Linux Integrity
[Prev Page][Next Page]
- [PATCH v3 3/4] dt-bindings: tpm: Convert IBM vTPM bindings to DT schema
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH v3 2/4] dt-bindings: tpm: Convert Google Cr50 bindings to DT schema
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH v3 1/4] dt-bindings: tpm: Consolidate TCG TIS bindings
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH v3 0/4] dt-bindings: tpm: Clean all the things
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [RESEND PATCH] tpm: nuvoton: Use i2c_get_match_data()
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH v3 6/7] ima: configure memory to log events between kexec load and execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 3/7] ima: kexec: map IMA buffer source pages to image after kexec load
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 4/7] kexec: update kexec_file_load syscall to alloc ima buffer after load
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 7/7] ima: measure kexec load and exec events as critical data
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 5/7] ima: suspend measurements during buffer copy at kexec execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 2/7] ima: kexec: move ima log copy from kexec load to execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 0/7] ima: kexec: measure events between kexec load and execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 1/7] ima: define and call ima_alloc_kexec_file_buf
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v39 16/42] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v39 13/42] LSM: Create new security_cred_getlsmblob LSM hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v39 11/42] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v39 10/42] LSM: Use lsmblob in security_current_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v39 01/42] integrity: disassociate ima_filter_rule from security_audit_rule
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v8 21/24] evm: Move to LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v8 13/24] security: Introduce file_release hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v8 11/24] security: Introduce inode_post_removexattr hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] dt-bindings: tpm: Consolidate TCG TIS bindings
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH v2 3/3] arch/x86: Do not include <asm/bootparam.h> in several header files
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v2 1/3] arch/x86: Move UAPI setup structures into setup_data.h
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v2 2/3] arch/x86: Add <asm/ima-efi.h> for arch_ima_efi_boot_mode
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v2 0/3] arch/x86: Remove unnecessary dependencies on bootparam.h
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [PATCH 2/3] arch/x86: Add <asm/ima-efi.h> for arch_ima_efi_boot_mode
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [PATCH 1/3] arch/x86: Move struct pci_setup_rom into pci_setup.h
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v5 6/6] docs: trusted-encrypted: add DCP as new trust source
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v5 5/6] docs: document DCP-backed trusted keys kernel params
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v5 4/6] MAINTAINERS: add entry for DCP-based trusted keys
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v5 3/6] KEYS: trusted: Introduce NXP DCP-backed trusted keys
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v5 2/6] KEYS: trusted: improve scalability of trust source config
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v5 1/6] crypto: mxs-dcp: Add support for hardware-bound keys
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v5 0/6] DCP as trusted keys backend
- From: David Gstir <david@xxxxxxxxxxxxx>
- Re: [PATCH v1 4/8] ARM: dts: aspeed: System1: Add i2c and muxes
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v5 16/17] tpm: add the null key name as a sysfs export
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v1 2/8] dt-bindings: tpm: Add schema for TIS I2C devices
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- Re: [PATCH v1 2/8] dt-bindings: tpm: Add schema for TIS I2C devices
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- Re: IMA over NFS
- From: Chuck Lever III <chuck.lever@xxxxxxxxxx>
- Re: [RFC][PATCH] overlayfs: Redirect xattr ops on security.evm to security.evm_overlayfs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v1 4/8] ARM: dts: aspeed: System1: Add i2c and muxes
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] overlayfs: Redirect xattr ops on security.evm to security.evm_overlayfs
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH v8 24/24] integrity: Remove LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 23/24] ima: Make it independent from 'integrity' LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 22/24] evm: Make it independent from 'integrity' LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 21/24] evm: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 20/24] ima: Move IMA-Appraisal to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 19/24] ima: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 18/24] security: Introduce key_post_create_or_update hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 17/24] security: Introduce inode_post_remove_acl hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 16/24] security: Introduce inode_post_set_acl hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 15/24] security: Introduce inode_post_create_tmpfile hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 14/24] security: Introduce path_post_mknod hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 13/24] security: Introduce file_release hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 12/24] security: Introduce file_post_open hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 11/24] security: Introduce inode_post_removexattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 10/24] security: Introduce inode_post_setattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 09/24] security: Align inode_setattr hook definition with EVM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 08/24] evm: Align evm_inode_post_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 07/24] evm: Align evm_inode_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 06/24] evm: Align evm_inode_post_setattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 05/24] ima: Align ima_post_read_file() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 04/24] ima: Align ima_inode_removexattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 03/24] ima: Align ima_inode_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 02/24] ima: Align ima_file_mprotect() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 01/24] ima: Align ima_inode_post_setattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v8 00/24] security: Move IMA and EVM to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v1 2/8] dt-bindings: tpm: Add schema for TIS I2C devices
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH v1 5/8] ARM: dts: aspeed: System1: Voltage regulators
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] overlayfs: Redirect xattr ops on security.evm to security.evm_overlayfs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v1 2/8] dt-bindings: tpm: Add schema for TIS I2C devices
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- Re: [PATCH v1 2/8] dt-bindings: tpm: Add schema for TIS I2C devices
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] overlayfs: Redirect xattr ops on security.evm to security.evm_overlayfs
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v1 3/8] ARM: dts: aspeed: System1: IBM system1 BMC board
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- Re: [PATCH v1 8/8] ARM: dts: aspeed: System1: PS, sensor and more
