kref_put(>refcount, sgx_encl_release);
> + return ret;
> +}
Don't you need an sgx_free_page() somewhere here?
--
James Morris
first and only LSM with a larger
> > name.
>
> Maybe the commit log should mention that then.
Actually, make it a separate patch, so we can easily pinpoint the commit.
--
James Morris
<james.l.mor...@oracle.com>
first and only LSM with a larger
> > name.
>
> Maybe the commit log should mention that then.
Actually, make it a separate patch, so we can easily pinpoint the commit.
--
James Morris
Hi Linus,
Please pull these fixes for the Integrity subsystem.
(From Mimi)
"There is a mixture of bug fixes, code cleanup, preparatory code for new
functionality and new functionality.
Commit 26ddabfe96bb "evm: enable EVM when X509 certificate is loaded"
enabled EVM without loading a
Hi Linus,
Please pull these fixes for the Integrity subsystem.
(From Mimi)
"There is a mixture of bug fixes, code cleanup, preparatory code for new
functionality and new functionality.
Commit 26ddabfe96bb "evm: enable EVM when X509 certificate is loaded"
enabled EVM without loading a
etticks static const to shrink object code size
Eric Biggers (1):
MAINTAINERS: remove David Safford as maintainer for encrypted+trusted keys
James Morris (1):
Merge tag 'v4.14-rc2' into next-general
Jarkko Sakkinen (4):
tpm: migrate pubek_show to struct tpm_buf
tpm:
etticks static const to shrink object code size
Eric Biggers (1):
MAINTAINERS: remove David Safford as maintainer for encrypted+trusted keys
James Morris (1):
Merge tag 'v4.14-rc2' into next-general
Jarkko Sakkinen (4):
tpm: migrate pubek_show to struct tpm_buf
tpm:
ildren inside /proc/, allowing to support more tight
> cases.
>
> [1] https://lkml.org/lkml/2017/4/26/646
>
> Cc: Kees Cook <keesc...@chromium.org>
> Cc: Greg Kroah-Hartman <gre...@linuxfoundation.org>
> Suggested-by: Andy Lutomirski <l...@kernel.org>
> Signed
ildren inside /proc/, allowing to support more tight
> cases.
>
> [1] https://lkml.org/lkml/2017/4/26/646
>
> Cc: Kees Cook
> Cc: Greg Kroah-Hartman
> Suggested-by: Andy Lutomirski
> Signed-off-by: Alexey Gladkov
> Signed-off-by: Djalal Harouni
Reviewed-by: James Morris
--
James Morris
lt;keesc...@chromium.org>
> Cc: Greg Kroah-Hartman <gre...@linuxfoundation.org>
> Suggested-by: Andy Lutomirski <l...@kernel.org>
> Signed-off-by: Alexey Gladkov <gladkov.ale...@gmail.com>
> Signed-off-by: Djalal Harouni <tix...@gmail.com>
Reviewed-by: James Morris <james.l.mor...@oracle.com>
--
James Morris
<james.l.mor...@oracle.com>
> Cc: Greg Kroah-Hartman
> Suggested-by: Andy Lutomirski
> Signed-off-by: Alexey Gladkov
> Signed-off-by: Djalal Harouni
Reviewed-by: James Morris
--
James Morris
er.c:233 RSP:
9b6b37973c78
CR2:
Fixes: 42d5ec27f873 ("X.509: Add an ASN.1 decoder")
Reported-by: syzbot <syzkal...@googlegroups.com>
Cc: <sta...@vger.kernel.org> # v3.7+
Signed-off-by: Eric Biggers <ebigg...@google.com&g
6b37973c78
CR2:
Fixes: 42d5ec27f873 ("X.509: Add an ASN.1 decoder")
Reported-by: syzbot
Cc: # v3.7+
Signed-off-by: Eric Biggers
Signed-off-by: David Howells
Signed-off-by: James Morris
diff --git a/lib/asn1_decoder.c b/lib/asn1_decoder.c
Hi Linus,
Please pull these fixes for the Keys subsystem by Eric Biggers.
The following changes since commit 3a99df9a3d14cd866b5516f8cba515a3bfd554ab:
Merge branch 'for-linus' of
git://git.kernel.org/pub/scm/linux/kernel/git/ebiederm/user-namespace
(2017-11-01 16:04:27 -0700)
are available
Hi Linus,
Please pull these fixes for the Keys subsystem by Eric Biggers.
