI builds
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v5 2/2] dt-bindings: Add SynQucer TPM MMIO as a trivial device
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils 0/9] Docker based Travis CI builds
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH ima-evm-utils 0/9] Docker based Travis CI builds
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [RFC PATCH 00/30] ima: Introduce IMA namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 00/30] ima: Introduce IMA namespace
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [RFC PATCH 15/30] ima: Add a reader counter to the integrity inode data
- From: <krzysztof.struczynski@xxxxxxxxxx>
- [RFC PATCH 24/30] keys: Include key domain tag in the iterative search
- From: <krzysztof.struczynski@xxxxxxxxxx>
- [RFC PATCH 22/30] ima: Remap IDs of subject based rules if necessary
- From: <krzysztof.struczynski@xxxxxxxxxx>
- [RFC PATCH 20/30] ima: Parse per ima namespace policy file
- From: <krzysztof.struczynski@xxxxxxxxxx>
- [RFC PATCH 17/30] ima: Add the violation counter to the namespace
- From: <krzysztof.struczynski@xxxxxxxxxx>
- [RFC PATCH 21/30] user namespace: Add function that checks if the UID map is defined
- From: <krzysztof.struczynski@xxxxxxxxxx>
- [RFC PATCH 27/30] integrity: Add key domain tag to the search criteria
- From: <krzysztof.struczynski@xxxxxxxxxx>
- Re: [RFC PATCH 00/30] ima: Introduce IMA namespace
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [RFC PATCH 28/30] ima: Load per ima namespace x509 certificate
- From: <krzysztof.struczynski@xxxxxxxxxx>
- [RFC PATCH 25/30] keys: Allow to set key domain tag separately from the key type
- From: <krzysztof.struczynski@xxxxxxxxxx>
- [RFC PATCH 30/30] ima: Set ML template per ima namespace
- From: <krzysztof.struczynski@xxxxxxxxxx>
- [RFC PATCH 29/30] ima: Add dummy boot aggregate to per ima namespace measurement list
- From: <krzysztof.struczynski@xxxxxxxxxx>
- [RFC PATCH 26/30] ima: Add key domain to the ima namespace
- From: <krzysztof.struczynski@xxxxxxxxxx>
- [RFC PATCH 23/30] keys: Add domain tag to the keyring search criteria
- From: <krzysztof.struczynski@xxxxxxxxxx>
- [RFC PATCH 16/30] ima: Extend permissions to the ima securityfs entries
- From: <krzysztof.struczynski@xxxxxxxxxx>
- [RFC PATCH 19/30] ima: Configure the new ima namespace from securityfs
- From: <krzysztof.struczynski@xxxxxxxxxx>
- [RFC PATCH 18/30] ima: Change the owning user namespace of the ima namespace if necessary
- From: <krzysztof.struczynski@xxxxxxxxxx>
- [RFC PATCH 14/30] ima: Add per namespace view of the measurement list
- From: <krzysztof.struczynski@xxxxxxxxxx>
- [RFC PATCH 11/30] ima: Keep track of the measurment list per ima namespace
- From: <krzysztof.struczynski@xxxxxxxxxx>
- [RFC PATCH 12/30] ima: Check ima namespace ID during digest entry lookup
- From: <krzysztof.struczynski@xxxxxxxxxx>
- [RFC PATCH 13/30] ima: Add a new ima template that includes namespace ID
- From: <krzysztof.struczynski@xxxxxxxxxx>
- [RFC PATCH 10/30] ima: Add ima namespace ID to the ima ML related structures
- From: <krzysztof.struczynski@xxxxxxxxxx>
- [RFC PATCH 02/30] ima: Add a list of the installed ima namespaces
- From: <krzysztof.struczynski@xxxxxxxxxx>
- [RFC PATCH 04/30] ima: Add ima policy related data to the ima namespace
- From: <krzysztof.struczynski@xxxxxxxxxx>
- [RFC PATCH 05/30] ima: Add methods for parsing ima policy configuration string
- From: <krzysztof.struczynski@xxxxxxxxxx>
- [RFC PATCH 07/30] ima: Extend the APIs in the integrity subsystem
- From: <krzysztof.struczynski@xxxxxxxxxx>
- [RFC PATCH 09/30] ima: Enable per ima namespace policy settings
- From: <krzysztof.struczynski@xxxxxxxxxx>
- [RFC PATCH 08/30] ima: Add integrity inode related data to the ima namespace
- From: <krzysztof.struczynski@xxxxxxxxxx>
- [RFC PATCH 06/30] ima: Add ima namespace to the ima subsystem APIs
- From: <krzysztof.struczynski@xxxxxxxxxx>
- [RFC PATCH 03/30] ima: Bind ima namespace to the file descriptor
- From: <krzysztof.struczynski@xxxxxxxxxx>
- [RFC PATCH 01/30] ima: Introduce ima namespace
- From: <krzysztof.struczynski@xxxxxxxxxx>
- [RFC PATCH 00/30] ima: Introduce IMA namespace
- From: <krzysztof.struczynski@xxxxxxxxxx>
- Re: [PATCH v3 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v1] tpm: use %*ph to print small buffer
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v1] tpm: use %*ph to print small buffer
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] IMA: add policy to support measuring critical data from kernel components
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] IMA: add policy to support measuring critical data from kernel components
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] SELinux: Measure state and hash of policy using IMA
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] SELinux: Measure state and hash of policy using IMA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 0/2] dm-devel:dm-crypt: infrastructure for measurement of DM target data using IMA
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] SELinux: Measure state and hash of policy using IMA
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] IMA: add policy to support measuring critical data from kernel components
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] SELinux: Measure state and hash of policy using IMA
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 4/4] integrity: prompt keyring name for unknown key request
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- [PATCH 3/4] ima: limit secure boot feedback scope for appraise
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- [PATCH 2/4] integrity: invalid kernel parameters feedback
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- [PATCH 1/4] ima: add check for enforced appraise option
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- [PATCH 0/4] integrity: improve user feedback for invalid bootparams
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH 0/2] dm-devel:dm-crypt: infrastructure for measurement of DM target data using IMA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v4 0/1] add sysfs exports for TPM 2 PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] SELinux: Measure state and hash of policy using IMA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC] ima: export the measurement list when needed
- From: Raphael Gianotti <raphgi@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/2] dt-bindings: Add SynQucer TPM MMIO as a trivial device
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] IMA: add policy to support measuring critical data from kernel components
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/4] IMA: verify measurement of certificate imported into a keyring
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v3 0/4] IMA: verify measurement of certificate imported into a keyring
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils 9/9] travis: Switch to docker based builds
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v3 0/4] IMA: verify measurement of certificate imported into a keyring
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v3 0/4] IMA: verify measurement of certificate imported into a keyring
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/2] dt-bindings: Add SynQucer TPM MMIO as a trivial device
