Linux Integrity
[Prev Page][Next Page]
- Re: Issue with TPM2 Encrypt/Decrypt Functionality and TSS API Integration
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH v3 00/32] spi: get rid of some legacy macros
- From: patchwork-bot+chrome-platform@xxxxxxxxxx
- Re: [PATCH v3 00/32] spi: get rid of some legacy macros
- From: patchwork-bot+chrome-platform@xxxxxxxxxx
- Re: kernel crash in mknod
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- RE: kernel crash in mknod
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxx>
- Re: [PATCH v4] Documentation: tpm_tis
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v4] Documentation: tpm_tis
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v4] Documentation: tpm_tis
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 01/15] x86/boot: Place kernel_info at a fixed offset
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] Documentation: tpm_tis
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] Documentation: tpm_tis
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [PATCH v8 01/15] x86/boot: Place kernel_info at a fixed offset
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- [PATCH] ima: Fix use-after-free on a dentry's dname.name
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v4] Documentation: tpm_tis
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC v15 12/21] security: add security_bdev_setintegrity() hook
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] Documentation: tpm_tis
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] Documentation: tpm_tis
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH v3] Documentation: tpm_tis
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] Documentation: tpm_tis
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] Documentation: tpm_tis
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] Documentation: tpm_tis
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] Documentation: tpm_tis
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3][next] integrity: Avoid -Wflex-array-member-not-at-end warnings
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: [PATCH v2] Documentation: tpm_tis
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] Documentation: tpm_tis
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v4] ima: add crypto agility support for template-hash algorithm
- From: Enrico Bravi <enrico.bravi@xxxxxxxxx>
- Re: [PATCH v8 14/15] x86: Secure Launch late initcall platform module
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3][next] integrity: Avoid -Wflex-array-member-not-at-end warnings
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 01/15] x86/boot: Place kernel_info at a fixed offset
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH v2 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: Patrick Uiterwijk <patrick@xxxxxxxxxxxxxx>
- [PATCH v3][next] integrity: Avoid -Wflex-array-member-not-at-end warnings
- From: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
- [PATCH v2][next] integrity: Avoid -Wflex-array-member-not-at-end warnings
- From: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
- Re: [PATCH][next] integrity: Avoid -Wflex-array-member-not-at-end warnings
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH v2 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: Dmitry Baryshkov <dbaryshkov@xxxxxxxxx>
- Re: [PATCH][next] integrity: Avoid -Wflex-array-member-not-at-end warnings
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH RFC v15 12/21] security: add security_bdev_setintegrity() hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH v2 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH RFC v15 14/21] dm verity: consume root hash digest and signature data via LSM hook
- From: Mike Snitzer <snitzer@xxxxxxxxxx>
- Re: [PATCH RFC v15 14/21] dm verity: consume root hash digest and signature data via LSM hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v15 14/21] dm verity: consume root hash digest and signature data via LSM hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] Documentation: tpm_tis
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2] Documentation: tpm_tis
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v4] ima: add crypto agility support for template-hash algorithm
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4] ima: add crypto agility support for template-hash algorithm
- From: Enrico Bravi <enrico.bravi@xxxxxxxxx>
- Re: [PATCH v4] ima: add crypto agility support for template-hash algorithm
- From: Enrico Bravi <enrico.bravi@xxxxxxxxx>
- [PATCH v2] Documentation: tpm_tis
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC v15 12/21] security: add security_bdev_setintegrity() hook
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC v15 12/21] security: add security_bdev_setintegrity() hook
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC v15 14/21] dm verity: consume root hash digest and signature data via LSM hook
- From: Mike Snitzer <snitzer@xxxxxxxxxx>
- Re: [PATCH v3 08/10] evm: Enforce signatures on unsupported filesystem for EVM_INIT_X509
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v15 17/21] fsverity: consume builtin signature via LSM hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v15 16/21] security: add security_inode_setintegrity() hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v15 14/21] dm verity: consume root hash digest and signature data via LSM hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v15 12/21] security: add security_bdev_setintegrity() hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 01/10] ima: Rename backing_inode to real_inode
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 02/10] security: allow finer granularity in permitting copy-up of security xattrs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 04/10] evm: Use the metadata inode to calculate metadata hash
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 10/10] evm: Rename is_unsupported_fs to is_unsupported_hmac_fs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 09/10] fs: Rename SB_I_EVM_UNSUPPORTED to SB_I_EVM_HMAC_UNSUPPORTED
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 07/10] ima: re-evaluate file integrity on file metadata change
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 03/10] evm: Implement per signature type decision in security_inode_copy_up_xattr
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Fix suspend/shutdown on some boards by preserving chip Locality
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm: Fix suspend/shutdown on some boards by preserving chip Locality
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH v2] MAINTAINERS: Update URL's for KEYS/KEYRINGS_INTEGRITY and TPM DEVICE DRIVER
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: Update W's for KEYS/KEYRINGS_INTEGRITY and TPM DEVICE RIVER
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm: Fix suspend/shutdown on some boards by preserving chip Locality
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm: Fix suspend/shutdown on some boards by preserving chip Locality
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH][next] integrity: Avoid -Wflex-array-member-not-at-end warnings
- From: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH v2 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: Alberto Mardegan <a.mardegan@xxxxxx>
- Re: [RFC PATCH v15 18/21] ipe: enable support for fs-verity as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v15 18/21] ipe: enable support for fs-verity as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH v2 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH v2 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: Petr Vorel <pvorel@xxxxxxx>
- Re: [ima-evm-utils: PATCH v2 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [ima-evm-utils: PATCH v2 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- [ima-evm-utils: PATCH v2 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- Re: [PATCH v4] ima: add crypto agility support for template-hash algorithm
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4] ima: add crypto agility support for template-hash algorithm
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v15 18/21] ipe: enable support for fs-verity as a trust provider
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v15 17/21] fsverity: consume builtin signature via LSM hook
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH v15 18/21] ipe: enable support for fs-verity as a trust provider