The following changes since commit 3a99df9a3d14cd866b5516f8cba515a3bfd554ab:
Merge branch 'for-linus' of
git://git.kernel.org/pub/scm/linux/kernel/git/ebiederm/user-namespace
(2017-11-01 16:04:27 -0700)
are available
- Recently suggested, query sent to maintainer
> perf- Not looked at yet.
How useful is this really if it's incomplete?
And I think it really needs more testing in -next.
--
James Morris
<james.l.mor...@oracle.com>
- Recently suggested, query sent to maintainer
> perf- Not looked at yet.
How useful is this really if it's incomplete?
And I think it really needs more testing in -next.
--
James Morris
On Thu, 26 Oct 2017, Linus Torvalds wrote:
> On Thu, Oct 26, 2017 at 8:54 PM, James Morris <james.l.mor...@oracle.com>
> wrote:
> > On Thu, 26 Oct 2017, Linus Torvalds wrote:
> >
> >> I'm *very* unhappy with the security layer as is
> >
> > W
On Thu, 26 Oct 2017, Linus Torvalds wrote:
> On Thu, Oct 26, 2017 at 8:54 PM, James Morris
> wrote:
> > On Thu, 26 Oct 2017, Linus Torvalds wrote:
> >
> >> I'm *very* unhappy with the security layer as is
> >
> > What are you unhappy with?
>
> We
On Thu, 26 Oct 2017, Linus Torvalds wrote:
> I'm *very* unhappy with the security layer as is
What are you unhappy with?
--
James Morris
<james.l.mor...@oracle.com>
On Thu, 26 Oct 2017, Linus Torvalds wrote:
> I'm *very* unhappy with the security layer as is
What are you unhappy with?
--
James Morris
urity module.
>
> Signed-off-by: Casey Schaufler <ca...@schaufler-ca.com>
Reviewed-by: James Morris <james.l.mor...@oracle.com>
--
James Morris
<james.l.mor...@oracle.com>
urity module.
>
> Signed-off-by: Casey Schaufler
Reviewed-by: James Morris
--
James Morris
t;penguin-ker...@i-love.sakura.ne.jp>
> Signed-off-by: Arnd Bergmann <a...@arndb.de>
> ---
> v2: fix year calculation
Applied to:
git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security.git
next-general
--
James Morris
<james.l.mor...@oracle.com>
a
> Signed-off-by: Arnd Bergmann
> ---
> v2: fix year calculation
Applied to:
git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security.git
next-general
--
James Morris
n");
Perhaps make this pr_warning and include the unknown mode value?
--
James Morris
<james.l.mor...@oracle.com>
n");
Perhaps make this pr_warning and include the unknown mode value?
--
James Morris
On Thu, 19 Oct 2017, David Howells wrote:
> Disallow access to /proc/kcore when the kernel is locked down to prevent
> access to cryptographic data.
>
> Signed-off-by: David Howells <dhowe...@redhat.com>
Reviewed-by: James Morris <james.l.mor...@oracle.com>
I have
On Thu, 19 Oct 2017, David Howells wrote:
> Disallow access to /proc/kcore when the kernel is locked down to prevent
> access to cryptographic data.
>
> Signed-off-by: David Howells
Reviewed-by: James Morris
I have to wonder, though, after everything is locked do
> Signed-off-by: Matthew Garrett <mj...@srcf.ucam.org>
> Signed-off-by: David Howells <dhowe...@redhat.com>
Reviewed-by: James Morris <james.l.mor...@oracle.com>
--
James Morris
<james.l.mor...@oracle.com>
Garrett
> Signed-off-by: David Howells
Reviewed-by: James Morris
--
James Morris
but not in git:
> https://lkml.org/lkml/2015/3/13/778
>
Reviewed-by: James Morris <james.l.mor...@oracle.com>
--
James Morris
<james.l.mor...@oracle.com>
rg/lkml/2015/3/13/778
>
Reviewed-by: James Morris
--
James Morris
com>
> cc: ke...@lists.infradead.org
Reviewed-by: James Morris <james.l.mor...@oracle.com>
--
James Morris
<james.l.mor...@oracle.com>
ffect kexec_file_load() which can check for a signature on the
> image to be booted.
>
> Signed-off-by: Matthew Garrett
> Signed-off-by: David Howells
> Acked-by: Dave Young
> cc: ke...@lists.infradead.org
Reviewed-by: James Morris
--
James Morris
ked down.
