linux-integrity
Thread
Date
Earlier messages
Later messages
Messages by Thread
Re: [PATCH 25/61] ceph: update format strings for u64 i_ino
Viacheslav Dubeyko
[PATCH 27/61] cramfs: update format strings for u64 i_ino
Jeff Layton
[PATCH 31/61] ext2: update format strings for u64 i_ino
Jeff Layton
[PATCH 33/61] hfs: update format strings for u64 i_ino
Jeff Layton
Re: [PATCH 33/61] hfs: update format strings for u64 i_ino
Viacheslav Dubeyko
[PATCH 42/61] ocfs2: update format strings for u64 i_ino
Jeff Layton
[PATCH 49/61] ufs: update format strings for u64 i_ino
Jeff Layton
[PATCH 52/61] drm/amdgpu: update for u64 i_ino
Jeff Layton
[PATCH 53/61] fsnotify: update fdinfo format strings for u64 i_ino
Jeff Layton
[PATCH 54/61] net: update socket dname format for u64 i_ino
Jeff Layton
[PATCH 55/61] uprobes: update format strings for u64 i_ino
Jeff Layton
[PATCH 56/61] dma-buf: update format string for u64 i_ino
Jeff Layton
[PATCH 58/61] fsverity: update format string for u64 i_ino
Jeff Layton
[PATCH 59/61] iomap: update format string for u64 i_ino
Jeff Layton
Re: [PATCH 59/61] iomap: update format string for u64 i_ino
Darrick J. Wong
[PATCH 57/61] fscrypt: update format strings for u64 i_ino
Jeff Layton
Re: [PATCH 57/61] fscrypt: update format strings for u64 i_ino
Eric Biggers
[PATCH 60/61] net: update legacy protocol format strings for u64 i_ino
Jeff Layton
[PATCH 61/61] vfs: update core format strings for u64 i_ino
Jeff Layton
Re: [PATCH 61/61] vfs: update core format strings for u64 i_ino
Darrick J. Wong
Re: [PATCH 00/61] vfs: change inode->i_ino from unsigned long to u64
Matthew Wilcox
Re: [PATCH 00/61] vfs: change inode->i_ino from unsigned long to u64
Jeff Layton
Re: [PATCH 00/61] vfs: change inode->i_ino from unsigned long to u64
Jeff Layton
Re: [PATCH 00/61] vfs: change inode->i_ino from unsigned long to u64
Mathieu Desnoyers
Re: [PATCH 00/61] vfs: change inode->i_ino from unsigned long to u64
Jeff Layton
[PATCH 48/61] udf: update format strings for u64 i_ino
Jeff Layton
Re: [PATCH 00/61] vfs: change inode->i_ino from unsigned long to u64
Christian König
Re: [PATCH 00/61] vfs: change inode->i_ino from unsigned long to u64
Jeff Layton
Re: [PATCH 00/61] vfs: change inode->i_ino from unsigned long to u64
Christian Brauner
[PATCH v1] tpm_crb: Convert ACPI driver to a platform one
Rafael J. Wysocki
[PATCH v5] ima_fs: Avoid creating measurement lists for unsupported hash algos
Dmitry Safonov via B4 Relay
[PATCH] lsm: move inode IS_PRIVATE checks to individual LSMs
danieldurning . work
Re: [PATCH] lsm: move inode IS_PRIVATE checks to individual LSMs
Casey Schaufler
Re: [PATCH] lsm: move inode IS_PRIVATE checks to individual LSMs
Paul Moore
Re: [PATCH] lsm: move inode IS_PRIVATE checks to individual LSMs
Stephen Smalley
Re: [PATCH] lsm: move inode IS_PRIVATE checks to individual LSMs
Casey Schaufler
Re: [PATCH] lsm: move inode IS_PRIVATE checks to individual LSMs
Paul Moore
[PATCH v2 0/2] move TPM-specific fields into trusted_tpm_options
Srish Srinivasan
[PATCH v2 1/2] keys/trusted_keys: clean up debug message logging in the tpm backend
Srish Srinivasan
[PATCH v2 2/2] keys/trusted_keys: move TPM-specific fields into trusted_tpm_options
Srish Srinivasan
[PATCH] tpm: Make tcpci_pm_ops variable static const
Krzysztof Kozlowski
[PATCH v2] ima: fallback to using i_version to detect file change
Mimi Zohar
