# git rev-parse -q --verify 0f75ef6a9cff49ff612f7ce0578bced9d0b38325^{commit} # git fetch -q -n -f git://fs.ozlabs.ibm.com/kernel/linus master warning: The last gc run reported the following. Please correct the root cause and remove .git/gc.log. Automatic cleanup will not be performed until the file is removed. warning: There are too many unreachable loose objects; run 'git prune' to remove them. # git rev-parse -q --verify 0f75ef6a9cff49ff612f7ce0578bced9d0b38325^{commit} 0f75ef6a9cff49ff612f7ce0578bced9d0b38325 # git checkout -q -f -B kisskb 0f75ef6a9cff49ff612f7ce0578bced9d0b38325 # git clean -qxdf # < git log -1 # commit 0f75ef6a9cff49ff612f7ce0578bced9d0b38325 # Merge: c84ca912b079 7a1ade847596 # Author: Linus Torvalds # Date: Mon Jul 8 19:56:57 2019 -0700 # # Merge tag 'keys-acl-20190703' of git://git.kernel.org/pub/scm/linux/kernel/git/dhowells/linux-fs # # Pull keyring ACL support from David Howells: # "This changes the permissions model used by keys and keyrings to be # based on an internal ACL by the following means: # # - Replace the permissions mask internally with an ACL that contains a # list of ACEs, each with a specific subject with a permissions mask. # Potted default ACLs are available for new keys and keyrings. # # ACE subjects can be macroised to indicate the UID and GID specified # on the key (which remain). Future commits will be able to add # additional subject types, such as specific UIDs or domain # tags/namespaces. # # Also split a number of permissions to give finer control. Examples # include splitting the revocation permit from the change-attributes # permit, thereby allowing someone to be granted permission to revoke # a key without allowing them to change the owner; also the ability # to join a keyring is split from the ability to link to it, thereby # stopping a process accessing a keyring by joining it and thus # acquiring use of possessor permits. # # - Provide a keyctl to allow the granting or denial of one or more # permits to a specific subject. Direct access to the ACL is not # granted, and the ACL cannot be viewed" # # * tag 'keys-acl-20190703' of git://git.kernel.org/pub/scm/linux/kernel/git/dhowells/linux-fs: # keys: Provide KEYCTL_GRANT_PERMISSION # keys: Replace uid/gid/perm permissions checking with an ACL # < /opt/cross/kisskb/br-aarch64-glibc-2016.08-613-ge98b4dd/bin/aarch64-linux-gcc --version # < /opt/cross/kisskb/br-aarch64-glibc-2016.08-613-ge98b4dd/bin/aarch64-linux-ld --version # < git log --format=%s --max-count=1 0f75ef6a9cff49ff612f7ce0578bced9d0b38325 # < make -s -j 10 ARCH=arm64 O=/kisskb/build/linus-rand_arm64-randconfig_arm64-gcc5.4 CROSS_COMPILE=/opt/cross/kisskb/br-aarch64-glibc-2016.08-613-ge98b4dd/bin/aarch64-linux- randconfig KCONFIG_SEED=0xD5B0BC60 # Added to kconfig CONFIG_PREVENT_FIRMWARE_BUILD=y # yes \n | make -s -j 10 ARCH=arm64 O=/kisskb/build/linus-rand_arm64-randconfig_arm64-gcc5.4 CROSS_COMPILE=/opt/cross/kisskb/br-aarch64-glibc-2016.08-613-ge98b4dd/bin/aarch64-linux- oldconfig yes: standard output: Broken pipe # make -s -j 10 ARCH=arm64 O=/kisskb/build/linus-rand_arm64-randconfig_arm64-gcc5.4 CROSS_COMPILE=/opt/cross/kisskb/br-aarch64-glibc-2016.08-613-ge98b4dd/bin/aarch64-linux- /kisskb/src/crypto/serpent_generic.c: In function '__serpent_setkey': /kisskb/src/crypto/serpent_generic.c:437:1: warning: the frame size of 2704 bytes is larger than 2048 bytes [-Wframe-larger-than=] } ^ /kisskb/src/drivers/hwtracing/intel_th/msu.c: In function 'msc_buffer_win_alloc': /kisskb/src/drivers/hwtracing/intel_th/msu.c:783:21: warning: unused variable 'i' [-Wunused-variable] int ret = -ENOMEM, i; ^ /kisskb/src/drivers/hwtracing/intel_th/msu.c: In function 'msc_buffer_win_free': /kisskb/src/drivers/hwtracing/intel_th/msu.c:863:6: warning: unused variable 'i' [-Wunused-variable] int i; ^ Completed OK # rm -rf /kisskb/build/linus-rand_arm64-randconfig_arm64-gcc5.4 # Build took: 0:03:51.667235