Linux Integrity
[Prev Page][Next Page]
- Re: [PATCH v5 10/23] security: Introduce inode_post_setattr hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 13/23] security: Introduce file_pre_free_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v7 02/13] Documentation/x86: Secure Launch kernel documentation
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v5 22/23] integrity: Move integrity functions to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 13/23] security: Introduce file_pre_free_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 10/23] security: Introduce inode_post_setattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 13/23] security: Introduce file_pre_free_security hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 22/23] integrity: Move integrity functions to the LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 17/23] security: Introduce inode_post_remove_acl hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 16/23] security: Introduce inode_post_set_acl hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 15/23] security: Introduce inode_post_create_tmpfile hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 10/23] security: Introduce inode_post_setattr hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 11/23] security: Introduce inode_post_removexattr hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v7 10/13] kexec: Secure Launch kexec SEXIT support
- From: ross.philipson@xxxxxxxxxx
- Re: [PATCH v2 2/7] ima: move ima_dump_measurement_list call from kexec load to execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/6] Extend struct tpm_buf to support sized buffers (TPM2B)
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RESEND PATCH] tpm: nuvoton: Use i2c_get_match_data()
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 4/6] tpm: Support TPM2 sized buffers (TPM2B)
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 2/6] tpm: Store TPM buffer length
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 3/6] tpm: Detach tpm_buf_reset() from tpm_buf_init()
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 2/6] tpm: Store TPM buffer length
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [RESEND PATCH] tpm: nuvoton: Use i2c_get_match_data()
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v2 0/7] ima: kexec: measure events between kexec load and execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/7] ima: kexec: measure events between kexec load and execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 7/7] ima: record log size at kexec load and execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/7] ima: move ima_dump_measurement_list call from kexec load to execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/7] ima: refactor ima_dump_measurement_list to move memory allocation to a separate function
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/7] ima: refactor ima_dump_measurement_list to move memory allocation to a separate function
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC V2] IMA Log Snapshotting Design Proposal
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC V2] IMA Log Snapshotting Design Proposal
- From: Sush Shringarputale <sushring@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 06/13] x86: Add early SHA support for Secure Launch early measurements
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Re: [RFC V2] IMA Log Snapshotting Design Proposal
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [RFC V2] IMA Log Snapshotting Design Proposal
- From: Sush Shringarputale <sushring@xxxxxxxxxxxxxxxxxxx>
- [linux-next:master] BUILD REGRESSION d173336e238b0f7f5b7eddfa641d7c25c24bb86a
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [ima-evm-utils PATCH 14/14] tests: Address issues raised by shellcheck SC2003
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] security: Don't yet account for IMA in LSM_CONFIG_COUNT calculation
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v7 02/13] Documentation/x86: Secure Launch kernel documentation
- From: Alyssa Ross <hi@xxxxxxxxx>
- Re: [PATCH v7 06/13] x86: Add early SHA support for Secure Launch early measurements
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 06/13] x86: Add early SHA support for Secure Launch early measurements
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Re: [PATCH v7 06/13] x86: Add early SHA support for Secure Launch early measurements
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v7 09/13] x86: Secure Launch SMP bringup support
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v7 10/13] kexec: Secure Launch kexec SEXIT support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 07/13] x86: Secure Launch kernel early boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v7 02/13] Documentation/x86: Secure Launch kernel documentation
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v7 08/13] x86: Secure Launch kernel late boot stub
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v7 12/13] x86: Secure Launch late initcall platform module
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v7 05/13] x86: Secure Launch main header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v7 10/13] kexec: Secure Launch kexec SEXIT support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v7 06/13] x86: Add early SHA support for Secure Launch early measurements
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v7 00/13] x86: Trenchboot secure dynamic launch Linux kernel support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v7 04/13] x86: Secure Launch Resource Table header file
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v7 01/13] x86/boot: Place kernel_info at a fixed offset
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v7 13/13] tpm: Allow locality 2 to be set when initializing the TPM for Secure Launch
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v7 09/13] x86: Secure Launch SMP bringup support
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v7 03/13] x86: Secure Launch Kconfig
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [PATCH v7 11/13] reboot: Secure Launch SEXIT support on reboot paths
- From: Ross Philipson <ross.philipson@xxxxxxxxxx>
- [ima-evm-utils PATCH 14/14] tests: Address issues raised by shellcheck SC2003
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH 12/14] tests: Address issues raised by shellcheck SC2043
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH 03/14] tests: Address issues raised by shellcheck SC2046
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH 02/14] tests: Address issues raised by shellcheck SC2181
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH 11/14] tests: Address issues raised by shellcheck SC2196
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH 08/14] tests: Address issues raised by shellcheck SC2166
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH 09/14] tests: Address issues raised by shellcheck SC2294
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH 01/14] tests: Address issues raised by shellcheck SC2086 & enable shellcheck
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH 06/14] tests: Address issues raised by shellcheck SC2034
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH 13/14] tests: Address issues raised by shellcheck SC2295
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH 05/14] tests: Address issues raised by shellcheck SC2317
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH 07/14] tests: Address issues raised by shellcheck SC2164
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH 10/14] tests: Address issues raised by shellcheck SC2206
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH 04/14] tests: Address issues raised by shellcheck SC2320
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [ima-evm-utils PATCH 00/14] Enable shellcheck and fix some issue
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: PSA: This list is being migrated (no action required)
- From: Konstantin Ryabitsev <konstantin@xxxxxxxxxxxxxxxxxxx>
- PSA: This list is being migrated (no action required)
- From: Konstantin Ryabitsev <konstantin@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] fs: Pass AT_GETATTR_NOSEC flag to getattr interface function
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH] KEYS: encrypted: Add check for strsep
- From: Chen Ni <nichen@xxxxxxxxxxx>
- Re: [PATCH v5 00/23] security: Move IMA and EVM to the LSM infrastructure