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- [RFC][PATCH] ima: add crypto agility support for template-hash algorithm
- From: Enrico Bravi <enrico.bravi@xxxxxxxxx>
- [PATCH v1 0/1] Add more compatibility strings to tpm-tis-i2c
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- [PATCH v1 1/1] tpm: tis-i2c: Add more compatible strings
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- Re: [PATCH v1 8/8] ARM: dts: aspeed: System1: PS, sensor and more
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] overlayfs: Redirect xattr ops on security.evm to security.evm_overlayfs
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v1 8/8] ARM: dts: aspeed: System1: PS, sensor and more
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v1 8/8] ARM: dts: aspeed: System1: PS, sensor and more
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- Re: [PATCH v1 8/8] ARM: dts: aspeed: System1: PS, sensor and more
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v1 8/8] ARM: dts: aspeed: System1: PS, sensor and more
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- Re: [PATCH v1 2/8] dt-bindings: tpm: Add schema for TIS I2C devices
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- Re: [PATCH v1 1/8] dt-bindings: arm: aspeed: add IBM system1-bmc
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- Re: [PATCH v1 2/8] dt-bindings: tpm: Add schema for TIS I2C devices
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v1 1/8] dt-bindings: arm: aspeed: add IBM system1-bmc
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] dt-bindings: tpm: Consolidate TCG TIS bindings
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- Re: [PATCH v5 12/17] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/3] dt-bindings: tpm: Consolidate TCG TIS bindings
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v1 2/8] dt-bindings: tpm: Add schema for TIS I2C devices
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: Add Roberto Sassu as co-maintainer to IMA and EVM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: IMA performance regression in 5.10.194 when using overlayfs
- From: Robert Kolchmeyer <rkolchmeyer@xxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: Add Eric Snowberg as a reviewer to IMA
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v1 8/8] ARM: dts: aspeed: System1: PS, sensor and more
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v1 6/8] ARM: dts: aspeed: System1: GPIO, Fan ctrl, Led
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v1 5/8] ARM: dts: aspeed: System1: Voltage regulators
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v1 4/8] ARM: dts: aspeed: System1: Add i2c and muxes
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v1 3/8] ARM: dts: aspeed: System1: IBM system1 BMC board
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v1 1/8] dt-bindings: arm: aspeed: add IBM system1-bmc
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- Re: [PATCH v1 7/8] tpm: tis-i2c: Add more compatible strings
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH v1 7/8] tpm: tis-i2c: Add more compatible strings
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH v1 2/8] dt-bindings: tpm: Add schema for TIS I2C devices
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH v1 7/8] tpm: tis-i2c: Add more compatible strings
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH v1 7/8] tpm: tis-i2c: Add more compatible strings
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH v1 2/8] dt-bindings: tpm: Add schema for TIS I2C devices
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH v1 1/8] dt-bindings: arm: aspeed: add IBM system1-bmc
- From: Conor Dooley <conor@xxxxxxxxxx>
- [PATCH v1 3/8] ARM: dts: aspeed: System1: IBM system1 BMC board
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- [PATCH v1 0/8] Add device tree for IBM system1 BMC
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- [PATCH v1 8/8] ARM: dts: aspeed: System1: PS, sensor and more
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- [PATCH v1 6/8] ARM: dts: aspeed: System1: GPIO, Fan ctrl, Led
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- [PATCH v1 5/8] ARM: dts: aspeed: System1: Voltage regulators
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- [PATCH v1 4/8] ARM: dts: aspeed: System1: Add i2c and muxes
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- [PATCH v1 2/8] dt-bindings: tpm: Add schema for TIS I2C devices
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- [PATCH v1 1/8] dt-bindings: arm: aspeed: add IBM system1-bmc
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- [PATCH v1 7/8] tpm: tis-i2c: Add more compatible strings
- From: Ninad Palsule <ninad@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] overlayfs: Redirect xattr ops on security.evm to security.evm_overlayfs
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH] MAINTAINERS: Add Roberto Sassu as co-maintainer to IMA and EVM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] MAINTAINERS: Add Eric Snowberg as a reviewer to IMA
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] overlayfs: Redirect xattr ops on security.evm to security.evm_overlayfs
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] overlayfs: Redirect xattr ops on security.evm to security.evm_overlayfs
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC][PATCH] overlayfs: Redirect xattr ops on security.evm to security.evm_overlayfs
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC][PATCH] overlayfs: Redirect xattr ops on security.evm to security.evm_overlayfs
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [RFC][PATCH] overlayfs: Redirect xattr ops on security.evm to security.evm_overlayfs
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] tpm: tis-i2c: Add more compatible strings
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: IMA performance regression in 5.10.194 when using overlayfs
- From: Sasha Levin <sashal@xxxxxxxxxx>
- IMA performance regression in 5.10.194 when using overlayfs
- From: <rkolchmeyer@xxxxxxxxxx>
- Re: [RFC][PATCH] overlayfs: Redirect xattr ops on security.evm to security.evm_overlayfs
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [RFC][PATCH] overlayfs: Redirect xattr ops on security.evm to security.evm_overlayfs
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [RFC][PATCH] overlayfs: Redirect xattr ops on security.evm to security.evm_overlayfs
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [RFC][PATCH] overlayfs: Redirect xattr ops on security.evm to security.evm_overlayfs
- From: Seth Forshee <sforshee@xxxxxxxxxx>
- Re: [RFC][PATCH] overlayfs: Redirect xattr ops on security.evm to security.evm_overlayfs
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC][PATCH] overlayfs: Redirect xattr ops on security.evm to security.evm_overlayfs
- From: Seth Forshee <sforshee@xxxxxxxxxx>
- Re: [RFC][PATCH] overlayfs: Redirect xattr ops on security.evm to security.evm_overlayfs
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC][PATCH] overlayfs: Redirect xattr ops on security.evm to security.evm_overlayfs
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [RFC][PATCH] overlayfs: Redirect xattr ops on security.evm to security.evm_overlayfs
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [RFC][PATCH] overlayfs: Redirect xattr ops on security.evm to security.evm_overlayfs
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 12/17] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] fs: Pass AT_GETATTR_NOSEC flag to getattr interface function
- From: "J. R. Okajima" <hooanon05g@xxxxxxxxx>
- Re: [PATCH v5 16/17] tpm: add the null key name as a sysfs export
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 3/3] arch/x86: Do not include <asm/bootparam.h> in several header files
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 2/3] arch/x86: Add <asm/ima-efi.h> for arch_ima_efi_boot_mode
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 1/3] arch/x86: Move struct pci_setup_rom into pci_setup.h
