Merge tag 'for-v5.9' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux...
authorLinus Torvalds <torvalds@linux-foundation.org>
Tue, 11 Aug 2020 21:30:36 +0000 (14:30 -0700)
committerLinus Torvalds <torvalds@linux-foundation.org>
Tue, 11 Aug 2020 21:30:36 +0000 (14:30 -0700)
Pull security subsystem updates from James Morris:
 "A couple of minor documentation updates only for this release"

* tag 'for-v5.9' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security:
  LSM: drop duplicated words in header file comments
  Replace HTTP links with HTTPS ones: security

12 files changed:
include/linux/lsm_hook_defs.h
include/linux/lsm_hooks.h
security/Kconfig
security/apparmor/Kconfig
security/integrity/ima/Kconfig
security/integrity/ima/ima_template.c
security/integrity/ima/ima_template_lib.c
security/integrity/ima/ima_template_lib.h
security/keys/encrypted-keys/ecryptfs_format.c
security/keys/encrypted-keys/ecryptfs_format.h
security/keys/encrypted-keys/encrypted.c
security/keys/encrypted-keys/masterkey_trusted.c

index af998f93d256073e03e8adef0fc3d69a8cc9ecd8..2a8c74d99015b6900b47c43ff0a4ab14dccc43de 100644 (file)
@@ -15,7 +15,7 @@
  */
 
 /*
- * The macro LSM_HOOK is used to define the data structures required by the
+ * The macro LSM_HOOK is used to define the data structures required by
  * the LSM framework using the pattern:
  *
  *     LSM_HOOK(<return_type>, <default_value>, <hook_name>, args...)
index 95b7c1d320621824a4b4f8c73edc5718a0c89c8d..9e2e3e63719df1e3e8a85205ac26eee16b970f9a 100644 (file)
  *     structure. Note that the security field was not added directly to the
  *     socket structure, but rather, the socket security information is stored
  *     in the associated inode.  Typically, the inode alloc_security hook will
- *     allocate and and attach security information to
+ *     allocate and attach security information to
  *     SOCK_INODE(sock)->i_security.  This hook may be used to update the
  *     SOCK_INODE(sock)->i_security field with additional information that
  *     wasn't available when the inode was allocated.
index cd3cc7da3a55d9134186278d59c3df403a4b3863..7561f6f99f1d294d354f6c58cd46f58006e5f29b 100644 (file)
@@ -118,7 +118,7 @@ config INTEL_TXT
          it was configured with, especially since they may be responsible for
          providing such assurances to VMs and services running on it.
 
-         See <http://www.intel.com/technology/security/> for more information
+         See <https://www.intel.com/technology/security/> for more information
          about Intel(R) TXT.
          See <http://tboot.sourceforge.net> for more information about tboot.
          See Documentation/x86/intel_txt.rst for a description of how to enable
index 03fae1bd48a67ce3549c4bf03c7ebb3979d99081..348ed6cfa08a02f2d0aad87b2c552cb46913542f 100644 (file)
@@ -77,7 +77,7 @@ config SECURITY_APPARMOR_KUNIT_TEST
          This builds the AppArmor KUnit tests.
 
          KUnit tests run during boot and output the results to the debug log
-         in TAP format (http://testanything.org/). Only useful for kernel devs
+         in TAP format (https://testanything.org/). Only useful for kernel devs
          running KUnit test harness and are not for inclusion into a
          production build.
 
index 080c53545ff0bff174b45f7cce413669b2a644eb..12e9250c1bec6df47fca002ed4acdd085eef02e0 100644 (file)
@@ -26,7 +26,7 @@ config IMA
          an aggregate integrity value over this list inside the
          TPM hardware, so that the TPM can prove to a third party
          whether or not critical system files have been modified.
-         Read <http://www.usenix.org/events/sec04/tech/sailer.html>
+         Read <https://www.usenix.org/events/sec04/tech/sailer.html>
          to learn more about IMA.
          If unsure, say N.
 
index 5a2def40a733702cf60bd2bdb970df5c1d7902fd..1e89e2d3851f997f5f455c3e82f9854932b3280b 100644 (file)
@@ -1,7 +1,7 @@
 // SPDX-License-Identifier: GPL-2.0-only
 /*
  * Copyright (C) 2013 Politecnico di Torino, Italy
- *                    TORSEC group -- http://security.polito.it
+ *                    TORSEC group -- https://security.polito.it
  *
  * Author: Roberto Sassu <roberto.sassu@polito.it>
  *
index 635c6ac050502533560b6ba58e9d2a28282495b3..41a5f435b793fe2c655f982ae99fa4346db94999 100644 (file)
@@ -1,7 +1,7 @@
 // SPDX-License-Identifier: GPL-2.0-only
 /*
  * Copyright (C) 2013 Politecnico di Torino, Italy
- *                    TORSEC group -- http://security.polito.it
+ *                    TORSEC group -- https://security.polito.it
  *
  * Author: Roberto Sassu <roberto.sassu@polito.it>
  *
index 9a88c79a7a61a62c691d97f938f6e10b5efd177a..6b3b880637a0c9baec28be5806ffe29ca7093dd1 100644 (file)
@@ -1,7 +1,7 @@
 /* SPDX-License-Identifier: GPL-2.0-only */
 /*
  * Copyright (C) 2013 Politecnico di Torino, Italy
- *                    TORSEC group -- http://security.polito.it
+ *                    TORSEC group -- https://security.polito.it
  *
  * Author: Roberto Sassu <roberto.sassu@polito.it>
  *
index a7339d4de8114f7213c7f3a9ebede05a25442db1..8fdd76105ce343ed52651e4a03fedd6b1d3055fc 100644 (file)
@@ -4,7 +4,7 @@
  *
  * Copyright (C) 2006 International Business Machines Corp.
  * Copyright (C) 2010 Politecnico di Torino, Italy
- *                    TORSEC group -- http://security.polito.it
+ *                    TORSEC group -- https://security.polito.it
  *
  * Authors:
  * Michael A. Halcrow <mahalcro@us.ibm.com>
index 939621d870e43bffa40027480f1984cc829c05bf..ed846657861603e455af561576f4dd7e1a9cfacd 100644 (file)
@@ -4,7 +4,7 @@
  *
  * Copyright (C) 2006 International Business Machines Corp.
  * Copyright (C) 2010 Politecnico di Torino, Italy
- *                    TORSEC group -- http://security.polito.it
+ *                    TORSEC group -- https://security.polito.it
  *
  * Authors:
  * Michael A. Halcrow <mahalcro@us.ibm.com>
index deebbf14eeca194f9428a9ca3f95f5fbfbf987d8..192e531c146f5c5b4ab922bd5591dc6f9d0217e1 100644 (file)
@@ -2,7 +2,7 @@
 /*
  * Copyright (C) 2010 IBM Corporation
  * Copyright (C) 2010 Politecnico di Torino, Italy
- *                    TORSEC group -- http://security.polito.it
+ *                    TORSEC group -- https://security.polito.it
  *
  * Authors:
  * Mimi Zohar <zohar@us.ibm.com>
index c68528aa49c6dc3369d3c36beba29687dec059be..e6d22ce77e98ff55764892c781410e709b1d56e4 100644 (file)
@@ -2,7 +2,7 @@
 /*
  * Copyright (C) 2010 IBM Corporation
  * Copyright (C) 2010 Politecnico di Torino, Italy
- *                    TORSEC group -- http://security.polito.it
+ *                    TORSEC group -- https://security.polito.it
  *
  * Authors:
  * Mimi Zohar <zohar@us.ibm.com>