[GIT PULL] linux-integrity patches for 4.15-security-next-testing

Mimi Zohar zohar at linux.vnet.ibm.com
Wed Nov 8 23:33:32 UTC 2017


On Thu, 2017-11-09 at 10:18 +1100, James Morris wrote:
> On Wed, 8 Nov 2017, Mimi Zohar wrote:
> 
> > Hi James,
> > 
> > These are the rebased EVM & IMA patches for the security/next-testing
> > branch.  There is a mixture of bug fixes, code cleanup, preparatory
> > code for new functionality and new functionality.
> > 
> > Commit 26ddabfe96bb "evm: enable EVM when X509 certificate is loaded"
> > enabled EVM without loading a symmetric key, but was limited to
> > defining the x509 certificate pathname at build.  Included in this set
> > of patches is the ability of enabling EVM, without loading the EVM
> > symmetric key, from userspace.  New is the ability to prevent the
> > loading of an EVM symmetric key.
> > 
> > [A version of commit 917086ff231f "vfs: fix mounting a filesystem with
> > i_version" is included here, as it was upstreamed in -rc6.]
> > 
> 
> Merged to next-testing and next-integrity in
> git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security.git

Hm, does this mean that these patches will be included in your pull
request?  Based on Linus "comments" last time, is this such a good
idea?

Mimi

--
To unsubscribe from this list: send the line "unsubscribe linux-security-module" in
the body of a message to majordomo at vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html



More information about the Linux-security-module-archive mailing list