Linux Integrity
[Prev Page][Next Page]
- Re: [PATCH 0/2] [IMA] Measure public keys of BuiltIn Trusted Keys
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH V4] IMA: Allow profiles to define the desired IMA template
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] efi: Fix TPM code build failure on ARM
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V2] tpm: Don't duplicate events from the final event log in the TCG2 log
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V4] IMA: Allow profiles to define the desired IMA template
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH 1/2] LSM: switch to blocking policy update notifiers
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] LSM: switch to blocking policy update notifiers
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH v7 3/3] call ima_kexec_cmdline to measure the cmdline args
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH v7 2/3] add a new ima template field buf
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH v7 1/3] Add a new ima hook ima_kexec_cmdline to measure cmdline args
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH v7 0/3] add new ima hook ima_kexec_cmdline to measure kexec boot cmdline args
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- Re: [PATCH V4] IMA: Allow profiles to define the desired IMA template
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] ima: use the lsm policy update notifier
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] ima: use the lsm policy update notifier
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 00/16] fs-verity: read-only file-based authenticity protection
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v4 00/16] fs-verity: read-only file-based authenticity protection
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] [IMA] Measure public keys of BuiltIn Trusted Keys
- From: Lakshmi <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] efi: Fix TPM code build failure on ARM
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH v4 03/16] fs-verity: add UAPI header
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 02/16] fs-verity: add MAINTAINERS file entry
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 04/16] fs: uapi: define verity bit for FS_IOC_GETFLAGS
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 01/16] fs-verity: add a documentation file
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 08/16] fs-verity: add the hook for file ->setattr()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 05/16] fs-verity: add Kconfig and the helper functions for hashing
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 12/16] fs-verity: add SHA-512 support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 10/16] fs-verity: implement FS_IOC_ENABLE_VERITY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 11/16] fs-verity: implement FS_IOC_MEASURE_VERITY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 16/16] f2fs: add fs-verity support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 14/16] ext4: add basic fs-verity support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 13/16] fs-verity: support builtin file signatures
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 15/16] ext4: add fs-verity read support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 09/16] fs-verity: add data verification hooks for ->readpages()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 07/16] fs-verity: add the hook for file ->open()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 06/16] fs-verity: add inode and superblock fields
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v4 00/16] fs-verity: read-only file-based authenticity protection
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH V2] tpm: Don't duplicate events from the final event log in the TCG2 log
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] ima/evm fixes for v5.2
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: evmctl and Hardware Security Module
- From: Martin Townsend <mtownsend1973@xxxxxxxxx>
- Re: [PATCH v3 0/2] ima/evm fixes for v5.2
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 0/2] [IMA] Measure public keys of BuiltIn Trusted Keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] ima/evm fixes for v5.2
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH] efi: Fix TPM code build failure on ARM
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 2/2] ima: add enforce-evm and log-evm modes to strictly check EVM status
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 1/2] evm: add option to set a random HMAC key at early boot
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 0/2] ima/evm fixes for v5.2
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH V4] IMA: Allow profiles to define the desired IMA template
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH V4] IMA: Allow profiles to define the desired IMA template
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 2/2] [IMA] Measure public keys of BuiltIn Trusted Keys
- From: Lakshmi <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] [IMA] Measure public keys of BuiltIn Trusted Keys - Query public key of given key
- From: Lakshmi <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/2] [IMA] Measure public keys of BuiltIn Trusted Keys
- From: Lakshmi <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] LSM: switch to blocking policy update notifiers
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] LSM: switch to blocking policy update notifiers
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V4] IMA: Allow profiles to define the desired IMA template
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH V4] IMA: Allow profiles to define the desired IMA template
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH] efi: Fix TPM code build failure on ARM
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V2] tpm: Don't duplicate events from the final event log in the TCG2 log
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [PATCH 0/1] Fix crash in __calc_tpm2_event_size
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/2] fTPM: firmware TPM running in TEE
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH 1/2] LSM: switch to blocking policy update notifiers
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: [PATCH] tpm: Don't duplicate events from the final event log in the TCG2 log
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH 2/2] ima: use the lsm policy update notifier
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- [PATCH 1/2] LSM: switch to blocking policy update notifiers
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: [PATCH v4 1/2] fTPM: firmware TPM running in TEE
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] LSM: switch to blocking policy update notifiers
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/2] fTPM: firmware TPM running in TEE
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] LSM: switch to blocking policy update notifiers
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] tpm: Don't dereference event after it's unmapped in __calc_tpm2_event_size
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH V4] IMA: Allow profiles to define the desired IMA template
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 1/1] tpm: Don't dereference event after it's unmapped in __calc_tpm2_event_size
- From: Chris Coulson <chris.coulson@xxxxxxxxxxxxx>
- [PATCH 0/1] Fix crash in __calc_tpm2_event_size
- From: Chris Coulson <chris.coulson@xxxxxxxxxxxxx>
- [PATCH V4] IMA: Allow profiles to define the desired IMA template
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [PATCH V3] IMA: Allow profiles to define the desired IMA template
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/2] fTPM: firmware TPM running in TEE
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH V3] IMA: Allow profiles to define the desired IMA template
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH] tpm: Don't duplicate events from the final event log in the TCG2 log
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- evmctl and Hardware Security Module