>
> Signed-off-by: Matthew Garrett <matthew.garr...@nebula.com>
> Signed-off-by: David Howells <dhowe...@redhat.com>
Reviewed-by: James Morris <james.l.mor...@oracle.com>
--
James Morris
<james.l.mor...@oracle.com>
f-by: Matthew Garrett
> Signed-off-by: David Howells
Reviewed-by: James Morris
--
James Morris
On Thu, 19 Oct 2017, David Howells wrote:
> If the kernel is locked down, require that all modules have valid
> signatures that we can verify.
>
> Signed-off-by: David Howells <dhowe...@redhat.com>
Reviewed-by: James Morris <james.l.mor...@oracle.com>
--
J
On Thu, 19 Oct 2017, David Howells wrote:
> If the kernel is locked down, require that all modules have valid
> signatures that we can verify.
>
> Signed-off-by: David Howells
Reviewed-by: James Morris
--
James Morris
en't validly signed with a key we recognise, fiddling with
> MSR registers and disallowing hibernation,
>
> Signed-off-by: David Howells <dhowe...@redhat.com>
Acked-by: James Morris <james.l.mor...@oracle.com>
--
James Morris
<james.l.mor...@oracle.com>
en't validly signed with a key we recognise, fiddling with
> MSR registers and disallowing hibernation,
>
> Signed-off-by: David Howells
Acked-by: James Morris
--
James Morris
id.
>
>
>
> Serge? James? Can one of you two take this via your trees since Paul
> has backed down citing (reasonably) that it is mostly capabilities
> patches rather than audit?
Applied to
git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security.git
next-general
--
James Morris
<james.l.mor...@oracle.com>
id.
>
>
>
> Serge? James? Can one of you two take this via your trees since Paul
> has backed down citing (reasonably) that it is mostly capabilities
> patches rather than audit?
Applied to
git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security.git
next-general
--
James Morris
> >
> > security/commoncap.c | 193
> > ++-
> > 1 file changed, 128 insertions(+), 65 deletions(-)
> >
> > --
> > 1.8.3.1
> >
> > --
> > To unsubscribe from this list: send the line "unsubscribe
> > linux-security-module" in
> > the body of a message to majord...@vger.kernel.org
> > More majordomo info at http://vger.kernel.org/majordomo-info.html
>
> - RGB
>
> --
> Richard Guy Briggs <r...@redhat.com>
> Sr. S/W Engineer, Kernel Security, Base Operating Systems
> Remote, Ottawa, Red Hat Canada
> IRC: rgb, SunRaycer
> Voice: +1.647.777.2635, Internal: (81) 32635
>
--
James Morris
<james.l.mor...@oracle.com>
> >
> > security/commoncap.c | 193
> > ++-
> > 1 file changed, 128 insertions(+), 65 deletions(-)
> >
> > --
> > 1.8.3.1
> >
> > --
> > To unsubscribe from this list: send the line "unsubscribe
> > linux-security-module" in
> > the body of a message to majord...@vger.kernel.org
> > More majordomo info at http://vger.kernel.org/majordomo-info.html
>
> - RGB
>
> --
> Richard Guy Briggs
> Sr. S/W Engineer, Kernel Security, Base Operating Systems
> Remote, Ottawa, Red Hat Canada
> IRC: rgb, SunRaycer
> Voice: +1.647.777.2635, Internal: (81) 32635
>
--
James Morris
KEYS: Load key expiry time atomically in keyring_search_iterator()
KEYS: load key flags and expiry time atomically in proc_keys_show()
Eric Sesterhenn (1):
pkcs7: Prevent NULL pointer dereference, since sinfo is not always set.
James Morris (1):
Merge commit 'tags/keys-fixe
KEYS: Load key expiry time atomically in keyring_search_iterator()
KEYS: load key flags and expiry time atomically in proc_keys_show()
Eric Sesterhenn (1):
pkcs7: Prevent NULL pointer dereference, since sinfo is not always set.