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils 0/9] Docker based Travis CI builds
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils 9/9] travis: Switch to docker based builds
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [ima-evm-utils][PATCH] Install the swtpm package, if available
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/4] IMA: verify measurement of certificate imported into a keyring
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [ima-evm-utils][PATCH] Install the swtpm package, if available
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- [PATCH v3 3/4] IMA: Add a test to verify measurement of certificate imported into a keyring
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v3 4/4] IMA/ima_keys.sh: Enhance policy checks
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v3 2/4] IMA: Refactor datafiles directory
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v3 1/4] IMA/ima_keys.sh: Fix policy content check usage
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v3 0/4] IMA: verify measurement of certificate imported into a keyring
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2 3/4] IMA: Add a test to verify measurement of certificate imported into a keyring
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [ima-evm-utils][PATCH] Install the swtpm package, if available
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH ima-evm-utils 9/9] travis: Switch to docker based builds
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2 3/4] IMA: Add a test to verify measurement of certificate imported into a keyring
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] IMA: Add a test to verify measurement of certificate imported into a keyring
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 2/2] dm-crypt: collect data and submit to DM to measure
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] dm-devel: collect target data and submit to IMA to measure
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/2] dm-devel:dm-crypt: infrastructure for measurement of DM target data using IMA
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [ima-evm-utils][PATCH] Install the swtpm package, if available
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils][PATCH] Install the swtpm package, if available
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils 9/9] travis: Switch to docker based builds
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [dm-devel] [RFC PATCH v5 00/11] Integrity Policy Enforcement LSM (IPE)
- From: Chuck Lever <chucklever@xxxxxxxxx>
- [linux-ima-user]Systemd cgroups freezes after activating EVM
- From: "Vranceanu, Vladut" <Vladut.Vranceanu@xxxxxxxxxx>
- Re: [PATCH v5 1/2] tpm: tis: add support for MMIO TPM on SynQuacer
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/2] tpm: tis: add support for MMIO TPM on SynQuacer
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH 5/5] ima-evm-utils: travis: openssl gost engine
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH 5/5] ima-evm-utils: travis: openssl gost engine
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH ima-evm-utils 9/9] travis: Switch to docker based builds
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH ima-evm-utils 6/9] Remove install-tpm2-tss.sh
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH ima-evm-utils 7/9] autogen.sh: Cleanup
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH ima-evm-utils 5/9] install-swtpm.sh: Update ibmtpm to version 1637
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH ima-evm-utils 4/9] install-swtpm.sh: Ignore certificate for download
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH ima-evm-utils 8/9] tests: Require cmp
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH ima-evm-utils 3/9] man: Generate doc targets only when XSL found
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH ima-evm-utils 2/9] man: Fix xmlcatalog path detection
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH ima-evm-utils 1/9] configure: Fix tss2-esys check
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH ima-evm-utils 0/9] Docker based Travis CI builds
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [ima-evm-utils: PATCH 5/5] ima-evm-utils: travis: openssl gost engine
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] SELinux: Measure state and hash of policy using IMA
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 2/2] SELinux: Measure state and hash of policy using IMA
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] SELinux: Measure state and hash of policy using IMA
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH 2/2] SELinux: Measure state and hash of policy using IMA
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] SELinux: Measure state and hash of policy using IMA
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH 1/2] IMA: Handle early boot data measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] SELinux: Measure state and hash of policy using IMA
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/2] SELinux: Measure state and hash of policy using IMA
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 3/7] exec: Move path_noexec() check earlier
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [dm-devel] [RFC PATCH v5 00/11] Integrity Policy Enforcement LSM (IPE)
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [dm-devel] [RFC PATCH v5 00/11] Integrity Policy Enforcement LSM (IPE)
- From: Chuck Lever <chucklever@xxxxxxxxx>
- Re: [PATCH v7 5/7] fs,doc: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [dm-devel] [RFC PATCH v5 00/11] Integrity Policy Enforcement LSM (IPE)
- From: Chuck Lever <chucklever@xxxxxxxxx>
- Re: [dm-devel] [RFC PATCH v5 00/11] Integrity Policy Enforcement LSM (IPE)
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 4/7] fs: Introduce O_MAYEXEC flag for openat2(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [dm-devel] [RFC PATCH v5 00/11] Integrity Policy Enforcement LSM (IPE)
- From: Chuck Lever <chucklever@xxxxxxxxx>
- [PATCH ima-evm-utils 2/2] man: Generate doc targets only when XSL found
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH ima-evm-utils 1/2] man: Fix xmlcatalog path detection
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v6 0/4] LSM: Measure security module data
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/3] IMA: add policy to support measuring critical data from kernel components
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/3] IMA: generalize keyring specific measurement constructs
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/3] IMA: define IMA hook to measure critical data from kernel components
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/3] IMA: Infrastructure for measurement of critical kernel data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [dm-devel] [RFC PATCH v5 00/11] Integrity Policy Enforcement LSM (IPE)
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- Re: [dm-devel] [RFC PATCH v5 00/11] Integrity Policy Enforcement LSM (IPE)
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [dm-devel] [RFC PATCH v5 00/11] Integrity Policy Enforcement LSM (IPE)
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [dm-devel] [RFC PATCH v5 00/11] Integrity Policy Enforcement LSM (IPE)
- From: Chuck Lever <chucklever@xxxxxxxxx>