Re: [PATCH v2] ima: fallback to using i_version to detect file change
Frederick Lawler
Re: [PATCH v2] ima: fallback to using i_version to detect file change
Mimi Zohar
[PATCH v3 0/3] Make detecting the secure boot status integrity-wide
Coiby Xu
[PATCH v3 2/3] evm: Don't enable fix mode when secure boot is enabled
Coiby Xu
[PATCH v3 3/3] s390: Drop unnecessary CONFIG_IMA_SECURE_AND_OR_TRUSTED_BOOT
Coiby Xu
Re: [PATCH v3 3/3] s390: Drop unnecessary CONFIG_IMA_SECURE_AND_OR_TRUSTED_BOOT
Mimi Zohar
Re: [PATCH v3 3/3] s390: Drop unnecessary CONFIG_IMA_SECURE_AND_OR_TRUSTED_BOOT
Alexander Egorenkov
[PATCH] ima: fallback to using i_version
Mimi Zohar
[PATCH AUTOSEL 6.19-5.15] char: tpm: cr50: Remove IRQF_ONESHOT
Sasha Levin
[GIT PULL] integrity: subsystem updates for v7.0
Mimi Zohar
Re: [GIT PULL] integrity: subsystem updates for v7.0
pr-tracker-bot
[PATCH v6 0/3] ima: Detect changes to files via kstat changes rather than i_version
Frederick Lawler
[PATCH v6 1/3] ima: Unify vfs_getattr_nosec() stat comparisons under helper function
Frederick Lawler
[PATCH v6 2/3] ima: Make integrity_inode_attrs_changed() call into VFS
Frederick Lawler
[PATCH v6 3/3] ima: Use kstat.ctime as a fallback for change detection
Frederick Lawler
Re: [PATCH v6 0/3] ima: Detect changes to files via kstat changes rather than i_version
Mimi Zohar
Re: [PATCH v6 0/3] ima: Detect changes to files via kstat changes rather than i_version
Frederick Lawler
IMA vs TPM (SPI) boot order problems
Jonathan McDowell
Re: IMA vs TPM (SPI) boot order problems
Mimi Zohar
Re: IMA vs TPM (SPI) boot order problems
Jonathan McDowell
[PATCH v2 0/3] Make detecting the secure boot status integrity-wide
Coiby Xu
[PATCH v2 2/3] evm: Don't enable fix mode when secure boot is enabled
Coiby Xu
[PATCH v2 3/3] s390: Drop unnecessary CONFIG_IMA_SECURE_AND_OR_TRUSTED_BOOT
Coiby Xu
[GIT PULL] TPM DEVICE DRIVER: tpmdd-next-7.0-rc1
Jarkko Sakkinen
Re: [GIT PULL] TPM DEVICE DRIVER: tpmdd-next-7.0-rc1
pr-tracker-bot
[RFC PATCH v2] media: Virtual camera driver
Jarkko Sakkinen
Re: [RFC PATCH v2] media: Virtual camera driver
Jarkko Sakkinen
Re: [RFC PATCH v2] media: Virtual camera driver
Sakari Ailus
Re: [RFC PATCH v2] media: Virtual camera driver
Jarkko Sakkinen
Re: [RFC PATCH v2] media: Virtual camera driver
Jarkko Sakkinen
Re: [RFC PATCH v2] media: Virtual camera driver
Laurent Pinchart
Re: [RFC PATCH v2] media: Virtual camera driver
Jarkko Sakkinen
Re: [RFC PATCH v2] media: Virtual camera driver
Laurent Pinchart
Re: [RFC PATCH v2] media: Virtual camera driver
Jarkko Sakkinen
Re: [RFC PATCH v2] media: Virtual camera driver
Jarkko Sakkinen
Re: [RFC PATCH v2] media: Virtual camera driver
johannes . goede
Re: [RFC PATCH v2] media: Virtual camera driver
Jani Nikula
Re: [RFC PATCH v2] media: Virtual camera driver
Laurent Pinchart
Re: [RFC PATCH v2] media: Virtual camera driver
Jani Nikula
Re: [RFC PATCH v2] media: Virtual camera driver
johannes . goede
Re: [RFC PATCH v2] media: Virtual camera driver
Mauro Carvalho Chehab
Re: [RFC PATCH v2] media: Virtual camera driver
Jani Nikula
Re: [RFC PATCH v2] media: Virtual camera driver
Jarkko Sakkinen
Re: [RFC PATCH v2] media: Virtual camera driver
Jarkko Sakkinen
Re: [RFC PATCH v2] media: Virtual camera driver
Laurent Pinchart
Re: [RFC PATCH v2] media: Virtual camera driver
Jarkko Sakkinen
Re: [RFC PATCH v2] media: Virtual camera driver