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 00/23] security: Move IMA and EVM to the LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 22/23] integrity: Move integrity functions to the LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 21/23] evm: Move to LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 20/23] ima: Move IMA-Appraisal to LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 19/23] ima: Move to LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 18/23] security: Introduce key_post_create_or_update hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 11/23] security: Introduce inode_post_removexattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 17/23] security: Introduce inode_post_remove_acl hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 16/23] security: Introduce inode_post_set_acl hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 15/23] security: Introduce inode_post_create_tmpfile hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 14/23] security: Introduce path_post_mknod hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 13/23] security: Introduce file_pre_free_security hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 12/23] security: Introduce file_post_open hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 11/23] security: Introduce inode_post_removexattr hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 10/23] security: Introduce inode_post_setattr hook
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 08/23] evm: Align evm_inode_post_setxattr() definition with LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 07/23] evm: Align evm_inode_setxattr() definition with LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 06/23] evm: Align evm_inode_post_setattr() definition with LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 05/23] ima: Align ima_post_read_file() definition with LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 04/23] ima: Align ima_inode_removexattr() definition with LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 03/23] ima: Align ima_inode_setxattr() definition with LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 02/23] ima: Align ima_file_mprotect() definition with LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 01/23] ima: Align ima_inode_post_setattr() definition with LSM infrastructure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 4/6] tpm: Support TPM2 sized buffers (TPM2B)
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v5 00/23] security: Move IMA and EVM to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 21/23] evm: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 22/23] integrity: Move integrity functions to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 20/23] ima: Move IMA-Appraisal to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 05/23] ima: Align ima_post_read_file() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 19/23] ima: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 17/23] security: Introduce inode_post_remove_acl hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 18/23] security: Introduce key_post_create_or_update hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 16/23] security: Introduce inode_post_set_acl hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 15/23] security: Introduce inode_post_create_tmpfile hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 14/23] security: Introduce path_post_mknod hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 13/23] security: Introduce file_pre_free_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 12/23] security: Introduce file_post_open hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 11/23] security: Introduce inode_post_removexattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 10/23] security: Introduce inode_post_setattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 09/23] security: Align inode_setattr hook definition with EVM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 08/23] evm: Align evm_inode_post_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 07/23] evm: Align evm_inode_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 06/23] evm: Align evm_inode_post_setattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 04/23] ima: Align ima_inode_removexattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 03/23] ima: Align ima_inode_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 02/23] ima: Align ima_file_mprotect() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 01/23] ima: Align ima_inode_post_setattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v5 00/23] security: Move IMA and EVM to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v2 1/2] ima: Reword IMA_KEYRINGS_PERMIT_SIGNED_BY_BUILTIN_OR_SECONDARY
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v2 0/2] ima: IMA_KEYRINGS_PERMIT_SIGNED_BY_BUILTIN_OR_SECONDARY cleanup
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH v2 2/2] ima: Remove EXPERIMENTAL from Kconfig
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH 1/2] ima: Add machine keyring reference to IMA_KEYRINGS_PERMIT_SIGNED_BY_BUILTIN_OR_SECONDARY
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH] fs: Pass AT_GETATTR_NOSEC flag to getattr interface function
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/6] tpm: Store TPM buffer length
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH 1/2] ima: Add machine keyring reference to IMA_KEYRINGS_PERMIT_SIGNED_BY_BUILTIN_OR_SECONDARY
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 3/6] tpm: Detach tpm_buf_reset() from tpm_buf_init()
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v3 2/6] tpm: Store TPM buffer length
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v4 12/23] security: Introduce file_post_open hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 00/23] security: Move IMA and EVM to the LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 17/23] security: Introduce inode_post_remove_acl hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 20/23] ima: Move IMA-Appraisal to LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- PSA: migrating linux-integrity to new vger infrastructure
- From: Konstantin Ryabitsev <konstantin@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 4/6] tpm: Support TPM2 sized buffers (TPM2B)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 5/6] tpm: Add tpm_buf_read_{u8,u16,u32}
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 1/6] tpm: Move buffer handling from static inlines to real functions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/6] tpm: Move buffer handling from static inlines to real functions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 1/6] tpm: Move buffer handling from static inlines to real functions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 1/6] tpm: Move buffer handling from static inlines to real functions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC v11 5/19] ipe: introduce 'boot_verified' as a trust provider
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v11 5/19] ipe: introduce 'boot_verified' as a trust provider
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v11 18/19] ipe: kunit test for parser
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v11 17/19] scripts: add boot policy generation program
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v11 9/19] ipe: add permissive toggle
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v11 8/19] uapi|audit|ipe: add ipe auditing support
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v11 5/19] ipe: introduce 'boot_verified' as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v11 14/19] ipe: add support for dm-verity as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v11 15/19] fsverity: consume builtin signature via LSM hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] integrity: susbystem updates for v6.7
- From: pr-tracker-bot@xxxxxxxxxx
- [PATCH 2/2] ima: Remove EXPERIMENTAL from IMA_KEYRINGS_PERMIT_SIGNED_BY_BUILTIN_OR_SECONDARY
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH 0/2] ima: IMA_KEYRINGS_PERMIT_SIGNED_BY_BUILTIN_OR_SECONDARY cleanup
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH 1/2] ima: Add machine keyring reference to IMA_KEYRINGS_PERMIT_SIGNED_BY_BUILTIN_OR_SECONDARY
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH RFC v11 15/19] fsverity: consume builtin signature via LSM hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v11 15/19] fsverity: consume builtin signature via LSM hook
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH RFC v11 13/19] dm verity: consume root hash digest and signature data via LSM hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v11 12/19] dm: add finalize hook to target_type
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v11 11/19] dm verity: set DM_TARGET_SINGLETON feature flag
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v11 15/19] fsverity: consume builtin signature via LSM hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v6 05/14] x86: Secure Launch main header file
- From: ross.philipson@xxxxxxxxxx
- Re: [RFC V2] IMA Log Snapshotting Design Proposal
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC V2] IMA Log Snapshotting Design Proposal
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- [GIT PULL] integrity: susbystem updates for v6.7
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd changes for v6.7