James Morris (1):
Merge commit 'tags/keys-fixe
:55 -0700)
>
> are available in the git repository at:
>
> git://git.infradead.org/users/jjs/linux-tpmdd.git tags/tpmdd-next-20171018
Thanks, merged to next-tpm and next-general in:
git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security.git
- James
--
James Morris
<james.l.mor...@oracle.com>
:55 -0700)
>
> are available in the git repository at:
>
> git://git.infradead.org/users/jjs/linux-tpmdd.git tags/tpmdd-next-20171018
Thanks, merged to next-tpm and next-general in:
git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security.git
- James
--
James Morris
On Wed, 11 Oct 2017, Serge E. Hallyn wrote:
> Hi James,
>
> it doesn't look like this has been picked up yet. Assuming I'm not looking
> in the wrong place, can you pull it into the security tree?
Sure, Colin, can you please resend this?
>
> Quoting Serge E. Hallyn (se...@hallyn.com):
> >
On Wed, 11 Oct 2017, Serge E. Hallyn wrote:
> Hi James,
>
> it doesn't look like this has been picked up yet. Assuming I'm not looking
> in the wrong place, can you pull it into the security tree?
Sure, Colin, can you please resend this?
>
> Quoting Serge E. Hallyn (se...@hallyn.com):
> >
On Tue, 10 Oct 2017, Jarkko Sakkinen wrote:
> The way I've agreed with James Morris to have my tree is to be rooted to
> security trees next branch.
>
> James, what actions should we take?
This process has changed recently -- I posted to lsm but forgot to post to
linux-inte
On Tue, 10 Oct 2017, Jarkko Sakkinen wrote:
> The way I've agreed with James Morris to have my tree is to be rooted to
> security trees next branch.
>
> James, what actions should we take?
This process has changed recently -- I posted to lsm but forgot to post to
linux-inte
find leak. Presumably
> because stale poiner stays on stack which could be reused nowdays.
Thanks for finding this!
--
James Morris
<jmor...@namei.org>
find leak. Presumably
> because stale poiner stays on stack which could be reused nowdays.
Thanks for finding this!
--
James Morris
ff-by: Casey Schaufler <ca...@schaufler-ca.com>
Reported-by: Konstantin Khlebnikov <khlebni...@yandex-team.ru>
Cc: sta...@vger.kernel.org
Signed-off-by: James Morris <james.l.mor...@oracle.com>
diff --git a/fs/xattr.c b/fs/xattr.c
index 4424f7f..61cd28b 100644
--- a/fs/xatt
orted-by: Konstantin Khlebnikov
Cc: sta...@vger.kernel.org
Signed-off-by: James Morris
diff --git a/fs/xattr.c b/fs/xattr.c
index 4424f7f..61cd28b 100644
--- a/fs/xattr.c
+++ b/fs/xattr.c
@@ -250,7 +250,7 @@ int __vfs_setxattr_noperm(struct dentry *dentry, const char
*name,
}
rigger this?
I plan to send this to Linus for -rc4 unless anyone has objections.
--
James Morris
<jmor...@namei.org>
urity(). Change Smack to allocate the string when
> told to do so.
>
> Signed-off-by: Casey Schaufler
Looks good to me. I wonder why security_release_secctx was used in the
first place? (it arrived via commit 42492594)
Konstantin: how did you trigger this?
I plan to send this to Linus for -rc4 unless anyone has objections.
--
James Morris
On Fri, 29 Sep 2017, Jason A. Donenfeld wrote:
> On Fri, Sep 29, 2017 at 12:33 AM, James Morris <jmor...@namei.org> wrote:
> > Generally speaking, we likely need to improve the amount of crypto review
> > for kernel crypto users including keys (I'll post a note separately t
On Fri, 29 Sep 2017, Jason A. Donenfeld wrote:
> On Fri, Sep 29, 2017 at 12:33 AM, James Morris wrote:
> > Generally speaking, we likely need to improve the amount of crypto review
> > for kernel crypto users including keys (I'll post a note separately to
> > ksummit-
KEYS: reset parent each time before searching key_user_tree
KEYS: restrict /proc/keys by credentials at open time
KEYS: use kmemdup() in request_key_auth_new()
James Morris (1):
Merge commit 'keys-fixes-20170927' into fixes-v4.14-rc3
Jason A. Donenfeld (2):
security/keys: prop
KEYS: reset parent each time before searching key_user_tree
KEYS: restrict /proc/keys by credentials at open time
KEYS: use kmemdup() in request_key_auth_new()
James Morris (1):
Merge commit 'keys-fixes-20170927' into fixes-v4.14-rc3
Jason A. Donenfeld (2):
security/keys: prop
On Thu, 28 Sep 2017, David Howells wrote:
> James Morris <jmor...@namei.org> wrote:
>
> > David, have you taken these into your tree? I can apply them to mine if
> > needed.
