Linux Integrity
Thread Index
[
Prev Page
][
Next Page
]
Re: [PATCH v2] tpm: tpm_ibm_vtpm: Fix unallocated banks
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
Re: [PATCH] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
From
: Doug Anderson <dianders@xxxxxxxxxxxx>
Re: [PATCH] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
From
: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
From
: Jason Gunthorpe <jgg@xxxxxxxx>
Re: [PATCH] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
From
: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
[PATCH] tpm_crb - workaround broken ACPI tables
From
: "Safford, David (GE Global Research, US)" <david.safford@xxxxxx>
Re: [PATCH] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
From
: Doug Anderson <dianders@xxxxxxxxxxxx>
Re: [PATCH] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
From
: Jason Gunthorpe <jgg@xxxxxxxx>
[PATCH] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
From
: Douglas Anderson <dianders@xxxxxxxxxxxx>
[PATCH v3] tpm: tpm_ibm_vtpm: Fix unallocated banks
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
Re: [PATCH 1/4] ima-evm-utils: link to libcrypto instead of OpenSSL
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH] tpm_crb - workaround broken ACPI tables
From
: Jason Gunthorpe <jgg@xxxxxxxx>
[PATCH] tpm_crb - workaround broken ACPI tables
From
: "Safford, David (GE Global Research, US)" <david.safford@xxxxxx>
Re: possible deadlock in process_measurement
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] tpm_crb - workaround broken ACPI tables
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [GIT PULL] Keys: Set 4 - Key ACLs for 5.3
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [GIT PULL] Keys: Set 4 - Key ACLs for 5.3
From
: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
Re: [GIT PULL] Keys: Set 4 - Key ACLs for 5.3
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [GIT PULL] Keys: Set 4 - Key ACLs for 5.3
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [GIT PULL] Keys: Set 4 - Key ACLs for 5.3
From
: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
Re: [PATCH v7 1/2] fTPM: firmware TPM running in TEE
From
: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
Reminder: 2 open syzbot bugs in "security/integrity" subsystem
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v2] tpm: tpm_ibm_vtpm: Fix unallocated banks
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v2] tpm: tpm_ibm_vtpm: Fix unallocated banks
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] KEYS: trusted: allow module init if TPM is inactive or deactivated
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] KEYS: trusted: allow module init if TPM is inactive or deactivated
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v1 0/5] ima-evm-utils: Assorted fixes and improvements
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH 4/8] dt-bindings: tpm: document properties for cr50
From
: Rob Herring <robh@xxxxxxxxxx>
Re: [RFC 3/7] tee: add private login method for kernel clients
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [RFC 3/7] tee: add private login method for kernel clients
From
: Jens Wiklander <jens.wiklander@xxxxxxxxxx>
Re: [RFC 0/7] Introduce TEE based Trusted Keys support
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [RFC 3/7] tee: add private login method for kernel clients
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [GIT PULL] integrity subsystem updates for v5.3
From
: pr-tracker-bot@xxxxxxxxxx
Re: [GIT PULL] tpmdd updates for Linux v5.3
From
: pr-tracker-bot@xxxxxxxxxx
Re: [GIT PULL] Keys: Set 4 - Key ACLs for 5.3
From
: pr-tracker-bot@xxxxxxxxxx
Re: [PATCH v2] tpm: tpm_ibm_vtpm: Fix unallocated banks
From
: Jason Gunthorpe <jgg@xxxxxxxx>
Re: [PATCH v2] tpm: tpm_ibm_vtpm: Fix unallocated banks
From
: Christoph Hellwig <hch@xxxxxxxxxxxxx>
Re: [PATCH v2] tpm: tpm_ibm_vtpm: Fix unallocated banks
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] tpm: Document UEFI event log quirks
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: [PATCH] KEYS: trusted: allow module init if TPM is inactive or deactivated
From
: James Bottomley <jejb@xxxxxxxxxxxxx>
Re: [PATCH] KEYS: trusted: allow module init if TPM is inactive or deactivated
From
: Tyler Hicks <tyhicks@xxxxxxxxxxxxx>
Re: [RFC 0/7] Introduce TEE based Trusted Keys support
From
: Jens Wiklander <jens.wiklander@xxxxxxxxxx>
Re: [RFC 3/7] tee: add private login method for kernel clients
From
: Jens Wiklander <jens.wiklander@xxxxxxxxxx>
Re: [PATCH] tpm: Document UEFI event log quirks
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] tpm: Document UEFI event log quirks
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v1 0/5] ima-evm-utils: Assorted fixes and improvements
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] tpm: fixes uninitialized allocated banks for IBM vtpm driver
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v2] tpm: tpm_ibm_vtpm: Fix unallocated banks
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH v2] tpm: Remove a deprecated comments about implicit sysfs locking
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH] tpm: Remove a deprecated comments about implicit sysfs locking
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v8 0/9] ima-evm-utils: Convert v2 signatures from RSA to EVP_PKEY API
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2] tpm: Fix null pointer dereference on chip register error path
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v2] tpm: Fix null pointer dereference on chip register error path
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] tpm: Fix null pointer dereference on chip register error path
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH 2/2] ima-evm-utils: support template "buf" field
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH 1/2] ima-evm-utils: limit "remain unprocessed data" messages
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[GIT PULL] integrity subsystem updates for v5.3
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [RFC 0/7] Introduce TEE based Trusted Keys support
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH] tpm: Document UEFI event log quirks
From
: Jordan Hand <jorhand@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v2] tpm: tpm_ibm_vtpm: Fix unallocated banks
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
[PATCH v1 5/5] ima-evm-utils: Fix clang warning about possible unaligned pointer for hdr->keyid
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v1 4/5] ima-evm-utils: Allow multiple files in ima_verify
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v1 3/5] ima-evm-utils: Preload public keys for ima_verify
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v1 2/5] ima-evm-utils: Fix memory leak in init_public_keys
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v1 1/5] ima-evm-utils: Fix EVP_MD_CTX leak in ima_calc_hash
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v1 0/5] ima-evm-utils: Assorted fixes and improvements
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: Can we enforce "IMA Policy" based on file type
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] tpm: Document UEFI event log quirks
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
Re: [PATCH v6 16/17] ext4: update on-disk format documentation for fs-verity
From
: "Theodore Ts'o" <tytso@xxxxxxx>
Re: [PATCH v6 15/17] ext4: add fs-verity read support
From
: "Theodore Ts'o" <tytso@xxxxxxx>
Re: [PATCH v6 14/17] ext4: add basic fs-verity support
From
: "Theodore Ts'o" <tytso@xxxxxxx>
Re: [PATCH v6 13/17] fs-verity: support builtin file signatures
From
: "Theodore Ts'o" <tytso@xxxxxxx>
Re: [PATCH] tpm: fixes uninitialized allocated banks for IBM vtpm driver
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
[PATCH v2] tpm: tpm_ibm_vtpm: Fix unallocated banks
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[GIT PULL] Keys: Set 4 - Key ACLs for 5.3
From
: David Howells <dhowells@xxxxxxxxxx>
Re: [PATCH] tpm: Fix null pointer dereference on chip register error path
From
: Milan Broz <gmazyland@xxxxxxxxx>
[PATCH v8 2/2] fTPM: add documentation for ftpm driver
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH v8 0/2] fTPM: firmware TPM running in TEE
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH v8 1/2] fTPM: firmware TPM running in TEE
From
: Sasha Levin <sashal@xxxxxxxxxx>
Re: [PATCH] tpm: fixes uninitialized allocated banks for IBM vtpm driver
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] tpm: Fix null pointer dereference on chip register error path
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] tpm: fixes uninitialized allocated banks for IBM vtpm driver
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH] KEYS: trusted: allow module init if TPM is inactive or deactivated
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH] tpm: fixes uninitialized allocated banks for IBM vtpm driver
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
Re: [PATCH] Revert "tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()"
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
[RFC/RFT] KEYS: trusted: Add generic trusted keys framework
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH] tpm: fixes uninitialized allocated banks for IBM vtpm driver
From
: Stefan Berger <stefanb@xxxxxxxxxxxxx>
Re: [PATCH v12 01/11] MODSIGN: Export module signature definitions
From
: Philipp Rudo <prudo@xxxxxxxxxxxxx>
Re: [PATCH v2 0/2] char: tpm: add new driver for tpm i2c ptp
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] Revert "tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()"
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v2 0/2] char: tpm: add new driver for tpm i2c ptp
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] Revert "tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()"
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] tpm: fixes uninitialized allocated banks for IBM vtpm driver
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] tpm: fixes uninitialized allocated banks for IBM vtpm driver