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v2 0/7] ima: kexec: measure events between kexec load and execute
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/7] ima: kexec: measure events between kexec load and execute
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 7/7] ima: record log size at kexec load and execute
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/7] ima: move ima_dump_measurement_list call from kexec load to execute
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 4/6] tpm: Support TPM2 sized buffers (TPM2B)
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 5/6] tpm: Add tpm_buf_read_{u8,u16,u32}
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v4 22/23] integrity: Move integrity functions to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 23/23] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 21/23] evm: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 20/23] ima: Move IMA-Appraisal to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 19/23] ima: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 18/23] security: Introduce key_post_create_or_update hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 17/23] security: Introduce inode_post_remove_acl hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 16/23] security: Introduce inode_post_set_acl hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 15/23] security: Introduce inode_post_create_tmpfile hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 14/23] security: Introduce path_post_mknod hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 13/23] security: Introduce file_pre_free_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 12/23] security: Introduce file_post_open hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 11/23] security: Introduce inode_post_removexattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 10/23] security: Introduce inode_post_setattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 09/23] security: Align inode_setattr hook definition with EVM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 08/23] evm: Align evm_inode_post_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 07/23] evm: Align evm_inode_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 06/23] evm: Align evm_inode_post_setattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 05/23] ima: Align ima_post_read_file() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 03/23] ima: Align ima_inode_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 04/23] ima: Align ima_inode_removexattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 02/23] ima: Align ima_file_mprotect() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 01/23] ima: Align ima_inode_post_setattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v4 00/23] security: Move IMA and EVM to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/7] ima: refactor ima_dump_measurement_list to move memory allocation to a separate function
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH RFC v11 5/19] ipe: introduce 'boot_verified' as a trust provider
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v11 2/19] ipe: add policy parser
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v11 5/19] ipe: introduce 'boot_verified' as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/7] ima: refactor ima_dump_measurement_list to move memory allocation to a separate function
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/6] tpm: Move buffer handling from static inlines to real functions
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH v3 1/6] tpm: Move buffer handling from static inlines to real functions
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/6] tpm: Move buffer handling from static inlines to real functions
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] security: Don't yet account for IMA in LSM_CONFIG_COUNT calculation
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] security: Don't yet account for IMA in LSM_CONFIG_COUNT calculation
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3] ima: detect changes to the backing overlay file
- From: Raul Rangel <rrangel@xxxxxxxxxxxx>
- Re: [PATCH] security: Don't yet account for IMA in LSM_CONFIG_COUNT calculation
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] security: Don't yet account for IMA in LSM_CONFIG_COUNT calculation
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] security: Don't yet account for IMA in LSM_CONFIG_COUNT calculation
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH RFC v11 3/19] ipe: add evaluation loop
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v11 2/19] ipe: add policy parser
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] ima: detect changes to the backing overlay file
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/5] KEYS: trusted: Introduce NXP DCP-backed trusted keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 1/5] crypto: mxs-dcp: Add support for hardware-bound keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 1/6] tpm: Move buffer handling from static inlines to real functions
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] ima: detect changes to the backing overlay file
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v3] ima: detect changes to the backing overlay file
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3] ima: detect changes to the backing overlay file
- From: Raul Rangel <rrangel@xxxxxxxxxxxx>
- [PATCH v3] ima: detect changes to the backing overlay file
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] ima: detect changes to the backing overlay file
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [RFC PATCH] certs: Only allow certs signed by keys on the builtin keyring
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2] ima: detect changes to the backing overlay file
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/6] tpm: Move buffer handling from static inlines to real functions
- From: Jerry Snitselaar <jsnitsel@xxxxxxxxxx>
- Re: [PATCH] ima: Add __counted_by for struct modsig and use struct_size()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 5/5] docs: trusted-encrypted: add DCP as new trust source
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v4 4/5] docs: document DCP-backed trusted keys kernel params
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v4 3/5] MAINTAINERS: add entry for DCP-based trusted keys
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v4 2/5] KEYS: trusted: Introduce NXP DCP-backed trusted keys
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v4 1/5] crypto: mxs-dcp: Add support for hardware-bound keys
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v4 0/5] DCP as trusted keys backend
- From: David Gstir <david@xxxxxxxxxxxxx>
- [robertosassu:ima-evm-lsms-v4-devel-v7] [evm] ea31d8b249: Kernel_panic-not_syncing:security_add_hooks_Too_many_LSMs_registered
- From: kernel test robot <oliver.sang@xxxxxxxxx>
- Re: [PATCH] ima: detect changes to the backing overlay file
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH] ima: detect changes to the backing overlay file
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 5/6] tpm: Add tpm_buf_read_{u8,u16,u32}
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC v11 18/19] ipe: kunit test for parser
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v11 17/19] scripts: add boot policy generation program
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v11 15/19] fsverity: consume builtin signature via LSM hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v11 11/19] dm verity: set DM_TARGET_SINGLETON feature flag
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v11 16/19] ipe: enable support for fs-verity as a trust provider
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v11 14/19] ipe: add support for dm-verity as a trust provider
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v11 12/19] dm: add finalize hook to target_type
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v11 13/19] dm verity: consume root hash digest and signature data via LSM hook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v11 9/19] ipe: add permissive toggle
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v11 4/19] ipe: add LSM hooks on execution and kernel read
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v11 8/19] uapi|audit|ipe: add ipe auditing support
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v11 5/19] ipe: introduce 'boot_verified' as a trust provider
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v11 3/19] ipe: add evaluation loop
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v11 2/19] ipe: add policy parser
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 5/6] tpm: Add tpm_buf_read_{u8,u16,u32}
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH v3 6/6] KEYS: trusted: tpm2: Use struct tpm_buf for sized buffers
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v3 5/6] tpm: Add tpm_buf_read_{u8,u16,u32}
