[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <1548960936-7800-1-git-send-email-zohar@linux.ibm.com>
Date: Thu, 31 Jan 2019 13:55:33 -0500
From: Mimi Zohar <zohar@...ux.ibm.com>
To: linux-integrity@...r.kernel.org
Cc: linux-security-module@...r.kernel.org,
linux-kernel@...r.kernel.org, kexec@...ts.infradead.org,
David Howells <dhowells@...hat.com>,
Dave Young <dyoung@...hat.com>,
Eric Biederman <ebiederm@...ssion.com>,
Mimi Zohar <zohar@...ux.ibm.com>
Subject: [PATCH 0/3] selftest/ima: add kexec_file_load test
The kernel can be configured to verify PE signed kernel images, IMA
kernel image signatures, both types of signatures, or none. Verify
only properly signed kernel images are loaded into memory, based on
the kernel configuration and runtime policies.
Mimi Zohar (3):
selftest/ima: cleanup the kexec selftest
scripts/ima: define a set of common functions
selftests/ima: kexec_file_load syscall test
tools/testing/selftests/ima/Makefile | 2 +-
tools/testing/selftests/ima/common_lib.sh | 20 ++
.../testing/selftests/ima/test_kexec_file_load.sh | 250 +++++++++++++++++++++
tools/testing/selftests/ima/test_kexec_load.sh | 31 +--
4 files changed, 281 insertions(+), 22 deletions(-)
create mode 100755 tools/testing/selftests/ima/common_lib.sh
create mode 100755 tools/testing/selftests/ima/test_kexec_file_load.sh
--
2.7.5
Powered by blists - more mailing lists