From
: Michal Suchánek <msuchanek@xxxxxxx>
Re: [PATCH] tpm: fixes uninitialized allocated banks for IBM vtpm driver
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] tpm: Document UEFI event log quirks
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] tpm: Document UEFI event log quirks
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] tpm: Document UEFI event log quirks
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH 2/2] powerpc: expose secure variables via sysfs
From
: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
RE: [PATCH v7 1/2] fTPM: firmware TPM running in TEE
From
: Thirupathaiah Annapureddy <thiruan@xxxxxxxxxxxxx>
Re: [PATCH] Revert "tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()"
From
: Tyler Hicks <tyhicks@xxxxxxxxxxxxx>
Re: [PATCH v12 01/11] MODSIGN: Export module signature definitions
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
Re: [PATCH v7 1/2] fTPM: firmware TPM running in TEE
From
: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
Re: [PATCH] Revert "tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()"
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] tpm: fixes uninitialized allocated banks for IBM vtpm driver
From
: Michal Suchánek <msuchanek@xxxxxxx>
Re: [PATCH] tpm: fixes uninitialized allocated banks for IBM vtpm driver
From
: Sachin Sant <sachinp@xxxxxxxxxxxxxxxxxx>
Re: Problem with the kernels trusted module on "inactive" TPM
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: Problem with the kernels trusted module on "inactive" TPM
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH] tpm: fixes uninitialized allocated banks for IBM vtpm driver
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] Revert "tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()"
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3] tpm: Get TCG log from TPM2 ACPI table for tpm2 systems
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v2 0/2] char: tpm: add new driver for tpm i2c ptp
From
: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
Re: [PATCH] Revert "tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()"
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v12 01/11] MODSIGN: Export module signature definitions
From
: Philipp Rudo <prudo@xxxxxxxxxxxxx>
Re: Problem with the kernels trusted module on "inactive" TPM
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] Revert "tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()"
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH v2] Revert "tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()"
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v7 1/2] fTPM: firmware TPM running in TEE
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v2 0/2] char: tpm: add new driver for tpm i2c ptp
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH v2] tpm: Fix null pointer dereference on chip register error path
From
: Milan Broz <gmazyland@xxxxxxxxx>
Re: [PATCH v12 00/11] Appended signatures support for IMA appraisal
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
Re: [PATCH v12 01/11] MODSIGN: Export module signature definitions
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
RE: [PATCH v7 1/2] fTPM: firmware TPM running in TEE
From
: Thirupathaiah Annapureddy <thiruan@xxxxxxxxxxxxx>
[PATCH] tpm: fixes uninitialized allocated banks for IBM vtpm driver
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
Re: [PATCH] tpm: Fix null pointer dereference on chip register error path
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v6 10/17] fs-verity: implement FS_IOC_ENABLE_VERITY ioctl
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH] tpm: Document UEFI event log quirks
From
: Jordan Hand <jorhand@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] tpm: Document UEFI event log quirks
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
[PATCH] tpm: Document UEFI event log quirks
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[PATCH v8 9/9] ima-evm-utils: Log hash_algo with hash value in verbose mode
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v8 8/9] ima-evm-utils: Pass status codes from sign and hash functions to the callers
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v8 7/9] ima-evm-utils: Remove RSA_ASN1_templates
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v8 6/9] ima-evm-utils: Replace calc_keyid_v2 with calc_pkeyid_v2
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v8 5/9] ima-evm-utils: Convert sign_hash_v2 to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v8 4/9] ima-evm-utils: Convert verify_hash_v2 and find_keyid to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v8 3/9] ima-evm-utils: Convert cmd_import and calc keyid v2 to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v8 2/9] ima-evm-utils: Convert read_priv_key to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v8 1/9] ima-evm-utils: Convert read_pub_key to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v8 0/9] ima-evm-utils: Convert v2 signatures from RSA to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v7 1/2] fTPM: firmware TPM running in TEE
From
: Joakim Bech <joakim.bech@xxxxxxxxxx>
Re: [PATCH] ima: Replace two seq_printf() calls by seq_puts() in ima_show_template_data_ascii()
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v7 1/2] fTPM: firmware TPM running in TEE
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: ima: Replace two seq_printf() calls by seq_puts() in ima_show_template_data_ascii()
From
: Markus Elfring <Markus.Elfring@xxxxxx>
RE: [PATCH] ima: Replace two seq_printf() calls by seq_puts() in ima_show_template_data_ascii()
From
: David Laight <David.Laight@xxxxxxxxxx>
Re: [PATCH v7 1/2] fTPM: firmware TPM running in TEE
From
: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
Re: [PATCH v7 1/2] fTPM: firmware TPM running in TEE
From
: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
Re: [f2fs-dev] [PATCH v6 17/17] f2fs: add fs-verity support
From
: Chao Yu <yuchao0@xxxxxxxxxx>
[PATCH] ima: Replace two seq_printf() calls by seq_puts() in ima_show_template_data_ascii()
From
: Markus Elfring <Markus.Elfring@xxxxxx>
[PATCH] ima: Replace two seq_printf() calls by seq_puts() in ima_show_template_data_ascii()
From
: Markus Elfring <Markus.Elfring@xxxxxx>
[PATCH] ima: Replace two seq_printf() calls by seq_puts() in ima_show_template_data_ascii()
From
: Markus Elfring <Markus.Elfring@xxxxxx>
[PATCH] ima: Replace two seq_printf() calls by seq_puts() in ima_show_template_data_ascii()
From
: Markus Elfring <Markus.Elfring@xxxxxx>
Re: [PATCH] tpm: Fix null pointer dereference on chip register error path
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
RE: [PATCH v7 1/2] fTPM: firmware TPM running in TEE
From
: Thirupathaiah Annapureddy <thiruan@xxxxxxxxxxxxx>
Re: [PATCH v7 1/2] fTPM: firmware TPM running in TEE
From
: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
[PATCH 1/2] ima: always return negative code for error
From
: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
[PATCH 2/2] ima: fix freeing ongoing ahash_request
From
: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
[RFC PATCH v6 1/1] Add dm verity root hash pkcs7 sig validation.
From
: Jaskaran Khurana <jaskarankhurana@xxxxxxxxxxxxxxxxxxx>
[RFC PATCH v6 0/1] Add dm verity root hash pkcs7 sig validation.
From
: Jaskaran Khurana <jaskarankhurana@xxxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH v5 0/1] Add dm verity root hash pkcs7 sig validation.
From
: Jaskaran Singh Khurana <jaskarankhurana@xxxxxxxxxxxxxxxxxxx>
[PATCH v6 00/17] fs-verity: read-only file-based authenticity protection
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v6 07/17] fs-verity: add the hook for file ->open()
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v6 06/17] fs-verity: add inode and superblock fields
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v6 05/17] fs-verity: add Kconfig and the helper functions for hashing
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v6 08/17] fs-verity: add the hook for file ->setattr()
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v6 11/17] fs-verity: implement FS_IOC_MEASURE_VERITY ioctl
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v6 12/17] fs-verity: add SHA-512 support
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v6 09/17] fs-verity: add data verification hooks for ->readpages()
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v6 15/17] ext4: add fs-verity read support
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v6 10/17] fs-verity: implement FS_IOC_ENABLE_VERITY ioctl
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v6 16/17] ext4: update on-disk format documentation for fs-verity
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v6 14/17] ext4: add basic fs-verity support
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v6 17/17] f2fs: add fs-verity support
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v6 13/17] fs-verity: support builtin file signatures
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v6 04/17] fs: uapi: define verity bit for FS_IOC_GETFLAGS
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v6 03/17] fs-verity: add UAPI header
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v6 01/17] fs-verity: add a documentation file
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v6 02/17] fs-verity: add MAINTAINERS file entry
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v12 01/11] MODSIGN: Export module signature definitions
From
: Jessica Yu <jeyu@xxxxxxxxxx>
Re: [PATCH v12 00/11] Appended signatures support for IMA appraisal
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: Problem with the kernels trusted module on "inactive" TPM
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH] Revert "tpm: pass an array of tpm_extend_digest structures to tpm_pcr_extend()"
From
: Michal Suchanek <msuchanek@xxxxxxx>
Re: [PATCH v4 2/3] initramfs: read metadata from special file METADATA!!!