- From: Martin Townsend <mtownsend1973@xxxxxxxxx>
- Re: [PATCH V3] IMA: Allow profiles to define the desired IMA template
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH V3] IMA: Allow profiles to define the desired IMA template
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH V3] IMA: Allow profiles to define the desired IMA template
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH V3] IMA: Allow profiles to define the desired IMA template
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH V3] IMA: Allow profiles to define the desired IMA template
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 14/22] docs: security: trusted-encrypted.rst: fix code-block tag
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- Re: [PATCH V3] IMA: Allow profiles to define the desired IMA template
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH V3] IMA: Allow profiles to define the desired IMA template
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/3] ima: don't ignore INTEGRITY_UNKNOWN EVM status
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/2] fTPM: firmware TPM running in TEE
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH V3] IMA: Allow profiles to define the desired IMA template
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 0/2] fTPM: firmware TPM running in TEE
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH 18/22] docs: security: trusted-encrypted.rst: fix code-block tag
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/2] fTPM: firmware TPM running in TEE
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH V3] IMA: Allow profiles to define the desired IMA template
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Rob Landley <rob@xxxxxxxxxxx>
- Re: possible deadlock in process_measurement
- From: syzbot <syzbot+5ab61747675a87ea359d@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] LSM: switch to blocking policy update notifiers
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/3] ima: don't ignore INTEGRITY_UNKNOWN EVM status
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v2 2/3] ima: don't ignore INTEGRITY_UNKNOWN EVM status
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/3] ima: don't ignore INTEGRITY_UNKNOWN EVM status
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v2 2/3] ima: don't ignore INTEGRITY_UNKNOWN EVM status
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- Re: [PATCH v2 2/3] ima: don't ignore INTEGRITY_UNKNOWN EVM status
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/3] ima: don't ignore INTEGRITY_UNKNOWN EVM status
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v2 2/3] ima: don't ignore INTEGRITY_UNKNOWN EVM status
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH 2/2] ima: use the lsm policy update notifier
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- [PATCH] Add support to carry ima buffer to in kexec_file_load for amr64
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- Re: [PATCH 2/2] ima: use the lsm policy update notifier
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [GIT PULL] integrity subsystem fixes for v5.2
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH V7 0/4] Add support for crypto agile logs
- From: Joe Richey <joerichey@xxxxxxxxxx>
- [GIT PULL] integrity subsystem fixes for v5.2
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 2/2] ima: use the lsm policy update notifier
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- [PATCH 1/2] LSM: switch to blocking policy update notifiers
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: sleep in selinux_audit_rule_init
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: [PATCH V7 2/4] tpm: Reserve the TPM final events table
- From: Joe Richey <joerichey@xxxxxxxxxx>
- Re: CAP_SYS_ADMIN requirement for updating IMA metadata
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 18/22] docs: security: trusted-encrypted.rst: fix code-block tag
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v3 00/15] fs-verity: read-only file-based authenticity protection
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: CAP_SYS_ADMIN requirement for updating IMA metadata
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- [PATCH v4 2/2] fTPM: add documentation for ftpm driver
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH v4 1/2] fTPM: firmware TPM running in TEE
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH v4 0/2] fTPM: firmware TPM running in TEE
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: sleep in selinux_audit_rule_init
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: sleep in selinux_audit_rule_init
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: sleep in selinux_audit_rule_init
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: sleep in selinux_audit_rule_init
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/3] ima: don't ignore INTEGRITY_UNKNOWN EVM status
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] ima: show rules with IMA_INMASK correctly
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] evm: check hash algorithm passed to init_desc()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: sleep in selinux_audit_rule_init
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- [PATCH 18/22] docs: security: trusted-encrypted.rst: fix code-block tag
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- [PATCH 00/22] Some documentation fixes
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- [PATCH] ima: use struct_size() in kzalloc()
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: [PATCH v3] tpm: Actually fail on TPM errors during "get random"
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v2 3/3] ima: show rules with IMA_INMASK correctly
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 2/3] ima: don't ignore INTEGRITY_UNKNOWN EVM status
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 1/3] evm: check hash algorithm passed to init_desc()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 0/3] ima/evm fixes for v5.2
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v3] ima-evm-utils: Convert sign v2 from RSA to EVP_PKEY API
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3] ima-evm-utils: Convert sign v2 from RSA to EVP_PKEY API
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v10 09/12] ima: Implement support for module-style appended signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH V2] IMA: Allow profiles to define the desired IMA template
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v10 09/12] ima: Implement support for module-style appended signatures
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v10 09/12] ima: Implement support for module-style appended signatures
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v10 12/12] ima: Store the measurement again when appraising a modsig
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v10 11/12] ima: Define ima-modsig template
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v10 01/12] MODSIGN: Export module signature definitions
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v3] tpm: Actually fail on TPM errors during "get random"
- From: Laura Abbott <labbott@xxxxxxxxxx>
- Re: [PATCH v3] ima-evm-utils: Convert sign v2 from RSA to EVP_PKEY API
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH V2] IMA: Allow profiles to define the desired IMA template
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 12/12] ima: Store the measurement again when appraising a modsig
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 3/3][V2] lib: re-introduce new match_string() helper/macro
- From: Alexandru Ardelean <alexandru.ardelean@xxxxxxxxxx>
- [PATCH 2/3][V2] treewide: rename match_string() -> __match_string()
- From: Alexandru Ardelean <alexandru.ardelean@xxxxxxxxxx>
- [PATCH 1/3][V2] lib: fix match_string() helper on -1 array size
- From: Alexandru Ardelean <alexandru.ardelean@xxxxxxxxxx>
- Re: [PATCH V7 0/4] Add support for crypto agile logs
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH V7 0/4] Add support for crypto agile logs
