Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751471AbdISQDb (ORCPT ); Tue, 19 Sep 2017 12:03:31 -0400 Received: from namei.org ([65.99.196.166]:40114 "EHLO namei.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751016AbdISQDa (ORCPT ); Tue, 19 Sep 2017 12:03:30 -0400 Date: Wed, 20 Sep 2017 02:02:47 +1000 (AEST) From: James Morris To: Linus Torvalds cc: linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org, Mimi Zohar , Christoph Hellwig Subject: Re: [GIT PULL] Security susbsystem updates for v4.14 (v2) In-Reply-To: Message-ID: References: User-Agent: Alpine 2.21 (LRH 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 506 Lines: 14 On Sun, 10 Sep 2017, James Morris wrote: > Here's an updated pull request with the IMA integrity_read() patch > reverted. Note that this restores the orginal buggy behavior with XFS/IMA > deadlock the builtin ima_tcb policy wand XFS rootfs. Linus, can you pull this v2 version? The buggy IMA change is reverted in this which means that we simply have the existing behavior. Otherwise, a bunch of other unrelated stuff will be missed for this kernel release. -- James Morris