Linux Integrity
[Prev Page][Next Page]
- Re: [PATCH v3] KEYS: trusted: allow trusted.ko to initialize w/o a TPM
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH 3/3] ima: Add overlay test
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH 0/3] LTP reproducer on broken IMA on overlayfs
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH ghak109 V2] audit: link integrity evm_write_xattrs record to syscall event
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 9/9] selftests/kexec: make kexec_load test independent of IMA being enabled
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v5 1/9] selftests/kexec: move the IMA kexec_load selftest to selftests/kexec
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v5 8/9] selftests/kexec: check kexec_load and kexec_file_load are enabled
- From: Petr Vorel <pvorel@xxxxxxx>
- [REGRESSION] 5.1-rc1: tpm_try_transmit: send(): error -5
- From: Domenico Andreoli <domenico.andreoli@xxxxxxxxx>
- Re: Bad file pattern in MAINTAINERS section 'KEYS-TRUSTED'
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Bad file pattern in MAINTAINERS section 'KEYS-TRUSTED'
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH RESEND v3] tpm: fix an invalid condition in tpm_common_poll
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH ghak109 V2] audit: link integrity evm_write_xattrs record to syscall event
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH ghak109 V2] audit: link integrity evm_write_xattrs record to syscall event
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ghak109 V2] audit: link integrity evm_write_xattrs record to syscall event
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH ghak109 V1] audit: link integrity evm_write_xattrs record to syscall event
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH ghak109 V1] audit: link integrity evm_write_xattrs record to syscall event
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: Bad file pattern in MAINTAINERS section 'KEYS-TRUSTED'
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH v8 05/10] X.509: parse public key parameters from x509 for akcipher
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: [PATCH ghak109 V1] audit: link integrity evm_write_xattrs record to syscall event
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH v8 03/10] crypto: akcipher - new verify API for public key algorithms
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: [PATCH RESEND v3] tpm: fix an invalid condition in tpm_common_poll
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH 27/27] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ghak109 V1] audit: link integrity evm_write_xattrs record to syscall event
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH ghak109 V1] audit: link integrity evm_write_xattrs record to syscall event
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH ghak109 V1] audit: link integrity evm_write_xattrs record to syscall event
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Bad file pattern in MAINTAINERS section 'KEYS-TRUSTED'
- From: Denis Kenzior <denkenz@xxxxxxxxx>
- Re: Bad file pattern in MAINTAINERS section 'KEYS-TRUSTED'
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH v4a 1/2] selftests/kexec: make tests independent of IMA being enabled
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v5 2/9] selftests/kexec: cleanup the kexec selftest
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v5 3/9] selftests/kexec: define a set of common functions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v5 5/9] kselftest/kexec: define "require_root_privileges"
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v5 1/9] selftests/kexec: move the IMA kexec_load selftest to selftests/kexec
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v5 0/9] selftests/kexec: add kexec tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v5 7/9] selftests/kexec: Add missing '=y' to config options
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v5 6/9] selftests/kexec: kexec_file_load syscall test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v5 9/9] selftests/kexec: make kexec_load test independent of IMA being enabled
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v5 4/9] selftests/kexec: define common logging functions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v5 8/9] selftests/kexec: check kexec_load and kexec_file_load are enabled
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v8 10/10] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 09/10] crypto: ecrdsa - add EC-RDSA test vectors to testmgr
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 08/10] crypto: ecrdsa - add EC-RDSA (GOST 34.10) algorithm
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 07/10] crypto: ecc - make ecc into separate module
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 06/10] crypto: Kconfig - create Public-key cryptography section
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 05/10] X.509: parse public key parameters from x509 for akcipher
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 04/10] KEYS: do not kmemdup digest in {public,tpm}_key_verify_signature
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 03/10] crypto: akcipher - new verify API for public key algorithms
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 02/10] crypto: rsa - unimplement sign/verify for raw RSA backends
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 01/10] crypto: akcipher - default implementations for request callbacks
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v8 00/10] crypto: add EC-RDSA (GOST 34.10) algorithm
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v3] KEYS: trusted: allow trusted.ko to initialize w/o a TPM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Bad file pattern in MAINTAINERS section 'KEYS-TRUSTED'
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2] KEYS: trusted: allow trusted.ko to initialize w/o a TPM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: allow trusted.ko to initialize w/o a TPM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: allow trusted.ko to initialize w/o a TPM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Bad file pattern in MAINTAINERS section 'KEYS-TRUSTED'
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4a 1/2] selftests/kexec: make tests independent of IMA being enabled
- From: Dave Young <dyoung@xxxxxxxxxx>
- [PATCH 27/27] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Bad file pattern in MAINTAINERS section 'KEYS-TRUSTED'
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: allow trusted.ko to initialize w/o a TPM
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- RE: Portable Executable (PE) Signature Validation and Measurement for KEXEC system call using IMA
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxx>
- Re: [PATCH v4a 1/2] selftests/kexec: make tests independent of IMA being enabled
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Portable Executable (PE) Signature Validation and Measurement for KEXEC system call using IMA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RE: Portable Executable (PE) Signature Validation and Measurement for KEXEC system call using IMA
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/5] NFSD: Remove ima_file_check call
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: defer execution of TPM-specific code until key instantiate
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH] KEYS: trusted: allow trusted.ko to initialize w/o a TPM
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/5] NFSD: Remove ima_file_check call
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- Re: [PATCH RESEND v3] tpm: fix an invalid condition in tpm_common_poll
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: INFO: task hung in process_measurement
- From: Tomi Valkeinen <tomi.valkeinen@xxxxxx>
- Re: [PATCH v4a 1/2] selftests/kexec: make tests independent of IMA being enabled
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: INFO: task hung in process_measurement
- From: syzbot <syzbot+cdc562bc26a2b2b0a94f@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v3] ima-evm-utils: Convert sign v2 from RSA to EVP_PKEY API
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v3] ima-evm-utils: Rework openssl init
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH 2/2] ima-evm-utils: try to load digest by its alias
