Linux Integrity
[Prev Page][Next Page]
- [PATCH v6 1/3] Add a new ima hook ima_kexec_cmdline to measure cmdline args
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH v6 3/3] call ima_kexec_cmdline to measure the cmdline args
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH v6 2/3] add a new ima template field buf
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH v6 0/3] add new ima hook ima_kexec_cmdline to measure kexec boot cmdline args
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- Re: [PATCH 0/2] public key: IMA signer logging: Log public key of IMA Signature signer in IMA log
- From: Lakshmi <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V3 6/6] IMA: Allow profiles to define the desired IMA template
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 4/4] ima: only audit failed appraisal verifications
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/4] ima: don't ignore INTEGRITY_UNKNOWN EVM status
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/4] evm: reset status in evm_inode_post_setattr()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/4] evm: check hash algorithm passed to init_desc()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH V3 6/6] IMA: Allow profiles to define the desired IMA template
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH V7 0/4] Add support for crypto agile logs
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V7 1/4] tpm: Abstract crypto agile event size calculations
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V7 3/4] tpm: Append the final event log to the TPM event log
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V7 4/4] efi: Attempt to get the TCG2 event log in the boot stub
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V7 2/4] tpm: Reserve the TPM final events table
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [PATCH V6 0/4] Add support for crypto agile TPM event logs
- From: Bartosz Szczepanek <bsz@xxxxxxxxxxxx>
- Re: [PATCH v3 1/2] ftpm: firmware TPM running in TEE
- From: Igor Opaniuk <igor.opaniuk@xxxxxxxxx>
- [PATCH] x86/ima: check EFI SetupMode too
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] x86/ima: check EFI SetupMode too
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/3 v5] add a new template field buf to contain the buffer
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v3 1/2] ftpm: firmware TPM running in TEE
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] initramfs: introduce do_readxattrs()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v3 2/2] initramfs: introduce do_readxattrs()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v3 2/2] initramfs: introduce do_readxattrs()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH V3 1/6] VFS: Add a call to obtain a file's hash
- From: Johannes Thumshirn <jthumshirn@xxxxxxx>
- Re: [PATCH v3 0/2] ftpm: a firmware based TPM driver
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH V6 4/4] efi: Attempt to get the TCG2 event log in the boot stub
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V3 1/6] VFS: Add a call to obtain a file's hash
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH V3 5/6] IMA: Add a ima-vfs-sig measurement template
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v3 2/2] initramfs: introduce do_readxattrs()
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v3 2/2] initramfs: introduce do_readxattrs()
- From: Rob Landley <rob@xxxxxxxxxxx>
- Re: [PATCH v3 2/2] initramfs: introduce do_readxattrs()
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH V3 6/6] IMA: Allow profiles to define the desired IMA template
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/3 v5] add a new template field buf to contain the buffer
- From: prakhar srivastava <prsriva02@xxxxxxxxx>
- Re: [PATCH v3 2/2] initramfs: introduce do_readxattrs()
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v3 2/2] initramfs: introduce do_readxattrs()
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH v3 2/2] initramfs: introduce do_readxattrs()
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH v3 2/2] initramfs: introduce do_readxattrs()
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- [PATCH V6 0/4] Add support for crypto agile TPM event logs
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V6 3/4] tpm: Append the final event log to the TPM event log
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V6 1/4] tpm: Abstract crypto agile event size calculations
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V6 4/4] efi: Attempt to get the TCG2 event log in the boot stub
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V6 2/4] tpm: Reserve the TPM final events table
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V3 6/6] IMA: Allow profiles to define the desired IMA template
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V3 5/6] IMA: Add a ima-vfs-sig measurement template
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V3 4/6] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V3 3/6] IMA: Allow rule matching on filesystem subtype
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V3 2/6] FUSE: Allow filesystems to provide gethash methods
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V3 1/6] VFS: Add a call to obtain a file's hash
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V3 0/6] IMA: Support asking the VFS for a file hash
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [PATCH v3 2/2] initramfs: introduce do_readxattrs()
- From: Rob Landley <rob@xxxxxxxxxxx>
- Re: [PATCH v3 2/2] initramfs: introduce do_readxattrs()
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH v3 2/2] initramfs: introduce do_readxattrs()
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH v3 2/2] initramfs: introduce do_readxattrs()
- RE: [PATCH v3 0/2] ftpm: a firmware based TPM driver
- From: Thirupathaiah Annapureddy <thiruan@xxxxxxxxxxxxx>
- [PATCH v3 2/2] initramfs: introduce do_readxattrs()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 1/2] initramfs: set extended attributes
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 0/2] initramfs: add support for xattrs in the initial ram disk
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v2 0/3] LTP reproducer on broken IMA on overlayfs
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH] ima: skip verifying TPM 2.0 PCR values
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 0/2] public key: IMA signer logging: Log public key of IMA Signature signer in IMA log
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH] ima: skip verifying TPM 2.0 PCR values
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] ftpm: firmware TPM running in TEE
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH] ima: skip verifying TPM 2.0 PCR values
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH] ima: skip verifying TPM 2.0 PCR values
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] LTP reproducer on broken IMA on overlayfs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] LTP reproducer on broken IMA on overlayfs
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v3 0/2] ftpm: a firmware based TPM driver
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH] ima: skip verifying TPM 2.0 PCR values
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 0/2] public key: IMA signer logging: Log public key of IMA Signature signer in IMA log
- From: Lakshmi <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] ima: don't ignore INTEGRITY_UNKNOWN EVM status
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH 3/4] ima: don't ignore INTEGRITY_UNKNOWN EVM status
