Linux Integrity
[Prev Page][Next Page]
- [PATCH v4 09/17] LSM: Introduce kernel_post_load_data() hook
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 13/17] IMA: Add support for file reads without contents
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 16/17] firmware: Add request_partial_firmware_into_buf()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 14/17] fs/kernel_file_read: Add "offset" arg for partial reads
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 15/17] firmware: Store opt_flags in fw_priv
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 01/17] test_firmware: Test platform fw loading on non-EFI systems
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 18/19] firmware: Add request_partial_firmware_into_buf()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Measure data again even when it has not changed
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 12/19] firmware_loader: Use security_post_load_data()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- RE: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v3 18/19] firmware: Add request_partial_firmware_into_buf()
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 0/3] fs: reduce export usage of kerne_read*() calls
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v3 00/19] Introduce partial kernel_read_file() support
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v3 18/19] firmware: Add request_partial_firmware_into_buf()
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [RFC PATCH v5 05/11] fs: add security blob and hooks for block_device
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v5 06/11] dm-verity: move signature check after tree validation
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v5 05/11] fs: add security blob and hooks for block_device
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v5 05/11] fs: add security blob and hooks for block_device
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v5 06/11] dm-verity: move signature check after tree validation
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [RFC PATCH v5 04/11] ipe: add property for trust of boot volume
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v5 07/11] dm-verity: add bdev_setsecurity hook for dm-verity signature
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v5 10/11] documentation: add ipe documentation
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v5 11/11] cleanup: uapi/linux/audit.h
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v5 00/11] Integrity Policy Enforcement LSM (IPE)
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v5 03/11] security: add ipe lsm policy parser and policy loading
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v5 05/11] fs: add security blob and hooks for block_device
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v5 08/11] ipe: add property for signed dmverity volumes
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v5 10/12] ipe: add property for dmverity roothash
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v5 12/12] cleanup: uapi/linux/audit.h
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v5 11/12] documentation: add ipe documentation
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v5 09/11] dm-verity: add bdev_setsecurity hook for root-hash
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v5 06/11] dm-verity: move signature check after tree validation
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v5 02/11] security: add ipe lsm evaluation loop and audit system
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v5 01/11] scripts: add ipe tooling to generate boot policy
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 15/19] IMA: Add support for file reads without contents
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 15/19] IMA: Add support for file reads without contents
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 00/19] Introduce partial kernel_read_file() support
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH v3 15/19] IMA: Add support for file reads without contents
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 12/19] firmware_loader: Use security_post_load_data()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 11/19] LSM: Introduce kernel_post_load_data() hook
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 00/19] Introduce partial kernel_read_file() support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 1/4] [RFC] fs/trampfd: Implement the trampoline file descriptor API
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- RE: IMA/EVM interfaces
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- RE: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v1 1/4] [RFC] fs/trampfd: Implement the trampoline file descriptor API
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 1/4] [RFC] fs/trampfd: Implement the trampoline file descriptor API
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH 1/2] ima: Pre-parse the list of keyrings in a KEY_CHECK rule
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] ima: Fail rule parsing when asymmetric key measurement isn't supportable
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v1 3/4] [RFC] arm64/trampfd: Provide support for the trampoline file descriptor
- From: madvenka@xxxxxxxxxxxxxxxxxxx
- [PATCH v1 1/4] [RFC] fs/trampfd: Implement the trampoline file descriptor API
- From: madvenka@xxxxxxxxxxxxxxxxxxx
- [PATCH v1 4/4] [RFC] arm/trampfd: Provide support for the trampoline file descriptor
- From: madvenka@xxxxxxxxxxxxxxxxxxx
- [PATCH v1 2/4] [RFC] x86/trampfd: Provide support for the trampoline file descriptor
- From: madvenka@xxxxxxxxxxxxxxxxxxx
- [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: madvenka@xxxxxxxxxxxxxxxxxxx
- Re: [PATCH v2] tpm: Fix the description error of the help information in Kconfig
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Fix the description error of the help information in Kconfig
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- IMA/EVM interfaces
- From: Denis Efremov <efremov@xxxxxxxxx>
- [PATCH v5 2/2] dt-bindings: Add SynQucer TPM MMIO as a trivial device
- From: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
- [PATCH v5 1/2] tpm: tis: add support for MMIO TPM on SynQuacer
- From: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
- [PATCH v5 0/2] synquacer: add TPM support
- From: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
- Re: [PATCH v6 4/4] IMA: Add test for kexec cmdline measurement
- From: Lachlan Sneff <t-josne@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 4/4] IMA: Add test for kexec cmdline measurement
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v5 4/4] IMA: Add test for kexec cmdline measurement
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v5 4/4] IMA: Add test for kexec cmdline measurement
- From: Lachlan Sneff <t-josne@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 4/4] IMA: Add test for kexec cmdline measurement
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v5 3/4] IMA/ima_keys.sh: Fix policy readability check
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v5 1/4] IMA: Rename helper to require_ima_policy_cmdline
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v5 2/4] IMA: Add policy related helpers
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v5 0/4] IMA: kexec cmdline measurement
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v7 4/7] fs: Introduce O_MAYEXEC flag for openat2(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3 00/19] Introduce partial kernel_read_file() support
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH v3 10/19] fs/kernel_read_file: Add file_size output argument
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [PATCH v3 09/19] fs/kernel_read_file: Switch buffer size arg to size_t
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [PATCH v3 08/19] fs/kernel_read_file: Remove redundant size argument
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [PATCH v3 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v3 07/19] fs/kernel_read_file: Split into separate source file
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [PATCH v4 ima-evm-utils] extend ima_measurement --pcrs option to support per-bank pcr files
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [PATCH v3 06/19] fs/kernel_read_file: Split into separate include file
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- [PATCH 0/2] ima: Fix keyrings race condition and other key related bugs
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] ima: Fail rule parsing when asymmetric key measurement isn't supportable