Laurent Pinchart
Re: [RFC PATCH v2] media: Virtual camera driver
Jarkko Sakkinen
[PATCH v6 0/6] Extend "trusted" keys to support a new trust source named the PowerVM Key Wrapping Module (PKWM)
Srish Srinivasan
[PATCH v6 5/6] keys/trusted_keys: establish PKWM as a trusted source
Srish Srinivasan
[PATCH v6 1/6] pseries/plpks: fix kernel-doc comment inconsistencies
Srish Srinivasan
[PATCH v6 2/6] powerpc/pseries: move the PLPKS config inside its own sysfs directory
Srish Srinivasan
[PATCH v6 3/6] pseries/plpks: expose PowerVM wrapping features via the sysfs
Srish Srinivasan
[PATCH v6 6/6] docs: trusted-encryped: add PKWM as a new trust source
Srish Srinivasan
Re: [PATCH v6 6/6] docs: trusted-encryped: add PKWM as a new trust source
Jarkko Sakkinen
[PATCH v6 4/6] pseries/plpks: add HCALLs for PowerVM Key Wrapping Module
Srish Srinivasan
Re: [PATCH v6 0/6] Extend "trusted" keys to support a new trust source named the PowerVM Key Wrapping Module (PKWM)
Srish Srinivasan
[PATCH] ima: check return value of crypto_shash_final() in boot aggregate
Daniel Hodges
Re: [PATCH] ima: check return value of crypto_shash_final() in boot aggregate
Roberto Sassu
[PATCH] evm: check return values of crypto_shash functions
Daniel Hodges
Re: [PATCH] evm: check return values of crypto_shash functions
Roberto Sassu
Re: [PATCH] evm: check return values of crypto_shash functions
Daniel Hodges
[PATCH v2 v2] evm: check return values of crypto_shash functions
Daniel Hodges
Re: [PATCH v2 v2] evm: check return values of crypto_shash functions
Roberto Sassu
Re: [PATCH v2 v2] evm: check return values of crypto_shash functions
Roberto Sassu
Re: [PATCH v2 v2] evm: check return values of crypto_shash functions
Daniel Hodges
Re: [PATCH v2 v2] evm: check return values of crypto_shash functions
Roberto Sassu
[PATCH v5 0/3] ima: Detect changes to files via kstat changes rather than i_version
Frederick Lawler
[PATCH v5 2/3] ima: Make integrity_inode_attrs_changed() call into vfs
Frederick Lawler
Re: [PATCH v5 2/3] ima: Make integrity_inode_attrs_changed() call into vfs
Roberto Sassu
Re: [PATCH v5 2/3] ima: Make integrity_inode_attrs_changed() call into vfs
Frederick Lawler
[PATCH v5 1/3] ima: Unify vfs_getattr_nosec() stat comparisons under helper function
Frederick Lawler
[PATCH v5 3/3] ima: Use kstat.ctime as a fallback change detection for stacked fs
Frederick Lawler
Re: [PATCH v5 3/3] ima: Use kstat.ctime as a fallback change detection for stacked fs
Roberto Sassu
Re: [PATCH v5 3/3] ima: Use kstat.ctime as a fallback change detection for stacked fs
Frederick Lawler
Re: [PATCH v5 3/3] ima: Use kstat.ctime as a fallback change detection for stacked fs
Mimi Zohar
Re: [PATCH v5 3/3] ima: Use kstat.ctime as a fallback change detection for stacked fs
Frederick Lawler
[PATCH v4] ima: Fallback to ctime check for FS without kstat.change_cookie
Frederick Lawler
Re: [PATCH v4] ima: Fallback to ctime check for FS without kstat.change_cookie
Mimi Zohar
Re: [PATCH v4] ima: Fallback to ctime check for FS without kstat.change_cookie
Mimi Zohar
Re: [PATCH v4] ima: Fallback to ctime check for FS without kstat.change_cookie
Mimi Zohar
[PATCH] ima_setup.sh: Fix signed policy requirement check
Petr Vorel
Re: [PATCH] ima_setup.sh: Fix signed policy requirement check
Mimi Zohar
Re: [PATCH] ima_setup.sh: Fix signed policy requirement check
