[GIT PULL] integrity subsystem updates for v5.17
From: Mimi Zohar
Date: Mon Jan 10 2022 - 17:02:14 EST
Hi Linus,
The few changes are all kexec related:
- The MOK keys are loaded onto the .platform keyring in order to verify
the kexec kernel image signature. However, the MOK keys should only be
trusted when secure boot is enable. Before loading the MOK keys onto
the .platform keyring, make sure the system is booted in secure boot
mode.
- When carrying the IMA measurement list across kexec, limit dumping
the measurement list to when dynamic debug or CONFIG_DEBUG is enabled.
- kselftest: add kexec_file_load selftest support for PowerNV and other
cleanup.
thanks,
Mimi
The following changes since commit 136057256686de39cc3a07c2e39ef6bc43003ff6:
Linux 5.16-rc2 (2021-11-21 13:47:39 -0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/zohar/linux-integrity.git tags/integrity-v5.17
for you to fetch changes up to 65e38e32a959dbbb0bf5cf1ae699789f81759be6:
selftests/kexec: Enable secureboot tests for PowerPC (2022-01-05 11:44:57 -0500)
----------------------------------------------------------------
integrity-v5.17
----------------------------------------------------------------
Bruno Meneguele (1):
ima: silence measurement list hexdump during kexec
Lee, Chun-Yi (1):
integrity: Do not load MOK and MOKx when secure boot be disabled
Mimi Zohar (2):
selftest/kexec: fix "ignored null byte in input" warning
selftests/kexec: update searching for the Kconfig
Nageswara R Sastry (1):
selftests/kexec: Enable secureboot tests for PowerPC
Takashi Iwai (1):
ima: Fix undefined arch_ima_get_secureboot() and co
include/linux/ima.h | 30 ++++++-------
security/integrity/ima/ima_kexec.c | 6 +--
security/integrity/platform_certs/load_uefi.c | 5 +++
tools/testing/selftests/kexec/Makefile | 2 +-
tools/testing/selftests/kexec/kexec_common_lib.sh | 51 +++++++++++++++++-----
.../selftests/kexec/test_kexec_file_load.sh | 13 ++++--
6 files changed, 74 insertions(+), 33 deletions(-)