diff options
author | James Morris <james.morris@microsoft.com> | 2019-02-14 19:55:42 +0100 |
---|---|---|
committer | James Morris <james.morris@microsoft.com> | 2019-02-14 19:55:42 +0100 |
commit | 2e884fc9759d8816630d3c30694721a39b7396e0 (patch) | |
tree | 83c213634f69eec583f1d4ca7234e78ccf367435 /arch/arm64/mm/numa.c | |
parent | LSM: fix return value check in safesetid_init_securityfs() (diff) | |
parent | evm: Use defined constant for UUID representation (diff) | |
download | linux-2e884fc9759d8816630d3c30694721a39b7396e0.tar.xz linux-2e884fc9759d8816630d3c30694721a39b7396e0.zip |
Merge branch 'next-integrity' of git://git.kernel.org/pub/scm/linux/kernel/git/zohar/linux-integrity into next-integrity
From: Mimi Zohar <zohar@linux.ibm.com>
Linux 5.0 introduced the platform keyring to allow verifying the IMA
kexec kernel image signature using the pre-boot keys. This pull
request similarly makes keys on the platform keyring accessible for
verifying the PE kernel image signature.*
Also included in this pull request is a new IMA hook that tags tmp
files, in policy, indicating the file hash needs to be calculated.
The remaining patches are cleanup.
*Upstream commit "993a110319a4 (x86/kexec: Fix a kexec_file_load()
failure)" is required for testing.
Diffstat (limited to 'arch/arm64/mm/numa.c')
0 files changed, 0 insertions, 0 deletions