From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 4DDC5C433EF for ; Thu, 10 Feb 2022 03:42:49 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232847AbiBJDmp (ORCPT ); Wed, 9 Feb 2022 22:42:45 -0500 Received: from mxb-00190b01.gslb.pphosted.com ([23.128.96.19]:32962 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229543AbiBJDmm (ORCPT ); Wed, 9 Feb 2022 22:42:42 -0500 Received: from mail-ej1-x62c.google.com (mail-ej1-x62c.google.com [IPv6:2a00:1450:4864:20::62c]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 06E6123BDD for ; Wed, 9 Feb 2022 19:42:44 -0800 (PST) Received: by mail-ej1-x62c.google.com with SMTP id e7so8064172ejn.13 for ; Wed, 09 Feb 2022 19:42:43 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=paul-moore-com.20210112.gappssmtp.com; s=20210112; h=mime-version:from:date:message-id:subject:to:cc; bh=kKRzEScg5J173EHITJeYv+1fCJ8FonUtOFLmbVJnnYo=; b=XHSroxGTPnprbGaz1CMR+L5UW6iCB9Y0ZU9+u6jr4oOlxbu0bQEHjaTgh0X4uDwq0h 9MPnVYtQ94l/iKEoj8cZH2VtTtj/0zkGaL19Jz6I7JLoa7A9QNIQtOPGB1ij/jQ0hoS5 dwT+TY6S33cK1Z1z0VhP63/SJnk/as+6dc0ky+5e2ftGcFtY/DaAT9R9wLh5V76viWwA w2T4S3LN6FfXo1LWwhARb4gCfjhg2md9FIE3ylNp3GkJnOGUeYVnMs7CsXEZ8fTyuvnq b48NqpV5QwHfcvjwbLJsUIGgLx5apQte/Nkvte9LCSZm5lrssHSJ/fYmAmiXHbXrd+Pp 8feg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:from:date:message-id:subject:to:cc; bh=kKRzEScg5J173EHITJeYv+1fCJ8FonUtOFLmbVJnnYo=; b=qNm4hPCgOWxZQhR81USUgH5ox9fiQ64SJSllzQjw3cAf15NMQg+OjSc0sBPZB+Ax2M o2JMJC1ceN7UkQfff5Ow5rX8t+i6TUin/Ca4lyxQcIQYXFgkzrxnRtuBruYG0nmr+7bw bNTsYpxb6j21HtZcrRCOPTtlY9Q/Ul2Q/urcFocs4dcwiEHdPs/A4/oRup4LOFvXHiZW vzrpnIATw2Ng15e80kHOG9eNm4ibU5wJXK6TnQFcmCkO3pIUeryurD6atUeErYJQoecy KLokgfBryxX3TZHN8gDslcSi+ftHvWMLXejzjpFmNJ0IptK5Vp6cOxbq+AEVConqC45Q sApg== X-Gm-Message-State: AOAM533YAwNqhN9Fdf/cImsdriznN3luuuKTD0spQN3YWA2Sds6f6qkm y8La28WVarcDbBN+nEUhgMjRdhBeHcwEMct8sidCqM7de5Q5 X-Google-Smtp-Source: ABdhPJwVtPyrm9T0JfJpMs6dg/AjSO+E4puS+P4nZbx+fTyrVW6kOib0QsMhfHIzajqntKq+UUf7pAqAOQHE5Gtt/4g= X-Received: by 2002:a17:907:3e8a:: with SMTP id hs10mr4794139ejc.112.1644464562564; Wed, 09 Feb 2022 19:42:42 -0800 (PST) MIME-Version: 1.0 From: Paul Moore Date: Wed, 9 Feb 2022 22:42:31 -0500 Message-ID: Subject: [GIT PULL] Audit fixes for v5.17 (#2) To: Linus Torvalds Cc: linux-audit@redhat.com, linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Linus, Another audit fix for v5.17-rcX, this time a single rather small but important patch that fixes an oops/page-fault caused by improperly accessing userspace memory. Please merge for the next -rcX release. Thanks, -Paul -- The following changes since commit f26d04331360d42dbd6b58448bd98e4edbfbe1c5: audit: improve audit queue handling when "audit=1" on cmdline (2022-01-25 13:22:51 -0500) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/audit.git tags/audit-pr-20220209 for you to fetch changes up to 7a82f89de92aac5a244d3735b2bd162c1147620c: audit: don't deref the syscall args when checking the openat2 open_how::flags (2022-02-09 16:04:26 -0500) ---------------------------------------------------------------- audit/stable-5.17 PR 20220209 ---------------------------------------------------------------- Paul Moore (1): audit: don't deref the syscall args when checking the openat2 open_how::flags kernel/auditsc.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) -- paul-moore.com From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id C5C44C433EF for ; Thu, 10 Feb 2022 03:43:03 +0000 (UTC) Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-622-eJYGFJNRM_qM4n7Jg-OQJQ-1; Wed, 09 Feb 2022 22:42:59 -0500 X-MC-Unique: eJYGFJNRM_qM4n7Jg-OQJQ-1 Received: from smtp.corp.redhat.com (int-mx01.intmail.prod.int.phx2.redhat.com [10.5.11.