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 0/2] public key: IMA signer logging: Log public key of IMA Signature signer in IMA log
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] LTP reproducer on broken IMA on overlayfs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] ima: skip verifying TPM 2.0 PCR values
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: [PATCH v3 0/2] ftpm: a firmware based TPM driver
- From: Thirupathaiah Annapureddy <thiruan@xxxxxxxxxxxxx>
- [PATCH 4/4] ima: only audit failed appraisal verifications
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 3/4] ima: don't ignore INTEGRITY_UNKNOWN EVM status
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 2/4] evm: reset status in evm_inode_post_setattr()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 1/4] evm: check hash algorithm passed to init_desc()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH 0/2] public key: IMA signer logging: Log public key of IMA Signature signer in IMA log
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v3 0/2] ftpm: a firmware based TPM driver
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- RE: [PATCH v3 0/2] ftpm: a firmware based TPM driver
- From: Thirupathaiah Annapureddy <thiruan@xxxxxxxxxxxxx>
- Re: [PATCH 0/2] public key: IMA signer logging: Log public key of IMA Signature signer in IMA log
- From: Lakshmi <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH v2 0/3] LTP reproducer on broken IMA on overlayfs
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v2 0/3] LTP reproducer on broken IMA on overlayfs
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2 3/3] ima: Add overlay test
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v3 2/2] ftpm: add documentation for ftpm driver
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] ftpm: firmware TPM running in TEE
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v2] ima: fix wrong signed policy requirement when not appraising
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2 0/3] LTP reproducer on broken IMA on overlayfs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] ftpm: a firmware based TPM driver
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Rob Landley <rob@xxxxxxxxxxx>
- Re: [PATCH] ima: fix wrong signed policy requirement when not appraising
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] ima: fix wrong signed policy requirement when not appraising
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH] ima: fix wrong signed policy requirement when not appraising
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: IMA signature generated by evmctl has unexpected key identifier
- From: Lakshmi <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: IMA signature generated by evmctl has unexpected key identifier
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] ftpm: a firmware based TPM driver
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v2 0/3] LTP reproducer on broken IMA on overlayfs
- From: Ignaz Forster <iforster@xxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] ima: Add overlay test
- From: Ignaz Forster <iforster@xxxxxxx>
- Re: IMA signature generated by evmctl has unexpected key identifier
- From: Lakshmi <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH 0/2] public key: IMA signer logging: Log public key of IMA Signature signer in IMA log
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Whitelisting with IMA
- From: m3hm00d <f.m3hm00d@xxxxxxxxx>
- Re: IMA signature generated by evmctl has unexpected key identifier
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: IMA signature generated by evmctl has unexpected key identifier
- From: Lakshmi <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] public key: IMA signer logging: Add a new template ima-sigkey to store/read the public, key of ima signature signer
- From: Lakshmi <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] public key: IMA signer logging: Add support for querying public key from a given key
- From: Lakshmi <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/2] public key: IMA signer logging: Log public key of IMA Signature signer in IMA log
- From: Lakshmi <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Rob Landley <rob@xxxxxxxxxxx>
- Re: [PATCH 3/3 v5] call ima_kexec_cmdline from kexec_file_load path
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH 1/3 v5] add a new ima hook and policy to measure the cmdline
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/3 v5] add a new template field buf to contain the buffer
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v2 0/3] LTP reproducer on broken IMA on overlayfs
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v10 09/12] ima: Implement support for module-style appended signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Rob Landley <rob@xxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Rob Landley <rob@xxxxxxxxxxx>
- Re: [PATCH 2/3 v5] add a new template field buf to contain the buffer
- From: prakhar srivastava <prsriva02@xxxxxxxxx>
- Re: [PATCH 1/3 v5] add a new ima hook and policy to measure the cmdline
- From: prakhar srivastava <prsriva02@xxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Arvind Sankar <niveditas98@xxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Arvind Sankar <niveditas98@xxxxxxxxx>
- Re: [PATCH 1/3 v5] add a new ima hook and policy to measure the cmdline
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/3 v5] add a new template field buf to contain the buffer
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v2 3/3] initramfs: introduce do_readxattrs()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 5/5] integrity: measure the file on msync
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- [PATCH 4/5] integrity: measure the file on sync
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- [PATCH 3/5] integrity: update the file measurement on write
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- [PATCH 1/5] integrity: keep the integrity state of open files up to date
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- [PATCH 2/5] integrity: update the file measurement on truncate
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- [PATCH 0/5] integrity: improve ima measurement accuracy
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Whitelisting with IMA
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Rob Landley <rob@xxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH 03/16] lib,treewide: add new match_string() helper/macro
- From: "Ardelean, Alexandru" <alexandru.Ardelean@xxxxxxxxxx>
- IMA signature generated by evmctl has unexpected key identifier
- From: nramas@xxxxxxxxxxxxxxxxxxx
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Arvind Sankar <niveditas98@xxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Rob Landley <rob@xxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- Whitelisting with IMA
- From: m3hm00d <f.m3hm00d@xxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Rob Landley <rob@xxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Rob Landley <rob@xxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Carrying over the ima log during kexec_file_load
- From: prakhar srivastava <prsriva02@xxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 2/3 v5] add a new template field buf to contain the buffer
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH 3/3 v5] call ima_kexec_cmdline from kexec_file_load path
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH 1/3 v5] add a new ima hook and policy to measure the cmdline
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH 0/3 v5] Kexec cmdline bufffer measure