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] ima: Pre-parse the list of keyrings in a KEY_CHECK rule
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 ima-evm-utils] extend ima_measurement --pcrs option to support per-bank pcr files
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v4 ima-evm-utils] extend ima_measurement --pcrs option to support per-bank pcr files
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [PATCH v3 04/19] fs/kernel_read_file: Remove FIRMWARE_PREALLOC_BUFFER enum
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [PATCH v3 15/19] IMA: Add support for file reads without contents
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- [PATCH v4 ima-evm-utils] extend ima_measurement --pcrs option to support per-bank pcr files
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3 00/19] Introduce partial kernel_read_file() support
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [PATCH v3 12/19] firmware_loader: Use security_post_load_data()
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [PATCH v3 11/19] LSM: Introduce kernel_post_load_data() hook
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- RE: [PATCH] tpm: Fix the description error of the help information in Kconfig
- From: <Peter.Huewe@xxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Fix the description error of the help information in Kconfig
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] tpm: Fix the description error of the help information in Kconfig
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v2] tpm: Fix the description error of the help information in Kconfig
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Fix the description error of the help information in Kconfig
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v7 4/7] fs: Introduce O_MAYEXEC flag for openat2(2)
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v7 4/7] fs: Introduce O_MAYEXEC flag for openat2(2)
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/2] tpm: tis: add support for MMIO TPM on SynQuacer
- From: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
- [PATCH] tpm: Fix the description error of the help information in Kconfig
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 03/19] firmware_loader: EFI firmware loader must handle pre-allocated buffer
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 03/19] firmware_loader: EFI firmware loader must handle pre-allocated buffer
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 00/19] Introduce partial kernel_read_file() support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7 0/7] Add support for O_MAYEXEC
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 03/19] firmware_loader: EFI firmware loader must handle pre-allocated buffer
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 00/19] Introduce partial kernel_read_file() support
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH] tpm/tpm_ftpm_tee: fix boolreturn.cocci warnings
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v3 00/19] Introduce partial kernel_read_file() support
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- [PATCH v3 16/19] fs/kernel_file_read: Add "offset" arg for partial reads
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 18/19] firmware: Add request_partial_firmware_into_buf()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 19/19] test_firmware: Test partial read support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 17/19] firmware: Store opt_flags in fw_priv
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 00/19] Introduce partial kernel_read_file() support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 01/19] test_firmware: Test platform fw loading on non-EFI systems
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 02/19] selftest/firmware: Add selftest timeout in settings
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 05/19] fs/kernel_read_file: Remove FIRMWARE_EFI_EMBEDDED enum
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 07/19] fs/kernel_read_file: Split into separate source file
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 06/19] fs/kernel_read_file: Split into separate include file
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 08/19] fs/kernel_read_file: Remove redundant size argument
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 10/19] fs/kernel_read_file: Add file_size output argument
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 09/19] fs/kernel_read_file: Switch buffer size arg to size_t
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 12/19] firmware_loader: Use security_post_load_data()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 11/19] LSM: Introduce kernel_post_load_data() hook
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 14/19] LSM: Add "contents" flag to kernel_read_file hook
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 15/19] IMA: Add support for file reads without contents
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 13/19] module: Call security_kernel_post_load_data()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 04/19] fs/kernel_read_file: Remove FIRMWARE_PREALLOC_BUFFER enum
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 03/19] firmware_loader: EFI firmware loader must handle pre-allocated buffer
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v19 14/23] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v19 12/23] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v19 11/23] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v19 10/23] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v19 09/23] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] IMA: Add test for kexec cmdline measurement
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v3 ima-evm-utils] extend ima_measurement --pcrs option to support per-bank pcr files
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 ima-evm-utils] extend ima_measurement --pcrs option to support per-bank pcr files
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 0/7] Add support for O_MAYEXEC
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7 7/7] ima: add policy support for the new file open MAY_OPENEXEC flag
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7 6/7] selftest/openat2: Add tests for O_MAYEXEC enforcing
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7 5/7] fs,doc: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7 4/7] fs: Introduce O_MAYEXEC flag for openat2(2)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 2/2] IMA: Add test for kexec cmdline measurement
- From: Lachlan Sneff <t-josne@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] IMA: Add test for kexec cmdline measurement
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 ima-evm-utils] extend ima_measurement --pcrs option to support per-bank pcr files
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v4 2/2] IMA: Add test for kexec cmdline measurement
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v4 2/2] IMA: Add test for kexec cmdline measurement
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 0/7] Add support for O_MAYEXEC
- From: Thibaut Sautereau <thibaut.sautereau@xxxxxxxxxxx>
- [PATCH v4 1/2] IMA: Fix policy readability check
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v4 2/2] IMA: Add test for kexec cmdline measurement
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v3 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] IMA: Add test for kexec cmdline measurement
- From: Petr Vorel <pvorel@xxxxxxx>
- [GIT PULL] tpmdd update for Linux v5.9
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] Drop empty NEWS file
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2 ima-evm-utils] extend ima_measurement --pcrs option to support per-bank pcr files
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3] IMA: Add test for kexec cmdline measurement
- From: Lachlan Sneff <t-josne@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 ima-evm-utils] extend ima_measurement --pcrs option to support per-bank pcr files
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH v2] encrypted-keys: Replace HTTP links with HTTPS ones
- From: "Alexander A. Klimov" <grandmaster@xxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] release feature discussion [renamed from Drop empty NEWS file]
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v7 6/7] selftest/openat2: Add tests for O_MAYEXEC enforcing
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v7 3/7] exec: Move path_noexec() check earlier
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v7 7/7] ima: add policy support for the new file open MAY_OPENEXEC flag