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v5 12/17] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [ima-evm-utils PATCH v3 00/14] Enable shellcheck and fix some issues
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v2 13/13] Define and use a file specific "keypass" variable
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v2 09/13] Use a local hash algorithm variable when verifying file signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v2 12/13] Update sign_hash_v*() definition to include the key password
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v2 11/13] Use a file specific hash algorithm variable for signing files
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v2 10/13] Update EVM signature verification to use a local hash algorithm variable
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v2 07/13] Update ima_measurements to define and use a local list of public keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v2 08/13] Define library ima_calc_hash2() function with a hash algorithm parameter
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v2 05/13] Update cmd_verify_ima() to define and use a local list of public keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v2 03/13] Update library function definitions to include a "public_keys" parameter
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v2 01/13] Rename "public_keys" to "g_public_keys"
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v2 02/13] Free public keys list
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v2 06/13] Update cmd_verify_evm to define and use a local list of public keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v2 04/13] Update imaevm_verify_hash() definition to include "hash_algo" parameter
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v2 00/13] Address non concurrency-safe libimaevm global variables
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH 3/3] arch/x86: Do not include <asm/bootparam.h> in several header files
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 2/3] arch/x86: Add <asm/ima-efi.h> for arch_ima_efi_boot_mode
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 1/3] arch/x86: Move struct pci_setup_rom into pci_setup.h
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 0/3] arch/x86: Remove unnecessary dependencies on bootparam.h
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH] tpm: cr50: fix a kernel-doc warning
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v4 00/13] add integrity and security to TPM2 transactions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 08/13] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 08/13] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 00/13] add integrity and security to TPM2 transactions
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v4 00/13] add integrity and security to TPM2 transactions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/13] add integrity and security to TPM2 transactions
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Discussion about using NV indexes for kernel properties like localities and PCRs
- From: Lennart Poettering <lennart@xxxxxxxxxxxxxx>
- Re: [PATCH v4 08/13] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 08/13] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 08/13] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 08/13] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 08/13] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 08/13] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: Discussion about using NV indexes for kernel properties like localities and PCRs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 08/13] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: Discussion about using NV indexes for kernel properties like localities and PCRs
- From: Lennart Poettering <lennart@xxxxxxxxxxxxxx>
- Re: [PATCH v5 0/8] Extend struct tpm_buf to support sized buffers (TPM2B)
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 8/8] KEYS: trusted: tpm2: Use struct tpm_buf for sized buffers
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 4/8] tpm: Update struct tpm_buf documentation comments
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: Start the tpm2 before running a self test.
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 08/13] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: "Dr. Greg" <greg@xxxxxxxxxxxx>
- Re: Discussion about using NV indexes for kernel properties like localities and PCRs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: Discussion about using NV indexes for kernel properties like localities and PCRs
- From: Lennart Poettering <lennart@xxxxxxxxxxxxxx>
- Discussion about using NV indexes for kernel properties like localities and PCRs
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [ima-evm-utils PATCH v3 14/14] tests: Address issues raised by shellcheck SC2003
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v3 13/14] tests: Address issues raised by shellcheck SC2295
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v3 11/14] tests: Address issues raised by shellcheck SC2196
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v3 12/14] tests: Address issues raised by shellcheck SC2043
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v3 09/14] tests: Address issues raised by shellcheck SC2294
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v3 02/14] tests: Address issues raised by shellcheck SC2181
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v3 10/14] tests: Address issues raised by shellcheck SC2206
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v3 08/14] tests: Address issues raised by shellcheck SC2166
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v3 06/14] tests: Address issues raised by shellcheck SC2034
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v3 01/14] tests: Address issues raised by shellcheck SC2086 & enable shellcheck
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v3 04/14] tests: Address issues raised by shellcheck SC2320
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v3 07/14] tests: Address issues raised by shellcheck SC2164
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v3 05/14] tests: Address issues raised by shellcheck SC2317
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v3 00/14] Enable shellcheck and fix some issues
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v3 03/14] tests: Address issues raised by shellcheck SC2046
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: "Dr. Greg" <greg@xxxxxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v7 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v7 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v7 22/23] integrity: Remove 'integrity' LSM and move integrity functions to 'ima' LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v7 21/23] evm: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v7 20/23] ima: Move IMA-Appraisal to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v7 19/23] ima: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Petr Tesarik <petrtesarik@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [ANNOUNCE] CFP: Linux Security Summit North America 2024
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [ima-evm-utils PATCH 12/12] Define and use a file specific "keypass" variable
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [ima-evm-utils PATCH 09/12] Use a local hash algorithm variable when verifying file signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [RFC V2] IMA Log Snapshotting Design Proposal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC V2] IMA Log Snapshotting Design Proposal
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [ima-evm-utils PATCH v2 14/14] tests: Address issues raised by shellcheck SC2003
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v2 11/14] tests: Address issues raised by shellcheck SC2196
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v2 01/14] tests: Address issues raised by shellcheck SC2086 & enable shellcheck
