Linux Integrity
Thread Index
[
Prev Page
][
Next Page
]
Re: [PATCH v7 2/2] fTPM: add documentation for ftpm driver
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v7 1/2] fTPM: firmware TPM running in TEE
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[GIT PULL] tpmdd updates for Linux v5.3
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: linux-next: Tree for Jun 26 (security/integrity/ima/)
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
Re: [PATCH v5 16/16] f2fs: add fs-verity support
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v7 00/11] ima-evm-utils: Convert v2 signatures from RSA to EVP_PKEY API
From
: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
Re: [PATCH v7 00/11] ima-evm-utils: Convert v2 signatures from RSA to EVP_PKEY API
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v7 00/11] ima-evm-utils: Convert v2 signatures from RSA to EVP_PKEY API
From
: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
Re: [PATCH v4 00/14] ima: introduce IMA Digest Lists extension
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v5 16/16] f2fs: add fs-verity support
From
: Chao Yu <yuchao0@xxxxxxxxxx>
Re: [RFC PATCH v5 1/1] Add dm verity root hash pkcs7 sig validation.
From
: Milan Broz <gmazyland@xxxxxxxxx>
[PATCH v1 2/2] char: tpm: add new driver for tpm i2c ptp
From
: Oshri Alkoby <oshrialkoby85@xxxxxxxxx>
[PATCH v1 1/2] dt-bindings: tpm: add the TPM I2C PTP device tree binding documentation
From
: Oshri Alkoby <oshrialkoby85@xxxxxxxxx>
[PATCH v1 0/2] char: tpm: add new driver for tpm i2c ptp
From
: Oshri Alkoby <oshrialkoby85@xxxxxxxxx>
Re: Can we enforce "IMA Policy" based on file type
From
: Kavitha Sivagnanam <kavi@xxxxxxxxxxx>
Re: [PATCH v7 2/2] fTPM: add documentation for ftpm driver
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
Re: [PATCH 0/2] [IMA] Measure public keys of BuiltIn Trusted Keys
From
: Lakshmi <nramas@xxxxxxxxxxxxxxxxxxx>
[PATCH v7 2/2] fTPM: add documentation for ftpm driver
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH v7 1/2] fTPM: firmware TPM running in TEE
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH v7 0/2] fTPM: firmware TPM running in TEE
From
: Sasha Levin <sashal@xxxxxxxxxx>
Re: [PATCH v6 2/2] fTPM: add documentation for ftpm driver
From
: Sasha Levin <sashal@xxxxxxxxxx>
Re: [PATCH v6 1/2] fTPM: firmware TPM running in TEE
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
Re: [PATCH v6 2/2] fTPM: add documentation for ftpm driver
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
[PATCH v6 2/2] fTPM: add documentation for ftpm driver
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH v6 1/2] fTPM: firmware TPM running in TEE
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH v6 0/2] fTPM: firmware TPM running in TEE
From
: Sasha Levin <sashal@xxxxxxxxxx>
Re: [RFC PATCH v5 1/1] Add dm verity root hash pkcs7 sig validation.
From
: Mike Snitzer <snitzer@xxxxxxxxxx>
Re: [PATCH v5 16/16] f2fs: add fs-verity support
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v4 00/14] ima: introduce IMA Digest Lists extension
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v4 00/14] ima: introduce IMA Digest Lists extension
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v5 16/16] f2fs: add fs-verity support
From
: Chao Yu <yuchao0@xxxxxxxxxx>
Re: [PATCH v7 00/11] ima-evm-utils: Convert v2 signatures from RSA to EVP_PKEY API
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH V10 2/3] IMA: Define a new template field buf
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
Re: [PATCH v7 00/11] ima-evm-utils: Convert v2 signatures from RSA to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v11 02/13] PKCS#7: Refactor verify_pkcs7_signature()
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
Re: [PATCH v11 01/13] MODSIGN: Export module signature definitions
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
Re: [PATCH v7 00/11] ima-evm-utils: Convert v2 signatures from RSA to EVP_PKEY API
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v7 00/11] ima-evm-utils: Convert v2 signatures from RSA to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v7 00/11] ima-evm-utils: Convert v2 signatures from RSA to EVP_PKEY API
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v3] tpm: Get TCG log from TPM2 ACPI table for tpm2 systems
From
: Jordan Hand <jordanhand22@xxxxxxxxx>
Re: [PATCH] tpm: Get TCG log from TPM2 ACPI table for tpm2 systems
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v7 00/11] ima-evm-utils: Convert v2 signatures from RSA to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v7 00/11] ima-evm-utils: Convert v2 signatures from RSA to EVP_PKEY API
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 1/8] tpm: block messages while suspended
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH V10 1/3] IMA: Define a new hook to measure the kexec boot command line arguments
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH V10 2/3] IMA: Define a new template field buf
From
: Prakhar Srivastava <prsriva02@xxxxxxxxx>
[PATCH V10 3/3] KEXEC: Call ima_kexec_cmdline to measure the boot command line args
From
: Prakhar Srivastava <prsriva02@xxxxxxxxx>
[PATCH V10 1/3] IMA: Define a new hook to measure the kexec boot command line arguments
From
: Prakhar Srivastava <prsriva02@xxxxxxxxx>
[PATCH V10 0/3] Add support for measuring the boot command line during kexec_file_load
From
: Prakhar Srivastava <prsriva02@xxxxxxxxx>
[PATCH v2] tpm: Get TCG log from TPM2 ACPI table for tpm2 systems
From
: Jordan Hand <jordanhand22@xxxxxxxxx>
[PATCH] tpm: Get TCG log from TPM2 ACPI table for tpm2 systems
From
: Jordan Hand <jordanhand22@xxxxxxxxx>
Re: possible deadlock in __do_page_fault (2)
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [IMA] Re: possible deadlock in get_user_pages_unlocked (2)
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v7 11/11] ima-evm-utils: Log hash_algo with hash value in verbose mode
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v7 10/11] ima-evm-utils: Pass status codes from sign and hash functions to the callers
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v7 09/11] ima-evm-utils: Remove RSA_ASN1_templates
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v7 08/11] ima-evm-utils: Replace calc_keyid_v2 with calc_pkeyid_v2
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v7 07/11] ima-evm-utils: Convert sign_hash_v2 to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v7 06/11] ima-evm-utils: Replace find_keyid with find_keyid_pkey
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v7 05/11] ima-evm-utils: Convert verify_hash_v2 to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v7 04/11] ima-evm-utils: Start converting find_keyid to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v7 03/11] ima-evm-utils: Convert cmd_import and calc keyid v2 to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v7 02/11] ima-evm-utils: Convert read_priv_key to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v7 01/11] ima-evm-utils: Convert read_pub_key to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v7 00/11] ima-evm-utils: Convert v2 signatures from RSA to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v5 01/11] ima-evm-utils: Make sure sig buffer is always MAX_SIGNATURE_SIZE
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v5 16/16] f2fs: add fs-verity support
From
: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
Re: [PATCH v5 12/16] fs-verity: add SHA-512 support
From
: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
Re: [PATCH v5 11/16] fs-verity: implement FS_IOC_MEASURE_VERITY ioctl
From
: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
Re: [PATCH v5 10/16] fs-verity: implement FS_IOC_ENABLE_VERITY ioctl
From
: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
Re: [PATCH v5 09/16] fs-verity: add data verification hooks for ->readpages()
From
: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
Re: [PATCH v5 08/16] fs-verity: add the hook for file ->setattr()
From
: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
Re: [PATCH v5 07/16] fs-verity: add the hook for file ->open()
From
: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
Re: [PATCH v5 06/16] fs-verity: add inode and superblock fields
From
: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
Re: [PATCH v5 05/16] fs-verity: add Kconfig and the helper functions for hashing
From
: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
Re: [PATCH v5 04/16] fs: uapi: define verity bit for FS_IOC_GETFLAGS
From
: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
Re: [PATCH v5 03/16] fs-verity: add UAPI header
From
: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
Re: [PATCH v5 02/16] fs-verity: add MAINTAINERS file entry
From
: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
Re: [PATCH v5 01/16] fs-verity: add a documentation file
From
: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
[PATCH V34 25/29] kexec: Allow kexec_file() with appropriate IMA policy when locked down
From
: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
Re: [PATCH v5 01/11] ima-evm-utils: Make sure sig buffer is always MAX_SIGNATURE_SIZE
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5 01/11] ima-evm-utils: Make sure sig buffer is always MAX_SIGNATURE_SIZE
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v5 01/11] ima-evm-utils: Make sure sig buffer is always MAX_SIGNATURE_SIZE
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5 01/11] ima-evm-utils: Make sure sig buffer is always MAX_SIGNATURE_SIZE
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v5 01/11] ima-evm-utils: Make sure sig buffer is always MAX_SIGNATURE_SIZE