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH 2/3 v5] add a new template field buf to contain the buffer
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH 1/3 v5] add a new ima hook and policy to measure the cmdline
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH 3/3 v5] call ima_kexec_cmdline from kexec_file_load path
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH 0/3 v5] Kexec cmdline bufffer measure
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- Re: [PATCH v2 3/3] initramfs: introduce do_readxattrs()
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] fs: add ksys_lsetxattr() wrapper
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Rob Landley <rob@xxxxxxxxxxx>
- Re: [PATCH 03/16] lib,treewide: add new match_string() helper/macro
- From: "andriy.shevchenko@xxxxxxxxxxxxxxx" <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 03/16] lib,treewide: add new match_string() helper/macro
- From: "Ardelean, Alexandru" <alexandru.Ardelean@xxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v10 11/12] ima: Define ima-modsig template
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 09/12] ima: Implement support for module-style appended signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Rob Landley <rob@xxxxxxxxxxx>
- Re: [PATCH v10 08/12] ima: Factor xattr_verify() out of ima_appraise_measurement()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 06/12] ima: Use designated initializers for struct ima_event_data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 02/12] PKCS#7: Refactor verify_pkcs7_signature()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 03/12] PKCS#7: Introduce pkcs7_get_digest()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 01/12] MODSIGN: Export module signature definitions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 3/3] initramfs: introduce do_readxattrs()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 2/3] initramfs: set extended attributes
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 1/3] fs: add ksys_lsetxattr() wrapper
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: setfattr to set security.ima fails with error "Invalid argument"
- From: Ignaz Forster <iforster@xxxxxxx>
- Re: [PATCH 03/16] lib,treewide: add new match_string() helper/macro
- From: "Ardelean, Alexandru" <alexandru.Ardelean@xxxxxxxxxx>
- Re: [PATCH 03/16] lib,treewide: add new match_string() helper/macro
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 03/16] lib,treewide: add new match_string() helper/macro
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] ftpm: a firmware based TPM driver
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 09/16] mmc: sdhci-xenon: use new match_string() helper/macro
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [PATCH 00/16] treewide: fix match_string() helper when array size
- From: Alexandru Ardelean <alexandru.ardelean@xxxxxxxxxx>
- [PATCH 01/16] lib: fix match_string() helper when array size is positive
- From: Alexandru Ardelean <alexandru.ardelean@xxxxxxxxxx>
- [PATCH 05/16] ALSA: oxygen: use new match_string() helper/macro
- From: Alexandru Ardelean <alexandru.ardelean@xxxxxxxxxx>
- [PATCH 04/16] powerpc/xmon: use new match_string() helper/macro
- From: Alexandru Ardelean <alexandru.ardelean@xxxxxxxxxx>
- [PATCH 03/16] lib,treewide: add new match_string() helper/macro
- From: Alexandru Ardelean <alexandru.ardelean@xxxxxxxxxx>
- [PATCH 02/16] treewide: rename match_string() -> __match_string()
- From: Alexandru Ardelean <alexandru.ardelean@xxxxxxxxxx>
- [PATCH 07/16] device connection: use new match_string() helper/macro
- From: Alexandru Ardelean <alexandru.ardelean@xxxxxxxxxx>
- [PATCH 10/16] pinctrl: armada-37xx: use new match_string() helper/macro
- From: Alexandru Ardelean <alexandru.ardelean@xxxxxxxxxx>
- [PATCH 09/16] mmc: sdhci-xenon: use new match_string() helper/macro
- From: Alexandru Ardelean <alexandru.ardelean@xxxxxxxxxx>
- [PATCH 08/16] cpufreq/intel_pstate: remove NULL entry + use match_string()
- From: Alexandru Ardelean <alexandru.ardelean@xxxxxxxxxx>
- [PATCH 11/16] mm/vmpressure.c: use new match_string() helper/macro
- From: Alexandru Ardelean <alexandru.ardelean@xxxxxxxxxx>
- [PATCH 12/16] rdmacg: use new match_string() helper/macro
- From: Alexandru Ardelean <alexandru.ardelean@xxxxxxxxxx>
- Re: [PATCH 01/16] lib: fix match_string() helper on -1 array size
- From: "Ardelean, Alexandru" <alexandru.Ardelean@xxxxxxxxxx>
- [PATCH 15/16] video: fbdev: pxafb: use new match_string() helper/macro
- From: Alexandru Ardelean <alexandru.ardelean@xxxxxxxxxx>
- [PATCH 14/16] staging: gdm724x: use new match_string() helper/macro
- From: Alexandru Ardelean <alexandru.ardelean@xxxxxxxxxx>
- [PATCH 16/16] sched: debug: use new match_string() helper/macro
- From: Alexandru Ardelean <alexandru.ardelean@xxxxxxxxxx>
- [PATCH 13/16] drm/edid: use new match_string() helper/macro
- From: Alexandru Ardelean <alexandru.ardelean@xxxxxxxxxx>
- [PATCH 06/16] x86/mtrr: use new match_string() helper + add gaps == minor fix
- From: Alexandru Ardelean <alexandru.ardelean@xxxxxxxxxx>
- [PATCH 01/16] lib: fix match_string() helper on -1 array size
- From: Alexandru Ardelean <alexandru.ardelean@xxxxxxxxxx>
- Re: [PATCH v3 0/2] ftpm: a firmware based TPM driver
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH] integrity: keep the integrity state of open files up to date
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: [PATCH v3 0/2] ftpm: a firmware based TPM driver
- From: Daniel Thompson <daniel.thompson@xxxxxxxxxx>
- Re: [PATCH v3 0/2] ftpm: a firmware based TPM driver
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v3 0/2] ftpm: a firmware based TPM driver
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH] integrity: keep the integrity state of open files up to date
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] integrity: make 'sync' update the inode integrity state
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- [PATCH AUTOSEL 4.14 41/95] ima: open a new file instance if no read permissions
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Bartosz Szczepanek <bsz@xxxxxxxxxxxx>
- [PATCH 2/3] ima: prevent a file already mmap'ed write to be mmap'ed execute
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 1/3] ima: verify mprotect change is consistent with mmap policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 3/3] ima: prevent a file already mmap'ed read|execute to be mmap'ed write
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 0/3] ima: addressing mmap/mprotect concerns
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Friendly reminder
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] integrity: make 'sync' update the inode integrity state
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- [PATCH] integrity: keep the integrity state of open files up to date
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: [PATCH 5/5 v4] removed the LSM hook made available, and renamed the ima_policy to be KEXEC_CMDLINE
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/5 v4] add the buffer to the xattr
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/5 v4] added a new ima policy func buffer_check, and ima hook to measure the buffer hash into ima
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 0/5 v4] Kexec cmdline bufffer measure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 1/5 v4] added a new ima policy func buffer_check, and ima hook to measure the buffer hash into ima
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH 2/5 v4] add the buffer to the xattr
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH 3/5 v4] add kexec_cmdline used to ima
