1
0
Fork 0
alistair23-linux/security/integrity/evm
Matthew Garrett e2861fa716 evm: Don't deadlock if a crypto algorithm is unavailable
When EVM attempts to appraise a file signed with a crypto algorithm the
kernel doesn't have support for, it will cause the kernel to trigger a
module load. If the EVM policy includes appraisal of kernel modules this
will in turn call back into EVM - since EVM is holding a lock until the
crypto initialisation is complete, this triggers a deadlock. Add a
CRYPTO_NOLOAD flag and skip module loading if it's set, and add that flag
in the EVM case in order to fail gracefully with an error message
instead of deadlocking.

Signed-off-by: Matthew Garrett <mjg59@google.com>
Acked-by: Herbert Xu <herbert@gondor.apana.org.au>
Signed-off-by: Mimi Zohar <zohar@linux.vnet.ibm.com>
2018-07-18 07:27:22 -04:00
..
Kconfig EVM: Allow runtime modification of the set of verified xattrs 2018-05-18 15:34:45 -04:00
Makefile evm: posix acls modify i_mode 2011-09-14 15:24:51 -04:00
evm.h EVM: turn evm_config_xattrnames into a list 2018-05-18 15:34:36 -04:00
evm_crypto.c evm: Don't deadlock if a crypto algorithm is unavailable 2018-07-18 07:27:22 -04:00
evm_main.c EVM: Allow runtime modification of the set of verified xattrs 2018-05-18 15:34:45 -04:00
evm_posix_acl.c ima: fix script messages 2013-10-25 13:17:19 -04:00
evm_secfs.c EVM: unlock on error path in evm_read_xattrs() 2018-06-01 06:03:08 -04:00