Petr Vorel
[PATCH v2 09/20] char: tpm: cr50: Remove IRQF_ONESHOT
Sebastian Andrzej Siewior
[PATCH v5 0/6] Extend "trusted" keys to support a new trust source named the PowerVM Key Wrapping Module (PKWM)
Srish Srinivasan
[PATCH v5 5/6] keys/trusted_keys: establish PKWM as a trusted source
Srish Srinivasan
[PATCH v5 1/6] pseries/plpks: fix kernel-doc comment inconsistencies
Srish Srinivasan
[PATCH v5 2/6] powerpc/pseries: move the PLPKS config inside its own sysfs directory
Srish Srinivasan
[PATCH v5 4/6] pseries/plpks: add HCALLs for PowerVM Key Wrapping Module
Srish Srinivasan
[PATCH v5 3/6] pseries/plpks: expose PowerVM wrapping features via the sysfs
Srish Srinivasan
[PATCH v5 6/6] docs: trusted-encryped: add PKWM as a new trust source
Srish Srinivasan
Re: [PATCH v5 0/6] Extend "trusted" keys to support a new trust source named the PowerVM Key Wrapping Module (PKWM)
Nayna Jain
[PATCH v4] ima_fs: Avoid creating measurement lists for unsupported hash algos
Dmitry Safonov via B4 Relay
Re: [PATCH v4] ima_fs: Avoid creating measurement lists for unsupported hash algos
Roberto Sassu
Re: [PATCH v4] ima_fs: Avoid creating measurement lists for unsupported hash algos
Roberto Sassu
Re: [PATCH v4] ima_fs: Avoid creating measurement lists for unsupported hash algos
Dmitry Safonov
[PATCH v2] ima_fs: Avoid creating measurement lists for unsupported hash algos
Dmitry Safonov via B4 Relay
Re: [PATCH v2] ima_fs: Avoid creating measurement lists for unsupported hash algos
Roberto Sassu
Re: [PATCH v2] ima_fs: Avoid creating measurement lists for unsupported hash algos
Dmitry Safonov
Re: [PATCH v2] ima_fs: Avoid creating measurement lists for unsupported hash algos
Dmitry Safonov
[PATCH v3] ima_fs: Avoid creating measurement lists for unsupported hash algos
Dmitry Safonov via B4 Relay
Re: [PATCH v3] ima_fs: Avoid creating measurement lists for unsupported hash algos
Jonathan McDowell
[PATCH] ima_fs: Avoid creating measurement lists for unsupported hash algos
Dmitry Safonov via B4 Relay
Re: [PATCH] ima_fs: Avoid creating measurement lists for unsupported hash algos
Roberto Sassu
Re: [PATCH] ima_fs: Avoid creating measurement lists for unsupported hash algos
Dmitry Safonov
Re: [PATCH] ima_fs: Avoid creating measurement lists for unsupported hash algos
Roberto Sassu
Re: [PATCH] ima_fs: Avoid creating measurement lists for unsupported hash algos
Dmitry Safonov
[PATCH v9 00/11] Streamline TPM2 HMAC sessions
Jarkko Sakkinen
[PATCH v9 01/11] KEYS: trusted: Use get_random-fallback for TPM
Jarkko Sakkinen
Re: [PATCH v9 01/11] KEYS: trusted: Use get_random-fallback for TPM
Roberto Sassu
Re: [PATCH v9 01/11] KEYS: trusted: Use get_random-fallback for TPM
Jarkko Sakkinen
Re: [PATCH v9 01/11] KEYS: trusted: Use get_random-fallback for TPM
Mimi Zohar
Re: [PATCH v9 01/11] KEYS: trusted: Use get_random-fallback for TPM
Chris Fenner
[PATCH v9 02/11] KEYS: trusted: Use get_random_bytes_wait() instead of tpm_get_random()
Jarkko Sakkinen
[PATCH v9 03/11] tpm: Change tpm_get_random() opportunistic
Jarkko Sakkinen
[PATCH v9 04/11] tpm2-sessions: Define TPM2_NAME_MAX_SIZE
Jarkko Sakkinen
[PATCH v9 05/11] KEYS: trusted: Open code tpm2_buf_append()
Jarkko Sakkinen
[PATCH v9 06/11] KEYS: trusted: Remove dead branch from tpm2_unseal_cmd
Jarkko Sakkinen
[PATCH v9 07/11] KEYS: trusted: Re-orchestrate tpm2_read_public() calls
