Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp2616831yba; Fri, 10 May 2019 15:11:16 -0700 (PDT) X-Google-Smtp-Source: APXvYqzNTM3TDdaTMpp/is+FuBmnKWXvgqfRXTR0p+IJhMGtf0JBJzSN1x3F6do3D2ZP/V1tjW8O X-Received: by 2002:aa7:9f01:: with SMTP id g1mr5131496pfr.259.1557526276007; Fri, 10 May 2019 15:11:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1557526276; cv=none; d=google.com; s=arc-20160816; b=ZzdDvGwTatNKCJq14Ij/TbZ27ECgaVTuZ3A9DeKfWWaIdZNF4LqR2CebJj73NZex9W mO5QSKh3o8jokrgOlWe4FGiCNP5KsFPYdKo9AH7AFZ89Q8ioCwd1XENARaOBnIgi0+8x tcm8t/44S/a6gBHOo5LiwDGCrKGJjNDbsAXwiQmvCvkzauH+IaaM719zr1UyuTnjpeR8 kFpcSH4y1njPw+5wZEcmsnGpLCNrBSJQY4yJD1xK+A1H/H5022GaMK6GmjMXUZeQSuJB CiT+2HtC31CKtDrWbDdqEhMOBV3y0uOY0Z/KF6/38+rEiikk5mk5mYiJZ5dbWuf0Z6QF 5qbw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:message-id :subject:cc:to:from:date; bh=e9XMo55tPRCHtgzc/qroyp+orRCHOoS2gg6CY4abTLQ=; b=HFZ+iU6US755FrBEEpI0MKZaymtLT2affuyym8It0OYlV34KWSi6gk4o303JG5hOWu gPMT+VIsyPgBbNcAZoB8HbQ/ffAU8zfATzQuhgVAZ+DXHD1uoMDrCmY1heYpChlirSVr oz+HcgYgmq37CacVlmYBM54NQnMOBX+x4W6fKJvw+aGzgRK6ELJUJ59kr5EEGs1N1A0g ztOV9b5imh1+Abhzhi5ugyFVLsNX/Ewz/IEHjO1uOECMcxjxE+hYGTicWPVsPS4wEMOw DQb2hsP4LjQqGg7nDzLsHWiuRlgOQU6gbJzco30FEO/VAi397QWIalTIKvKbEstoc0Fj zQ1A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j91si9066983pld.267.2019.05.10.15.11.00; Fri, 10 May 2019 15:11:15 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728154AbfEJWJY (ORCPT + 99 others); Fri, 10 May 2019 18:09:24 -0400 Received: from namei.org ([65.99.196.166]:38510 "EHLO namei.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727828AbfEJWJY (ORCPT ); Fri, 10 May 2019 18:09:24 -0400 Received: from localhost (localhost [127.0.0.1]) by namei.org (8.14.4/8.14.4) with ESMTP id x4AM9M4q019663; Fri, 10 May 2019 22:09:22 GMT Date: Sat, 11 May 2019 08:09:22 +1000 (AEST) From: James Morris To: Linus Torvalds cc: linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [GIT PULL] security subsystem: Tomoyo updates for v5.2 Message-ID: User-Agent: Alpine 2.21 (LRH 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Please pull. These patches include fixes to enable fuzz testing, and a fix for calculating whether a filesystem is user-modifiable. The following changes since commit 1fb3b526df3bd7647e7854915ae6b22299408baf: Merge tag 'docs-5.2a' of git://git.lwn.net/linux (2019-05-10 13:24:53 -0400) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security.git next-tomoyo2 for you to fetch changes up to 4ad98ac46490d5f8441025930070eaf028cfd0f2: tomoyo: Don't emit WARNING: string while fuzzing testing. (2019-05-10 14:58:35 -0700) ---------------------------------------------------------------- Tetsuo Handa (4): tomoyo: Add a kernel config option for fuzzing testing. tomoyo: Check address length before reading address family tomoyo: Change pathname calculation for read-only filesystems. tomoyo: Don't emit WARNING: string while fuzzing testing. security/tomoyo/Kconfig | 10 ++++++++++ security/tomoyo/common.c | 13 ++++++++++++- security/tomoyo/network.c | 4 ++++ security/tomoyo/realpath.c | 3 ++- security/tomoyo/util.c | 2 ++ 5 files changed, 30 insertions(+), 2 deletions(-)