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] ima: fix freeing ongoing ahash_request
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [RFC PATCH v5 0/1] Add dm verity root hash pkcs7 sig validation.
From
: Milan Broz <gmazyland@xxxxxxxxx>
Re: [PATCH] ima: fix freeing ongoing ahash_request
From
: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
Re: [PATCH] ima: fix freeing ongoing ahash_request
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v4 3/3] gen_init_cpio: add support for file metadata
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v7 1/2] fTPM: firmware TPM running in TEE
From
: Sasha Levin <sashal@xxxxxxxxxx>
Re: [RFC PATCH v5 0/1] Add dm verity root hash pkcs7 sig validation.
From
: James Morris <jmorris@xxxxxxxxx>
Re: [RFC PATCH v5 0/1] Add dm verity root hash pkcs7 sig validation.
From
: Jaskaran Singh Khurana <jaskarankhurana@xxxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH v5 0/1] Add dm verity root hash pkcs7 sig validation.
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [RFC PATCH v5 0/1] Add dm verity root hash pkcs7 sig validation.
From
: Jaskaran Singh Khurana <jaskarankhurana@xxxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH v5 1/1] Add dm verity root hash pkcs7 sig validation.
From
: Jaskaran Singh Khurana <jaskarankhurana@xxxxxxxxxxxxxxxxxxx>
[PATCH v2 2/2] char: tpm: add new driver for tpm i2c ptp
From
: Oshri Alkoby <oshrialkoby85@xxxxxxxxx>
[PATCH v2 0/2] char: tpm: add new driver for tpm i2c ptp
From
: Oshri Alkoby <oshrialkoby85@xxxxxxxxx>
[PATCH v2 1/2] dt-bindings: tpm: add the TPM I2C PTP device tree binding documentation
From
: Oshri Alkoby <oshrialkoby85@xxxxxxxxx>
Re: [PATCH] ima: Update MAX_TEMPLATE_NAME_LEN to fit largest reasonable definition
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH] ima: fix freeing ongoing ahash_request
From
: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx>
Re: [PATCH] tpm: Fix null pointer dereference on chip register error path
From
: Milan Broz <gmazyland@xxxxxxxxx>
Re: [PATCH v7 1/2] fTPM: firmware TPM running in TEE
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [RFC PATCH v5 1/1] Add dm verity root hash pkcs7 sig validation.
From
: Milan Broz <gmazyland@xxxxxxxxx>
Re: [RFC PATCH v5 0/1] Add dm verity root hash pkcs7 sig validation.
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [RFC PATCH v5 1/1] Add dm verity root hash pkcs7 sig validation.
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v12 06/11] ima: Factor xattr_verify() out of ima_appraise_measurement()
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v12 05/11] ima: Add modsig appraise_type option for module-style appended signatures
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v12 10/11] ima: Store the measurement again when appraising a modsig
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v12 09/11] ima: Define ima-modsig template
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v12 07/11] ima: Implement support for module-style appended signatures
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v12 11/11] ima: Allow template= option for appraise rules as well
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v12 08/11] ima: Collect modsig
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v12 01/11] MODSIGN: Export module signature definitions
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v12 03/11] PKCS#7: Introduce pkcs7_get_digest()
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v12 04/11] integrity: Select CONFIG_KEYS instead of depending on it
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v12 02/11] PKCS#7: Refactor verify_pkcs7_signature()
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v12 00/11] Appended signatures support for IMA appraisal
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
Re: [RFC PATCH v5 1/1] Add dm verity root hash pkcs7 sig validation.
From
: Jaskaran Singh Khurana <jaskarankhurana@xxxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH v5 1/1] Add dm verity root hash pkcs7 sig validation.
From
: Jaskaran Singh Khurana <jaskarankhurana@xxxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH v5 1/1] Add dm verity root hash pkcs7 sig validation.
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH V10 2/3] IMA: Define a new template field buf
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH] ima: Update MAX_TEMPLATE_NAME_LEN to fit largest reasonable definition
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
Re: [PATCH v7 1/2] fTPM: firmware TPM running in TEE
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH V10 2/3] IMA: Define a new template field buf
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: linux-next: Tree for Jun 26 (security/integrity/ima/)
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
Re: [PATCH v7 1/2] fTPM: firmware TPM running in TEE
From
: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
Re: linux-next: Tree for Jun 26 (security/integrity/ima/)
From
: David Howells <dhowells@xxxxxxxxxx>
Re: [PATCH v7 1/2] fTPM: firmware TPM running in TEE
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v7 1/2] fTPM: firmware TPM running in TEE
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: linux-next: Tree for Jun 26 (security/integrity/ima/)
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [RFC PATCH v5 1/1] Add dm verity root hash pkcs7 sig validation.
From
: Milan Broz <gmazyland@xxxxxxxxx>
Re: [PATCH v1 2/2] char: tpm: add new driver for tpm i2c ptp
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v1 1/2] dt-bindings: tpm: add the TPM I2C PTP device tree binding documentation
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v1 0/2] char: tpm: add new driver for tpm i2c ptp
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v7 2/2] fTPM: add documentation for ftpm driver
From
: Sasha Levin <sashal@xxxxxxxxxx>
Re: [PATCH v7 1/2] fTPM: firmware TPM running in TEE
From
: Sasha Levin <sashal@xxxxxxxxxx>
Re: [PATCH v7 2/2] fTPM: add documentation for ftpm driver
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v7 1/2] fTPM: firmware TPM running in TEE
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[GIT PULL] tpmdd updates for Linux v5.3
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: linux-next: Tree for Jun 26 (security/integrity/ima/)
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
Re: [PATCH v5 16/16] f2fs: add fs-verity support
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v7 00/11] ima-evm-utils: Convert v2 signatures from RSA to EVP_PKEY API
From
: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
Re: [PATCH v7 00/11] ima-evm-utils: Convert v2 signatures from RSA to EVP_PKEY API
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v7 00/11] ima-evm-utils: Convert v2 signatures from RSA to EVP_PKEY API
From
: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
Re: [PATCH v4 00/14] ima: introduce IMA Digest Lists extension
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v5 16/16] f2fs: add fs-verity support
From
: Chao Yu <yuchao0@xxxxxxxxxx>
Re: [RFC PATCH v5 1/1] Add dm verity root hash pkcs7 sig validation.
From
: Milan Broz <gmazyland@xxxxxxxxx>
[PATCH v1 2/2] char: tpm: add new driver for tpm i2c ptp
From
: Oshri Alkoby <oshrialkoby85@xxxxxxxxx>
[PATCH v1 1/2] dt-bindings: tpm: add the TPM I2C PTP device tree binding documentation
From
: Oshri Alkoby <oshrialkoby85@xxxxxxxxx>
[PATCH v1 0/2] char: tpm: add new driver for tpm i2c ptp
From
: Oshri Alkoby <oshrialkoby85@xxxxxxxxx>
Re: Can we enforce "IMA Policy" based on file type
From
: Kavitha Sivagnanam <kavi@xxxxxxxxxxx>
Re: [PATCH v7 2/2] fTPM: add documentation for ftpm driver
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
Re: [PATCH 0/2] [IMA] Measure public keys of BuiltIn Trusted Keys
From
: Lakshmi <nramas@xxxxxxxxxxxxxxxxxxx>
[PATCH v7 2/2] fTPM: add documentation for ftpm driver
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH v7 1/2] fTPM: firmware TPM running in TEE
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH v7 0/2] fTPM: firmware TPM running in TEE
From
: Sasha Levin <sashal@xxxxxxxxxx>
Re: [PATCH v6 2/2] fTPM: add documentation for ftpm driver
From
: Sasha Levin <sashal@xxxxxxxxxx>
Re: [PATCH v6 1/2] fTPM: firmware TPM running in TEE
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
Re: [PATCH v6 2/2] fTPM: add documentation for ftpm driver
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
[PATCH v6 2/2] fTPM: add documentation for ftpm driver
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH v6 1/2] fTPM: firmware TPM running in TEE
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH v6 0/2] fTPM: firmware TPM running in TEE
From
: Sasha Levin <sashal@xxxxxxxxxx>
Re: [RFC PATCH v5 1/1] Add dm verity root hash pkcs7 sig validation.
