- integrity-ima-identifiers.patch removed from -mm tree

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



The patch titled
     integrity: ima identifiers
has been removed from the -mm tree.  Its filename was
     integrity-ima-identifiers.patch

This patch was dropped because this work seems to be stalled

------------------------------------------------------
Subject: integrity: ima identifiers
From: Mimi Zohar <zohar@xxxxxxxxxxxxxxxxxx>

This patch corrects the naming of global and other identifiers.

Signed-off-by: Mimi Zohar <zohar@xxxxxxxxxx>
Signed-off-by: Kylene Hall <kjhall@xxxxxxxxxx>
Signed-off-by: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
---

 security/evm/ima/ima.h       |   24 ++++++++++++------------
 security/evm/ima/ima_fs.c    |   18 +++++++++---------
 security/evm/ima/ima_init.c  |   10 +++++-----
 security/evm/ima/ima_main.c  |    8 ++++----
 security/evm/ima/ima_queue.c |   24 ++++++++++++------------
 5 files changed, 42 insertions(+), 42 deletions(-)

diff -puN security/evm/ima/ima.h~integrity-ima-identifiers security/evm/ima/ima.h
--- a/security/evm/ima/ima.h~integrity-ima-identifiers
+++ a/security/evm/ima/ima.h
@@ -34,26 +34,26 @@
 
 /* digest size for IMA, fits SHA1 or MD5 */
 #define IMA_DIGEST_SIZE		20
-#define TCG_EVENT_NAME_LEN_MAX	255
+#define IMA_EVENT_NAME_LEN_MAX	255
 
 #define IMA_HASH_BITS 9
-#define MEASURE_HTABLE_SIZE (1 << IMA_HASH_BITS)
-#define HASH_KEY(digest) (hash_long( \
+#define IMA_MEASURE_HTABLE_SIZE (1 << IMA_HASH_BITS)
+#define IMA_HASH_KEY(digest) (hash_long( \
 	(unsigned long)(*digest), IMA_HASH_BITS));
 
 /* set during initialization */
 extern int ima_used_chip;
 
-struct measure_entry {
+struct ima_measure_entry {
 	u32 measure_flags;
 	u8 digest[IMA_DIGEST_SIZE];	/* sha1 or md5 measurement hash */
-	char file_name[TCG_EVENT_NAME_LEN_MAX + 1];	/* name + \0 */
+	char file_name[IMA_EVENT_NAME_LEN_MAX + 1];	/* name + \0 */
 };
 
-struct queue_entry {
+struct ima_queue_entry {
 	struct hlist_node hnext;	/* place in hash collision list */
 	struct list_head later;	/* place in ima_measurements list */
-	struct measure_entry *entry;
+	struct ima_measure_entry *entry;
 };
 
 extern struct list_head ima_measurements;	/* list of all measurements */
@@ -61,10 +61,10 @@ extern struct list_head ima_measurements
 /* declarations */
 int ima_fs_init(void);
 void ima_fs_cleanup(void);
-void create_htable(void);
+void ima_create_htable(void);
 void ima_invalidate_pcr(char *);
-int ima_add_measure_entry(struct measure_entry *entry);
-struct queue_entry *ima_lookup_digest_entry(u8 * digest);
+int ima_add_measure_entry(struct ima_measure_entry *entry);
+struct ima_queue_entry *ima_lookup_digest_entry(u8 * digest);
 
 /*
  * used to protect h_table and sha_table
@@ -75,8 +75,8 @@ struct ima_h_table {
 	atomic_t len;	/* number of stored measurements in the list */
 	atomic_t violations;
 	unsigned int max_htable_size;
-	struct hlist_head queue[MEASURE_HTABLE_SIZE];
-	atomic_t queue_len[MEASURE_HTABLE_SIZE];
+	struct hlist_head queue[IMA_MEASURE_HTABLE_SIZE];
+	atomic_t queue_len[IMA_MEASURE_HTABLE_SIZE];
 };
 extern struct ima_h_table ima_htable;
 
diff -puN security/evm/ima/ima_fs.c~integrity-ima-identifiers security/evm/ima/ima_fs.c
--- a/security/evm/ima/ima_fs.c~integrity-ima-identifiers
+++ a/security/evm/ima/ima_fs.c
@@ -105,15 +105,15 @@ static int ima_measurements_show(struct 
 {
 	/* the list never shrinks, so we don't need a lock here */
 	struct list_head *lpos = v;
-	struct queue_entry *qe;
-	struct measure_entry *e;
+	struct ima_queue_entry *qe;
+	struct ima_measure_entry *e;
 	int filename_len;
 	int i;
 	u32 pcr = CONFIG_IMA_MEASURE_PCR_IDX;
 	char data[4];
 
