Message ID | 20240402092108.2520373-1-roberto.sassu@huaweicloud.com (mailing list archive) |
---|---|
State | Superseded |
Headers | show |
Series | [GIT,PULL] security changes for v6.9-rc3 | expand |
On Tue, 2024-04-02 at 11:21 +0200, Roberto Sassu wrote: > From: Roberto Sassu <roberto.sassu@huawei.com> > > Hi Linus > > I have a small bug fix for this kernel version. Please pull. Ops, there is a spurious 'i' in the referenced commit ID, in the commit message. Please discard, will send a new pull request shortly. Roberto > PS: sorry for the email mismatch, @huawei.com emails resent from the > mailing list are classified by Gmail as spam, we are working on > fixing it. > > Thanks > > Roberto > > > The following changes since commit 026e680b0a08a62b1d948e5a8ca78700bfac0e6e: > > Merge tag 'pwm/for-6.9-rc3-fixes' of git://git.kernel.org/pub/scm/linux/kernel/git/ukleinek/linux (2024-04-01 14:38:55 -0700) > > are available in the Git repository at: > > https://github.com/linux-integrity/linux.git tags/security-mknod-6.9-rc3 > > for you to fetch changes up to 12d665b7d3fa743ec58160ceda8421d64b63f272: > > security: Handle dentries without inode in security_path_post_mknod() (2024-04-02 10:01:19 +0200) > > ---------------------------------------------------------------- > Here is a simple follow-up patch for the patch set to move IMA and EVM to > the LSM infrastructure. > > It fixes a kernel panic in the newly introduced function > security_path_post_mknod(), when trying to check if an inode is private. > The panic occurs because not all dentries have an inode attached to them. > > I'm sending this PR as IMA/EVM co-maintainer, even if the patch also > touches the LSM infrastructure itself (it is acked by Paul). > > Signed-off-by: Roberto Sassu <roberto.sassu@huawei.com> > > ---------------------------------------------------------------- > Roberto Sassu (1): > security: Handle dentries without inode in security_path_post_mknod() > > security/integrity/evm/evm_main.c | 6 ++++-- > security/integrity/ima/ima_main.c | 5 +++-- > security/security.c | 5 ++++- > 3 files changed, 11 insertions(+), 5 deletions(-) >