Linux Integrity
[Prev Page][Next Page]
- [PATCH v4 22/23] tlb: provide default nmi_uaccess_okay()
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 23/23] bpf: Fail bpf_probe_write_user() while mm is switched
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 14/23] x86/mm/cpa: Add set_direct_map_ functions
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 00/23] Merge text_poke fixes and executable lockdowns
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH] kexec_buffer measure
- From: prakhar srivastava <prsriva02@xxxxxxxxx>
- [PATCH v2 3/3 RFC] since cmdline args can be same for multiple kexec, log entry hash will collide. Prepend the kernel file name to the cmdline args to distinguish between cmdline args passed to subsequent kexec calls
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH v2 2/3 RFC] use event name instead of enum to make the call generic
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- [PATCH v2 1/3 RFC] added ima hook for buffer, being enabled as a policy
- From: Prakhar Srivastava <prsriva02@xxxxxxxxx>
- Can we enforce "IMA Policy" based on file type
- From: Kavitha Sivagnanam <kavi@xxxxxxxxxxx>
- Re: [PATCH v3 09/26] compat_ioctl: move drivers to compat_ptr_ioctl
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v9 00/10] crypto: add EC-RDSA (GOST 34.10) algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 09/26] compat_ioctl: move drivers to compat_ptr_ioctl
- From: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
- [PATCH v10 11/12] ima: Define ima-modsig template
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v10 12/12] ima: Store the measurement again when appraising a modsig
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v10 10/12] ima: Collect modsig
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v10 09/12] ima: Implement support for module-style appended signatures
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v10 08/12] ima: Factor xattr_verify() out of ima_appraise_measurement()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v10 07/12] ima: Add modsig appraise_type option for module-style appended signatures
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v10 06/12] ima: Use designated initializers for struct ima_event_data
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v10 05/12] integrity: Select CONFIG_KEYS instead of depending on it
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v10 04/12] integrity: Introduce struct evm_xattr
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v10 03/12] PKCS#7: Introduce pkcs7_get_digest()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v10 02/12] PKCS#7: Refactor verify_pkcs7_signature()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v10 01/12] MODSIGN: Export module signature definitions
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- [PATCH v10 00/12] Appended signatures support for IMA appraisal
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] ftpm: add documentation for ftpm driver
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: on leave next week
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] ftpm: add documentation for ftpm driver
- From: "Enrico Weigelt, metux IT consult" <lkml@xxxxxxxxx>
- Re: on leave next week
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- on leave next week
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 00/26] compat_ioctl: cleanups
- From: Douglas Gilbert <dgilbert@xxxxxxxxxxxx>
- Re: [PATCH v3 09/26] compat_ioctl: move drivers to compat_ptr_ioctl
- From: Jiri Kosina <jikos@xxxxxxxxxx>
- [PATCH v3 09/26] compat_ioctl: move drivers to compat_ptr_ioctl
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH v3 00/26] compat_ioctl: cleanups
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] kexec_buffer measure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 0/2] ftpm: a firmware based TPM driver
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH v3 1/2] ftpm: firmware TPM running in TEE
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH v3 2/2] ftpm: add documentation for ftpm driver
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH] efi: Include tpm_eventlog.h after asm/efi.h to avoid memcpy breakage
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] TCG2 log support build fixes for non-x86_64
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] MAINTAINERS: fix style in KEYS-TRUSTED entry
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v2] MAINTAINERS: fix style in KEYS-TRUSTED entry
- From: Lukas Bulwahn <lukas.bulwahn@xxxxxxxxx>
- Re: [GIT PULL] linux-integrity patches for Linux 5.2
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH] kexec_buffer measure
- From: prsriva02@xxxxxxxxx
- Re: [PATCH] integrity: make 'sync' update the inode integrity state
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- [GIT PULL] linux-integrity patches for Linux 5.2
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] ima: Call test's cleanup inside ima_setup.sh cleanup
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v9 05/10] X.509: parse public key parameters from x509 for akcipher
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- [PATCH v9 06/10] crypto: Kconfig - create Public-key cryptography section
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 05/10] X.509: parse public key parameters from x509 for akcipher
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 03/10] crypto: akcipher - new verify API for public key algorithms
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 02/10] crypto: rsa - unimplement sign/verify for raw RSA backends
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 09/10] crypto: ecrdsa - add EC-RDSA test vectors to testmgr
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 08/10] crypto: ecrdsa - add EC-RDSA (GOST 34.10) algorithm
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 10/10] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 07/10] crypto: ecc - make ecc into separate module
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 04/10] KEYS: do not kmemdup digest in {public,tpm}_key_verify_signature
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 01/10] crypto: akcipher - default implementations for request callbacks
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v9 00/10] crypto: add EC-RDSA (GOST 34.10) algorithm
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH] integrity: make 'sync' update the inode integrity state
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: [PATCH] integrity: make 'sync' update the inode integrity state
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] ima: Call test's cleanup inside ima_setup.sh cleanup
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: appraisal reset safety
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: [PATCH v2 1/3] ima: Call test's cleanup inside ima_setup.sh cleanup
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2 1/3] ima: Call test's cleanup inside ima_setup.sh cleanup
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: [PATCH v2 1/3] ftpm: dt-binding: add dts documentation for fTPM driver
- From: Thirupathaiah Annapureddy <thiruan@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] ftpm: dt-binding: add dts documentation for fTPM driver
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v2 1/3] ftpm: dt-binding: add dts documentation for fTPM driver
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH 2/2] ftpm: firmware TPM running in TEE
