First  |  Prev |  Next  |  Last
Pages: 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447
[PATCH 6/6] staging: tidspbridge: remove dbdefs.h
From: Menon, Nishanth <nm(a)ti.com> Remove yet another custom definition header Signed-off-by: Nishanth Menon <nm(a)ti.com> --- .../staging/tidspbridge/include/dspbridge/dbdefs.h | 1 - .../staging/tidspbridge/include/dspbridge/dbtype.h | 69 -------------------- .../tidspbridge/include/dspbridge/host_os.h ... 22 Jul 2010 18:01
[PATCH] gpio: remove spurious gpio_unexport debug error.
Make gpio_unexport generate success instead of an -EINVAL if asked to unexport a line which is not exported, because the only result of that condition is a pr_debug which complains of what is really a harmless no-op: when an unexported gpio is unexported again, nothing happens. That's not a failure, just a trivial... 22 Jul 2010 18:00
wdt_pci.c: move ids to pci_ids.h
Hi H Hartley, Patch added to linux-2.6-watchdog-next . Kind regards, Wim. Move the VENDOR/DEVICE ids to pci_ids.h. Signed-off-by: H Hartley Sweeten <hsweeten(a)visionengravers.com> Cc: Wim Van Sebroeck <wim(a)iguana.be> Cc: Jesse Barnes <jbarnes(a)virtuousgeek.org> --- diff --git a/driv... 22 Jul 2010 18:00
[PATCH v2 10/14] ima: integrity appraisal extension
This patch adds local measurement integrity appraisal to IMA. (Taken from the original EVM postings.) New is the creation and maintainance of an extended attribute 'security.ima' containing the file hash measurement. Protection of the xattr is provided by EVM, if enabled and configured. Based on policy, IMA cal... 22 Jul 2010 16:55
[PATCH v2 09/14] fs: add evm_inode_post_init calls
After creating the initial LSM security extended attribute, call evm_inode_post_init_security() to create the 'security.evm' extended attribute. (Support for other fs still needed.) Signed-off-by: Mimi Zohar <zohar(a)us.ibm.com> Acked-by: Serge Hallyn <serue(a)us.ibm.com> --- fs/ext2/xattr_security.c | 31 +++... 22 Jul 2010 16:55
[PATCH v2 14/14] ima: appraise measurement required
Even if allowed to update security.ima, reset the appraisal flags, forcing re-appraisal. Signed-off-by: Mimi Zohar <zohar(a)us.ibm.com> --- security/integrity/ima/ima_main.c | 33 +++++++++++++++++++++++++++++++-- 1 files changed, 31 insertions(+), 2 deletions(-) diff --git a/security/integrity/ima/ima_main.... 22 Jul 2010 16:55
gfs2: use workqueue instead of slow-work
On 07/20/2010 10:35 PM, Tejun Heo wrote: Workqueue can now handle high concurrency. Convert gfs to use workqueue instead of slow-work. * Steven pointed out that recovery path might be run from allocation path and thus requires forward progress guarantee without memory allocation. Create and use... 23 Jul 2010 08:05
[PATCH v2 08/14] evm: inode_post_init
Initialize 'security.evm' for new files. Reduce number of arguments by defining 'struct xattr'. Signed-off-by: Mimi Zohar <zohar(a)us.ibm.com> Acked-by: Serge Hallyn <serue(a)us.ibm.com> --- include/linux/evm.h | 11 ++++++++++ include/linux/xattr.h | 6 +++++ security/integrity... 22 Jul 2010 16:55
[PATCH v2 03/14] evm: re-release
EVM protects a file's security extended attributes against integrity attacks. It maintains an HMAC-sha1 value across the extended attributes, storing the value as the extended attribute 'security.evm'. EVM has gone through a number of iterations, initially as an LSM module, subsequently as a LIM integrity provider,... 22 Jul 2010 16:55
[PATCH v2 13/14] ima: add ima_inode_setxattr and ima_inode_removexattr
Based on xattr_permission comments, the restriction to modify 'security' xattr is left up to the underlying fs or lsm. Ensure that not just anyone can modify or remove 'security.ima'. Changelog: - static inline ima_inode_setxattr()/ima_inode_removexattr() stubs - ima_protect_xattr should be static Signed-... 22 Jul 2010 16:55
First  |  Prev |  Next  |  Last
Pages: 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447