Received: by 10.213.65.68 with SMTP id h4csp1059707imn; Sat, 7 Apr 2018 16:51:57 -0700 (PDT) X-Google-Smtp-Source: AIpwx498nYTGGfUhWreKjeHkyYoKoJDWFmtFmJArqIISQPQSj+8ZWfZM0JXHgHsmEQwrn4pOY1/N X-Received: by 10.98.99.4 with SMTP id x4mr1843854pfb.179.1523145117272; Sat, 07 Apr 2018 16:51:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523145117; cv=none; d=google.com; s=arc-20160816; b=o6LKKVLybRGg1Bn1OQ9xnSXp4GytQySoa7kX/HFeGV3sG4vjgDX2fmRAEdRhkuQbAy sNhHhH/g1WwBRvxXNAmKxbqANGeOwWrvLuhcLqI3ufGzf+27UQxdRl5qIGCxejpdQ45n 7jpUFvyeyY74yOhlR13K4s3U9+rcJ8YIivVKDzrqk56PEY3gugdM/h3ZM/m8+wes3itt MVQHDvOAH9He+WY2LdzXnTJN3rNCwd5Os/NDX8w0+fpnGgKkduT1ezp4Um1+YJ0bxpwB TXSSacLAA/k0oQ/csrIIqFixAmikYu8GzrTwryCVSSUyJ5agID6yrgovhsH4qerzqMg3 owBQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-id:mime-version:user-agent :message-id:subject:cc:to:from:date:arc-authentication-results; bh=7QCwB1PzF9SBNcVp5TpL27vkNmGOcZScu+ngU+DJubo=; b=OnPuY18xkh7YX7UbcIenkjUQ8zcJOOyjCM0e6Y84SVPOk5LjWADhWh/Dhb8iEa4azO UG6Dd2pR5ha/e3Tj+MC57613bFJdRvth9HnK0z4HdIffsOpewAKOFSuaWz0t8dDEylM5 JZoAPjeTqIip7FJ7GlDAABdRK2c7wOC/0MV5/X2JzU/KPwSVr59DAPfy1orPptOQSvJw xGGKhgy1YYCJtJUh/qLXe2glbGKeUgDNhxRyetUcK6nJBLY9hfSamym/k1ZrMxYdXIHA mt9f5GzCrPSAXGopKGDTYWy/+Gn7CCNlf33tcV778IRfc0aGaWw8JkA7XBCE0GlN40fE 2dpA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g61-v6si11303470plb.686.2018.04.07.16.51.20; Sat, 07 Apr 2018 16:51:57 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752349AbeDGXrX (ORCPT + 99 others); Sat, 7 Apr 2018 19:47:23 -0400 Received: from namei.org ([65.99.196.166]:55858 "EHLO namei.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752156AbeDGXrV (ORCPT ); Sat, 7 Apr 2018 19:47:21 -0400 Received: from localhost (localhost [127.0.0.1]) by namei.org (8.14.4/8.14.4) with ESMTP id w37NlL9J003614; Sat, 7 Apr 2018 23:47:21 GMT Date: Sun, 8 Apr 2018 09:47:21 +1000 (AEST) From: James Morris To: Linus Torvalds cc: linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [GIT PULL][SECURITY] Integrity updates for v4.17 Message-ID: User-Agent: Alpine 2.21 (LRH 202 2017-01-01) MIME-Version: 1.0 Content-Type: multipart/mixed; BOUNDARY="1665246916-617956046-1523144331=:1486" Content-ID: Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This message is in MIME format. The first part should be readable text, while the remaining parts are likely unreadable without MIME-aware tools. --1665246916-617956046-1523144331=:1486 Content-Type: text/plain; CHARSET=ISO-8859-15 Content-Transfer-Encoding: 8BIT Content-ID: Please pull these updates for the Integrity subsystem, via Mimi: a mixture of bug fixes, code cleanup, and continues to close IMA-measurement, IMA-appraisal, and IMA-audit gaps. Also note the addition of a new cred_getsecid LSM hook by Matthew Garrett: For IMA purposes, we want to be able to obtain the prepared secid in the bprm structure before the credentials are committed. Add a cred_getsecid hook that makes this possible. which is used by a new CREDS_CHECK target in IMA: In ima_bprm_check(), check with both the existing process credentials and the credentials that will be committed when the new process is started. This will not change behaviour unless the system policy is extended to include CREDS_CHECK targets - BPRM_CHECK will continue to check the same credentials that it did previously. The following changes since commit 5893ed18a26d1f56b97c0290b0cbbc2d49d6de28: Merge tag 'v4.16-rc6' into next-general (2018-03-23 08:26:16 +1100) are available in the git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security.git next-integrity for you to fetch changes up to ab60368ab6a452466885ef4edf0cefd089465132: ima: Fallback to the builtin hash algorithm (2018-03-25 07:26:32 -0400) ---------------------------------------------------------------- Hern?n Gonzalez (2): evm: Move evm_hmac and evm_hash from evm_main.c to evm_crypto.c evm: Constify *integrity_status_msg[] Jiandi An (1): ima: Fix Kconfig to select TPM 2.0 CRB interface Martin Townsend (1): ima: Add smackfs to the default appraise/measure list Matthew Garrett (2): security: Add a cred_getsecid hook IMA: Support using new creds in appraisal policy Mimi Zohar (5): ima: fail file signature verification on non-init mounted filesystems ima: re-evaluate files on privileged mounted filesystems ima: clear IMA_HASH ima: fail signature verification based on policy fuse: define the filesystem as untrusted Petr Vorel (1): ima: Fallback to the builtin hash algorithm Sascha Hauer (1): evm: check for remount ro in progress before writing Thiago Jung Bauermann (3): integrity: Remove unused macro IMA_ACTION_RULE_FLAGS ima: Simplify ima_eventsig_init() ima: Improvements in ima_appraise_measurement() Tycho Andersen (1): ima: drop vla in ima_audit_measurement() Documentation/ABI/testing/ima_policy | 2 +- Documentation/admin-guide/kernel-parameters.txt | 8 ++- fs/fuse/inode.c | 3 ++ include/linux/fs.h | 2 + include/linux/lsm_hooks.h | 6 +++ include/linux/security.h | 1 + security/integrity/evm/evm.h | 2 - security/integrity/evm/evm_crypto.c | 3 ++ security/integrity/evm/evm_main.c | 12 +++-- security/integrity/iint.c | 2 + security/integrity/ima/Kconfig | 1 + security/integrity/ima/ima.h | 9 ++-- security/integrity/ima/ima_api.c | 25 +++++---- security/integrity/ima/ima_appraise.c | 65 +++++++++++++++++------ security/integrity/ima/ima_crypto.c | 2 + security/integrity/ima/ima_main.c | 69 ++++++++++++++++++++----- security/integrity/ima/ima_policy.c | 32 ++++++++---- security/integrity/ima/ima_template_lib.c | 11 ++-- security/integrity/integrity.h | 11 ++-- security/security.c | 7 +++ security/selinux/hooks.c | 6 +++ security/smack/smack_lsm.c | 18 +++++++ 22 files changed, 227 insertions(+), 70 deletions(-) --1665246916-617956046-1523144331=:1486--