Minor fixes for v5.9.

-----BEGIN PGP SIGNATURE-----
 
 iQIzBAABCAAdFiEEgycj0O+d1G2aycA8rZhLv9lQBTwFAl8xl0QACgkQrZhLv9lQ
 BTzEUA/+Muf7gha2mtxGJ49ZX/AsUOi/feHFDjt+NEA6lQTIaaqU5LxXNdtARu/5
 j+RlJkrw8+3QGJ4h544HIJodbLZHghWpp15AxBAy+1BaeAoswEnrW2/6mD1iUBEH
 pFI0P2OjnVYxEPJGubLhp4qQ0lnqVKwzciNbBDLMydr6SerwoPDz9h0h5SMDoOxF
 m4f1/dsoXrpyp86GSvHDVa9NRs/GMKz/qIeC6DXuMRoqGX15EZVV1iABC7vPd2we
 84IacCRIE/DO1M1rmbNBSpeErmvkxRo00Qjupl0XGf7D4aazxnQl+RpaLdHAtBI1
 ubzU/76DCkaCO1x+3KPHyQUHZvXa3dt0/n4yEkOv01RIzivKZZz6jahsCrbX6lzX
 Dq4n0zg8sA7vh/T7aNX77z0FU1TuFBpiJ8dn/0vUgJPxDwt2V9F2k9jyV1pUeK1V
 yvSkIleIQmwmuT0p2nB/1g7yE5xkvWTM5WOy8/zIQj2aCvuo3ToY06Qc0rNOKTa8
 6Qi/Byi/5S1bBwYQqrAyrd5GhPVdZ8oNZyaUu8Mpm+4P0+2CquvDfN3ZHUxwILNX
 /TMVTVMu1PQQIltWANA0L0BjGIjSGxutisEUQL7o24566GXA3wTQd8HoKRBc6h+p
 DGeVMehPG7GIwoCIvuzdahSRdzzI/iBG3P10TZ5u+3BwTL0OUNY=
 =s2Jw
 -----END PGP SIGNATURE-----

Merge tag 'for-v5.9' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security

Pull security subsystem updates from James Morris:
 "A couple of minor documentation updates only for this release"

* tag 'for-v5.9' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security:
  LSM: drop duplicated words in header file comments
  Replace HTTP links with HTTPS ones: security
This commit is contained in:
Linus Torvalds 2020-08-11 14:30:36 -07:00
commit ce13266d97
12 changed files with 12 additions and 12 deletions

View File

@ -15,7 +15,7 @@
*/ */
/* /*
* The macro LSM_HOOK is used to define the data structures required by the * The macro LSM_HOOK is used to define the data structures required by
* the LSM framework using the pattern: * the LSM framework using the pattern:
* *
* LSM_HOOK(<return_type>, <default_value>, <hook_name>, args...) * LSM_HOOK(<return_type>, <default_value>, <hook_name>, args...)

View File

@ -815,7 +815,7 @@
* structure. Note that the security field was not added directly to the * structure. Note that the security field was not added directly to the
* socket structure, but rather, the socket security information is stored * socket structure, but rather, the socket security information is stored
* in the associated inode. Typically, the inode alloc_security hook will * in the associated inode. Typically, the inode alloc_security hook will
* allocate and and attach security information to * allocate and attach security information to
* SOCK_INODE(sock)->i_security. This hook may be used to update the * SOCK_INODE(sock)->i_security. This hook may be used to update the
* SOCK_INODE(sock)->i_security field with additional information that * SOCK_INODE(sock)->i_security field with additional information that
* wasn't available when the inode was allocated. * wasn't available when the inode was allocated.

View File

@ -118,7 +118,7 @@ config INTEL_TXT
it was configured with, especially since they may be responsible for it was configured with, especially since they may be responsible for
providing such assurances to VMs and services running on it. providing such assurances to VMs and services running on it.
See <http://www.intel.com/technology/security/> for more information See <https://www.intel.com/technology/security/> for more information
about Intel(R) TXT. about Intel(R) TXT.
See <http://tboot.sourceforge.net> for more information about tboot. See <http://tboot.sourceforge.net> for more information about tboot.
See Documentation/x86/intel_txt.rst for a description of how to enable See Documentation/x86/intel_txt.rst for a description of how to enable

View File

@ -77,7 +77,7 @@ config SECURITY_APPARMOR_KUNIT_TEST
This builds the AppArmor KUnit tests. This builds the AppArmor KUnit tests.
KUnit tests run during boot and output the results to the debug log KUnit tests run during boot and output the results to the debug log
in TAP format (http://testanything.org/). Only useful for kernel devs in TAP format (https://testanything.org/). Only useful for kernel devs
running KUnit test harness and are not for inclusion into a running KUnit test harness and are not for inclusion into a
production build. production build.

