lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 27 Nov 2020 15:17:12 +0800 From: Zheng Zengkai <zhengzengkai@...wei.com> To: Tetsuo Handa <penguin-kernel@...ove.sakura.ne.jp> CC: <linux-security-module@...r.kernel.org>, <linux-kernel@...r.kernel.org>, <jmorris@...ei.org>, <serge@...lyn.com>, <weiyongjun1@...wei.com> Subject: Re: [PATCH] tomoyo: Avoid potential null pointer access Hello Tetsuo, > On 2020/11/26 15:33, Zheng Zengkai wrote: >> As your say, I found the function tomoyo_assign_namespace( ) >> >> in security/tomoyo/domain.c has the similar situation, >> >> Can I add __GFP_NOWARN for both and remove the null check for _entry_ in tomoyo_assign_namespace( )? >> > Good catch. Yes, please send as a patch. > . I have resent a patch, thanks!
Powered by blists - more mailing lists