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v3 4/6] tpm: Support TPM2 sized buffers (TPM2B)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v3 3/6] tpm: Detach tpm_buf_reset() from tpm_buf_init()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v3 2/6] tpm: Store TPM buffer length
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v3 1/6] tpm: Move buffer handling from static inlines to real functions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v3 0/6] Extend struct tpm_buf to support sized buffers (TPM2B)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] integrity: fix indentation of config attributes
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [GIT PULL] tpmdd changes for v6.7
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH] certs: Only allow certs signed by keys on the builtin keyring
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH] integrity: fix indentation of config attributes
- From: Prasad Pandit <ppandit@xxxxxxxxxx>
- Re: [PATCH v2 6/7] ima: make the memory for events between kexec load and exec configurable
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/7] ima: refactor ima_dump_measurement_list to move memory allocation to a separate function
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 6/7] ima: make the memory for events between kexec load and exec configurable
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/7] ima: refactor ima_dump_measurement_list to move memory allocation to a separate function
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2 7/7] ima: record log size at kexec load and execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 6/7] ima: make the memory for events between kexec load and exec configurable
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/7] ima: kexec: map source pages containing IMA buffer to image post kexec load
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/7] ima: move ima_dump_measurement_list call from kexec load to execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/7] ima: refactor ima_dump_measurement_list to move memory allocation to a separate function
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v15 00/11] LSM: Three basic syscalls
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: RFC: New LSM to control usage of x509 certificates
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: RFC: New LSM to control usage of x509 certificates
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: RFC: New LSM to control usage of x509 certificates
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- RE: TPM resource manager returns -1 for TPM2_RC_CONTEXT_GAP
- From: <Andreas.Fuchs@xxxxxxxxxxxx>
- Re: TPM resource manager returns -1 for TPM2_RC_CONTEXT_GAP
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: RFC: New LSM to control usage of x509 certificates
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [RFC V2] IMA Log Snapshotting Design Proposal
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: TPM resource manager returns -1 for TPM2_RC_CONTEXT_GAP
- From: Juergen Repp <juergen_repp@xxxxxx>
- RE: TPM resource manager returns -1 for TPM2_RC_CONTEXT_GAP
- From: <Andreas.Fuchs@xxxxxxxxxxxx>
- Re: TPM resource manager returns -1 for TPM2_RC_CONTEXT_GAP
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- TPM resource manager returns -1 for TPM2_RC_CONTEXT_GAP
- From: Juergen Repp <juergen_repp@xxxxxx>
- Re: RFC: New LSM to control usage of x509 certificates
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v15 00/11] LSM: Three basic syscalls
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v15 00/11] LSM: Three basic syscalls
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: RFC: New LSM to control usage of x509 certificates
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH v15 00/11] LSM: Three basic syscalls
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v15 00/11] LSM: Three basic syscalls
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: Add __counted_by for struct modsig and use struct_size()
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v15 00/11] LSM: Three basic syscalls
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: RFC: New LSM to control usage of x509 certificates
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v15 00/11] LSM: Three basic syscalls
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v15 00/11] LSM: Three basic syscalls
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v15 00/11] LSM: Three basic syscalls
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: RFC: New LSM to control usage of x509 certificates
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: RFC: New LSM to control usage of x509 certificates
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: RFC: New LSM to control usage of x509 certificates
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: RFC: New LSM to control usage of x509 certificates
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: RFC: New LSM to control usage of x509 certificates
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v15 00/11] LSM: Three basic syscalls
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: RFC: New LSM to control usage of x509 certificates
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: RFC: New LSM to control usage of x509 certificates
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC PATCH] certs: Only allow certs signed by keys on the builtin keyring
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 00/25] security: Move IMA and EVM to the LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 21/25] ima: Move to LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 15/25] security: Introduce file_pre_free_security hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 20/25] security: Introduce key_post_create_or_update hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 18/25] security: Introduce inode_post_set_acl hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 17/25] security: Introduce inode_post_create_tmpfile hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 16/25] security: Introduce path_post_mknod hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 25/25] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 02/25] ima: Align ima_post_path_mknod() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/7] ima: refactor ima_dump_measurement_list to move memory allocation to a separate function
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2 7/7] ima: record log size at kexec load and execute
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2 6/7] ima: make the memory for events between kexec load and exec configurable
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/7] ima: kexec: map source pages containing IMA buffer to image post kexec load
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/7] ima: move ima_dump_measurement_list call from kexec load to execute
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3 02/25] ima: Align ima_post_path_mknod() definition with LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 14/25] security: Introduce file_post_open hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 14/25] security: Introduce file_post_open hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 02/25] ima: Align ima_post_path_mknod() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 02/25] ima: Align ima_post_path_mknod() definition with LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 14/25] security: Introduce file_post_open hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 14/25] security: Introduce file_post_open hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 12/25] security: Introduce inode_post_setattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 02/25] ima: Align ima_post_path_mknod() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 02/25] ima: Align ima_post_path_mknod() definition with LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 12/25] security: Introduce inode_post_setattr hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 12/25] security: Introduce inode_post_setattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: Rollback init_trusted() consistently
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v3 02/25] ima: Align ima_post_path_mknod() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 13/25] security: Introduce inode_post_removexattr hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 12/25] security: Introduce inode_post_setattr hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 09/25] evm: Align evm_inode_setxattr() definition with LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 10/25] evm: Align evm_inode_post_setxattr() definition with LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 11/25] security: Align inode_setattr hook definition with EVM