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Re:
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Re:
- From: prakhar srivastava <prsriva02@xxxxxxxxx>
- Re: Re:
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re:
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re:
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v6 2/3] add a new ima template field buf
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v6 1/3] Add a new ima hook ima_kexec_cmdline to measure cmdline args
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH V2] IMA: Allow profiles to define the desired IMA template
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH V7 0/4] Add support for crypto agile logs
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH V2] IMA: Allow profiles to define the desired IMA template
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH V2] IMA: Allow profiles to define the desired IMA template
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [PATCH] IMA: Allow profiles to define the desired IMA template
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: IMA signature generated by evmctl has unexpected key identifier
- From: Lakshmi <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V7 0/4] Add support for crypto agile logs
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH v3 00/15] fs-verity: read-only file-based authenticity protection
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 04/15] fs-verity: add Kconfig and the helper functions for hashing
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 07/15] fs-verity: add the hook for file ->setattr()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 06/15] fs-verity: add the hook for file ->open()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 08/15] fs-verity: add data verification hooks for ->readpages()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 09/15] fs-verity: implement FS_IOC_ENABLE_VERITY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 11/15] fs-verity: add SHA-512 support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 10/15] fs-verity: implement FS_IOC_MEASURE_VERITY ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 12/15] fs-verity: support builtin file signatures
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 15/15] f2fs: add fs-verity support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 14/15] ext4: add fs-verity read support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 13/15] ext4: add basic fs-verity support
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 05/15] fs-verity: add inode and superblock fields
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 03/15] fs-verity: add UAPI header
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 01/15] fs-verity: add a documentation file
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 02/15] fs-verity: add MAINTAINERS file entry
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH V7 0/4] Add support for crypto agile logs
- From: Bartosz Szczepanek <bsz@xxxxxxxxxxxx>
- Re: [PATCH 1/4] ima-evm-utils: link to libcrypto instead of OpenSSL
- From: Dmitry Eremin-Solenikov <dbaryshkov@xxxxxxxxx>
- Re: [PATCH 1/4] ima-evm-utils: link to libcrypto instead of OpenSSL
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [USER][PATCH] cpio: add option to add file metadata in copy-out mode
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: IMA signature generated by evmctl has unexpected key identifier
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: CAP_SYS_ADMIN requirement for updating IMA metadata
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 4/4] ima-evm-utils: update .gitignore files
- From: Dmitry Eremin-Solenikov <dbaryshkov@xxxxxxxxx>
- [PATCH 2/4] ima-evm-utils: replace INCLUDES with AM_CPPFLAGS
- From: Dmitry Eremin-Solenikov <dbaryshkov@xxxxxxxxx>
- [PATCH 1/4] ima-evm-utils: link to libcrypto instead of OpenSSL
- From: Dmitry Eremin-Solenikov <dbaryshkov@xxxxxxxxx>
- [PATCH 3/4] ima-evm-utils: include hash-info.gen into distribution
- From: Dmitry Eremin-Solenikov <dbaryshkov@xxxxxxxxx>
- Re: [PATCH V7 0/4] Add support for crypto agile logs
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v4 3/3] gen_init_cpio: add support for file metadata
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v4 2/3] initramfs: read metadata from special file METADATA!!!
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v4 1/3] initramfs: add file metadata
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v4 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH V7 0/4] Add support for crypto agile logs
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: IMA signature generated by evmctl has unexpected key identifier
- From: Lakshmi <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH] IMA: Allow profiles to define the desired IMA template
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [PATCH v3 2/2] initramfs: introduce do_readxattrs()
- From: Taras Kondratiuk <takondra@xxxxxxxxx>
- Re: [PATCH v3 2/2] initramfs: introduce do_readxattrs()
- From: Rob Landley <rob@xxxxxxxxxxx>
- Re: [PATCH 0/2] public key: IMA signer logging: Log public key of IMA Signature signer in IMA log
- From: Lakshmi <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] public key: IMA signer logging: Log public key of IMA Signature signer in IMA log
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- [PATCH V4 5/5] IMA: Add a ima-vfs-sig measurement template
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V4 4/5] FUSE: Allow filesystems to provide gethash methods
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V4 3/5] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V4 2/5] IMA: Allow rule matching on filesystem subtype
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V4 1/5] VFS: Add a call to obtain a file's hash
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V4 0/5] Allow FUSE to provide IMA hashes directly
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [PATCH v3 2/2] initramfs: introduce do_readxattrs()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v3 2/2] initramfs: introduce do_readxattrs()
- Re: [PATCH v3 2/2] initramfs: introduce do_readxattrs()
- Re: CAP_SYS_ADMIN requirement for updating IMA metadata
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- Re: sleep in selinux_audit_rule_init
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: CAP_SYS_ADMIN requirement for updating IMA metadata
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: sleep in selinux_audit_rule_init
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- CAP_SYS_ADMIN requirement for updating IMA metadata
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- Re: sleep in selinux_audit_rule_init
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: sleep in selinux_audit_rule_init
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: sleep in selinux_audit_rule_init
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: sleep in selinux_audit_rule_init
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: sleep in selinux_audit_rule_init
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: sleep in selinux_audit_rule_init
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- sleep in selinux_audit_rule_init
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: IMA signature generated by evmctl has unexpected key identifier
- From: Lakshmi <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: IMA signature generated by evmctl has unexpected key identifier
- From: Lakshmi <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: IMA signature generated by evmctl has unexpected key identifier
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: IMA signature generated by evmctl has unexpected key identifier
- From: Lakshmi <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] ima: don't ignore INTEGRITY_UNKNOWN EVM status
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH V7 0/4] Add support for crypto agile logs
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH V7 2/4] tpm: Reserve the TPM final events table
