<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/security/integrity, branch v2.6.35</title>
<subtitle>Linux kernel source tree</subtitle>
<id>https://git.amat.us/linux/atom/security/integrity?h=v2.6.35</id>
<link rel='self' href='https://git.amat.us/linux/atom/security/integrity?h=v2.6.35'/>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/'/>
<updated>2010-05-21T16:37:29Z</updated>
<entry>
<title>kref: remove kref_set</title>
<updated>2010-05-21T16:37:29Z</updated>
<author>
<name>NeilBrown</name>
<email>neilb@suse.de</email>
</author>
<published>2010-03-16T04:14:51Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=db1afffab0b5d9f6d31f8f4bea44c9cb3bc59351'/>
<id>urn:sha1:db1afffab0b5d9f6d31f8f4bea44c9cb3bc59351</id>
<content type='text'>
Of the three uses of kref_set in the kernel:

 One really should be kref_put as the code is letting go of a
    reference,
 Two really should be kref_init because the kref is being
    initialised.

This suggests that making kref_set available encourages bad code.
So fix the three uses and remove kref_set completely.

Signed-off-by: NeilBrown &lt;neilb@suse.de&gt;
Acked-by: Mimi Zohar &lt;zohar@us.ibm.com&gt;
Acked-by: Serge Hallyn &lt;serue@us.ibm.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
</entry>
<entry>
<title>ima: remove ACPI dependency</title>
<updated>2010-05-16T23:21:58Z</updated>
<author>
<name>Mimi Zohar</name>
<email>zohar@linux.vnet.ibm.com</email>
</author>
<published>2010-05-04T22:16:30Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=ba0c1709f4946a5ca1a678f4318ed72c0d409b3c'/>
<id>urn:sha1:ba0c1709f4946a5ca1a678f4318ed72c0d409b3c</id>
<content type='text'>
The ACPI dependency moved to the TPM, where it belongs.  Although
IMA per-se does not require access to the bios measurement log,
verifying the IMA boot aggregate does, which requires ACPI.

This patch prereq's 'TPM: ACPI/PNP dependency removal'
http://lkml.org/lkml/2010/5/4/378.

Signed-off-by: Mimi Zohar &lt;zohar@us.ibm.com&gt;
Reported-by: Jean-Christophe Dubois &lt;jcd@tribudubois.net&gt;
Acked-by: Serge Hallyn &lt;serue@us.ibm.com&gt;
Tested-by: Serge Hallyn &lt;serue@us.ibm.com&gt;
Signed-off-by: James Morris &lt;jmorris@namei.org&gt;
</content>
</entry>
<entry>
<title>Revert "ima: remove ACPI dependency"</title>
<updated>2010-05-06T23:20:03Z</updated>
<author>
<name>James Morris</name>
<email>jmorris@namei.org</email>
</author>
<published>2010-05-06T23:20:03Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=83c36ccfe4d849f482ea0a62402c7624f4e59f0e'/>
<id>urn:sha1:83c36ccfe4d849f482ea0a62402c7624f4e59f0e</id>
<content type='text'>
This reverts commit a674fa46c79ffa37995bd1c8e4daa2b3be5a95ae.

Previous revert was a prereq.

Signed-off-by: James Morris &lt;jmorris@namei.org&gt;
</content>
</entry>
<entry>
<title>Merge branch 'master' into next</title>
<updated>2010-05-06T00:56:07Z</updated>
<author>
<name>James Morris</name>
<email>jmorris@namei.org</email>
</author>
<published>2010-05-06T00:56:07Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=0ffbe2699cda6afbe08501098dff8a8c2fe6ae09'/>
<id>urn:sha1:0ffbe2699cda6afbe08501098dff8a8c2fe6ae09</id>
<content type='text'>
</content>
</entry>
<entry>
<title>ima: remove ACPI dependency</title>
<updated>2010-05-05T00:00:06Z</updated>
<author>
<name>Mimi Zohar</name>
<email>zohar@linux.vnet.ibm.com</email>
</author>
<published>2010-05-04T22:16:30Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=a674fa46c79ffa37995bd1c8e4daa2b3be5a95ae'/>
<id>urn:sha1:a674fa46c79ffa37995bd1c8e4daa2b3be5a95ae</id>
<content type='text'>
The ACPI dependency moved to the TPM, where it belongs.  Although
IMA per-se does not require access to the bios measurement log,
verifying the IMA boot aggregate does, which requires ACPI.

This patch prereq's 'TPM: ACPI/PNP dependency removal'
http://lkml.org/lkml/2010/5/4/378.