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 08/25] evm: Align evm_inode_post_setattr() definition with LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 07/25] ima: Align ima_post_read_file() definition with LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 04/25] ima: Align ima_file_mprotect() definition with LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 05/25] ima: Align ima_inode_setxattr() definition with LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 02/25] ima: Align ima_post_path_mknod() definition with LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 02/25] ima: Align ima_post_path_mknod() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 04/25] ima: Align ima_file_mprotect() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 04/25] ima: Align ima_file_mprotect() definition with LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 02/25] ima: Align ima_post_path_mknod() definition with LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 01/25] ima: Align ima_inode_post_setattr() definition with LSM infrastructure
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: Rollback init_trusted() consistently
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: Rollback init_trusted() consistently
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: Rollback init_trusted() consistently
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: Rollback init_trusted() consistently
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: Rollback init_trusted() consistently
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: Rollback init_trusted() consistently
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: Rollback init_trusted() consistently
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: Rollback init_trusted() consistently
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: Rollback init_trusted() consistently
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: Rollback init_trusted() consistently
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: Rollback init_trusted() consistently
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: Remove redundant static calls usage
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: Remove redundant static calls usage
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v3 3/3] fs: store real path instead of fake path in backing file f_path
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] fs: store real path instead of fake path in backing file f_path
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [PATCH] KEYS: trusted: Rollback init_trusted() consistently
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: Remove redundant static calls usage
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: Remove redundant static calls usage
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: Remove redundant static calls usage
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] fs: store real path instead of fake path in backing file f_path
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v3 3/3] fs: store real path instead of fake path in backing file f_path
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] fs: store real path instead of fake path in backing file f_path
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH v3 3/3] fs: store real path instead of fake path in backing file f_path
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v3 3/3] fs: store real path instead of fake path in backing file f_path
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] fs: store real path instead of fake path in backing file f_path
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] fs: store real path instead of fake path in backing file f_path
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: Remove redundant static calls usage
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: Remove redundant static calls usage
- From: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: Remove redundant static calls usage
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 3/3] fs: store real path instead of fake path in backing file f_path
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH v3 3/3] fs: store real path instead of fake path in backing file f_path
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: Remove redundant static calls usage
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [PATCH v3 3/3] fs: store real path instead of fake path in backing file f_path
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH] tpm: nuvoton: Use i2c_get_match_data()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: Remove redundant static calls usage
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 3/3] fs: store real path instead of fake path in backing file f_path
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH v3 0/3] Reduce impact of overlayfs backing files fake path
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH] fs: Pass AT_GETATTR_NOSEC flag to getattr interface function
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH] fs: Pass AT_GETATTR_NOSEC flag to getattr interface function
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: Add __counted_by for struct modsig and use struct_size()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] ima: Add __counted_by for struct modsig and use struct_size()
- From: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
- Re: [PATCH v2 3/3] fs: store real path instead of fake path in backing file f_path
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 0/3] Reduce impact of overlayfs backing files fake path
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH v3 1/3] fs: get mnt_writers count for an open backing file's real path
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH v3 3/3] fs: store real path instead of fake path in backing file f_path
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH v3 2/3] fs: create helper file_user_path() for user displayed mapped file path
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v2 3/3] fs: store real path instead of fake path in backing file f_path
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v2 1/3] fs: get mnt_writers count for an open backing file's real path
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v2 2/3] fs: create helper file_user_path() for user displayed mapped file path
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v2 3/3] fs: store real path instead of fake path in backing file f_path
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/3] fs: create helper file_user_path() for user displayed mapped file path
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] fs: get mnt_writers count for an open backing file's real path
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [PATCH v2 3/3] fs: store real path instead of fake path in backing file f_path
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH v2 2/3] fs: create helper file_user_path() for user displayed mapped file path
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH v2 1/3] fs: get mnt_writers count for an open backing file's real path
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH v2 0/3] Reduce impact of overlayfs backing files fake path
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH] tpm: nuvoton: Use i2c_get_match_data()
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v2] KEYS: trusted: Remove redundant static calls usage
- From: Hyeonggon Yoo <42.hyeyoo@xxxxxxxxx>
- [PATCH v2] KEYS: trusted: Remove redundant static calls usage
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [GIT PULL] integrity: susbystem fixes for v6.6 (take 2)
- From: pr-tracker-bot@xxxxxxxxxx
- [PATCH v2 7/7] ima: record log size at kexec load and execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 6/7] ima: make the memory for events between kexec load and exec configurable
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 3/7] ima: kexec: map source pages containing IMA buffer to image post kexec load
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 5/7] ima: suspend measurements while the buffer is being copied during kexec reboot
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/7] ima: move ima_dump_measurement_list call from kexec load to execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 4/7] kexec: update kexec_file_load syscall to call ima_kexec_post_load
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 1/7] ima: refactor ima_dump_measurement_list to move memory allocation to a separate function
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/7] ima: kexec: measure events between kexec load and execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: Remove redundant static calls usage
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [GIT PULL] integrity: susbystem fixes for v6.6 (take 2)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [syzbot] [integrity] [overlayfs] possible deadlock in mnt_want_write (2)