>
> I was intending to add them to my next tree for security/next.
Ok, please
On Thu, 28 Sep 2017, David Howells wrote:
> James Morris wrote:
>
> > David, have you taken these into your tree? I can apply them to mine if
> > needed.
>
> I was intending to add them to my next tree for security/next.
Ok, please add
Reviewed-by: James Morris
to
urity/keys/permission.c |3 +--
> security/keys/proc.c | 20 ++--
> security/keys/process_keys.c |2 +-
> 9 files changed, 50 insertions(+), 57 deletions(-)
David, have you taken these into your tree? I can apply them to mine if
needed.
--
James Morris
<jmor...@namei.org>
urity/keys/permission.c |3 +--
> security/keys/proc.c | 20 ++--
> security/keys/process_keys.c |2 +-
> 9 files changed, 50 insertions(+), 57 deletions(-)
David, have you taken these into your tree? I can apply them to mine if
needed.
--
James Morris
On Wed, 27 Sep 2017, Eric Biggers wrote:
> On Thu, Sep 28, 2017 at 09:14:58AM +1000, James Morris wrote:
> > On Wed, 27 Sep 2017, David Howells wrote:
> >
> > > (2) Fixing big_key to use safe crypto from Jason A. Donenfeld.
> > >
> >
> > I'm concer
On Wed, 27 Sep 2017, Eric Biggers wrote:
> On Thu, Sep 28, 2017 at 09:14:58AM +1000, James Morris wrote:
> > On Wed, 27 Sep 2017, David Howells wrote:
> >
> > > (2) Fixing big_key to use safe crypto from Jason A. Donenfeld.
> > >
> >
> > I'm concer
s code? If not, it would be good to make
some.
--
James Morris
<jmor...@namei.org>
s code? If not, it would be good to make
some.
--
James Morris
This is the remaining "general" change in the security tree for v4.14,
following the direct merging of SELinux (+ TOMOYO), AppArmor, and seccomp.
That's everything now for the security tree except IMA, which will follow
shortly (I've been traveling for the past week with patchy internet).
This is the remaining "general" change in the security tree for v4.14,
following the direct merging of SELinux (+ TOMOYO), AppArmor, and seccomp.
That's everything now for the security tree except IMA, which will follow
shortly (I've been traveling for the past week with patchy internet).
On Sun, 10 Sep 2017, James Morris wrote:
> Here's an updated pull request with the IMA integrity_read() patch
> reverted. Note that this restores the orginal buggy behavior with XFS/IMA
> deadlock the builtin ima_tcb policy wand XFS rootfs.
Linus, can you pull this v2 version? The
On Sun, 10 Sep 2017, James Morris wrote:
> Here's an updated pull request with the IMA integrity_read() patch
> reverted. Note that this restores the orginal buggy behavior with XFS/IMA
> deadlock the builtin ima_tcb policy wand XFS rootfs.
Linus, can you pull this v2 version? The
On Thu, 14 Sep 2017, Christoph Hellwig wrote:
> On Fri, Sep 15, 2017 at 06:21:28AM +1000, James Morris wrote:
> > So, to be clear, this patch solves the XFS deadlock using a different
> > approach (to the now reverted integrity_read approach), which Christoph
> > also
On Thu, 14 Sep 2017, Christoph Hellwig wrote:
> On Fri, Sep 15, 2017 at 06:21:28AM +1000, James Morris wrote:
> > So, to be clear, this patch solves the XFS deadlock using a different
> > approach (to the now reverted integrity_read approach), which Christoph
> > also
ore LSM changes.
--
James Morris
<jmor...@namei.org>
ore LSM changes.
--
James Morris
On Thu, 14 Sep 2017, Christoph Hellwig wrote:
> On Fri, Sep 15, 2017 at 06:21:28AM +1000, James Morris wrote:
> > So, to be clear, this patch solves the XFS deadlock using a different
> > approach (to the now reverted integrity_read approach), which Christoph
> > also
On Thu, 14 Sep 2017, Christoph Hellwig wrote:
> On Fri, Sep 15, 2017 at 06:21:28AM +1000, James Morris wrote:
> > So, to be clear, this patch solves the XFS deadlock using a different
> > approach (to the now reverted integrity_read approach), which Christoph
> > also
erent
approach (to the now reverted integrity_read approach), which Christoph
also says is more correct generally. Correct?