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v2 1/3] ftpm: dt-binding: add dts documentation for fTPM driver
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v2 1/3] ftpm: dt-binding: add dts documentation for fTPM driver
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- Re: [PATCH v2 1/3] ftpm: dt-binding: add dts documentation for fTPM driver
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH 2/2] ftpm: firmware TPM running in TEE
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH] integrity: make 'sync' update the inode integrity state
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: [PATCH 2/2] ftpm: firmware TPM running in TEE
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- [ANNOUNCE][CFP] Linux Security Summit North America 2019
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v2 1/3] ftpm: dt-binding: add dts documentation for fTPM driver
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- Re: [PATCH v2 2/3] ftpm: firmware TPM running in TEE
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH v2 1/3] ftpm: dt-binding: add dts documentation for fTPM driver
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH v2 2/3] ftpm: firmware TPM running in TEE
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH v2 3/3] ftpm: add documentation for ftpm driver
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH v2 0/3] ftpm: a firmware based TPM driver
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v4] tpm: fix an invalid condition in tpm_common_poll
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Regression in suspend-to-ram (TPM related) with 5.1-rc1 (BISECTED)
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Regression in suspend-to-ram (TPM related) with 5.1-rc1 (BISECTED)
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: appraisal reset safety
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: appraisal reset safety
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: appraisal reset safety
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: appraisal reset safety
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: appraisal reset safety
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- [PATCH v2 3/3] powerpc: Add support to initialize ima policy rules
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v2 2/3] powerpc/powernv: detect the secure boot mode of the system
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v2 1/3] powerpc/powernv: Add support for OPAL_SECVAR_GET
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- [PATCH v2 0/3] powerpc: Enabling secure boot on powernv systems - Part 1
- From: Nayna Jain <nayna@xxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd fixes for Linux v5.1
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH ghau85 v1] ima: add support for AUDIT_INTEGRITY_EVM_XATTR records
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [GIT PULL] tpmdd fixes for Linux v5.1
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: appraisal reset safety
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: appraisal reset safety
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4] tpm: fix an invalid condition in tpm_common_poll
- From: Thibaut Sautereau <thibaut.sautereau@xxxxxxxxxxx>
- Re: appraisal reset safety
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: Regression in suspend-to-ram (TPM related) with 5.1-rc1 (BISECTED)
- From: Martin Kepplinger <martin.kepplinger@xxxxxxxxxxxxx>
- Re: Regression in suspend-to-ram (TPM related) with 5.1-rc1 (BISECTED)
- From: Paul Zimmerman <pauldzim@xxxxxxxxx>
- Re: Regression in suspend-to-ram (TPM related) with 5.1-rc1 (BISECTED)
- From: Martin Kepplinger <martin.kepplinger@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] ftpm: firmware TPM running in TEE
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: appraisal reset safety
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] selftests/kexec: update get_secureboot_mode
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 3/3] ima: Add overlay test
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v2 2/3] shell: Add $TST_DEVICE as default parameter to tst_umount
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v2 1/3] ima: Call test's cleanup inside ima_setup.sh cleanup
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH v2 0/3] LTP reproducer on broken IMA on overlayfs
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH] selftests/kexec: update get_secureboot_mode
- From: Petr Vorel <pvorel@xxxxxxx>
- appraisal reset safety
- From: Janne Karhunen <janne.karhunen@xxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 3/3] ima: Add overlay test
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH] x86/ima: add missing include
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] doc/kernel-parameters.txt: Deprecate ima_appraise_tcb
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] ima: Add overlay test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] doc/kernel-parameters.txt: Deprecate ima_appraise_tcb
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 3/3] ima: Add overlay test
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH] TCG2 log support build fixes for non-x86_64
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 1/2] efi: Fix cast to pointer from integer of different size in TPM log code
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: Unable to suspend lenovo t61
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH 1/2] efi: Fix cast to pointer from integer of different size in TPM log code
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi: Include tpm_eventlog.h after asm/efi.h to avoid memcpy breakage
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] efi: Include tpm_eventlog.h after asm/efi.h to avoid memcpy breakage
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] TCG2 log support build fixes for non-x86_64
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] tpm: Fix builds on platforms that lack early_memremap()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] efi: Fix cast to pointer from integer of different size in TPM log code
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Igor Zhbanov <i.zhbanov@xxxxxxxxxxxx>
- [PATCH V32 24/27] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 2/2] ima-evm-utils: try to load digest by its alias
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] ima-evm-utils: try to load digest by its alias
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] ima-evm-utils: try to load digest by its alias
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] ima-evm-utils: try to load digest by its alias
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH 2/2] ima-evm-utils: try to load digest by its alias
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] ima-evm-utils: try to load digest by its alias
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v3] ima-evm-utils: Rework openssl init
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] ima-evm-utils: try to load digest by its alias
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] efi: Include tpm_eventlog.h after asm/efi.h to avoid memcpy breakage
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Igor Zhbanov <i.zhbanov@xxxxxxxxxxxx>
- Re: [PATCH 2/2] ftpm: firmware TPM running in TEE
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 2/2] ftpm: firmware TPM running in TEE
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] ftpm: firmware TPM running in TEE
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] ftpm: dt-binding: add dts documentation for fTPM driver