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH 4/5 v4] added LSM hook to call ima_buffer_check
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH 5/5 v4] removed the LSM hook made available, and renamed the ima_policy to be KEXEC_CMDLINE
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH 0/5 v4] Kexec cmdline bufffer measure
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- setfattr to set security.ima fails with error "Invalid argument"
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] kexec_buffer measure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] integrity: make 'sync' update the inode integrity state
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ANNOUNCE][CFP] Linux Security Summit Europe 2019
- From: Elena Reshetova <elena.reshetova@xxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] kexec_buffer measure
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v3 3/4] add kexec_cmdline used to ima
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 4/4] added LSM hook to call ima_buffer_check
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 3/4] add kexec_cmdline used to ima
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/4] add the buffer to the xattr
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/4] added a new ima policy func buffer_check, and ima hook to measure the buffer hash into ima
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] kexec_buffer measure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] kexec_buffer measure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] kexec_buffer measure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4] tpm: fix an invalid condition in tpm_common_poll
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Bartosz Szczepanek <barteks7r@xxxxxxxxx>
- Re: linux-tpmdd self signed kernel failing to boot with secreboot on
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: linux-tpmdd self signed kernel failing to boot with secreboot on
- From: Jordan Hand <jorhand@xxxxxxxxxxxxxxxxxxx>
- Re: linux-tpmdd self signed kernel failing to boot with secreboot on
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: linux-tpmdd self signed kernel failing to boot with secreboot on
- From: Jordan Hand <jorhand@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Bartosz Szczepanek <bsz@xxxxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: linux-tpmdd self signed kernel failing to boot with secreboot on
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH v3 2/4] add the buffer to the xattr
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH v3 1/4] added a new ima policy func buffer_check, and ima hook to measure the buffer hash into ima
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH v3 3/4] add kexec_cmdline used to ima
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH v3 4/4] added LSM hook to call ima_buffer_check
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH v3 0/4] Add a new ima_hook buffer_check to measure buffers critical for attestation
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- Re: linux-tpmdd self signed kernel failing to boot with secreboot on
- From: Jordan Hand <jorhand@xxxxxxxxxxxxxxxxxxx>
- Re: linux-tpmdd self signed kernel failing to boot with secreboot on
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: linux-tpmdd self signed kernel failing to boot with secreboot on
- From: Jordan Hand <jorhand@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 00/24] x86: text_poke() fixes and executable lockdowns
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v6 00/24] x86: text_poke() fixes and executable lockdowns
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- [PATCH v6 02/24] x86/jump_label: Use text_poke_early() during early init
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 04/24] x86/mm: Save debug registers when loading a temporary mm
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 01/24] Fix "x86/alternatives: Lockdep-enforce text_mutex in text_poke*()"
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 05/24] uprobes: Initialize uprobes earlier
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 07/24] x86/alternative: Initialize temporary mm for patching
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 06/24] fork: Provide a function for copying init_mm
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 03/24] x86/mm: Introduce temporary mm structs
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 08/24] x86/alternative: Use temporary mm for text poking
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 11/24] x86/kprobes: Set instruction page as executable
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 09/24] x86/kgdb: Avoid redundant comparison of patched code
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 13/24] x86/jump-label: Remove support for custom poker
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 14/24] x86/alternative: Remove the return value of text_poke_*()
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 12/24] x86/module: Avoid breaking W^X while loading modules
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 10/24] x86/ftrace: Set trampoline pages as executable
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 15/24] x86/mm/cpa: Add set_direct_map_ functions
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 17/24] vmalloc: Add flag for free of special permsissions
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 18/24] modules: Use vmalloc special flag
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 16/24] mm: Make hibernate handle unmapped pages
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 20/24] x86/ftrace: Use vmalloc special flag
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 19/24] bpf: Use vmalloc special flag
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 22/24] x86/alternative: Comment about module removal races
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 23/24] mm/tlb: Provide default nmi_uaccess_okay()
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 24/24] bpf: Fail bpf_probe_write_user() while mm is switched
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 21/24] x86/kprobes: Use vmalloc special flag
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 00/24] x86: text_poke() fixes and executable lockdowns
- From: nadav.amit@xxxxxxxxx
- [PATCH AUTOSEL 5.0 52/79] KEYS: trusted: fix -Wvarags warning
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.0 51/79] tpm: fix an invalid condition in tpm_common_poll
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v5 14/23] x86/mm/cpa: Add set_direct_map_ functions
- From: Nadav Amit <namit@xxxxxxxxxx>
- Re: [PATCH v5 14/23] x86/mm/cpa: Add set_direct_map_ functions
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 00/23] x86: text_poke() fixes and executable lockdowns
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v5 07/23] x86/alternative: Use temporary mm for text poking
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 04/23] x86/mm: Save debug registers when loading a temporary mm
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 00/23] x86: text_poke() fixes and executable lockdowns
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 15/23] mm: Make hibernate handle unmapped pages
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 22/23] mm/tlb: Provide default nmi_uaccess_okay()
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 19/23] x86/ftrace: Use vmalloc special flag
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 05/23] fork: Provide a function for copying init_mm