From
: Mike Snitzer <snitzer@xxxxxxxxxx>
Re: [PATCH v5 16/16] f2fs: add fs-verity support
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v4 00/14] ima: introduce IMA Digest Lists extension
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v4 00/14] ima: introduce IMA Digest Lists extension
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v5 16/16] f2fs: add fs-verity support
From
: Chao Yu <yuchao0@xxxxxxxxxx>
Re: [PATCH v7 00/11] ima-evm-utils: Convert v2 signatures from RSA to EVP_PKEY API
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH V10 2/3] IMA: Define a new template field buf
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
Re: [PATCH v7 00/11] ima-evm-utils: Convert v2 signatures from RSA to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v11 02/13] PKCS#7: Refactor verify_pkcs7_signature()
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
Re: [PATCH v11 01/13] MODSIGN: Export module signature definitions
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
Re: [PATCH v7 00/11] ima-evm-utils: Convert v2 signatures from RSA to EVP_PKEY API
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v7 00/11] ima-evm-utils: Convert v2 signatures from RSA to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v7 00/11] ima-evm-utils: Convert v2 signatures from RSA to EVP_PKEY API
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v3] tpm: Get TCG log from TPM2 ACPI table for tpm2 systems
From
: Jordan Hand <jordanhand22@xxxxxxxxx>
Re: [PATCH] tpm: Get TCG log from TPM2 ACPI table for tpm2 systems
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v7 00/11] ima-evm-utils: Convert v2 signatures from RSA to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v7 00/11] ima-evm-utils: Convert v2 signatures from RSA to EVP_PKEY API
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 1/8] tpm: block messages while suspended
From
: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH V10 1/3] IMA: Define a new hook to measure the kexec boot command line arguments
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH V10 2/3] IMA: Define a new template field buf
From
: Prakhar Srivastava <prsriva02@xxxxxxxxx>
[PATCH V10 3/3] KEXEC: Call ima_kexec_cmdline to measure the boot command line args
From
: Prakhar Srivastava <prsriva02@xxxxxxxxx>
[PATCH V10 1/3] IMA: Define a new hook to measure the kexec boot command line arguments
From
: Prakhar Srivastava <prsriva02@xxxxxxxxx>
[PATCH V10 0/3] Add support for measuring the boot command line during kexec_file_load
From
: Prakhar Srivastava <prsriva02@xxxxxxxxx>
[PATCH v2] tpm: Get TCG log from TPM2 ACPI table for tpm2 systems
From
: Jordan Hand <jordanhand22@xxxxxxxxx>
[PATCH] tpm: Get TCG log from TPM2 ACPI table for tpm2 systems
From
: Jordan Hand <jordanhand22@xxxxxxxxx>
Re: possible deadlock in __do_page_fault (2)
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [IMA] Re: possible deadlock in get_user_pages_unlocked (2)
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v7 11/11] ima-evm-utils: Log hash_algo with hash value in verbose mode
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v7 10/11] ima-evm-utils: Pass status codes from sign and hash functions to the callers
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v7 09/11] ima-evm-utils: Remove RSA_ASN1_templates
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v7 08/11] ima-evm-utils: Replace calc_keyid_v2 with calc_pkeyid_v2
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v7 07/11] ima-evm-utils: Convert sign_hash_v2 to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v7 06/11] ima-evm-utils: Replace find_keyid with find_keyid_pkey
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v7 05/11] ima-evm-utils: Convert verify_hash_v2 to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v7 04/11] ima-evm-utils: Start converting find_keyid to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v7 03/11] ima-evm-utils: Convert cmd_import and calc keyid v2 to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v7 02/11] ima-evm-utils: Convert read_priv_key to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v7 01/11] ima-evm-utils: Convert read_pub_key to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v7 00/11] ima-evm-utils: Convert v2 signatures from RSA to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v5 01/11] ima-evm-utils: Make sure sig buffer is always MAX_SIGNATURE_SIZE
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v5 16/16] f2fs: add fs-verity support
From
: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
Re: [PATCH v5 12/16] fs-verity: add SHA-512 support
From
: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
Re: [PATCH v5 11/16] fs-verity: implement FS_IOC_MEASURE_VERITY ioctl
From
: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
Re: [PATCH v5 10/16] fs-verity: implement FS_IOC_ENABLE_VERITY ioctl
From
: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
Re: [PATCH v5 09/16] fs-verity: add data verification hooks for ->readpages()
From
: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
Re: [PATCH v5 08/16] fs-verity: add the hook for file ->setattr()
From
: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
Re: [PATCH v5 07/16] fs-verity: add the hook for file ->open()
From
: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
Re: [PATCH v5 06/16] fs-verity: add inode and superblock fields
From
: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
Re: [PATCH v5 05/16] fs-verity: add Kconfig and the helper functions for hashing
From
: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
Re: [PATCH v5 04/16] fs: uapi: define verity bit for FS_IOC_GETFLAGS
From
: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
Re: [PATCH v5 03/16] fs-verity: add UAPI header
From
: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
Re: [PATCH v5 02/16] fs-verity: add MAINTAINERS file entry
From
: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
Re: [PATCH v5 01/16] fs-verity: add a documentation file
From
: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
[PATCH V34 25/29] kexec: Allow kexec_file() with appropriate IMA policy when locked down
From
: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
Re: [PATCH v5 01/11] ima-evm-utils: Make sure sig buffer is always MAX_SIGNATURE_SIZE
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5 01/11] ima-evm-utils: Make sure sig buffer is always MAX_SIGNATURE_SIZE
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v5 01/11] ima-evm-utils: Make sure sig buffer is always MAX_SIGNATURE_SIZE
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5 01/11] ima-evm-utils: Make sure sig buffer is always MAX_SIGNATURE_SIZE
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v5 01/11] ima-evm-utils: Make sure sig buffer is always MAX_SIGNATURE_SIZE
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5 01/11] ima-evm-utils: Make sure sig buffer is always MAX_SIGNATURE_SIZE
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v5 14/16] ext4: add basic fs-verity support
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH V33 26/30] kexec: Allow kexec_file() with appropriate IMA policy when locked down
From
: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
Re: [PATCH 1/8] tpm: block messages while suspended
From
: Stephen Boyd <swboyd@xxxxxxxxxxxx>
Re: [PATCH v5 14/16] ext4: add basic fs-verity support
From
: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
Re: [PATCH v5 01/11] ima-evm-utils: Make sure sig buffer is always MAX_SIGNATURE_SIZE
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v5 01/16] fs-verity: add a documentation file
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v5 03/16] fs-verity: add UAPI header
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v5 05/16] fs-verity: add Kconfig and the helper functions for hashing
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v5 09/16] fs-verity: add data verification hooks for ->readpages()
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v5 02/16] fs-verity: add MAINTAINERS file entry
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v5 07/16] fs-verity: add the hook for file ->open()
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v5 13/16] fs-verity: support builtin file signatures
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v5 10/16] fs-verity: implement FS_IOC_ENABLE_VERITY ioctl
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v5 16/16] f2fs: add fs-verity support
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v5 15/16] ext4: add fs-verity read support
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v5 14/16] ext4: add basic fs-verity support
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v5 12/16] fs-verity: add SHA-512 support
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v5 11/16] fs-verity: implement FS_IOC_MEASURE_VERITY ioctl
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v5 08/16] fs-verity: add the hook for file ->setattr()
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v5 04/16] fs: uapi: define verity bit for FS_IOC_GETFLAGS
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v5 06/16] fs-verity: add inode and superblock fields
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[PATCH v5 00/16] fs-verity: read-only file-based authenticity protection
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v5 06/11] ima-evm-utils: Start converting find_keyid to use EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v5 06/11] ima-evm-utils: Start converting find_keyid to use EVP_PKEY API
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5 06/11] ima-evm-utils: Start converting find_keyid to use EVP_PKEY API
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v6 11/11] ima-evm-utils: Pass status codes from sign and hash functions to the callers
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v6 10/11] ima-evm-utils: Remove RSA_ASN1_templates
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v6 09/11] ima-evm-utils: Replace calc_keyid_v2 with calc_pkeyid_v2
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v6 08/11] ima-evm-utils: Convert sign_hash_v2 to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v6 07/11] ima-evm-utils: Replace find_keyid with find_keyid_pkey
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v6 06/11] ima-evm-utils: Convert verify_hash_v2 to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v6 05/11] ima-evm-utils: Start converting find_keyid to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v6 04/11] ima-evm-utils: Convert cmd_import and calc keyid v2 to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v6 03/11] ima-evm-utils: Convert read_priv_key to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v6 02/11] ima-evm-utils: Convert read_pub_key to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v6 01/11] ima-evm-utils: Make sure sig buffer is always MAX_SIGNATURE_SIZE
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v6 00/11] ima-evm-utils: Convert v2 signatures from RSA to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v5 06/11] ima-evm-utils: Start converting find_keyid to use EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH V5] IMA: support for per policy rule template formats
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH V5] IMA: support for per policy rule template formats
From
: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
Re: [PATCH 1/3] IMA:Define a new hook to measure the kexec boot command line arguments
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v4 14/16] ext4: add basic fs-verity support
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
[RFC PATCH v5 0/1] Add dm verity root hash pkcs7 sig validation.