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5 01/11] ima-evm-utils: Make sure sig buffer is always MAX_SIGNATURE_SIZE
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v5 14/16] ext4: add basic fs-verity support
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH V33 26/30] kexec: Allow kexec_file() with appropriate IMA policy when locked down
From
: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
Re: [PATCH 1/8] tpm: block messages while suspended
From
: Stephen Boyd <swboyd@xxxxxxxxxxxx>
Re: [PATCH v5 14/16] ext4: add basic fs-verity support
From
: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
Re: [PATCH v5 01/11] ima-evm-utils: Make sure sig buffer is always MAX_SIGNATURE_SIZE
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v5 01/16] fs-verity: add a documentation file
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v5 03/16] fs-verity: add UAPI header
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v5 05/16] fs-verity: add Kconfig and the helper functions for hashing
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v5 09/16] fs-verity: add data verification hooks for ->readpages()
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v5 02/16] fs-verity: add MAINTAINERS file entry
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v5 07/16] fs-verity: add the hook for file ->open()
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v5 13/16] fs-verity: support builtin file signatures
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v5 10/16] fs-verity: implement FS_IOC_ENABLE_VERITY ioctl
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v5 16/16] f2fs: add fs-verity support
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v5 15/16] ext4: add fs-verity read support
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v5 14/16] ext4: add basic fs-verity support
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v5 12/16] fs-verity: add SHA-512 support
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v5 11/16] fs-verity: implement FS_IOC_MEASURE_VERITY ioctl
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v5 08/16] fs-verity: add the hook for file ->setattr()
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v5 04/16] fs: uapi: define verity bit for FS_IOC_GETFLAGS
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v5 06/16] fs-verity: add inode and superblock fields
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v5 00/16] fs-verity: read-only file-based authenticity protection
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v5 06/11] ima-evm-utils: Start converting find_keyid to use EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v5 06/11] ima-evm-utils: Start converting find_keyid to use EVP_PKEY API
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5 06/11] ima-evm-utils: Start converting find_keyid to use EVP_PKEY API
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v6 11/11] ima-evm-utils: Pass status codes from sign and hash functions to the callers
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v6 10/11] ima-evm-utils: Remove RSA_ASN1_templates
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v6 09/11] ima-evm-utils: Replace calc_keyid_v2 with calc_pkeyid_v2
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v6 08/11] ima-evm-utils: Convert sign_hash_v2 to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v6 07/11] ima-evm-utils: Replace find_keyid with find_keyid_pkey
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v6 06/11] ima-evm-utils: Convert verify_hash_v2 to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v6 05/11] ima-evm-utils: Start converting find_keyid to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v6 04/11] ima-evm-utils: Convert cmd_import and calc keyid v2 to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v6 03/11] ima-evm-utils: Convert read_priv_key to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v6 02/11] ima-evm-utils: Convert read_pub_key to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v6 01/11] ima-evm-utils: Make sure sig buffer is always MAX_SIGNATURE_SIZE
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v6 00/11] ima-evm-utils: Convert v2 signatures from RSA to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v5 06/11] ima-evm-utils: Start converting find_keyid to use EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH V5] IMA: support for per policy rule template formats
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH V5] IMA: support for per policy rule template formats
From
: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
Re: [PATCH 1/3] IMA:Define a new hook to measure the kexec boot command line arguments
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v4 14/16] ext4: add basic fs-verity support
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[RFC PATCH v5 0/1] Add dm verity root hash pkcs7 sig validation.
From
: Jaskaran Khurana <jaskarankhurana@xxxxxxxxxxxxxxxxxxx>
[RFC PATCH v5 1/1] Add dm verity root hash pkcs7 sig validation.
From
: Jaskaran Khurana <jaskarankhurana@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/3] IMA:Define a new template field buf
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 2/3] IMA:Define a new template field buf
From
: prakhar srivastava <prsriva02@xxxxxxxxx>
Re: [PATCH V9 1/3] IMA:Define a new hook to measure the kexec boot command line arguments
From
: prakhar srivastava <prsriva02@xxxxxxxxx>
Re: [PATCH v5 06/11] ima-evm-utils: Start converting find_keyid to use EVP_PKEY API
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5 06/11] ima-evm-utils: Start converting find_keyid to use EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v5 06/11] ima-evm-utils: Start converting find_keyid to use EVP_PKEY API
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH V4] IMA: support for per policy rule template formats
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 2/3] IMA:Define a new template field buf
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5 04/11] ima-evm-utils: Start converting calc keyid v2 to EVP_PKEY API
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5 1/2] fTPM: firmware TPM running in TEE
From
: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
Re: [PATCH v4 14/16] ext4: add basic fs-verity support
From
: "Theodore Ts'o" <tytso@xxxxxxx>
Re: [PATCH v4 14/16] ext4: add basic fs-verity support
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v4 14/16] ext4: add basic fs-verity support
From
: "Theodore Ts'o" <tytso@xxxxxxx>
[PATCH V4] IMA: support for per policy rule template formats
From
: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
Re: [PATCH] ima: dynamically allocate shash_desc
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] ima: dynamically allocate shash_desc
From
: Arnd Bergmann <arnd@xxxxxxxx>
Re: [PATCH 0/2] [IMA] Measure public keys of BuiltIn Trusted Keys
From
: Jordan Hand <jorhand@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v4 14/16] ext4: add basic fs-verity support
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH 0/2] [IMA] Measure public keys of BuiltIn Trusted Keys
From
: Ken Goldman <kgold@xxxxxxxxxxxxx>
Re: [PATCH v4 13/16] fs-verity: support builtin file signatures
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v4 10/16] fs-verity: implement FS_IOC_ENABLE_VERITY ioctl
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v4 07/16] fs-verity: add the hook for file ->open()
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v4 05/16] fs-verity: add Kconfig and the helper functions for hashing
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v4 01/16] fs-verity: add a documentation file
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v4 2/2] fTPM: add documentation for ftpm driver
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
Re: [LTP] [PATCH v4 4/4] ima: Add overlay test + doc
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH v5 11/11] ima-evm-utils: Remove RSA_ASN1_templates
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v5 10/11] ima-evm-utils: Finish converting calc keyid v2 to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v5 09/11] ima-evm-utils: Convert sign_hash_v2 to use EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v5 08/11] ima-evm-utils: Finish conversion of find_keyid to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v5 07/11] ima-evm-utils: Convert verify_hash_v2 to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v5 06/11] ima-evm-utils: Start converting find_keyid to use EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v5 05/11] ima-evm-utils: Convert cmd_import to use EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v5 04/11] ima-evm-utils: Start converting calc keyid v2 to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v5 03/11] ima-evm-utils: Change read_priv_key to use EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v5 02/11] ima-evm-utils: Change read_pub_key to use EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v5 01/11] ima-evm-utils: Make sure sig buffer is always MAX_SIGNATURE_SIZE
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v5 00/11] ima-evm-utils: Convert sign v2 from RSA to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH] ima: dynamically allocate shash_desc
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 0/2] [IMA] Measure public keys of BuiltIn Trusted Keys
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: [PATCH 0/2] [IMA] Measure public keys of BuiltIn Trusted Keys
From
: Lakshmi <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/8] tpm: block messages while suspended
From
: Jason Gunthorpe <jgg@xxxxxxxx>
Re: [RFC PATCH v4 1/1] Add dm verity root hash pkcs7 sig validation.
