[GIT PULL] IMA patches for 4.13

Mimi Zohar zohar at linux.vnet.ibm.com
Wed Jun 21 20:02:13 UTC 2017


Hi James,

This pull request contains a number of simple and not so simple clean
up patches, which are precursors to new features (eg. appended
signature support, TPM crypto agile templates), and other minor bug
fixes.

thanks,

Mimi

----
The following changes since commit cdac74ddf28e2f07319cc89446f9dea35d22d999:

  Merge branch 'smack-for-4.13' of git://github.com/cschaufler/smack-next into next (2017-06-21 11:30:20 +1000)

are available in the git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/zohar/linux-integrity.git next

for you to fetch changes up to fc26bd50539b6f52aa75ffbaec7b083825ec5451:

  IMA: update IMA policy documentation to include pcr= option (2017-06-21 14:37:12 -0400)

----------------------------------------------------------------
Ben Hutchings (1):
      IMA: Correct Kconfig dependencies for hash selection

Eric Richter (1):
      IMA: update IMA policy documentation to include pcr= option

Geliang Tang (1):
      ima: use memdup_user_nul

Laura Abbott (1):
      ima: Add cgroups2 to the defaults list

Mimi Zohar (4):
      ima: extend the "ima_policy" boot command line to support multiple policies
      ima: define a set of appraisal rules requiring file signatures
      ima: define Kconfig IMA_APPRAISE_BOOTPARAM option
      ima: define is_ima_appraise_enabled()

Roberto Sassu (4):
      ima: introduce ima_parse_buf()
      ima: use ima_parse_buf() to parse measurements headers
      ima: use ima_parse_buf() to parse template data
      ima: fix get_binary_runtime_size()

Thiago Jung Bauermann (3):
      integrity: Small code improvements
      ima: Simplify policy_func_show.
      ima: Log the same audit cause whenever a file has no signature

Tycho Andersen (1):
      ima: fix up #endif comments

 Documentation/ABI/testing/ima_policy            |   8 +-
 Documentation/admin-guide/kernel-parameters.txt |  21 ++--
 include/linux/ima.h                             |   6 ++
 security/integrity/digsig_asymmetric.c          |   4 +-
 security/integrity/iint.c                       |   2 +-
 security/integrity/ima/Kconfig                  |  16 ++-
 security/integrity/ima/ima.h                    |  31 +++---
 security/integrity/ima/ima_appraise.c           |  16 ++-
 security/integrity/ima/ima_fs.c                 |  13 +--
 security/integrity/ima/ima_policy.c             | 106 +++++++++-----------
 security/integrity/ima/ima_queue.c              |   2 +-
 security/integrity/ima/ima_template.c           | 124 ++++++++----------------
 security/integrity/ima/ima_template_lib.c       |  61 ++++++++++++
 security/integrity/ima/ima_template_lib.h       |   6 ++
 security/integrity/integrity.h                  |   7 +-
 15 files changed, 239 insertions(+), 184 deletions(-)

--
To unsubscribe from this list: send the line "unsubscribe linux-security-module" in
the body of a message to majordomo at vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html



More information about the Linux-security-module-archive mailing list