From
: Jaskaran Khurana <jaskarankhurana@xxxxxxxxxxxxxxxxxxx>
[RFC PATCH v5 1/1] Add dm verity root hash pkcs7 sig validation.
From
: Jaskaran Khurana <jaskarankhurana@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 2/3] IMA:Define a new template field buf
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 2/3] IMA:Define a new template field buf
From
: prakhar srivastava <prsriva02@xxxxxxxxx>
Re: [PATCH V9 1/3] IMA:Define a new hook to measure the kexec boot command line arguments
From
: prakhar srivastava <prsriva02@xxxxxxxxx>
Re: [PATCH v5 06/11] ima-evm-utils: Start converting find_keyid to use EVP_PKEY API
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5 06/11] ima-evm-utils: Start converting find_keyid to use EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v5 06/11] ima-evm-utils: Start converting find_keyid to use EVP_PKEY API
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH V4] IMA: support for per policy rule template formats
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 2/3] IMA:Define a new template field buf
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5 04/11] ima-evm-utils: Start converting calc keyid v2 to EVP_PKEY API
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v5 1/2] fTPM: firmware TPM running in TEE
From
: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
Re: [PATCH v4 14/16] ext4: add basic fs-verity support
From
: "Theodore Ts'o" <tytso@xxxxxxx>
Re: [PATCH v4 14/16] ext4: add basic fs-verity support
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v4 14/16] ext4: add basic fs-verity support
From
: "Theodore Ts'o" <tytso@xxxxxxx>
[PATCH V4] IMA: support for per policy rule template formats
From
: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
Re: [PATCH] ima: dynamically allocate shash_desc
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH] ima: dynamically allocate shash_desc
From
: Arnd Bergmann <arnd@xxxxxxxx>
Re: [PATCH 0/2] [IMA] Measure public keys of BuiltIn Trusted Keys
From
: Jordan Hand <jorhand@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v4 14/16] ext4: add basic fs-verity support
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH 0/2] [IMA] Measure public keys of BuiltIn Trusted Keys
From
: Ken Goldman <kgold@xxxxxxxxxxxxx>
Re: [PATCH v4 13/16] fs-verity: support builtin file signatures
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v4 10/16] fs-verity: implement FS_IOC_ENABLE_VERITY ioctl
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v4 07/16] fs-verity: add the hook for file ->open()
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v4 05/16] fs-verity: add Kconfig and the helper functions for hashing
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v4 01/16] fs-verity: add a documentation file
From
: Eric Biggers <ebiggers@xxxxxxxxxx>
Re: [PATCH v4 2/2] fTPM: add documentation for ftpm driver
From
: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
Re: [LTP] [PATCH v4 4/4] ima: Add overlay test + doc
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH v5 11/11] ima-evm-utils: Remove RSA_ASN1_templates
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v5 10/11] ima-evm-utils: Finish converting calc keyid v2 to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v5 09/11] ima-evm-utils: Convert sign_hash_v2 to use EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v5 08/11] ima-evm-utils: Finish conversion of find_keyid to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v5 07/11] ima-evm-utils: Convert verify_hash_v2 to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v5 06/11] ima-evm-utils: Start converting find_keyid to use EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v5 05/11] ima-evm-utils: Convert cmd_import to use EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v5 04/11] ima-evm-utils: Start converting calc keyid v2 to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v5 03/11] ima-evm-utils: Change read_priv_key to use EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v5 02/11] ima-evm-utils: Change read_pub_key to use EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v5 01/11] ima-evm-utils: Make sure sig buffer is always MAX_SIGNATURE_SIZE
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v5 00/11] ima-evm-utils: Convert sign v2 from RSA to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH] ima: dynamically allocate shash_desc
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 0/2] [IMA] Measure public keys of BuiltIn Trusted Keys
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: [PATCH 0/2] [IMA] Measure public keys of BuiltIn Trusted Keys
From
: Lakshmi <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/8] tpm: block messages while suspended
From
: Jason Gunthorpe <jgg@xxxxxxxx>
Re: [RFC PATCH v4 1/1] Add dm verity root hash pkcs7 sig validation.
From
: Jaskaran Singh Khurana <jaskarankhurana@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] ima: dynamically allocate shash_desc
From
: Arnd Bergmann <arnd@xxxxxxxx>
[PATCH V8 0/3] Add support for measuring the boot command line during kexec_file_load
From
: Prakhar Srivastava <prsriva02@xxxxxxxxx>
[PATCH V9 2/3] IMA:Define a new template field buf
From
: Prakhar Srivastava <prsriva02@xxxxxxxxx>
[PATCH V9 1/3] IMA:Define a new hook to measure the kexec boot command line arguments
From
: Prakhar Srivastava <prsriva02@xxxxxxxxx>
[PATCH V9 3/3] KEXEC:Call ima_kexec_cmdline to measure the boot command line args
From
: Prakhar Srivastava <prsriva02@xxxxxxxxx>
[PATCH 1/3] IMA:Define a new hook to measure the kexec boot command line arguments
From
: Prakhar Srivastava <prsriva02@xxxxxxxxx>
[PATCH V8 0/3] Add support for measuring the boot command line during kexec_file_load
From
: Prakhar Srivastava <prsriva02@xxxxxxxxx>
[PATCH 3/3] KEXEC:Call ima_kexec_cmdline to measure the boot command line args
From
: Prakhar Srivastava <prsriva02@xxxxxxxxx>
[PATCH 2/3] IMA:Define a new template field buf
From
: Prakhar Srivastava <prsriva02@xxxxxxxxx>
Re: [PATCH] ima: dynamically allocate shash_desc
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 0/2] [IMA] Measure public keys of BuiltIn Trusted Keys
From
: Ken Goldman <kgold@xxxxxxxxxxxxx>
Re: [PATCH 1/8] tpm: block messages while suspended
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] ima: dynamically allocate shash_desc
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v4 4/5] ima-evm-utils: Convert sign v2 from RSA to EVP_PKEY API
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v4 4/5] ima-evm-utils: Convert sign v2 from RSA to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v4 4/5] ima-evm-utils: Convert sign v2 from RSA to EVP_PKEY API
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v4 1/5] ima-avm-utils: Make sure sig buffer is always MAX_SIGNATURE_SIZE
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v4 3/5] ima-avm-utils: Change read_priv_key to use EVP_PKEY API
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [RFC PATCH v4 1/1] Add dm verity root hash pkcs7 sig validation.
