On Thu, Apr 30, 2020 at 8:46 PM James Morris wrote:
>
> On Thu, 30 Apr 2020, KP Singh wrote:
>
> > From: KP Singh
> >
>
> Applied to:
> git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security.git
> for-v5.7
>
James,
could you please send PR to Linus this week to make sure
the fix
On 30/04/2020 18:52, KP Singh wrote:
This was noticed when lsm=bpf is supplied on the command line before any
other LSM. As the bpf lsm uses this default value to implement a default
hook, this resulted in a failure to parse any fs_context parameters and
a failure to mount the root
On Thu, 30 Apr 2020, KP Singh wrote:
> From: KP Singh
>
Applied to:
git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security.git
for-v5.7
--
James Morris
From: KP Singh
security_fs_context_parse_param is called by vfs_parse_fs_param and
a succussful return value (i.e 0) implies that a parameter will be
consumed by the LSM framework. This stops all further parsing of the
parmeter by VFS. Furthermore, if an LSM hook returns a success, the
remaining
4 matches
Mail list logo