Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp3948619imu; Mon, 24 Dec 2018 11:58:00 -0800 (PST) X-Google-Smtp-Source: ALg8bN7CMfNLhBr7wys3+lU/U8WhypYG8HECTGMjQ3dGaDhArXdNcaEk9kTmHFjcn1aPpVvugL78 X-Received: by 2002:a63:4f20:: with SMTP id d32mr13336482pgb.47.1545681480691; Mon, 24 Dec 2018 11:58:00 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1545681480; cv=none; d=google.com; s=arc-20160816; b=o4zdfhb2rjmi3Ty1OJhrK9ofTworYQvPfsV5qVEnk5ZY80TMlmRfSxAauotn1mI+o/ OfY7EVsnTtg8nr/2+MTGGDXeN++fUUJFmKeNnHPdB/DudxV/pCQ7vz/Sx86b2ljdNeah d8ABUmaYpADqi+fbStR07eJ5xQfWCdSA1hTLaKA2UvR+7KoWngft7ce+/iA+L+1OH5/P /Y5mK+POXomTlM11NIQwPTW0I+Z+OxEn+6Y2EaBgoEwSVFnZqcWcBr3yBZMTxwi14MdM nqL6y79h85Ob2U9sQf4sOghgcyha1XF5DoECwnJptCJbWfD4krdLWEmKXUD1wgPER5sX lfRA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:message-id :subject:cc:to:from:date; bh=d4a4Cj0exJBeRsqIAePdh4hu/lIREKRTRxSl+xV2dN4=; b=hog1K78/k7X5yBdVyPXbyWeXynpQdQmRXXhGTgGVObKr51862eI9LuM3La4TgElQJ1 MmM5RKAaeqvX1yzdoGFskmQqqtqvbQ2oNvPMU9oeM/fC7qy5zAzPRiWwa5uky6YD9xTA KiLITGNU3VC2oHPzx3BYIGGawIWhV/ZvhZlOnthGfJKZlAm2FcTPVhqA4GnF/O8XYW4h eecDClJr8wSRRoknmZnoMUt69q1VNiC+L/ZHKoVNwRgPn2UgK7B3vBYFOKf7PL91lf9g pVf7eirqxyHgSKoGq+y1Z1XPRfBAnrKXoJ3guuKH3zoCLBcrWMMJ0XqLj1/NyOnpywNE 6zLw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x11si26845085plv.321.2018.12.24.11.57.33; Mon, 24 Dec 2018 11:58:00 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725814AbeLXTzC (ORCPT + 99 others); Mon, 24 Dec 2018 14:55:02 -0500 Received: from namei.org ([65.99.196.166]:53132 "EHLO namei.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725786AbeLXTzC (ORCPT ); Mon, 24 Dec 2018 14:55:02 -0500 Received: from localhost (localhost [127.0.0.1]) by namei.org (8.14.4/8.14.4) with ESMTP id wBOJt0u1002778; Mon, 24 Dec 2018 19:55:00 GMT Date: Tue, 25 Dec 2018 06:55:00 +1100 (AEDT) From: James Morris To: Linus Torvalds cc: linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org Subject: [GIT PULL] security: general updates for v4.21 Message-ID: User-Agent: Alpine 2.21 (LRH 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Linus, Please pull these general updates for the security subsystem for v4.21. The main changes here are Paul Gortmaker's removal of unneccesary module.h infrastructure. The following changes since commit 7566ec393f4161572ba6f11ad5171fd5d59b0fbd: Linux 4.20-rc7 (2018-12-16 15:46:55 -0800) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security.git next-general for you to fetch changes up to b49d564344f773d8afee982153c8493e5f2eaf38: security: integrity: partial revert of make ima_main explicitly non-modular (2018-12-20 09:59:12 -0800) ---------------------------------------------------------------- James Morris (2): Merge tag 'v4.20-rc2' into next-general Merge tag 'v4.20-rc7' into next-general Paul Gortmaker (6): security: integrity: make ima_main explicitly non-modular keys: remove needless modular infrastructure from ecryptfs_format security: integrity: make evm_main explicitly non-modular security: audit and remove any unnecessary uses of module.h security: fs: make inode explicitly non-modular security: integrity: partial revert of make ima_main explicitly non-modular Yangtao Li (1): tomoyo: fix small typo security/apparmor/apparmorfs.c | 2 +- security/commoncap.c | 1 - security/inode.c | 6 ++---- security/integrity/evm/evm_crypto.c | 2 +- security/integrity/evm/evm_main.c | 5 +---- security/integrity/evm/evm_posix_acl.c | 1 - security/integrity/evm/evm_secfs.c | 2 +- security/integrity/iint.c | 2 +- security/integrity/ima/ima_api.c | 1 - security/integrity/ima/ima_appraise.c | 2 +- security/integrity/ima/ima_fs.c | 2 +- security/integrity/ima/ima_init.c | 2 +- security/integrity/ima/ima_main.c | 5 ++--- security/integrity/ima/ima_policy.c | 2 +- security/integrity/ima/ima_queue.c | 1 - security/keys/encrypted-keys/ecryptfs_format.c | 5 ++--- security/keys/encrypted-keys/masterkey_trusted.c | 1 - security/keys/gc.c | 1 - security/keys/key.c | 2 +- security/keys/keyctl.c | 1 - security/keys/keyring.c | 2 +- security/keys/permission.c | 2 +- security/keys/proc.c | 1 - security/keys/process_keys.c | 1 - security/keys/request_key.c | 2 +- security/keys/request_key_auth.c | 1 - security/keys/user_defined.c | 2 +- security/security.c | 2 +- security/tomoyo/util.c | 2 +- 29 files changed, 22 insertions(+), 39 deletions(-)