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH v15 05/21] initramfs|security: Add a security hook to do_populate_rootfs()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v15 05/21] initramfs|security: Add a security hook to do_populate_rootfs()
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [RFC PATCH v15 21/21] documentation: add ipe documentation
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v15 09/21] uapi|audit|ipe: add ipe auditing support
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v15 19/21] scripts: add boot policy generation program
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v15 20/21] ipe: kunit test for parser
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v15 13/21] dm: add finalize hook to target_type
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v15 08/21] ipe: add userspace interface
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v15 16/21] security: add security_inode_setintegrity() hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v15 15/21] ipe: add support for dm-verity as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v15 17/21] fsverity: consume builtin signature via LSM hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v15 10/21] ipe: add permissive toggle
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v15 18/21] ipe: enable support for fs-verity as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v15 12/21] security: add security_bdev_setintegrity() hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v15 14/21] dm verity: consume root hash digest and signature data via LSM hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v15 11/21] block|security: add LSM blob to block_device
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v15 07/21] security: add new securityfs delete function
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v15 06/21] ipe: introduce 'boot_verified' as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v15 05/21] initramfs|security: Add a security hook to do_populate_rootfs()
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v15 02/21] ipe: add policy parser
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v15 01/21] security: add ipe lsm
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v15 04/21] ipe: add LSM hooks on execution and kernel read
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v15 00/21] Integrity Policy Enforcement LSM (IPE)
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v15 03/21] ipe: add evaluation loop
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Fix suspend/shutdown on some boards by preserving chip Locality
- From: Adam Alves <adamoa@xxxxxxxxx>
- Re: [PATCH v2] tpm: Fix suspend/shutdown on some boards by preserving chip Locality
- From: Adam Alves <adamoa@xxxxxxxxx>
- Re: [ima-evm-utils: PATCH v1 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd changes for v6.9
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v2] tpm: Fix suspend/shutdown on some boards by preserving chip Locality
- From: Adam Alves <adamoa@xxxxxxxxx>
- Re: [ima-evm-utils: PATCH v1 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- Re: [PATCH v2] integrity: eliminate unnecessary "Problem loading X.509 certificate" msg
- From: Coiby Xu <coxu@xxxxxxxxxx>
- Re: [RFC PATCH v14 15/19] fsverity: consume builtin signature via LSM hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 3/3] tpm: of: If available use linux,sml-log to get the log and its size
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] powerpc/prom_init: Replace linux,sml-base/sml-size with linux,sml-log
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] tpm: of: If available Use linux,sml-log to get the log and its size
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC PATCH v14 15/19] fsverity: consume builtin signature via LSM hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v14 15/19] fsverity: consume builtin signature via LSM hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v14 15/19] fsverity: consume builtin signature via LSM hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v14 15/19] fsverity: consume builtin signature via LSM hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] powerpc/prom_init: Replace linux,sml-base/sml-size with linux,sml-log
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [RFC PATCH v2 2/3] dt-bindings: tpm: Add linux,sml-log to ibm,vtpm.yaml
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/2] tpm: of: If available Use linux,sml-log to get the log and its size
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 3/3] tpm: of: If available use linux,sml-log to get the log and its size
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC 1/8] certs: Introduce ability to link to a system key
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 2/3] dt-bindings: tpm: Add linux,sml-log to ibm,vtpm.yaml
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH RFC 8/8] clavis: Introduce new LSM called clavis
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH v14 15/19] fsverity: consume builtin signature via LSM hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 2/3] dt-bindings: tpm: Add linux,sml-log to ibm,vtpm.yaml
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH 2/2] tpm: of: If available Use linux,sml-log to get the log and its size
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] powerpc/prom_init: Replace linux,sml-base/sml-size with linux,sml-log
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- RE: [EXTERNAL] [PATCH RFC 1/8] certs: Introduce ability to link to a system key
- From: Bharat Bhushan <bbhushan2@xxxxxxxxxxx>
- Re: [RFC PATCH v14 15/19] fsverity: consume builtin signature via LSM hook
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH v14 15/19] fsverity: consume builtin signature via LSM hook
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH RFC 8/8] clavis: Introduce new LSM called clavis
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [GIT PULL] tpmdd changes for v6.9
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC 1/8] certs: Introduce ability to link to a system key
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH RFC 1/8] certs: Introduce ability to link to a system key
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH v2 3/3] tpm: of: If available use linux,sml-log to get the log and its size
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2 3/3] tpm: of: If available use linux,sml-log to get the log and its size
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 1/3] powerpc/prom_init: Replace linux,sml-base/sml-size with linux,sml-log
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/2] tpm: of: If available Use linux,sml-log to get the log and its size
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 3/6] KEYS: trusted: Introduce NXP DCP-backed trusted keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] tpm: Fix suspend/shutdown on some boards by preserving chip Locality
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC 1/8] certs: Introduce ability to link to a system key
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC 1/8] certs: Introduce ability to link to a system key
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 1/3] powerpc/prom_init: Replace linux,sml-base/sml-size with linux,sml-log
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC PATCH v14 05/19] initramfs|security: Add a security hook to do_populate_rootfs()
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v14 01/19] security: add ipe lsm
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 1/3] powerpc/prom_init: Replace linux,sml-base/sml-size with linux,sml-log
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [RFC PATCH v2 1/3] powerpc/prom_init: Replace linux,sml-base/sml-size with linux,sml-log
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH RFC 8/8] clavis: Introduce new LSM called clavis
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC 7/8] clavis: Introduce a new key type called clavis_key_acl
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC 6/8] keys: Add ability to track intended usage of the public key
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC 0/8] Clavis LSM
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC 5/8] keys: Add new verification type (VERIFYING_CLAVIS_SIGNATURE)
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC 4/8] clavis: Prevent clavis boot param from changing during kexec
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC 2/8] clavis: Introduce a new system keyring called clavis