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH 1/2] ima-evm-utils: Extract digest algorithms from hash_info.h
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH 0/2] ima-evm-utils: rebase of digest algo resolving
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v2] ima-evm-utils: rework openssl init
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v2 3/5] NFSD: Remove ima_file_check call
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 03/11] crypto: rsa - unimplement sign/verify for raw RSA backends
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: Adding cmldine args measure to ima
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 05/11] KEYS: do not kmemdup digest in {public,tpm}_key_verify_signature
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v4a 1/2] selftests/kexec: make tests independent of IMA being enabled
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4a 2/2] selftests/kexec: testing CONFIG_KEXEC_BZIMAGE_VERIFY_SIG is not enough
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 11/11] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: defer execution of TPM-specific code until key instantiate
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH] KEYS: trusted: defer execution of TPM-specific code until key instantiate
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Portable Executable (PE) Signature Validation and Measurement for KEXEC system call using IMA
- From: Lakshmi Ramasubramanian <nramas@xxxxxxxxxxxxx>
- Adding cmldine args measure to ima
- From: Prakhar Srivastava <prsriva@xxxxxxxxxxxxx>
- Re: [PATCH RESEND v3] tpm: fix an invalid condition in tpm_common_poll
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH RESEND v3] tpm: fix an invalid condition in tpm_common_poll
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v3] tpm: fix an invalid condition in tpm_common_poll
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 00/11] crypto: add EC-RDSA (GOST 34.10) algorithm
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/8] evmtest: Regression testing integrity subsystem
- From: Petr Vorel <pvorel@xxxxxxx>
- [PATCH] tpm: turn on TPM on suspend for TPM 1.x
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v2 1/8] evmtest: Regression testing integrity subsystem
- From: djacobs7@xxxxxxxxxxxxxx
- [PATCH v2 2/8] evmtest: test loading IMA policies
- From: djacobs7@xxxxxxxxxxxxxx
- [PATCH v2 4/8] evmtest: test kexec signature policy
- From: djacobs7@xxxxxxxxxxxxxx
- [PATCH v2 5/8] evmtest: validate boot record
- From: djacobs7@xxxxxxxxxxxxxx
- [PATCH v2 3/8] evmtest: test kernel module loading
- From: djacobs7@xxxxxxxxxxxxxx
- [PATCH v2 6/8] evmtest: test the preservation of extended attributes
- From: djacobs7@xxxxxxxxxxxxxx
- [PATCH v2 7/8] emvtest: Add ability to run all tests
- From: djacobs7@xxxxxxxxxxxxxx
- [PATCH v2 8/8] evmtest: virtual machine compatibility
- From: djacobs7@xxxxxxxxxxxxxx
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Igor Zhbanov <i.zhbanov@xxxxxxxxxxxx>
- Re: [PATCH v3] tpm: fix an invalid condition in tpm_common_poll
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3] tpm: fix an invalid condition in tpm_common_poll
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v2 3/5] NFSD: Remove ima_file_check call
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- Re: [PATCH v2] tpm: fix an invalid condition in tpm_common_poll
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: fix an invalid condition in tpm_common_poll
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/6] security/keys/encrypted: Break module dependency chain
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/6] security/keys/encrypted: Break module dependency chain
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Regression in suspend-to-ram (TPM related) with 5.1-rc1 (BISECTED)
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: fix a race between poll and write in tpm-dev-common
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: fix a race between poll and write in tpm-dev-common
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v10, RESEND 5/6] KEYS: trusted: explicitly use tpm_chip structure from tpm_default_chip()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v10, RESEND 5/6] KEYS: trusted: explicitly use tpm_chip structure from tpm_default_chip()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 02/11] crypto: akcipher - check the presence of callback before the call
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Igor Zhbanov <i.zhbanov@xxxxxxxxxxxx>
- Re: [PATCH v2 3/5] NFSD: Remove ima_file_check call
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 02/11] crypto: akcipher - check the presence of callback before the call
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 02/11] crypto: akcipher - check the presence of callback before the call
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH ghak109 V1] audit: link integrity evm_write_xattrs record to syscall event
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH ghak109 V1] audit: link integrity evm_write_xattrs record to syscall event
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH ghak109 V1] audit: link integrity evm_write_xattrs record to syscall event
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: fix an invalid condition in tpm_common_poll
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2] tpm: fix an invalid condition in tpm_common_poll
- From: Mantas Mikulėnas <grawity@xxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Igor Zhbanov <i.zhbanov@xxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v2] tpm: fix an invalid condition in tpm_common_poll
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2] tpm: fix an invalid condition in tpm_common_poll
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/5] NFSD: Remove ima_file_check call
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- Re: [PATCH v4 0/8] selftests/kexec: add kexec tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Kernel 5.0 regression in /dev/tpm0 access
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/8] selftests/kexec: add kexec tests
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Igor Zhbanov <i.zhbanov@xxxxxxxxxxxx>
- Re: [PATCH 0/6] security/keys/encrypted: Break module dependency chain
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Regression in suspend-to-ram (TPM related) with 5.1-rc1 (BISECTED)
- From: Paul Zimmerman <pauldzim@xxxxxxxxx>
- Re: [PATCH 0/6] security/keys/encrypted: Break module dependency chain
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH 0/6] security/keys/encrypted: Break module dependency chain
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH 0/6] security/keys/encrypted: Break module dependency chain
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v2] tpm: fix an invalid condition in tpm_common_poll
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2 3/5] NFSD: Remove ima_file_check call
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: fix a race between poll and write in tpm-dev-common
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Igor Zhbanov <i.zhbanov@xxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Igor Zhbanov <i.zhbanov@xxxxxxxxxxxx>
- [PATCH 5/6] security/integrity/evm: Drop direct dependency on key_type_encrypted
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH 0/6] security/keys/encrypted: Break module dependency chain
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Regression in suspend-to-ram (TPM related) with 5.1-rc1
- From: Paul Zimmerman <pauldzim@xxxxxxxxx>
- Re: [PATCH] tpm: fix a race between poll and write in tpm-dev-common
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [PATCH v10, RESEND 5/6] KEYS: trusted: explicitly use tpm_chip structure from tpm_default_chip()
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH] tpm: fix a race between poll and write in tpm-dev-common
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: Regression in suspend-to-ram (TPM related) with 5.1-rc1
- From: Paul Zimmerman <pauldzim@xxxxxxxxx>
- Re: Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [openssl-tpm2-engine] tpm sessions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: Kernel 5.0 regression in /dev/tpm0 access
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Should mprotect(..., PROT_EXEC) be checked by IMA?
- From: Igor Zhbanov <i.zhbanov@xxxxxxxxxxxx>
- Re: Kernel 5.0 regression in /dev/tpm0 access
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH ghak109 V1] audit: link integrity evm_write_xattrs record to syscall event
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [RFC] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: Add support for TCG2 log format on UEFI systems
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/8] selftests/kexec: add kexec tests
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [RFC] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [RFC] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: Add support for TCG2 log format on UEFI systems
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- [PATCH v4 2/8] selftests/kexec: cleanup the kexec selftest
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4 8/8] selftests/kexec: check kexec_load and kexec_file_load are enabled
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4 7/8] selftests/kexec: Add missing '=y' to config options
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4 6/8] selftests/kexec: kexec_file_load syscall test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4 5/8] kselftest/kexec: define "require_root_privileges"
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4 3/8] selftests/kexec: define a set of common functions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4 4/8] selftests/kexec: define common logging functions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4 1/8] selftests/kexec: move the IMA kexec_load selftest to selftests/kexec
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v4 0/8] selftests/kexec: add kexec tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 5/7] selftests/ima: kexec_file_load syscall test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Add support for TCG2 log format on UEFI systems
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [RFC] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: Kernel 5.0 regression in /dev/tpm0 access
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Kernel 5.0 regression in /dev/tpm0 access
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Make timeout logic simpler and more robust
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Make timeout logic simpler and more robust
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 5/7] selftests/ima: kexec_file_load syscall test
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: Kernel 5.0 regression in /dev/tpm0 access
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: Kernel 5.0 regression in /dev/tpm0 access
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH] tpm: Make timeout logic simpler and more robust
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Make timeout logic simpler and more robust
- From: Calvin Owens <calvinowens@xxxxxx>
- [RFC] kexec: Allow kexec_file() with appropriate IMA policy when locked down
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [PATCH] tpm: Make timeout logic simpler and more robust
- From: Calvin Owens <calvinowens@xxxxxx>
- Re: [PATCH] tpm: Make timeout logic simpler and more robust
- From: Calvin Owens <calvinowens@xxxxxx>
- Re: [PATCH] tpm: Make timeout logic simpler and more robust
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Make timeout logic simpler and more robust
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Make timeout logic simpler and more robust
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Make timeout logic simpler and more robust
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Make timeout logic simpler and more robust
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 5/7] selftests/ima: kexec_file_load syscall test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Make timeout logic simpler and more robust
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Make timeout logic simpler and more robust
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Make timeout logic simpler and more robust
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Make timeout logic simpler and more robust
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Make timeout logic simpler and more robust
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 5/7] selftests/ima: kexec_file_load syscall test
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH] tpm: Make timeout logic simpler and more robust
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH] tpm: Make timeout logic simpler and more robust
- From: Calvin Owens <calvinowens@xxxxxx>
- Re: [PATCH v3 0/7] selftests/ima: add kexec and kernel module tests
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v3 2/7] selftests/ima: define a set of common functions
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH 3/3] x86/ima: retry detecting secure boot mode
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 3/3] x86/ima: retry detecting secure boot mode
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] secuirty: integrity: ima: pedantic formatting
- From: "Enrico Weigelt, metux IT consult" <info@xxxxxxxxx>
- Re: Kernel 5.0 regression in /dev/tpm0 access
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/5] selftests/ima: kexec_file_load syscall test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 3/7] selftests/ima: define common logging functions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 2/7] selftests/ima: define a set of common functions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 1/7] selftests/ima: cleanup the kexec selftest
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 5/7] selftests/ima: kexec_file_load syscall test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 7/7] selftests/ima: Add missing '=y' to config options
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 6/7] selftests/ima: loading kernel modules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 4/7] kselftest/ima: define "require_root_privileges"
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 0/7] selftests/ima: add kexec and kernel module tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 4/5] selftests/ima: kexec_file_load syscall test
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2] ima-evm-utils: simplify digest alias handling
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v2] ima-evm-utils: simplify digest alias handling
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] ima-evm-utils: rework openssl init
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v2] ima-evm-utils: simplify digest alias handling
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v2] ima-evm-utils: rework openssl init
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] ima-evm-utils: simplify digest alias handling
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 5/5] selftests/ima: loading kernel modules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 4/5] selftests/ima: kexec_file_load syscall test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] selftests/ima: Add missing '=y' to config options
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Kernel 5.0 regression in /dev/tpm0 access
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: Kernel 5.0 regression in /dev/tpm0 access
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Kernel 5.0 regression in /dev/tpm0 access
- From: Mantas Mikulėnas <grawity@xxxxxxxxx>
- Re: [RFC PATCH v2] ima-evm-utils: convert sign v2 from RSA to EVP_PKEY API
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v2 3/5] NFSD: Remove ima_file_check call
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- Re: [PATCH v2 3/5] NFSD: Remove ima_file_check call