Signed-off-by: Mimi Zohar &lt;zohar@us.ibm.com&gt;
Reported-by: Jean-Christophe Dubois &lt;jcd@tribudubois.net&gt;
Acked-by: Serge Hallyn &lt;serue@us.ibm.com&gt;
Tested-by: Serge Hallyn &lt;serue@us.ibm.com&gt;
Signed-off-by: James Morris &lt;jmorris@namei.org&gt;
</content>
</entry>
<entry>
<title>IMA: include the word IMA in printk messages</title>
<updated>2010-04-22T22:47:53Z</updated>
<author>
<name>Eric Paris</name>
<email>eparis@redhat.com</email>
</author>
<published>2010-04-22T14:49:36Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=eb8dae9607901fd3fc181325ff3f30dce8f574c5'/>
<id>urn:sha1:eb8dae9607901fd3fc181325ff3f30dce8f574c5</id>
<content type='text'>
As an example IMA emits a warning when it can't find a TPM chip:

"No TPM chip found, activating TPM-bypass!"

This patch prefaces that message with IMA so we know what subsystem is
bypassing the TPM.  Do this for all pr_info and pr_err messages.

Signed-off-by: Eric Paris &lt;eparis@redhat.com&gt;
Acked-by: Mimi Zohar &lt;zohar@us.ibm.com&gt;
Signed-off-by: James Morris &lt;jmorris@namei.org&gt;
</content>
</entry>
<entry>
<title>IMA: drop the word integrity in the audit message</title>
<updated>2010-04-20T23:58:18Z</updated>
<author>
<name>Eric Paris</name>
<email>eparis@redhat.com</email>
</author>
<published>2010-04-20T14:21:36Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=34c111f626e91adb23f90a91d2c7cd4dac9fa4b1'/>
<id>urn:sha1:34c111f626e91adb23f90a91d2c7cd4dac9fa4b1</id>
<content type='text'>
integrity_audit_msg() uses "integrity:" in the audit message.  This
violates the (loosely defined) audit system requirements that everything be
a key=value pair and it doesn't provide additional information.  This can
be obviously gleaned from the message type.  Just drop it.

Signed-off-by: Eric Paris &lt;eparis@redhat.com&gt;
Acked-by: Mimi Zohar &lt;zohar@us.ibm.com&gt;
Signed-off-by: James Morris &lt;jmorris@namei.org&gt;
</content>
</entry>
<entry>
<title>IMA: use audit_log_untrusted_string rather than %s</title>
<updated>2010-04-20T23:58:17Z</updated>
<author>
<name>Eric Paris</name>
<email>eparis@redhat.com</email>
</author>
<published>2010-04-20T14:21:30Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=2f1506cd82e0725ba00c7146a9a9b47824a5edcf'/>
<id>urn:sha1:2f1506cd82e0725ba00c7146a9a9b47824a5edcf</id>
<content type='text'>
Convert all of the places IMA calls audit_log_format with %s into
audit_log_untrusted_string().  This is going to cause them all to get
quoted, but it should make audit log injection harder.

Signed-off-by: Eric Paris &lt;eparis@redhat.com&gt;
Acked-by: Mimi Zohar &lt;zohar@us.ibm.com&gt;
Signed-off-by: James Morris &lt;jmorris@namei.org&gt;
</content>
</entry>
<entry>
<title>IMA: handle comments in policy</title>
<updated>2010-04-20T23:58:16Z</updated>
<author>
<name>Eric Paris</name>
<email>eparis@redhat.com</email>
</author>
<published>2010-04-20T14:21:24Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=7233e3ee22b1506723411fe437bcf69f678e8cdd'/>
<id>urn:sha1:7233e3ee22b1506723411fe437bcf69f678e8cdd</id>
<content type='text'>
IMA policy load parser will reject any policies with a comment.  This patch
will allow the parser to just ignore lines which start with a #.  This is not
very robust.  # can ONLY be used at the very beginning of a line.  Inline
comments are not allowed.

Signed-off-by: Eric Paris
Acked-by: Mimi Zohar &lt;zohar@us.ibm.com&gt;
Signed-off-by: James Morris &lt;jmorris@namei.org&gt;
</content>
</entry>
<entry>
<title>IMA: handle whitespace better</title>
<updated>2010-04-20T23:58:16Z</updated>
<author>
<name>Eric Paris</name>
<email>eparis@redhat.com</email>
</author>
<published>2010-04-20T14:21:18Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=28ef4002ec7b4be27f1110b83e255df8159c786a'/>
<id>urn:sha1:28ef4002ec7b4be27f1110b83e255df8159c786a</id>
<content type='text'>
IMA parser will fail if whitespace is used in any way other than a single
space.  Using a tab or even using 2 spaces in a row will result in a policy
being rejected.  This patch makes the kernel ignore whitespace a bit better.

Signed-off-by: Eric Paris &lt;eparis@redhat.com&gt;
Acked-by: Mimi Zohar &lt;zohar@us.ibm.com&gt;
Signed-off-by: James Morris &lt;jmorris@namei.org&gt;
</content>
</entry>
</feed>