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC 1/8] certs: Introduce ability to link to a system key
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH RFC 3/8] efi: Make clavis boot param persist across kexec
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [RFC PATCH v14 05/19] initramfs|security: Add a security hook to do_populate_rootfs()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v14 01/19] security: add ipe lsm
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC][PATCH 5/8] ima: Record IMA verification result of digest lists in digest cache
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC PATCH v2 2/3] dt-bindings: tpm: Add linux,sml-log to ibm,vtpm.yaml
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC PATCH v2 3/3] tpm: of: If available use linux,sml-log to get the log and its size
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC PATCH v2 1/3] powerpc/prom_init: Replace linux,sml-base/sml-size with linux,sml-log
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [RFC PATCH v2 0/3] Preserve TPM log across kexec
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC][PATCH 4/8] ima: Add digest_cache_measure and digest_cache_appraise boot-time policies
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC][PATCH 8/8] ima: Detect if digest cache changed since last measurement/appraisal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC][PATCH 8/8] ima: Detect if digest cache changed since last measurement/appraisal
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v14 00/19] Integrity Policy Enforcement LSM (IPE)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] powerpc/prom_init: Replace linux,sml-base/sml-size with linux,sml-log
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] powerpc/prom_init: Replace linux,sml-base/sml-size with linux,sml-log
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [RFC][PATCH 8/8] ima: Detect if digest cache changed since last measurement/appraisal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC][PATCH 6/8] ima: Use digest cache for measurement
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC][PATCH 6/8] ima: Use digest cache for measurement
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3] tpm: Fix suspend/shutdown on some boards by preserving chip Locality
- From: Adam Alves <adamoa@xxxxxxxxx>
- Re: [RFC][PATCH 4/8] ima: Add digest_cache_measure and digest_cache_appraise boot-time policies
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Fix suspend/shutdown on some boards by preserving chip Locality
- From: Adam Alves <adamoa@xxxxxxxxx>
- Re: [RFC][PATCH 3/8] ima: Add digest_cache policy keyword
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] powerpc/prom_init: Replace linux,sml-base/sml-size with linux,sml-log
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] tpm: of: If available Use linux,sml-log to get the log and its size
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v4] ima: add crypto agility support for template-hash algorithm
- From: Enrico Bravi <enrico.bravi@xxxxxxxxx>
- Re: [RFC][PATCH 4/8] ima: Add digest_cache_measure and digest_cache_appraise boot-time policies
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Fix suspend/shutdown on some boards by preserving chip Locality
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: [RFC][PATCH 3/8] ima: Add digest_cache policy keyword
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC][PATCH 2/8] ima: Nest iint mutex for DIGEST_LIST_CHECK hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 3/6] KEYS: trusted: Introduce NXP DCP-backed trusted keys
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v2] tpm: Fix suspend/shutdown on some boards by preserving chip Locality
- From: Adam Alves <adamoa@xxxxxxxxx>
- Re: [PATCH 0/2] Preserve TPM log across kexec
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] Fix TPM chip hanging system before suspend/shutdown
- From: Adam Alves <adamoa@xxxxxxxxx>
- Re: [PATCH 1/2] powerpc/prom_init: Replace linux,sml-base/sml-size with linux,sml-log
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 0/2] Preserve TPM log across kexec
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 1/2] powerpc/prom_init: Replace linux,sml-base/sml-size with linux,sml-log
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH 1/2] powerpc/prom_init: Replace linux,sml-base/sml-size with linux,sml-log
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] powerpc/prom_init: Replace linux,sml-base/sml-size with linux,sml-log
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH] tpm,tpm_tis: Avoid warning splat at shutdown
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: [RFC][PATCH 4/8] ima: Add digest_cache_measure and digest_cache_appraise boot-time policies
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] powerpc/prom_init: Replace linux,sml-base/sml-size with linux,sml-log
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm,tpm_tis: Avoid warning splat at shutdown
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] xattr: restrict vfs_getxattr_alloc() allocation size
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] xattr: restrict vfs_getxattr_alloc() allocation size
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/2] tpm: of: If available Use linux,sml-log to get the log and its size
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/2] tpm: of: If available Use linux,sml-log to get the log and its size
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/1] Fix TPM chip hanging system before suspend/shutdown
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] Fix TPM chip hanging system before suspend/shutdown
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC][PATCH 2/8] ima: Nest iint mutex for DIGEST_LIST_CHECK hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC][PATCH 3/8] ima: Add digest_cache policy keyword
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: tpm_tis_remove: `WARNING: CPU: 6 PID: 265 at kernel/workqueue.c:3397 __flush_work.isra.0+0x29f/0x2c0`
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 5/6] docs: document DCP-backed trusted keys kernel params
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 3/6] KEYS: trusted: Introduce NXP DCP-backed trusted keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 3/6] KEYS: trusted: Introduce NXP DCP-backed trusted keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 2/6] KEYS: trusted: improve scalability of trust source config
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 1/6] crypto: mxs-dcp: Add support for hardware-bound keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH v6 6/6] docs: trusted-encrypted: add DCP as new trust source
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v6 5/6] docs: document DCP-backed trusted keys kernel params
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v6 4/6] MAINTAINERS: add entry for DCP-based trusted keys
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v6 3/6] KEYS: trusted: Introduce NXP DCP-backed trusted keys
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v6 2/6] KEYS: trusted: improve scalability of trust source config
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v6 1/6] crypto: mxs-dcp: Add support for hardware-bound keys
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v5 0/6] DCP as trusted keys backend
- From: David Gstir <david@xxxxxxxxxxxxx>
- Re: [PATCH v5 4/6] MAINTAINERS: add entry for DCP-based trusted keys
- From: David Gstir <david@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] powerpc/prom_init: Replace linux,sml-base/sml-size with linux,sml-log
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] evm: Change vfs_getxattr() with __vfs_getxattr() in evm_calc_hmac_or_hash()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] tpm: of: If available Use linux,sml-log to get the log and its size
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] evm: Change vfs_getxattr() with __vfs_getxattr() in evm_calc_hmac_or_hash()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] evm: Change vfs_getxattr() with __vfs_getxattr() in evm_calc_hmac_or_hash()
- From: Seth Forshee <sforshee@xxxxxxxxxx>
- [PATCH] evm: Change vfs_getxattr() with __vfs_getxattr() in evm_calc_hmac_or_hash()
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] tpm: of: If available Use linux,sml-log to get the log and its size
- From: Conor Dooley <conor.dooley@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] tpm: of: If available Use linux,sml-log to get the log and its size
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] powerpc/prom_init: Replace linux,sml-base/sml-size with linux,sml-log
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v39 01/42] integrity: disassociate ima_filter_rule from security_audit_rule
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v14 17/19] scripts: add boot policy generation program
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH 1/1] Fix TPM chip hanging system before suspend/shutdown
- From: Adam Alves <adamoa@xxxxxxxxx>
- [PATCH 0/1] Fix TPM chip hanging system before suspend/shutdown
- From: Adam Alves <adamoa@xxxxxxxxx>
- Re: [RFC PATCH v14 16/19] ipe: enable support for fs-verity as a trust provider
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [RFC PATCH v14 14/19] ipe: add support for dm-verity as a trust provider
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [RFC PATCH v14 19/19] documentation: add ipe documentation
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v14 16/19] ipe: enable support for fs-verity as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v14 17/19] scripts: add boot policy generation program
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v14 08/19] ipe: add userspace interface
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v14 11/19] block|security: add LSM blob to block_device
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v14 14/19] ipe: add support for dm-verity as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v14 18/19] ipe: kunit test for parser
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v14 15/19] fsverity: consume builtin signature via LSM hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v14 13/19] dm verity: consume root hash digest and signature data via LSM hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v14 09/19] uapi|audit|ipe: add ipe auditing support
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v14 12/19] dm: add finalize hook to target_type
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v14 06/19] ipe: introduce 'boot_verified' as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v14 10/19] ipe: add permissive toggle
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v14 07/19] security: add new securityfs delete function
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v14 05/19] initramfs|security: Add a security hook to do_populate_rootfs()
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v14 02/19] ipe: add policy parser
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v14 03/19] ipe: add evaluation loop
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v14 00/19] Integrity Policy Enforcement LSM (IPE)
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v14 04/19] ipe: add LSM hooks on execution and kernel read
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v14 01/19] security: add ipe lsm
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [PATCH] Fix TPM chip hanging system before suspend/shutdown
- From: Adam Alves <adamoa@xxxxxxxxx>
- Re: [PATCH v39 01/42] integrity: disassociate ima_filter_rule from security_audit_rule
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] Preserve TPM log across kexec
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 2/2] tpm: of: If available Use linux,sml-log to get the log and its size
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 1/2] powerpc/prom_init: Replace linux,sml-base/sml-size with linux,sml-log
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 0/2] Preserve TPM log across kexec
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2 24/25] commoncap: use vfs fscaps interfaces
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] integrity: eliminate unnecessary "Problem loading X.509 certificate" msg
- From: Maxime Ripard <mripard@xxxxxxxxxx>
- Re: [PATCH v2] integrity: eliminate unnecessary "Problem loading X.509 certificate" msg
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] integrity: eliminate unnecessary "Problem loading X.509 certificate" msg
- From: Maxime Ripard <mripard@xxxxxxxxxx>
- Re: [PATCH v39 01/42] integrity: disassociate ima_filter_rule from security_audit_rule
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 24/25] commoncap: use vfs fscaps interfaces
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 24/25] commoncap: use vfs fscaps interfaces
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 24/25] commoncap: use vfs fscaps interfaces
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Issue with TPM2 Encrypt/Decrypt Functionality and TSS API Integration
- From: Samuel Lee <slee@xxxxxxxxxxxxx>
- Re: [GIT PULL] integrity: subsystem update for v6.8-rcX
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v2 24/25] commoncap: use vfs fscaps interfaces
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- Re: [PATCH v2 24/25] commoncap: use vfs fscaps interfaces
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 24/25] commoncap: use vfs fscaps interfaces
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 24/25] commoncap: use vfs fscaps interfaces
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- Re: [PATCH v2 24/25] commoncap: use vfs fscaps interfaces
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 24/25] commoncap: use vfs fscaps interfaces
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH] xattr: restrict vfs_getxattr_alloc() allocation size
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: tpm_tis_remove: `WARNING: CPU: 6 PID: 265 at kernel/workqueue.c:3397 __flush_work.isra.0+0x29f/0x2c0`
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: [PATCH] tpm,tpm_tis: Avoid warning splat at shutdown
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: [PATCH] xattr: restrict vfs_getxattr_alloc() allocation size
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH] xattr: restrict vfs_getxattr_alloc() allocation size
- From: Seth Forshee <sforshee@xxxxxxxxxx>
- Re: [PATCH] xattr: restrict vfs_getxattr_alloc() allocation size
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v2 24/25] commoncap: use vfs fscaps interfaces
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH] xattr: restrict vfs_getxattr_alloc() allocation size
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [GIT PULL] integrity: subsystem update for v6.8-rcX
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 24/25] commoncap: use vfs fscaps interfaces
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH] Documentation: tpm_tis
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- Re: [PATCH] Documentation: tpm_tis
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v5 0/6] DCP as trusted keys backend
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 4/6] MAINTAINERS: add entry for DCP-based trusted keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 3/6] KEYS: trusted: Introduce NXP DCP-backed trusted keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 2/6] KEYS: trusted: improve scalability of trust source config
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 1/6] crypto: mxs-dcp: Add support for hardware-bound keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 1/6] crypto: mxs-dcp: Add support for hardware-bound keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] Documentation: tpm_tis
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH] Documentation: tpm_tis
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2] MAINTAINERS: Update W's for KEYS/KEYRINGS_INTEGRITY and TPM DEVICE DRIVER
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH][next] integrity: Avoid -Wflex-array-member-not-at-end warnings
- From: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
- Re: [PATCH v2 24/25] commoncap: use vfs fscaps interfaces
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- Re: [PATCH v2 24/25] commoncap: use vfs fscaps interfaces
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 24/25] commoncap: use vfs fscaps interfaces
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- Re: [PATCH v2 14/25] evm: add support for fscaps security hooks
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 06/25] capability: provide helpers for converting between xattrs and vfs_caps
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- Re: [PATCH v2 24/25] commoncap: use vfs fscaps interfaces
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 06/25] capability: provide helpers for converting between xattrs and vfs_caps