- Re: [dm-devel] [RFC PATCH v5 00/11] Integrity Policy Enforcement LSM (IPE)
- From: Chuck Lever <chucklever@xxxxxxxxx>
- Re: [dm-devel] [RFC PATCH v5 00/11] Integrity Policy Enforcement LSM (IPE)
- From: Chuck Lever <chucklever@xxxxxxxxx>
- Re: [dm-devel] [RFC PATCH v5 00/11] Integrity Policy Enforcement LSM (IPE)
- From: Chuck Lever <chucklever@xxxxxxxxx>
- Re: [PATCH v2 0/4] IMA: verify measurement of certificate imported into a keyring
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [ima-evm-utils: PATCH 5/5] ima-evm-utils: travis: openssl gost engine
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: WARNING: suspicious RCU usage in tipc_l2_send_msg
- From: syzbot <syzbot+47bbc6b678d317cccbe0@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH] field-dictionary.csv: Add errno to audit message field dictionary
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH 5/5] ima-evm-utils: travis: openssl gost engine
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [dm-devel] [RFC PATCH v5 00/11] Integrity Policy Enforcement LSM (IPE)
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v7 5/7] fs,doc: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v7 4/7] fs: Introduce O_MAYEXEC flag for openat2(2)
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v7 3/7] exec: Move path_noexec() check earlier
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v7 2/7] exec: Move S_ISREG() check earlier
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [dm-devel] [RFC PATCH v5 00/11] Integrity Policy Enforcement LSM (IPE)
- From: Pavel Machek <pavel@xxxxxx>
- [PATCH v2 1/2] ima: Pre-parse the list of keyrings in a KEY_CHECK rule
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/2] ima: Fail rule parsing when asymmetric key measurement isn't supportable
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/2] ima: Fix keyrings race condition and other key related bugs
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 1/7] exec: Change uselib(2) IS_SREG() failure to EACCES
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v7 1/7] exec: Change uselib(2) IS_SREG() failure to EACCES
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [dm-devel] [RFC PATCH v5 00/11] Integrity Policy Enforcement LSM (IPE)
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH 5/5] ima-evm-utils: travis: openssl gost engine
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v7 0/7] Add support for O_MAYEXEC
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [dm-devel] [RFC PATCH v5 00/11] Integrity Policy Enforcement LSM (IPE)
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [dm-devel] [RFC PATCH v5 00/11] Integrity Policy Enforcement LSM (IPE)
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [dm-devel] [RFC PATCH v5 00/11] Integrity Policy Enforcement LSM (IPE)
- From: Chuck Lever <chucklever@xxxxxxxxx>
- ima-evm-utils: version 1.3.1 released
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 0/7] Add support for O_MAYEXEC
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 0/7] Add support for O_MAYEXEC
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v7 0/7] Add support for O_MAYEXEC
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 0/7] Add support for O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v7 0/7] Add support for O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v7 0/7] Add support for O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- RE: [PATCH v7 0/7] Add support for O_MAYEXEC
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [dm-devel] [RFC PATCH v5 00/11] Integrity Policy Enforcement LSM (IPE)
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [dm-devel] [RFC PATCH v5 00/11] Integrity Policy Enforcement LSM (IPE)
- From: Chuck Lever <chucklever@xxxxxxxxx>
- Re: [PATCH v7 0/7] Add support for O_MAYEXEC
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 0/7] Add support for O_MAYEXEC
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v7 0/7] Add support for O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v7 0/7] Add support for O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v7 0/7] Add support for O_MAYEXEC
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- RE: [PATCH v7 0/7] Add support for O_MAYEXEC
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [dm-devel] [RFC PATCH v5 00/11] Integrity Policy Enforcement LSM (IPE)
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v7 0/7] Add support for O_MAYEXEC
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 0/7] Add support for O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [dm-devel] [RFC PATCH v5 00/11] Integrity Policy Enforcement LSM (IPE)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [dm-devel] [RFC PATCH v5 00/11] Integrity Policy Enforcement LSM (IPE)
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [dm-devel] [RFC PATCH v5 00/11] Integrity Policy Enforcement LSM (IPE)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [dm-devel] [RFC PATCH v5 00/11] Integrity Policy Enforcement LSM (IPE)
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] field-dictionary.csv: Add errno to audit message field dictionary
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [dm-devel] [RFC PATCH v5 00/11] Integrity Policy Enforcement LSM (IPE)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: Pavel Machek <pavel@xxxxxx>
- Re: [dm-devel] [RFC PATCH v5 00/11] Integrity Policy Enforcement LSM (IPE)
- From: Chuck Lever <chucklever@xxxxxxxxx>
- Re: [PATCH v2 3/4] IMA: Add a test to verify measurement of certificate imported into a keyring
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] IMA/ima_keys.sh Fix policy content check usage
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v2 3/4] IMA: Add a test to verify measurement of certificate imported into a keyring
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v2 4/4] IMA/ima_keys.sh: Enhance policy checks
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v2 2/4] IMA: Refactor datafiles directory
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v2 1/4] IMA/ima_keys.sh Fix policy content check usage
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v2 0/4] IMA: verify measurement of certificate imported into a keyring
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [dm-devel] [RFC PATCH v5 00/11] Integrity Policy Enforcement LSM (IPE)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [dm-devel] [RFC PATCH v5 00/11] Integrity Policy Enforcement LSM (IPE)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] security: ima: delete a repeated word in comments
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [dm-devel] [RFC PATCH v5 00/11] Integrity Policy Enforcement LSM (IPE)
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 1/1] IMA/ima_keys.sh Fix policy content check usage
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 1/1] IMA/ima_keys.sh Fix policy content check usage
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] IMA/ima_keys.sh Fix policy content check usage
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 2/3] IMA: Refactor datafiles directory
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH 1/1] IMA/ima_keys.sh Fix policy content check usage
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 2/3] IMA: Refactor datafiles directory
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 2/3] IMA: Refactor datafiles directory
