From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S965672AbbJVStr (ORCPT ); Thu, 22 Oct 2015 14:49:47 -0400 Received: from mail-wi0-f178.google.com ([209.85.212.178]:36871 "EHLO mail-wi0-f178.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S965394AbbJVStp (ORCPT ); Thu, 22 Oct 2015 14:49:45 -0400 From: Dmitry Kasatkin X-Google-Original-From: Dmitry Kasatkin To: zohar@linux.vnet.ibm.com, linux-ima-devel@lists.sourceforge.net, linux-security-module@vger.kernel.org Cc: linux-kernel@vger.kernel.org, Dmitry Kasatkin Subject: [PATCHv3 0/6] integrity: few EVM patches Date: Thu, 22 Oct 2015 21:49:24 +0300 Message-Id: X-Mailer: git-send-email 2.1.4 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, IMA module provides functionality to load x509 certificates into the trusted '.ima' keyring. This is patchset adds the same functionality to the EVM as well. Also it provides functionality to set EVM key from the kernel crypto HW driver. This is an update for the patchset which was previously sent for review few months ago. Please refer to the patch descriptions for details. BR, Dmitry Dmitry Kasatkin (6): integrity: define '.evm' as a builtin 'trusted' keyring evm: load x509 certificate from the kernel evm: enable EVM when X509 certificate is loaded evm: provide a function to set EVM key from the kernel evm: define EVM key max and min sizes evm: reset EVM status when file attributes changes include/linux/evm.h | 10 +++++++ security/integrity/Kconfig | 11 ++++++++ security/integrity/digsig.c | 14 ++++++++-- security/integrity/evm/Kconfig | 17 ++++++++++++ security/integrity/evm/evm.h | 3 +++ security/integrity/evm/evm_crypto.c | 54 ++++++++++++++++++++++++++++++------- security/integrity/evm/evm_main.c | 32 +++++++++++++++++++--- security/integrity/evm/evm_secfs.c | 12 +++------ security/integrity/iint.c | 1 + security/integrity/ima/Kconfig | 5 +++- security/integrity/ima/ima.h | 12 --------- security/integrity/ima/ima_init.c | 2 +- security/integrity/integrity.h | 13 ++++++--- 13 files changed, 146 insertions(+), 40 deletions(-) -- 2.1.4