From
: Jaskaran Singh Khurana <jaskarankhurana@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] ima: dynamically allocate shash_desc
From
: Arnd Bergmann <arnd@xxxxxxxx>
[PATCH V8 0/3] Add support for measuring the boot command line during kexec_file_load
From
: Prakhar Srivastava <prsriva02@xxxxxxxxx>
[PATCH V9 2/3] IMA:Define a new template field buf
From
: Prakhar Srivastava <prsriva02@xxxxxxxxx>
[PATCH V9 1/3] IMA:Define a new hook to measure the kexec boot command line arguments
From
: Prakhar Srivastava <prsriva02@xxxxxxxxx>
[PATCH V9 3/3] KEXEC:Call ima_kexec_cmdline to measure the boot command line args
From
: Prakhar Srivastava <prsriva02@xxxxxxxxx>
[PATCH 1/3] IMA:Define a new hook to measure the kexec boot command line arguments
From
: Prakhar Srivastava <prsriva02@xxxxxxxxx>
[PATCH V8 0/3] Add support for measuring the boot command line during kexec_file_load
From
: Prakhar Srivastava <prsriva02@xxxxxxxxx>
[PATCH 3/3] KEXEC:Call ima_kexec_cmdline to measure the boot command line args
From
: Prakhar Srivastava <prsriva02@xxxxxxxxx>
[PATCH 2/3] IMA:Define a new template field buf
From
: Prakhar Srivastava <prsriva02@xxxxxxxxx>
Re: [PATCH] ima: dynamically allocate shash_desc
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 0/2] [IMA] Measure public keys of BuiltIn Trusted Keys
From
: Ken Goldman <kgold@xxxxxxxxxxxxx>
Re: [PATCH 1/8] tpm: block messages while suspended
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] ima: dynamically allocate shash_desc
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v4 4/5] ima-evm-utils: Convert sign v2 from RSA to EVP_PKEY API
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v4 4/5] ima-evm-utils: Convert sign v2 from RSA to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v4 4/5] ima-evm-utils: Convert sign v2 from RSA to EVP_PKEY API
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v4 1/5] ima-avm-utils: Make sure sig buffer is always MAX_SIGNATURE_SIZE
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v4 3/5] ima-avm-utils: Change read_priv_key to use EVP_PKEY API
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [RFC PATCH v4 1/1] Add dm verity root hash pkcs7 sig validation.
From
: Milan Broz <gmazyland@xxxxxxxxx>
[PATCH] ima: dynamically allocate shash_desc
From
: Arnd Bergmann <arnd@xxxxxxxx>
Re: [PATCH v4 00/14] ima: introduce IMA Digest Lists extension
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v3 1/3] powerpc/powernv: Add OPAL API interface to get secureboot state
From
: Daniel Axtens <dja@xxxxxxxxxx>
[tytso@xxxxxxx: Re: [PATCH v4 03/16] fs-verity: add UAPI header]
From
: "Theodore Ts'o" <tytso@xxxxxxx>
Re: [PATCH v4 14/16] ext4: add basic fs-verity support
From
: "Theodore Ts'o" <tytso@xxxxxxx>
Re: [PATCH v4 13/16] fs-verity: support builtin file signatures
From
: "Theodore Ts'o" <tytso@xxxxxxx>
Re: [PATCH v4 12/16] fs-verity: add SHA-512 support
From
: "Theodore Ts'o" <tytso@xxxxxxx>
Re: [PATCH v4 11/16] fs-verity: implement FS_IOC_MEASURE_VERITY ioctl
From
: "Theodore Ts'o" <tytso@xxxxxxx>
Re: [PATCH v4 10/16] fs-verity: implement FS_IOC_ENABLE_VERITY ioctl
From
: "Theodore Ts'o" <tytso@xxxxxxx>
Re: [PATCH v4 09/16] fs-verity: add data verification hooks for ->readpages()
From
: "Theodore Ts'o" <tytso@xxxxxxx>
Re: [PATCH v4 08/16] fs-verity: add the hook for file ->setattr()
From
: "Theodore Ts'o" <tytso@xxxxxxx>
Re: [PATCH v4 07/16] fs-verity: add the hook for file ->open()
From
: "Theodore Ts'o" <tytso@xxxxxxx>
Re: [PATCH v4 06/16] fs-verity: add inode and superblock fields
From
: "Theodore Ts'o" <tytso@xxxxxxx>
Re: [PATCH v4 05/16] fs-verity: add Kconfig and the helper functions for hashing
From
: "Theodore Ts'o" <tytso@xxxxxxx>
Re: [PATCH v4 04/16] fs: uapi: define verity bit for FS_IOC_GETFLAGS
From
: "Theodore Ts'o" <tytso@xxxxxxx>
Re: [PATCH v4 02/16] fs-verity: add MAINTAINERS file entry
From
: "Theodore Ts'o" <tytso@xxxxxxx>
Re: [PATCH v4 01/16] fs-verity: add a documentation file
From
: "Theodore Ts'o" <tytso@xxxxxxx>
Re: [PATCH] tpm: Fix null pointer dereference on chip register error path
From
: Milan Broz <gmazyland@xxxxxxxxx>
Re: [PATCH v3 1/3] powerpc/powernv: Add OPAL API interface to get secureboot state
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
Re: [PATCH] tpm: Fix null pointer dereference on chip register error path
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH v5 0/2] fTPM: firmware TPM running in TEE
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH v5 1/2] fTPM: firmware TPM running in TEE
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH v5 2/2] fTPM: add documentation for ftpm driver
From
: Sasha Levin <sashal@xxxxxxxxxx>
Re: [PATCH 1/8] tpm: block messages while suspended
From
: Stephen Boyd <swboyd@xxxxxxxxxxxx>
Re: [PATCH 1/8] tpm: block messages while suspended
From
: Stephen Boyd <swboyd@xxxxxxxxxxxx>
[PATCH v4 14/14] ima: add Documentation/security/IMA-digest-lists.txt
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v4 13/14] ima: introduce new policies initrd and appraise_initrd
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v4 12/14] ima: add support for appraisal with digest lists
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v4 11/14] ima: add support for measurement with digest lists
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v4 10/14] ima: load parser digests and execute the parser at boot time
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v4 09/14] ima: introduce new securityfs files
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v4 08/14] ima: prevent usage of digest lists that are not measured/appraised
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v4 07/14] ima: restrict upload of converted digest lists
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v4 06/14] ima: add parser of compact digest list
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v4 05/14] ima: use ima_show_htable_value to show violations and hash table data
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v4 04/14] ima: generalize policy file operations
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v4 03/14] ima: generalize ima_write_policy() and raise uploaded data size limit
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v4 02/14] ima: generalize ima_read_policy()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v4 01/14] ima: read hash algorithm from security.ima even if appraisal is not enabled
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v4 00/14] ima: introduce IMA Digest Lists extension
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH V8 2/3] Define a new ima template field buf
From
: prakhar srivastava <prsriva02@xxxxxxxxx>
Re: [PATCH V8 1/3] Define a new IMA hook to measure the boot command line arguments
From
: prakhar srivastava <prsriva02@xxxxxxxxx>
Re: [PATCH V8 0/3] Add support for measuring the boot command line during kexec_file_load