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] tpm: Actually fail on TPM errors during "get random"
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Add support for TCG2 log format on UEFI systems
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Igor Zhbanov <i.zhbanov@xxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 1/2] efi: Fix cast to pointer from integer of different size in TPM log code
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] selftests/kexec: update get_secureboot_mode
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: [PATCH 1/2] efi: Fix cast to pointer from integer of different size in TPM log code
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Perez Yves-Alexis <yves-alexis.perez@xxxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] ftpm: firmware TPM running in TEE
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Igor Zhbanov <i.zhbanov@xxxxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH 1/2] efi: Fix cast to pointer from integer of different size in TPM log code
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH 2/2] tpm: Fix builds on platforms that lack early_memremap()
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH] TCG2 log support build fixes for non-x86_64
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] ftpm: firmware TPM running in TEE
- From: Stephen Hemminger <stephen@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] ftpm: dt-binding: add dts documentation for fTPM driver
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH 1/2] ftpm: dt-binding: add dts documentation for fTPM driver
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH 2/2] ftpm: firmware TPM running in TEE
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH 1/2] ftpm: dt-binding: add dts documentation for fTPM driver
- From: Sasha Levin <sashal@xxxxxxxxxx>
- RE: [PATCH v3] tpm: Actually fail on TPM errors during "get random"
- From: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
- [PATCH 1/4] powerpc/include: Override unneeded early ioremap functions
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- [PATCH 4/4] powerpc: Add support to initialize ima policy rules
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- [PATCH 3/4] powerpc/powernv: Detect the secure boot mode of the system
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- [PATCH 2/4] powerpc/powernv: Add support for OPAL secure variables
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- [PATCH 0/4] Enabling secure boot on PowerNV systems
- From: Claudio Carvalho <cclaudio@xxxxxxxxxxxxx>
- Re: Add support for TCG2 log format on UEFI systems
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v3] tpm: Actually fail on TPM errors during "get random"
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Add support for TCG2 log format on UEFI systems
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Add support for TCG2 log format on UEFI systems
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: Add support for TCG2 log format on UEFI systems
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] tpm: Actually fail on TPM errors during "get random"
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- RE: [PATCH v3] tpm: Actually fail on TPM errors during "get random"
- From: "Winkler, Tomas" <tomas.winkler@xxxxxxxxx>
- Re: [PATCH v3] tpm: Actually fail on TPM errors during "get random"
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3] tpm: Actually fail on TPM errors during "get random"
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH v3] tpm: Actually fail on TPM errors during "get random"
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] tpm: Actually fail on TPM errors during "get random"
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Actually fail on TPM errors during "get random"
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Actually fail on TPM errors during "get random"
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v2] tpm: Actually fail on TPM errors during "get random"
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] tpm: Actually fail on TPM errors during "get random"
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] tpm: Actually fail on TPM errors during "get random"
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH] tpm: Actually fail on TPM errors during "get random"
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd fixes for Linux v5.1
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd fixes for Linux v5.1
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Igor Zhbanov <i.zhbanov@xxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [GIT PULL] tpmdd fixes for Linux v5.1
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Jordan Glover <Golden_Miller83@xxxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] ima: Add overlay test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Igor Zhbanov <i.zhbanov@xxxxxxxxxxxx>
- Re: [REGRESSION] 5.1-rc1: tpm_try_transmit: send(): error -5
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: turn on TPM on suspend for TPM 1.x
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] ima: Add overlay test
- From: Ignaz Forster <iforster@xxxxxxx>
- Re: [REGRESSION] 5.1-rc1: tpm_try_transmit: send(): error -5
- From: Domenico Andreoli <domenico.andreoli@xxxxxxxxx>
- Re: [PATCH] tpm: turn on TPM on suspend for TPM 1.x
- From: Domenico Andreoli <domenico.andreoli@xxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4] tpm: fix an invalid condition in tpm_common_poll
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v4] tpm: fix an invalid condition in tpm_common_poll
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] KEYS: trusted: allow trusted.ko to initialize w/o a TPM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [REGRESSION] 5.1-rc1: tpm_try_transmit: send(): error -5
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] LTP reproducer on broken IMA on overlayfs
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v8 10/10] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH ghak109 V2] audit: link integrity evm_write_xattrs record to syscall event
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v8 10/10] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 10/10] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v8 10/10] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4] tpm: fix an invalid condition in tpm_common_poll
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v3] KEYS: trusted: allow trusted.ko to initialize w/o a TPM
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH 3/3] ima: Add overlay test
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH 0/3] LTP reproducer on broken IMA on overlayfs
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH ghak109 V2] audit: link integrity evm_write_xattrs record to syscall event
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 9/9] selftests/kexec: make kexec_load test independent of IMA being enabled
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v5 1/9] selftests/kexec: move the IMA kexec_load selftest to selftests/kexec
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v5 8/9] selftests/kexec: check kexec_load and kexec_file_load are enabled
- From: Petr Vorel <pvorel@xxxxxxx>
- [REGRESSION] 5.1-rc1: tpm_try_transmit: send(): error -5
- From: Domenico Andreoli <domenico.andreoli@xxxxxxxxx>
- Re: Bad file pattern in MAINTAINERS section 'KEYS-TRUSTED'
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Bad file pattern in MAINTAINERS section 'KEYS-TRUSTED'
