mirror of
https://github.com/torvalds/linux
synced 2024-10-10 21:36:41 +00:00
e2861fa716
When EVM attempts to appraise a file signed with a crypto algorithm the kernel doesn't have support for, it will cause the kernel to trigger a module load. If the EVM policy includes appraisal of kernel modules this will in turn call back into EVM - since EVM is holding a lock until the crypto initialisation is complete, this triggers a deadlock. Add a CRYPTO_NOLOAD flag and skip module loading if it's set, and add that flag in the EVM case in order to fail gracefully with an error message instead of deadlocking. Signed-off-by: Matthew Garrett <mjg59@google.com> Acked-by: Herbert Xu <herbert@gondor.apana.org.au> Signed-off-by: Mimi Zohar <zohar@linux.vnet.ibm.com> |
||
---|---|---|
.. | ||
evm | ||
ima | ||
digsig.c | ||
digsig_asymmetric.c | ||
iint.c | ||
integrity.h | ||
integrity_audit.c | ||
Kconfig | ||
Makefile |