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v4 12/17] LSM: Add "contents" flag to kernel_read_file hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 11/17] module: Call security_kernel_post_load_data()
- From: KP Singh <kpsingh@xxxxxxxxxxxx>
- Re: [PATCH v4 09/17] LSM: Introduce kernel_post_load_data() hook
- From: KP Singh <kpsingh@xxxxxxxxxxxx>
- Re: [PATCH v4 10/17] firmware_loader: Use security_post_load_data()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 09/17] LSM: Introduce kernel_post_load_data() hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [GIT PULL] integrity subsystem updates for v5.9
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [dm-devel] [RFC PATCH v5 00/11] Integrity Policy Enforcement LSM (IPE)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] ima: Pre-parse the list of keyrings in a KEY_CHECK rule
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] ima: Pre-parse the list of keyrings in a KEY_CHECK rule
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [dm-devel] [RFC PATCH v5 00/11] Integrity Policy Enforcement LSM (IPE)
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [ima-evm-utils: PATCH 5/5] ima-evm-utils: travis: openssl gost engine
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v6 0/4] LSM: Measure security module data
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 0/4] LSM: Measure security module data
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 11/17] module: Call security_kernel_post_load_data()
- From: Jessica Yu <jeyu@xxxxxxxxxx>
- Re: [PATCH v6 0/4] LSM: Measure security module data
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH 5/5] ima-evm-utils: travis: openssl gost engine
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 1/4] IMA: Add func to measure LSM state and policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 0/4] LSM: Measure security module data
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 1/4] IMA: Add func to measure LSM state and policy
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v6 1/4] IMA: Add func to measure LSM state and policy
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v6 1/4] IMA: Add func to measure LSM state and policy
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v6 1/4] IMA: Add func to measure LSM state and policy
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [dm-devel] [RFC PATCH v5 00/11] Integrity Policy Enforcement LSM (IPE)
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 0/4] LSM: Measure security module data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 0/4] LSM: Measure security module data
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v6 0/4] LSM: Measure security module data
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v6 0/4] LSM: Measure security module data
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 0/4] LSM: Measure security module data
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [dm-devel] [RFC PATCH v5 00/11] Integrity Policy Enforcement LSM (IPE)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 0/4] LSM: Measure security module data
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 1/4] IMA: Add func to measure LSM state and policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 0/4] LSM: Measure security module data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 0/4] LSM: Measure security module data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [dm-devel] [RFC PATCH v5 00/11] Integrity Policy Enforcement LSM (IPE)
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 1/4] IMA: Add func to measure LSM state and policy
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v6 0/4] LSM: Measure security module data
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v6 1/4] IMA: Add func to measure LSM state and policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 0/4] LSM: Measure security module data
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH 5/5] ima-evm-utils: travis: openssl gost engine
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v6 1/4] IMA: Add func to measure LSM state and policy
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH 5/5] ima-evm-utils: travis: openssl gost engine
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 1/3] IMA: Update key test documentation
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 1/3] IMA: Update key test documentation
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v6 1/4] IMA: Add func to measure LSM state and policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 0/4] LSM: Measure security module data
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 0/4] LSM: Measure security module data
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v6 2/4] IMA: Define IMA hooks to measure LSM state and policy
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 3/4] LSM: Define SELinux function to measure state and policy
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 4/4] IMA: Handle early boot data measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 1/4] IMA: Add func to measure LSM state and policy
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 0/4] LSM: Measure security module data
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH v1 5/5] ima-evm-utils: travis: openssl gost engine
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] IMA: Update key test documentation
- From: Lachlan Sneff <t-josne@xxxxxxxxxxxxxxxxxxx>
- Re: [dm-devel] [RFC PATCH v5 00/11] Integrity Policy Enforcement LSM (IPE)
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/4] LSM: Define SELinux function to measure state and policy
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/4] LSM: Define SELinux function to measure state and policy
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v5 3/4] LSM: Define SELinux function to measure state and policy
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH v1 5/5] ima-evm-utils: travis: openssl gost engine
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- RE: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: David Laight <David.Laight@xxxxxxxxxx>
- RE: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [ima-evm-utils: PATCH 5/5] ima-evm-utils: travis: openssl gost engine
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH v1 5/5] ima-evm-utils: travis: openssl gost engine
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH 5/5] ima-evm-utils: travis: openssl gost engine
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [ima-evm-utils: PATCH 5/5] ima-evm-utils: travis: openssl gost engine
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 1/3] IMA: Update key test documentation
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v5 3/4] LSM: Define SELinux function to measure state and policy
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/4] LSM: Define SELinux function to measure state and policy
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v5 3/4] LSM: Define SELinux function to measure state and policy
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/4] LSM: Define SELinux function to measure state and policy
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v5 3/4] LSM: Define SELinux function to measure state and policy
