[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <745ac819-f2ae-4525-1855-535daf783638@schaufler-ca.com>
Date: Mon, 23 Sep 2019 13:14:33 -0700
From: Casey Schaufler <casey@...aufler-ca.com>
To: Linus Torvalds <torvalds@...ux-foundation.org>
Cc: Linux Security Module list
<linux-security-module@...r.kernel.org>,
LKML <linux-kernel@...r.kernel.org>, casey@...aufler-ca.com
Subject: [GIT PULL] Smack patches for v5.4 - retry
Hello Linus
Thank for the instruction. I think this is correct.
I have four patches for v5.4. Nothing is major. All but one are in
response to mechanically detected potential issues. The remaining
patch cleans up kernel-doc notations.
The following changes since commit 0ecfebd2b52404ae0c54a878c872bb93363ada36:
Linux 5.2 (2019-07-07 15:41:56 -0700)
are available in the Git repository at:
https://github.com/cschaufler/smack-next.git tags/smack-for-5.4-rc1
for you to fetch changes up to e5bfad3d7acc5702f32aafeb388362994f4d7bd0:
smack: use GFP_NOFS while holding inode_smack::smk_lock (2019-09-04 09:37:07 -0700)
----------------------------------------------------------------
I have four patches for v5.4. Nothing is major. All but one are in
response to mechanically detected potential issues. The remaining
patch cleans up kernel-doc notations.
----------------------------------------------------------------
Eric Biggers (1):
smack: use GFP_NOFS while holding inode_smack::smk_lock
Jann Horn (1):
Smack: Don't ignore other bprm->unsafe flags if LSM_UNSAFE_PTRACE is set
Jia-Ju Bai (1):
security: smack: Fix possible null-pointer dereferences in smack_socket_sock_rcv_skb()
luanshi (1):
smack: fix some kernel-doc notations
security/smack/smack_access.c | 6 +++---
security/smack/smack_lsm.c | 40 ++++++++++++++++++++--------------------
2 files changed, 23 insertions(+), 23 deletions(-)
Powered by blists - more mailing lists