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [syzbot] [integrity?] [lsm?] KMSAN: uninit-value in ima_add_template_entry
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [syzbot] [lsm?] [integrity?] KMSAN: uninit-value in ima_add_template_entry
- From: syzbot <syzbot+7bc44a489f0ef0670bd5@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v13 14/20] dm verity: consume root hash digest and signature data via LSM hook
- From: Mike Snitzer <snitzer@xxxxxxxxxx>
- Re: [RFC PATCH v13 14/20] dm verity: consume root hash digest and signature data via LSM hook
- From: Mike Snitzer <snitzer@xxxxxxxxxx>
- Re: [RFC PATCH v13 13/20] dm: add finalize hook to target_type
- From: Mike Snitzer <snitzer@xxxxxxxxxx>
- Re: [RFC PATCH v13 12/20] dm verity: set DM_TARGET_SINGLETON feature flag
- From: Mike Snitzer <snitzer@xxxxxxxxxx>
- Re: TPM error path on probe
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 06/25] capability: provide helpers for converting between xattrs and vfs_caps
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- Re: [PATCH v2 11/25] security: add hooks for set/get/remove of fscaps
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- Re: [PATCH v2 06/25] capability: provide helpers for converting between xattrs and vfs_caps
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH v1 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2 11/25] security: add hooks for set/get/remove of fscaps
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 14/25] evm: add support for fscaps security hooks
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 14/25] evm: add support for fscaps security hooks
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [ima-evm-utils PATCH] Add missing newline to error message
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2 14/25] evm: add support for fscaps security hooks
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 14/25] evm: add support for fscaps security hooks
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 14/25] evm: add support for fscaps security hooks
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v5 4/8] ima: kexec: define functions to copy IMA log at soft boot
- From: Petr Tesařík <petr@xxxxxxxxxxx>
- Re: [PATCH v2 14/25] evm: add support for fscaps security hooks
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH v1 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: Frank Sorenson <sorenson@xxxxxxxxxx>
- Re: [RFC PATCH v13 17/20] ipe: enable support for fs-verity as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v13 17/20] ipe: enable support for fs-verity as a trust provider
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH v13 17/20] ipe: enable support for fs-verity as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: TPM error path on probe
- From: Tim Harvey <tharvey@xxxxxxxxxxxxx>
- Re: [PATCH v5 6/8] ima: suspend measurements during buffer copy at kexec execute
- From: Petr Tesařík <petr@xxxxxxxxxxx>
- Re: TPM error path on probe
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [RFC PATCH v13 17/20] ipe: enable support for fs-verity as a trust provider
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH v13 17/20] ipe: enable support for fs-verity as a trust provider
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [RFC PATCH v13 20/20] documentation: add ipe documentation
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v13 17/20] ipe: enable support for fs-verity as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v13 15/20] ipe: add support for dm-verity as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v13 09/20] uapi|audit|ipe: add ipe auditing support
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v13 19/20] ipe: kunit test for parser
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v13 18/20] scripts: add boot policy generation program
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v13 08/20] ipe: add userspace interface
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v13 16/20] fsverity: consume builtin signature via LSM hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v13 12/20] dm verity: set DM_TARGET_SINGLETON feature flag
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v13 11/20] block|security: add LSM blob to block_device
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v13 13/20] dm: add finalize hook to target_type
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v13 14/20] dm verity: consume root hash digest and signature data via LSM hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v13 10/20] ipe: add permissive toggle
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v13 07/20] security: add new securityfs delete function
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v13 06/20] ipe: introduce 'boot_verified' as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v13 05/20] initramfs|security: Add a security hook to do_populate_rootfs()
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v13 01/20] security: add ipe lsm
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v13 00/20] Integrity Policy Enforcement LSM (IPE)
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v13 04/20] ipe: add LSM hooks on execution and kernel read
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v13 02/20] ipe: add policy parser
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v13 03/20] ipe: add evaluation loop
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- TPM error path on probe
- From: Tim Harvey <tharvey@xxxxxxxxxxxxx>
- Re: [PATCH v3 00/13] security: digest_cache LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 ima-evm-utils 4/7] evmctl: Replace deprecated sign_hash with imaevm_signhash
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v4 ima-evm-utils 1/7] tests: Skip pkcs11 test if no engine support in evmctl
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v4 ima-evm-utils 5/7] Add support for OpenSSL provider to the library and evmctl
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v4 ima-evm-utils 7/7] ci: Install pkcs11-provider where available
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v4 ima-evm-utils 0/7] Implement imaevm_signhash and add provider support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v4 ima-evm-utils 2/7] headers: Remove usage of CONFIG_IMA_EVM_ENGINE from public header
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v4 ima-evm-utils 6/7] tests: Add pkcs11 test using provider
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v4 ima-evm-utils 3/7] Implement imaevm_signhash library function and deprecate sign_hash
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: Add TPM DT bindings to TPM maintainers
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: Update W's for KEYS/KEYRINGS_INTEGRITY and TPM DEVICE RIVER
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 20/25] ovl: add fscaps handlers
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: Add TPM DT bindings to TPM maintainers
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v2 20/25] ovl: add fscaps handlers
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [ima-evm-utils: PATCH v1 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: André Draszik <git@xxxxxxxxxx>
- Re: [ima-evm-utils: PATCH v1 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: Tergel Myanganbayar <tergelmyanganbayar2024@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 ima-evm-utils 0/7] Deprecate sign_hash and add provider support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 ima-evm-utils 4/7] evmctl: Replace deprecated sign_hash with imaevm_signhash
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 ima-evm-utils 3/7] Pass ENGINE and keyid through to function using them
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 ima-evm-utils 7/7] ci: Install pkcs11-provider where available
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 ima-evm-utils 0/7] Deprecate sign_hash and add provider support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 ima-evm-utils 5/7] Add support for OpenSSL provider to the library and evmctl
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 ima-evm-utils 6/7] tests: Add pkcs11 test using provider
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 ima-evm-utils 2/7] headers: Remove usage of CONFIG_IMA_EVM_ENGINE from public header
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 ima-evm-utils 1/7] tests: Skip pkcs11 test if no engine support in evmctl