From
: Milan Broz <gmazyland@xxxxxxxxx>
[PATCH] ima: dynamically allocate shash_desc
From
: Arnd Bergmann <arnd@xxxxxxxx>
Re: [PATCH v4 00/14] ima: introduce IMA Digest Lists extension
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v3 1/3] powerpc/powernv: Add OPAL API interface to get secureboot state
From
: Daniel Axtens <dja@xxxxxxxxxx>
[tytso@xxxxxxx: Re: [PATCH v4 03/16] fs-verity: add UAPI header]
From
: "Theodore Ts'o" <tytso@xxxxxxx>
Re: [PATCH v4 14/16] ext4: add basic fs-verity support
From
: "Theodore Ts'o" <tytso@xxxxxxx>
Re: [PATCH v4 13/16] fs-verity: support builtin file signatures
From
: "Theodore Ts'o" <tytso@xxxxxxx>
Re: [PATCH v4 12/16] fs-verity: add SHA-512 support
From
: "Theodore Ts'o" <tytso@xxxxxxx>
Re: [PATCH v4 11/16] fs-verity: implement FS_IOC_MEASURE_VERITY ioctl
From
: "Theodore Ts'o" <tytso@xxxxxxx>
Re: [PATCH v4 10/16] fs-verity: implement FS_IOC_ENABLE_VERITY ioctl
From
: "Theodore Ts'o" <tytso@xxxxxxx>
Re: [PATCH v4 09/16] fs-verity: add data verification hooks for ->readpages()
From
: "Theodore Ts'o" <tytso@xxxxxxx>
Re: [PATCH v4 08/16] fs-verity: add the hook for file ->setattr()
From
: "Theodore Ts'o" <tytso@xxxxxxx>
Re: [PATCH v4 07/16] fs-verity: add the hook for file ->open()
From
: "Theodore Ts'o" <tytso@xxxxxxx>
Re: [PATCH v4 06/16] fs-verity: add inode and superblock fields
From
: "Theodore Ts'o" <tytso@xxxxxxx>
Re: [PATCH v4 05/16] fs-verity: add Kconfig and the helper functions for hashing
From
: "Theodore Ts'o" <tytso@xxxxxxx>
Re: [PATCH v4 04/16] fs: uapi: define verity bit for FS_IOC_GETFLAGS
From
: "Theodore Ts'o" <tytso@xxxxxxx>
Re: [PATCH v4 02/16] fs-verity: add MAINTAINERS file entry
From
: "Theodore Ts'o" <tytso@xxxxxxx>
Re: [PATCH v4 01/16] fs-verity: add a documentation file
From
: "Theodore Ts'o" <tytso@xxxxxxx>
Re: [PATCH] tpm: Fix null pointer dereference on chip register error path
From
: Milan Broz <gmazyland@xxxxxxxxx>
Re: [PATCH v3 1/3] powerpc/powernv: Add OPAL API interface to get secureboot state
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
Re: [PATCH] tpm: Fix null pointer dereference on chip register error path
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH v5 0/2] fTPM: firmware TPM running in TEE
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH v5 1/2] fTPM: firmware TPM running in TEE
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH v5 2/2] fTPM: add documentation for ftpm driver
From
: Sasha Levin <sashal@xxxxxxxxxx>
Re: [PATCH 1/8] tpm: block messages while suspended
From
: Stephen Boyd <swboyd@xxxxxxxxxxxx>
Re: [PATCH 1/8] tpm: block messages while suspended
From
: Stephen Boyd <swboyd@xxxxxxxxxxxx>
[PATCH v4 14/14] ima: add Documentation/security/IMA-digest-lists.txt
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v4 13/14] ima: introduce new policies initrd and appraise_initrd
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v4 12/14] ima: add support for appraisal with digest lists
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v4 11/14] ima: add support for measurement with digest lists
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v4 10/14] ima: load parser digests and execute the parser at boot time
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v4 09/14] ima: introduce new securityfs files
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v4 08/14] ima: prevent usage of digest lists that are not measured/appraised
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v4 07/14] ima: restrict upload of converted digest lists
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v4 06/14] ima: add parser of compact digest list
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v4 05/14] ima: use ima_show_htable_value to show violations and hash table data
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v4 04/14] ima: generalize policy file operations
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v4 03/14] ima: generalize ima_write_policy() and raise uploaded data size limit
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v4 02/14] ima: generalize ima_read_policy()
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v4 01/14] ima: read hash algorithm from security.ima even if appraisal is not enabled
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
[PATCH v4 00/14] ima: introduce IMA Digest Lists extension
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH V8 2/3] Define a new ima template field buf
From
: prakhar srivastava <prsriva02@xxxxxxxxx>
Re: [PATCH V8 1/3] Define a new IMA hook to measure the boot command line arguments
From
: prakhar srivastava <prsriva02@xxxxxxxxx>
Re: [PATCH V8 0/3] Add support for measuring the boot command line during kexec_file_load
From
: prakhar srivastava <prsriva02@xxxxxxxxx>
Re: [RFC 6/7] doc: keys: Document usage of TEE based Trusted Keys
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH 7/8] tpm: add sysfs attributes for tpm2
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH 1/8] tpm: block messages while suspended
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH 3/8] tpm_tis_spi: add max xfer size
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH 2/8] tpm_tis_core: add optional max xfer size check
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH v4 4/4] ima: Add overlay test + doc
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH v4 4/4] ima: Add overlay test + doc
From
: Ignaz Forster <iforster@xxxxxxx>
Re: [PATCH v4 4/4] ima: Add overlay test + doc
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH V8 2/3] Define a new ima template field buf
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 2/2] powerpc: expose secure variables via sysfs
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
Re: [PATCH V8 2/3] Define a new ima template field buf
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v4 1/2] fTPM: firmware TPM running in TEE
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH v4 1/2] fTPM: firmware TPM running in TEE
From
: Ilias Apalodimas <ilias.apalodimas@xxxxxxxxxx>
Re: [RFC 0/7] Introduce TEE based Trusted Keys support
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [RFC 2/7] tee: enable support to register kernel memory
From
: Jens Wiklander <jens.wiklander@xxxxxxxxxx>
Re: [RFC 1/7] tee: optee: allow kernel pages to register as shm
From
: Jens Wiklander <jens.wiklander@xxxxxxxxxx>
Re: [PATCH 2/2] powerpc: expose secure variables via sysfs
From
: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
Re: [RFC 0/7] Introduce TEE based Trusted Keys support
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [RFC 4/7] KEYS: trusted: Introduce TEE based Trusted Keys
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [RFC 6/7] doc: keys: Document usage of TEE based Trusted Keys
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [RFC 2/7] tee: enable support to register kernel memory
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [RFC 1/7] tee: optee: allow kernel pages to register as shm
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [PATCH v4 0/5] ima-avm-utils: Convert sign v2 from RSA to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v4 4/5] ima-evm-utils: Convert sign v2 from RSA to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v4 5/5] ima-avm-utils: Remove RSA_ASN1_templates
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v4 3/5] ima-avm-utils: Change read_priv_key to use EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v4 2/5] ima-avm-utils: Change read_pub_key to use EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v4 1/5] ima-avm-utils: Make sure sig buffer is always MAX_SIGNATURE_SIZE
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[PATCH v4 0/5] ima-avm-utils: Convert sign v2 from RSA to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [RFC 0/7] Introduce TEE based Trusted Keys support
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 8/8] tpm: add legacy sysfs attributes for tpm2
From
: Jason Gunthorpe <jgg@xxxxxxxx>
Re: [PATCH 7/8] tpm: add sysfs attributes for tpm2
From
: Jason Gunthorpe <jgg@xxxxxxxx>
Re: [PATCH 1/8] tpm: block messages while suspended
From
: Jason Gunthorpe <jgg@xxxxxxxx>
[PATCH 2/2] powerpc: expose secure variables via sysfs
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH 1/2] powerpc/powernv: add OPAL APIs for secure variables
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH 0/2] powerpc/powernv: expose secure variables to userspace
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
Re: [PATCH V8 0/3] Add support for measuring the boot command line during kexec_file_load