What testing has this had?
Should this go in with the rest of the security changes now or wait until
either -rc or the next merge window?
--
James Morris
<jmor...@namei.org>
he now reverted integrity_read approach), which Christoph
also says is more correct generally. Correct?
What testing has this had?
Should this go in with the rest of the security changes now or wait until
either -rc or the next merge window?
--
James Morris
On Sun, 10 Sep 2017, James Morris wrote:
> next-apparmor-next (JJ's next branch)
> next-integrity-next (Mimi's)
> next-tpm-next(Jarkko's)
without '-next' on the end... (editing while jetlagged).
--
James Morris
<jmor...@namei.org>
On Sun, 10 Sep 2017, James Morris wrote:
> next-apparmor-next (JJ's next branch)
> next-integrity-next (Mimi's)
> next-tpm-next(Jarkko's)
without '-next' on the end... (editing while jetlagged).
--
James Morris
nd to push to Linus, but he can pull individual branches feeding into it
if something is broken in one of them.
Does that sound useful?
--
James Morris
<jmor...@namei.org>
nd to push to Linus, but he can pull individual branches feeding into it
if something is broken in one of them.
Does that sound useful?
--
James Morris
owered-while-suspended binding documentation
Geert Uytterhoeven (1):
apparmor: Fix shadowed local variable in unpack_trans_table()
Hamza Attak (1):
tpm: replace msleep() with usleep_range() in TPM 1.2/2.0 generic drivers
James Morris (4):
sync to Linus v4.13-rc2 for subsystem develope
owered-while-suspended binding documentation
Geert Uytterhoeven (1):
apparmor: Fix shadowed local variable in unpack_trans_table()
Hamza Attak (1):
tpm: replace msleep() with usleep_range() in TPM 1.2/2.0 generic drivers
James Morris (4):
sync to Linus v4.13-rc2 for subsystem develope
On Fri, 8 Sep 2017, Theodore Ts'o wrote:
> On Fri, Sep 08, 2017 at 02:48:51PM +1000, James Morris wrote:
> >
> > Mimi and Christoph worked together on this over several iterations -- I'll
> > let them respond.
>
> Mimi --- we should chat next week in LA. I've
On Fri, 8 Sep 2017, Theodore Ts'o wrote:
> On Fri, Sep 08, 2017 at 02:48:51PM +1000, James Morris wrote:
> >
> > Mimi and Christoph worked together on this over several iterations -- I'll
> > let them respond.
>
> Mimi --- we should chat next week in LA. I've
ack is below.
>
As this impacts multiple LSMs, I'd prefer to take it via my tree.
--
James Morris
<jmor...@namei.org>
ack is below.
>
As this impacts multiple LSMs, I'd prefer to take it via my tree.
--
James Morris
you pull it then?
--
James Morris
<jmor...@namei.org>
you pull it then?
--
James Morris
On Thu, 7 Sep 2017, Linus Torvalds wrote:
> On Mon, Sep 4, 2017 at 3:29 AM, James Morris <jmor...@namei.org> wrote:
> >
> > IMA:
> > - A new integrity_read file operation method, avoids races when
> > calculating file hashes
>
> Honestly, t
On Thu, 7 Sep 2017, Linus Torvalds wrote:
> On Mon, Sep 4, 2017 at 3:29 AM, James Morris wrote:
> >
> > IMA:
> > - A new integrity_read file operation method, avoids races when
> > calculating file hashes
>
> Honestly, this seems really odd.
>
>
Documentation: tpm: add powered-while-suspended binding documentation
Geert Uytterhoeven (1):
apparmor: Fix shadowed local variable in unpack_trans_table()
Hamza Attak (1):
tpm: replace msleep() with usleep_range() in TPM 1.2/2.0 generic drivers
James Morris (3):
syn
Documentation: tpm: add powered-while-suspended binding documentation
Geert Uytterhoeven (1):
apparmor: Fix shadowed local variable in unpack_trans_table()
Hamza Attak (1):
tpm: replace msleep() with usleep_range() in TPM 1.2/2.0 generic drivers
James Morris (3):
syn
abstract FS struct */
> };
Looks like a spurious empty line.
--
James Morris
<jmor...@namei.org>
501 - 600 of 2193 matches
Mail list logo