[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1385415160.2357.17.camel@dhcp-9-2-203-236.watson.ibm.com>
Date: Mon, 25 Nov 2013 16:32:40 -0500
From: Mimi Zohar <zohar@...ux.vnet.ibm.com>
To: Shuah Khan <shuahkhan@...il.com>
Cc: Roberto Sassu <roberto.sassu@...ito.it>,
James Morris <jmorris@...ei.org>,
linux-security-module <linux-security-module@...r.kernel.org>,
linux-kernel <linux-kernel@...r.kernel.org>
Subject: Re: [GIT PULL v3] ima: bug fixes for Linus
On Mon, 2013-11-25 at 13:54 -0700, Shuah Khan wrote:
> Mimi,
>
> Do you have fix for the following build error as well.
>
> CC security/integrity/digsig.o
> security/integrity/digsig.c:70:5: error: redefinition of
> ‘integrity_init_keyring’
> int integrity_init_keyring(const unsigned int id)
> ^
> In file included from security/integrity/digsig.c:22:0:
> security/integrity/integrity.h:149:12: note: previous definition of
> ‘integrity_init_keyring’ was here
> static int integrity_init_keyring(const unsigned int id)
> ^
> security/integrity/integrity.h:149:12: warning:
> ‘integrity_init_keyring’ defined but not used [-Wunused-function]
> make[2]: *** [security/integrity/digsig.o] Error 1
> make[1]: *** [security/integrity] Error 2
> make: *** [security] Error 2
>
> I noticed the problem in linux-next and sent patch to fix it:
>
> https://lkml.org/lkml/2013/11/8/441
>
> I think It has been noticed in 3.13-rc1 as well.
Thanks, Shuah. As much as I wanted to extend the UEFI secure boot
signature chain of trust to IMA-appraisal, there are still a couple of
trusted keyring issues that need to be addressed. For now, Linus has
reverted this patch.
thanks,
Mimi
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists