<feed xmlns='http://www.w3.org/2005/Atom'>
<title>kernel/linux.git/Documentation/admin-guide/LSM/LoadPin.rst, branch v6.6.132</title>
<subtitle>Linux kernel stable tree (mirror)</subtitle>
<id>https://git.radix-linux.su/kernel/linux.git/atom?h=v6.6.132</id>
<link rel='self' href='https://git.radix-linux.su/kernel/linux.git/atom?h=v6.6.132'/>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/'/>
<updated>2021-03-15T19:32:32+00:00</updated>
<entry>
<title>security/loadpin: Update the changing interface in the source code.</title>
<updated>2021-03-15T19:32:32+00:00</updated>
<author>
<name>Jiele zhao</name>
<email>unclexiaole@gmail.com</email>
</author>
<published>2021-03-08T02:03:58+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=0860b72d535f869e26252df66d4f634e1655f84a'/>
<id>urn:sha1:0860b72d535f869e26252df66d4f634e1655f84a</id>
<content type='text'>
Loadpin cmdline interface "enabled" has been renamed to "enforce"
for a long time, but the User Description Document was not updated.
(Meaning unchanged)

And kernel_read_file* were moved from linux/fs.h to its own
linux/kernel_read_file.h include file. So update that change here.

Signed-off-by: Jiele zhao &lt;unclexiaole@gmail.com&gt;
Link: https://lore.kernel.org/r/20210308020358.102836-1-unclexiaole@gmail.com
Signed-off-by: Jonathan Corbet &lt;corbet@lwn.net&gt;
</content>
</entry>
<entry>
<title>security/loadpin: Allow to exclude specific file types</title>
<updated>2019-05-31T20:57:40+00:00</updated>
<author>
<name>Ke Wu</name>
<email>mikewu@google.com</email>
</author>
<published>2019-05-30T19:22:08+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=0ff9848067b7b950a4ed70de7f5028600a2157e3'/>
<id>urn:sha1:0ff9848067b7b950a4ed70de7f5028600a2157e3</id>
<content type='text'>
Linux kernel already provide MODULE_SIG and KEXEC_VERIFY_SIG to
make sure loaded kernel module and kernel image are trusted. This
patch adds a kernel command line option "loadpin.exclude" which
allows to exclude specific file types from LoadPin. This is useful
when people want to use different mechanisms to verify module and
kernel image while still use LoadPin to protect the integrity of
other files kernel loads.

Signed-off-by: Ke Wu &lt;mikewu@google.com&gt;
Reviewed-by: James Morris &lt;jamorris@linux.microsoft.com&gt;
[kees: fix array size issue reported by Coverity via Colin Ian King]
Signed-off-by: Kees Cook &lt;keescook@chromium.org&gt;
</content>
</entry>
<entry>
<title>doc: ReSTify LoadPin.txt</title>
<updated>2017-05-18T16:33:12+00:00</updated>
<author>
<name>Kees Cook</name>
<email>keescook@chromium.org</email>
</author>
<published>2017-05-13T11:51:48+00:00</published>
<link rel='alternate' type='text/html' href='https://git.radix-linux.su/kernel/linux.git/commit/?id=30da4f77aae99bf9ae5905d0ef89668391eea315'/>
<id>urn:sha1:30da4f77aae99bf9ae5905d0ef89668391eea315</id>
<content type='text'>
Adjusts for ReST markup and moves under LSM admin guide.

Signed-off-by: Kees Cook &lt;keescook@chromium.org&gt;
Signed-off-by: Jonathan Corbet &lt;corbet@lwn.net&gt;
</content>
</entry>
</feed>