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V7 4/4] efi: Attempt to get the TCG2 event log in the boot stub
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 4/4] ima: only audit failed appraisal verifications
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH 3/4] ima: don't ignore INTEGRITY_UNKNOWN EVM status
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v6 2/3] add a new ima template field buf
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH V3 6/6] IMA: Allow profiles to define the desired IMA template
- From: prakhar srivastava <prsriva02@xxxxxxxxx>
- [PATCH v6 1/3] Add a new ima hook ima_kexec_cmdline to measure cmdline args
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH v6 3/3] call ima_kexec_cmdline to measure the cmdline args
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH v6 2/3] add a new ima template field buf
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH v6 0/3] add new ima hook ima_kexec_cmdline to measure kexec boot cmdline args
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- Re: [PATCH 0/2] public key: IMA signer logging: Log public key of IMA Signature signer in IMA log
- From: Lakshmi <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V3 6/6] IMA: Allow profiles to define the desired IMA template
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 4/4] ima: only audit failed appraisal verifications
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/4] ima: don't ignore INTEGRITY_UNKNOWN EVM status
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/4] evm: reset status in evm_inode_post_setattr()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/4] evm: check hash algorithm passed to init_desc()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH V3 6/6] IMA: Allow profiles to define the desired IMA template
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH V7 0/4] Add support for crypto agile logs
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V7 1/4] tpm: Abstract crypto agile event size calculations
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V7 3/4] tpm: Append the final event log to the TPM event log
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V7 4/4] efi: Attempt to get the TCG2 event log in the boot stub
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V7 2/4] tpm: Reserve the TPM final events table
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [PATCH V6 0/4] Add support for crypto agile TPM event logs
- From: Bartosz Szczepanek <bsz@xxxxxxxxxxxx>
- Re: [PATCH v3 1/2] ftpm: firmware TPM running in TEE
- From: Igor Opaniuk <igor.opaniuk@xxxxxxxxx>
- [PATCH] x86/ima: check EFI SetupMode too
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] x86/ima: check EFI SetupMode too
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/3 v5] add a new template field buf to contain the buffer
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v3 1/2] ftpm: firmware TPM running in TEE
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] initramfs: introduce do_readxattrs()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v3 2/2] initramfs: introduce do_readxattrs()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v3 2/2] initramfs: introduce do_readxattrs()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH V3 1/6] VFS: Add a call to obtain a file's hash
- From: Johannes Thumshirn <jthumshirn@xxxxxxx>
- Re: [PATCH v3 0/2] ftpm: a firmware based TPM driver
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH V6 4/4] efi: Attempt to get the TCG2 event log in the boot stub
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V3 1/6] VFS: Add a call to obtain a file's hash
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH V3 5/6] IMA: Add a ima-vfs-sig measurement template
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v3 2/2] initramfs: introduce do_readxattrs()
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v3 2/2] initramfs: introduce do_readxattrs()
- From: Rob Landley <rob@xxxxxxxxxxx>
- Re: [PATCH v3 2/2] initramfs: introduce do_readxattrs()
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH V3 6/6] IMA: Allow profiles to define the desired IMA template
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/3 v5] add a new template field buf to contain the buffer
- From: prakhar srivastava <prsriva02@xxxxxxxxx>
- Re: [PATCH v3 2/2] initramfs: introduce do_readxattrs()
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v3 2/2] initramfs: introduce do_readxattrs()
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH v3 2/2] initramfs: introduce do_readxattrs()
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH v3 2/2] initramfs: introduce do_readxattrs()
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- [PATCH V6 0/4] Add support for crypto agile TPM event logs
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V6 3/4] tpm: Append the final event log to the TPM event log
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V6 1/4] tpm: Abstract crypto agile event size calculations
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V6 4/4] efi: Attempt to get the TCG2 event log in the boot stub
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V6 2/4] tpm: Reserve the TPM final events table
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V3 6/6] IMA: Allow profiles to define the desired IMA template
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V3 5/6] IMA: Add a ima-vfs-sig measurement template
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V3 4/6] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V3 3/6] IMA: Allow rule matching on filesystem subtype
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V3 2/6] FUSE: Allow filesystems to provide gethash methods
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V3 1/6] VFS: Add a call to obtain a file's hash
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V3 0/6] IMA: Support asking the VFS for a file hash
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [PATCH v3 2/2] initramfs: introduce do_readxattrs()
- From: Rob Landley <rob@xxxxxxxxxxx>
- Re: [PATCH v3 2/2] initramfs: introduce do_readxattrs()
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH v3 2/2] initramfs: introduce do_readxattrs()
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH v3 2/2] initramfs: introduce do_readxattrs()
- RE: [PATCH v3 0/2] ftpm: a firmware based TPM driver
- From: Thirupathaiah Annapureddy <thiruan@xxxxxxxxxxxxx>
- [PATCH v3 2/2] initramfs: introduce do_readxattrs()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 1/2] initramfs: set extended attributes
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v3 0/2] initramfs: add support for xattrs in the initial ram disk
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v2 0/3] LTP reproducer on broken IMA on overlayfs
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH] ima: skip verifying TPM 2.0 PCR values
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 0/2] public key: IMA signer logging: Log public key of IMA Signature signer in IMA log
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH] ima: skip verifying TPM 2.0 PCR values
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] ftpm: firmware TPM running in TEE
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH] ima: skip verifying TPM 2.0 PCR values
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH] ima: skip verifying TPM 2.0 PCR values
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] LTP reproducer on broken IMA on overlayfs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] LTP reproducer on broken IMA on overlayfs
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v3 0/2] ftpm: a firmware based TPM driver
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH] ima: skip verifying TPM 2.0 PCR values
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 0/2] public key: IMA signer logging: Log public key of IMA Signature signer in IMA log
- From: Lakshmi <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] ima: don't ignore INTEGRITY_UNKNOWN EVM status
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH 3/4] ima: don't ignore INTEGRITY_UNKNOWN EVM status