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [RFC PATCH v11 15/19] fsverity: consume builtin signature via LSM hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [syzbot] [integrity] [overlayfs] possible deadlock in mnt_want_write (2)
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [syzbot] [integrity] [overlayfs] possible deadlock in mnt_want_write (2)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: RFC: New LSM to control usage of x509 certificates
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [syzbot] [integrity] [overlayfs] possible deadlock in mnt_want_write (2)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- RFC: New LSM to control usage of x509 certificates
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH] KEYS: trusted: Remove redundant static calls usage
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [syzbot] [integrity] [overlayfs] possible deadlock in mnt_want_write (2)
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH] ima: annotate iint mutex to avoid lockdep false positive warnings
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [syzbot] [integrity] [overlayfs] possible deadlock in mnt_want_write (2)
- From: syzbot <syzbot+b42fe626038981fb7bfa@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [syzbot] [integrity] [overlayfs] possible deadlock in mnt_want_write (2)
- From: syzbot <syzbot+b42fe626038981fb7bfa@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v11 16/19] ipe: enable support for fs-verity as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v11 15/19] fsverity: consume builtin signature via LSM hook
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC PATCH v11 16/19] ipe: enable support for fs-verity as a trust provider
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [RFC PATCH v11 15/19] fsverity: consume builtin signature via LSM hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v11 09/19] ipe: add permissive toggle
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v11 00/19] Integrity Policy Enforcement LSM (IPE)
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v11 01/19] security: add ipe lsm
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v11 19/19] documentation: add ipe documentation
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v11 02/19] ipe: add policy parser
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v11 12/19] dm: add finalize hook to target_type
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v11 03/19] ipe: add evaluation loop
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v11 05/19] ipe: introduce 'boot_verified' as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v11 04/19] ipe: add LSM hooks on execution and kernel read
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v11 11/19] dm verity: set DM_TARGET_SINGLETON feature flag
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v11 18/19] ipe: kunit test for parser
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v11 14/19] ipe: add support for dm-verity as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v11 06/19] security: add new securityfs delete function
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v11 10/19] block|security: add LSM blob to block_device
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v11 08/19] uapi|audit|ipe: add ipe auditing support
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v11 16/19] ipe: enable support for fs-verity as a trust provider
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v11 07/19] ipe: add userspace interface
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v11 17/19] scripts: add boot policy generation program
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v11 13/19] dm verity: consume root hash digest and signature data via LSM hook
- From: Fan Wu <wufan@xxxxxxxxxxxxxxxxxxx>
- Re: [syzbot] [integrity] [overlayfs] possible deadlock in mnt_want_write (2)
- From: syzbot <syzbot+b42fe626038981fb7bfa@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] fs: Pass AT_GETATTR_NOSEC flag to getattr interface function
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v3 1/3] crypto: mxs-dcp: Add support for hardware provided keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] fs: Pass AT_GETATTR_NOSEC flag to getattr interface function
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] fs: Pass AT_GETATTR_NOSEC flag to getattr interface function
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH] fs: Pass AT_GETATTR_NOSEC flag to getattr interface function
- From: Stefan Berger <stefanb@xxxxxxxxxxxxxxxxxx>
- Re: [syzbot] [integrity] [overlayfs] general protection fault in d_path
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [syzbot] [integrity] [overlayfs] general protection fault in d_path
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [syzbot] [integrity] [overlayfs] general protection fault in d_path
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [syzbot] [integrity] [overlayfs] general protection fault in d_path
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [syzbot] [integrity] [overlayfs] general protection fault in d_path
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH 0/2] Sign the Image which is zboot's payload
- From: Jan Hendrik Farr <kernel@xxxxxxxx>
- Re: [PATCH 1/2] dt-bindings: reset: Add Infineon SLB9670 TPM reset driver
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH] ima: rework CONFIG_IMA dependency block
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH] ima: rework CONFIG_IMA dependency block
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] ima: Finish deprecation of IMA_TRUSTED_KEYRING Kconfig
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] dt-bindings: reset: Add Infineon SLB9670 TPM reset driver
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- [PATCH] ima: rework CONFIG_IMA dependency block
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH 1/2] dt-bindings: reset: Add Infineon SLB9670 TPM reset driver
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v3 2/3] KEYS: trusted: Introduce support for NXP DCP-based trusted keys
- From: David Gstir <david@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/3] crypto: mxs-dcp: Add support for hardware provided keys
- From: David Gstir <david@xxxxxxxxxxxxx>
- Re: [PATCH] ima: Finish deprecation of IMA_TRUSTED_KEYRING Kconfig
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] dt-bindings: reset: Add Infineon SLB9670 TPM reset driver
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH 2/2] reset: Add Infineon SLB9670 TPM reset driver
- From: Lukas Wunner <lukas@xxxxxxxxx>
- [PATCH 1/2] dt-bindings: reset: Add Infineon SLB9670 TPM reset driver
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [syzbot] [integrity] [overlayfs] general protection fault in d_path
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 20/25] security: Introduce key_post_create_or_update hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 12/25] security: Introduce inode_post_setattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] ima: Finish deprecation of IMA_TRUSTED_KEYRING Kconfig
- From: Oleksandr Tymoshenko <ovt@xxxxxxxxxx>
- Re: [PATCH v3 3/3] doc: trusted-encrypted: add DCP as new trust source
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 2/3] KEYS: trusted: Introduce support for NXP DCP-based trusted keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 0/2] Sign the Image which is zboot's payload
- From: Philipp Rudo <prudo@xxxxxxxxxx>
- Re: [PATCH v3 1/3] crypto: mxs-dcp: Add support for hardware provided keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH 0/2] Sign the Image which is zboot's payload
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 0/2] Sign the Image which is zboot's payload
- From: Pingfan Liu <piliu@xxxxxxxxxx>
- Re: [PATCH 00/10] ima: measure events between kexec load and execute
- From: Tushar Sugandhi <tusharsu@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] Sign the Image which is zboot's payload
- From: Dave Young <dyoung@xxxxxxxxxx>
- Re: [PATCH 0/2] Sign the Image which is zboot's payload
- From: Jan Hendrik Farr <kernel@xxxxxxxx>
- Re: [syzbot] [integrity] [overlayfs] general protection fault in d_path
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [syzbot] [integrity] [overlayfs] general protection fault in d_path
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [syzbot] [integrity] [overlayfs] general protection fault in d_path
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH] ima: Finish deprecation of IMA_TRUSTED_KEYRING Kconfig
- From: Oleksandr Tymoshenko <ovt@xxxxxxxxxx>
- Re: [syzbot] [integrity] [overlayfs] general protection fault in d_path
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [syzbot] [integrity] [overlayfs] general protection fault in d_path
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [syzbot] [integrity] [overlayfs] general protection fault in d_path
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [syzbot] [integrity] [overlayfs] general protection fault in d_path