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH v1 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: George Wilson <gcwilson@xxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH v1 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 ima-evm-utils 2/6] Pass ENGINE and keyid through to function using them
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: Update W's for KEYS/KEYRINGS_INTEGRITY and TPM DEVICE RIVER
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: Update W's for KEYS/KEYRINGS_INTEGRITY and TPM DEVICE RIVER
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: Update W's for KEYS/KEYRINGS_INTEGRITY and TPM DEVICE RIVER
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 0/6] DCP as trusted keys backend
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: Update W's for KEYS/KEYRINGS_INTEGRITY and TPM DEVICE RIVER
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: Update W's for KEYS/KEYRINGS_INTEGRITY and TPM DEVICE RIVER
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- [PATCH] MAINTAINERS: Update W's for KEYS/KEYRINGS_INTEGRITY and TPM DEVICE RIVER
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 0/6] DCP as trusted keys backend
- From: Richard Weinberger <richard@xxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH v1 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: "Bruno Meneguele" <bmeneg@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [ima-evm-utils: PATCH v1 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH v1 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 21/21] tpm: disable the TPM if NULL name changes
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [ima-evm-utils: PATCH v1 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [ima-evm-utils: PATCH v1 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH v1 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v3 10/10] evm: Rename is_unsupported_fs to is_unsupported_hmac_fs
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 09/10] fs: Rename SB_I_EVM_UNSUPPORTED to SB_I_EVM_HMAC_UNSUPPORTED
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 03/10] evm: Implement per signature type decision in security_inode_copy_up_xattr
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 02/10] security: allow finer granularity in permitting copy-up of security xattrs
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 08/10] evm: Enforce signatures on unsupported filesystem for EVM_INIT_X509
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 05/10] ima: Move file-change detection variables into new structure
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 06/10] evm: Store and detect metadata inode attributes changes
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 01/10] ima: Rename backing_inode to real_inode
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 04/10] evm: Use the metadata inode to calculate metadata hash
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 07/10] ima: re-evaluate file integrity on file metadata change
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v3 00/10] evm: Support signatures on stacked filesystem
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v7 19/21] tpm: add the null key name as a sysfs export
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 18/21] KEYS: trusted: Add session encryption protection to the seal/unseal path
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 17/21] tpm: add session encryption protection to tpm2_get_random()
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 16/21] tpm: add hmac checks to tpm2_pcr_extend()
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 15/21] tpm: Add the rest of the session HMAC API
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 14/21] tpm: Add HMAC session name/handle append
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v7 13/21] tpm: Add HMAC session start and end functions
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Re: [PATCH v7 12/21] tpm: Add NULL primary creation
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH v2 ima-evm-utils 4/6] Add support for OpenSSL provider to the library and evmctl
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 ima-evm-utils 3/6] evmctl: Replace deprecated sign_hash with imaevm_signhash
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 ima-evm-utils 1/6] headers: Remove usage of CONFIG_IMA_EVM_ENGINE from public header
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 ima-evm-utils 6/6] ci: Install pkcs11-provider where available
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 ima-evm-utils 5/6] tests: Add pkcs11 test using provider
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 ima-evm-utils 0/6] Deprecate sign_hash and add provider support
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v2 ima-evm-utils 2/6] Pass ENGINE and keyid through to function using them
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 14/15] x86: Secure Launch late initcall platform module
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 20/25] ovl: add fscaps handlers
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 19/25] fs: add vfs_remove_fscaps()
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 18/25] fs: add vfs_set_fscaps()
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 17/25] fs: add vfs_get_fscaps()
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 16/25] fs: add inode operations to get/set/remove fscaps
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 11/25] security: add hooks for set/get/remove of fscaps
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 10/25] xattr: use is_fscaps_xattr()
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 09/25] commoncap: use is_fscaps_xattr()
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 08/25] xattr: add is_fscaps_xattr() helper
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 06/25] capability: provide helpers for converting between xattrs and vfs_caps
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 04/15] x86: Secure Launch Resource Table header file
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v5 6/8] ima: suspend measurements during buffer copy at kexec execute
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 00/25] fs: use type-safe uid representation for filesystem capabilities
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- Re: [RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v2 06/25] capability: provide helpers for converting between xattrs and vfs_caps
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- Re: [PATCH v2 00/25] fs: use type-safe uid representation for filesystem capabilities
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v5 6/8] ima: suspend measurements during buffer copy at kexec execute
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 7/8] ima: make the kexec extra memory configurable
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 07/25] capability: provide a helper for converting vfs_caps to xattr for userspace
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 06/25] capability: provide helpers for converting between xattrs and vfs_caps
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 05/25] capability: use vfsuid_t for vfs_caps rootids
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 03/25] capability: add static asserts for comapatibility of vfs_cap_data and vfs_ns_cap_data
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 02/25] mnt_idmapping: include cred.h
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 01/25] mnt_idmapping: split out core vfs[ug]id_t definitions into vfsid.h
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v8 14/15] x86: Secure Launch late initcall platform module
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Re: [PATCH v8 04/15] x86: Secure Launch Resource Table header file
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v8 04/15] x86: Secure Launch Resource Table header file
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Re: [PATCH v5 5/8] ima: kexec: move IMA log copy from kexec load to execute
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 15/25] security: call evm fscaps hooks from generic security hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 12/25] selinux: add hooks for fscaps operations
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- Re: [PATCH v2 15/25] security: call evm fscaps hooks from generic security hooks
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- Re: [PATCH v2 12/25] selinux: add hooks for fscaps operations
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 13/25] smack: add hooks for fscaps operations