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 0/2] public key: IMA signer logging: Log public key of IMA Signature signer in IMA log
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] LTP reproducer on broken IMA on overlayfs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] ima: skip verifying TPM 2.0 PCR values
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: [PATCH v3 0/2] ftpm: a firmware based TPM driver
- From: Thirupathaiah Annapureddy <thiruan@xxxxxxxxxxxxx>
- [PATCH 4/4] ima: only audit failed appraisal verifications
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 3/4] ima: don't ignore INTEGRITY_UNKNOWN EVM status
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 2/4] evm: reset status in evm_inode_post_setattr()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 1/4] evm: check hash algorithm passed to init_desc()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH 0/2] public key: IMA signer logging: Log public key of IMA Signature signer in IMA log
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v3 0/2] ftpm: a firmware based TPM driver
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- RE: [PATCH v3 0/2] ftpm: a firmware based TPM driver
- From: Thirupathaiah Annapureddy <thiruan@xxxxxxxxxxxxx>
- Re: [PATCH 0/2] public key: IMA signer logging: Log public key of IMA Signature signer in IMA log
- From: Lakshmi <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH v2 0/3] LTP reproducer on broken IMA on overlayfs
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v2 0/3] LTP reproducer on broken IMA on overlayfs
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2 3/3] ima: Add overlay test
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v3 2/2] ftpm: add documentation for ftpm driver
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] ftpm: firmware TPM running in TEE
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v2] ima: fix wrong signed policy requirement when not appraising
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2 0/3] LTP reproducer on broken IMA on overlayfs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] ftpm: a firmware based TPM driver
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Rob Landley <rob@xxxxxxxxxxx>
- Re: [PATCH] ima: fix wrong signed policy requirement when not appraising
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] ima: fix wrong signed policy requirement when not appraising
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH] ima: fix wrong signed policy requirement when not appraising
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: IMA signature generated by evmctl has unexpected key identifier
- From: Lakshmi <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: IMA signature generated by evmctl has unexpected key identifier
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] ftpm: a firmware based TPM driver
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v2 0/3] LTP reproducer on broken IMA on overlayfs
- From: Ignaz Forster <iforster@xxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] ima: Add overlay test
- From: Ignaz Forster <iforster@xxxxxxx>
- Re: IMA signature generated by evmctl has unexpected key identifier
- From: Lakshmi <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH 0/2] public key: IMA signer logging: Log public key of IMA Signature signer in IMA log
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Whitelisting with IMA
- From: m3hm00d <f.m3hm00d@xxxxxxxxx>
- Re: IMA signature generated by evmctl has unexpected key identifier
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: IMA signature generated by evmctl has unexpected key identifier
- From: Lakshmi <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] public key: IMA signer logging: Add a new template ima-sigkey to store/read the public, key of ima signature signer
- From: Lakshmi <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] public key: IMA signer logging: Add support for querying public key from a given key
- From: Lakshmi <nramas@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/2] public key: IMA signer logging: Log public key of IMA Signature signer in IMA log
- From: Lakshmi <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Rob Landley <rob@xxxxxxxxxxx>
- Re: [PATCH 3/3 v5] call ima_kexec_cmdline from kexec_file_load path
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH 1/3 v5] add a new ima hook and policy to measure the cmdline
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/3 v5] add a new template field buf to contain the buffer
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v2 0/3] LTP reproducer on broken IMA on overlayfs
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v10 09/12] ima: Implement support for module-style appended signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Rob Landley <rob@xxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Rob Landley <rob@xxxxxxxxxxx>
- Re: [PATCH 2/3 v5] add a new template field buf to contain the buffer
- From: prakhar srivastava <prsriva02@xxxxxxxxx>
- Re: [PATCH 1/3 v5] add a new ima hook and policy to measure the cmdline
- From: prakhar srivastava <prsriva02@xxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Arvind Sankar <niveditas98@xxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Arvind Sankar <niveditas98@xxxxxxxxx>
- Re: [PATCH 1/3 v5] add a new ima hook and policy to measure the cmdline
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/3 v5] add a new template field buf to contain the buffer
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v2 3/3] initramfs: introduce do_readxattrs()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH 5/5] integrity: measure the file on msync
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- [PATCH 4/5] integrity: measure the file on sync
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- [PATCH 3/5] integrity: update the file measurement on write
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- [PATCH 1/5] integrity: keep the integrity state of open files up to date
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- [PATCH 2/5] integrity: update the file measurement on truncate
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- [PATCH 0/5] integrity: improve ima measurement accuracy
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Whitelisting with IMA
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Rob Landley <rob@xxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH 03/16] lib,treewide: add new match_string() helper/macro
- From: "Ardelean, Alexandru" <alexandru.Ardelean@xxxxxxxxxx>
- IMA signature generated by evmctl has unexpected key identifier
- From: nramas@xxxxxxxxxxxxxxxxxxx
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Arvind Sankar <niveditas98@xxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Rob Landley <rob@xxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- Whitelisting with IMA
- From: m3hm00d <f.m3hm00d@xxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Dominik Brodowski <linux@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Rob Landley <rob@xxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Rob Landley <rob@xxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Carrying over the ima log during kexec_file_load
- From: prakhar srivastava <prsriva02@xxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 2/3 v5] add a new template field buf to contain the buffer
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH 3/3 v5] call ima_kexec_cmdline from kexec_file_load path
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH 1/3 v5] add a new ima hook and policy to measure the cmdline
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH 0/3 v5] Kexec cmdline bufffer measure
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH 2/3 v5] add a new template field buf to contain the buffer
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH 1/3 v5] add a new ima hook and policy to measure the cmdline
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH 3/3 v5] call ima_kexec_cmdline from kexec_file_load path