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [syzbot] [integrity] [overlayfs] general protection fault in d_path
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [syzbot] [integrity] [overlayfs] general protection fault in d_path
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [syzbot] [integrity] [overlayfs] general protection fault in d_path
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [syzbot] [integrity] [overlayfs] general protection fault in d_path
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [syzbot] [integrity] [overlayfs] general protection fault in d_path
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [syzbot] [integrity] [overlayfs] general protection fault in d_path
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [syzbot] [integrity] [overlayfs] general protection fault in d_path
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [syzbot] [integrity] [overlayfs] general protection fault in d_path
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v6 07/14] x86: Secure Launch kernel early boot stub
- From: ross.philipson@xxxxxxxxxx
- Re: [syzbot] [integrity] [overlayfs] general protection fault in d_path
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: [syzbot] [integrity] [overlayfs] general protection fault in d_path
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: Linux IMA documentation
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: Linux IMA documentation
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [syzbot] [integrity] [overlayfs] general protection fault in d_path
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] ima: Remove deprecated IMA_TRUSTED_KEYRING Kconfig
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- [PATCH] ima: Remove deprecated IMA_TRUSTED_KEYRING Kconfig
- From: Oleksandr Tymoshenko <ovt@xxxxxxxxxx>
- [PATCH v3 1/3] crypto: mxs-dcp: Add support for hardware provided keys
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v3 0/3] DCP as trusted keys backend
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v3 2/3] KEYS: trusted: Introduce support for NXP DCP-based trusted keys
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v3 3/3] doc: trusted-encrypted: add DCP as new trust source
- From: David Gstir <david@xxxxxxxxxxxxx>
- Re: [syzbot] [integrity] [overlayfs] general protection fault in d_path
- From: syzbot <syzbot+a67fc5321ffb4b311c98@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 25/25] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd changes for v6.6-rc2
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] tpmdd changes for v6.6-rc2
- From: Justin Forbes <jforbes@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] tpm_tis: don't flush never initialized work
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: don't flush never initialized work
- From: Jan Beulich <jbeulich@xxxxxxxx>
- Re: [PATCH] ima: fix wrong dereferences of file->f_path
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- On leave next week
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm_tis: don't flush never initialized work
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH] tpm_tis: don't flush never initialized work
- From: Jan Beulich <jbeulich@xxxxxxxx>
- Re: [PATCH] certs: Restrict blacklist updates to the secondary trusted keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH] certs: Restrict blacklist updates to the secondary trusted keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [GIT PULL] tpmdd changes for v6.6-rc2
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] tpmdd changes for v6.6-rc2
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] tpmdd changes for v6.6-rc2
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [GIT PULL] tpmdd changes for v6.6-rc2
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [GIT PULL] tpmdd changes for v6.6-rc2
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: Linux IMA documentation
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] ima: fix wrong dereferences of file->f_path
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH] certs: Restrict blacklist updates to the secondary trusted keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v2 1/3] crypto: mxs-dcp: Add support for hardware provided keys
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH] ima: fix wrong dereferences of file->f_path
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH] certs: Restrict blacklist updates to the secondary trusted keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH] certs: Restrict blacklist updates to the secondary trusted keyring
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [GIT PULL] tpmdd changes for v6.6-rc2
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] integrity: powerpc: Do not select CA_MACHINE_KEYRING
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] integrity: powerpc: Do not select CA_MACHINE_KEYRING
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] integrity: powerpc: Do not select CA_MACHINE_KEYRING
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v2] tpm: Fix typo in tpmrm class definition
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 2/3] KEYS: trusted: Introduce support for NXP DCP-based trusted keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/3] crypto: mxs-dcp: Add support for hardware provided keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/3] crypto: mxs-dcp: Add support for hardware provided keys
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] certs: Restrict blacklist updates to the secondary trusted keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH] tpm: Fix typo in tpmrm class definition
- From: Justin Forbes <jforbes@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] integrity: powerpc: Do not select CA_MACHINE_KEYRING
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH v2] tpm: Fix typo in tpmrm class definition
- From: "Justin M. Forbes" <jforbes@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 25/25] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH] certs: Restrict blacklist updates to the secondary trusted keyring
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [PATCH v2 3/3] doc: trusted-encrypted: add DCP as new trust source
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v2 2/3] KEYS: trusted: Introduce support for NXP DCP-based trusted keys
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v2 1/3] crypto: mxs-dcp: Add support for hardware provided keys
- From: David Gstir <david@xxxxxxxxxxxxx>
- [PATCH v2 0/3] DCP as trusted keys backend
- From: David Gstir <david@xxxxxxxxxxxxx>
- Re: [PATCH] integrity: powerpc: Do not select CA_MACHINE_KEYRING
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: [PATCH] integrity: powerpc: Do not select CA_MACHINE_KEYRING
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] integrity: powerpc: Do not select CA_MACHINE_KEYRING
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: Fix typo in tpmrm class definition
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] integrity: powerpc: Do not select CA_MACHINE_KEYRING
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: [PATCH] integrity: powerpc: Do not select CA_MACHINE_KEYRING
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: [PATCH] integrity: powerpc: Do not select CA_MACHINE_KEYRING
- From: Nayna <nayna@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] certs: Restrict blacklist updates to the secondary trusted keyring
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] certs: Restrict blacklist updates to the secondary trusted keyring
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] certs: Restrict blacklist updates to the secondary trusted keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH] Fix typo in tpmrm class definition
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] integrity: powerpc: Do not select CA_MACHINE_KEYRING
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] certs: Restrict blacklist updates to the secondary trusted keyring
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] certs: Restrict blacklist updates to the secondary trusted keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH] Fix typo in tpmrm class definition
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH] tpm: Fix typo in tpmrm class definition
- From: "Justin M. Forbes" <jforbes@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] certs: Restrict blacklist updates to the secondary trusted keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- Re: [PATCH] Fix typo in tpmrm class definition
- From: Justin Forbes <jforbes@xxxxxxxxxxxxxxxxx>
- Re: Slow boot and shutdown/reboot problems with 6.5.0+
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: Slow boot and shutdown/reboot problems with 6.5.0+
- From: Thorsten Leemhuis <regressions@xxxxxxxxxxxxx>
- Re: [PATCH] certs: Restrict blacklist updates to the secondary trusted keyring
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] certs: Restrict blacklist updates to the secondary trusted keyring
