[Dev] Integrity protection for tizen
j.kozerski at samsung.com
Tue Oct 28 14:27:23 GMT 2014
We'd like to upstream all these patches. All these changes were agreed with
Dmitry Kasatkin - IMA/EVM maintainer.
I don't know if you're subscribed to linux-security-module at vger.kernel.org? Some
patches were already accepted.
Dmitry wrote a lot of patches and it will take some time to upstream it all.
I think this is the most auctual branch with patches that Dmitry sends to the
I saw that today these patches have been sent to mainling kernel mailing list:
evm: check xattr value length and type in evm_inode_setxattr()
ima: limit file hash setting by user to fix and log modes
ima: check xattr value length and type in the ima_inode_setxattr()
I'm sure that some fixes will be needed, but I believe that all of these patches
can get into the mainline.
On 2014-10-28 14:28:14, Dominig ar Foll (Intel OTC) wrote:
> very interesting topic.
> Do you have an idea of the acceptability of these patches in an
> upstream Kernel ?
> Dominig ar Foll
> Senior Software Architect
> Open Source Technology Centre
> Intel SSG
> Le 28/10/2014 13:17, Janusz Kozerski a écrit :
> > Hi all,
> > We would like to announce that work with Integrity Measurement for
> > Tizen is done. You can find details on wiki page:
> > https://wiki.tizen.org/w/index.php?title=Security:IntegrityMeasureme
> > nt The page contains description, design, examples of use cases, and
> > links for sources.
> > In case of any question don't hesitate to ask.
> > BR,
> > Janusz Kozerski
> > _______________________________________________
> > Dev mailing list
> > Dev at lists.tizen.org
> > https://lists.tizen.org/listinfo/dev
> Dev mailing list
> Dev at lists.tizen.org
More information about the Dev