mbox series

[GIT,PULL] integrity subsystem updates for v5.15

Message ID 5b3eedc2dcd03a8d16a8fbed3f4c2466521e1bdb.camel@linux.ibm.com (mailing list archive)
State New, archived
Headers show
Series [GIT,PULL] integrity subsystem updates for v5.15 | expand

Pull-request

git://git.kernel.org/pub/scm/linux/kernel/git/zohar/linux-integrity.git tags/integrity-v5.15

Message

Mimi Zohar Aug. 31, 2021, 10:58 p.m. UTC
Hi Linus,
  
The Integrity pull request for v5.15 contains only IMA changes:

- Limit the allowed hash algorithms when writing security.ima xattrs or
verifying them, based on the IMA policy and the configured hash
algorithms.

- Return the calculated "critical data" measurement hash and size to
avoid code duplication.  (Preparatory change for a proposed LSM.)

[Stephen Rothwell addressed a merge conflict between the new device
mapper "critical data" measurements (drivers/md/dm-ima.c) and extending
the "critical data" measurement function.]

- and a single patch to address a compiler warning.

thanks,

Mimi

The following changes since commit 2734d6c1b1a089fb593ef6a23d4b70903526fe0c:

  Linux 5.14-rc2 (2021-07-18 14:13:49 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/zohar/linux-integrity.git tags/integrity-v5.15

for you to fetch changes up to cb181da161963eddc9de0000de6ab2c7942be219:

  IMA: reject unknown hash algorithms in ima_get_hash_algo (2021-08-23 18:22:00 -0400)

----------------------------------------------------------------
integrity-v5.15

----------------------------------------------------------------
Austin Kim (1):
      IMA: remove -Wmissing-prototypes warning

Mimi Zohar (2):
      Merge branch 'ima-buffer-measurement-changes-v4' into next-integrity
      Merge branch 'restrict-digest-alg-v8' into next-integrity

Roberto Sassu (3):
      ima: Introduce ima_get_current_hash_algo()
      ima: Return int in the functions to measure a buffer
      ima: Add digest and digest_len params to the functions to measure a buffer

THOBY Simon (7):
      IMA: remove the dependency on CRYPTO_MD5
      IMA: block writes of the security.ima xattr with unsupported algorithms
      IMA: add support to restrict the hash algorithms used for file appraisal
      IMA: add a policy option to restrict xattr hash algorithms on appraisal
      IMA: introduce a new policy option func=SETXATTR_CHECK
      IMA: prevent SETXATTR_CHECK policy rules with unavailable algorithms
      IMA: reject unknown hash algorithms in ima_get_hash_algo

 Documentation/ABI/testing/ima_policy         |  15 ++-
 include/linux/ima.h                          |  23 +++-
 security/integrity/ima/Kconfig               |   1 -
 security/integrity/ima/ima.h                 |  24 ++--
 security/integrity/ima/ima_api.c             |   6 +-
 security/integrity/ima/ima_appraise.c        |  78 ++++++++++--
 security/integrity/ima/ima_asymmetric_keys.c |   2 +-
 security/integrity/ima/ima_init.c            |   3 +-
 security/integrity/ima/ima_main.c            |  89 ++++++++++----
 security/integrity/ima/ima_mok.c             |   2 +-
 security/integrity/ima/ima_policy.c          | 174 ++++++++++++++++++++++++---
 security/integrity/ima/ima_queue_keys.c      |   2 +-
 security/selinux/ima.c                       |   6 +-
 13 files changed, 350 insertions(+), 75 deletions(-)

Comments

pr-tracker-bot@kernel.org Sept. 2, 2021, 8:05 p.m. UTC | #1
The pull request you sent on Tue, 31 Aug 2021 18:58:26 -0400:

> git://git.kernel.org/pub/scm/linux/kernel/git/zohar/linux-integrity.git tags/integrity-v5.15

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/aef4892a63c248c31718d23941536b86829a49f0

Thank you!