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH RESEND v3] tpm: fix an invalid condition in tpm_common_poll
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH ghak109 V2] audit: link integrity evm_write_xattrs record to syscall event
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH ghak109 V2] audit: link integrity evm_write_xattrs record to syscall event
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ghak109 V2] audit: link integrity evm_write_xattrs record to syscall event
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH ghak109 V1] audit: link integrity evm_write_xattrs record to syscall event
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH ghak109 V1] audit: link integrity evm_write_xattrs record to syscall event
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: Bad file pattern in MAINTAINERS section 'KEYS-TRUSTED'
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH v8 05/10] X.509: parse public key parameters from x509 for akcipher
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: [PATCH ghak109 V1] audit: link integrity evm_write_xattrs record to syscall event
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH v8 03/10] crypto: akcipher - new verify API for public key algorithms
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: [PATCH RESEND v3] tpm: fix an invalid condition in tpm_common_poll
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 27/27] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ghak109 V1] audit: link integrity evm_write_xattrs record to syscall event
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ghak109 V1] audit: link integrity evm_write_xattrs record to syscall event
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH ghak109 V1] audit: link integrity evm_write_xattrs record to syscall event
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Bad file pattern in MAINTAINERS section 'KEYS-TRUSTED'
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: Bad file pattern in MAINTAINERS section 'KEYS-TRUSTED'
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH v4a 1/2] selftests/kexec: make tests independent of IMA being enabled
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v5 2/9] selftests/kexec: cleanup the kexec selftest
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v5 3/9] selftests/kexec: define a set of common functions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v5 5/9] kselftest/kexec: define "require_root_privileges"
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v5 1/9] selftests/kexec: move the IMA kexec_load selftest to selftests/kexec
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v5 0/9] selftests/kexec: add kexec tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v5 7/9] selftests/kexec: Add missing '=y' to config options
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v5 6/9] selftests/kexec: kexec_file_load syscall test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v5 9/9] selftests/kexec: make kexec_load test independent of IMA being enabled
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v5 4/9] selftests/kexec: define common logging functions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v5 8/9] selftests/kexec: check kexec_load and kexec_file_load are enabled
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v8 10/10] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 09/10] crypto: ecrdsa - add EC-RDSA test vectors to testmgr
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 08/10] crypto: ecrdsa - add EC-RDSA (GOST 34.10) algorithm
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 07/10] crypto: ecc - make ecc into separate module
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 06/10] crypto: Kconfig - create Public-key cryptography section
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 05/10] X.509: parse public key parameters from x509 for akcipher
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 04/10] KEYS: do not kmemdup digest in {public,tpm}_key_verify_signature
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 03/10] crypto: akcipher - new verify API for public key algorithms
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 02/10] crypto: rsa - unimplement sign/verify for raw RSA backends
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 01/10] crypto: akcipher - default implementations for request callbacks
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 00/10] crypto: add EC-RDSA (GOST 34.10) algorithm
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v3] KEYS: trusted: allow trusted.ko to initialize w/o a TPM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Bad file pattern in MAINTAINERS section 'KEYS-TRUSTED'
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2] KEYS: trusted: allow trusted.ko to initialize w/o a TPM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: allow trusted.ko to initialize w/o a TPM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: allow trusted.ko to initialize w/o a TPM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Bad file pattern in MAINTAINERS section 'KEYS-TRUSTED'
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4a 1/2] selftests/kexec: make tests independent of IMA being enabled
- From: Dave Young <dyoung@xxxxxxxxxx>
- [PATCH 27/27] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Bad file pattern in MAINTAINERS section 'KEYS-TRUSTED'
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: allow trusted.ko to initialize w/o a TPM
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- RE: Portable Executable (PE) Signature Validation and Measurement for KEXEC system call using IMA
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxx>
- Re: [PATCH v4a 1/2] selftests/kexec: make tests independent of IMA being enabled
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Portable Executable (PE) Signature Validation and Measurement for KEXEC system call using IMA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: Portable Executable (PE) Signature Validation and Measurement for KEXEC system call using IMA
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/5] NFSD: Remove ima_file_check call
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: defer execution of TPM-specific code until key instantiate
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH] KEYS: trusted: allow trusted.ko to initialize w/o a TPM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/5] NFSD: Remove ima_file_check call
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- Re: [PATCH RESEND v3] tpm: fix an invalid condition in tpm_common_poll
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: INFO: task hung in process_measurement
- From: Tomi Valkeinen <tomi.valkeinen@xxxxxx>
- Re: [PATCH v4a 1/2] selftests/kexec: make tests independent of IMA being enabled
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: INFO: task hung in process_measurement
- From: syzbot <syzbot+cdc562bc26a2b2b0a94f@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v3] ima-evm-utils: Convert sign v2 from RSA to EVP_PKEY API
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v3] ima-evm-utils: Rework openssl init
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH 2/2] ima-evm-utils: try to load digest by its alias
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH 1/2] ima-evm-utils: Extract digest algorithms from hash_info.h
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH 0/2] ima-evm-utils: rebase of digest algo resolving