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id BFE4C100C609; Thu, 10 Feb 2022 03:42:55 +0000 (UTC) Received: from colo-mx.corp.redhat.com (colo-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.21]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 6F8BB5DB87; Thu, 10 Feb 2022 03:42:54 +0000 (UTC) Received: from lists01.pubmisc.prod.ext.phx2.redhat.com (lists01.pubmisc.prod.ext.phx2.redhat.com [10.5.19.33]) by colo-mx.corp.redhat.com (Postfix) with ESMTP id 674774BB7C; Thu, 10 Feb 2022 03:42:52 +0000 (UTC) Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.rdu2.redhat.com [10.11.54.3]) by lists01.pubmisc.prod.ext.phx2.redhat.com (8.13.8/8.13.8) with ESMTP id 21A3gnHw012488 for ; Wed, 9 Feb 2022 22:42:49 -0500 Received: by smtp.corp.redhat.com (Postfix) id 069E11121335; Thu, 10 Feb 2022 03:42:49 +0000 (UTC) Received: from mimecast-mx02.redhat.com (mimecast10.extmail.prod.ext.rdu2.redhat.com [10.11.55.26]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 01C701121334 for ; Thu, 10 Feb 2022 03:42:45 +0000 (UTC) Received: from us-smtp-1.mimecast.com (us-smtp-2.mimecast.com [207.211.31.81]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 7591A1C05152 for ; Thu, 10 Feb 2022 03:42:45 +0000 (UTC) Received: from mail-ej1-f45.google.com (mail-ej1-f45.google.com [209.85.218.45]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-391-fjLbOap7PAW_NC9FeX3BJA-1; Wed, 09 Feb 2022 22:42:43 -0500 X-MC-Unique: fjLbOap7PAW_NC9FeX3BJA-1 Received: by mail-ej1-f45.google.com with SMTP id p24so12200263ejo.1 for ; Wed, 09 Feb 2022 19:42:43 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:from:date:message-id:subject:to:cc; bh=kKRzEScg5J173EHITJeYv+1fCJ8FonUtOFLmbVJnnYo=; b=BV/6Zyp0StskxYC2LlKAfPuBOTOixEtUWCHGmS6BlfFZp5vl6j61VMmeshkmlFEU74 KBYC8srnlU2xjArs1lKOlVQXL95uPnVckDygwF2p45PUxOV51vE2ijlZ7zbLZmU290xL n6G3qkfJvGuTOIygTe9Z08ebqevPOjnWTXdzFDk7zOIu9ym0B+JT5Cy9WrADUNyUbd4i WWzIRHcCjTiVfMEO8m2IK+erE0X3psoOK7CmofQq9zWAXAXxWxUwk7olmqFBEPSwNHNg ixVPFUCnBnIqMnWH8Gg+A6saMIEPEv0bBMybO40Z1N6+bi59W1cGsMWGBoke4p6lFA0f 5WFQ== X-Gm-Message-State: AOAM533rGFAHt6VplDrtmJt9Bg2DjY0W053ubwFnmr6yAMOWPh1kgwUD EQl0VcqrZFqFeYubBAZe7u1ucdbEYKqS7xdFwLpc X-Google-Smtp-Source: ABdhPJwVtPyrm9T0JfJpMs6dg/AjSO+E4puS+P4nZbx+fTyrVW6kOib0QsMhfHIzajqntKq+UUf7pAqAOQHE5Gtt/4g= X-Received: by 2002:a17:907:3e8a:: with SMTP id hs10mr4794139ejc.112.1644464562564; Wed, 09 Feb 2022 19:42:42 -0800 (PST) MIME-Version: 1.0 From: Paul Moore Date: Wed, 9 Feb 2022 22:42:31 -0500 Message-ID: Subject: [GIT PULL] Audit fixes for v5.17 (#2) To: Linus Torvalds X-Mimecast-Impersonation-Protect: Policy=CLT - Impersonation Protection Definition; Similar Internal Domain=false; Similar Monitored External Domain=false; Custom External Domain=false; Mimecast External Domain=false; Newly Observed Domain=false; Internal User Name=false; Custom Display Name List=false; Reply-to Address Mismatch=false; Targeted Threat Dictionary=false; Mimecast Threat Dictionary=false; Custom Threat Dictionary=false X-Scanned-By: MIMEDefang 2.78 on 10.11.54.3 X-loop: linux-audit@redhat.com Cc: linux-audit@redhat.com, linux-kernel@vger.kernel.org X-BeenThere: linux-audit@redhat.com X-Mailman-Version: 2.1.12 Precedence: junk List-Id: Linux Audit Discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: linux-audit-bounces@redhat.com Errors-To: linux-audit-bounces@redhat.com X-Scanned-By: MIMEDefang 2.79 on 10.5.11.11 Authentication-Results: relay.mimecast.com; auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=linux-audit-bounces@redhat.com X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Linus, Another audit fix for v5.17-rcX, this time a single rather small but important patch that fixes an oops/page-fault caused by improperly accessing userspace memory. Please merge for the next -rcX release. Thanks, -Paul -- The following changes since commit f26d04331360d42dbd6b58448bd98e4edbfbe1c5: audit: improve audit queue handling when "audit=1" on cmdline (2022-01-25 13:22:51 -0500) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/audit.git tags/audit-pr-20220209 for you to fetch changes up to 7a82f89de92aac5a244d3735b2bd162c1147620c: audit: don't deref the syscall args when checking the openat2 open_how::flags (2022-02-09 16:04:26 -0500) ---------------------------------------------------------------- audit/stable-5.17 PR 20220209 ---------------------------------------------------------------- Paul Moore (1): audit: don't deref the syscall args when checking the openat2 open_how::flags kernel/auditsc.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) -- paul-moore.com -- Linux-audit mailing list Linux-audit@redhat.com https://listman.redhat.com/mailman/listinfo/linux-audit