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH 0/3 v5] Kexec cmdline bufffer measure
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- Re: [PATCH v2 3/3] initramfs: introduce do_readxattrs()
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] fs: add ksys_lsetxattr() wrapper
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Rob Landley <rob@xxxxxxxxxxx>
- Re: [PATCH 03/16] lib,treewide: add new match_string() helper/macro
- From: "andriy.shevchenko@xxxxxxxxxxxxxxx" <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 03/16] lib,treewide: add new match_string() helper/macro
- From: "Ardelean, Alexandru" <alexandru.Ardelean@xxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v10 11/12] ima: Define ima-modsig template
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 09/12] ima: Implement support for module-style appended signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Rob Landley <rob@xxxxxxxxxxx>
- Re: [PATCH v10 08/12] ima: Factor xattr_verify() out of ima_appraise_measurement()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 06/12] ima: Use designated initializers for struct ima_event_data
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 02/12] PKCS#7: Refactor verify_pkcs7_signature()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 03/12] PKCS#7: Introduce pkcs7_get_digest()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v10 01/12] MODSIGN: Export module signature definitions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 3/3] initramfs: introduce do_readxattrs()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 2/3] initramfs: set extended attributes
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 1/3] fs: add ksys_lsetxattr() wrapper
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: setfattr to set security.ima fails with error "Invalid argument"
- From: Ignaz Forster <iforster@xxxxxxx>
- Re: [PATCH 03/16] lib,treewide: add new match_string() helper/macro
- From: "Ardelean, Alexandru" <alexandru.Ardelean@xxxxxxxxxx>
- Re: [PATCH 03/16] lib,treewide: add new match_string() helper/macro
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 03/16] lib,treewide: add new match_string() helper/macro
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] ftpm: a firmware based TPM driver
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 09/16] mmc: sdhci-xenon: use new match_string() helper/macro
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [PATCH 00/16] treewide: fix match_string() helper when array size
- From: Alexandru Ardelean <alexandru.ardelean@xxxxxxxxxx>
- [PATCH 01/16] lib: fix match_string() helper when array size is positive
- From: Alexandru Ardelean <alexandru.ardelean@xxxxxxxxxx>
- [PATCH 05/16] ALSA: oxygen: use new match_string() helper/macro
- From: Alexandru Ardelean <alexandru.ardelean@xxxxxxxxxx>
- [PATCH 04/16] powerpc/xmon: use new match_string() helper/macro
- From: Alexandru Ardelean <alexandru.ardelean@xxxxxxxxxx>
- [PATCH 03/16] lib,treewide: add new match_string() helper/macro
- From: Alexandru Ardelean <alexandru.ardelean@xxxxxxxxxx>
- [PATCH 02/16] treewide: rename match_string() -> __match_string()
- From: Alexandru Ardelean <alexandru.ardelean@xxxxxxxxxx>
- [PATCH 07/16] device connection: use new match_string() helper/macro
- From: Alexandru Ardelean <alexandru.ardelean@xxxxxxxxxx>
- [PATCH 10/16] pinctrl: armada-37xx: use new match_string() helper/macro
- From: Alexandru Ardelean <alexandru.ardelean@xxxxxxxxxx>
- [PATCH 09/16] mmc: sdhci-xenon: use new match_string() helper/macro
- From: Alexandru Ardelean <alexandru.ardelean@xxxxxxxxxx>
- [PATCH 08/16] cpufreq/intel_pstate: remove NULL entry + use match_string()
- From: Alexandru Ardelean <alexandru.ardelean@xxxxxxxxxx>
- [PATCH 11/16] mm/vmpressure.c: use new match_string() helper/macro
- From: Alexandru Ardelean <alexandru.ardelean@xxxxxxxxxx>
- [PATCH 12/16] rdmacg: use new match_string() helper/macro
- From: Alexandru Ardelean <alexandru.ardelean@xxxxxxxxxx>
- Re: [PATCH 01/16] lib: fix match_string() helper on -1 array size
- From: "Ardelean, Alexandru" <alexandru.Ardelean@xxxxxxxxxx>
- [PATCH 15/16] video: fbdev: pxafb: use new match_string() helper/macro
- From: Alexandru Ardelean <alexandru.ardelean@xxxxxxxxxx>
- [PATCH 14/16] staging: gdm724x: use new match_string() helper/macro
- From: Alexandru Ardelean <alexandru.ardelean@xxxxxxxxxx>
- [PATCH 16/16] sched: debug: use new match_string() helper/macro
- From: Alexandru Ardelean <alexandru.ardelean@xxxxxxxxxx>
- [PATCH 13/16] drm/edid: use new match_string() helper/macro
- From: Alexandru Ardelean <alexandru.ardelean@xxxxxxxxxx>
- [PATCH 06/16] x86/mtrr: use new match_string() helper + add gaps == minor fix
- From: Alexandru Ardelean <alexandru.ardelean@xxxxxxxxxx>
- [PATCH 01/16] lib: fix match_string() helper on -1 array size
- From: Alexandru Ardelean <alexandru.ardelean@xxxxxxxxxx>
- Re: [PATCH v3 0/2] ftpm: a firmware based TPM driver
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH] integrity: keep the integrity state of open files up to date
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: [PATCH v3 0/2] ftpm: a firmware based TPM driver
- From: Daniel Thompson <daniel.thompson@xxxxxxxxxx>
- Re: [PATCH v3 0/2] ftpm: a firmware based TPM driver
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v3 0/2] ftpm: a firmware based TPM driver
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH] integrity: keep the integrity state of open files up to date
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] integrity: make 'sync' update the inode integrity state
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- [PATCH AUTOSEL 4.14 41/95] ima: open a new file instance if no read permissions
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Bartosz Szczepanek <bsz@xxxxxxxxxxxx>
- [PATCH 2/3] ima: prevent a file already mmap'ed write to be mmap'ed execute
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 1/3] ima: verify mprotect change is consistent with mmap policy
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 3/3] ima: prevent a file already mmap'ed read|execute to be mmap'ed write
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 0/3] ima: addressing mmap/mprotect concerns
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Friendly reminder
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] integrity: make 'sync' update the inode integrity state
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- [PATCH] integrity: keep the integrity state of open files up to date
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: [PATCH 5/5 v4] removed the LSM hook made available, and renamed the ima_policy to be KEXEC_CMDLINE
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/5 v4] add the buffer to the xattr
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/5 v4] added a new ima policy func buffer_check, and ima hook to measure the buffer hash into ima
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 0/5 v4] Kexec cmdline bufffer measure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH 1/5 v4] added a new ima policy func buffer_check, and ima hook to measure the buffer hash into ima
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH 2/5 v4] add the buffer to the xattr
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH 3/5 v4] add kexec_cmdline used to ima
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH 4/5 v4] added LSM hook to call ima_buffer_check
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH 5/5 v4] removed the LSM hook made available, and renamed the ima_policy to be KEXEC_CMDLINE
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH 0/5 v4] Kexec cmdline bufffer measure
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- setfattr to set security.ima fails with error "Invalid argument"
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] kexec_buffer measure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] integrity: make 'sync' update the inode integrity state
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ANNOUNCE][CFP] Linux Security Summit Europe 2019