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH V8 3/3] Call ima_kexec_cmdline to measure the cmdline args
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH V8 3/3] Call ima_kexec_cmdline to measure the cmdline args
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH V8 2/3] Define a new ima template field buf
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH V8 1/3] Define a new IMA hook to measure the boot command line arguments
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH V8 3/3] Call ima_kexec_cmdline to measure the cmdline args
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH V8 2/3] Define a new ima template field buf
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH V8 1/3] Define a new IMA hook to measure the boot command line arguments
From
: James Morris <jmorris@xxxxxxxxx>
[PATCH 1/8] tpm: block messages while suspended
From
: Stephen Boyd <swboyd@xxxxxxxxxxxx>
[PATCH 2/8] tpm_tis_core: add optional max xfer size check
From
: Stephen Boyd <swboyd@xxxxxxxxxxxx>
[PATCH 4/8] dt-bindings: tpm: document properties for cr50
From
: Stephen Boyd <swboyd@xxxxxxxxxxxx>
[PATCH 5/8] tpm: add driver for cr50 on SPI
From
: Stephen Boyd <swboyd@xxxxxxxxxxxx>
[PATCH 7/8] tpm: add sysfs attributes for tpm2
From
: Stephen Boyd <swboyd@xxxxxxxxxxxx>
[PATCH 6/8] tpm: Add driver for cr50 on I2C
From
: Stephen Boyd <swboyd@xxxxxxxxxxxx>
[PATCH 8/8] tpm: add legacy sysfs attributes for tpm2
From
: Stephen Boyd <swboyd@xxxxxxxxxxxx>
[PATCH 3/8] tpm_tis_spi: add max xfer size
From
: Stephen Boyd <swboyd@xxxxxxxxxxxx>
[PATCH 0/8] tpm: Add driver for cr50
From
: Stephen Boyd <swboyd@xxxxxxxxxxxx>
[PATCH V8 0/3] Add support for measuring the boot command line during kexec_file_load
From
: Prakhar Srivastava <prsriva02@xxxxxxxxx>
Re: [PATCH v4 1/2] fTPM: firmware TPM running in TEE
From
: Sasha Levin <sashal@xxxxxxxxxx>
[PATCH V8 1/3] Define a new IMA hook to measure the boot command line arguments
From
: Prakhar Srivastava <prsriva02@xxxxxxxxx>
[PATCH V8 2/3] Define a new ima template field buf
From
: Prakhar Srivastava <prsriva02@xxxxxxxxx>
[PATCH V8 3/3] Call ima_kexec_cmdline to measure the cmdline args
From
: Prakhar Srivastava <prsriva02@xxxxxxxxx>
Re: [PATCH V8 3/3] Call ima_kexec_cmdline to measure the cmdline args
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 1/3] powerpc/powernv: Add OPAL API interface to get secureboot state
From
: Daniel Axtens <dja@xxxxxxxxxx>
Re: [PATCH v4 4/4] ima: Add overlay test + doc
From
: Ignaz Forster <iforster@xxxxxxx>
[RFC PATCH v4 1/1] Add dm verity root hash pkcs7 sig validation.
From
: Jaskaran Khurana <jaskarankhurana@xxxxxxxxxxxxxxxxxxx>
[RFC PATCH v4 0/1] Add dm verity root hash pkcs7 sig validation.
From
: Jaskaran Khurana <jaskarankhurana@xxxxxxxxxxxxxxxxxxx>
[RFC PATCH v4 0/1] Add dm verity root hash pkcs7 sig validation.
From
: Jaskaran Khurana <jaskarankhurana@xxxxxxxxxxxxxxxxxxx>
[RFC PATCH v4 1/1] Add dm verity root hash pkcs7 sig validation.
From
: Jaskaran Khurana <jaskarankhurana@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 0/2] ima/evm fixes for v5.2
From
: Janne Karhunen <janne.karhunen@xxxxxxxxx>
Re: [PATCH v4 3/4] ima/ima_measurements.sh: Require builtin IMA tcb policy
From
: Ignaz Forster <iforster@xxxxxxx>
Re: [PATCH v3 0/2] ima/evm fixes for v5.2
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [RFC 0/7] Introduce TEE based Trusted Keys support
From
: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
Re: [PATCH v3 0/2] ima/evm fixes for v5.2
From
: Janne Karhunen <janne.karhunen@xxxxxxxxx>
Re: [PATCH v3 0/2] ima/evm fixes for v5.2
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v3 0/2] ima/evm fixes for v5.2
From
: Janne Karhunen <janne.karhunen@xxxxxxxxx>
Re: [PATCH V8 3/3] Call ima_kexec_cmdline to measure the cmdline args
From
: Dave Young <dyoung@xxxxxxxxxx>
[PATCH v4 2/4] shell: Add $TST_DEVICE as default parameter to tst_umount
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH v4 4/4] ima: Add overlay test + doc
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH v4 3/4] ima/ima_measurements.sh: Require builtin IMA tcb policy
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH v4 1/4] ima: Call test's cleanup inside ima_setup.sh cleanup
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH v4 0/4] LTP reproducer on broken IMA on overlayfs
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH v3 3/4] ima/ima_measurements.sh: Require builtin IMA tcb policy
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH v3 0/2] ima/evm fixes for v5.2
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH -next] ima: Make arch_policy_entry static
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[RFC 0/7] Introduce TEE based Trusted Keys support
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
[RFC 1/7] tee: optee: allow kernel pages to register as shm
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
[RFC 2/7] tee: enable support to register kernel memory
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
[RFC 3/7] tee: add private login method for kernel clients
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
[RFC 4/7] KEYS: trusted: Introduce TEE based Trusted Keys
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
[RFC 5/7] KEYS: encrypted: Allow TEE based trusted master keys
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [RFC 6/7] doc: keys: Document usage of TEE based Trusted Keys
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
[RFC 6/7] doc: keys: Document usage of TEE based Trusted Keys
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
[RFC 7/7] MAINTAINERS: Add entry for TEE based Trusted Keys
From
: Sumit Garg <sumit.garg@xxxxxxxxxx>
Re: [RFC 4/7] KEYS: trusted: Introduce TEE based Trusted Keys
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
From
: Doug Anderson <dianders@xxxxxxxxxxxx>
Re: [RFC 2/7] tee: enable support to register kernel memory
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [RFC 1/7] tee: optee: allow kernel pages to register as shm
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [RFC 1/7] tee: optee: allow kernel pages to register as shm
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [RFC 1/7] tee: optee: allow kernel pages to register as shm
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH V2 1/2] Abstract out support for locating an EFI config table
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH V2 2/2] tpm: Don't duplicate events from the final event log in the TCG2 log
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH V2 2/2] tpm: Don't duplicate events from the final event log in the TCG2 log
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH V2 2/2] tpm: Don't duplicate events from the final event log in the TCG2 log
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [PATCH] tpm: Fix null pointer dereference on chip register error path
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH v2 1/2] LSM: switch to blocking policy update notifiers
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH V2 1/2] Abstract out support for locating an EFI config table
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH 0/2] [IMA] Measure public keys of BuiltIn Trusted Keys
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 0/2] [IMA] Measure public keys of BuiltIn Trusted Keys
From
: Jordan Hand <jorhand@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 0/2] ima/evm fixes for v5.2
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH 1/2] vfs: replace i_readcount with a biased i_count
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH 1/2] vfs: replace i_readcount with a biased i_count
From
: Amir Goldstein <amir73il@xxxxxxxxx>
Re: [PATCH 1/2] vfs: replace i_readcount with a biased i_count
From
: "J . Bruce Fields" <bfields@xxxxxxxxxxxx>
Re: [PATCH v2 1/2] LSM: switch to blocking policy update notifiers
From
: Paul Moore <paul@xxxxxxxxxxxxxx>
Re: [PATCH 1/2] vfs: replace i_readcount with a biased i_count
From
: Amir Goldstein <amir73il@xxxxxxxxx>
Re: [PATCH v3 3/4] ima/ima_measurements.sh: Require builtin IMA tcb policy
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3] ima-evm-utils: Convert sign v2 from RSA to EVP_PKEY API
From
: Vitaly Chikunov <vt@xxxxxxxxxxxx>
Re: [PATCH v3] ima-evm-utils: Convert sign v2 from RSA to EVP_PKEY API
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 0/2] ima/evm fixes for v5.2
From
: Janne Karhunen <janne.karhunen@xxxxxxxxx>
Re: [PATCH v2 1/2] LSM: switch to blocking policy update notifiers