 	/* get entry */
-	qe = list_entry(lpos, struct queue_entry, later);
+	qe = list_entry(lpos, struct ima_queue_entry, later);
 	e = qe->entry;
 	if (e == NULL)
 		return -1;
@@ -138,8 +138,8 @@ static int ima_measurements_show(struct 
 
 	/* 4th: eventDataSize */
 	filename_len = strlen(e->file_name);
-	if (filename_len > TCG_EVENT_NAME_LEN_MAX)
-		filename_len = TCG_EVENT_NAME_LEN_MAX;
+	if (filename_len > IMA_EVENT_NAME_LEN_MAX)
+		filename_len = IMA_EVENT_NAME_LEN_MAX;
 
 	memcpy(data, &filename_len, 4);
 	for (i = 0; i < 4; i++)
@@ -177,12 +177,12 @@ static int ima_ascii_measurements_show(s
 {
 	/* the list never shrinks, so we don't need a lock here */
 	struct list_head *lpos = v;
-	struct queue_entry *qe;
-	struct measure_entry *e;
+	struct ima_queue_entry *qe;
+	struct ima_measure_entry *e;
 	int i;
 
 	/* get entry */
-	qe = list_entry(lpos, struct queue_entry, later);
+	qe = list_entry(lpos, struct ima_queue_entry, later);
 	e = qe->entry;
 	if (e == NULL)
 		return -1;
@@ -269,7 +269,7 @@ out:
 	return -1;
 }
 
-void ima_fs_cleanup(void)
+void __exit ima_fs_cleanup(void)
 {
 	securityfs_remove(violations);
 	securityfs_remove(runtime_measurements_count);
diff -puN security/evm/ima/ima_init.c~integrity-ima-identifiers security/evm/ima/ima_init.c
--- a/security/evm/ima/ima_init.c~integrity-ima-identifiers
+++ a/security/evm/ima/ima_init.c
@@ -28,18 +28,18 @@ int ima_used_chip;
 static void ima_add_boot_aggregate(void)
 {
 	/* cumulative sha1 over tpm registers 0-7 */
-	struct measure_entry *entry;
+	struct ima_measure_entry *entry;
 	size_t count;
 	int err;
 
 	/* create new entry for boot aggregate */
-	entry = kzalloc(sizeof(struct measure_entry), GFP_ATOMIC);
+	entry = kzalloc(sizeof(struct ima_measure_entry), GFP_ATOMIC);
 	if (entry == NULL) {
 		ima_invalidate_pcr("error allocating new measurement entry");
 		return;
 	}
-	if ((count = strlen(boot_aggregate_name)) > TCG_EVENT_NAME_LEN_MAX)
-		count = TCG_EVENT_NAME_LEN_MAX;
+	if ((count = strlen(boot_aggregate_name)) > IMA_EVENT_NAME_LEN_MAX)
+		count = IMA_EVENT_NAME_LEN_MAX;
 	memcpy(entry->file_name, boot_aggregate_name, count);
 	entry->file_name[count] = '\0';
 	if (ima_used_chip) {
@@ -103,7 +103,7 @@ int ima_init(void)
 		ima_info("No TPM chip found(rc = %d), activating TPM-bypass!\n",
 			rc);
 
-	create_htable();	/* for measurements */
+	ima_create_htable();	/* for measurements */
 
 	/* boot aggregate must be very first entry */
 	ima_add_boot_aggregate();
diff -puN security/evm/ima/ima_main.c~integrity-ima-identifiers security/evm/ima/ima_main.c
--- a/security/evm/ima/ima_main.c~integrity-ima-identifiers
+++ a/security/evm/ima/ima_main.c
@@ -41,7 +41,7 @@
  */
 void ima_measure(const unsigned char *name, int hash_len, char *hash)
 {
-	struct measure_entry *entry;
+	struct ima_measure_entry *entry;
 	u8 digest[IMA_DIGEST_SIZE];
 	int err = 0, count;
 
@@ -64,15 +64,15 @@ void ima_measure(const unsigned char *na
 		return;
 
