From patchwork Mon Oct 31 11:07:15 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Paul Moore X-Patchwork-Id: 13205 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a5d:6687:0:0:0:0:0 with SMTP id l7csp2246890wru; Mon, 31 Oct 2022 04:12:16 -0700 (PDT) X-Google-Smtp-Source: AMsMyM4F8hLz3ZV36yjUT0i9HNu996nX8ttOQJx/8+u0YzwKfByeZw2m9v2ForFQsd9KK2pUQ7b2 X-Received: by 2002:a17:906:58c7:b0:722:f4bf:cb75 with SMTP id e7-20020a17090658c700b00722f4bfcb75mr12168490ejs.450.1667214736628; Mon, 31 Oct 2022 04:12:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1667214736; cv=none; d=google.com; s=arc-20160816; b=Vsq7VyX7FZj5IqMNB4TuxARR+3394GbVNwq2m4sH9vbrUj+YxV8SozlYmEm8D2cNK/ wim/VnGNECkL8lLIqP4BWSRYlA4KIPjiNtRlkNModPtfT0of/4zH+ej6SbM55xV2enkE H4fXmPmNii4VdDyvrkHwUqPymRli8yy7qjGmG0+haGyOpp/rkG4vFETbArn+dY4xTkUx RDk33FZhNes9JaW4c4ZdoNTp5s+e9dyCtdA+mC/fW/M1zJcy0pNKxZXzEt5AFqwyHeCU islPFBo9/21eS8YO9J4M2u+Rl2UbxtUKonHKHXdtkR3QcZNcA8GU05jDjrD4JjPAnCiK 9gAw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:mime-version :dkim-signature; bh=sMlKM22/vBjYG6XqmR4GF/IFfdYTzBgjEp3g+APsfwk=; b=bc5GceBe+E7xHRXEGSHteorzOVtBCP4SCMXjb44A2FiXc1wmSDXU6kJ9fU0o8EJWAf 86xS5l342zKk0GoAAdOecfj9hv8sBj9xDm54OmxPcg9ed2XKi9RRjRxZGbbkkcZmEOuI c0TtDJSemUoTF5XoEEudPY7TaDwi6O5DSW8I0JfZqn2AqPb96r9SQxM1bEFBOVQTwEa8 VRM1K8EtfUTgKGa1fZMTTJab9+9jvztgnSgs1MW53h2MK85S7D8e6F0BC9MCmOCu1bgh PTCW0YJEpvGzgob3SPjOSV0v0w2ioaJItn6K5VkGEBNgYn+K7V36ZMScHVHewEedpF/4 IwXA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@paul-moore-com.20210112.gappssmtp.com header.s=20210112 header.b=mWkrrb+U; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id y4-20020a056402440400b0045bd677b3d5si9177843eda.342.2022.10.31.04.11.52; Mon, 31 Oct 2022 04:12:16 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@paul-moore-com.20210112.gappssmtp.com header.s=20210112 header.b=mWkrrb+U; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229974AbiJaLH3 (ORCPT + 99 others); Mon, 31 Oct 2022 07:07:29 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52146 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229743AbiJaLH2 (ORCPT ); Mon, 31 Oct 2022 07:07:28 -0400 Received: from mail-oa1-x34.google.com (mail-oa1-x34.google.com [IPv6:2001:4860:4864:20::34]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3286862CF for ; Mon, 31 Oct 2022 04:07:27 -0700 (PDT) Received: by mail-oa1-x34.google.com with SMTP id 586e51a60fabf-13c569e5ff5so12666546fac.6 for ; Mon, 31 Oct 2022 04:07:27 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=paul-moore-com.20210112.gappssmtp.com; s=20210112; h=cc:to:subject:message-id:date:from:mime-version:from:to:cc:subject :date:message-id:reply-to; bh=sMlKM22/vBjYG6XqmR4GF/IFfdYTzBgjEp3g+APsfwk=; b=mWkrrb+U58/aLUgoZbnCvf+7PUeEpgFmzXTIE3ZeDRp4An6IcGTQmNRWTB83Y30Eri rTXYdP4rlXt57vBoGvr/5R541P75FYw6l8H3P+fZ9kqvH3u3LiXysiWr8aN9+3zU0N5X DJ6qF0MpXic2BxobXvP3eMdkjftnOtOp+DXhXOnNR2gRqq/vn72snijzHCv0ym7/pE0o AecgDw4P/dezc1b4sWKjDKY44W25sXZpRuGUA26wvwBDnZlNGIYYS1x+WQ4tI+1jDNZz OM8svpGeIXkCZZxmEJUmDRU5ziUBShV8UL+8FABoIoFLEdGaA1siE/lj+VHICkNjJP6u BVHw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:mime-version:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=sMlKM22/vBjYG6XqmR4GF/IFfdYTzBgjEp3g+APsfwk=; b=tZZD0QMJcVBPlCzxsLwjmzqvs3fldESovDvdIgZyWmCVZ3NqGHdX7Xz0X65hw9Vfpn BiSsOaTEHJoEZi8RPc22LfczTMe3tkMjCaT2oZuazYuvtzHaHUN9le4Ll1nheAb8ZOYl H8thzXiLG8LU2v4fLahcNA1zTOmNX8M5MtzZfZZUwgjqCxtU02HrrWdjpstUOO281RG0 MZdvkUQeOuF0fxXslnbpnjHfgwtuzKvVgXcPLjQOnPPQGyP935fcCm1GTZXUkUlK6K3m 04HXzH0Tm5lFOFIR7Fdw4dr05G808qzvddE8pzX9JGal5jNKUOA9stcE3gY+ErReLBNw EbWQ== X-Gm-Message-State: ACrzQf3PEc66eMB6guLxqKkSk1Oym7iNf5yXtNu/8RjbwXESnLHTvYKd WlMpkBxu2nT7qouh/XokaUVdOEZJPtKHFVHK35dzhdGkRl73zrA= X-Received: by 2002:a05:6870:41cb:b0:131:9656:cc30 with SMTP id z11-20020a05687041cb00b001319656cc30mr17158926oac.51.1667214446436; Mon, 31 Oct 2022 04:07:26 -0700 (PDT) MIME-Version: 1.0 From: Paul Moore Date: Mon, 31 Oct 2022 07:07:15 -0400 Message-ID: Subject: [GIT PULL] LSM fixes for v6.1 (#1) To: Linus Torvalds Cc: linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1748201359735985562?= X-GMAIL-MSGID: =?utf-8?q?1748201359735985562?= Hi Linus, A single patch to the capabilities code to fix a potential memory leak in the xattr allocation error handling. Please apply for v6.1-rcX. Thanks, -Paul --- The following changes since commit 9abf2313adc1ca1b6180c508c25f22f9395cc780: Linux 6.1-rc1 (2022-10-16 15:36:24 -0700) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/lsm.git tags/lsm-pr-20221031 for you to fetch changes up to 8cf0a1bc12870d148ae830a4ba88cfdf0e879cee: capabilities: fix potential memleak on error path from vfs_getxattr_alloc() (2022-10-28 06:44:33 -0400) ---------------------------------------------------------------- lsm/stable-6.1 PR 20221031 ---------------------------------------------------------------- Gaosheng Cui (1): capabilities: fix potential memleak on error path from vfs_getxattr_alloc() security/commoncap.c | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-)