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH 3/3] IMA: Add a test to verify measurement of certificate imported into a keyring
- From: Lachlan Sneff <t-josne@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/3] IMA: Refactor datafiles directory
- From: Lachlan Sneff <t-josne@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/3] IMA: Update key test documentation
- From: Lachlan Sneff <t-josne@xxxxxxxxxxxxxxxxxxx>
- [PATCH v1 0/3] Verify measurement of certificate imported into a keyring
- From: Lachlan Sneff <t-josne@xxxxxxxxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH 5/5] ima-evm-utils: travis: openssl gost engine
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/3] IMA: Add a test to verify measurement of certificate imported into a keyring
- From: Lachlan Sneff <t-josne@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/3] IMA: Refactor datafiles directory
- From: Lachlan Sneff <t-josne@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/3] IMA: Update key test documentation
- From: Lachlan Sneff <t-josne@xxxxxxxxxxxxxxxxxxx>
- [PATCH v1 0/3] Verify measurement of certificate imported into a keyring
- From: Lachlan Sneff <t-josne@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd update for Linux v5.9
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [ima-evm-utils: PATCH 5/5] ima-evm-utils: travis: openssl gost engine
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH 5/5] ima-evm-utils: travis: openssl gost engine
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [ima-evm-utils: PATCH 5/5] ima-evm-utils: travis: openssl gost engine
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [ima-evm-utils: PATCH 5/5] ima-evm-utils: travis: openssl gost engine
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [ima-evm-utils: PATCH 5/5] ima-evm-utils: travis: openssl gost engine
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v5 3/4] LSM: Define SELinux function to measure state and policy
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- [RFC][PATCH 0/3] ima: Digest Lists extension
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 3/3] evm: Add support for digest lists of metadata
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 1/3] ima: Add support for measurement with digest lists
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [RFC][PATCH 2/3] ima: Add support for appraisal with digest lists
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v5 3/4] LSM: Define SELinux function to measure state and policy
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [ima-evm-utils: PATCH 5/5] ima-evm-utils: travis: openssl gost engine
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH 5/5] ima-evm-utils: travis: openssl gost engine
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH 5/5] ima-evm-utils: travis: openssl gost engine
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [ima-evm-utils: PATCH 5/5] ima-evm-utils: travis: openssl gost engine
- From: Petr Vorel <pvorel@xxxxxxx>
- RE: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: David Laight <David.Laight@xxxxxxxxxx>
- RE: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: David Laight <David.Laight@xxxxxxxxxx>
- RE: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [ima-evm-utils: PATCH 5/5] ima-evm-utils: travis: openssl gost engine
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH 5/5] ima-evm-utils: travis: openssl gost engine
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [dm-devel] [RFC PATCH v5 00/11] Integrity Policy Enforcement LSM (IPE)
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v5 00/11] Integrity Policy Enforcement LSM (IPE)
- From: Pavel Machek <pavel@xxxxxx>
- Re: [RFC PATCH v5 00/11] Integrity Policy Enforcement LSM (IPE)
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: Pavel Machek <pavel@xxxxxx>
- Re: [RFC PATCH v5 00/11] Integrity Policy Enforcement LSM (IPE)
- From: Pavel Machek <pavel@xxxxxx>
- Re: [ima-evm-utils: PATCH 2/3] Rename "--validate" to "--ignore-violations"
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH 5/5] ima-evm-utils: travis: openssl gost engine
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] IMA: Add a test to verify importing a certificate into custom keyring
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH 5/5] ima-evm-utils: travis: openssl gost engine
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v1] tpm: use %*ph to print small buffer
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [ima-evm-utils: PATCH 5/5] ima-evm-utils: travis: openssl gost engine
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [ima-evm-utils: PATCH 5/5] ima-evm-utils: travis: openssl gost engine
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH 0/5] initial travis support
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [ima-evm-utils: PATCH 5/5] ima-evm-utils: travis: openssl gost engine
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH 5/5] ima-evm-utils: travis: openssl gost engine
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: IMA/EVM interfaces
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [ima-evm-utils: PATCH 5/5] ima-evm-utils: travis: openssl gost engine
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils: PATCH 4/5] ima-evm-utils: travis: support tpm2-tss
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils: PATCH 3/5] ima-evm-utils: travis: dependency on TSS for initializing software TPM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils: PATCH 1/5] ima-evm-utils: travis: define travis.yml
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils: PATCH 2/5] ima-evm-utils: travis: download, compile, and install a swTPM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils: PATCH 0/5] initial travis support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH 3/3] Update the ima_boot_aggregate apsects of the "README" and "help" files
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH 1/3] Drop the ima_measurement "--verify" option
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [ima-evm-utils: PATCH 3/3] Update the ima_boot_aggregate apsects of the "README" and "help" files
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils: PATCH 1/3] Drop the ima_measurement "--verify" option
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils: PATCH 2/3] Rename "--validate" to "--ignore-violations"
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils: PATCH 0/3] evmctl option improvements
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] IMA: Add a test to verify importing a certificate into custom keyring
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v6 4/4] IMA: Add test for kexec cmdline measurement
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v5 2/4] IMA: Add policy related helpers
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v5 4/4] IMA: Handle early boot data measurement
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/4] IMA: kexec cmdline measurement
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [PATCH v6 4/4] IMA: Add test for kexec cmdline measurement
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [PATCH v5 2/4] IMA: Add policy related helpers
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [PATCH v5 4/4] IMA: Handle early boot data measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/4] IMA: Add func to measure LSM state and policy