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 11/23] x86/module: Avoid breaking W^X while loading modules
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 03/23] x86/mm: Introduce temporary mm structs
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 01/23] Fix "x86/alternatives: Lockdep-enforce text_mutex in text_poke*()"
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 06/23] x86/alternative: Initialize temporary mm for patching
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 09/23] x86/ftrace: Set trampoline pages as executable
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 18/23] bpf: Use vmalloc special flag
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 17/23] modules: Use vmalloc special flag
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 12/23] x86/jump-label: Remove support for custom poker
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 16/23] vmalloc: Add flag for free of special permsissions
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 21/23] x86/alternative: Comment about module removal races
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 20/23] x86/kprobes: Use vmalloc special flag
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 23/23] bpf: Fail bpf_probe_write_user() while mm is switched
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 13/23] x86/alternative: Remove the return value of text_poke_*()
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 10/23] x86/kprobes: Set instruction page as executable
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 14/23] x86/mm/cpa: Add set_direct_map_ functions
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 08/23] x86/kgdb: Avoid redundant comparison of patched code
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 02/23] x86/jump_label: Use text_poke_early() during early init
- From: Nadav Amit <namit@xxxxxxxxxx>
- Re: [PATCH v2 2/5 RFC] use event name instead of enum to make the call generic
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v2 2/5 RFC] use event name instead of enum to make the call generic
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/5 RFC] use event name instead of enum to make the call generic
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/5 RFC] use event name instead of enum to make the call generic
- From: James Morris <jmorris@xxxxxxxxx>
- Re: linux-tpmdd self signed kernel failing to boot with secreboot on
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v4 16/23] vmalloc: Add flag for free of special permsissions
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v4 00/23] Merge text_poke fixes and executable lockdowns
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v4 00/23] Merge text_poke fixes and executable lockdowns
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v4 16/23] vmalloc: Add flag for free of special permsissions
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v2] KEYS: Make use of platform keyring for module signature verify
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: Can we enforce "IMA Policy" based on file type
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 19/23] x86/ftrace: Use vmalloc special flag
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 2/5 RFC] use event name instead of enum to make the call generic
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/5 RFC] use event name instead of enum to make the call generic
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 19/23] x86/ftrace: Use vmalloc special flag
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH v2] KEYS: Make use of platform keyring for module signature verify
- From: Jeremy Cline <jcline@xxxxxxxxxx>
- Re: [PATCH v4 04/23] x86/mm: Save DRs when loading a temporary mm
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v4 03/23] x86/mm: Introduce temporary mm structs
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v4 03/23] x86/mm: Introduce temporary mm structs
- From: Nadav Amit <nadav.amit@xxxxxxxxx>
- Re: [PATCH v2 2/5 RFC] use event name instead of enum to make the call generic
- From: prsriva <prsriva@xxxxxxxxxxxxxxxxxxx>
- RE: Can we enforce "IMA Policy" based on file type
- From: Kavitha Sivagnanam <kavi@xxxxxxxxxxx>
- Re: [PATCH v4 04/23] x86/mm: Save DRs when loading a temporary mm
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v4 03/23] x86/mm: Introduce temporary mm structs
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] integrity: make 'sync' update the inode integrity state
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: [PATCH] x86/ima: Check EFI_RUNTIME_SERVICES before using
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] integrity: make 'sync' update the inode integrity state
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Can we enforce "IMA Policy" based on file type
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] KEYS: Make use of platform keyring for module signature verify
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/5 RFC] use event name instead of enum to make the call generic
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] integrity: make 'sync' update the inode integrity state
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- linux-tpmdd self signed kernel failing to boot with secreboot on
- From: Jordan <jorhand@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] KEYS: Make use of platform keyring for module signature verify
- From: Robert Holmes <robeholmes@xxxxxxxxx>
- [PATCH v2] KEYS: Make use of platform keyring for module signature verify
- From: Robert Holmes <robeholmes@xxxxxxxxx>
- Re: [PATCH v4] tpm: fix an invalid condition in tpm_common_poll
- From: Jonas Witschel <diabonas@xxxxxx>
- [PATCH v1 1/1] Return the verified kernel image signature in kexec_file_load
- From: nramas@xxxxxxxxxxxxxxxxxxx
- Re: [PATCH v4] tpm: fix an invalid condition in tpm_common_poll
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH v2 3/5 RFC] since cmdline args can be same for multiple kexec, log entry hash will collide. Prepend the kernel file name to the cmdline args to distinguish between cmdline args passed to subsequent kexec calls
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH v2 2/5 RFC] use event name instead of enum to make the call generic
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH v2 5/5 RFC] add the buffer to the event data in ima free entry data if store_template failed added check in templates for buffer
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH v2 4/5 RFC] added a buffer_check LSM hook
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH v2 1/5 RFC] added ima hook for buffer, being enabled as a policy
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH] x86/ima: Check EFI_RUNTIME_SERVICES before using
- From: Scott Wood <swood@xxxxxxxxxx>
- Re: [PATCH v4] tpm: fix an invalid condition in tpm_common_poll
- From: Jonas Witschel <diabonas@xxxxxx>
- Re: Can we enforce "IMA Policy" based on file type
- From: Kavitha Sivagnanam <kavi@xxxxxxxxxxx>
- Re: Can we enforce "IMA Policy" based on file type
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] kexec_buffer measure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4 02/23] x86/jump_label: Use text_poke_early() during early init
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 01/23] Fix "x86/alternatives: Lockdep-enforce text_mutex in text_poke*()"
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 05/23] fork: Provide a function for copying init_mm
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 04/23] x86/mm: Save DRs when loading a temporary mm
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 07/23] x86/alternative: Use temporary mm for text poking