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v7 5/7] fs,doc: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v7 1/7] exec: Change uselib(2) IS_SREG() failure to EACCES
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v7 4/7] fs: Introduce O_MAYEXEC flag for openat2(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v7 2/7] exec: Move S_ISREG() check earlier
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v7 0/7] Add support for O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] release feature discussion [renamed from Drop empty NEWS file]
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH] evmctl: extend ima_measurement --pcrs option to support per-bank pcr files
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH ima-evm-utils] release feature discussion [renamed from Drop empty NEWS file]
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] Drop empty NEWS file
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] Drop empty NEWS file
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH ima-evm-utils] Drop empty NEWS file
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] Drop empty NEWS file
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v3] IMA: Add test for kexec cmdline measurement
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH ima-evm-utils] Drop empty NEWS file
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] encrypted-keys: Replace HTTP links with HTTPS ones
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: Put the TCPA table buf after using it
- From: Hanjun Guo <guohanjun@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: Put the TCPA table buf after using it
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/2] tpm: tis: add support for MMIO TPM on SynQuacer
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] encrypted-keys: Replace HTTP links with HTTPS ones
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: avoid accessing cleared ops during shutdown
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] IMA: Add a test to verify importing a certificate into custom keyring
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 5/7] fs,doc: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH ima-evm-utils] Fix missing {u,g}id_t typedef on musl
- From: Petr Vorel <petr.vorel@xxxxxxxxx>
- Re: [PATCH v6 5/7] fs,doc: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3] IMA: Add test for kexec cmdline measurement
- From: Lachlan Sneff <t-josne@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] IMA: Add test for kexec cmdline measurement
- From: Lachlan Sneff <t-josne@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] IMA: Add test for kexec cmdline measurement
- From: Mimi Zohar <zohar@xxxxxxxxxx>
- Re: [PATCH v2] IMA: Add test for kexec cmdline measurement
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2] IMA: Add test for kexec cmdline measurement
- From: Lachlan Sneff <t-josne@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 5/7] fs,doc: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Thibaut Sautereau <thibaut.sautereau@xxxxxxxxxxx>
- [PATCH v3 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v3 0/1] add sysfs exports for TPM 2 PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] Drop empty NEWS file
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: ima-evm-utils: version 1.3 released
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH] IMA: Add test for kexec cmdline measurement
- From: Lachlan Sneff <t-josne@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] Drop empty NEWS file
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH ima-evm-utils] Drop empty NEWS file
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH ima-evm-utils] Drop empty NEWS file
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] Drop empty NEWS file
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] IMA: Add test for kexec cmdline measurement
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils] Drop empty NEWS file
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH ima-evm-utils v2] pcr_tss: Fix compilation for old compilers
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ima-evm-utils v2] pcr_tss: Fix compilation for old compilers
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH ima-evm-utils] pcr_tss: Fix compilation for old compilers
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: ima-evm-utils: version 1.3 released
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: ima-evm-utils: version 1.3 released
- From: Petr Vorel <pvorel@xxxxxxx>
- ima-evm-utils: version 1.3 released
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v2 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v2 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH 06/13] fs/kernel_read_file: Remove redundant size argument
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 06/13] fs/kernel_read_file: Remove redundant size argument
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH v6] ima: move APPRAISE_BOOTPARAM dependency on ARCH_POLICY to runtime
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- [PATCH] IMA: Add test for kexec cmdline measurement
- From: Lachlan Sneff <t-josne@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6] ima: move APPRAISE_BOOTPARAM dependency on ARCH_POLICY to runtime
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/1] add sysfs exports for TPM 2 PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 00/12] ima: Fix rule parsing bugs and extend KEXEC_CMDLINE rule support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 4/5] LSM: Define SELinux function to measure security state
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 4/5] LSM: Define SELinux function to measure security state
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3 4/5] LSM: Define SELinux function to measure security state
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 4/5] LSM: Define SELinux function to measure security state
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3 4/5] LSM: Define SELinux function to measure security state
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3 4/5] LSM: Define SELinux function to measure security state
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 4/5] LSM: Define SELinux function to measure security state
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 4/5] LSM: Define SELinux function to measure security state
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3 07/12] ima: Fail rule parsing when appraise_flag=blacklist is unsupportable
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 02/12] security: add ipe lsm evaluation loop and audit system
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 05/12] fs: add security blob and hooks for block_device
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6] ima: move APPRAISE_BOOTPARAM dependency on ARCH_POLICY to runtime
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH V3 6/6] Add the property used for carrying forward the IMA measurement logs and update the code to use the defined property string.
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V3 5/6] Update the Kconfig to support carrying forward the IMA Measurement log and and update the setup_dtb call to add the linux,ima-kexec-buffer property to the DTB.
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V3 2/6] Update remove_ima_buffer code to use functions from libfdt reducing wrappers functions.
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH V3 3/6] Update function do_get_kexec_buffer to use of_* functions, and reducing wrapper functions.
- From: Prakhar Srivastava <prsriva@xxxxxxxxxxxxxxxxxxx>
- [PATCH V3 0/6] Add support to carry forward the IMA measurement logs
- From: Prakhar Srivastava <prsriva@xxxxxxxxxxxxxxxxxxx>
- [PATCH V3 2/6] Update remove_ima_buffer code to use functions from libfdt reducing wrappers functions.
- From: Prakhar Srivastava <prsriva@xxxxxxxxxxxxxxxxxxx>
- [PATCH V3 1/6] Refactoring powerpc code to be made available to other architectures
- From: Prakhar Srivastava <prsriva@xxxxxxxxxxxxxxxxxxx>
- [PATCH V3 5/6] Update the Kconfig to support carrying forward the IMA Measurement log and and update the setup_dtb call to add the linux,ima-kexec-buffer property to the DTB.
- From: Prakhar Srivastava <prsriva@xxxxxxxxxxxxxxxxxxx>
- [PATCH V3 4/6] Add support in arm64 to store the memory information of the IMA measurement log in the kimage used for kexec.
- From: Prakhar Srivastava <prsriva@xxxxxxxxxxxxxxxxxxx>
- [PATCH V3 6/6] Add the property used for carrying forward the IMA measurement logs and update the code to use the defined property string.
