diff options
author | Linus Torvalds <torvalds@linux-foundation.org> | 2015-11-05 18:32:38 -0500 |
---|---|---|
committer | Linus Torvalds <torvalds@linux-foundation.org> | 2015-11-05 18:32:38 -0500 |
commit | 1873499e13648a2dd01a394ed3217c9290921b3d (patch) | |
tree | 3a662aadb3c02bbce2e9231a90da6e98b54d33d4 /net/ceph | |
parent | 3460b01b12aaf0011cb30f6f502edd05752f70eb (diff) | |
parent | ba94c3ff20c9c179f2a80f0e4c71e1571ebbf5c7 (diff) |
Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security
Pull security subsystem update from James Morris:
"This is mostly maintenance updates across the subsystem, with a
notable update for TPM 2.0, and addition of Jarkko Sakkinen as a
maintainer of that"
* 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security: (40 commits)
apparmor: clarify CRYPTO dependency
selinux: Use a kmem_cache for allocation struct file_security_struct
selinux: ioctl_has_perm should be static
selinux: use sprintf return value
selinux: use kstrdup() in security_get_bools()
selinux: use kmemdup in security_sid_to_context_core()
selinux: remove pointless cast in selinux_inode_setsecurity()
selinux: introduce security_context_str_to_sid
selinux: do not check open perm on ftruncate call
selinux: change CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE default
KEYS: Merge the type-specific data with the payload data
KEYS: Provide a script to extract a module signature
KEYS: Provide a script to extract the sys cert list from a vmlinux file
keys: Be more consistent in selection of union members used
certs: add .gitignore to stop git nagging about x509_certificate_list
KEYS: use kvfree() in add_key
Smack: limited capability for changing process label
TPM: remove unnecessary little endian conversion
vTPM: support little endian guests
char: Drop owner assignment from i2c_driver
...
Diffstat (limited to 'net/ceph')
-rw-r--r-- | net/ceph/ceph_common.c | 2 | ||||
-rw-r--r-- | net/ceph/crypto.c | 6 |
2 files changed, 4 insertions, 4 deletions
diff --git a/net/ceph/ceph_common.c b/net/ceph/ceph_common.c index 54a00d66509e..78f098a20796 100644 --- a/net/ceph/ceph_common.c +++ b/net/ceph/ceph_common.c | |||
@@ -318,7 +318,7 @@ static int get_secret(struct ceph_crypto_key *dst, const char *name) { | |||
318 | goto out; | 318 | goto out; |
319 | } | 319 | } |
320 | 320 | ||
321 | ckey = ukey->payload.data; | 321 | ckey = ukey->payload.data[0]; |
322 | err = ceph_crypto_key_clone(dst, ckey); | 322 | err = ceph_crypto_key_clone(dst, ckey); |
323 | if (err) | 323 | if (err) |
324 | goto out_key; | 324 | goto out_key; |
diff --git a/net/ceph/crypto.c b/net/ceph/crypto.c index 4440edcce0d6..42e8649c6e79 100644 --- a/net/ceph/crypto.c +++ b/net/ceph/crypto.c | |||
@@ -537,7 +537,7 @@ static int ceph_key_preparse(struct key_preparsed_payload *prep) | |||
537 | if (ret < 0) | 537 | if (ret < 0) |
538 | goto err_ckey; | 538 | goto err_ckey; |
539 | 539 | ||
540 | prep->payload[0] = ckey; | 540 | prep->payload.data[0] = ckey; |
541 | prep->quotalen = datalen; | 541 | prep->quotalen = datalen; |
542 | return 0; | 542 | return 0; |
543 | 543 | ||
@@ -549,14 +549,14 @@ err: | |||
549 | 549 | ||
550 | static void ceph_key_free_preparse(struct key_preparsed_payload *prep) | 550 | static void ceph_key_free_preparse(struct key_preparsed_payload *prep) |
551 | { | 551 | { |
552 | struct ceph_crypto_key *ckey = prep->payload[0]; | 552 | struct ceph_crypto_key *ckey = prep->payload.data[0]; |
553 | ceph_crypto_key_destroy(ckey); | 553 | ceph_crypto_key_destroy(ckey); |
554 | kfree(ckey); | 554 | kfree(ckey); |
555 | } | 555 | } |
556 | 556 | ||
557 | static void ceph_key_destroy(struct key *key) | 557 | static void ceph_key_destroy(struct key *key) |
558 | { | 558 | { |
559 | struct ceph_crypto_key *ckey = key->payload.data; | 559 | struct ceph_crypto_key *ckey = key->payload.data[0]; |
560 | 560 | ||
561 | ceph_crypto_key_destroy(ckey); | 561 | ceph_crypto_key_destroy(ckey); |
562 | kfree(ckey); | 562 | kfree(ckey); |