From
: prakhar srivastava <prsriva02@xxxxxxxxx>
Re: [RFC 6/7] doc: keys: Document usage of TEE based Trusted Keys
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH 7/8] tpm: add sysfs attributes for tpm2
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH 1/8] tpm: block messages while suspended
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH 3/8] tpm_tis_spi: add max xfer size
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH 2/8] tpm_tis_core: add optional max xfer size check
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v4 4/4] ima: Add overlay test + doc
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH v4 4/4] ima: Add overlay test + doc
From
: Ignaz Forster <iforster@xxxxxxx>
Re: [PATCH v4 4/4] ima: Add overlay test + doc
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH V8 2/3] Define a new ima template field buf
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 2/2] powerpc: expose secure variables via sysfs
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
Re: [PATCH V8 2/3] Define a new ima template field buf
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v4 1/2] fTPM: firmware TPM running in TEE
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH v4 1/2] fTPM: firmware TPM running in TEE
From
: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
Re: [RFC 0/7] Introduce TEE based Trusted Keys support
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [RFC 2/7] tee: enable support to register kernel memory
From
: Jens Wiklander <jens.wiklander@xxxxxxxxxx>
Re: [RFC 1/7] tee: optee: allow kernel pages to register as shm
From
: Jens Wiklander <jens.wiklander@xxxxxxxxxx>
Re: [PATCH 2/2] powerpc: expose secure variables via sysfs
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [RFC 0/7] Introduce TEE based Trusted Keys support
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [RFC 4/7] KEYS: trusted: Introduce TEE based Trusted Keys
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [RFC 6/7] doc: keys: Document usage of TEE based Trusted Keys
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [RFC 2/7] tee: enable support to register kernel memory
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [RFC 1/7] tee: optee: allow kernel pages to register as shm
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH v4 0/5] ima-avm-utils: Convert sign v2 from RSA to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v4 4/5] ima-evm-utils: Convert sign v2 from RSA to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v4 5/5] ima-avm-utils: Remove RSA_ASN1_templates
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v4 3/5] ima-avm-utils: Change read_priv_key to use EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v4 2/5] ima-avm-utils: Change read_pub_key to use EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v4 1/5] ima-avm-utils: Make sure sig buffer is always MAX_SIGNATURE_SIZE
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v4 0/5] ima-avm-utils: Convert sign v2 from RSA to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [RFC 0/7] Introduce TEE based Trusted Keys support
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 8/8] tpm: add legacy sysfs attributes for tpm2
From
: Jason Gunthorpe <jgg@xxxxxxxx>
Re: [PATCH 7/8] tpm: add sysfs attributes for tpm2
From
: Jason Gunthorpe <jgg@xxxxxxxx>
Re: [PATCH 1/8] tpm: block messages while suspended
From
: Jason Gunthorpe <jgg@xxxxxxxx>
[PATCH 2/2] powerpc: expose secure variables via sysfs
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH 1/2] powerpc/powernv: add OPAL APIs for secure variables
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH 0/2] powerpc/powernv: expose secure variables to userspace
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
Re: [PATCH V8 0/3] Add support for measuring the boot command line during kexec_file_load
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH V8 3/3] Call ima_kexec_cmdline to measure the cmdline args
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH V8 3/3] Call ima_kexec_cmdline to measure the cmdline args
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH V8 2/3] Define a new ima template field buf
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH V8 1/3] Define a new IMA hook to measure the boot command line arguments
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH V8 3/3] Call ima_kexec_cmdline to measure the cmdline args
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH V8 2/3] Define a new ima template field buf
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH V8 1/3] Define a new IMA hook to measure the boot command line arguments
From
: James Morris <jmorris@xxxxxxxxx>
[PATCH 1/8] tpm: block messages while suspended
From
: Stephen Boyd <swboyd@xxxxxxxxxxxx>
[PATCH 2/8] tpm_tis_core: add optional max xfer size check
From
: Stephen Boyd <swboyd@xxxxxxxxxxxx>
[PATCH 4/8] dt-bindings: tpm: document properties for cr50
From
: Stephen Boyd <swboyd@xxxxxxxxxxxx>
[PATCH 5/8] tpm: add driver for cr50 on SPI
From
: Stephen Boyd <swboyd@xxxxxxxxxxxx>
[PATCH 7/8] tpm: add sysfs attributes for tpm2
From
: Stephen Boyd <swboyd@xxxxxxxxxxxx>
[PATCH 6/8] tpm: Add driver for cr50 on I2C
From
: Stephen Boyd <swboyd@xxxxxxxxxxxx>
[PATCH 8/8] tpm: add legacy sysfs attributes for tpm2
From
: Stephen Boyd <swboyd@xxxxxxxxxxxx>
[PATCH 3/8] tpm_tis_spi: add max xfer size
From
: Stephen Boyd <swboyd@xxxxxxxxxxxx>
[PATCH 0/8] tpm: Add driver for cr50
From
: Stephen Boyd <swboyd@xxxxxxxxxxxx>
[PATCH V8 0/3] Add support for measuring the boot command line during kexec_file_load
From
: Prakhar Srivastava <prsriva02@xxxxxxxxx>
Re: [PATCH v4 1/2] fTPM: firmware TPM running in TEE
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH V8 1/3] Define a new IMA hook to measure the boot command line arguments
From
: Prakhar Srivastava <prsriva02@xxxxxxxxx>
[PATCH V8 2/3] Define a new ima template field buf
From
: Prakhar Srivastava <prsriva02@xxxxxxxxx>
[PATCH V8 3/3] Call ima_kexec_cmdline to measure the cmdline args
From
: Prakhar Srivastava <prsriva02@xxxxxxxxx>
Re: [PATCH V8 3/3] Call ima_kexec_cmdline to measure the cmdline args
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 1/3] powerpc/powernv: Add OPAL API interface to get secureboot state
From
: Daniel Axtens <dja@xxxxxxxxxx>
Re: [PATCH v4 4/4] ima: Add overlay test + doc
From
: Ignaz Forster <iforster@xxxxxxx>
[RFC PATCH v4 1/1] Add dm verity root hash pkcs7 sig validation.
From
: Jaskaran Khurana <jaskarankhurana@xxxxxxxxxxxxxxxxxxx>
[RFC PATCH v4 0/1] Add dm verity root hash pkcs7 sig validation.
From
: Jaskaran Khurana <jaskarankhurana@xxxxxxxxxxxxxxxxxxx>
[RFC PATCH v4 0/1] Add dm verity root hash pkcs7 sig validation.
From
: Jaskaran Khurana <jaskarankhurana@xxxxxxxxxxxxxxxxxxx>
[RFC PATCH v4 1/1] Add dm verity root hash pkcs7 sig validation.
