[GIT] Security subsystem changes for 2.6.38

From: James Morris
Date: Sun Jan 09 2011 - 19:46:16 EST


Not a great deal of change for this kernel. The trusted and encrypted keys
from Mimi are new, and Smack has a couple of enhancements arising from
Meego integration, otherwise it's mostly bugfixes and minor updates.

Also, following discussion at the kernel summit, several sub-maintainers
have now established public git trees from which I pull.

Please pull.


The following changes since commit 0c21e3aaf6ae85bee804a325aa29c325209180fd:
Linus Torvalds (1):
Merge branch 'for-next' of git://git.kernel.org/.../hch/hfsplus

are available in the git repository at:

git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/security-testing-2.6 for-linus

Casey Schaufler (2):
Smack: UDS revision
This patch adds a new security attribute to Smack called SMACK64EXEC.

Eric Paris (12):
SELinux: standardize return code handling in policydb.c
SELinux: standardize return code handling in selinuxfs.c
SELinux: standardize return code handling in selinuxfs.c
selinux: rework security_netlbl_secattr_to_sid
SELinux: do not set automatic i_ino in selinuxfs
flex_array: fix flex_array_put_ptr macro to be valid C
selinux: convert type_val_to_struct to flex_array
selinux: convert part of the sym_val_to_name array to use flex_array
SELinux: merge policydb_index_classes and policydb_index_others
SELinux: do not compute transition labels on mountpoint labeled filesystems
selinux: cache sidtab_context_to_sid results
SELinux: define permissions for DCB netlink messages

James Morris (5):
kernel: add roundup() code comment from akpm
Merge branch 'master' into next
Merge branch 'smack-next-master' into next
Merge branch 'master' into next
Merge branch 'master' of git://git.infradead.org/users/eparis/selinux into next

Jarkko Sakkinen (1):
Smack: Transmute labels on specified directories

Mimi Zohar (10):
lib: hex2bin converts ascii hexadecimal string to binary
tpm: add module_put wrapper
key: add tpm_send command
keys: add new trusted key-type
keys: add new key-type encrypted
keys: add missing include file for trusted and encrypted keys
trusted-keys: additional TSS return code and other error handling
trusted-keys: kzalloc and other cleanup
encrypted-keys: verify datablob size before converting to binary
encrypted-keys: style and other cleanup

Serge E. Hallyn (2):
security: Define CAP_SYSLOG
syslog: check cap_syslog when dmesg_restrict

Tetsuo Handa (2):
security: Fix comment of security_key_permission
MAINTAINERS: Add tomoyo-dev-en ML.

Documentation/keys-trusted-encrypted.txt | 145 ++++
Documentation/sysctl/kernel.txt | 2 +-
MAINTAINERS | 3 +-
drivers/char/tpm/tpm.c | 20 +-
drivers/char/tpm/tpm.h | 5 +
include/keys/encrypted-type.h | 29 +
include/keys/trusted-type.h | 31 +
include/linux/capability.h | 7 +-
include/linux/flex_array.h | 2 +-
include/linux/kernel.h | 3 +
include/linux/security.h | 3 +-
include/linux/tpm.h | 4 +
include/linux/tpm_command.h | 28 +
include/linux/xattr.h | 4 +
kernel/printk.c | 14 +-
lib/hexdump.c | 16 +
security/Kconfig | 31 +
security/keys/Makefile | 2 +
security/keys/encrypted_defined.c | 903 +++++++++++++++++++++++
security/keys/encrypted_defined.h | 54 ++
security/keys/trusted_defined.c | 1175 ++++++++++++++++++++++++++++++
security/keys/trusted_defined.h | 134 ++++
security/selinux/hooks.c | 5 +-
security/selinux/include/classmap.h | 2 +-
security/selinux/nlmsgtab.c | 2 +
security/selinux/selinuxfs.c | 649 ++++++++---------
security/selinux/ss/conditional.c | 6 +-
security/selinux/ss/mls.c | 25 +-
security/selinux/ss/policydb.c | 701 +++++++++---------
security/selinux/ss/policydb.h | 19 +-
security/selinux/ss/services.c | 425 ++++++------
security/selinux/ss/sidtab.c | 39 +-
security/selinux/ss/sidtab.h | 2 +
security/smack/smack.h | 45 ++
security/smack/smack_access.c | 58 ++-
security/smack/smack_lsm.c | 354 +++++++---
security/smack/smackfs.c | 41 +-
37 files changed, 3914 insertions(+), 1074 deletions(-)
create mode 100644 Documentation/keys-trusted-encrypted.txt
create mode 100644 include/keys/encrypted-type.h
create mode 100644 include/keys/trusted-type.h
create mode 100644 include/linux/tpm_command.h
create mode 100644 security/keys/encrypted_defined.c
create mode 100644 security/keys/encrypted_defined.h
create mode 100644 security/keys/trusted_defined.c
create mode 100644 security/keys/trusted_defined.h

--
James Morris
<jmorris@xxxxxxxxx>
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/