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v2] ima-evm-utils: rework openssl init
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v2 3/5] NFSD: Remove ima_file_check call
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 03/11] crypto: rsa - unimplement sign/verify for raw RSA backends
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: Adding cmldine args measure to ima
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 05/11] KEYS: do not kmemdup digest in {public,tpm}_key_verify_signature
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v4a 1/2] selftests/kexec: make tests independent of IMA being enabled
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4a 2/2] selftests/kexec: testing CONFIG_KEXEC_BZIMAGE_VERIFY_SIG is not enough
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 11/11] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: defer execution of TPM-specific code until key instantiate
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH] KEYS: trusted: defer execution of TPM-specific code until key instantiate
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Portable Executable (PE) Signature Validation and Measurement for KEXEC system call using IMA
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxx>
- Adding cmldine args measure to ima
- From: Prakhar Srivastava <prsriva@xxxxxxxxxxxxx>
- Re: [PATCH RESEND v3] tpm: fix an invalid condition in tpm_common_poll
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH RESEND v3] tpm: fix an invalid condition in tpm_common_poll
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v3] tpm: fix an invalid condition in tpm_common_poll
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 00/11] crypto: add EC-RDSA (GOST 34.10) algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/8] evmtest: Regression testing integrity subsystem
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH] tpm: turn on TPM on suspend for TPM 1.x
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v2 1/8] evmtest: Regression testing integrity subsystem
- From: djacobs7@xxxxxxxxxxxxxx
- [PATCH v2 2/8] evmtest: test loading IMA policies
- From: djacobs7@xxxxxxxxxxxxxx
- [PATCH v2 4/8] evmtest: test kexec signature policy
- From: djacobs7@xxxxxxxxxxxxxx
- [PATCH v2 5/8] evmtest: validate boot record
- From: djacobs7@xxxxxxxxxxxxxx
- [PATCH v2 3/8] evmtest: test kernel module loading
- From: djacobs7@xxxxxxxxxxxxxx
- [PATCH v2 6/8] evmtest: test the preservation of extended attributes
- From: djacobs7@xxxxxxxxxxxxxx
- [PATCH v2 7/8] emvtest: Add ability to run all tests
- From: djacobs7@xxxxxxxxxxxxxx
- [PATCH v2 8/8] evmtest: virtual machine compatibility
- From: djacobs7@xxxxxxxxxxxxxx
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Igor Zhbanov <i.zhbanov@xxxxxxxxxxxx>
- Re: [PATCH v3] tpm: fix an invalid condition in tpm_common_poll
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3] tpm: fix an invalid condition in tpm_common_poll
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v2 3/5] NFSD: Remove ima_file_check call
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- Re: [PATCH v2] tpm: fix an invalid condition in tpm_common_poll
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: fix an invalid condition in tpm_common_poll
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/6] security/keys/encrypted: Break module dependency chain
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/6] security/keys/encrypted: Break module dependency chain
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Regression in suspend-to-ram (TPM related) with 5.1-rc1 (BISECTED)
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: fix a race between poll and write in tpm-dev-common
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: fix a race between poll and write in tpm-dev-common
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v10, RESEND 5/6] KEYS: trusted: explicitly use tpm_chip structure from tpm_default_chip()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v10, RESEND 5/6] KEYS: trusted: explicitly use tpm_chip structure from tpm_default_chip()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 02/11] crypto: akcipher - check the presence of callback before the call
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Igor Zhbanov <i.zhbanov@xxxxxxxxxxxx>
- Re: [PATCH v2 3/5] NFSD: Remove ima_file_check call
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 02/11] crypto: akcipher - check the presence of callback before the call
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 02/11] crypto: akcipher - check the presence of callback before the call
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH ghak109 V1] audit: link integrity evm_write_xattrs record to syscall event
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH ghak109 V1] audit: link integrity evm_write_xattrs record to syscall event
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH ghak109 V1] audit: link integrity evm_write_xattrs record to syscall event
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: fix an invalid condition in tpm_common_poll
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2] tpm: fix an invalid condition in tpm_common_poll
- From: Mantas Mikulėnas <grawity@xxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Igor Zhbanov <i.zhbanov@xxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v2] tpm: fix an invalid condition in tpm_common_poll
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2] tpm: fix an invalid condition in tpm_common_poll
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/5] NFSD: Remove ima_file_check call
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- Re: [PATCH v4 0/8] selftests/kexec: add kexec tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Kernel 5.0 regression in /dev/tpm0 access
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/8] selftests/kexec: add kexec tests
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Igor Zhbanov <i.zhbanov@xxxxxxxxxxxx>
- Re: [PATCH 0/6] security/keys/encrypted: Break module dependency chain
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Regression in suspend-to-ram (TPM related) with 5.1-rc1 (BISECTED)
- From: Paul Zimmerman <pauldzim@xxxxxxxxx>
- Re: [PATCH 0/6] security/keys/encrypted: Break module dependency chain
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 0/6] security/keys/encrypted: Break module dependency chain
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH 0/6] security/keys/encrypted: Break module dependency chain
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v2] tpm: fix an invalid condition in tpm_common_poll
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2 3/5] NFSD: Remove ima_file_check call
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: fix a race between poll and write in tpm-dev-common
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Igor Zhbanov <i.zhbanov@xxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Igor Zhbanov <i.zhbanov@xxxxxxxxxxxx>
- [PATCH 5/6] security/integrity/evm: Drop direct dependency on key_type_encrypted
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH 0/6] security/keys/encrypted: Break module dependency chain
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Regression in suspend-to-ram (TPM related) with 5.1-rc1
- From: Paul Zimmerman <pauldzim@xxxxxxxxx>
- Re: [PATCH] tpm: fix a race between poll and write in tpm-dev-common
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [PATCH v10, RESEND 5/6] KEYS: trusted: explicitly use tpm_chip structure from tpm_default_chip()