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v2 10/14] tests: Address issues raised by shellcheck SC2206
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v2 12/14] tests: Address issues raised by shellcheck SC2043
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v2 13/14] tests: Address issues raised by shellcheck SC2295
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v2 09/14] tests: Address issues raised by shellcheck SC2294
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v2 05/14] tests: Address issues raised by shellcheck SC2317
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v2 00/14] Enable shellcheck and fix some issues
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v2 03/14] tests: Address issues raised by shellcheck SC2046
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v2 06/14] tests: Address issues raised by shellcheck SC2034
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v2 08/14] tests: Address issues raised by shellcheck SC2166
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v2 02/14] tests: Address issues raised by shellcheck SC2181
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v2 07/14] tests: Address issues raised by shellcheck SC2164
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH v2 04/14] tests: Address issues raised by shellcheck SC2320
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 0/8] Extend struct tpm_buf to support sized buffers (TPM2B)
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v5 8/8] KEYS: trusted: tpm2: Use struct tpm_buf for sized buffers
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH v5 8/8] KEYS: trusted: tpm2: Use struct tpm_buf for sized buffers
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v6 7/8] tpm: Add tpm_buf_read_{u8,u16,u32}
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v5 8/8] KEYS: trusted: tpm2: Use struct tpm_buf for sized buffers
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [RFC V2] IMA Log Snapshotting Design Proposal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [jarkko-tpmdd:tpm_buf-v4] [tpm] 5581fa1c8f: WARNING:at_drivers/char/tpm/tpm-buf.c:#tpm_buf_reset
- From: kernel test robot <oliver.sang@xxxxxxxxx>
- Re: [PATCH v5 8/8] KEYS: trusted: tpm2: Use struct tpm_buf for sized buffers
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [RFC V2] IMA Log Snapshotting Design Proposal
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v6 8/8] KEYS: trusted: tpm2: Use struct tpm_buf for sized buffers
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v6 7/8] tpm: Add tpm_buf_read_{u8,u16,u32}
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v6 6/8] tpm: TPM2B formatted buffers
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v6 5/8] tpm: Store the length of the tpm_buf data separately.
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v6 4/8] tpm: Update struct tpm_buf documentation comments
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v6 3/8] tpm: Move buffer handling from static inlines to real functions
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v6 2/8] tpm: Remove tpm_send()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v6 1/8] tpm: Remove unused tpm_buf_tag()
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: tis_i2c: Add compatible string nuvoton,npct75x
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH v5 17/17] Documentation: add tpm-security.rst
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v5 16/17] tpm: add the null key name as a sysfs export
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v5 15/17] KEYS: trusted: Add session encryption protection to the seal/unseal path
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v5 14/17] tpm: add session encryption protection to tpm2_get_random()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v5 13/17] tpm: add hmac checks to tpm2_pcr_extend()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v5 12/17] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v5 11/17] tpm: export the context save and load commands
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v5 10/17] tpm: add buffer function to point to returned parameters
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v5 09/17] crypto: lib - implement library version of AES in CFB mode
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v5 08/17] KEYS: trusted: tpm2: Use struct tpm_buf for sized buffers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v5 07/17] tpm: Add tpm_buf_read_{u8,u16,u32}
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v5 06/17] tpm: TPM2B formatted buffers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v5 05/17] tpm: Store the length of the tpm_buf data separately.
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v5 04/17] tpm: Update struct tpm_buf documentation comments
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v5 03/17] tpm: Move buffer handling from static inlines to real functions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v5 02/17] tpm: Remove tpm_send()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v5 01/17] tpm: Remove unused tpm_buf_tag()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v5 00/17] add integrity and security to TPM2 transactions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC V2] IMA Log Snapshotting Design Proposal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] dt-bindings: tpm: Consolidate TCG TIS bindings
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- [PATCH] tpm: tis_i2c: Add compatible string nuvoton,npct75x
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH v2 3/3] dt-bindings: tpm: Document Microsoft fTPM bindings
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH] tpm_tis: Add compatible string atmel,at97sc3204
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH v2 2/3] dt-bindings: tpm: Convert IBM vTPM bindings to DT schema
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH v2 1/3] dt-bindings: tpm: Consolidate TCG TIS bindings
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH v2 0/3] dt-bindings: tpm: Clean all the things
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH] tpm: Start the tpm2 before running a self test.
- From: Angga <Hermin.Anggawijaya@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Start the tpm2 before running a self test.
- From: Angga <Hermin.Anggawijaya@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm: Start the tpm2 before running a self test.
- From: Angga <Hermin.Anggawijaya@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 08/13] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 08/13] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 08/13] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 08/13] tpm: Add full HMAC and encrypt/decrypt session handling code
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/3] dt-bindings: tpm: Convert IBM vTPM bindings to DT schema
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH v6 4/8] tpm: Update struct tpm_buf documentation comments
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v6 8/8] KEYS: trusted: tpm2: Use struct tpm_buf for sized buffers
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v6 3/8] tpm: Move buffer handling from static inlines to real functions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v6 5/8] tpm: Store the length of the tpm_buf data separately.
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v6 6/8] tpm: TPM2B formatted buffers
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v6 7/8] tpm: Add tpm_buf_read_{u8,u16,u32}
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v6 2/8] tpm: Remove tpm_send()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v6 1/8] tpm: Remove unused tpm_buf_tag()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v6 0/8] Extend struct tpm_buf to support sized buffers (TPM2B)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: Start the tpm2 before running a self test.