- From: Bruce Fields <bfields@xxxxxxxxxxxx>
- Re: [PATCH v2 3/5] NFSD: Remove ima_file_check call
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- Re: [PATCH v2 3/5] NFSD: Remove ima_file_check call
- From: bfields@xxxxxxxxxxxx (J. Bruce Fields)
- Re: [PATCH 3/3] x86/ima: retry detecting secure boot mode
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 3/3] x86/ima: retry detecting secure boot mode
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] x86/ima: retry detecting secure boot mode
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 2/3] scripts/ima: define a set of common functions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] x86/ima: retry detecting secure boot mode
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] scripts/ima: define a set of common functions
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH 3/3] x86/ima: retry detecting secure boot mode
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 3/3] x86/ima: retry detecting secure boot mode
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] x86/ima: require signed kernel modules
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH 3/3] x86/ima: retry detecting secure boot mode
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v2] x86/ima: require signed kernel modules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] x86/ima: require signed kernel modules
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v2] x86/ima: require signed kernel modules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] x86/ima: retry detecting secure boot mode
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v2] x86/ima: require signed kernel modules
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 10/20] x86: avoid W^X being broken during modules loading
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 10/20] x86: avoid W^X being broken during modules loading
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v2] MAINTAINERS: fix typo in Mimi Zohar's address
- From: Baruch Siach <baruch@xxxxxxxxxx>
- Re: IMA fails to see TPM chip (rpi3, linaro optee)
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 10/20] x86: avoid W^X being broken during modules loading
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] x86/cpufeature: Remove __pure attribute to _static_cpu_has()
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 10/20] x86: avoid W^X being broken during modules loading
- Re: [PATCH] x86/cpufeature: Remove __pure attribute to _static_cpu_has()
- [PATCH v2 5/5] NFS: Prototype support for IMA on NFS (client)
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- [PATCH v2 4/5] NFS: Rename security xattr handler
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- [PATCH v2 3/5] NFSD: Remove ima_file_check call
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- [PATCH v2 2/5] NFSD: Prototype support for IMA on NFS (server)
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- [PATCH v2 1/5] NFS: Define common IMA-related protocol elements
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- [PATCH v2 0/5] RFC: Linux IMA on NFS prototype
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- [PATCH] x86/cpufeature: Remove __pure attribute to _static_cpu_has()
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] MAINTAINERS: fix typo in Mimi Zohar's address
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: fix typo in Mimi Zohar's address
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxx>
- Re: [PATCH v2 10/20] x86: avoid W^X being broken during modules loading
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] vfs: Move kernel_read_file() to fs/read_write.c
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] integrity: use KERNEL_DS instead of get_ds()
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] vfs: Move kernel_read_file() to fs/read_write.c
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] vfs: Move kernel_read_file() to fs/read_write.c
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] vfs: Move kernel_read_file() to fs/read_write.c
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] vfs: Move kernel_read_file() to fs/read_write.c
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH] integrity: use KERNEL_DS instead of get_ds()
- From: Jann Horn <jannh@xxxxxxxxxx>
- [PATCH v7 00/11] crypto: add EC-RDSA (GOST 34.10) algorithm
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v7 02/11] crypto: akcipher - check the presence of callback before the call
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v7 07/11] crypto: Kconfig - create Public-key cryptography section
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v7 04/11] crypto: akcipher - new verify API for public key algorithms
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v7 03/11] crypto: rsa - unimplement sign/verify for raw RSA backends
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v7 05/11] KEYS: do not kmemdup digest in {public,tpm}_key_verify_signature
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v7 06/11] X.509: parse public key parameters from x509 for akcipher
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v7 08/11] crypto: ecc - make ecc into separate module
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v7 11/11] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v7 10/11] crypto: ecrdsa - add EC-RDSA test vectors to testmgr
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v7 09/11] crypto: ecrdsa - add EC-RDSA (GOST 34.10) algorithm
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v7 01/11] KEYS: report to keyctl only actually supported key ops
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH RFC 4/4] NFSD: Prototype support for IMA on NFS (server)
- From: Bruce Fields <bfields@xxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] X.509: Parse public key parameters from x509 for akcipher
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH RFC 4/4] NFSD: Prototype support for IMA on NFS (server)
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- Re: [PATCH RFC 4/4] NFSD: Prototype support for IMA on NFS (server)
- From: Bruce Fields <bfields@xxxxxxxxxxxx>
- [integrity:next-queued-testing 7/12] arch/x86/kernel/ima_arch.c:78:4: error: implicit declaration of function 'set_module_sig_enforced'
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v5 04/10] crypto: akcipher - new verify API for public key algorithms
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- [PATCH] selftests/ima: Add missing '=y' to config options
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2 5/5] selftests/ima: loading kernel modules
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v2 5/5] selftests/ima: loading kernel modules
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2 4/5] selftests/ima: kexec_file_load syscall test
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2 4/5] selftests/ima: kexec_file_load syscall test
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v2 3/5] selftests/ima: define common logging functions
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2 3/5] selftests/ima: define common logging functions
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v2 2/5] selftests/ima: define a set of common functions
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [PATCH v5 04/10] crypto: akcipher - new verify API for public key algorithms
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v5 04/10] crypto: akcipher - new verify API for public key algorithms
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v5 04/10] crypto: akcipher - new verify API for public key algorithms