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 09/23] x86/ftrace: Set trampoline pages as executable
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 08/23] x86/kgdb: Avoid redundant comparison of patched code
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 03/23] x86/mm: Introduce temporary mm structs
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 06/23] x86/alternative: Initialize temporary mm for patching
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 13/23] x86/alternative: Remove the return value of text_poke_*()
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 10/23] x86/kprobes: Set instruction page as executable
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 11/23] x86/module: Avoid breaking W^X while loading modules
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 12/23] x86/jump-label: Remove support for custom poker
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 16/23] vmalloc: Add flag for free of special permsissions
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 17/23] modules: Use vmalloc special flag
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 19/23] x86/ftrace: Use vmalloc special flag
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 18/23] bpf: Use vmalloc special flag
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 15/23] mm: Make hibernate handle unmapped pages
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 20/23] x86/kprobes: Use vmalloc special flag
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 21/23] x86/alternative: Comment about module removal races
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 22/23] tlb: provide default nmi_uaccess_okay()
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 23/23] bpf: Fail bpf_probe_write_user() while mm is switched
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 14/23] x86/mm/cpa: Add set_direct_map_ functions
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 00/23] Merge text_poke fixes and executable lockdowns
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH] kexec_buffer measure
- From: prakhar srivastava <prsriva02@xxxxxxxxx>
- [PATCH v2 3/3 RFC] since cmdline args can be same for multiple kexec, log entry hash will collide. Prepend the kernel file name to the cmdline args to distinguish between cmdline args passed to subsequent kexec calls
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH v2 2/3 RFC] use event name instead of enum to make the call generic
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH v2 1/3 RFC] added ima hook for buffer, being enabled as a policy
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- Can we enforce "IMA Policy" based on file type
- From: Kavitha Sivagnanam <kavi@xxxxxxxxxxx>
- Re: [PATCH v3 09/26] compat_ioctl: move drivers to compat_ptr_ioctl
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v9 00/10] crypto: add EC-RDSA (GOST 34.10) algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 09/26] compat_ioctl: move drivers to compat_ptr_ioctl
- From: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
- [PATCH v10 11/12] ima: Define ima-modsig template
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v10 12/12] ima: Store the measurement again when appraising a modsig
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v10 10/12] ima: Collect modsig
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v10 09/12] ima: Implement support for module-style appended signatures
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v10 08/12] ima: Factor xattr_verify() out of ima_appraise_measurement()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v10 07/12] ima: Add modsig appraise_type option for module-style appended signatures
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v10 06/12] ima: Use designated initializers for struct ima_event_data
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v10 05/12] integrity: Select CONFIG_KEYS instead of depending on it
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v10 04/12] integrity: Introduce struct evm_xattr
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v10 03/12] PKCS#7: Introduce pkcs7_get_digest()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v10 02/12] PKCS#7: Refactor verify_pkcs7_signature()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v10 01/12] MODSIGN: Export module signature definitions
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v10 00/12] Appended signatures support for IMA appraisal
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] ftpm: add documentation for ftpm driver
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: on leave next week
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] ftpm: add documentation for ftpm driver
- From: "Enrico Weigelt, metux IT consult" <lkml@xxxxxxxxx>
- Re: on leave next week
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- on leave next week
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 00/26] compat_ioctl: cleanups
- From: Douglas Gilbert <dgilbert@xxxxxxxxxxxx>
- Re: [PATCH v3 09/26] compat_ioctl: move drivers to compat_ptr_ioctl
- From: Jiri Kosina <jikos@xxxxxxxxxx>
- [PATCH v3 09/26] compat_ioctl: move drivers to compat_ptr_ioctl
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH v3 00/26] compat_ioctl: cleanups
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] kexec_buffer measure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 0/2] ftpm: a firmware based TPM driver
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH v3 1/2] ftpm: firmware TPM running in TEE
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH v3 2/2] ftpm: add documentation for ftpm driver
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH] efi: Include tpm_eventlog.h after asm/efi.h to avoid memcpy breakage
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] TCG2 log support build fixes for non-x86_64
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] MAINTAINERS: fix style in KEYS-TRUSTED entry
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v2] MAINTAINERS: fix style in KEYS-TRUSTED entry
- From: Lukas Bulwahn <lukas.bulwahn@xxxxxxxxx>
- Re: [GIT PULL] linux-integrity patches for Linux 5.2
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH] kexec_buffer measure
- From: prsriva02@xxxxxxxxx
- Re: [PATCH] integrity: make 'sync' update the inode integrity state
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- [GIT PULL] linux-integrity patches for Linux 5.2
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] ima: Call test's cleanup inside ima_setup.sh cleanup
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v9 05/10] X.509: parse public key parameters from x509 for akcipher
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- [PATCH v9 06/10] crypto: Kconfig - create Public-key cryptography section
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 05/10] X.509: parse public key parameters from x509 for akcipher
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 03/10] crypto: akcipher - new verify API for public key algorithms
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 02/10] crypto: rsa - unimplement sign/verify for raw RSA backends
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 09/10] crypto: ecrdsa - add EC-RDSA test vectors to testmgr
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 08/10] crypto: ecrdsa - add EC-RDSA (GOST 34.10) algorithm
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 10/10] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 07/10] crypto: ecc - make ecc into separate module
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 04/10] KEYS: do not kmemdup digest in {public,tpm}_key_verify_signature