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/2] reset: Add Infineon SLB9670 TPM reset driver
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH 2/2] reset: Add Infineon SLB9670 TPM reset driver
- From: Francesco Dolcini <francesco@xxxxxxxxxx>
- Re: [ima-evm-utils PATCH 09/12] Use a local hash algorithm variable when verifying file signatures
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [ima-evm-utils PATCH 12/12] Define and use a file specific "keypass" variable
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC V2] IMA Log Snapshotting Design Proposal
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [ima-evm-utils PATCH 09/12] Use a local hash algorithm variable when verifying file signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [ima-evm-utils PATCH 11/12] Use a file specific hash algorithm variable for signing files
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [ima-evm-utils PATCH 10/12] Update EVM signature verification to use a local hash algorithm variable
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [ima-evm-utils PATCH 09/12] Use a local hash algorithm variable when verifying file signatures
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [ima-evm-utils PATCH 08/12] Define library ima_calc_hash2() function with a hash algorithm parameter
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [ima-evm-utils PATCH 07/12] Update ima_measurements to define and use a local list of public keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [ima-evm-utils PATCH 05/12] Update cmd_verify_ima() to define and use a local list of public keys
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC V2] IMA Log Snapshotting Design Proposal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [ima-evm-utils PATCH 04/12] Update a library function definition to include a "hash_algo" parameter
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [ima-evm-utils PATCH 03/12] Update library function definitions to include a "public_keys" parameter
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [ima-evm-utils PATCH 02/12] Free public keys list
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [ima-evm-utils PATCH 01/12] Rename "public_keys" to "g_public_keys"
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] tpm: Start the tpm2 before running a self test.
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] reset: Add Infineon SLB9670 TPM reset driver
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH 2/2] reset: Add Infineon SLB9670 TPM reset driver
- From: Francesco Dolcini <francesco@xxxxxxxxxx>
- Re: [PATCH] tpm: Start the tpm2 before running a self test.
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- [PATCH] tpm: Start the tpm2 before running a self test.
- From: Hermin Anggawijaya <hermin.anggawijaya@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC V2] IMA Log Snapshotting Design Proposal
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC V2] IMA Log Snapshotting Design Proposal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC V2] IMA Log Snapshotting Design Proposal
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] reset: Add Infineon SLB9670 TPM reset driver
- From: Francesco Dolcini <francesco@xxxxxxxxxx>
- Re: [ima-evm-utils PATCH 04/14] tests: Address issues raised by shellcheck SC2320
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [ima-evm-utils PATCH 04/14] tests: Address issues raised by shellcheck SC2320
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v5 8/8] KEYS: trusted: tpm2: Use struct tpm_buf for sized buffers
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v5 7/8] tpm: Add tpm_buf_read_{u8,u16,u32}
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v5 6/8] tpm: TPM2B formatted buffers
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v5 5/8] tpm: Store the length of the tpm_buf data separately.
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v5 4/8] tpm: Update &tpm_buf documentation
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v5 3/8] tpm: Move buffer handling from static inlines to real functions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v5 2/8] tpm: Remove tpm_send()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v5 1/8] tpm: Remove unused tpm_buf_tag()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v5 0/8] Extend struct tpm_buf to support sized buffers (TPM2B)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v5 2/8] tpm: Remove tpm_send()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v5 1/8] tpm: Remove unused tpm_buf_tag()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v5 0/8] Extend struct tpm_buf to support sized buffers (TPM2B)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v4 8/8] KEYS: trusted: tpm2: Use struct tpm_buf for sized buffers
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v4 7/8] tpm: Add tpm_buf_read_{u8,u16,u32}
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v4 6/8] tpm: TPM2B formatted buffers
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v4 5/8] tpm: Store the length of the tpm_buf data separately.
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v4 4/8] tpm: Update &tpm_buf documentation
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v4 3/8] tpm: Move buffer handling from static inlines to real functions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v4 2/8] tpm: Remove tpm_send()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v4 1/8] tpm: Remove unused tpm_buf_tag()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v4 0/8] Extend struct tpm_buf to support sized buffers (TPM2B)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [ima-evm-utils PATCH] Add note for how password needs to be provided when -p is used
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] dt-bindings: tpm: Document Microsoft fTPM bindings
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 2/3] dt-bindings: tpm: Convert IBM vTPM bindings to DT schema
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 0/3] dt-bindings: tpm: Clean all the things
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 1/3] dt-bindings: tpm: Consolidate TCG TIS bindings
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 1/3] dt-bindings: tpm: Consolidate TCG TIS bindings
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 3/3] dt-bindings: tpm: Document Microsoft fTPM bindings
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH 2/3] dt-bindings: tpm: Convert IBM vTPM bindings to DT schema
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH 1/3] dt-bindings: tpm: Consolidate TCG TIS bindings
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH 3/3] dt-bindings: tpm: Document Microsoft fTPM bindings
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 2/3] dt-bindings: tpm: Convert IBM vTPM bindings to DT schema
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 1/3] dt-bindings: tpm: Consolidate TCG TIS bindings
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH 3/3] dt-bindings: tpm: Document Microsoft fTPM bindings
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH 2/3] dt-bindings: tpm: Convert IBM vTPM bindings to DT schema
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH 1/3] dt-bindings: tpm: Consolidate TCG TIS bindings
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH 0/3] dt-bindings: tpm: Clean all the things
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v6 19/25] ima: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 25/25] security: Enforce ordering of 'ima' and 'evm' LSMs
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 25/25] security: Enforce ordering of 'ima' and 'evm' LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: tpm_tis_spi_remove() triggers WARN_ON() in __flushwork (RPi3B+ and SLB9670)
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 11/23] security: Introduce inode_post_removexattr hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: tpm_tis_spi_remove() triggers WARN_ON() in __flushwork (RPi3B+ and SLB9670)
- From: Lino Sanfilippo <l.sanfilippo@xxxxxxxxxx>
- Re: [RFC V2] IMA Log Snapshotting Design Proposal
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 11/23] security: Introduce inode_post_removexattr hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v6 25/25] security: Enforce ordering of 'ima' and 'evm' LSMs