- From: Prakhar Srivastava <prsriva@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 4/5] LSM: Define SELinux function to measure security state
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 0/1] add sysfs exports for TPM 2 PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6] ima: move APPRAISE_BOOTPARAM dependency on ARCH_POLICY to runtime
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6] ima: move APPRAISE_BOOTPARAM dependency on ARCH_POLICY to runtime
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 4/5] LSM: Define SELinux function to measure security state
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH ima-evm-utils] Add sanity check for file parameter of ima_boot_aggregate
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: [PATCH 07/13] fs/kernel_read_file: Switch buffer size arg to size_t
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH 2/3] ima-evm-utils: output specific "unknown keyid" file msg based on log level
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 3/3] ima_evm_utils: indicate "--verify" template data digest failures
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 2/3] ima-evm-utils: output specific "unknown keyid" file msg based on log level
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 1/3] ima-evm-utils: similarly add sanity check for file parameter of TPM 1.2 PCRs
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH ima-evm-utils] Add sanity check for file parameter of ima_boot_aggregate
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v3 4/5] LSM: Define SELinux function to measure security state
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/3] ima_evm_utils: indicate "--verify" template data digest failures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 2/3] ima-evm-utils: output specific "unknown keyid" file msg based on log level
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 1/3] ima-evm-utils: similarly add sanity check for file parameter of TPM 1.2 PCRs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] Add sanity check for file parameter of ima_boot_aggregate
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 01/12] ima: Have the LSM free its audit rule
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 4/5] LSM: Define SELinux function to measure security state
- From: kernel test robot <lkp@xxxxxxxxx>
- [RFC PATCH] LSM: security_read_selinux_policy() can be static
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 06/13] fs/kernel_read_file: Remove redundant size argument
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH v3 4/5] LSM: Define SELinux function to measure security state
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v3 4/5] LSM: Define SELinux function to measure security state
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [RFC PATCH v4 05/12] fs: add security blob and hooks for block_device
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 06/12] ima: Fail rule parsing when the KEY_CHECK hook is combined with an invalid cond
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 02/12] security: add ipe lsm evaluation loop and audit system
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [RFC PATCH v4 07/12] dm-verity: add bdev_setsecurity hook for dm-verity signature
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v4 02/12] security: add ipe lsm evaluation loop and audit system
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v4 04/12] ipe: add property for trust of boot volume
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v4 06/12] dm-verity: move signature check after tree validation
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v4 00/12] Integrity Policy Enforcement LSM (IPE)
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v4 09/12] dm-verity: add bdev_setsecurity hook for root-hash
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v4 12/12] cleanup: uapi/linux/audit.h
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v4 10/12] ipe: add property for dmverity roothash
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v4 08/12] ipe: add property for signed dmverity volumes
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v4 11/12] documentation: add ipe documentation
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v4 05/12] fs: add security blob and hooks for block_device
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v4 03/12] security: add ipe lsm policy parser and policy loading
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v4 01/12] scripts: add ipe tooling to generate boot policy
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 1/5] IMA: Add LSM_STATE func to measure LSM data
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 0/5] LSM: Measure security module state
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 2/5] IMA: Define an IMA hook to measure LSM data
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 4/5] LSM: Define SELinux function to measure security state
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 3/5] LSM: Add security_measure_data in lsm_info struct
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 5/5] LSM: Define workqueue for measuring security module state
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/13] Introduce partial kernel_read_file() support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 06/13] fs/kernel_read_file: Remove redundant size argument
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] IMA: Add a test to verify importing a certificate into custom keyring
- From: Lachlan Sneff <t-josne@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 06/13] fs/kernel_read_file: Remove redundant size argument
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH v3 01/12] ima: Have the LSM free its audit rule
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 01/12] ima: Have the LSM free its audit rule
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 06/12] ima: Fail rule parsing when the KEY_CHECK hook is combined with an invalid cond
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/13] Introduce partial kernel_read_file() support
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH 05/13] fs/kernel_read_file: Split into separate source file
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH 03/13] fs/kernel_read_file: Remove FIRMWARE_EFI_EMBEDDED enum
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH 02/13] fs/kernel_read_file: Remove FIRMWARE_PREALLOC_BUFFER enum
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH 01/13] firmware_loader: EFI firmware loader must handle pre-allocated buffer
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH 06/13] fs/kernel_read_file: Remove redundant size argument
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH v3 06/12] ima: Fail rule parsing when the KEY_CHECK hook is combined with an invalid cond
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6] ima: move APPRAISE_BOOTPARAM dependency on ARCH_POLICY to runtime
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH v3 07/12] ima: Fail rule parsing when appraise_flag=blacklist is unsupportable
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH 01/13] firmware_loader: EFI firmware loader must handle pre-allocated buffer
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 03/13] fs/kernel_read_file: Remove FIRMWARE_EFI_EMBEDDED enum
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 04/13] fs/kernel_read_file: Split into separate include file
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 08/13] fs/kernel_read_file: Add file_size output argument
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 07/13] fs/kernel_read_file: Switch buffer size arg to size_t
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 06/13] fs/kernel_read_file: Remove redundant size argument
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 10/13] firmware_loader: Use security_post_load_data()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 09/13] LSM: Introduce kernel_post_load_data() hook
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 12/13] LSM: Add "contents" flag to kernel_read_file hook
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 13/13] fs/kernel_file_read: Add "offset" arg for partial reads
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 11/13] module: Call security_kernel_post_load_data()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 05/13] fs/kernel_read_file: Split into separate source file
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 02/13] fs/kernel_read_file: Remove FIRMWARE_PREALLOC_BUFFER enum
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 00/13] Introduce partial kernel_read_file() support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 08/12] ima: Shallow copy the args_p member of ima_rule_entry.lsm elements
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 08/12] ima: Shallow copy the args_p member of ima_rule_entry.lsm elements
- From: Konsta Karsisto <konsta.karsisto@xxxxxxxxx>
- [PATCH ima-evm-utils] Add sanity check for file parameter of ima_boot_aggregate
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH 3/3] tpm: tpm_tis: Put the TPM2 table after using it
- From: Hanjun Guo <guohanjun@xxxxxxxxxx>
- [PATCH 1/3] tpm: Put the TCPA table buf after using it
- From: Hanjun Guo <guohanjun@xxxxxxxxxx>
- [PATCH 2/3] tpm: tpm_crb: Put the TPM2 table after using it
- From: Hanjun Guo <guohanjun@xxxxxxxxxx>
- [PATCH v4 2/2] dt-bindings: Add SynQucer TPM MMIO as a trivial device
- From: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
- [PATCH v4 1/2] tpm: tis: add support for MMIO TPM on SynQuacer
- From: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
- [PATCH v4 0/2] synquacer: add TPM support
- From: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
- Re: [PATCH v3 00/12] ima: Fix rule parsing bugs and extend KEXEC_CMDLINE rule support
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 00/12] ima: Fix rule parsing bugs and extend KEXEC_CMDLINE rule support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 4/5] LSM: Define SELinux function to measure security state
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/4] fs: Remove FIRMWARE_PREALLOC_BUFFER from kernel_read_file() enums
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 2/4] fs: Remove FIRMWARE_PREALLOC_BUFFER from kernel_read_file() enums
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- [PATCH] encrypted-keys: Replace HTTP links with HTTPS ones
- From: "Alexander A. Klimov" <grandmaster@xxxxxxxxxxxx>
- Re: [PATCH v2 4/5] LSM: Define SELinux function to measure security state
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v6 7/7] ima: add policy support for the new file open MAY_OPENEXEC flag
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 4/5] LSM: Define SELinux function to measure security state
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 7/7] ima: add policy support for the new file open MAY_OPENEXEC flag
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 4/5] LSM: Define SELinux function to measure security state
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v3 07/12] ima: Fail rule parsing when appraise_flag=blacklist is unsupportable
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 07/12] ima: Fail rule parsing when appraise_flag=blacklist is unsupportable
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [V2 PATCH 1/3] Refactoring powerpc code for carrying over IMA measurement logs, to move non architecture specific code to security/ima.