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v5 04/10] crypto: akcipher - new verify API for public key algorithms
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] scripts/ima: define a set of common functions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] scripts/ima: define a set of common functions
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH V4 2/4] tpm: Reserve the TPM final events table
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] X.509: Parse public key parameters from x509 for akcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] X.509: Parse public key parameters from x509 for akcipher
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] X.509: Parse public key parameters from x509 for akcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] X.509: Parse public key parameters from x509 for akcipher
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] X.509: Parse public key parameters from x509 for akcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] X.509: Parse public key parameters from x509 for akcipher
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] X.509: Parse public key parameters from x509 for akcipher
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] X.509: Parse public key parameters from x509 for akcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 04/10] crypto: akcipher - new verify API for public key algorithms
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [DISCUSSION] IMA Signature Measurements
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- RE: [DISCUSSION] IMA Signature Measurements
- From: Jordan Hand <Jordan.Hand@xxxxxxxxxxxxx>
- Re: [PATCH v5 04/10] crypto: akcipher - new verify API for public key algorithms
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [DISCUSSION] IMA Signature Measurements
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [DISCUSSION] IMA Signature Measurements
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [DISCUSSION] IMA Signature Measurements
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [DISCUSSION] IMA Signature Measurements
- From: Jordan Hand <Jordan.Hand@xxxxxxxxxxxxx>
- [PATCH V5 1/4] tpm: Abstract crypto agile event size calculations
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V5 3/4] tpm: Append the final event log to the TPM event log
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V5 4/4] efi: Attempt to get the TCG2 event log in the boot stub
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V5 2/4] tpm: Reserve the TPM final events table
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Add support for TCG2 log format on UEFI systems
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [PATCH V4 2/4] tpm: Reserve the TPM final events table
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v2 5/5] selftests/ima: loading kernel modules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: About PureBoot and TPM based DRM's
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: About PureBoot and TPM based DRM's
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- About PureBoot and TPM based DRM's
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 5/5] selftests/ima: loading kernel modules
- From: shuah <shuah@xxxxxxxxxx>
- Re: [PATCH V2 4/4] FUSE: Allow filesystems to provide gethash methods
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v2 5/5] selftests/ima: loading kernel modules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH V4 2/4] tpm: Reserve the TPM final events table
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH RFC v6] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v2 5/5] selftests/ima: loading kernel modules
- From: shuah <shuah@xxxxxxxxxx>
- Re: [PATCH v2 4/5] selftests/ima: kexec_file_load syscall test
- From: shuah <shuah@xxxxxxxxxx>
- Re: [PATCH v2 3/5] selftests/ima: define common logging functions
- From: shuah <shuah@xxxxxxxxxx>
- Re: [PATCH v2 2/5] selftests/ima: define a set of common functions
- From: shuah <shuah@xxxxxxxxxx>
- Re: [PATCH v2 1/5] selftests/ima: cleanup the kexec selftest
- From: shuah <shuah@xxxxxxxxxx>
- [PATCH v2 1/5] selftests/ima: cleanup the kexec selftest
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 2/5] selftests/ima: define a set of common functions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 5/5] selftests/ima: loading kernel modules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 4/5] selftests/ima: kexec_file_load syscall test
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 3/5] selftests/ima: define common logging functions
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 0/5] selftests/ima: add kexec and kernel module tests
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH V2 4/4] FUSE: Allow filesystems to provide gethash methods
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V2 3/4] IMA: Optionally make use of filesystem-provided hashes
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V2 2/4] IMA: Allow rule matching on filesystem subtype
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V2 1/4] VFS: Add a call to obtain a file's hash
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Allow trusted filesystems to provide IMA hashes directly
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: IMA fails to see TPM chip (rpi3, linaro optee)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: IMA fails to see TPM chip (rpi3, linaro optee)
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH ima-evm-utils] Include sys/types.h in header to fix build with musl
- From: luca.boccassi@xxxxxxxxx
- Re: IMA fails to see TPM chip (rpi3, linaro optee)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH V4 0/4] Add support for TCG2 event logs on EFI systems
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: IMA fails to see TPM chip (rpi3, linaro optee)
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: IMA fails to see TPM chip (rpi3, linaro optee)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 10/10] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: IMA fails to see TPM chip (rpi3, linaro optee)
- From: Markku Savela <msa@xxxxxxxxxxx>
- Re: [PATCH v5 10/10] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 10/10] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: David Tolnay <dtolnay@xxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/4] X.509: Parse public key parameters from x509 for akcipher
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v5 00/10] crypto: add EC-RDSA (GOST 34.10) algorithm
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v5 03/10] crypto: rsa - unimplement sign/verify for raw RSA backends
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v5 02/10] crypto: akcipher - check the presence of callback before the call
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v5 01/10] KEYS: report to keyctl only actually supported key ops
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v5 04/10] crypto: akcipher - new verify API for public key algorithms
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v5 10/10] integrity: support EC-RDSA signatures for asymmetric_verify
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v5 09/10] crypto: ecrdsa - add EC-RDSA test vectors to testmgr
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v5 07/10] crypto: ecc - make ecc into separate module
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v5 08/10] crypto: ecrdsa - add EC-RDSA (GOST 34.10) algorithm
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v5 05/10] X.509: parse public key parameters from x509 for akcipher
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH v5 06/10] crypto: Kconfig - create Public-key cryptography section