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 01/10] crypto: akcipher - default implementations for request callbacks
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 00/10] crypto: add EC-RDSA (GOST 34.10) algorithm
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH] integrity: make 'sync' update the inode integrity state
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: [PATCH] integrity: make 'sync' update the inode integrity state
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] ima: Call test's cleanup inside ima_setup.sh cleanup
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: appraisal reset safety
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: [PATCH v2 1/3] ima: Call test's cleanup inside ima_setup.sh cleanup
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2 1/3] ima: Call test's cleanup inside ima_setup.sh cleanup
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: [PATCH v2 1/3] ftpm: dt-binding: add dts documentation for fTPM driver
- From: Thirupathaiah Annapureddy <thiruan@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] ftpm: dt-binding: add dts documentation for fTPM driver
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v2 1/3] ftpm: dt-binding: add dts documentation for fTPM driver
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH 2/2] ftpm: firmware TPM running in TEE
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v2 1/3] ftpm: dt-binding: add dts documentation for fTPM driver
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v2 1/3] ftpm: dt-binding: add dts documentation for fTPM driver
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- Re: [PATCH v2 1/3] ftpm: dt-binding: add dts documentation for fTPM driver
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH 2/2] ftpm: firmware TPM running in TEE
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH] integrity: make 'sync' update the inode integrity state
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: [PATCH 2/2] ftpm: firmware TPM running in TEE
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- [ANNOUNCE][CFP] Linux Security Summit North America 2019
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v2 1/3] ftpm: dt-binding: add dts documentation for fTPM driver
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- Re: [PATCH v2 2/3] ftpm: firmware TPM running in TEE
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH v2 1/3] ftpm: dt-binding: add dts documentation for fTPM driver
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH v2 2/3] ftpm: firmware TPM running in TEE
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH v2 3/3] ftpm: add documentation for ftpm driver
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH v2 0/3] ftpm: a firmware based TPM driver
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v4] tpm: fix an invalid condition in tpm_common_poll
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Regression in suspend-to-ram (TPM related) with 5.1-rc1 (BISECTED)
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Regression in suspend-to-ram (TPM related) with 5.1-rc1 (BISECTED)
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: appraisal reset safety
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: appraisal reset safety
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: appraisal reset safety
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: appraisal reset safety
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: appraisal reset safety
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- [PATCH v2 3/3] powerpc: Add support to initialize ima policy rules
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v2 2/3] powerpc/powernv: detect the secure boot mode of the system
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v2 1/3] powerpc/powernv: Add support for OPAL_SECVAR_GET
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v2 0/3] powerpc: Enabling secure boot on powernv systems - Part 1
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd fixes for Linux v5.1
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH ghau85 v1] ima: add support for AUDIT_INTEGRITY_EVM_XATTR records
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [GIT PULL] tpmdd fixes for Linux v5.1
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: appraisal reset safety
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: appraisal reset safety
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4] tpm: fix an invalid condition in tpm_common_poll
- From: Thibaut Sautereau <thibaut.sautereau@xxxxxxxxxxx>
- Re: appraisal reset safety
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: Regression in suspend-to-ram (TPM related) with 5.1-rc1 (BISECTED)
- From: Martin Kepplinger <martin.kepplinger@xxxxxxxxxxxxx>
- Re: Regression in suspend-to-ram (TPM related) with 5.1-rc1 (BISECTED)
- From: Paul Zimmerman <pauldzim@xxxxxxxxx>
- Re: Regression in suspend-to-ram (TPM related) with 5.1-rc1 (BISECTED)
- From: Martin Kepplinger <martin.kepplinger@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] ftpm: firmware TPM running in TEE
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: appraisal reset safety
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] selftests/kexec: update get_secureboot_mode
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 3/3] ima: Add overlay test
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v2 2/3] shell: Add $TST_DEVICE as default parameter to tst_umount
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v2 1/3] ima: Call test's cleanup inside ima_setup.sh cleanup
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v2 0/3] LTP reproducer on broken IMA on overlayfs
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH] selftests/kexec: update get_secureboot_mode
- From: Petr Vorel <pvorel@xxxxxxx>
- appraisal reset safety
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 3/3] ima: Add overlay test
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH] x86/ima: add missing include
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] doc/kernel-parameters.txt: Deprecate ima_appraise_tcb
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] ima: Add overlay test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] doc/kernel-parameters.txt: Deprecate ima_appraise_tcb
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 3/3] ima: Add overlay test
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH] TCG2 log support build fixes for non-x86_64
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 1/2] efi: Fix cast to pointer from integer of different size in TPM log code
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: Unable to suspend lenovo t61
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH 1/2] efi: Fix cast to pointer from integer of different size in TPM log code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi: Include tpm_eventlog.h after asm/efi.h to avoid memcpy breakage
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi: Include tpm_eventlog.h after asm/efi.h to avoid memcpy breakage
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] TCG2 log support build fixes for non-x86_64
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] tpm: Fix builds on platforms that lack early_memremap()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] efi: Fix cast to pointer from integer of different size in TPM log code
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Igor Zhbanov <i.zhbanov@xxxxxxxxxxxx>
- [PATCH V32 24/27] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 2/2] ima-evm-utils: try to load digest by its alias