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v2 2/5] IMA: Define an IMA hook to measure LSM data
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 3/5] LSM: Add security_measure_data in lsm_info struct
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 5/5] LSM: Define workqueue for measuring security module state
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/5] LSM: Measure security module state
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 4/5] LSM: Define SELinux function to measure security state
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 1/5] IMA: Add LSM_STATE func to measure LSM data
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: avoid accessing cleared ops during shutdown
- From: Guenter Roeck <groeck@xxxxxxxxxx>
- Re: [PATCH v2] tpm: Require that all digests are present in TCG_PCR_EVENT2 structures
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: avoid accessing cleared ops during shutdown
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 2/2] tpm: Add support for event log pointer found in TPM2 ACPI table
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 4/7] fs: Introduce O_MAYEXEC flag for openat2(2)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v6 7/7] ima: add policy support for the new file open MAY_OPENEXEC flag
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v6 7/7] ima: add policy support for the new file open MAY_OPENEXEC flag
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v6 5/7] fs,doc: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v6 7/7] ima: add policy support for the new file open MAY_OPENEXEC flag
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v6 5/7] fs,doc: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH] ima: Rename internal audit rule functions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 4/7] fs: Introduce O_MAYEXEC flag for openat2(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2] Check for tsspcrread in runtime
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 1/3 v1] ima-evm-utils: address new compiler complaints
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH ima-evm-utils v2] Check for tsspcrread in runtime
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 1/3 v1] ima-evm-utils: address new compiler complaints
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2] Check for tsspcrread in runtime
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] ima-evm-utils: fix overflow on printing boot_aggregate
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH 0/3] ima-evm-utils: miscellanous bug fixes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] ima-evm-utils: fix overflow on printing boot_aggregate
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 3/3] ima-evm-utils: fix overflow on printing boot_aggregate
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- [PATCH 2/3] ima-evm-utils: fix memory leak in case of error
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- [PATCH 1/3] ima-evm-utils: fix empty label at end of function.
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- [PATCH 0/3] ima-evm-utils: miscellanous bug fixes
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH v6 7/7] ima: add policy support for the new file open MAY_OPENEXEC flag
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 3/3] ima-evm-utils: add missing license info
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 6/7] selftest/openat2: Add tests for O_MAYEXEC enforcing
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 2/3] ima-evm-utils: reading public keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 1/3] ima-evm-utils: address new compiler complaints
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 5/7] fs,doc: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 6/6] ima-evm-utils: define a basic hash_info.h file
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH v2 2/8] ima_evm_utils: support extending TPM 2.0 banks w/original SHA1 padded digest
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH v2 2/8] ima_evm_utils: support extending TPM 2.0 banks w/original SHA1 padded digest
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 4/7] fs: Introduce O_MAYEXEC flag for openat2(2)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2] Check for tsspcrread in runtime
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2] Check for tsspcrread in runtime
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v2 2/8] ima_evm_utils: support extending TPM 2.0 banks w/original SHA1 padded digest
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] IMA: Verify that the kernel cmdline is passed and measured correctly through the kexec barrier.
- From: Lachlan Sneff <t-josne@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] IMA: Verify that the kernel cmdline is passed and measured correctly through the kexec barrier.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] IMA: Verify that the kernel cmdline is passed and measured correctly through the kexec barrier.
- From: Lachlan Sneff <t-josne@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2] Check for tsspcrread in runtime
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 6/6] ima-evm-utils: define a basic hash_info.h file
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 03/12] security: add ipe lsm policy parser and policy loading
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/8] ima_evm_utils: support extending TPM 2.0 banks w/original SHA1 padded digest
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH v1 4/5] LSM: Define SELinux function to measure security state
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 6/6] ima-evm-utils: define a basic hash_info.h file
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH v1 4/5] LSM: Define SELinux function to measure security state
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2] tpm: Require that all digests are present in TCG_PCR_EVENT2 structures
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v1 2/5] IMA: Define an IMA hook to measure LSM data
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v1 0/5] LSM: Measure security module state
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v1 1/5] IMA: Add LSM_STATE func to measure LSM data
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v1 5/5] LSM: Define workqueue for measuring security module state
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v1 3/5] LSM: Add security_state function pointer in lsm_info struct
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH v1 4/5] LSM: Define SELinux function to measure security state
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2] Check for tsspcrread in runtime
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH ima-evm-utils v2] Check for tsspcrread in runtime
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH ima-evm-utils] Check for tsspcrread in runtime
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v5 1/2] IMA: Add a test to verify measurment of keys
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH ima-evm-utils] Check for tsspcrread in runtime
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] IMA: Verify that the kernel cmdline is passed and measured correctly through the kexec barrier.
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 1/2] IMA: Verify that the kernel cmdline is passed and measured correctly through the kexec barrier.
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH ima-evm-utils] Check for tsspcrread in runtime
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 2/2] IMA: Verify IMA buffer passing through the kexec barrier
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] IMA: Verify that the kernel cmdline is passed and measured correctly through the kexec barrier.