- From: Elena Reshetova <elena.reshetova@xxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] kexec_buffer measure
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v3 3/4] add kexec_cmdline used to ima
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 4/4] added LSM hook to call ima_buffer_check
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 3/4] add kexec_cmdline used to ima
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/4] add the buffer to the xattr
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/4] added a new ima policy func buffer_check, and ima hook to measure the buffer hash into ima
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] kexec_buffer measure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] kexec_buffer measure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] kexec_buffer measure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4] tpm: fix an invalid condition in tpm_common_poll
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Bartosz Szczepanek <barteks7r@xxxxxxxxx>
- Re: linux-tpmdd self signed kernel failing to boot with secreboot on
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: linux-tpmdd self signed kernel failing to boot with secreboot on
- From: Jordan Hand <jorhand@xxxxxxxxxxxxxxxxxxx>
- Re: linux-tpmdd self signed kernel failing to boot with secreboot on
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: linux-tpmdd self signed kernel failing to boot with secreboot on
- From: Jordan Hand <jorhand@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Bartosz Szczepanek <bsz@xxxxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: linux-tpmdd self signed kernel failing to boot with secreboot on
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH v3 2/4] add the buffer to the xattr
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH v3 1/4] added a new ima policy func buffer_check, and ima hook to measure the buffer hash into ima
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH v3 3/4] add kexec_cmdline used to ima
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH v3 4/4] added LSM hook to call ima_buffer_check
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH v3 0/4] Add a new ima_hook buffer_check to measure buffers critical for attestation
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- Re: linux-tpmdd self signed kernel failing to boot with secreboot on
- From: Jordan Hand <jorhand@xxxxxxxxxxxxxxxxxxx>
- Re: linux-tpmdd self signed kernel failing to boot with secreboot on
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: linux-tpmdd self signed kernel failing to boot with secreboot on
- From: Jordan Hand <jorhand@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 00/24] x86: text_poke() fixes and executable lockdowns
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v6 00/24] x86: text_poke() fixes and executable lockdowns
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- [PATCH v6 02/24] x86/jump_label: Use text_poke_early() during early init
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 04/24] x86/mm: Save debug registers when loading a temporary mm
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 01/24] Fix "x86/alternatives: Lockdep-enforce text_mutex in text_poke*()"
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 05/24] uprobes: Initialize uprobes earlier
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 07/24] x86/alternative: Initialize temporary mm for patching
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 06/24] fork: Provide a function for copying init_mm
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 03/24] x86/mm: Introduce temporary mm structs
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 08/24] x86/alternative: Use temporary mm for text poking
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 11/24] x86/kprobes: Set instruction page as executable
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 09/24] x86/kgdb: Avoid redundant comparison of patched code
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 13/24] x86/jump-label: Remove support for custom poker
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 14/24] x86/alternative: Remove the return value of text_poke_*()
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 12/24] x86/module: Avoid breaking W^X while loading modules
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 10/24] x86/ftrace: Set trampoline pages as executable
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 15/24] x86/mm/cpa: Add set_direct_map_ functions
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 17/24] vmalloc: Add flag for free of special permsissions
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 18/24] modules: Use vmalloc special flag
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 16/24] mm: Make hibernate handle unmapped pages
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 20/24] x86/ftrace: Use vmalloc special flag
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 19/24] bpf: Use vmalloc special flag
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 22/24] x86/alternative: Comment about module removal races
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 23/24] mm/tlb: Provide default nmi_uaccess_okay()
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 24/24] bpf: Fail bpf_probe_write_user() while mm is switched
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 21/24] x86/kprobes: Use vmalloc special flag
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 00/24] x86: text_poke() fixes and executable lockdowns
- From: nadav.amit@xxxxxxxxx
- [PATCH AUTOSEL 5.0 52/79] KEYS: trusted: fix -Wvarags warning
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.0 51/79] tpm: fix an invalid condition in tpm_common_poll
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v5 14/23] x86/mm/cpa: Add set_direct_map_ functions
- From: Nadav Amit <namit@xxxxxxxxxx>
- Re: [PATCH v5 14/23] x86/mm/cpa: Add set_direct_map_ functions
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 00/23] x86: text_poke() fixes and executable lockdowns
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v5 07/23] x86/alternative: Use temporary mm for text poking
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 04/23] x86/mm: Save debug registers when loading a temporary mm
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 00/23] x86: text_poke() fixes and executable lockdowns
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 15/23] mm: Make hibernate handle unmapped pages
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 22/23] mm/tlb: Provide default nmi_uaccess_okay()
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 19/23] x86/ftrace: Use vmalloc special flag
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 05/23] fork: Provide a function for copying init_mm
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 11/23] x86/module: Avoid breaking W^X while loading modules
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 03/23] x86/mm: Introduce temporary mm structs
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 01/23] Fix "x86/alternatives: Lockdep-enforce text_mutex in text_poke*()"
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 06/23] x86/alternative: Initialize temporary mm for patching
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 09/23] x86/ftrace: Set trampoline pages as executable
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 18/23] bpf: Use vmalloc special flag
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 17/23] modules: Use vmalloc special flag
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 12/23] x86/jump-label: Remove support for custom poker
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 16/23] vmalloc: Add flag for free of special permsissions
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 21/23] x86/alternative: Comment about module removal races
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 20/23] x86/kprobes: Use vmalloc special flag
