<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="/rss.xsl.xml"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
    <title>Changes in ipe</title>
    <description></description>
    <language>en</language>
    <copyright>Copyright 2015</copyright>
    <generator>Java</generator><item>
        <title>6df401a2 - ipe: policy_fs: fix kernel-doc warnings</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/security/ipe/#6df401a2</link>
        <description>ipe: policy_fs: fix kernel-doc warningsUse the &quot;struct&quot; keyword in kernel-doc when describing structipefs_file. Add kernel-doc for the struct members also.Don&apos;t use kernel-doc notation for &apos;policy_subdir&apos;. kernel-doc doesnot support documentation comments for data definitions.This eliminates multiple kernel-doc warnings:security/ipe/policy_fs.c:21: warning: cannot understand function prototype: &apos;struct ipefs_file &apos;security/ipe/policy_fs.c:407: warning: cannot understand function prototype: &apos;const struct ipefs_file policy_subdir[] = &apos;Signed-off-by: Randy Dunlap &lt;rdunlap@infradead.org&gt;Cc: Fan Wu &lt;wufan@kernel.org&gt;Cc: Paul Moore &lt;paul@paul-moore.com&gt;Cc: James Morris &lt;jmorris@namei.org&gt;Cc: Serge E. Hallyn &lt;serge@hallyn.com&gt;Cc: linux-security-module@vger.kernel.orgSigned-off-by: Fan Wu &lt;wufan@kernel.org&gt;

            List of files:
            /linux-6.15/security/ipe/policy_fs.c</description>
        <pubDate>Sat, 11 Jan 2025 06:00:00 +0000</pubDate>
        <dc:creator>Randy Dunlap &lt;rdunlap@infradead.org&gt;</dc:creator>
    </item>
<item>
        <title>ba199dc9 - scripts: add boot policy generation program</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/security/ipe/#ba199dc9</link>
        <description>scripts: add boot policy generation programEnables an IPE policy to be enforced from kernel start, enabling accesscontrol based on trust from kernel startup. This is accomplished bytransforming an IPE policy indicated by CONFIG_IPE_BOOT_POLICY into ac-string literal that is parsed at kernel startup as an unsigned policy.Signed-off-by: Deven Bowers &lt;deven.desai@linux.microsoft.com&gt;Signed-off-by: Fan Wu &lt;wufan@linux.microsoft.com&gt;Signed-off-by: Paul Moore &lt;paul@paul-moore.com&gt;

            List of files:
            /linux-6.15/security/ipe/fs.c</description>
        <pubDate>Sat, 03 Aug 2024 06:00:00 +0000</pubDate>
        <dc:creator>Deven Bowers &lt;deven.desai@linux.microsoft.com&gt;</dc:creator>
    </item>
<item>
        <title>31f8c868 - ipe: enable support for fs-verity as a trust provider</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/security/ipe/#31f8c868</link>
        <description>ipe: enable support for fs-verity as a trust providerEnable IPE policy authors to indicate trust for a singular fsverityfile, identified by the digest information, through &quot;fsverity_digest&quot;and all files using valid fsverity builtin signatures via&quot;fsverity_signature&quot;.This enables file-level integrity claims to be expressed in IPE,allowing individual files to be authorized, giving some flexibilityfor policy authors. Such file-level claims are important to be expressedfor enforcing the integrity of packages, as well as address some of thescalability issues in a sole dm-verity based solution (# of loop backdevices, etc).This solution cannot be done in userspace as the minimum threat thatIPE should mitigate is an attacker downloads malicious payload withall required dependencies. These dependencies can lack the userspacecheck, bypassing the protection entirely. A similar attack succeeds ifthe userspace component is replaced with a version that does notperform the check. As a result, this can only be done in the commonentry point - the kernel.Signed-off-by: Deven Bowers &lt;deven.desai@linux.microsoft.com&gt;Signed-off-by: Fan Wu &lt;wufan@linux.microsoft.com&gt;Signed-off-by: Paul Moore &lt;paul@paul-moore.com&gt;

            List of files:
            /linux-6.15/security/ipe/audit.c</description>
        <pubDate>Sat, 03 Aug 2024 06:00:00 +0000</pubDate>
        <dc:creator>Fan Wu &lt;wufan@linux.microsoft.com&gt;</dc:creator>
    </item>
<item>
        <title>f40998a8 - ipe: fallback to platform keyring also if key in trusted keyring is rejected</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/security/ipe/#f40998a8</link>
        <description>ipe: fallback to platform keyring also if key in trusted keyring is rejectedIf enabled, we fallback to the platform keyring if the trusted keyringdoesn&apos;t have the key used to sign the ipe policy. But if pkcs7_verify()rejects the key for other reasons, such as usage restrictions, we do notfallback. Do so, following the same change in dm-verity.Signed-off-by: Luca Boccassi &lt;bluca@debian.org&gt;Suggested-by: Serge Hallyn &lt;serge@hallyn.com&gt;[FW: fixed some line length issues and a typo in the commit message]Signed-off-by: Fan Wu &lt;wufan@kernel.org&gt;

            List of files:
            /linux-6.15/security/ipe/policy.c</description>
        <pubDate>Fri, 27 Sep 2024 08:00:00 +0000</pubDate>
        <dc:creator>Luca Boccassi &lt;bluca@debian.org&gt;</dc:creator>
    </item>
</channel>
</rss>