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/4] IMA: Add func to measure LSM state and policy
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v1] tpm: use %*ph to print small buffer
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/4] IMA: Add func to measure LSM state and policy
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/4] IMA: Add func to measure LSM state and policy
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/4] IMA: Define IMA hooks to measure LSM state and policy
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/4] IMA: Add func to measure LSM state and policy
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 2/4] [RFC] x86/trampfd: Provide support for the trampoline file descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: Measure data again even when it has not changed
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: Measure data again even when it has not changed
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: David Laight <David.Laight@xxxxxxxxxx>
- [linux-ima-user]EVM does not permit changes on /proc filesystem
- From: "Vranceanu, Vladut" <Vladut.Vranceanu@xxxxxxxxxx>
- Re: Measure data again even when it has not changed
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [PATCH v1 2/4] [RFC] x86/trampfd: Provide support for the trampoline file descriptor
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- RE: IMA/EVM interfaces
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v5 2/4] IMA: Define IMA hooks to measure LSM state and policy
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 0/4] LSM: Measure security module data
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 1/4] IMA: Add func to measure LSM state and policy
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 4/4] IMA: Handle early boot data measurement
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 3/4] LSM: Define SELinux function to measure state and policy
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: Measure data again even when it has not changed
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: Measure data again even when it has not changed
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 08/17] fs/kernel_read_file: Add file_size output argument
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v4 07/17] fs/kernel_read_file: Switch buffer size arg to size_t
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v4 06/17] fs/kernel_read_file: Remove redundant size argument
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v4 04/17] fs/kernel_read_file: Split into separate include file
- From: James Morris <jmorris@xxxxxxxxx>
- [RFC PATCH v6 05/11] fs: add security blob and hooks for block_device
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v6 06/11] dm-verity: add bdev_setsecurity hook for dm-verity signature
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v6 01/11] scripts: add ipe tooling to generate boot policy
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v6 02/11] security: add ipe lsm evaluation loop and audit system
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v6 10/11] documentation: add ipe documentation
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v6 07/11] ipe: add property for signed dmverity volumes
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v6 11/11] cleanup: uapi/linux/audit.h
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v6 03/11] security: add ipe lsm policy parser and policy loading
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v6 08/11] dm-verity: add bdev_setsecurity hook for root-hash
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v6 09/11] ipe: add property for dmverity roothash
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v6 04/11] ipe: add property for trust of boot volume
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v6 00/11] Integrity Policy Enforcement LSM (IPE)
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- Re: IMA/EVM interfaces
- From: Denis Efremov <efremov@xxxxxxxxx>
- Re: [PATCH v3 12/19] firmware_loader: Use security_post_load_data()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 12/19] firmware_loader: Use security_post_load_data()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4 17/17] test_firmware: Test partial read support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 03/17] fs/kernel_read_file: Remove FIRMWARE_EFI_EMBEDDED enum
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 02/17] fs/kernel_read_file: Remove FIRMWARE_PREALLOC_BUFFER enum
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 00/17] Introduce partial kernel_read_file() support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 04/17] fs/kernel_read_file: Split into separate include file
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 05/17] fs/kernel_read_file: Split into separate source file
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 06/17] fs/kernel_read_file: Remove redundant size argument
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 08/17] fs/kernel_read_file: Add file_size output argument
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 07/17] fs/kernel_read_file: Switch buffer size arg to size_t
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 12/17] LSM: Add "contents" flag to kernel_read_file hook
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 10/17] firmware_loader: Use security_post_load_data()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 11/17] module: Call security_kernel_post_load_data()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 09/17] LSM: Introduce kernel_post_load_data() hook
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 13/17] IMA: Add support for file reads without contents
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 16/17] firmware: Add request_partial_firmware_into_buf()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 14/17] fs/kernel_file_read: Add "offset" arg for partial reads
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 15/17] firmware: Store opt_flags in fw_priv
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 01/17] test_firmware: Test platform fw loading on non-EFI systems
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 18/19] firmware: Add request_partial_firmware_into_buf()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Measure data again even when it has not changed
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 12/19] firmware_loader: Use security_post_load_data()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- RE: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v3 18/19] firmware: Add request_partial_firmware_into_buf()
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 0/3] fs: reduce export usage of kerne_read*() calls
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v3 00/19] Introduce partial kernel_read_file() support
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v3 18/19] firmware: Add request_partial_firmware_into_buf()
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [RFC PATCH v5 05/11] fs: add security blob and hooks for block_device
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v5 06/11] dm-verity: move signature check after tree validation
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v5 05/11] fs: add security blob and hooks for block_device