From
: Jaskaran Khurana <jaskarankhurana@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 0/2] ima/evm fixes for v5.2
From
: Janne Karhunen <janne.karhunen@xxxxxxxxx>
Re: [PATCH v4 3/4] ima/ima_measurements.sh: Require builtin IMA tcb policy
From
: Ignaz Forster <iforster@xxxxxxx>
Re: [PATCH v3 0/2] ima/evm fixes for v5.2
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [RFC 0/7] Introduce TEE based Trusted Keys support
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH v3 0/2] ima/evm fixes for v5.2
From
: Janne Karhunen <janne.karhunen@xxxxxxxxx>
Re: [PATCH v3 0/2] ima/evm fixes for v5.2
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v3 0/2] ima/evm fixes for v5.2
From
: Janne Karhunen <janne.karhunen@xxxxxxxxx>
Re: [PATCH V8 3/3] Call ima_kexec_cmdline to measure the cmdline args
From
: Dave Young <dyoung@xxxxxxxxxx>
[PATCH v4 2/4] shell: Add $TST_DEVICE as default parameter to tst_umount
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH v4 4/4] ima: Add overlay test + doc
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH v4 3/4] ima/ima_measurements.sh: Require builtin IMA tcb policy
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH v4 1/4] ima: Call test's cleanup inside ima_setup.sh cleanup
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH v4 0/4] LTP reproducer on broken IMA on overlayfs
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH v3 3/4] ima/ima_measurements.sh: Require builtin IMA tcb policy
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH v3 0/2] ima/evm fixes for v5.2
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH -next] ima: Make arch_policy_entry static
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[RFC 0/7] Introduce TEE based Trusted Keys support
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
[RFC 1/7] tee: optee: allow kernel pages to register as shm
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
[RFC 2/7] tee: enable support to register kernel memory
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
[RFC 3/7] tee: add private login method for kernel clients
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
[RFC 4/7] KEYS: trusted: Introduce TEE based Trusted Keys
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
[RFC 5/7] KEYS: encrypted: Allow TEE based trusted master keys
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [RFC 6/7] doc: keys: Document usage of TEE based Trusted Keys
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[RFC 6/7] doc: keys: Document usage of TEE based Trusted Keys
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
[RFC 7/7] MAINTAINERS: Add entry for TEE based Trusted Keys
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [RFC 4/7] KEYS: trusted: Introduce TEE based Trusted Keys
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
From
: Doug Anderson <dianders@xxxxxxxxxxxx>
Re: [RFC 2/7] tee: enable support to register kernel memory
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [RFC 1/7] tee: optee: allow kernel pages to register as shm
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [RFC 1/7] tee: optee: allow kernel pages to register as shm
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [RFC 1/7] tee: optee: allow kernel pages to register as shm
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH V2 1/2] Abstract out support for locating an EFI config table
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH V2 2/2] tpm: Don't duplicate events from the final event log in the TCG2 log
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH V2 2/2] tpm: Don't duplicate events from the final event log in the TCG2 log
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH V2 2/2] tpm: Don't duplicate events from the final event log in the TCG2 log
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [PATCH] tpm: Fix null pointer dereference on chip register error path
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH v2 1/2] LSM: switch to blocking policy update notifiers
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH V2 1/2] Abstract out support for locating an EFI config table
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH 0/2] [IMA] Measure public keys of BuiltIn Trusted Keys
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 0/2] [IMA] Measure public keys of BuiltIn Trusted Keys
From
: Jordan Hand <jorhand@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 0/2] ima/evm fixes for v5.2
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH 1/2] vfs: replace i_readcount with a biased i_count
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 1/2] vfs: replace i_readcount with a biased i_count
From
: Amir Goldstein <amir73il@xxxxxxxxx>
Re: [PATCH 1/2] vfs: replace i_readcount with a biased i_count
From
: "J . Bruce Fields" <bfields@xxxxxxxxxxxx>
Re: [PATCH v2 1/2] LSM: switch to blocking policy update notifiers
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH 1/2] vfs: replace i_readcount with a biased i_count
From
: Amir Goldstein <amir73il@xxxxxxxxx>
Re: [PATCH v3 3/4] ima/ima_measurements.sh: Require builtin IMA tcb policy
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3] ima-evm-utils: Convert sign v2 from RSA to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v3] ima-evm-utils: Convert sign v2 from RSA to EVP_PKEY API
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 0/2] ima/evm fixes for v5.2
From
: Janne Karhunen <janne.karhunen@xxxxxxxxx>
Re: [PATCH v2 1/2] LSM: switch to blocking policy update notifiers
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 1/2] ima: use the lsm policy update notifier
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 0/2] ima/evm fixes for v5.2
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH 1/2] vfs: replace i_readcount with a biased i_count
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 0/2] ima/evm fixes for v5.2
From
: Janne Karhunen <janne.karhunen@xxxxxxxxx>
[PATCH] tpm: Fix null pointer dereference on chip register error path
From
: Milan Broz <gmazyland@xxxxxxxxx>
[PATCH v2 1/2] ima: use the lsm policy update notifier
From
: Janne Karhunen <janne.karhunen@xxxxxxxxx>
[PATCH v2 1/2] LSM: switch to blocking policy update notifiers
From
: Janne Karhunen <janne.karhunen@xxxxxxxxx>
Re: [PATCH v3 1/3] powerpc/powernv: Add OPAL API interface to get secureboot state
From
: Daniel Axtens <dja@xxxxxxxxxx>
[PATCH v3 4/4] ima: Add overlay test + doc
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH v3 3/4] ima/ima_measurements.sh: Require builtin IMA tcb policy
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH v3 2/4] shell: Add $TST_DEVICE as default parameter to tst_umount
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH v3 1/4] ima: Call test's cleanup inside ima_setup.sh cleanup
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH v3 0/4] LTP reproducer on broken IMA on overlayfs
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH v7 0/3] add new ima hook ima_kexec_cmdline to measure kexec boot cmdline args
From
: prakhar srivastava <prsriva02@xxxxxxxxx>
Re: [PATCH 0/2] [IMA] Measure public keys of BuiltIn Trusted Keys
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 3/3] powerpc: Add support to initialize ima policy rules
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
[PATCH v4 3/3] powerpc: Add support to initialize ima policy rules
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v4 2/3] powerpc/powernv: detect the secure boot mode of the system
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v4 1/3] powerpc/powernv: Add OPAL API interface to get secureboot state
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v4 0/3] powerpc: Enabling IMA arch specific secure boot policies
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
Re: [PATCH v7 0/3] add new ima hook ima_kexec_cmdline to measure kexec boot cmdline args
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH -next] ima: Make arch_policy_entry static
From
: YueHaibing <yuehaibing@xxxxxxxxxx>
Re: [PATCH 0/2] [IMA] Measure public keys of BuiltIn Trusted Keys
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v11 11/13] ima: Define ima-modsig template
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v11 13/13] ima: Allow template= option for appraise rules as well
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v11 12/13] ima: Store the measurement again when appraising a modsig
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v11 05/13] integrity: Select CONFIG_KEYS instead of depending on it
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v11 09/13] ima: Implement support for module-style appended signatures
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v11 10/13] ima: Collect modsig
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v11 08/13] ima: Factor xattr_verify() out of ima_appraise_measurement()
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v11 07/13] ima: Add modsig appraise_type option for module-style appended signatures
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v11 06/13] ima: Use designated initializers for struct ima_event_data
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v11 04/13] integrity: Introduce struct evm_xattr
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v11 03/13] PKCS#7: Introduce pkcs7_get_digest()
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v11 02/13] PKCS#7: Refactor verify_pkcs7_signature()
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v11 01/13] MODSIGN: Export module signature definitions
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v11 00/13] Appended signatures support for IMA appraisal
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
Re: [RFC PATCH v3 1/1] Add dm verity root hash pkcs7 sig validation
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH v3 3/3] powerpc: Add support to initialize ima policy rules
From
: Satheesh Rajendran <sathnaga@xxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH v3 1/1] Add dm verity root hash pkcs7 sig validation
From
: Jaskaran Singh Khurana <jaskarankhurana@xxxxxxxxxxxxxxxxxxx>
[PATCH] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
From
: Douglas Anderson <dianders@xxxxxxxxxxxx>
Re: [RFC PATCH v3 1/1] Add dm verity root hash pkcs7 sig validation
From
: Jaskaran Singh Khurana <jaskarankhurana@xxxxxxxxxxxxxxxxxxx>
[PATCH v3 3/3] powerpc: Add support to initialize ima policy rules
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v3 2/3] powerpc/powernv: detect the secure boot mode of the system
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v3 1/3] powerpc/powernv: Add OPAL API interface to get secureboot state
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v3 0/3] powerpc: Enabling IMA arch specific secure boot policies
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
Re: [PATCH V2 1/2] Abstract out support for locating an EFI config table
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: [PATCH 0/2] [IMA] Measure public keys of BuiltIn Trusted Keys
From
: Lakshmi <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH V2 1/2] Abstract out support for locating an EFI config table
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH 0/2] [IMA] Measure public keys of BuiltIn Trusted Keys
From
: Jordan Hand <jorhand@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] efi: Fix TPM code build failure on ARM
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH 1/2] vfs: replace i_readcount with a biased i_count
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [PATCH 1/2] LSM: switch to blocking policy update notifiers
From
: Janne Karhunen <janne.karhunen@xxxxxxxxx>
[PATCH 2/2] locks: eliminate false positive conflicts for write lease
From
: Amir Goldstein <amir73il@xxxxxxxxx>
[PATCH 1/2] vfs: replace i_readcount with a biased i_count
From
: Amir Goldstein <amir73il@xxxxxxxxx>
[PATCH 0/2] Fix write leases on overlayfs
From
: Amir Goldstein <amir73il@xxxxxxxxx>
Re: [RFC PATCH v3 1/1] Add dm verity root hash pkcs7 sig validation
From
: Milan Broz <gmazyland@xxxxxxxxx>
Re: [RFC PATCH v3 0/1] Add dm verity root hash pkcs7 sig validation.
