Re: [PATCH bpf] security: Fix the default value of fs_context_parse_param hook

2020-05-06 Thread Alexei Starovoitov
On Thu, Apr 30, 2020 at 8:46 PM James Morris wrote: > > On Thu, 30 Apr 2020, KP Singh wrote: > > > From: KP Singh > > > > Applied to: > git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security.git > for-v5.7 > James, could you please send PR to Linus this week to make sure the fix

Re: [PATCH bpf] security: Fix the default value of fs_context_parse_param hook

2020-05-01 Thread Mikko Ylinen
On 30/04/2020 18:52, KP Singh wrote: This was noticed when lsm=bpf is supplied on the command line before any other LSM. As the bpf lsm uses this default value to implement a default hook, this resulted in a failure to parse any fs_context parameters and a failure to mount the root

Re: [PATCH bpf] security: Fix the default value of fs_context_parse_param hook

2020-04-30 Thread James Morris
On Thu, 30 Apr 2020, KP Singh wrote: > From: KP Singh > Applied to: git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security.git for-v5.7 -- James Morris

[PATCH bpf] security: Fix the default value of fs_context_parse_param hook

2020-04-30 Thread KP Singh
From: KP Singh security_fs_context_parse_param is called by vfs_parse_fs_param and a succussful return value (i.e 0) implies that a parameter will be consumed by the LSM framework. This stops all further parsing of the parmeter by VFS. Furthermore, if an LSM hook returns a success, the remaining