View File

@ -26,7 +26,7 @@ config IMA
an aggregate integrity value over this list inside the an aggregate integrity value over this list inside the
TPM hardware, so that the TPM can prove to a third party TPM hardware, so that the TPM can prove to a third party
whether or not critical system files have been modified. whether or not critical system files have been modified.
Read <http://www.usenix.org/events/sec04/tech/sailer.html> Read <https://www.usenix.org/events/sec04/tech/sailer.html>
to learn more about IMA. to learn more about IMA.
If unsure, say N. If unsure, say N.

View File

@ -1,7 +1,7 @@
// SPDX-License-Identifier: GPL-2.0-only // SPDX-License-Identifier: GPL-2.0-only
/* /*
* Copyright (C) 2013 Politecnico di Torino, Italy * Copyright (C) 2013 Politecnico di Torino, Italy
* TORSEC group -- http://security.polito.it * TORSEC group -- https://security.polito.it
* *
* Author: Roberto Sassu <roberto.sassu@polito.it> * Author: Roberto Sassu <roberto.sassu@polito.it>
* *

View File

@ -1,7 +1,7 @@
// SPDX-License-Identifier: GPL-2.0-only // SPDX-License-Identifier: GPL-2.0-only
/* /*
* Copyright (C) 2013 Politecnico di Torino, Italy * Copyright (C) 2013 Politecnico di Torino, Italy
* TORSEC group -- http://security.polito.it * TORSEC group -- https://security.polito.it
* *
* Author: Roberto Sassu <roberto.sassu@polito.it> * Author: Roberto Sassu <roberto.sassu@polito.it>
* *

View File

@ -1,7 +1,7 @@
/* SPDX-License-Identifier: GPL-2.0-only */ /* SPDX-License-Identifier: GPL-2.0-only */
/* /*
* Copyright (C) 2013 Politecnico di Torino, Italy * Copyright (C) 2013 Politecnico di Torino, Italy
* TORSEC group -- http://security.polito.it * TORSEC group -- https://security.polito.it
* *
* Author: Roberto Sassu <roberto.sassu@polito.it> * Author: Roberto Sassu <roberto.sassu@polito.it>
* *

View File

@ -4,7 +4,7 @@
* *
* Copyright (C) 2006 International Business Machines Corp. * Copyright (C) 2006 International Business Machines Corp.
* Copyright (C) 2010 Politecnico di Torino, Italy * Copyright (C) 2010 Politecnico di Torino, Italy
* TORSEC group -- http://security.polito.it * TORSEC group -- https://security.polito.it
* *
* Authors: * Authors:
* Michael A. Halcrow <mahalcro@us.ibm.com> * Michael A. Halcrow <mahalcro@us.ibm.com>

View File

@ -4,7 +4,7 @@
* *
* Copyright (C) 2006 International Business Machines Corp. * Copyright (C) 2006 International Business Machines Corp.
* Copyright (C) 2010 Politecnico di Torino, Italy * Copyright (C) 2010 Politecnico di Torino, Italy
* TORSEC group -- http://security.polito.it * TORSEC group -- https://security.polito.it
* *
* Authors: * Authors:
* Michael A. Halcrow <mahalcro@us.ibm.com> * Michael A. Halcrow <mahalcro@us.ibm.com>

View File

@ -2,7 +2,7 @@
/* /*
* Copyright (C) 2010 IBM Corporation * Copyright (C) 2010 IBM Corporation
* Copyright (C) 2010 Politecnico di Torino, Italy * Copyright (C) 2010 Politecnico di Torino, Italy
* TORSEC group -- http://security.polito.it * TORSEC group -- https://security.polito.it
* *
* Authors: * Authors:
* Mimi Zohar <zohar@us.ibm.com> * Mimi Zohar <zohar@us.ibm.com>

View File

@ -2,7 +2,7 @@
/* /*
* Copyright (C) 2010 IBM Corporation * Copyright (C) 2010 IBM Corporation
* Copyright (C) 2010 Politecnico di Torino, Italy * Copyright (C) 2010 Politecnico di Torino, Italy
* TORSEC group -- http://security.polito.it * TORSEC group -- https://security.polito.it
* *
* Authors: * Authors:
* Mimi Zohar <zohar@us.ibm.com> * Mimi Zohar <zohar@us.ibm.com>