From
: Milan Broz <gmazyland@xxxxxxxxx>
[RFC PATCH v3 1/1] Add dm verity root hash pkcs7 sig validation
From
: Jaskaran Khurana <jaskarankhurana@xxxxxxxxxxxxxxxxxxx>
[RFC PATCH v3 0/1] Add dm verity root hash pkcs7 sig validation.
From
: Jaskaran Khurana <jaskarankhurana@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/2] LSM: switch to blocking policy update notifiers
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH V2 2/2] tpm: Don't duplicate events from the final event log in the TCG2 log
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [PATCH V2 1/2] Abstract out support for locating an EFI config table
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH V2 2/2] tpm: Don't duplicate events from the final event log in the TCG2 log
From
: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
[PATCH V2 1/2] Abstract out support for locating an EFI config table
From
: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
[PATCH] x86/ima: fix the Kconfig dependency for IMA_ARCH_POLICY
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v3 11/20] docs: security: trusted-encrypted.rst: fix code-block tag
From
: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
Re: [PATCH 0/2] [IMA] Measure public keys of BuiltIn Trusted Keys
From
: Lakshmi <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 2/2] ima: add enforce-evm and log-evm modes to strictly check EVM status
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 2/2] ima: add enforce-evm and log-evm modes to strictly check EVM status
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v3 2/2] ima: add enforce-evm and log-evm modes to strictly check EVM status
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 2/2] ima: add enforce-evm and log-evm modes to strictly check EVM status
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v3 2/2] ima: add enforce-evm and log-evm modes to strictly check EVM status
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 0/2] [IMA] Measure public keys of BuiltIn Trusted Keys
From
: Ken Goldman <kgold@xxxxxxxxxxxxx>
Re: [PATCH V4] IMA: Allow profiles to define the desired IMA template
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] efi: Fix TPM code build failure on ARM
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [PATCH V2] tpm: Don't duplicate events from the final event log in the TCG2 log
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [PATCH V4] IMA: Allow profiles to define the desired IMA template
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH 1/2] LSM: switch to blocking policy update notifiers
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH 1/2] LSM: switch to blocking policy update notifiers
From
: James Morris <jmorris@xxxxxxxxx>
[PATCH v7 3/3] call ima_kexec_cmdline to measure the cmdline args
From
: Prakhar Srivastava <prsriva02@xxxxxxxxx>
[PATCH v7 2/3] add a new ima template field buf
From
: Prakhar Srivastava <prsriva02@xxxxxxxxx>
[PATCH v7 1/3] Add a new ima hook ima_kexec_cmdline to measure cmdline args
From
: Prakhar Srivastava <prsriva02@xxxxxxxxx>
[PATCH v7 0/3] add new ima hook ima_kexec_cmdline to measure kexec boot cmdline args
From
: Prakhar Srivastava <prsriva02@xxxxxxxxx>
Re: [PATCH V4] IMA: Allow profiles to define the desired IMA template
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 2/2] ima: use the lsm policy update notifier
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 2/2] ima: use the lsm policy update notifier
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v4 00/16] fs-verity: read-only file-based authenticity protection
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v4 00/16] fs-verity: read-only file-based authenticity protection
From
: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 0/2] [IMA] Measure public keys of BuiltIn Trusted Keys
From
: Lakshmi <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] efi: Fix TPM code build failure on ARM
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
[PATCH v4 03/16] fs-verity: add UAPI header
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v4 02/16] fs-verity: add MAINTAINERS file entry
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v4 04/16] fs: uapi: define verity bit for FS_IOC_GETFLAGS
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v4 01/16] fs-verity: add a documentation file
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v4 08/16] fs-verity: add the hook for file ->setattr()
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v4 05/16] fs-verity: add Kconfig and the helper functions for hashing
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v4 12/16] fs-verity: add SHA-512 support
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v4 10/16] fs-verity: implement FS_IOC_ENABLE_VERITY ioctl
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v4 11/16] fs-verity: implement FS_IOC_MEASURE_VERITY ioctl
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v4 16/16] f2fs: add fs-verity support
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v4 14/16] ext4: add basic fs-verity support
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v4 13/16] fs-verity: support builtin file signatures
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v4 15/16] ext4: add fs-verity read support
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v4 09/16] fs-verity: add data verification hooks for ->readpages()
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v4 07/16] fs-verity: add the hook for file ->open()
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v4 06/16] fs-verity: add inode and superblock fields
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v4 00/16] fs-verity: read-only file-based authenticity protection
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH V2] tpm: Don't duplicate events from the final event log in the TCG2 log
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v3 0/2] ima/evm fixes for v5.2
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: evmctl and Hardware Security Module
From
: Martin Townsend <mtownsend1973@xxxxxxxxx>
Re: [PATCH v3 0/2] ima/evm fixes for v5.2
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 0/2] [IMA] Measure public keys of BuiltIn Trusted Keys
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 0/2] ima/evm fixes for v5.2
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH] efi: Fix TPM code build failure on ARM
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH v3 2/2] ima: add enforce-evm and log-evm modes to strictly check EVM status
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v3 1/2] evm: add option to set a random HMAC key at early boot
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v3 0/2] ima/evm fixes for v5.2
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH V4] IMA: Allow profiles to define the desired IMA template
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH V4] IMA: Allow profiles to define the desired IMA template
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH 2/2] [IMA] Measure public keys of BuiltIn Trusted Keys
From
: Lakshmi <nramas@xxxxxxxxxxxxxxxxxxx>
[PATCH 1/2] [IMA] Measure public keys of BuiltIn Trusted Keys - Query public key of given key
From
: Lakshmi <nramas@xxxxxxxxxxxxxxxxxxx>
[PATCH 0/2] [IMA] Measure public keys of BuiltIn Trusted Keys
From
: Lakshmi <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/2] LSM: switch to blocking policy update notifiers
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH 1/2] LSM: switch to blocking policy update notifiers
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH V4] IMA: Allow profiles to define the desired IMA template
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH V4] IMA: Allow profiles to define the desired IMA template
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
[PATCH] efi: Fix TPM code build failure on ARM
From
: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
[PATCH V2] tpm: Don't duplicate events from the final event log in the TCG2 log
From
: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
Re: [PATCH 0/1] Fix crash in __calc_tpm2_event_size
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v4 1/2] fTPM: firmware TPM running in TEE
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH 1/2] LSM: switch to blocking policy update notifiers
From
: Janne Karhunen <janne.karhunen@xxxxxxxxx>
Re: [PATCH] tpm: Don't duplicate events from the final event log in the TCG2 log
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH 2/2] ima: use the lsm policy update notifier
From
: Janne Karhunen <janne.karhunen@xxxxxxxxx>
[PATCH 1/2] LSM: switch to blocking policy update notifiers
From
: Janne Karhunen <janne.karhunen@xxxxxxxxx>
Re: [PATCH v4 1/2] fTPM: firmware TPM running in TEE
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH 1/2] LSM: switch to blocking policy update notifiers
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH v4 0/2] fTPM: firmware TPM running in TEE
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH 1/2] LSM: switch to blocking policy update notifiers