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ima-evm-utils] Check for tsspcrread in runtime
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 5/7] fs,doc: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH v6 5/7] fs,doc: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v6 4/7] fs: Introduce O_MAYEXEC flag for openat2(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v6 3/7] exec: Move path_noexec() check earlier
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v6 7/7] ima: add policy support for the new file open MAY_OPENEXEC flag
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v6 6/7] selftest/openat2: Add tests for O_MAYEXEC enforcing
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v6 0/7] Add support for O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v6 2/7] exec: Move S_ISREG() check earlier
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v6 1/7] exec: Change uselib(2) IS_SREG() failure to EACCES
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v5 2/2] IMA: Add a test to verify importing a certificate into keyring
- From: Lachlan Sneff <t-josne@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 1/2] IMA: Add a test to verify measurment of keys
- From: Lachlan Sneff <t-josne@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 0/2] IMA: Verify measurement of certificates
- From: Lachlan Sneff <t-josne@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: avoid accessing cleared ops during shutdown
- From: Guenter Roeck <groeck@xxxxxxxxxx>
- [PATCH ima-evm-utils] Check for tsspcrread in runtime
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: Queries regarding portable feature and signing process for EVM
- From: rishi gupta <gupt21@xxxxxxxxx>
- Re: Queries regarding portable feature and signing process for EVM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 2/2] tpm: Add support for event log pointer found in TPM2 ACPI table
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: avoid accessing cleared ops during shutdown
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 2/2] tpm: Add support for event log pointer found in TPM2 ACPI table
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Queries regarding portable feature and signing process for EVM
- From: rishi gupta <gupt21@xxxxxxxxx>
- Re: [PATCH v3 2/2] dt-bindings: Add SynQucer TPM MMIO as a trivial device
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v2] tpm: Require that all digests are present in TCG_PCR_EVENT2 structures
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [V2 PATCH 2/3] dt-bindings: chosen: Document ima-kexec-buffer
- From: Prakhar Srivastava <prsriva@xxxxxxxxxxxxxxxxxxx>
- Re: [V2 PATCH 1/3] Refactoring powerpc code for carrying over IMA measurement logs, to move non architecture specific code to security/ima.
- From: Prakhar Srivastava <prsriva@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6] ima: move APPRAISE_BOOTPARAM dependency on ARCH_POLICY to runtime
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH v5] ima: move APPRAISE_BOOTPARAM dependency on ARCH_POLICY to runtime
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- [PATCH -next] IMA: Make ima_mok_init() static
- From: Wei Yongjun <weiyongjun1@xxxxxxxxxx>
- Re: [PATCH v5 2/8] lib/mpi: Extend the MPI library
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/6] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/6] security: keys: trusted: use ASN.1 TPM2 key format for the blobs
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH 2/4] fs: Remove FIRMWARE_PREALLOC_BUFFER from kernel_read_file() enums
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH 2/4] fs: Remove FIRMWARE_PREALLOC_BUFFER from kernel_read_file() enums
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 2/4] fs: Remove FIRMWARE_PREALLOC_BUFFER from kernel_read_file() enums
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH 2/4] fs: Remove FIRMWARE_PREALLOC_BUFFER from kernel_read_file() enums
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH 2/4] fs: Remove FIRMWARE_PREALLOC_BUFFER from kernel_read_file() enums
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: ima-evm-utils: before releasing a new version
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- [PATCH v2] ima: Rename internal audit rule functions
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: avoid accessing cleared ops during shutdown
- From: Andrey Pronin <apronin@xxxxxxxxxxxx>
- Re: [PATCH] ima: Rename internal audit rule functions
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] tpm: Require that all digests are present in TCG_PCR_EVENT2 structures
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5] ima: move APPRAISE_BOOTPARAM dependency on ARCH_POLICY to runtime
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH] tpm: avoid accessing cleared ops during shutdown
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5] ima: move APPRAISE_BOOTPARAM dependency on ARCH_POLICY to runtime
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5] ima: move APPRAISE_BOOTPARAM dependency on ARCH_POLICY to runtime
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- ima-evm-utils: before releasing a new version
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: avoid accessing cleared ops during shutdown
- From: Andrey Pronin <apronin@xxxxxxxxxxxx>
- Re: [PATCH v5] ima: move APPRAISE_BOOTPARAM dependency on ARCH_POLICY to runtime
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH ima-evm-utils v2 2/2] ima-evm-utils: add SM3 to pkey_hash_algo algorithm list
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5] ima: move APPRAISE_BOOTPARAM dependency on ARCH_POLICY to runtime
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 7/8] ima-evm-utils: optionally verify the template data file signature
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 8/8] ima-evm-utils: update README to reflect "--pcrs", "--verify" and "--validate"
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 0/8] additional "ima-measurement" support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 6/8] ima-evm-utils: the IMA measurement list may have too many measurements
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 5/8] ima-evm-utils: guarantee the measurement list contains all the records
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 4/8] ima-evm-utils: emit "ima_measurement" messages based on log level
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 3/8] ima-evm-utils: support providing the TPM 1.2 PCRs as a file
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 2/8] ima_evm_utils: support extending TPM 2.0 banks w/original SHA1 padded digest
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 1/8] ima-evm-utils: improve reading TPM 1.2 PCRs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/8] lib/mpi: Extend the MPI library
- From: Marcelo Henrique Cerri <marcelo.cerri@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: avoid accessing cleared ops during shutdown
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Require that all digests are present in TCG_PCR_EVENT2 structures
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH] tpm: avoid accessing cleared ops during shutdown
- From: Andrey Pronin <apronin@xxxxxxxxxxxx>
- Re: [PATCH] tpm: Require that all digests are present in TCG_PCR_EVENT2 structures
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5] ima: move APPRAISE_BOOTPARAM dependency on ARCH_POLICY to runtime
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- [PATCH 3/3] ima-evm-utils: support providing the TPM 1.2 PCRs as a file
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 2/3] ima_evm_utils: support extending TPM 2.0 banks w/original SHA1 padded digest
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 0/3] additional "ima-measurement" support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 1/3] ima-evm-utils: improve reading TPM 1.2 PCRs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] synquacer: add TPM support
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] synquacer: add TPM support
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v5 1/8] crypto: sm3 - export crypto_sm3_final function
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v5 5/8] crypto: testmgr - support test with different ciphertext per encryption
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v5 8/8] integrity: Asymmetric digsig supports SM2-with-SM3 algorithm
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v5 6/8] X.509: support OSCCA certificate parse
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v5 4/8] crypto: sm2 - introduce OSCCA SM2 asymmetric cipher algorithm
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v5 2/8] lib/mpi: Extend the MPI library
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v5 7/8] X.509: support OSCCA sm2-with-sm3 certificate verification
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v5 3/8] lib/mpi: Introduce ec implementation to MPI library
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v5 0/8] crpyto: introduce OSCCA certificate and SM2 asymmetric algorithm