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: David Tolnay <dtolnay@xxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: David Tolnay <dtolnay@xxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: David Tolnay <dtolnay@xxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v2] security: mark expected switch fall-throughs and add a missing break
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: David Tolnay <dtolnay@xxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: David Tolnay <dtolnay@xxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: David Tolnay <dtolnay@xxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- [PATCH V4 3/4] tpm: Append the final event log to the TPM event log
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V4 4/4] efi: Attempt to get the TCG2 event log in the boot stub
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V4 2/4] tpm: Reserve the TPM final events table
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V4 1/4] tpm: Abstract crypto agile event size calculations
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- [PATCH V4 0/4] Add support for TCG2 event logs on EFI systems
- From: Matthew Garrett <matthewgarrett@xxxxxxxxxx>
- Re: [PATCH RFC 0/4] IMA on NFS prototype
- From: bfields@xxxxxxxxxxxx (J. Bruce Fields)
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH V3] Add support for TPM2 event logs on EFI systems
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v3 00/20] Merge text_poke fixes and executable lockdowns
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2] security: mark expected switch fall-throughs and add a missing break
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v2] security: mark expected switch fall-throughs and add a missing break
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v2] security: mark expected switch fall-throughs and add a missing break
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: [PATCH v3 00/20] Merge text_poke fixes and executable lockdowns
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Add driver for TPM over virtio
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- [PATCH] tpm: Add driver for TPM over virtio
- From: David Tolnay <dtolnay@xxxxxxxxx>
- Re: [PATCH v3 18/20] x86/ftrace: Use vmalloc special flag
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v3 18/20] x86/ftrace: Use vmalloc special flag
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH v3 03/20] x86/mm: Save DRs when loading a temporary mm
- From: Nadav Amit <namit@xxxxxxxxxx>
- Re: [PATCH v3 03/20] x86/mm: Save DRs when loading a temporary mm
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- [PATCH v3 02/20] x86/mm: Introduce temporary mm structs
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 04/20] fork: Provide a function for copying init_mm
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 03/20] x86/mm: Save DRs when loading a temporary mm
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 06/20] x86/alternative: Use temporary mm for text poking
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 07/20] x86/kgdb: Avoid redundant comparison of patched code
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 11/20] x86/jump-label: Remove support for custom poker
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 10/20] x86/module: Avoid breaking W^X while loading modules
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 08/20] x86/ftrace: Set trampoline pages as executable
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 05/20] x86/alternative: Initialize temporary mm for patching
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 01/20] x86/jump_label: Use text_poke_early() during early init
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 00/20] Merge text_poke fixes and executable lockdowns
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 13/20] x86/mm/cpa: Add set_direct_map_ functions
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 12/20] x86/alternative: Remove the return value of text_poke_*()
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 14/20] mm: Make hibernate handle unmapped pages
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 15/20] vmalloc: Add flag for free of special permsissions
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 17/20] bpf: Use vmalloc special flag
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 18/20] x86/ftrace: Use vmalloc special flag
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 19/20] x86/kprobes: Use vmalloc special flag
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 20/20] x86/alternative: Comment about module removal races
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 16/20] modules: Use vmalloc special flag
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 09/20] x86/kprobes: Set instruction page as executable
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH RFC 0/4] IMA on NFS prototype
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- Re: [PATCH RFC 0/4] IMA on NFS prototype
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH RFC 0/4] IMA on NFS prototype
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- Re: IMA fails to see TPM chip (rpi3, linaro optee)
- From: Markku Savela <msa@xxxxxxxxxxx>
- Re: IMA fails to see TPM chip (rpi3, linaro optee)
- From: Markku Savela <msa@xxxxxxxxxxx>
- Re: IMA fails to see TPM chip (rpi3, linaro optee)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH V3] Add support for TPM2 event logs on EFI systems
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 -next] tpm: Fix the type of the return value in calc_tpm2_event_size()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: linux-next: Tree for Feb 20
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: IMA fails to see TPM chip (rpi3, linaro optee)
- From: Markku Savela <msa@xxxxxxxxxxx>
- Re: linux-next: Tree for Feb 20
- From: Zhangshaokun <zhangshaokun@xxxxxxxxxxxxx>
- Re: linux-next: Tree for Feb 20
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: linux-next: Tree for Feb 20
- From: Zhangshaokun <zhangshaokun@xxxxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: add linux-security-module mailing list to TPM drivers
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: add linux-security-module mailing list to TPM drivers
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH V3] Add support for TPM2 event logs on EFI systems
- From: Matthew Garrett <mjg59@xxxxxxxxxx>
- Re: [PATCH v2 15/20] vmalloc: New flags for safe vfree on special perms
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 14/20] mm: Make hibernate handle unmapped pages
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 -next] tpm: Fix the type of the return value in calc_tpm2_event_size()
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] MAINTAINERS: add linux-security-module mailing list to TPM drivers
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: add linux-security-module mailing list to TPM drivers
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH RFC 0/4] IMA on NFS prototype
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: linux-next: Tree for Feb 20
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: linux-next: Tree for Feb 20
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: linux-next: Tree for Feb 20
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 -next] tpm: Fix the type of the return value in calc_tpm2_event_size()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v3 -next] tpm: Fix the type of the return value in calc_tpm2_event_size()
- From: Yue Haibing <yuehaibing@xxxxxxxxxx>