Jarkko Sakkinen
[PATCH v9 08/11] tpm2-sessions: Remove the support for more than one authorization
Jarkko Sakkinen
[PATCH v9 09/11] tpm-buf: Remove tpm_buf_append_handle
Jarkko Sakkinen
[PATCH v9 10/11] tpm-buf: Merge TPM_BUF_BOUNDARY_ERROR and TPM_BUF_OVERFLOW
Jarkko Sakkinen
[PATCH v9 11/11] tpm-buf: Implement managed allocations
Jarkko Sakkinen
Re: [PATCH v9 11/11] tpm-buf: Implement managed allocations
Jarkko Sakkinen
[GIT PULL] KEYS: trusted: keys-trusted-next-6.19-rc7
Jarkko Sakkinen
Re: [GIT PULL] KEYS: trusted: keys-trusted-next-6.19-rc7
pr-tracker-bot
[PATCH 0/2] move TPM-specific fields into trusted_tpm_options
Srish Srinivasan
[PATCH 1/2] keys/trusted_keys: fix handle passed to tpm_buf_append_name during unseal
Srish Srinivasan
Re: [PATCH 1/2] keys/trusted_keys: fix handle passed to tpm_buf_append_name during unseal
Jarkko Sakkinen
[PATCH 2/2] keys/trusted_keys: move TPM-specific fields into trusted_tpm_options
Srish Srinivasan
Re: [PATCH 2/2] keys/trusted_keys: move TPM-specific fields into trusted_tpm_options
Jarkko Sakkinen
Re: [PATCH 2/2] keys/trusted_keys: move TPM-specific fields into trusted_tpm_options
Srish Srinivasan
[PATCH 09/21] char: tpm: cr50: Remove IRQF_ONESHOT
Sebastian Andrzej Siewior
Re: [PATCH 09/21] char: tpm: cr50: Remove IRQF_ONESHOT
Jarkko Sakkinen
Re: [PATCH 09/21] char: tpm: cr50: Remove IRQF_ONESHOT
Sebastian Andrzej Siewior
Re: [PATCH 09/21] char: tpm: cr50: Remove IRQF_ONESHOT
Jarkko Sakkinen
[PATCH v3] ima: Fallback to ctime check for FS without kstat.change_cookie
Frederick Lawler
Re: [PATCH v3] ima: Fallback to ctime check for FS without kstat.change_cookie
Jeff Layton
[PATCH] evm: Use ordered xattrs list to calculate HMAC in evm_init_hmac()
Roberto Sassu
Re: [PATCH] evm: Use ordered xattrs list to calculate HMAC in evm_init_hmac()
Mimi Zohar
[PATCH] ima_setup.sh: Fix check of signed policy requirement
Petr Vorel
Re: [PATCH] ima_setup.sh: Fix check of signed policy requirement
Petr Vorel
Re: [PATCH] ima_setup.sh: Fix check of signed policy requirement
Mimi Zohar
Re: [PATCH] ima_setup.sh: Fix check of signed policy requirement
Petr Vorel
[PATCH] efi: Mark UEFI skip cert quirks list as __initconst
Thomas Weißschuh
[PATCH v2] ima: Fallback to ctime check for FS without kstat.change_cookie
Frederick Lawler
Re: [PATCH v2] ima: Fallback to ctime check for FS without kstat.change_cookie
Jeff Layton
Re: [PATCH v2] ima: Fallback to ctime check for FS without kstat.change_cookie
Frederick Lawler
Re: [PATCH v2] ima: Fallback to ctime check for FS without kstat.change_cookie
Jeff Layton
Re: [PATCH v2] ima: Fallback to ctime check for FS without kstat.change_cookie
Roberto Sassu
[PATCH v4 0/6] Extend "trusted" keys to support a new trust source named the PowerVM Key Wrapping Module (PKWM)
Srish Srinivasan
[PATCH v4 3/6] pseries/plpks: expose PowerVM wrapping features via the sysfs
Srish Srinivasan
Re: [PATCH v4 3/6] pseries/plpks: expose PowerVM wrapping features via the sysfs
Nayna Jain
[PATCH v4 6/6] docs: trusted-encryped: add PKWM as a new trust source
Srish Srinivasan
[PATCH v4 5/6] keys/trusted_keys: establish PKWM as a trusted source
Srish Srinivasan
Re: [PATCH v4 5/6] keys/trusted_keys: establish PKWM as a trusted source
Nayna Jain
Re: [PATCH v4 5/6] keys/trusted_keys: establish PKWM as a trusted source
Jarkko Sakkinen
Earlier messages
Later messages