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] ima-evm-utils: try to load digest by its alias
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] ima-evm-utils: try to load digest by its alias
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] ima-evm-utils: try to load digest by its alias
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH 2/2] ima-evm-utils: try to load digest by its alias
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] ima-evm-utils: try to load digest by its alias
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v3] ima-evm-utils: Rework openssl init
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] ima-evm-utils: try to load digest by its alias
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] efi: Include tpm_eventlog.h after asm/efi.h to avoid memcpy breakage
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Igor Zhbanov <i.zhbanov@xxxxxxxxxxxx>
- Re: [PATCH 2/2] ftpm: firmware TPM running in TEE
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 2/2] ftpm: firmware TPM running in TEE
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] ftpm: firmware TPM running in TEE
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] ftpm: dt-binding: add dts documentation for fTPM driver
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] tpm: Actually fail on TPM errors during "get random"
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Add support for TCG2 log format on UEFI systems
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Igor Zhbanov <i.zhbanov@xxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 1/2] efi: Fix cast to pointer from integer of different size in TPM log code
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] selftests/kexec: update get_secureboot_mode
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: [PATCH 1/2] efi: Fix cast to pointer from integer of different size in TPM log code
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Perez Yves-Alexis <yves-alexis.perez@xxxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] ftpm: firmware TPM running in TEE
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Igor Zhbanov <i.zhbanov@xxxxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH 1/2] efi: Fix cast to pointer from integer of different size in TPM log code
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH 2/2] tpm: Fix builds on platforms that lack early_memremap()
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH] TCG2 log support build fixes for non-x86_64
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] ftpm: firmware TPM running in TEE
- From: Stephen Hemminger <stephen@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] ftpm: dt-binding: add dts documentation for fTPM driver
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH 1/2] ftpm: dt-binding: add dts documentation for fTPM driver
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH 2/2] ftpm: firmware TPM running in TEE
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH 1/2] ftpm: dt-binding: add dts documentation for fTPM driver
- From: Sasha Levin <sashal@xxxxxxxxxx>
- RE: [PATCH v3] tpm: Actually fail on TPM errors during "get random"
- From: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
- [PATCH 1/4] powerpc/include: Override unneeded early ioremap functions
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- [PATCH 4/4] powerpc: Add support to initialize ima policy rules
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- [PATCH 3/4] powerpc/powernv: Detect the secure boot mode of the system
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- [PATCH 2/4] powerpc/powernv: Add support for OPAL secure variables
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- Re: Add support for TCG2 log format on UEFI systems
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v3] tpm: Actually fail on TPM errors during "get random"
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Add support for TCG2 log format on UEFI systems
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Add support for TCG2 log format on UEFI systems
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: Add support for TCG2 log format on UEFI systems
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] tpm: Actually fail on TPM errors during "get random"
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- RE: [PATCH v3] tpm: Actually fail on TPM errors during "get random"
- From: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
- Re: [PATCH v3] tpm: Actually fail on TPM errors during "get random"
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3] tpm: Actually fail on TPM errors during "get random"
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH v3] tpm: Actually fail on TPM errors during "get random"
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] tpm: Actually fail on TPM errors during "get random"
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Actually fail on TPM errors during "get random"
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Actually fail on TPM errors during "get random"
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v2] tpm: Actually fail on TPM errors during "get random"
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] tpm: Actually fail on TPM errors during "get random"
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] tpm: Actually fail on TPM errors during "get random"
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH] tpm: Actually fail on TPM errors during "get random"
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd fixes for Linux v5.1
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd fixes for Linux v5.1
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Igor Zhbanov <i.zhbanov@xxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [GIT PULL] tpmdd fixes for Linux v5.1
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Jordan Glover <Golden_Miller83@xxxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] ima: Add overlay test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Igor Zhbanov <i.zhbanov@xxxxxxxxxxxx>
- Re: [REGRESSION] 5.1-rc1: tpm_try_transmit: send(): error -5
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: turn on TPM on suspend for TPM 1.x
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] ima: Add overlay test
- From: Ignaz Forster <iforster@xxxxxxx>
- Re: [REGRESSION] 5.1-rc1: tpm_try_transmit: send(): error -5
- From: Domenico Andreoli <domenico.andreoli@xxxxxxxxx>
- Re: [PATCH] tpm: turn on TPM on suspend for TPM 1.x
- From: Domenico Andreoli <domenico.andreoli@xxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4] tpm: fix an invalid condition in tpm_common_poll
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v4] tpm: fix an invalid condition in tpm_common_poll
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] KEYS: trusted: allow trusted.ko to initialize w/o a TPM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [REGRESSION] 5.1-rc1: tpm_try_transmit: send(): error -5
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] LTP reproducer on broken IMA on overlayfs
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v8 10/10] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH ghak109 V2] audit: link integrity evm_write_xattrs record to syscall event
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v8 10/10] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 10/10] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v8 10/10] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4] tpm: fix an invalid condition in tpm_common_poll
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]