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH] tpm: fix a race between poll and write in tpm-dev-common
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: Regression in suspend-to-ram (TPM related) with 5.1-rc1
- From: Paul Zimmerman <pauldzim@xxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [openssl-tpm2-engine] tpm sessions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: Kernel 5.0 regression in /dev/tpm0 access
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Igor Zhbanov <i.zhbanov@xxxxxxxxxxxx>
- Re: Kernel 5.0 regression in /dev/tpm0 access
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ghak109 V1] audit: link integrity evm_write_xattrs record to syscall event
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [RFC] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: Add support for TCG2 log format on UEFI systems
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/8] selftests/kexec: add kexec tests
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [RFC] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [RFC] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: Add support for TCG2 log format on UEFI systems
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH v4 2/8] selftests/kexec: cleanup the kexec selftest
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4 8/8] selftests/kexec: check kexec_load and kexec_file_load are enabled
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4 7/8] selftests/kexec: Add missing '=y' to config options
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4 6/8] selftests/kexec: kexec_file_load syscall test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4 5/8] kselftest/kexec: define "require_root_privileges"
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4 3/8] selftests/kexec: define a set of common functions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4 4/8] selftests/kexec: define common logging functions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4 1/8] selftests/kexec: move the IMA kexec_load selftest to selftests/kexec
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4 0/8] selftests/kexec: add kexec tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 5/7] selftests/ima: kexec_file_load syscall test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Add support for TCG2 log format on UEFI systems
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [RFC] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: Kernel 5.0 regression in /dev/tpm0 access
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Kernel 5.0 regression in /dev/tpm0 access
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Make timeout logic simpler and more robust
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Make timeout logic simpler and more robust
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 5/7] selftests/ima: kexec_file_load syscall test
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: Kernel 5.0 regression in /dev/tpm0 access
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: Kernel 5.0 regression in /dev/tpm0 access
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] tpm: Make timeout logic simpler and more robust
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Make timeout logic simpler and more robust
- From: Calvin Owens <calvinowens@xxxxxx>
- [RFC] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [PATCH] tpm: Make timeout logic simpler and more robust
- From: Calvin Owens <calvinowens@xxxxxx>
- Re: [PATCH] tpm: Make timeout logic simpler and more robust
- From: Calvin Owens <calvinowens@xxxxxx>
- Re: [PATCH] tpm: Make timeout logic simpler and more robust
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Make timeout logic simpler and more robust
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Make timeout logic simpler and more robust
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Make timeout logic simpler and more robust
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Make timeout logic simpler and more robust
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 5/7] selftests/ima: kexec_file_load syscall test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Make timeout logic simpler and more robust
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Make timeout logic simpler and more robust
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Make timeout logic simpler and more robust
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Make timeout logic simpler and more robust
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Make timeout logic simpler and more robust
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 5/7] selftests/ima: kexec_file_load syscall test
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH] tpm: Make timeout logic simpler and more robust
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] tpm: Make timeout logic simpler and more robust
- From: Calvin Owens <calvinowens@xxxxxx>
- Re: [PATCH v3 0/7] selftests/ima: add kexec and kernel module tests
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v3 2/7] selftests/ima: define a set of common functions
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 3/3] x86/ima: retry detecting secure boot mode
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 3/3] x86/ima: retry detecting secure boot mode
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] secuirty: integrity: ima: pedantic formatting
- From: "Enrico Weigelt, metux IT consult" <info@xxxxxxxxx>
- Re: Kernel 5.0 regression in /dev/tpm0 access
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/5] selftests/ima: kexec_file_load syscall test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 3/7] selftests/ima: define common logging functions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 2/7] selftests/ima: define a set of common functions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 1/7] selftests/ima: cleanup the kexec selftest
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 5/7] selftests/ima: kexec_file_load syscall test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 7/7] selftests/ima: Add missing '=y' to config options
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 6/7] selftests/ima: loading kernel modules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 4/7] kselftest/ima: define "require_root_privileges"
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 0/7] selftests/ima: add kexec and kernel module tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 4/5] selftests/ima: kexec_file_load syscall test
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2] ima-evm-utils: simplify digest alias handling
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v2] ima-evm-utils: simplify digest alias handling
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] ima-evm-utils: rework openssl init
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v2] ima-evm-utils: simplify digest alias handling
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v2] ima-evm-utils: rework openssl init
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] ima-evm-utils: simplify digest alias handling
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 5/5] selftests/ima: loading kernel modules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 4/5] selftests/ima: kexec_file_load syscall test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] selftests/ima: Add missing '=y' to config options