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 24/25] integrity: Remove LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 23/25] evm: Remove dependency on 'integrity' LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 22/25] ima: Remove dependency on 'integrity' LSM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 21/25] evm: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 20/25] ima: Move IMA-Appraisal to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 19/25] ima: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 18/25] security: Introduce key_post_create_or_update hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 17/25] security: Introduce inode_post_remove_acl hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 16/25] security: Introduce inode_post_set_acl hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 15/25] security: Introduce inode_post_create_tmpfile hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 14/25] security: Introduce path_post_mknod hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 13/25] security: Introduce file_release hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 12/25] security: Introduce file_post_open hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 11/25] security: Introduce inode_post_removexattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 10/25] security: Introduce inode_post_setattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 09/25] security: Align inode_setattr hook definition with EVM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 08/25] evm: Align evm_inode_post_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 07/25] evm: Align evm_inode_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 06/25] evm: Align evm_inode_post_setattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 05/25] ima: Align ima_post_read_file() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 04/25] ima: Align ima_inode_removexattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 03/25] ima: Align ima_inode_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 02/25] ima: Align ima_file_mprotect() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 01/25] ima: Align ima_inode_post_setattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v6 00/25] security: Move IMA and EVM to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 11/23] security: Introduce inode_post_removexattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 22/23] integrity: Move integrity functions to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/6] Extend struct tpm_buf to support sized buffers (TPM2B)
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 0/6] Extend struct tpm_buf to support sized buffers (TPM2B)
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: tpm_tis_spi_remove() triggers WARN_ON() in __flushwork (RPi3B+ and SLB9670)
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- tpm_tis_spi_remove() triggers WARN_ON() in __flushwork (RPi3B+ and SLB9670)
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [ima-evm-utils PATCH 03/12] Update library function definitions to include a "public_keys" parameter
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH 04/12] Update a library function definition to include a "hash_algo" parameter
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH 00/12] Address non concurrency-safe libimaevm global variables
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH 12/12] Define and use a file specific "keypass" variable
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH 06/12] Update cmd_verify_evm to define and use a local list of public keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH 11/12] Use a file specific hash algorithm variable for signing files
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH 08/12] Define library ima_calc_hash2() function with a hash algorithm parameter
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH 05/12] Update cmd_verify_ima() to define and use a local list of public keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH 10/12] Update EVM signature verification to use a local hash algorithm variable
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH 07/12] Update ima_measurements to define and use a local list of public keys
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH 09/12] Use a local hash algorithm variable when verifying file signatures
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH 02/12] Free public keys list
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH 01/12] Rename "public_keys" to "g_public_keys"
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC V2] IMA Log Snapshotting Design Proposal
- From: Sush Shringarputale <sushring@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 22/23] integrity: Move integrity functions to the LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v4 1/5] crypto: mxs-dcp: Add support for hardware-bound keys
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC V2] IMA Log Snapshotting Design Proposal
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC V2] IMA Log Snapshotting Design Proposal
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC V2] IMA Log Snapshotting Design Proposal
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC V2] IMA Log Snapshotting Design Proposal
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 10/23] security: Introduce inode_post_setattr hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 13/23] security: Introduce file_pre_free_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v7 02/13] Documentation/x86: Secure Launch kernel documentation
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v5 22/23] integrity: Move integrity functions to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 13/23] security: Introduce file_pre_free_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 10/23] security: Introduce inode_post_setattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 13/23] security: Introduce file_pre_free_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 22/23] integrity: Move integrity functions to the LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 17/23] security: Introduce inode_post_remove_acl hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 16/23] security: Introduce inode_post_set_acl hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 15/23] security: Introduce inode_post_create_tmpfile hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 10/23] security: Introduce inode_post_setattr hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 11/23] security: Introduce inode_post_removexattr hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v7 10/13] kexec: Secure Launch kexec SEXIT support
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v2 2/7] ima: move ima_dump_measurement_list call from kexec load to execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/6] Extend struct tpm_buf to support sized buffers (TPM2B)
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RESEND PATCH] tpm: nuvoton: Use i2c_get_match_data()
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 4/6] tpm: Support TPM2 sized buffers (TPM2B)
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 2/6] tpm: Store TPM buffer length
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 3/6] tpm: Detach tpm_buf_reset() from tpm_buf_init()
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 2/6] tpm: Store TPM buffer length
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [RESEND PATCH] tpm: nuvoton: Use i2c_get_match_data()
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v2 0/7] ima: kexec: measure events between kexec load and execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/7] ima: kexec: measure events between kexec load and execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 7/7] ima: record log size at kexec load and execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/7] ima: move ima_dump_measurement_list call from kexec load to execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/7] ima: refactor ima_dump_measurement_list to move memory allocation to a separate function
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/7] ima: refactor ima_dump_measurement_list to move memory allocation to a separate function
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC V2] IMA Log Snapshotting Design Proposal
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC V2] IMA Log Snapshotting Design Proposal
- From: Sush Shringarputale <sushring@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 06/13] x86: Add early SHA support for Secure Launch early measurements
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Re: [RFC V2] IMA Log Snapshotting Design Proposal
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC V2] IMA Log Snapshotting Design Proposal
- From: Sush Shringarputale <sushring@xxxxxxxxxxxxxxxxxxx>
- [linux-next:master] BUILD REGRESSION d173336e238b0f7f5b7eddfa641d7c25c24bb86a
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [ima-evm-utils PATCH 14/14] tests: Address issues raised by shellcheck SC2003
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] security: Don't yet account for IMA in LSM_CONFIG_COUNT calculation
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v7 02/13] Documentation/x86: Secure Launch kernel documentation
- From: Alyssa Ross <hi@xxxxxxxxx>
- Re: [PATCH v7 06/13] x86: Add early SHA support for Secure Launch early measurements
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 06/13] x86: Add early SHA support for Secure Launch early measurements
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Re: [PATCH v7 06/13] x86: Add early SHA support for Secure Launch early measurements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v7 09/13] x86: Secure Launch SMP bringup support