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH 1/1] tpm: Don't dereference event after it's unmapped in __calc_tpm2_event_size
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH V4] IMA: Allow profiles to define the desired IMA template
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH 1/1] tpm: Don't dereference event after it's unmapped in __calc_tpm2_event_size
From
: Chris Coulson <chris.coulson@xxxxxxxxxxxxx>
[PATCH 0/1] Fix crash in __calc_tpm2_event_size
From
: Chris Coulson <chris.coulson@xxxxxxxxxxxxx>
[PATCH V4] IMA: Allow profiles to define the desired IMA template
From
: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
Re: [PATCH V3] IMA: Allow profiles to define the desired IMA template
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v4 1/2] fTPM: firmware TPM running in TEE
From
: Sasha Levin <sashal@xxxxxxxxxx>
Re: [PATCH V3] IMA: Allow profiles to define the desired IMA template
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
[PATCH] tpm: Don't duplicate events from the final event log in the TCG2 log
From
: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
evmctl and Hardware Security Module
From
: Martin Townsend <mtownsend1973@xxxxxxxxx>
Re: [PATCH V3] IMA: Allow profiles to define the desired IMA template
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH V3] IMA: Allow profiles to define the desired IMA template
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH V3] IMA: Allow profiles to define the desired IMA template
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH V3] IMA: Allow profiles to define the desired IMA template
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH V3] IMA: Allow profiles to define the desired IMA template
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v2 14/22] docs: security: trusted-encrypted.rst: fix code-block tag
From
: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
Re: [PATCH V3] IMA: Allow profiles to define the desired IMA template
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH V3] IMA: Allow profiles to define the desired IMA template
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 2/3] ima: don't ignore INTEGRITY_UNKNOWN EVM status
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v4 1/2] fTPM: firmware TPM running in TEE
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH V3] IMA: Allow profiles to define the desired IMA template
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v4 0/2] fTPM: firmware TPM running in TEE
From
: Sasha Levin <sashal@xxxxxxxxxx>
Re: [PATCH 18/22] docs: security: trusted-encrypted.rst: fix code-block tag
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v4 0/2] fTPM: firmware TPM running in TEE
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH V3] IMA: Allow profiles to define the desired IMA template
From
: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
Re: [PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
From
: Rob Landley <rob@xxxxxxxxxxx>
Re: possible deadlock in process_measurement
From
: syzbot <syzbot+5ab61747675a87ea359d@xxxxxxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/2] LSM: switch to blocking policy update notifiers
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH v2 2/3] ima: don't ignore INTEGRITY_UNKNOWN EVM status
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v2 2/3] ima: don't ignore INTEGRITY_UNKNOWN EVM status
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 2/3] ima: don't ignore INTEGRITY_UNKNOWN EVM status
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v2 2/3] ima: don't ignore INTEGRITY_UNKNOWN EVM status
From
: Chuck Lever <chuck.lever@xxxxxxxxxx>
Re: [PATCH v2 2/3] ima: don't ignore INTEGRITY_UNKNOWN EVM status
From
: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2 2/3] ima: don't ignore INTEGRITY_UNKNOWN EVM status
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v2 2/3] ima: don't ignore INTEGRITY_UNKNOWN EVM status
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH 2/2] ima: use the lsm policy update notifier
From
: Janne Karhunen <janne.karhunen@xxxxxxxxx>
[PATCH] Add support to carry ima buffer to in kexec_file_load for amr64
From
: Prakhar Srivastava <prsriva02@xxxxxxxxx>
Re: [PATCH 2/2] ima: use the lsm policy update notifier
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [GIT PULL] integrity subsystem fixes for v5.2
From
: pr-tracker-bot@xxxxxxxxxx
Re: [PATCH V7 0/4] Add support for crypto agile logs
From
: Joe Richey <joerichey@xxxxxxxxxx>
[GIT PULL] integrity subsystem fixes for v5.2
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH 2/2] ima: use the lsm policy update notifier
From
: Janne Karhunen <janne.karhunen@xxxxxxxxx>
[PATCH 1/2] LSM: switch to blocking policy update notifiers
From
: Janne Karhunen <janne.karhunen@xxxxxxxxx>
Re: sleep in selinux_audit_rule_init
From
: Janne Karhunen <janne.karhunen@xxxxxxxxx>
Re: [PATCH V7 2/4] tpm: Reserve the TPM final events table
From
: Joe Richey <joerichey@xxxxxxxxxx>
Re: CAP_SYS_ADMIN requirement for updating IMA metadata
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 18/22] docs: security: trusted-encrypted.rst: fix code-block tag
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH v3 00/15] fs-verity: read-only file-based authenticity protection
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: CAP_SYS_ADMIN requirement for updating IMA metadata
From
: Chuck Lever <chuck.lever@xxxxxxxxxx>
[PATCH v4 2/2] fTPM: add documentation for ftpm driver
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH v4 1/2] fTPM: firmware TPM running in TEE
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH v4 0/2] fTPM: firmware TPM running in TEE
From
: Sasha Levin <sashal@xxxxxxxxxx>
Re: sleep in selinux_audit_rule_init
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: sleep in selinux_audit_rule_init
From
: Janne Karhunen <janne.karhunen@xxxxxxxxx>
Re: sleep in selinux_audit_rule_init
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: sleep in selinux_audit_rule_init
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: [PATCH v2 2/3] ima: don't ignore INTEGRITY_UNKNOWN EVM status
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 3/3] ima: show rules with IMA_INMASK correctly
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 1/3] evm: check hash algorithm passed to init_desc()
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: sleep in selinux_audit_rule_init
From
: Janne Karhunen <janne.karhunen@xxxxxxxxx>
[PATCH 18/22] docs: security: trusted-encrypted.rst: fix code-block tag
From
: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
[PATCH 00/22] Some documentation fixes
From
: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
[PATCH] ima: use struct_size() in kzalloc()
From
: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
Re: [PATCH v3] tpm: Actually fail on TPM errors during "get random"
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH v2 3/3] ima: show rules with IMA_INMASK correctly
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v2 2/3] ima: don't ignore INTEGRITY_UNKNOWN EVM status
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v2 1/3] evm: check hash algorithm passed to init_desc()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v2 0/3] ima/evm fixes for v5.2
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v3] ima-evm-utils: Convert sign v2 from RSA to EVP_PKEY API
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3] ima-evm-utils: Convert sign v2 from RSA to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v10 09/12] ima: Implement support for module-style appended signatures
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH V2] IMA: Allow profiles to define the desired IMA template
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: [PATCH v10 09/12] ima: Implement support for module-style appended signatures
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
Re: [PATCH v10 09/12] ima: Implement support for module-style appended signatures
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
Re: [PATCH v10 12/12] ima: Store the measurement again when appraising a modsig
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
Re: [PATCH v10 11/12] ima: Define ima-modsig template
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
Re: [PATCH v10 01/12] MODSIGN: Export module signature definitions
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
Re: [PATCH v3] tpm: Actually fail on TPM errors during "get random"
From
: Laura Abbott <labbott@xxxxxxxxxx>
Re: [PATCH v3] ima-evm-utils: Convert sign v2 from RSA to EVP_PKEY API
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH V2] IMA: Allow profiles to define the desired IMA template
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v10 12/12] ima: Store the measurement again when appraising a modsig
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH 3/3][V2] lib: re-introduce new match_string() helper/macro
From
: Alexandru Ardelean <alexandru.ardelean@xxxxxxxxxx>
[PATCH 2/3][V2] treewide: rename match_string() -> __match_string()
From
: Alexandru Ardelean <alexandru.ardelean@xxxxxxxxxx>