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v5 05/11] fs: add security blob and hooks for block_device
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v5 06/11] dm-verity: move signature check after tree validation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH v5 04/11] ipe: add property for trust of boot volume
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v5 07/11] dm-verity: add bdev_setsecurity hook for dm-verity signature
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v5 10/11] documentation: add ipe documentation
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v5 11/11] cleanup: uapi/linux/audit.h
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v5 00/11] Integrity Policy Enforcement LSM (IPE)
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v5 03/11] security: add ipe lsm policy parser and policy loading
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v5 05/11] fs: add security blob and hooks for block_device
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v5 08/11] ipe: add property for signed dmverity volumes
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v5 10/12] ipe: add property for dmverity roothash
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v5 12/12] cleanup: uapi/linux/audit.h
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v5 11/12] documentation: add ipe documentation
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v5 09/11] dm-verity: add bdev_setsecurity hook for root-hash
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v5 06/11] dm-verity: move signature check after tree validation
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v5 02/11] security: add ipe lsm evaluation loop and audit system
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v5 01/11] scripts: add ipe tooling to generate boot policy
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 15/19] IMA: Add support for file reads without contents
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 15/19] IMA: Add support for file reads without contents
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 00/19] Introduce partial kernel_read_file() support
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH v3 15/19] IMA: Add support for file reads without contents
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 12/19] firmware_loader: Use security_post_load_data()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 11/19] LSM: Introduce kernel_post_load_data() hook
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 00/19] Introduce partial kernel_read_file() support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 1/4] [RFC] fs/trampfd: Implement the trampoline file descriptor API
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- RE: IMA/EVM interfaces
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- RE: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v1 1/4] [RFC] fs/trampfd: Implement the trampoline file descriptor API
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 1/4] [RFC] fs/trampfd: Implement the trampoline file descriptor API
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH 1/2] ima: Pre-parse the list of keyrings in a KEY_CHECK rule
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] ima: Fail rule parsing when asymmetric key measurement isn't supportable
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v1 3/4] [RFC] arm64/trampfd: Provide support for the trampoline file descriptor
- From: madvenka@xxxxxxxxxxxxxxxxxxx
- [PATCH v1 1/4] [RFC] fs/trampfd: Implement the trampoline file descriptor API
- From: madvenka@xxxxxxxxxxxxxxxxxxx
- [PATCH v1 4/4] [RFC] arm/trampfd: Provide support for the trampoline file descriptor
- From: madvenka@xxxxxxxxxxxxxxxxxxx
- [PATCH v1 2/4] [RFC] x86/trampfd: Provide support for the trampoline file descriptor
- From: madvenka@xxxxxxxxxxxxxxxxxxx
- [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: madvenka@xxxxxxxxxxxxxxxxxxx
- Re: [PATCH v2] tpm: Fix the description error of the help information in Kconfig
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Fix the description error of the help information in Kconfig
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- IMA/EVM interfaces
- From: Denis Efremov <efremov@xxxxxxxxx>
- [PATCH v5 2/2] dt-bindings: Add SynQucer TPM MMIO as a trivial device
- From: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
- [PATCH v5 1/2] tpm: tis: add support for MMIO TPM on SynQuacer
- From: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
- [PATCH v5 0/2] synquacer: add TPM support
- From: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
- Re: [PATCH v6 4/4] IMA: Add test for kexec cmdline measurement
- From: Lachlan Sneff <t-josne@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 4/4] IMA: Add test for kexec cmdline measurement
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v5 4/4] IMA: Add test for kexec cmdline measurement
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v5 4/4] IMA: Add test for kexec cmdline measurement
- From: Lachlan Sneff <t-josne@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 4/4] IMA: Add test for kexec cmdline measurement
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v5 3/4] IMA/ima_keys.sh: Fix policy readability check
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v5 1/4] IMA: Rename helper to require_ima_policy_cmdline
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v5 2/4] IMA: Add policy related helpers
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v5 0/4] IMA: kexec cmdline measurement
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v7 4/7] fs: Introduce O_MAYEXEC flag for openat2(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3 00/19] Introduce partial kernel_read_file() support
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH v3 10/19] fs/kernel_read_file: Add file_size output argument
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [PATCH v3 09/19] fs/kernel_read_file: Switch buffer size arg to size_t
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [PATCH v3 08/19] fs/kernel_read_file: Remove redundant size argument
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [PATCH v3 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v3 07/19] fs/kernel_read_file: Split into separate source file
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [PATCH v4 ima-evm-utils] extend ima_measurement --pcrs option to support per-bank pcr files
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [PATCH v3 06/19] fs/kernel_read_file: Split into separate include file
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- [PATCH 0/2] ima: Fix keyrings race condition and other key related bugs
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] ima: Fail rule parsing when asymmetric key measurement isn't supportable
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] ima: Pre-parse the list of keyrings in a KEY_CHECK rule
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 ima-evm-utils] extend ima_measurement --pcrs option to support per-bank pcr files
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v4 ima-evm-utils] extend ima_measurement --pcrs option to support per-bank pcr files
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [PATCH v3 04/19] fs/kernel_read_file: Remove FIRMWARE_PREALLOC_BUFFER enum