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v7 10/13] kexec: Secure Launch kexec SEXIT support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 07/13] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v7 02/13] Documentation/x86: Secure Launch kernel documentation
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v7 08/13] x86: Secure Launch kernel late boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v7 12/13] x86: Secure Launch late initcall platform module
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v7 05/13] x86: Secure Launch main header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v7 10/13] kexec: Secure Launch kexec SEXIT support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v7 06/13] x86: Add early SHA support for Secure Launch early measurements
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v7 00/13] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v7 04/13] x86: Secure Launch Resource Table header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v7 01/13] x86/boot: Place kernel_info at a fixed offset
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v7 13/13] tpm: Allow locality 2 to be set when initializing the TPM for Secure Launch
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v7 09/13] x86: Secure Launch SMP bringup support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v7 03/13] x86: Secure Launch Kconfig
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v7 11/13] reboot: Secure Launch SEXIT support on reboot paths
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [ima-evm-utils PATCH 14/14] tests: Address issues raised by shellcheck SC2003
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH 12/14] tests: Address issues raised by shellcheck SC2043
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH 03/14] tests: Address issues raised by shellcheck SC2046
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH 02/14] tests: Address issues raised by shellcheck SC2181
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH 11/14] tests: Address issues raised by shellcheck SC2196
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH 08/14] tests: Address issues raised by shellcheck SC2166
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH 09/14] tests: Address issues raised by shellcheck SC2294
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH 01/14] tests: Address issues raised by shellcheck SC2086 & enable shellcheck
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH 06/14] tests: Address issues raised by shellcheck SC2034
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH 13/14] tests: Address issues raised by shellcheck SC2295
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH 05/14] tests: Address issues raised by shellcheck SC2317
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH 07/14] tests: Address issues raised by shellcheck SC2164
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH 10/14] tests: Address issues raised by shellcheck SC2206
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH 04/14] tests: Address issues raised by shellcheck SC2320
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH 00/14] Enable shellcheck and fix some issue
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: PSA: This list is being migrated (no action required)
- From: Konstantin Ryabitsev <konstantin@xxxxxxxxxxxxxxxxxxx>
- PSA: This list is being migrated (no action required)
- From: Konstantin Ryabitsev <konstantin@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] fs: Pass AT_GETATTR_NOSEC flag to getattr interface function
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH] KEYS: encrypted: Add check for strsep
- From: Chen Ni <nichen@xxxxxxxxxxx>
- Re: [PATCH v5 00/23] security: Move IMA and EVM to the LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 00/23] security: Move IMA and EVM to the LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 22/23] integrity: Move integrity functions to the LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 21/23] evm: Move to LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 20/23] ima: Move IMA-Appraisal to LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 19/23] ima: Move to LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 18/23] security: Introduce key_post_create_or_update hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 11/23] security: Introduce inode_post_removexattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 17/23] security: Introduce inode_post_remove_acl hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 16/23] security: Introduce inode_post_set_acl hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 15/23] security: Introduce inode_post_create_tmpfile hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 14/23] security: Introduce path_post_mknod hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 13/23] security: Introduce file_pre_free_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 12/23] security: Introduce file_post_open hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 11/23] security: Introduce inode_post_removexattr hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 10/23] security: Introduce inode_post_setattr hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 08/23] evm: Align evm_inode_post_setxattr() definition with LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 07/23] evm: Align evm_inode_setxattr() definition with LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 06/23] evm: Align evm_inode_post_setattr() definition with LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 05/23] ima: Align ima_post_read_file() definition with LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 04/23] ima: Align ima_inode_removexattr() definition with LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 03/23] ima: Align ima_inode_setxattr() definition with LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 02/23] ima: Align ima_file_mprotect() definition with LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 01/23] ima: Align ima_inode_post_setattr() definition with LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 4/6] tpm: Support TPM2 sized buffers (TPM2B)
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v5 00/23] security: Move IMA and EVM to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 21/23] evm: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 22/23] integrity: Move integrity functions to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 20/23] ima: Move IMA-Appraisal to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 05/23] ima: Align ima_post_read_file() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 19/23] ima: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 17/23] security: Introduce inode_post_remove_acl hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 18/23] security: Introduce key_post_create_or_update hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 16/23] security: Introduce inode_post_set_acl hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 15/23] security: Introduce inode_post_create_tmpfile hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 14/23] security: Introduce path_post_mknod hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 13/23] security: Introduce file_pre_free_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 12/23] security: Introduce file_post_open hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 11/23] security: Introduce inode_post_removexattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 10/23] security: Introduce inode_post_setattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 09/23] security: Align inode_setattr hook definition with EVM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 08/23] evm: Align evm_inode_post_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 07/23] evm: Align evm_inode_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 06/23] evm: Align evm_inode_post_setattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 04/23] ima: Align ima_inode_removexattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 03/23] ima: Align ima_inode_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 02/23] ima: Align ima_file_mprotect() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 01/23] ima: Align ima_inode_post_setattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 00/23] security: Move IMA and EVM to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v2 1/2] ima: Reword IMA_KEYRINGS_PERMIT_SIGNED_BY_BUILTIN_OR_SECONDARY
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v2 0/2] ima: IMA_KEYRINGS_PERMIT_SIGNED_BY_BUILTIN_OR_SECONDARY cleanup
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v2 2/2] ima: Remove EXPERIMENTAL from Kconfig
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH 1/2] ima: Add machine keyring reference to IMA_KEYRINGS_PERMIT_SIGNED_BY_BUILTIN_OR_SECONDARY
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH] fs: Pass AT_GETATTR_NOSEC flag to getattr interface function
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/6] tpm: Store TPM buffer length