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v3 06/12] ima: Fail rule parsing when the KEY_CHECK hook is combined with an invalid cond
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 04/12] ima: Fail rule parsing when buffer hook functions have an invalid action
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 05/12] ima: Fail rule parsing when the KEXEC_CMDLINE hook is combined with an invalid cond
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 08/12] ima: Shallow copy the args_p member of ima_rule_entry.lsm elements
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 07/12] ima: Fail rule parsing when appraise_flag=blacklist is unsupportable
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 11/12] ima: Use the common function to detect LSM conditionals in a rule
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 10/12] ima: Move comprehensive rule validation checks out of the token parser
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 12/12] ima: Support additional conditionals in the KEXEC_CMDLINE hook function
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 09/12] ima: Use correct type for the args_p member of ima_rule_entry.lsm elements
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 03/12] ima: Free the entire rule if it fails to parse
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 02/12] ima: Free the entire rule when deleting a list of rules
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 01/12] ima: Have the LSM free its audit rule
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 00/12] ima: Fix rule parsing bugs and extend KEXEC_CMDLINE rule support
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- [PATCH ima-evm-utils v2 1/2] ima-evm-utils: beautify the code to make it more readable
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH ima-evm-utils v2 2/2] ima-evm-utils: add SM3 to pkey_hash_algo algorithm list
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] Fix misused kernel_read_file() enums
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH AUTOSEL 5.7 03/30] ima: extend boot_aggregate with kernel measurements
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH v18 14/23] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v18 12/23] IMA: Change internal interfaces to use lsmblobs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v18 11/23] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v18 10/23] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v18 09/23] LSM: Use lsmblob in security_task_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] synquacer: add TPM support
- From: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: tis: add support for MMIO TPM on SynQuacer
- From: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
- Re: [PATCH v3 0/2] synquacer: add TPM support
- From: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: tis: add support for MMIO TPM on SynQuacer
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] synquacer: add TPM support
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH AUTOSEL 5.7 03/30] ima: extend boot_aggregate with kernel measurements
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH AUTOSEL 5.7 03/30] ima: extend boot_aggregate with kernel measurements
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.4 14/16] tpm_tis: extra chip->ops check on error path in tpm_tis_core_init
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 6/8] tpm_tis: extra chip->ops check on error path in tpm_tis_core_init
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 3/5] tpm_tis: extra chip->ops check on error path in tpm_tis_core_init
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v3 1/2] tpm: tis: add support for MMIO TPM on SynQuacer
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH AUTOSEL 5.4 03/16] ima: extend boot_aggregate with kernel measurements
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v9 2/2] tpm: Add support for event log pointer found in TPM2 ACPI table
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v9 2/2] tpm: Add support for event log pointer found in TPM2 ACPI table
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 4/4] module: Add hook for security_kernel_post_read_file()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4] ima: move APPRAISE_BOOTPARAM dependency on ARCH_POLICY to runtime
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH] Revert commit e918e570415c ("tpm_tis: Remove the HID IFX0102")
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] Fix misused kernel_read_file() enums
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- [PATCH v3 2/2] dt-bindings: Add SynQucer TPM MMIO as a trivial device
- From: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
- [PATCH v3 1/2] tpm: tis: add support for MMIO TPM on SynQuacer
- From: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
- [PATCH v3 0/2] synquacer: add TPM support
- From: Masahisa Kojima <masahisa.kojima@xxxxxxxxxx>
- Re: [PATCH 0/4] Fix misused kernel_read_file() enums
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH 0/4] Fix misused kernel_read_file() enums
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH 0/4] Fix misused kernel_read_file() enums
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH 0/4] Fix misused kernel_read_file() enums
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH v4 1/8] crypto: sm3 - export crypto_sm3_final function
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v4 6/8] X.509: support OSCCA certificate parse
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v4 3/8] lib/mpi: Introduce ec implementation to MPI library
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v4 2/8] lib/mpi: Extend the MPI library
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v4 8/8] integrity: Asymmetric digsig supports SM2-with-SM3 algorithm
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v4 4/8] crypto: sm2 - introduce OSCCA SM2 asymmetric cipher algorithm
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v4 7/8] X.509: support OSCCA sm2-with-sm3 certificate verification
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v4 0/8] crpyto: introduce OSCCA certificate and SM2 asymmetric algorithm
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH v4 5/8] crypto: testmgr - support test with different ciphertext per encryption
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH ima-evm-utils 3/3] ima-evm-utils: ima_sign supports sm3 algorithm
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH ima-evm-utils 1/3] ima-evm-utils: Fix mismatched type checking
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- [PATCH ima-evm-utils 2/3] ima-evm-utils: beautify the code to make it more readable
- From: Tianjia Zhang <tianjia.zhang@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 0/9] firmware: add request_partial_firmware_into_buf
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH v10 2/9] fs: introduce kernel_pread_file* support
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH v10 0/9] firmware: add request_partial_firmware_into_buf
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [PATCH v10 7/9] misc: bcm-vk: add Broadcom VK driver
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH v10 4/9] test_firmware: add partial read support for request_firmware_into_buf
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH v10 3/9] firmware: add request_partial_firmware_into_buf
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH v10 2/9] fs: introduce kernel_pread_file* support
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH v10 1/9] fs: move kernel_read_file* to its own include file
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH v10 9/9] ima: add FIRMWARE_PARTIAL_READ support
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH 2/4] fs: Remove FIRMWARE_PREALLOC_BUFFER from kernel_read_file() enums
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 4/4] module: Add hook for security_kernel_post_read_file()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 2/4] fs: Remove FIRMWARE_PREALLOC_BUFFER from kernel_read_file() enums
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH 4/4] module: Add hook for security_kernel_post_read_file()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 2/9] fs: introduce kernel_pread_file* support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 7/9] misc: bcm-vk: add Broadcom VK driver
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v10 4/9] test_firmware: add partial read support for request_firmware_into_buf
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v10 3/9] firmware: add request_partial_firmware_into_buf
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v10 2/9] fs: introduce kernel_pread_file* support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v10 1/9] fs: move kernel_read_file* to its own include file
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v10 9/9] ima: add FIRMWARE_PARTIAL_READ support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 2/4] fs: Remove FIRMWARE_PREALLOC_BUFFER from kernel_read_file() enums
