Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp392198ybz; Fri, 1 May 2020 00:33:05 -0700 (PDT) X-Google-Smtp-Source: APiQypJ6JLjZnBpwEP5VkfD1P9eBPkRwA7gjcXHF8hsfn6SlRYVlXnSmBobuBZzBIuW3FgiYHhaO X-Received: by 2002:a50:a2e5:: with SMTP id 92mr2454729edm.139.1588318385207; Fri, 01 May 2020 00:33:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588318385; cv=none; d=google.com; s=arc-20160816; b=W/w2u7J+S5J0CjuM+5uR2UVXNnyWflTdBNvFCIqmTm2hdc0eIpYDyBlSgGdWLnxQcQ lk93Swx8kHNNa5jd/ujET7PXDdyW96DV1Z1ZxQZalptqxNTKghuD5WGQaZ6unMsOP2hR 1A7QgBxsskD19OsEx+21zvD0XiXNpWFpv+VKV/0iiYmzpyJ/2DoSO/HonLk1hzwpH8SR GKc0KaxKLcacSapj+ihOSPgrES4FegxKEGfunULYmRshx/lAQZ5i8qEkq3fvbw2bMQ8a n2w03EKBqS18UtrIm6EnIohUXiOfmVujhmoo0cqlDJqW46pObYySLa+9sTva4RTSwjd/ QyQw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:ironport-sdr:ironport-sdr; bh=Ht9BcrUJED3H0iy63dr0LBmr1npRFgp3Y4kcwBQ+KRk=; b=iNCwkZjkLMA7pQxPxekMU5+Wexs0BZ8ZWavDfKL0pVe+ZeEQekVJkFnvcPFA9ciNZj ar9YLQc2gar+DiDC1rts/SNteTZ4DSCaTsGT84awaJJDCMqSCmiNMdCWOMbq7hkXvT0i 0ZKvarvrXYVfTP983IxlCVj60IP5RYfkP3gXkUbO9W0rK+t6fwt+jZK5QjuQCbUtmQnf ikpGV3cgoe6dGyMVhIuHq/7QoK8HGBxRf1z0h0SFn4heZkx7PWqVVYFtxeQ7ACq/OLm2 LWqqMUaPAVBeOWbs+oXyGFeLDJXLXkFh+MuKp6gwxVkE3qj81vZwCeQPDALy8rSDh2z2 cTLA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i15si1270864ejc.172.2020.05.01.00.32.40; Fri, 01 May 2020 00:33:05 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728305AbgEAHbC (ORCPT + 99 others); Fri, 1 May 2020 03:31:02 -0400 Received: from mga18.intel.com ([134.134.136.126]:43581 "EHLO mga18.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726452AbgEAHbC (ORCPT ); Fri, 1 May 2020 03:31:02 -0400 IronPort-SDR: yg7tnfdYYMMef5Pi2LBZ5nak8qlmAxGJ0zSwzBfSy/CSo4L0RvpQ7FK+98eTDUFGGtGUFGuZdX T+eh3eK6L7FQ== X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga004.jf.intel.com ([10.7.209.38]) by orsmga106.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 01 May 2020 00:31:01 -0700 IronPort-SDR: dAhag6RkhfHBmENqy7ZVTGekUzQ0MrZStJuQLCFnD/4yvCpNbfnyuc+koV/1Fb0An9VJixA60m n8qYq7TVD51w== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.73,339,1583222400"; d="scan'208";a="405679165" Received: from akontse-mobl2.ger.corp.intel.com (HELO [10.254.147.91]) ([10.254.147.91]) by orsmga004.jf.intel.com with ESMTP; 01 May 2020 00:30:57 -0700 Subject: Re: [PATCH bpf] security: Fix the default value of fs_context_parse_param hook To: KP Singh , linux-kernel@vger.kernel.org, bpf@vger.kernel.org, linux-security-module@vger.kernel.org Cc: Alexei Starovoitov , Daniel Borkmann , James Morris , Kees Cook , Jann Horn References: <20200430155240.68748-1-kpsingh@chromium.org> From: Mikko Ylinen Message-ID: Date: Fri, 1 May 2020 10:30:56 +0300 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.7.0 MIME-Version: 1.0 In-Reply-To: <20200430155240.68748-1-kpsingh@chromium.org> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 30/04/2020 18:52, KP Singh wrote: > This was noticed when lsm=bpf is supplied on the command line before any > other LSM. As the bpf lsm uses this default value to implement a default > hook, this resulted in a failure to parse any fs_context parameters and > a failure to mount the root filesystem. Tested-by: Mikko Ylinen