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- Re: [PATCH v2 12/25] selinux: add hooks for fscaps operations
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- Re: [PATCH v2 11/25] security: add hooks for set/get/remove of fscaps
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- Re: [PATCH v2 15/25] security: call evm fscaps hooks from generic security hooks
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 12/25] selinux: add hooks for fscaps operations
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 11/25] security: add hooks for set/get/remove of fscaps
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v8 15/15] x86: EFI stub DRTM launch support for Secure Launch
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2 13/25] smack: add hooks for fscaps operations
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/8] ima: kexec: define functions to copy IMA log at soft boot
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 4/8] ima: kexec: define functions to copy IMA log at soft boot
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 25/25] vfs: return -EOPNOTSUPP for fscaps from vfs_*xattr()
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 24/25] commoncap: use vfs fscaps interfaces
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 23/25] commoncap: remove cap_inode_getsecurity()
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 15/25] security: call evm fscaps hooks from generic security hooks
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 21/25] ovl: use vfs_{get,set}_fscaps() for copy-up
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 19/25] fs: add vfs_remove_fscaps()
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 18/25] fs: add vfs_set_fscaps()
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 20/25] ovl: add fscaps handlers
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 17/25] fs: add vfs_get_fscaps()
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 16/25] fs: add inode operations to get/set/remove fscaps
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 22/25] fs: use vfs interfaces for capabilities xattrs
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 09/25] commoncap: use is_fscaps_xattr()
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 11/25] security: add hooks for set/get/remove of fscaps
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 14/25] evm: add support for fscaps security hooks
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 10/25] xattr: use is_fscaps_xattr()
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 13/25] smack: add hooks for fscaps operations
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 12/25] selinux: add hooks for fscaps operations
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 08/25] xattr: add is_fscaps_xattr() helper
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 07/25] capability: provide a helper for converting vfs_caps to xattr for userspace
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 06/25] capability: provide helpers for converting between xattrs and vfs_caps
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 05/25] capability: use vfsuid_t for vfs_caps rootids
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 03/25] capability: add static asserts for comapatibility of vfs_cap_data and vfs_ns_cap_data
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 02/25] mnt_idmapping: include cred.h
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 04/25] capability: rename cpu_vfs_cap_data to vfs_caps
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 01/25] mnt_idmapping: split out core vfs[ug]id_t definitions into vfsid.h
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- [PATCH v2 00/25] fs: use type-safe uid representation for filesystem capabilities
- From: "Seth Forshee (DigitalOcean)" <sforshee@xxxxxxxxxx>
- Re: [PATCH v8 15/15] x86: EFI stub DRTM launch support for Secure Launch
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH v5 2/8] kexec: define functions to map and unmap segments
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 15/15] x86: EFI stub DRTM launch support for Secure Launch
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 2/4] tsm: Add RTMRs to the configfs-tsm hierarchy
- From: Mikko Ylinen <mikko.ylinen@xxxxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH v1 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- Re: [ima-evm-utils: PATCH v1 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [ima-evm-utils: PATCH v1 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- [ima-evm-utils: PATCH v1 1/1] Change license to LGPL-2.0-or-later and GPL-2.0-or-later
- From: Dmitry Kasatkin <dmitry.kasatkin@xxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 0/8] ima: kexec: measure events between kexec load and execute
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 1/8] ima: define and call ima_alloc_kexec_file_buf
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: Lino Sanfilippo <LinoSanfilippo@xxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v2 2/9] security: allow finer granularity in permitting copy-up of security xattrs
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 3/3] tpm: make locality request return value consistent
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: Alexander Steffen <Alexander.Steffen@xxxxxxxxxxxx>
- Re: [PATCH v2 0/4] Add missing TPM compatible strings
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 0/4] Add missing TPM compatible strings
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 0/4] Add missing TPM compatible strings
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 0/4] Add missing TPM compatible strings
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [syzbot] [integrity?] [lsm?] KMSAN: uninit-value in ima_add_template_entry
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [syzbot] [integrity?] [lsm?] KMSAN: uninit-value in ima_add_template_entry
- From: syzbot <syzbot+7bc44a489f0ef0670bd5@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/8] ima: define and call ima_alloc_kexec_file_buf
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] tpm: make locality request return value consistent
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 3/3] tpm: make locality request return value consistent
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] tpm: ensure tpm is in known state at startup
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: init_tis() takes 50 ms on Dell XPS 13 9360 – almost 10 % of whole time until initrd
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/3] tpm: ensure tpm is in known state at startup
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] tpm: protect against locality counter underflow
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 15/15] x86: EFI stub DRTM launch support for Secure Launch
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v8 14/15] x86: Secure Launch late initcall platform module
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v8 15/15] x86: EFI stub DRTM launch support for Secure Launch
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v10 00/25] security: Move IMA and EVM to the LSM infrastructure
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: init_tis() takes 50 ms on Dell XPS 13 9360 – almost 10 % of whole time until initrd
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: init_tis() takes 50 ms on Dell XPS 13 9360 – almost 10 % of whole time until initrd
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] integrity: eliminate unnecessary "Problem loading X.509 certificate" msg
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] integrity: eliminate unnecessary "Problem loading X.509 certificate" msg
- From: Coiby Xu <coxu@xxxxxxxxxx>
- Re: [PATCH v10 0/25] security: Move IMA and EVM to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 0/25] security: Move IMA and EVM to the LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
- From: "Xing, Cedric" <cedric.xing@xxxxxxxxx>
- Re: [PATCH v8 14/15] x86: Secure Launch late initcall platform module
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v10 19/25] integrity: Move integrity_kernel_module_request() to IMA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
- From: "Dr. Greg" <greg@xxxxxxxxxxxx>
- Re: [PATCH v8 07/15] x86: Secure Launch kernel early boot stub
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v8 03/15] x86: Secure Launch Kconfig