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: tee: Refactor register SHM usage
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 11/25] security: Align inode_setattr hook definition with EVM
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] tpm: Enable hwrng only for Pluton on AMD CPUs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] tpm: Enable hwrng only for Pluton on AMD CPUs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] Fix typo in tpmrm class definition
- From: Ivan Orlov <ivan.orlov0322@xxxxxxxxx>
- [syzbot] [integrity?] [lsm?] INFO: task hung in process_measurement (2)
- From: syzbot <syzbot+1de5a37cb85a2d536330@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH] certs: Restrict blacklist updates to the secondary trusted keyring
- From: Eric Snowberg <eric.snowberg@xxxxxxxxxx>
- [PATCH AUTOSEL 5.15 08/15] tpm_tis: Resend command to recover from data transfer errors
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 4/8] tpm_tis: Resend command to recover from data transfer errors
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.4 05/10] tpm_tis: Resend command to recover from data transfer errors
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.10 08/14] tpm_tis: Resend command to recover from data transfer errors
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 4/7] tpm_tis: Resend command to recover from data transfer errors
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.1 16/26] tpm_tis: Resend command to recover from data transfer errors
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.4 25/41] tpm_tis: Resend command to recover from data transfer errors
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.5 28/45] tpm_tis: Resend command to recover from data transfer errors
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH] Fix typo in tpmrm class definition
- From: "Justin M. Forbes" <jforbes@xxxxxxxxxxxxxxxxx>
- Re: Slow boot and shutdown/reboot problems with 6.5.0+
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [RFC] IMA Log Snapshotting Design Proposal - aggregate
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC] IMA Log Snapshotting Design Proposal - network bandwidth
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] integrity: powerpc: Do not select CA_MACHINE_KEYRING
- From: Michal Suchánek <msuchanek@xxxxxxx>
- [PATCH] ima: fix return value of ima_restore_measurement_list
- From: Yan Zhu <zhuyan2015@xxxxxxxxxxx>
- [PATCH] integrity: powerpc: Do not select CA_MACHINE_KEYRING
- From: Michal Suchanek <msuchanek@xxxxxxx>
- Re: [PATCH 5.15] of: kexec: Mark ima_{free,stable}_kexec_buffer() as __init
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Fwd: Slow boot and shutdown/reboot problems with 6.5.0+
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: Linux IMA documentation
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [RFC] IMA Log Snapshotting Design Proposal - aggregate
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH 5.15] of: kexec: Mark ima_{free,stable}_kexec_buffer() as __init
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [RFC] IMA Log Snapshotting Design Proposal - network bandwidth
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [RFC] IMA Log Snapshotting Design Proposal - unseal
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- Re: [PATCH v3 22/25] ima: Move IMA-Appraisal to LSM infrastructure
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- [PATCH 5.15] of: kexec: Mark ima_{free,stable}_kexec_buffer() as __init
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [GIT PULL] tpmdd changes for v6.6-rc1
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v3 19/25] security: Introduce inode_post_remove_acl hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3 17/25] security: Introduce inode_post_create_tmpfile hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3 18/25] security: Introduce inode_post_set_acl hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3 15/25] security: Introduce file_pre_free_security hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3 20/25] security: Introduce key_post_create_or_update hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3 02/25] ima: Align ima_post_path_mknod() definition with LSM infrastructure
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3 21/25] ima: Move to LSM infrastructure
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3 14/25] security: Introduce file_post_open hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3 03/25] ima: Align ima_post_create_tmpfile() definition with LSM infrastructure
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3 16/25] security: Introduce path_post_mknod hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v3 12/25] security: Introduce inode_post_setattr hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2 13/25] security: Introduce inode_post_removexattr hook
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v3 13/25] security: Introduce inode_post_removexattr hook
- From: Stefan Berger <stefanb@xxxxxxxxxxxxx>
- Re: [PATCH v2 11/25] security: Align inode_setattr hook definition with EVM
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3] tpm: Enable hwrng only for Pluton on AMD CPUs
- From: Thorsten Leemhuis <regressions@xxxxxxxxxxxxx>
- Re: [PATCH v2 13/25] security: Introduce inode_post_removexattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH] KEYS: trusted: tee: Refactor register SHM usage
- From: Sumit Garg <sumit.garg@xxxxxxxxxx>
- Re: [RFC][PATCH v2 00/13] integrity: Introduce a digest cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] tpm: Enable hwrng only for Pluton on AMD CPUs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: REGRESSION WITH BISECT: v6.5-rc6 TPM patch breaks S3 on some Intel systems
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: Linux IMA documentation
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 13/25] security: Introduce inode_post_removexattr hook
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 12/25] security: Introduce inode_post_setattr hook
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 11/25] security: Align inode_setattr hook definition with EVM
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] tpm: Enable hwrng only for Pluton on AMD CPUs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [GIT PULL] tpmdd changes for v6.6-rc1
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] tpm: Enable hwrng only for Pluton on AMD CPUs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH] tpm: Don't make vendor check required for probe
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] tpm: Enable hwrng only for Pluton on AMD CPUs
- From: "Jarkko Sakkinen" <jarkko@xxxxxxxxxx>
- [PATCH v3 25/25] integrity: Switch from rbtree to LSM-managed blob for integrity_iint_cache
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 24/25] integrity: Move integrity functions to the LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 23/25] evm: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 22/25] ima: Move IMA-Appraisal to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 21/25] ima: Move to LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 20/25] security: Introduce key_post_create_or_update hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 19/25] security: Introduce inode_post_remove_acl hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 18/25] security: Introduce inode_post_set_acl hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 16/25] security: Introduce path_post_mknod hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 17/25] security: Introduce inode_post_create_tmpfile hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 14/25] security: Introduce file_post_open hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 15/25] security: Introduce file_pre_free_security hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 13/25] security: Introduce inode_post_removexattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 12/25] security: Introduce inode_post_setattr hook
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 11/25] security: Align inode_setattr hook definition with EVM
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 10/25] evm: Align evm_inode_post_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 09/25] evm: Align evm_inode_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 08/25] evm: Align evm_inode_post_setattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 07/25] ima: Align ima_post_read_file() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 06/25] ima: Align ima_inode_removexattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
- [PATCH v3 05/25] ima: Align ima_inode_setxattr() definition with LSM infrastructure
- From: Roberto Sassu <roberto.sassu@xxxxxxxxxxxxxxx>
[Index of Archives]
[Linux Kernel]
[Linux Kernel Hardening]
[Linux USB Devel]
[Linux SCSI]
[Yosemite Forum]