-
- Downloads
Merge branch 'next-integrity' of...
Merge branch 'next-integrity' of git://git.kernel.org/pub/scm/linux/kernel/git/zohar/linux-integrity Pull IMA updates from Mimi Zohar: "Two new features - measuring certificates and querying IMA for a file hash - and three bug fixes: - Measuring certificates is like the rest of IMA, based on policy, but requires loading a custom policy. Certificates loaded onto a keyring, for example during early boot, before a custom policy has been loaded, are queued and only processed after loading the custom policy. - IMA calculates and caches files hashes. Other kernel subsystems, and possibly kernel modules, are interested in accessing these cached file hashes. The bug fixes prevent classifying a file short read (e.g. shutdown) as an invalid file signature, add a missing blank when displaying the securityfs policy rules containing LSM labels, and, lastly, fix the handling of the IMA policy information for unknown LSM labels" * 'next-integrity' of git://git.kernel.org/pub/scm/linux/kernel/git/zohar/linux-integrity: IMA: Defined delayed workqueue to free the queued keys IMA: Call workqueue functions to measure queued keys IMA: Define workqueue for early boot key measurements IMA: pre-allocate buffer to hold keyrings string ima: ima/lsm policy rule loading logic bug fixes ima: add the ability to query the cached hash of a given file ima: Add a space after printing LSM rules for readability IMA: fix measuring asymmetric keys Kconfig IMA: Read keyrings= option from the IMA policy IMA: Add support to limit measuring keys KEYS: Call the IMA hook to measure keys IMA: Define an IMA hook to measure keys IMA: Add KEY_CHECK func to measure keys IMA: Check IMA policy flag ima: avoid appraise error for hash calc interrupt
No related branches found
No related tags found
Showing
- Documentation/ABI/testing/ima_policy 14 additions, 2 deletionsDocumentation/ABI/testing/ima_policy
- include/linux/ima.h 20 additions, 0 deletionsinclude/linux/ima.h
- security/integrity/ima/Kconfig 12 additions, 0 deletionssecurity/integrity/ima/Kconfig
- security/integrity/ima/Makefile 2 additions, 0 deletionssecurity/integrity/ima/Makefile
- security/integrity/ima/ima.h 30 additions, 3 deletionssecurity/integrity/ima/ima.h
- security/integrity/ima/ima_api.c 5 additions, 3 deletionssecurity/integrity/ima/ima_api.c
- security/integrity/ima/ima_appraise.c 2 additions, 2 deletionssecurity/integrity/ima/ima_appraise.c
- security/integrity/ima/ima_asymmetric_keys.c 66 additions, 0 deletionssecurity/integrity/ima/ima_asymmetric_keys.c
- security/integrity/ima/ima_crypto.c 3 additions, 1 deletionsecurity/integrity/ima/ima_crypto.c
- security/integrity/ima/ima_init.c 7 additions, 1 deletionsecurity/integrity/ima/ima_init.c
- security/integrity/ima/ima_main.c 57 additions, 4 deletionssecurity/integrity/ima/ima_main.c
- security/integrity/ima/ima_policy.c 141 additions, 24 deletionssecurity/integrity/ima/ima_policy.c
- security/integrity/ima/ima_queue_keys.c 171 additions, 0 deletionssecurity/integrity/ima/ima_queue_keys.c
- security/keys/key.c 10 additions, 0 deletionssecurity/keys/key.c
Loading
Please register or sign in to comment