- Re: IMA fails to see TPM chip (rpi3, linaro optee)
- From: Markku Savela <msa@xxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: add linux-security-module mailing list to TPM drivers
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 -next] tpm: Fix the type of the return value in calc_tpm2_event_size()
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH] MAINTAINERS: add linux-security-module mailing list to TPM drivers
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH RFC 0/4] IMA on NFS prototype
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- [PATCH v2 -next] tpm: Fix the type of the return value in calc_tpm2_event_size()
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- Re: [PATCH -next] tpm: change the return type of calc_tpm2_event_size to size_t
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- Re: [PATCH RFC 0/4] IMA on NFS prototype
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 14/20] mm: Make hibernate handle unmapped pages
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 15/20] vmalloc: New flags for safe vfree on special perms
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH -next] tpm: change the return type of calc_tpm2_event_size to size_t
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH -next] tpm: change the return type of calc_tpm2_event_size to size_t
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v2 15/20] vmalloc: New flags for safe vfree on special perms
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH -next] tpm: change the return type of calc_tpm2_event_size to size_t
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- Re: [PATCH V3] Add support for TPM2 event logs on EFI systems
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH V3] Add support for TPM2 event logs on EFI systems
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 14/20] mm: Make hibernate handle unmapped pages
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH -next] tpm: change the return type of calc_tpm2_event_size to size_t
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH -next] tpm: change the return type of calc_tpm2_event_size to size_t
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- Re: [PATCH -next] tpm: change the return type of calc_tpm2_event_size to size_t
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH -next] tpm: change the return type of calc_tpm2_event_size to size_t
- From: YueHaibing <yuehaibing@xxxxxxxxxx>
- Re: [RFC PATCH 1/4] X.509: Parse public key parameters from x509 for akcipher
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] security: mark expected switch fall-throughs and add a missing break
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: [PATCH RFC 4/4] NFSD: Prototype support for IMA on NFS (server)
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- Re: [PATCH RFC 4/4] NFSD: Prototype support for IMA on NFS (server)
- From: bfields@xxxxxxxxxxxx (J. Bruce Fields)
- Re: IMA fails to see TPM chip (rpi3, linaro optee)
- From: Markku Savela <msa@xxxxxxxxxxx>
- Re: [PATCH v3] x86/ima: require signed kernel modules
- From: Jessica Yu <jeyu@xxxxxxxxxx>
- IMA fails to see TPM chip (rpi3, linaro optee)
- From: Markku Savela <msa@xxxxxxxxxxx>
- Re: [RFC PATCH v5 03/12] __wr_after_init: Core and default arch
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- Re: [PATCH v3 1/2] ima: fix build error redeclaration of enumerator
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v3] x86/ima: require signed kernel modules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3] x86/ima: require signed kernel modules
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- [PATCH v3] x86/ima: require signed kernel modules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v5 03/12] __wr_after_init: Core and default arch
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] ima: fix build error redeclaration of enumerator
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v5 03/12] __wr_after_init: Core and default arch
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [PATCH RFC 4/4] NFSD: Prototype support for IMA on NFS (server)
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- [PATCH RFC 3/4] NFS: Prototype support for IMA on NFS (client)
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- [PATCH RFC 2/4] NFS: Rename security xattr handler
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- [PATCH RFC 1/4] NFS: Define common IMA-related protocol elements
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- [PATCH RFC 0/4] IMA on NFS prototype
- From: Chuck Lever <chuck.lever@xxxxxxxxxx>
- Re: [GIT PULL] linux-integrity patches for Linux 5.1
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v2] x86/ima: require signed kernel modules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] x86/ima: require signed kernel modules
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v3 1/2] ima: fix build error redeclaration of enumerator
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [GIT PULL] linux-integrity patches for Linux 5.1
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v5 03/12] __wr_after_init: Core and default arch
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v2] [PATCH] KEYS: trusted: fix -Wvarags warning
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [RFC PATCH v5 05/12] __wr_after_init: x86_64: enable
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [RFC PATCH v5 06/12] __wr_after_init: arm64: enable
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [RFC PATCH v5 07/12] __wr_after_init: Documentation: self-protection
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [RFC PATCH v5 09/12] __wr_after_init: rodata_test: refactor tests
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [RFC PATCH v5 08/12] __wr_after_init: lkdtm test
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [RFC PATCH v5 10/12] __wr_after_init: rodata_test: test __wr_after_init
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [RFC PATCH v5 12/12] IMA: turn ima_policy_flags into __wr_after_init
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [RFC PATCH v5 11/12] __wr_after_init: test write rare functionality
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [RFC PATCH v5 04/12] __wr_after_init: x86_64: randomize mapping offset
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [RFC PATCH v5 03/12] __wr_after_init: Core and default arch
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [RFC PATCH v5 02/12] __wr_after_init: linker section and attribute
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [RFC PATCH v5 00/12] hardening: statically allocated protected memory
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [PATCH v3 2/2] efi: fix build error redeclaration of enumerator
- From: Anders Roxell <anders.roxell@xxxxxxxxxx>
- [PATCH v3 1/2] ima: fix build error redeclaration of enumerator
- From: Anders Roxell <anders.roxell@xxxxxxxxxx>
- Re: [PATCH v3] selftests/tpm2: Extend tests to cover partial reads
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] selftests/tpm2: Extend tests to cover partial reads
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v3] selftests/tpm2: Extend tests to cover partial reads
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v3] selftests/tpm2: Extend tests to cover partial reads
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v2] selftests/tpm2: Open tpm dev in unbuffered mode
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2 2/2] selftests/tpm2: Extend tests to cover partial reads
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] selftests/tpm2: Extend tests to cover partial reads