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 0/4] Fix misused kernel_read_file() enums
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for Linux v5.8-rc5
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH] Replace HTTP links with HTTPS ones: security
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v10 9/9] ima: add FIRMWARE_PARTIAL_READ support
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH 2/4] fs: Remove FIRMWARE_PREALLOC_BUFFER from kernel_read_file() enums
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH 0/4] Fix misused kernel_read_file() enums
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 5.7 041/112] Revert "tpm: selftest: cleanup after unseal with wrong auth/policy test"
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.7 042/112] selftests: tpm: Use /bin/sh instead of /bin/bash
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.4 19/65] selftests: tpm: Use /bin/sh instead of /bin/bash
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Revert commit e918e570415c ("tpm_tis: Remove the HID IFX0102")
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] Fix misused kernel_read_file() enums
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/4] Fix misused kernel_read_file() enums
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 3/4] fs: Remove FIRMWARE_EFI_EMBEDDED from kernel_read_file() enums
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 2/4] fs: Remove FIRMWARE_PREALLOC_BUFFER from kernel_read_file() enums
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 1/4] firmware_loader: EFI firmware loader must handle pre-allocated buffer
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 4/4] module: Add hook for security_kernel_post_read_file()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v9 2/2] tpm: Add support for event log pointer found in TPM2 ACPI table
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v9 2/2] tpm: Add support for event log pointer found in TPM2 ACPI table
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 09/11] ima: Move validation of the keyrings conditional into ima_validate_rule()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 9/9] ima: add FIRMWARE_PARTIAL_READ support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v9 2/2] tpm: Add support for event log pointer found in TPM2 ACPI table
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 1/3] ima-evm-utils: support the original "ima" template
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 0/6] ima-evm-utils: miscellanous code clean up and bug fixes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 3/3] ima-evm-utils: mixed "ima" and other template formats not supported
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 2/3] ima-evm-utils: read the TPM 1.2 binary_bios_measurements
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 0/3] ima-evm-utils: original "ima" template support
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 6/6] ima-evm-utils: define a basic hash_info.h file
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 4/6] ima-evm-utils: calculate and verify the template data digest
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 5/6] ima-evm-utils: use uint32_t for template length
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 1/6] ima-evm-utils: fix PCRAggr error message
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 2/6] ima-evm-utils: fix measurement violation checking
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 3/6] ima-evm-utils: don't hardcode validating the IMA measurement list
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v9 2/2] tpm: Add support for event log pointer found in TPM2 ACPI table
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 2/2] tpm: Add support for event log pointer found in TPM2 ACPI table
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] Revert commit e918e570415c ("tpm_tis: Remove the HID IFX0102")
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [GIT PULL] tpmdd updates for Linux v5.8-rc5
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [RESEND,PATCH v9 0/2] tpm2: Make TPM2 logs accessible for non-UEFI firmware
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [RESEND,PATCH v9 2/2] tpm: Add support for event log pointer found in TPM2 ACPI table
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [RESEND,PATCH v9 1/2] acpi: Extend TPM2 ACPI table with missing log fields
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 2/2] tpm: Add support for event log pointer found in TPM2 ACPI table
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v9 2/2] tpm: Add support for event log pointer found in TPM2 ACPI table
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v10 9/9] ima: add FIRMWARE_PARTIAL_READ support
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- [PATCH v10 8/9] MAINTAINERS: bcm-vk: add maintainer for Broadcom VK Driver
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- [PATCH v10 6/9] bcm-vk: add bcm_vk UAPI
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- [PATCH v10 5/9] firmware: test partial file reads of request_partial_firmware_into_buf
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- [PATCH v10 4/9] test_firmware: add partial read support for request_firmware_into_buf
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- [PATCH v10 3/9] firmware: add request_partial_firmware_into_buf
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- [PATCH v10 2/9] fs: introduce kernel_pread_file* support
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- [PATCH v10 1/9] fs: move kernel_read_file* to its own include file
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- [PATCH v10 0/9] firmware: add request_partial_firmware_into_buf
- From: Scott Branden <scott.branden@xxxxxxxxxxxx>
- Re: [PATCH v9 2/2] tpm: Add support for event log pointer found in TPM2 ACPI table
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 2/2] tpm: Add support for event log pointer found in TPM2 ACPI table
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Define TPM2_SPACE_BUFFER_SIZE to replace the use of PAGE_SIZE
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 2/2] tpm: Add support for event log pointer found in TPM2 ACPI table
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v9 1/2] acpi: Extend TPM2 ACPI table with missing log fields
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] Revert commit e918e570415c ("tpm_tis: Remove the HID IFX0102")
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- [PATCH] Revert commit e918e570415c ("tpm_tis: Remove the HID IFX0102")
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v9 1/2] acpi: Extend TPM2 ACPI table with missing log fields
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v9 2/2] tpm: Add support for event log pointer found in TPM2 ACPI table
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- [PATCH v9 0/2] tpm2: Make TPM2 logs accessible for non-UEFI firmware
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Define TPM2_SPACE_BUFFER_SIZE to replace the use of PAGE_SIZE
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm_tis: Remove the HID IFX0102
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm_tis: Remove the HID IFX0102
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm_tis: Remove the HID IFX0102
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 09/11] ima: Move validation of the keyrings conditional into ima_validate_rule()
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH v2] tpm_tis: Remove the HID IFX0102
- From: <Peter.Huewe@xxxxxxxxxxxx>
- Re: [PATCH] Replace HTTP links with HTTPS ones: security
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- [PATCH] Replace HTTP links with HTTPS ones: security
- From: "Alexander A. Klimov" <grandmaster@xxxxxxxxxxxx>
- Re: [PATCH] tpm: Define TPM2_SPACE_BUFFER_SIZE to replace the use of PAGE_SIZE
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v4] ima: move APPRAISE_BOOTPARAM dependency on ARCH_POLICY to runtime
- From: Bruno Meneguele <bmeneg@xxxxxxxxxx>
- Re: [PATCH v2 09/11] ima: Move validation of the keyrings conditional into ima_validate_rule()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd updates for Linux v5.8-rc4
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH] tpm: Require that all digests are present in TCG_PCR_EVENT2 structures
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Define TPM2_SPACE_BUFFER_SIZE to replace the use of PAGE_SIZE
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v2] tpm_tis: Remove the HID IFX0102
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm_tis: Remove the HID IFX0102
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH] tpm: Define TPM2_SPACE_BUFFER_SIZE to replace the use of PAGE_SIZE
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 09/11] ima: Move validation of the keyrings conditional into ima_validate_rule()
- From: Tyler Hicks <tyhicks@xxxxxxxxxxxxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]