# git rev-parse -q --verify f8cf2f16a7c95acce497bfafa90e7c6d8397d653^{commit} f8cf2f16a7c95acce497bfafa90e7c6d8397d653 already have revision, skipping fetch # git checkout -q -f -B kisskb f8cf2f16a7c95acce497bfafa90e7c6d8397d653 # git clean -qxdf # < git log -1 # commit f8cf2f16a7c95acce497bfafa90e7c6d8397d653 # Merge: 4b3f1a1 ab60368 # Author: Linus Torvalds # Date: Sat Apr 7 16:53:59 2018 -0700 # # Merge branch 'next-integrity' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security # # Pull integrity updates from James Morris: # "A mixture of bug fixes, code cleanup, and continues to close # IMA-measurement, IMA-appraisal, and IMA-audit gaps. # # Also note the addition of a new cred_getsecid LSM hook by Matthew # Garrett: # # For IMA purposes, we want to be able to obtain the prepared secid # in the bprm structure before the credentials are committed. Add a # cred_getsecid hook that makes this possible. # # which is used by a new CREDS_CHECK target in IMA: # # In ima_bprm_check(), check with both the existing process # credentials and the credentials that will be committed when the new # process is started. This will not change behaviour unless the # system policy is extended to include CREDS_CHECK targets - # BPRM_CHECK will continue to check the same credentials that it did # previously" # # * 'next-integrity' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security: # ima: Fallback to the builtin hash algorithm # ima: Add smackfs to the default appraise/measure list # evm: check for remount ro in progress before writing # ima: Improvements in ima_appraise_measurement() # ima: Simplify ima_eventsig_init() # integrity: Remove unused macro IMA_ACTION_RULE_FLAGS # ima: drop vla in ima_audit_measurement() # ima: Fix Kconfig to select TPM 2.0 CRB interface # evm: Constify *integrity_status_msg[] # evm: Move evm_hmac and evm_hash from evm_main.c to evm_crypto.c # fuse: define the filesystem as untrusted # ima: fail signature verification based on policy # ima: clear IMA_HASH # ima: re-evaluate files on privileged mounted filesystems # ima: fail file signature verification on non-init mounted filesystems # IMA: Support using new creds in appraisal policy # security: Add a cred_getsecid hook # < /opt/cross/kisskb/arcompact-buildroot-2015.08.1/bin/arc-buildroot-linux-uclibc-gcc --version # < git log --format=%s --max-count=1 f8cf2f16a7c95acce497bfafa90e7c6d8397d653 # < make -s -j 40 ARCH=arc O=/kisskb/build/linus_axs101_defconfig_arcompact CROSS_COMPILE=/opt/cross/kisskb/arcompact-buildroot-2015.08.1/bin/arc-buildroot-linux-uclibc- axs101_defconfig # Added to kconfig CONFIG_INITRAMFS_SOURCE="" # yes \n | make -s -j 40 ARCH=arc O=/kisskb/build/linus_axs101_defconfig_arcompact CROSS_COMPILE=/opt/cross/kisskb/arcompact-buildroot-2015.08.1/bin/arc-buildroot-linux-uclibc- oldconfig yes: standard output: Broken pipe yes: write error # make -s -j 40 ARCH=arc O=/kisskb/build/linus_axs101_defconfig_arcompact CROSS_COMPILE=/opt/cross/kisskb/arcompact-buildroot-2015.08.1/bin/arc-buildroot-linux-uclibc- In file included from /kisskb/src/include/asm-generic/bug.h:18:0, from /kisskb/src/arch/arc/include/asm/bug.h:32, from /kisskb/src/include/linux/bug.h:5, from /kisskb/src/include/linux/mmdebug.h:5, from /kisskb/src/include/linux/gfp.h:5, from /kisskb/src/include/linux/slab.h:15, from /kisskb/src/mm/nobootmem.c:14: /kisskb/src/mm/nobootmem.c: In function '__free_pages_memory': /kisskb/src/include/linux/kernel.h:807:29: warning: comparison of distinct pointer types lacks a cast [enabled by default] (!!(sizeof((typeof(x) *)1 == (typeof(y) *)1))) ^ /kisskb/src/include/linux/kernel.h:821:4: note: in expansion of macro '__typecheck' (__typecheck(x, y) && __no_side_effects(x, y)) ^ /kisskb/src/include/linux/kernel.h:831:25: note: in expansion of macro '__safe_cmp' __builtin_choose_expr(__safe_cmp(x, y), \ ^ /kisskb/src/include/linux/kernel.h:839:19: note: in expansion of macro '__careful_cmp' #define min(x, y) __careful_cmp(x, y, <) ^ /kisskb/src/mm/nobootmem.c:104:11: note: in expansion of macro 'min' order = min(MAX_ORDER - 1UL, __ffs(start)); ^ /kisskb/src/net/ipv4/tcp_input.c: In function 'tcp_data_queue': /kisskb/src/net/ipv4/tcp_input.c:4240:49: warning: array subscript is above array bounds [-Warray-bounds] tp->selective_acks[i-1] = tp->selective_acks[i]; ^ /kisskb/src/net/xfrm/xfrm_policy.c: In function '__xfrm_policy_check': /kisskb/src/net/xfrm/xfrm_policy.c:2378:15: warning: array subscript is above array bounds [-Warray-bounds] if (sp->xvec[k]->props.mode != XFRM_MODE_TRANSPORT) { ^ Completed OK # rm -rf /kisskb/build/linus_axs101_defconfig_arcompact # Build took: 0:00:31.583120