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [PATCH v3 15/19] IMA: Add support for file reads without contents
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- [PATCH v4 ima-evm-utils] extend ima_measurement --pcrs option to support per-bank pcr files
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3 00/19] Introduce partial kernel_read_file() support
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [PATCH v3 12/19] firmware_loader: Use security_post_load_data()
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [PATCH v3 11/19] LSM: Introduce kernel_post_load_data() hook
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- RE: [PATCH] tpm: Fix the description error of the help information in Kconfig
- From: <Peter.Huewe@xxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Fix the description error of the help information in Kconfig
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] tpm: Fix the description error of the help information in Kconfig
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v2] tpm: Fix the description error of the help information in Kconfig
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Fix the description error of the help information in Kconfig
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v7 4/7] fs: Introduce O_MAYEXEC flag for openat2(2)
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v7 4/7] fs: Introduce O_MAYEXEC flag for openat2(2)
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/2] tpm: tis: add support for MMIO TPM on SynQuacer
- From: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
- [PATCH] tpm: Fix the description error of the help information in Kconfig
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 03/19] firmware_loader: EFI firmware loader must handle pre-allocated buffer
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 03/19] firmware_loader: EFI firmware loader must handle pre-allocated buffer
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 00/19] Introduce partial kernel_read_file() support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7 0/7] Add support for O_MAYEXEC
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 03/19] firmware_loader: EFI firmware loader must handle pre-allocated buffer
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 00/19] Introduce partial kernel_read_file() support
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH] tpm/tpm_ftpm_tee: fix boolreturn.cocci warnings
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v3 00/19] Introduce partial kernel_read_file() support
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- [PATCH v3 16/19] fs/kernel_file_read: Add "offset" arg for partial reads
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 18/19] firmware: Add request_partial_firmware_into_buf()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 19/19] test_firmware: Test partial read support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 17/19] firmware: Store opt_flags in fw_priv
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 00/19] Introduce partial kernel_read_file() support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 01/19] test_firmware: Test platform fw loading on non-EFI systems
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 02/19] selftest/firmware: Add selftest timeout in settings
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 05/19] fs/kernel_read_file: Remove FIRMWARE_EFI_EMBEDDED enum
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 07/19] fs/kernel_read_file: Split into separate source file
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 06/19] fs/kernel_read_file: Split into separate include file
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 08/19] fs/kernel_read_file: Remove redundant size argument
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 10/19] fs/kernel_read_file: Add file_size output argument
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 09/19] fs/kernel_read_file: Switch buffer size arg to size_t
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 12/19] firmware_loader: Use security_post_load_data()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 11/19] LSM: Introduce kernel_post_load_data() hook
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 14/19] LSM: Add "contents" flag to kernel_read_file hook
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 15/19] IMA: Add support for file reads without contents
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 13/19] module: Call security_kernel_post_load_data()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 04/19] fs/kernel_read_file: Remove FIRMWARE_PREALLOC_BUFFER enum
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 03/19] firmware_loader: EFI firmware loader must handle pre-allocated buffer
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v19 14/23] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v19 12/23] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v19 11/23] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v19 10/23] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v19 09/23] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] IMA: Add test for kexec cmdline measurement
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v3 ima-evm-utils] extend ima_measurement --pcrs option to support per-bank pcr files
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 ima-evm-utils] extend ima_measurement --pcrs option to support per-bank pcr files
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 0/7] Add support for O_MAYEXEC
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7 7/7] ima: add policy support for the new file open MAY_OPENEXEC flag
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7 6/7] selftest/openat2: Add tests for O_MAYEXEC enforcing
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7 5/7] fs,doc: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7 4/7] fs: Introduce O_MAYEXEC flag for openat2(2)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 2/2] IMA: Add test for kexec cmdline measurement
- From: Lachlan Sneff <t-josne@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] IMA: Add test for kexec cmdline measurement
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 ima-evm-utils] extend ima_measurement --pcrs option to support per-bank pcr files
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v4 2/2] IMA: Add test for kexec cmdline measurement
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v4 2/2] IMA: Add test for kexec cmdline measurement
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 0/7] Add support for O_MAYEXEC
- From: Thibaut Sautereau <thibaut.sautereau@xxxxxxxxxxx>
- [PATCH v4 1/2] IMA: Fix policy readability check
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v4 2/2] IMA: Add test for kexec cmdline measurement
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v3 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] IMA: Add test for kexec cmdline measurement
- From: Petr Vorel <pvorel@xxxxxxx>
- [GIT PULL] tpmdd update for Linux v5.9
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] Drop empty NEWS file
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2 ima-evm-utils] extend ima_measurement --pcrs option to support per-bank pcr files
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]