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2 2/2] selftests/tpm2: Extend tests to cover partial reads
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 4/5] efi/libstub/tpm: Retrieve TPM event log in 2.0 format
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 4/5] efi/libstub/tpm: Retrieve TPM event log in 2.0 format
- From: Bartosz Szczepanek <bsz@xxxxxxxxxxxx>
- [PATCH v2] x86/ima: require signed kernel modules
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 4/5] efi/libstub/tpm: Retrieve TPM event log in 2.0 format
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/5] tpm: Use library version of calc_tpm2_event_size in sysfs code
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/5] tpm: Change calc_tpm2_event_size signature
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/5] tpm: Copy calc_tpm2_event_size() to TPM library
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/5] tpm: Copy calc_tpm2_event_size() to TPM library
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH V3 2/4] tpm: Reserve the TPM final events table
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH V3 3/4] tpm: Append the final event log to the TPM event log
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH V3 4/4] efi: Attempt to get the TCG2 event log in the boot stub
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH V3 1/4] tpm: Abstract crypto agile event size calculations
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/5] Fix overlayfs on EVM
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v2 2/2] efi: fix build error redeclaration of enumerator
- From: Anders Roxell <anders.roxell@xxxxxxxxxx>
- Re: [RFC PATCH 0/5] Fix overlayfs on EVM
- From: Fabian Vogt <fvogt@xxxxxxx>
- Re: [PATCH v4 1/2] tpm: Unify the send callback behaviour
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v2 2/2] selftests/tpm2: Extend tests to cover partial reads
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- [PATCH v2 1/2] selftests/tpm2: Open tpm dev in unbuffered mode
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [PATCH v2] [PATCH] KEYS: trusted: fix -Wvarags warning
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH V2 2/4] tpm: Reserve the TPM final events table
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] selftests: tpm2: Extend tests to cover partial reads
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/5] Fix overlayfs on EVM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2] ima-evm-utils: simplify digest alias handling
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [RFC PATCH v4 00/12] hardening: statically allocated protected memory
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2] ima-evm-utils: rework openssl init
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima-evm-utils: simplify digest alias handling
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH] ima-evm-utils: simplify digest alias handling
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 05/20] x86/alternative: initializing temporary mm for patching
- From: Nadav Amit <nadav.amit@xxxxxxxxx>
- Re: [PATCH] ima-evm-utils: simplify digest alias handling
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v3 7/7] ima-evm-utils: Try to load digest by its alias
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH] ima-evm-utils: simplify digest alias handling
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 7/7] ima-evm-utils: Try to load digest by its alias
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/5] Fix overlayfs on EVM
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH v2 2/2] efi: fix build error redeclaration of enumerator
- From: Anders Roxell <anders.roxell@xxxxxxxxxx>
- [PATCH v2 1/2] ima: fix build error redeclaration of enumerator
- From: Anders Roxell <anders.roxell@xxxxxxxxxx>
- Re: [PATCH 1/2] ima: fix build error redeclaration of enumerator
- From: Anders Roxell <anders.roxell@xxxxxxxxxx>
- Re: [RFC PATCH 0/5] Fix overlayfs on EVM
- From: Fabian Vogt <fvogt@xxxxxxx>
- Re: [PATCH 1/2] ima: fix build error redeclaration of enumerator
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH 1/2] ima: fix build error redeclaration of enumerator
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH 2/2] efi: fix build error redeclaration of enumerator
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH 2/2] efi: fix build error redeclaration of enumerator
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 2/2] efi: fix build error redeclaration of enumerator
- From: Anders Roxell <anders.roxell@xxxxxxxxxx>
- [PATCH 1/2] ima: fix build error redeclaration of enumerator
- From: Anders Roxell <anders.roxell@xxxxxxxxxx>
- Re: [RFC PATCH v4 01/12] __wr_after_init: Core and default arch
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- Re: [RFC PATCH v4 00/12] hardening: statically allocated protected memory
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- Re: [RFC PATCH 0/5] Fix overlayfs on EVM
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH 4/5] Ignore IMA / EVM xattrs during copy_up
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [RFC PATCH v4 01/12] __wr_after_init: Core and default arch
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: remove tpm_dev_wq_lock
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxx>
- Re: [RFC PATCH v4 00/12] hardening: statically allocated protected memory
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC PATCH v4 00/12] hardening: statically allocated protected memory
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC PATCH v4 00/12] hardening: statically allocated protected memory
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [PATCH] ima-evm-utils: simplify digest alias handling
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [RFC PATCH v4 00/12] hardening: statically allocated protected memory
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 13/20] Add set_alias_ function and x86 implementation
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- [RFC PATCH v4 08/12] __wr_after_init: lkdtm test
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [RFC PATCH v4 06/12] __wr_after_init: arm64: enable
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [RFC PATCH v4 05/12] __wr_after_init: arm64: memset_user()
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [RFC PATCH v4 03/12] __wr_after_init: x86_64: randomize mapping offset
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [RFC PATCH v4 01/12] __wr_after_init: Core and default arch
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [RFC PATCH v4 04/12] __wr_after_init: x86_64: enable
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [RFC PATCH v4 07/12] __wr_after_init: Documentation: self-protection
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [RFC PATCH v4 09/12] __wr_after_init: rodata_test: refactor tests
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [RFC PATCH v4 12/12] IMA: turn ima_policy_flags into __wr_after_init
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [RFC PATCH v4 11/12] __wr_after_init: test write rare functionality
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [RFC PATCH v4 10/12] __wr_after_init: rodata_test: test __wr_after_init
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [RFC PATCH v4 02/12] __wr_after_init: x86_64: memset_user()
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- [RFC PATCH v4 00/12] hardening: statically allocated protected memory
- From: Igor Stoppa <igor.stoppa@xxxxxxxxx>
- Re: [PATCH v2 13/20] Add set_alias_ function and x86 implementation
- From: Andy Lutomirski <luto@xxxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]