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH 1/2] ima: Add machine keyring reference to IMA_KEYRINGS_PERMIT_SIGNED_BY_BUILTIN_OR_SECONDARY
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 3/6] tpm: Detach tpm_buf_reset() from tpm_buf_init()
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v3 2/6] tpm: Store TPM buffer length
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v4 12/23] security: Introduce file_post_open hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 00/23] security: Move IMA and EVM to the LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 17/23] security: Introduce inode_post_remove_acl hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 20/23] ima: Move IMA-Appraisal to LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- PSA: migrating linux-integrity to new vger infrastructure
- From: Konstantin Ryabitsev <konstantin@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 4/6] tpm: Support TPM2 sized buffers (TPM2B)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 5/6] tpm: Add tpm_buf_read_{u8,u16,u32}
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 1/6] tpm: Move buffer handling from static inlines to real functions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/6] tpm: Move buffer handling from static inlines to real functions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 1/6] tpm: Move buffer handling from static inlines to real functions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 1/6] tpm: Move buffer handling from static inlines to real functions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC v11 5/19] ipe: introduce 'boot_verified' as a trust provider
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v11 5/19] ipe: introduce 'boot_verified' as a trust provider
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v11 18/19] ipe: kunit test for parser
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v11 17/19] scripts: add boot policy generation program
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v11 9/19] ipe: add permissive toggle
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v11 8/19] uapi|audit|ipe: add ipe auditing support
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v11 5/19] ipe: introduce 'boot_verified' as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v11 14/19] ipe: add support for dm-verity as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v11 15/19] fsverity: consume builtin signature via LSM hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] integrity: susbystem updates for v6.7
- From: pr-tracker-bot@xxxxxxxxxx
- [PATCH 2/2] ima: Remove EXPERIMENTAL from IMA_KEYRINGS_PERMIT_SIGNED_BY_BUILTIN_OR_SECONDARY
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH 0/2] ima: IMA_KEYRINGS_PERMIT_SIGNED_BY_BUILTIN_OR_SECONDARY cleanup
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH 1/2] ima: Add machine keyring reference to IMA_KEYRINGS_PERMIT_SIGNED_BY_BUILTIN_OR_SECONDARY
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH RFC v11 15/19] fsverity: consume builtin signature via LSM hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v11 15/19] fsverity: consume builtin signature via LSM hook
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH RFC v11 13/19] dm verity: consume root hash digest and signature data via LSM hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v11 12/19] dm: add finalize hook to target_type
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v11 11/19] dm verity: set DM_TARGET_SINGLETON feature flag
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v11 15/19] fsverity: consume builtin signature via LSM hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v6 05/14] x86: Secure Launch main header file
- From: ross.philipson@xxxxxxxxxx
- Re: [RFC V2] IMA Log Snapshotting Design Proposal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC V2] IMA Log Snapshotting Design Proposal
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- [GIT PULL] integrity: susbystem updates for v6.7
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd changes for v6.7
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v2 0/7] ima: kexec: measure events between kexec load and execute
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/7] ima: kexec: measure events between kexec load and execute
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 7/7] ima: record log size at kexec load and execute
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/7] ima: move ima_dump_measurement_list call from kexec load to execute
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 4/6] tpm: Support TPM2 sized buffers (TPM2B)
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 5/6] tpm: Add tpm_buf_read_{u8,u16,u32}
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v4 22/23] integrity: Move integrity functions to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 21/23] evm: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 20/23] ima: Move IMA-Appraisal to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 19/23] ima: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 18/23] security: Introduce key_post_create_or_update hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 17/23] security: Introduce inode_post_remove_acl hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 16/23] security: Introduce inode_post_set_acl hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 15/23] security: Introduce inode_post_create_tmpfile hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 14/23] security: Introduce path_post_mknod hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 13/23] security: Introduce file_pre_free_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 12/23] security: Introduce file_post_open hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 11/23] security: Introduce inode_post_removexattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 10/23] security: Introduce inode_post_setattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 09/23] security: Align inode_setattr hook definition with EVM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 08/23] evm: Align evm_inode_post_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 07/23] evm: Align evm_inode_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 06/23] evm: Align evm_inode_post_setattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 05/23] ima: Align ima_post_read_file() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 03/23] ima: Align ima_inode_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 04/23] ima: Align ima_inode_removexattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 02/23] ima: Align ima_file_mprotect() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 01/23] ima: Align ima_inode_post_setattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 00/23] security: Move IMA and EVM to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/7] ima: refactor ima_dump_measurement_list to move memory allocation to a separate function
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH RFC v11 5/19] ipe: introduce 'boot_verified' as a trust provider
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v11 2/19] ipe: add policy parser
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v11 5/19] ipe: introduce 'boot_verified' as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/7] ima: refactor ima_dump_measurement_list to move memory allocation to a separate function
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/6] tpm: Move buffer handling from static inlines to real functions
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v3 1/6] tpm: Move buffer handling from static inlines to real functions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/6] tpm: Move buffer handling from static inlines to real functions
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] security: Don't yet account for IMA in LSM_CONFIG_COUNT calculation
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] security: Don't yet account for IMA in LSM_CONFIG_COUNT calculation
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] ima: detect changes to the backing overlay file
- From: Raul Rangel <rrangel@xxxxxxxxxxxx>
- Re: [PATCH] security: Don't yet account for IMA in LSM_CONFIG_COUNT calculation
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] security: Don't yet account for IMA in LSM_CONFIG_COUNT calculation
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] security: Don't yet account for IMA in LSM_CONFIG_COUNT calculation
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH RFC v11 3/19] ipe: add evaluation loop
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v11 2/19] ipe: add policy parser
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] ima: detect changes to the backing overlay file
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/5] KEYS: trusted: Introduce NXP DCP-backed trusted keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 1/5] crypto: mxs-dcp: Add support for hardware-bound keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]