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v2 1/2] ima: use the lsm policy update notifier
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 0/2] ima/evm fixes for v5.2
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH 1/2] vfs: replace i_readcount with a biased i_count
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 0/2] ima/evm fixes for v5.2
From
: Janne Karhunen <janne.karhunen@xxxxxxxxx>
[PATCH] tpm: Fix null pointer dereference on chip register error path
From
: Milan Broz <gmazyland@xxxxxxxxx>
[PATCH v2 1/2] ima: use the lsm policy update notifier
From
: Janne Karhunen <janne.karhunen@xxxxxxxxx>
[PATCH v2 1/2] LSM: switch to blocking policy update notifiers
From
: Janne Karhunen <janne.karhunen@xxxxxxxxx>
Re: [PATCH v3 1/3] powerpc/powernv: Add OPAL API interface to get secureboot state
From
: Daniel Axtens <dja@xxxxxxxxxx>
[PATCH v3 4/4] ima: Add overlay test + doc
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH v3 3/4] ima/ima_measurements.sh: Require builtin IMA tcb policy
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH v3 2/4] shell: Add $TST_DEVICE as default parameter to tst_umount
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH v3 1/4] ima: Call test's cleanup inside ima_setup.sh cleanup
From
: Petr Vorel <pvorel@xxxxxxx>
[PATCH v3 0/4] LTP reproducer on broken IMA on overlayfs
From
: Petr Vorel <pvorel@xxxxxxx>
Re: [PATCH v7 0/3] add new ima hook ima_kexec_cmdline to measure kexec boot cmdline args
From
: prakhar srivastava <prsriva02@xxxxxxxxx>
Re: [PATCH 0/2] [IMA] Measure public keys of BuiltIn Trusted Keys
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 3/3] powerpc: Add support to initialize ima policy rules
From
: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
[PATCH v4 3/3] powerpc: Add support to initialize ima policy rules
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v4 2/3] powerpc/powernv: detect the secure boot mode of the system
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v4 1/3] powerpc/powernv: Add OPAL API interface to get secureboot state
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v4 0/3] powerpc: Enabling IMA arch specific secure boot policies
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
Re: [PATCH v7 0/3] add new ima hook ima_kexec_cmdline to measure kexec boot cmdline args
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH -next] ima: Make arch_policy_entry static
From
: YueHaibing <yuehaibing@xxxxxxxxxx>
Re: [PATCH 0/2] [IMA] Measure public keys of BuiltIn Trusted Keys
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[PATCH v11 11/13] ima: Define ima-modsig template
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v11 13/13] ima: Allow template= option for appraise rules as well
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v11 12/13] ima: Store the measurement again when appraising a modsig
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v11 05/13] integrity: Select CONFIG_KEYS instead of depending on it
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v11 09/13] ima: Implement support for module-style appended signatures
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v11 10/13] ima: Collect modsig
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v11 08/13] ima: Factor xattr_verify() out of ima_appraise_measurement()
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v11 07/13] ima: Add modsig appraise_type option for module-style appended signatures
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v11 06/13] ima: Use designated initializers for struct ima_event_data
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v11 04/13] integrity: Introduce struct evm_xattr
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v11 03/13] PKCS#7: Introduce pkcs7_get_digest()
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v11 02/13] PKCS#7: Refactor verify_pkcs7_signature()
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v11 01/13] MODSIGN: Export module signature definitions
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
[PATCH v11 00/13] Appended signatures support for IMA appraisal
From
: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
Re: [RFC PATCH v3 1/1] Add dm verity root hash pkcs7 sig validation
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH v3 3/3] powerpc: Add support to initialize ima policy rules
From
: Satheesh Rajendran <sathnaga@xxxxxxxxxxxxxxxxxx>
Re: [RFC PATCH v3 1/1] Add dm verity root hash pkcs7 sig validation
From
: Jaskaran Singh Khurana <jaskarankhurana@xxxxxxxxxxxxxxxxxxx>
[PATCH] tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations
From
: Douglas Anderson <dianders@xxxxxxxxxxxx>
Re: [RFC PATCH v3 1/1] Add dm verity root hash pkcs7 sig validation
From
: Jaskaran Singh Khurana <jaskarankhurana@xxxxxxxxxxxxxxxxxxx>
[PATCH v3 3/3] powerpc: Add support to initialize ima policy rules
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v3 2/3] powerpc/powernv: detect the secure boot mode of the system
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v3 1/3] powerpc/powernv: Add OPAL API interface to get secureboot state
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v3 0/3] powerpc: Enabling IMA arch specific secure boot policies
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
Re: [PATCH V2 1/2] Abstract out support for locating an EFI config table
From
: Matthew Garrett <mjg59@xxxxxxxxxx>
Re: [PATCH 0/2] [IMA] Measure public keys of BuiltIn Trusted Keys
From
: Lakshmi <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH V2 1/2] Abstract out support for locating an EFI config table
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH 0/2] [IMA] Measure public keys of BuiltIn Trusted Keys
From
: Jordan Hand <jorhand@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH] efi: Fix TPM code build failure on ARM
From
: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
Re: [PATCH 1/2] vfs: replace i_readcount with a biased i_count
From
: Miklos Szeredi <miklos@xxxxxxxxxx>
Re: [PATCH 1/2] LSM: switch to blocking policy update notifiers
From
: Janne Karhunen <janne.karhunen@xxxxxxxxx>
[PATCH 2/2] locks: eliminate false positive conflicts for write lease
From
: Amir Goldstein <amir73il@xxxxxxxxx>
[PATCH 1/2] vfs: replace i_readcount with a biased i_count
From
: Amir Goldstein <amir73il@xxxxxxxxx>
[PATCH 0/2] Fix write leases on overlayfs
From
: Amir Goldstein <amir73il@xxxxxxxxx>
Re: [RFC PATCH v3 1/1] Add dm verity root hash pkcs7 sig validation
From
: Milan Broz <gmazyland@xxxxxxxxx>
Re: [RFC PATCH v3 0/1] Add dm verity root hash pkcs7 sig validation.
From
: Milan Broz <gmazyland@xxxxxxxxx>
[RFC PATCH v3 1/1] Add dm verity root hash pkcs7 sig validation
From
: Jaskaran Khurana <jaskarankhurana@xxxxxxxxxxxxxxxxxxx>
[RFC PATCH v3 0/1] Add dm verity root hash pkcs7 sig validation.
From
: Jaskaran Khurana <jaskarankhurana@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH 1/2] LSM: switch to blocking policy update notifiers
From
: James Morris <jmorris@xxxxxxxxx>
Re: [PATCH V2 2/2] tpm: Don't duplicate events from the final event log in the TCG2 log
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Re: [PATCH V2 1/2] Abstract out support for locating an EFI config table
From
: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
[PATCH V2 2/2] tpm: Don't duplicate events from the final event log in the TCG2 log
From
: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
[PATCH V2 1/2] Abstract out support for locating an EFI config table
From
: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
[PATCH] x86/ima: fix the Kconfig dependency for IMA_ARCH_POLICY
From
: Nayna Jain <nayna@xxxxxxxxxxxxx>
[PATCH v3 11/20] docs: security: trusted-encrypted.rst: fix code-block tag
From
: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
Re: [PATCH 0/2] [IMA] Measure public keys of BuiltIn Trusted Keys
From
: Lakshmi <nramas@xxxxxxxxxxxxxxxxxxx>
Re: [PATCH v3 2/2] ima: add enforce-evm and log-evm modes to strictly check EVM status
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 2/2] ima: add enforce-evm and log-evm modes to strictly check EVM status
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v3 2/2] ima: add enforce-evm and log-evm modes to strictly check EVM status
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
Re: [PATCH v3 2/2] ima: add enforce-evm and log-evm modes to strictly check EVM status
From
: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
Re: [PATCH v3 2/2] ima: add enforce-evm and log-evm modes to strictly check EVM status
From
: Mimi Zohar <zohar@xxxxxxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]