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 23/23] bpf: Fail bpf_probe_write_user() while mm is switched
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 13/23] x86/alternative: Remove the return value of text_poke_*()
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 10/23] x86/kprobes: Set instruction page as executable
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 14/23] x86/mm/cpa: Add set_direct_map_ functions
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 08/23] x86/kgdb: Avoid redundant comparison of patched code
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 02/23] x86/jump_label: Use text_poke_early() during early init
- From: Nadav Amit <namit@xxxxxxxxxx>
- Re: [PATCH v2 2/5 RFC] use event name instead of enum to make the call generic
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v2 2/5 RFC] use event name instead of enum to make the call generic
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/5 RFC] use event name instead of enum to make the call generic
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/5 RFC] use event name instead of enum to make the call generic
- From: James Morris <jmorris@xxxxxxxxx>
- Re: linux-tpmdd self signed kernel failing to boot with secreboot on
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v4 16/23] vmalloc: Add flag for free of special permsissions
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v4 00/23] Merge text_poke fixes and executable lockdowns
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v4 00/23] Merge text_poke fixes and executable lockdowns
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v4 16/23] vmalloc: Add flag for free of special permsissions
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v2] KEYS: Make use of platform keyring for module signature verify
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: Can we enforce "IMA Policy" based on file type
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 19/23] x86/ftrace: Use vmalloc special flag
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 2/5 RFC] use event name instead of enum to make the call generic
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/5 RFC] use event name instead of enum to make the call generic
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 19/23] x86/ftrace: Use vmalloc special flag
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH v2] KEYS: Make use of platform keyring for module signature verify
- From: Jeremy Cline <jcline@xxxxxxxxxx>
- Re: [PATCH v4 04/23] x86/mm: Save DRs when loading a temporary mm
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v4 03/23] x86/mm: Introduce temporary mm structs
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v4 03/23] x86/mm: Introduce temporary mm structs
- From: Nadav Amit <nadav.amit@xxxxxxxxx>
- Re: [PATCH v2 2/5 RFC] use event name instead of enum to make the call generic
- From: prsriva <prsriva@xxxxxxxxxxxxxxxxxxx>
- RE: Can we enforce "IMA Policy" based on file type
- From: Kavitha Sivagnanam <kavi@xxxxxxxxxxx>
- Re: [PATCH v4 04/23] x86/mm: Save DRs when loading a temporary mm
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v4 03/23] x86/mm: Introduce temporary mm structs
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] integrity: make 'sync' update the inode integrity state
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: [PATCH] x86/ima: Check EFI_RUNTIME_SERVICES before using
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] integrity: make 'sync' update the inode integrity state
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Can we enforce "IMA Policy" based on file type
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] KEYS: Make use of platform keyring for module signature verify
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/5 RFC] use event name instead of enum to make the call generic
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] integrity: make 'sync' update the inode integrity state
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- linux-tpmdd self signed kernel failing to boot with secreboot on
- From: Jordan <jorhand@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] KEYS: Make use of platform keyring for module signature verify
- From: Robert Holmes <robeholmes@xxxxxxxxx>
- [PATCH v2] KEYS: Make use of platform keyring for module signature verify
- From: Robert Holmes <robeholmes@xxxxxxxxx>
- Re: [PATCH v4] tpm: fix an invalid condition in tpm_common_poll
- From: Jonas Witschel <diabonas@xxxxxx>
- [PATCH v1 1/1] Return the verified kernel image signature in kexec_file_load
- From: nramas@xxxxxxxxxxxxxxxxxxx
- Re: [PATCH v4] tpm: fix an invalid condition in tpm_common_poll
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH v2 3/5 RFC] since cmdline args can be same for multiple kexec, log entry hash will collide. Prepend the kernel file name to the cmdline args to distinguish between cmdline args passed to subsequent kexec calls
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH v2 2/5 RFC] use event name instead of enum to make the call generic
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH v2 5/5 RFC] add the buffer to the event data in ima free entry data if store_template failed added check in templates for buffer
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH v2 4/5 RFC] added a buffer_check LSM hook
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH v2 1/5 RFC] added ima hook for buffer, being enabled as a policy
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH] x86/ima: Check EFI_RUNTIME_SERVICES before using
- From: Scott Wood <swood@xxxxxxxxxx>
- Re: [PATCH v4] tpm: fix an invalid condition in tpm_common_poll
- From: Jonas Witschel <diabonas@xxxxxx>
- Re: Can we enforce "IMA Policy" based on file type
- From: Kavitha Sivagnanam <kavi@xxxxxxxxxxx>
- Re: Can we enforce "IMA Policy" based on file type
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] kexec_buffer measure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4 02/23] x86/jump_label: Use text_poke_early() during early init
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 01/23] Fix "x86/alternatives: Lockdep-enforce text_mutex in text_poke*()"
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 05/23] fork: Provide a function for copying init_mm
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 04/23] x86/mm: Save DRs when loading a temporary mm
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 07/23] x86/alternative: Use temporary mm for text poking
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 09/23] x86/ftrace: Set trampoline pages as executable
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 08/23] x86/kgdb: Avoid redundant comparison of patched code
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 03/23] x86/mm: Introduce temporary mm structs
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 06/23] x86/alternative: Initialize temporary mm for patching
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 13/23] x86/alternative: Remove the return value of text_poke_*()
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 10/23] x86/kprobes: Set instruction page as executable
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 11/23] x86/module: Avoid breaking W^X while loading modules
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 12/23] x86/jump-label: Remove support for custom poker
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 16/23] vmalloc: Add flag for free of special permsissions
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 17/23] modules: Use vmalloc special flag
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 19/23] x86/ftrace: Use vmalloc special flag
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 18/23] bpf: Use vmalloc special flag
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 15/23] mm: Make hibernate handle unmapped pages
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 20/23] x86/kprobes: Use vmalloc special flag
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 21/23] x86/alternative: Comment about module removal races
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]