[PATCH 1/3][V2] lib: fix match_string() helper on -1 array size
From
: Alexandru Ardelean <alexandru.ardelean@xxxxxxxxxx>
Re: [PATCH V7 0/4] Add support for crypto agile logs
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH V7 0/4] Add support for crypto agile logs
From
: James Morris <jmorris@xxxxxxxxx>
Re: Re:
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: Re:
From
: prakhar srivastava <prsriva02@xxxxxxxxx>
Re: Re:
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re:
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re:
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v6 2/3] add a new ima template field buf
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v6 1/3] Add a new ima hook ima_kexec_cmdline to measure cmdline args
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH V2] IMA: Allow profiles to define the desired IMA template
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH V7 0/4] Add support for crypto agile logs
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH V2] IMA: Allow profiles to define the desired IMA template
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH V2] IMA: Allow profiles to define the desired IMA template
From
: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
Re: [PATCH] IMA: Allow profiles to define the desired IMA template
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: IMA signature generated by evmctl has unexpected key identifier
From
: Lakshmi <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH V7 0/4] Add support for crypto agile logs
From
: James Morris <jmorris@xxxxxxxxx>
[PATCH v3 00/15] fs-verity: read-only file-based authenticity protection
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v3 04/15] fs-verity: add Kconfig and the helper functions for hashing
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v3 07/15] fs-verity: add the hook for file ->setattr()
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v3 06/15] fs-verity: add the hook for file ->open()
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v3 08/15] fs-verity: add data verification hooks for ->readpages()
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v3 09/15] fs-verity: implement FS_IOC_ENABLE_VERITY ioctl
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v3 11/15] fs-verity: add SHA-512 support
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v3 10/15] fs-verity: implement FS_IOC_MEASURE_VERITY ioctl
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v3 12/15] fs-verity: support builtin file signatures
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v3 15/15] f2fs: add fs-verity support
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v3 14/15] ext4: add fs-verity read support
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v3 13/15] ext4: add basic fs-verity support
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v3 05/15] fs-verity: add inode and superblock fields
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v3 03/15] fs-verity: add UAPI header
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v3 01/15] fs-verity: add a documentation file
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v3 02/15] fs-verity: add MAINTAINERS file entry
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH V7 0/4] Add support for crypto agile logs
From
: Bartosz Szczepanek <bsz@xxxxxxxxxxxx>
Re: [PATCH 1/4] ima-evm-utils: link to libcrypto instead of OpenSSL
From
: Dmitry Eremin-Solenikov <dbaryshkov@xxxxxxxxx>
Re: [PATCH 1/4] ima-evm-utils: link to libcrypto instead of OpenSSL
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[USER][PATCH] cpio: add option to add file metadata in copy-out mode
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: IMA signature generated by evmctl has unexpected key identifier
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: CAP_SYS_ADMIN requirement for updating IMA metadata
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH 4/4] ima-evm-utils: update .gitignore files
From
: Dmitry Eremin-Solenikov <dbaryshkov@xxxxxxxxx>
[PATCH 2/4] ima-evm-utils: replace INCLUDES with AM_CPPFLAGS
From
: Dmitry Eremin-Solenikov <dbaryshkov@xxxxxxxxx>
[PATCH 1/4] ima-evm-utils: link to libcrypto instead of OpenSSL
From
: Dmitry Eremin-Solenikov <dbaryshkov@xxxxxxxxx>
[PATCH 3/4] ima-evm-utils: include hash-info.gen into distribution
From
: Dmitry Eremin-Solenikov <dbaryshkov@xxxxxxxxx>
Re: [PATCH V7 0/4] Add support for crypto agile logs
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH v4 3/3] gen_init_cpio: add support for file metadata
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v4 2/3] initramfs: read metadata from special file METADATA!!!
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v4 1/3] initramfs: add file metadata
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH V7 0/4] Add support for crypto agile logs
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: IMA signature generated by evmctl has unexpected key identifier
From
: Lakshmi <nramas@xxxxxxxxxxxxxxxxxxx>
[PATCH] IMA: Allow profiles to define the desired IMA template
From
: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
Re: [PATCH v3 2/2] initramfs: introduce do_readxattrs()
From
: Taras Kondratiuk <takondra@xxxxxxxxx>
Re: [PATCH v3 2/2] initramfs: introduce do_readxattrs()
From
: Rob Landley <rob@xxxxxxxxxxx>
Re: [PATCH 0/2] public key: IMA signer logging: Log public key of IMA Signature signer in IMA log
From
: Lakshmi <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 0/2] public key: IMA signer logging: Log public key of IMA Signature signer in IMA log
From
: Ken Goldman <kgold@xxxxxxxxxxxxx>
[PATCH V4 5/5] IMA: Add a ima-vfs-sig measurement template
From
: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
[PATCH V4 4/5] FUSE: Allow filesystems to provide gethash methods
From
: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
[PATCH V4 3/5] IMA: Optionally make use of filesystem-provided hashes
From
: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
[PATCH V4 2/5] IMA: Allow rule matching on filesystem subtype
From
: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
[PATCH V4 1/5] VFS: Add a call to obtain a file's hash
From
: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
[PATCH V4 0/5] Allow FUSE to provide IMA hashes directly
From
: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
Re: [PATCH v3 2/2] initramfs: introduce do_readxattrs()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v3 2/2] initramfs: introduce do_readxattrs()
From
: hpa@xxxxxxxxx
Re: [PATCH v3 2/2] initramfs: introduce do_readxattrs()
From
: hpa@xxxxxxxxx
Re: CAP_SYS_ADMIN requirement for updating IMA metadata
From
: Chuck Lever <chuck.lever@xxxxxxxxxx>
Re: sleep in selinux_audit_rule_init
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: CAP_SYS_ADMIN requirement for updating IMA metadata
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: sleep in selinux_audit_rule_init
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
CAP_SYS_ADMIN requirement for updating IMA metadata
From
: Chuck Lever <chuck.lever@xxxxxxxxxx>
Re: sleep in selinux_audit_rule_init
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: sleep in selinux_audit_rule_init
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: sleep in selinux_audit_rule_init
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: sleep in selinux_audit_rule_init
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
Re: sleep in selinux_audit_rule_init
From
: Janne Karhunen <janne.karhunen@xxxxxxxxx>
Re: sleep in selinux_audit_rule_init
From
: Stephen Smalley <sds@xxxxxxxxxxxxx>
sleep in selinux_audit_rule_init
From
: Janne Karhunen <janne.karhunen@xxxxxxxxx>
Re: IMA signature generated by evmctl has unexpected key identifier
From
: Lakshmi <nramas@xxxxxxxxxxxxxxxxxxx>
Re: IMA signature generated by evmctl has unexpected key identifier
From
: Lakshmi <nramas@xxxxxxxxxxxxxxxxxxx>
Re: IMA signature generated by evmctl has unexpected key identifier
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: IMA signature generated by evmctl has unexpected key identifier
From
: Lakshmi <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 3/4] ima: don't ignore INTEGRITY_UNKNOWN EVM status
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH V7 0/4] Add support for crypto agile logs
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH V7 2/4] tpm: Reserve the TPM final events table
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [PATCH V7 4/4] efi: Attempt to get the TCG2 event log in the boot stub
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [PATCH 4/4] ima: only audit failed appraisal verifications
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH 3/4] ima: don't ignore INTEGRITY_UNKNOWN EVM status
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v6 2/3] add a new ima template field buf
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH V3 6/6] IMA: Allow profiles to define the desired IMA template
From
: prakhar srivastava <prsriva02@xxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]