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v10 19/25] integrity: Move integrity_kernel_module_request() to IMA
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 12/25] security: Introduce file_post_open hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v8 01/15] x86/boot: Place kernel_info at a fixed offset
- From: Daniel Kiper <daniel.kiper@xxxxxxxxxx>
- [PATCH v10 17/25] security: Introduce inode_post_remove_acl hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 25/25] integrity: Remove LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 24/25] ima: Make it independent from 'integrity' LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 23/25] evm: Make it independent from 'integrity' LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 22/25] evm: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 21/25] ima: Move IMA-Appraisal to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 02/25] ima: Align ima_file_mprotect() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 20/25] ima: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 19/25] integrity: Move integrity_kernel_module_request() to IMA
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 18/25] security: Introduce key_post_create_or_update hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 16/25] security: Introduce inode_post_set_acl hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 15/25] security: Introduce inode_post_create_tmpfile hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 14/25] security: Introduce path_post_mknod hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 13/25] security: Introduce file_release hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 12/25] security: Introduce file_post_open hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 11/25] security: Introduce inode_post_removexattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 10/25] security: Introduce inode_post_setattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 09/25] security: Align inode_setattr hook definition with EVM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 08/25] evm: Align evm_inode_post_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 07/25] evm: Align evm_inode_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 06/25] evm: Align evm_inode_post_setattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 05/25] ima: Align ima_post_read_file() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 04/25] ima: Align ima_inode_removexattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 03/25] ima: Align ima_inode_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 01/25] ima: Align ima_inode_post_setattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v10 00/25] security: Move IMA and EVM to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 19/25] integrity: Move integrity_kernel_module_request() to IMA
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 15/15] x86: EFI stub DRTM launch support for Secure Launch
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v8 14/15] x86: Secure Launch late initcall platform module
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v8 07/15] x86: Secure Launch kernel early boot stub
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v9 12/25] security: Introduce file_post_open hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v8 04/15] x86: Secure Launch Resource Table header file
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v8 03/15] x86: Secure Launch Kconfig
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v8 01/15] x86/boot: Place kernel_info at a fixed offset
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v5 8/8] ima: measure kexec load and exec events as critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 8/8] ima: measure kexec load and exec events as critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 4/8] ima: kexec: define functions to copy IMA log at soft boot
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v5 2/8] kexec: define functions to map and unmap segments
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 13/15] tpm: Add sysfs interface to allow setting and querying the preferred locality
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 11/15] reboot: Secure Launch SEXIT support on reboot paths
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 12/15] tpm: Add ability to set the preferred locality the TPM chip uses
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 10/15] kexec: Secure Launch kexec SEXIT support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 09/15] x86: Secure Launch SMP bringup support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 07/15] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 02/15] Documentation/x86: Secure Launch kernel documentation
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 15/15] x86: EFI stub DRTM launch support for Secure Launch
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 08/15] x86: Secure Launch kernel late boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 14/15] x86: Secure Launch late initcall platform module
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 05/15] x86: Secure Launch main header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 06/15] x86: Add early SHA support for Secure Launch early measurements
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 01/15] x86/boot: Place kernel_info at a fixed offset
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 04/15] x86: Secure Launch Resource Table header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 00/15] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v8 03/15] x86: Secure Launch Kconfig
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- Re: [PATCH v9 12/25] security: Introduce file_post_open hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 8/8] ima: measure kexec load and exec events as critical data
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 8/8] ima: measure kexec load and exec events as critical data
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 5/8] ima: kexec: move IMA log copy from kexec load to execute
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 4/8] ima: kexec: define functions to copy IMA log at soft boot
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v9 12/25] security: Introduce file_post_open hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/8] kexec: define functions to map and unmap segments
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v5 7/8] ima: make the kexec extra memory configurable
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 1/8] ima: define and call ima_alloc_kexec_file_buf
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 5/8] ima: kexec: move IMA log copy from kexec load to execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 8/8] ima: measure kexec load and exec events as critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 6/8] ima: suspend measurements during buffer copy at kexec execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 2/8] kexec: define functions to map and unmap segments
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 3/8] ima: kexec: skip IMA segment validation after kexec soft reboot
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 4/8] ima: kexec: define functions to copy IMA log at soft boot
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 0/8] ima: kexec: measure events between kexec load and execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- init_tis() takes 50 ms on Dell XPS 13 9360 – almost 10 % of whole time until initrd
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- [RFC][PATCH 8/8] ima: Detect if digest cache changed since last measurement/appraisal
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 7/8] ima: Use digest cache for appraisal
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 6/8] ima: Use digest cache for measurement
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 5/8] ima: Record IMA verification result of digest lists in digest cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 4/8] ima: Add digest_cache_measure and digest_cache_appraise boot-time policies
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 3/8] ima: Add digest_cache policy keyword
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 2/8] ima: Nest iint mutex for DIGEST_LIST_CHECK hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [RFC][PATCH 1/8] ima: Introduce hook DIGEST_LIST_CHECK
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]