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Kernel 5.0 regression in /dev/tpm0 access
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: Kernel 5.0 regression in /dev/tpm0 access
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Kernel 5.0 regression in /dev/tpm0 access
- From: Mantas Mikulėnas <grawity@xxxxxxxxx>
- Re: [RFC PATCH v2] ima-evm-utils: convert sign v2 from RSA to EVP_PKEY API
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v2 3/5] NFSD: Remove ima_file_check call
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- Re: [PATCH v2 3/5] NFSD: Remove ima_file_check call
- From: Bruce Fields <bfields@xxxxxxxxxxxx>
- Re: [PATCH v2 3/5] NFSD: Remove ima_file_check call
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- Re: [PATCH v2 3/5] NFSD: Remove ima_file_check call
- From: bfields@xxxxxxxxxxxx (J. Bruce Fields)
- Re: [PATCH 3/3] x86/ima: retry detecting secure boot mode
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 3/3] x86/ima: retry detecting secure boot mode
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] x86/ima: retry detecting secure boot mode
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 2/3] scripts/ima: define a set of common functions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] x86/ima: retry detecting secure boot mode
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] scripts/ima: define a set of common functions
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH 3/3] x86/ima: retry detecting secure boot mode
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 3/3] x86/ima: retry detecting secure boot mode
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] x86/ima: require signed kernel modules
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 3/3] x86/ima: retry detecting secure boot mode
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v2] x86/ima: require signed kernel modules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] x86/ima: require signed kernel modules
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v2] x86/ima: require signed kernel modules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] x86/ima: retry detecting secure boot mode
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v2] x86/ima: require signed kernel modules
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 10/20] x86: avoid W^X being broken during modules loading
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 10/20] x86: avoid W^X being broken during modules loading
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v2] MAINTAINERS: fix typo in Mimi Zohar's address
- From: Baruch Siach <baruch@xxxxxxxxxx>
- Re: IMA fails to see TPM chip (rpi3, linaro optee)
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 10/20] x86: avoid W^X being broken during modules loading
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] x86/cpufeature: Remove __pure attribute to _static_cpu_has()
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 10/20] x86: avoid W^X being broken during modules loading
- Re: [PATCH] x86/cpufeature: Remove __pure attribute to _static_cpu_has()
- [PATCH v2 5/5] NFS: Prototype support for IMA on NFS (client)
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- [PATCH v2 4/5] NFS: Rename security xattr handler
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- [PATCH v2 3/5] NFSD: Remove ima_file_check call
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- [PATCH v2 2/5] NFSD: Prototype support for IMA on NFS (server)
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- [PATCH v2 1/5] NFS: Define common IMA-related protocol elements
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- [PATCH v2 0/5] RFC: Linux IMA on NFS prototype
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- [PATCH] x86/cpufeature: Remove __pure attribute to _static_cpu_has()
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] MAINTAINERS: fix typo in Mimi Zohar's address
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: fix typo in Mimi Zohar's address
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxx>
- Re: [PATCH v2 10/20] x86: avoid W^X being broken during modules loading
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] vfs: Move kernel_read_file() to fs/read_write.c
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] integrity: use KERNEL_DS instead of get_ds()
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] vfs: Move kernel_read_file() to fs/read_write.c
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] vfs: Move kernel_read_file() to fs/read_write.c
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] vfs: Move kernel_read_file() to fs/read_write.c
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] vfs: Move kernel_read_file() to fs/read_write.c
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH] integrity: use KERNEL_DS instead of get_ds()
- From: Jann Horn <jannh@xxxxxxxxxx>
- [PATCH v7 00/11] crypto: add EC-RDSA (GOST 34.10) algorithm
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v7 02/11] crypto: akcipher - check the presence of callback before the call
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v7 07/11] crypto: Kconfig - create Public-key cryptography section
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v7 04/11] crypto: akcipher - new verify API for public key algorithms
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v7 03/11] crypto: rsa - unimplement sign/verify for raw RSA backends
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v7 05/11] KEYS: do not kmemdup digest in {public,tpm}_key_verify_signature
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v7 06/11] X.509: parse public key parameters from x509 for akcipher
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v7 08/11] crypto: ecc - make ecc into separate module
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v7 11/11] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v7 10/11] crypto: ecrdsa - add EC-RDSA test vectors to testmgr
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v7 09/11] crypto: ecrdsa - add EC-RDSA (GOST 34.10) algorithm
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v7 01/11] KEYS: report to keyctl only actually supported key ops
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH RFC 4/4] NFSD: Prototype support for IMA on NFS (server)
- From: Bruce Fields <bfields@xxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] X.509: Parse public key parameters from x509 for akcipher
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH RFC 4/4] NFSD: Prototype support for IMA on NFS (server)
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- Re: [PATCH RFC 4/4] NFSD: Prototype support for IMA on NFS (server)
- From: Bruce Fields <bfields@xxxxxxxxxxxx>
- [integrity:next-queued-testing 7/12] arch/x86/kernel/ima_arch.c:78:4: error: implicit declaration of function 'set_module_sig_enforced'
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v5 04/10] crypto: akcipher - new verify API for public key algorithms
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] selftests/ima: Add missing '=y' to config options
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2 5/5] selftests/ima: loading kernel modules
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v2 5/5] selftests/ima: loading kernel modules
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2 4/5] selftests/ima: kexec_file_load syscall test
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2 4/5] selftests/ima: kexec_file_load syscall test