 	/* create new entry and add to measurement list */
-	entry = kzalloc(sizeof(struct measure_entry), GFP_ATOMIC);
+	entry = kzalloc(sizeof(struct ima_measure_entry), GFP_ATOMIC);
 	if (!entry) {
 		ima_error("Error allocating new measurement entry");
 		return;		/* invalidate pcr */
 	}
 
 	entry->measure_flags = 0;
-	if ((count = strlen(name)) > TCG_EVENT_NAME_LEN_MAX)
-		count = TCG_EVENT_NAME_LEN_MAX;
+	if ((count = strlen(name)) > IMA_EVENT_NAME_LEN_MAX)
+		count = IMA_EVENT_NAME_LEN_MAX;
 
 	memcpy(entry->file_name, name, count);
 	entry->file_name[count] = '\0';
diff -puN security/evm/ima/ima_queue.c~integrity-ima-identifiers security/evm/ima/ima_queue.c
--- a/security/evm/ima/ima_queue.c~integrity-ima-identifiers
+++ a/security/evm/ima/ima_queue.c
@@ -34,14 +34,14 @@ DEFINE_SPINLOCK(ima_queue_lock);
  */
 static DEFINE_MUTEX(ima_extend_list_mutex);
 
-void create_htable(void)
+void ima_create_htable(void)
 {
 	int i;
 
 	INIT_LIST_HEAD(&ima_measurements);
 	atomic_set(&ima_htable.len, 0);
 	atomic_set(&ima_htable.violations, 0);
-	ima_htable.max_htable_size = MEASURE_HTABLE_SIZE;
+	ima_htable.max_htable_size = IMA_MEASURE_HTABLE_SIZE;
 
 	for (i = 0; i < ima_htable.max_htable_size; i++) {
 		INIT_HLIST_HEAD(&ima_htable.queue[i]);
@@ -51,13 +51,13 @@ void create_htable(void)
 	mutex_init(&ima_extend_list_mutex);
 }
 
-struct queue_entry *ima_lookup_digest_entry(u8 * digest_value)
+struct ima_queue_entry *ima_lookup_digest_entry(u8 * digest_value)
 {
-	struct queue_entry *qe, *ret = NULL;
+	struct ima_queue_entry *qe, *ret = NULL;
 	unsigned int key;
 	struct hlist_node *pos;
 
-	key = HASH_KEY(digest_value);
+	key = IMA_HASH_KEY(digest_value);
 	rcu_read_lock();
 	hlist_for_each_entry_rcu(qe, pos, &ima_htable.queue[key], hnext) {
 		if (memcmp(qe->entry->digest, digest_value, 20) == 0) {
@@ -70,13 +70,13 @@ struct queue_entry *ima_lookup_digest_en
 }
 
 /* Called with ima_queue_lock held */
-static int ima_add_digest_entry(struct measure_entry *entry)
+static int ima_add_digest_entry(struct ima_measure_entry *entry)
 {
-	struct queue_entry *qe;
+	struct ima_queue_entry *qe;
 	unsigned int key;
 
-	key = HASH_KEY(entry->digest);
-	qe = kmalloc(sizeof(struct queue_entry), GFP_ATOMIC);
+	key = IMA_HASH_KEY(entry->digest);
+	qe = kmalloc(sizeof(struct ima_queue_entry), GFP_ATOMIC);
 	if (qe == NULL) {
 		ima_error("OUT OF MEMORY ERROR creating queue entry.\n");
 		return -ENOMEM;
@@ -88,9 +88,9 @@ static int ima_add_digest_entry(struct m
 	return 0;
 }
 
-int ima_add_measure_entry(struct measure_entry *entry)
+int ima_add_measure_entry(struct ima_measure_entry *entry)
 {
-	struct queue_entry *qe;
+	struct ima_queue_entry *qe;
 	int error = 0;
 
 	mutex_lock(&ima_extend_list_mutex);
@@ -100,7 +100,7 @@ int ima_add_measure_entry(struct measure
 		spin_unlock(&ima_queue_lock);
 		goto out;
 	}
-	qe = kmalloc(sizeof(struct queue_entry), GFP_ATOMIC);
+	qe = kmalloc(sizeof(struct ima_queue_entry), GFP_ATOMIC);
 	if (qe == NULL) {
 		ima_error("OUT OF MEMORY in %s.\n", __func__);
 		error = -ENOMEM;
_

Patches currently in -mm which might be from zohar@xxxxxxxxxxxxxxxxxx are

integrity-ima-identifiers.patch
integrity-ima-cleanup.patch
integrity-tpm-internal-kernel-interface.patch
ibac-patch.patch

-
To unsubscribe from this list: send the line "unsubscribe mm-commits" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Kernel Newbies FAQ]     [Kernel Archive]     [IETF Annouce]     [DCCP]     [Netdev]     [Networking]     [Security]     [Bugtraq]     [Photo]     [Yosemite]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux SCSI]

  Powered by Linux