Received: by 10.223.176.5 with SMTP id f5csp3094292wra; Thu, 1 Feb 2018 10:39:36 -0800 (PST) X-Google-Smtp-Source: AH8x227/zKUF93MzcMCZ+ehaL02WuZGWKrRYT/nT34JdcmtVhvXaqi5xjHWHbpUpOyLjnrEh75Jn X-Received: by 10.99.117.87 with SMTP id f23mr154075pgn.453.1517510376496; Thu, 01 Feb 2018 10:39:36 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1517510376; cv=none; d=google.com; s=arc-20160816; b=MKdebAk2OKqFXrvqLQhWrlpIGV55RHOrqmkPX+CJTpZkuETdUEWoLXszKtyKQwQymd 6GsJ8GddhmJ7pYsF0TQuGFdH+knhYGPSp1lism8PTMoy9Ze8U301P/JeOtZV8f2pNKJD 60oqFofn0H0E5HSA5lTbeFGyuIKmeHOMGBQV8Yt86k51zQCbIRxVJZOMrXLKVyHoK5FP 8gHCN97coatL+3EWLOBujP2RCxSBP7/UlQAskzdqmRLiwjbJBucq/LBjMc/MmonqtU1s I0oaC+8qwXnoOH1+HLZ68WfjUpH3GUJHQuD/5t94dunp7jpXJNY5CxjkP9JrUIp82OOi PqMg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:content-transfer-encoding :mime-version:date:cc:to:from:subject:arc-authentication-results; bh=vm91ScUdDxN9iA89aL+y5qbK/wG1i/kbCThWeAxa7Co=; b=mVCx1D7FHZqEi+KFCY8VZWFkG75QY0GHFsR0SSHJdRs/DCf4SJhzP9nFZGXLCyHYJ2 haxQuzDWCrhMdbI1gwJsbJSjVwHf/nZvqN2a1HyLrtnGgtMBNkueDdR5aINrhdc4Gr6z UyQQQOQS8l6c6CR1qz+lz6Qa66VTj7v4jnZvzR1trazbxfQJmSaUnFC2wVK1ZtK10qR8 XrCWqcD24CESMvsSlFhdmr+8MawpgjOvolbwgCwn7jzVzjVb5x5Da8jo3jQuGBYoq/Yn QKEVdb1cXfl0A2c2MsRWwQjwSfefm4mSgIvI63fX2G6QnqXTxKkj9br6ZiP0FKkaBUf3 zEBg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i9si158231pfd.147.2018.02.01.10.39.21; Thu, 01 Feb 2018 10:39:36 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753012AbeBASiP (ORCPT + 99 others); Thu, 1 Feb 2018 13:38:15 -0500 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:39348 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752695AbeBASiK (ORCPT ); Thu, 1 Feb 2018 13:38:10 -0500 Received: from pps.filterd (m0098394.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w11IYxuN143226 for ; Thu, 1 Feb 2018 13:38:10 -0500 Received: from e06smtp15.uk.ibm.com (e06smtp15.uk.ibm.com [195.75.94.111]) by mx0a-001b2d01.pphosted.com with ESMTP id 2fv85qggft-1 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=NOT) for ; Thu, 01 Feb 2018 13:38:10 -0500 Received: from localhost by e06smtp15.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Thu, 1 Feb 2018 18:38:07 -0000 Received: from b06cxnps4075.portsmouth.uk.ibm.com (9.149.109.197) by e06smtp15.uk.ibm.com (192.168.101.145) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; Thu, 1 Feb 2018 18:38:04 -0000 Received: from d06av22.portsmouth.uk.ibm.com (d06av22.portsmouth.uk.ibm.com [9.149.105.58]) by b06cxnps4075.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id w11Ic36f48169058; Thu, 1 Feb 2018 18:38:03 GMT Received: from d06av22.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 128D44C046; Thu, 1 Feb 2018 18:32:00 +0000 (GMT) Received: from d06av22.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 69C5F4C044; Thu, 1 Feb 2018 18:31:59 +0000 (GMT) Received: from localhost.localdomain (unknown [9.80.80.228]) by d06av22.portsmouth.uk.ibm.com (Postfix) with ESMTP; Thu, 1 Feb 2018 18:31:59 +0000 (GMT) Subject: [GIT PULL] IMA bug fixes for 4.16 From: Mimi Zohar To: James Morris Cc: linux-security-module , linux-integrity , linux-kernel Date: Thu, 01 Feb 2018 13:38:02 -0500 Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.20.5 (3.20.5-1.fc24) Mime-Version: 1.0 Content-Transfer-Encoding: 7bit X-TM-AS-GCONF: 00 x-cbid: 18020118-0020-0000-0000-000003F1618E X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 18020118-0021-0000-0000-00004283CC0B Message-Id: <1517510282.6675.13.camel@linux.vnet.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:,, definitions=2018-02-01_05:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 impostorscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1709140000 definitions=main-1802010238 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi James, Included in this pull request are three bug fixes, assuming the 2 FUSE patches are considered bugs and not new features, and a maintainer update. I'd appreciate your sending them to Linus for 4.16. thanks, Mimi The following changes since commit 36447456e1cca853188505f2a964dbbeacfc7a7a: ima/policy: fix parsing of fsuuid (2018-01-18 16:52:49 -0500) are available in the git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/zohar/linux-integrity.git next-integrity for you to fetch changes up to d56f30ac85c067d0d3a6c4f293f655dc298cb5ce: ima: force re-appraisal on filesystems with FS_IMA_NO_CACHE (2018-02-01 12:38:31 -0500) ---------------------------------------------------------------- Alban Crequy (2): fuse: introduce new fs_type flag FS_IMA_NO_CACHE ima: force re-appraisal on filesystems with FS_IMA_NO_CACHE Mimi Zohar (2): ima: re-initialize iint->atomic_flags maintainers: update trusted keys MAINTAINERS | 1 + fs/fuse/inode.c | 2 +- include/linux/fs.h | 1 + security/integrity/iint.c | 1 + security/integrity/ima/ima_main.c | 15 +++++++++++++-- 5 files changed, 17 insertions(+), 3 deletions(-)