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v2 3/5] selftests/ima: define common logging functions
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2 3/5] selftests/ima: define common logging functions
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2 2/5] selftests/ima: define a set of common functions
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v5 04/10] crypto: akcipher - new verify API for public key algorithms
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v5 04/10] crypto: akcipher - new verify API for public key algorithms
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v5 04/10] crypto: akcipher - new verify API for public key algorithms
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v5 04/10] crypto: akcipher - new verify API for public key algorithms
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] scripts/ima: define a set of common functions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] scripts/ima: define a set of common functions
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH V4 2/4] tpm: Reserve the TPM final events table
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] X.509: Parse public key parameters from x509 for akcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] X.509: Parse public key parameters from x509 for akcipher
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] X.509: Parse public key parameters from x509 for akcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] X.509: Parse public key parameters from x509 for akcipher
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] X.509: Parse public key parameters from x509 for akcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] X.509: Parse public key parameters from x509 for akcipher
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] X.509: Parse public key parameters from x509 for akcipher
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] X.509: Parse public key parameters from x509 for akcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 04/10] crypto: akcipher - new verify API for public key algorithms
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [DISCUSSION] IMA Signature Measurements
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- RE: [DISCUSSION] IMA Signature Measurements
- From: Jordan Hand <Jordan.Hand@xxxxxxxxxxxxx>
- Re: [PATCH v5 04/10] crypto: akcipher - new verify API for public key algorithms
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [DISCUSSION] IMA Signature Measurements
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [DISCUSSION] IMA Signature Measurements
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [DISCUSSION] IMA Signature Measurements
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [DISCUSSION] IMA Signature Measurements
- From: Jordan Hand <Jordan.Hand@xxxxxxxxxxxxx>
- [PATCH V5 1/4] tpm: Abstract crypto agile event size calculations
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V5 3/4] tpm: Append the final event log to the TPM event log
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V5 4/4] efi: Attempt to get the TCG2 event log in the boot stub
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Add support for TCG2 log format on UEFI systems
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [PATCH V4 2/4] tpm: Reserve the TPM final events table
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v2 5/5] selftests/ima: loading kernel modules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: About PureBoot and TPM based DRM's
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: About PureBoot and TPM based DRM's
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- About PureBoot and TPM based DRM's
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 5/5] selftests/ima: loading kernel modules
- From: shuah <shuah@xxxxxxxxxx>
- Re: [PATCH V2 4/4] FUSE: Allow filesystems to provide gethash methods
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v2 5/5] selftests/ima: loading kernel modules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH V4 2/4] tpm: Reserve the TPM final events table
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH RFC v6] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v2 5/5] selftests/ima: loading kernel modules
- From: shuah <shuah@xxxxxxxxxx>
- Re: [PATCH v2 4/5] selftests/ima: kexec_file_load syscall test
- From: shuah <shuah@xxxxxxxxxx>
- Re: [PATCH v2 3/5] selftests/ima: define common logging functions
- From: shuah <shuah@xxxxxxxxxx>
- Re: [PATCH v2 2/5] selftests/ima: define a set of common functions
- From: shuah <shuah@xxxxxxxxxx>
- Re: [PATCH v2 1/5] selftests/ima: cleanup the kexec selftest
- From: shuah <shuah@xxxxxxxxxx>
- [PATCH v2 1/5] selftests/ima: cleanup the kexec selftest
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 2/5] selftests/ima: define a set of common functions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 5/5] selftests/ima: loading kernel modules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 4/5] selftests/ima: kexec_file_load syscall test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 3/5] selftests/ima: define common logging functions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 0/5] selftests/ima: add kexec and kernel module tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH V2 4/4] FUSE: Allow filesystems to provide gethash methods
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V2 2/4] IMA: Allow rule matching on filesystem subtype
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V2 1/4] VFS: Add a call to obtain a file's hash
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Allow trusted filesystems to provide IMA hashes directly
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: IMA fails to see TPM chip (rpi3, linaro optee)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: IMA fails to see TPM chip (rpi3, linaro optee)
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH ima-evm-utils] Include sys/types.h in header to fix build with musl
- From: luca.boccassi@xxxxxxxxx
- Re: IMA fails to see TPM chip (rpi3, linaro optee)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH V4 0/4] Add support for TCG2 event logs on EFI systems
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: IMA fails to see TPM chip (rpi3, linaro optee)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: IMA fails to see TPM chip (rpi3, linaro optee)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 10/10] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: IMA fails to see TPM chip (rpi3, linaro optee)
- From: Markku Savela <msa@xxxxxxxxxxx>
- Re: [PATCH v5 10/10] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 10/10] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: David Tolnay <dtolnay@xxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] X.509: Parse public key parameters from x509 for akcipher
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v5 00/10] crypto: add EC-RDSA (GOST 34.10) algorithm
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v5 03/10] crypto: rsa - unimplement sign/verify for raw RSA backends
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v5 02/10] crypto: akcipher - check the presence of callback before the call
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v5 01/10] KEYS: report to keyctl only actually supported key ops
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v5 04/10] crypto: akcipher - new verify API for public key algorithms
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]