Received: by 2002:a05:6a10:6744:0:0:0:0 with SMTP id w4csp758646pxu; Thu, 15 Oct 2020 16:10:33 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyxrZLcEss9WFN/azDmGGwtlW4DgD8Hn0eaujkr/IsP5ztP5UauXlMTuFhwkuLOrW+dd38p X-Received: by 2002:a17:906:4d44:: with SMTP id b4mr714671ejv.131.1602803433552; Thu, 15 Oct 2020 16:10:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1602803433; cv=none; d=google.com; s=arc-20160816; b=00Opwk+at0+jmYwNl2MtvKhO1xfaIu2iPCB/4xejrXJPbEiKSwZy9MCy/vYmepKAg0 ArMyu2wgwkCI41Vvm7CictKNApbr+mhZV5ZN5uXD2UHOubis4153K+6JT1zyyeECVoBW ZZKsG3Tzr5aqErXmWkkI6JkfJEgYHr3UI3fo43vRxuv3scHBfwtTPZcGinkxLGKSX0dv bGUOWbVBOJ7V9leaE0P751eFKqLnb5gHuGE4LnAeMcbeIQM8jN6oMurbLZeGaQkX21s5 Wq1AEZPKlHAJzf4ic73J4v+hZNu+xpq8YAebjSbdOW+M7GJib8jaqyq76M05OkvbDtle mcZg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:mime-version :dkim-signature; bh=hV2kzljzkPtlmabMiMR4tfaBM+VlAVmvUSlWLpICaPs=; b=gaQnyrHeQRwOL9j1WDOwNZGX6pjUlFLYz+ugt4yVZ7VRRePyICMnWRu49XWTjX+MVC lNnYg50WocWs+q7C76kyDr6zJna14wYS6FxfTGnW5G9YHng+vuBbeec/D9OhH+aAypUq yb80yiAjCM2+98A/9idma7karO7p6yiunlKCGbDemgogvIDFPNSfxjhS2Ihaxz6uKdpu CK3+k7cOSyAuc1i/Ewkz7yrRxeg66KJODh288ox7ZGe4l/cMuNp/gO6+5GPvBSQnvOu4 4whLd5M4OkFQEfEnDYSczmGanPJ2eVUtveOLV7zGKHv10Dprec65lCk7mOLujnVTiChG wg6w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=VQcnZxYN; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id r21si369102ejo.559.2020.10.15.16.10.11; Thu, 15 Oct 2020 16:10:33 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=VQcnZxYN; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732895AbgJOSPd (ORCPT + 99 others); Thu, 15 Oct 2020 14:15:33 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35936 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726053AbgJOSPb (ORCPT ); Thu, 15 Oct 2020 14:15:31 -0400 Received: from mail-ej1-x62c.google.com (mail-ej1-x62c.google.com [IPv6:2a00:1450:4864:20::62c]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4AFEBC061755 for ; Thu, 15 Oct 2020 11:15:30 -0700 (PDT) Received: by mail-ej1-x62c.google.com with SMTP id qp15so4988525ejb.3 for ; Thu, 15 Oct 2020 11:15:30 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=mime-version:from:date:message-id:subject:to:cc; bh=hV2kzljzkPtlmabMiMR4tfaBM+VlAVmvUSlWLpICaPs=; b=VQcnZxYNoqwWWKhsVR9IcKy7FA5LslWVlI7LkqdXV7QDISXJtrEr7hdM0qXaD18BvI u1v5WkAly0t9EDxfyBHEDAqjyC9WOAsEb+d2sdss9TF/1NTLtysgYR/SYJsB4gbHDr03 MBlwWDi7RwFVCPkhqB3xjwh1dcr9zDvi9XVuA= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to:cc; bh=hV2kzljzkPtlmabMiMR4tfaBM+VlAVmvUSlWLpICaPs=; b=RV8lyc2R4JR66lk3Htq7N7FY1/b0JOdcKdejT26eBD3jGBhXBerF56FgV07QAHG4+f hzUkUk/crH5mYTihg5ojK7q+6m5QBBuqNKeJ2GWKythKhQ8KVNbp1waqzA9QSrZbwmU8 amyW0qJ0zUxYcIS4UA+pve2wsn5GtUBOZfQOeS/6aRBKnZ3H+SFDL4G1yiq4u4jaxXLc a1NN6A5DFWj7a7cazM/KIdVL7NmBhPV6uT3UtZOrWn1dNP2kD/sqinB+AIoZyTloIGBH /41wVuclctYk63U2J9RBlfs2mtRuVovwm71DTVk20Pk+2clBI9Y6oPIdhP7Ruk3JuUA0 eQbQ== X-Gm-Message-State: AOAM532iZwfNNQ0fzIFlEUpN5VSx2M3ML4kRKie5h+WKf4WKnspfQIvh cTneo1+lSimpaevC5sMRjCfhDX6/Qpwz3unKrRF6NA== X-Received: by 2002:a17:906:6d0c:: with SMTP id m12mr5820394ejr.498.1602785728757; Thu, 15 Oct 2020 11:15:28 -0700 (PDT) MIME-Version: 1.0 From: Micah Morton Date: Thu, 15 Oct 2020 11:15:18 -0700 Message-ID: Subject: [GIT PULL] SafeSetID changes for v5.10 To: Linus Torvalds Cc: Linux Kernel Mailing List , linux-security-module Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The following changes since commit bbf5c979011a099af5dc76498918ed7df445635b: Linux 5.9 (2020-10-11 14:15:50 -0700) are available in the Git repository at: https://github.com/micah-morton/linux.git tags/safesetid-5.10 for you to fetch changes up to 03ca0ec138927b16fab0dad7b869f42eb2849c94: LSM: SafeSetID: Fix warnings reported by test bot (2020-10-13 09:17:36 -0700) ---------------------------------------------------------------- SafeSetID changes for v5.10 The changes in this pull request are mostly contained to within the SafeSetID LSM, with the exception of a few 1-line changes to change some ns_capable() calls to ns_capable_setid() -- causing a flag (CAP_OPT_INSETID) to be set that is examined by SafeSetID code and nothing else in the kernel. These changes have been baking in -next and actually were in -next for the entire v5.9 merge window but I didn't have a chance to send them. The changes to SafeSetID internally allow for setting up GID transition security policies, as already existed for UIDs. NOTE: I'm re-using my safesetid-next branch here as the branch for creating the pull request. I think that's fine, not sure if this is the normal workflow or not. Also, I use 'git rebase vX.X' to put my commits on top of the latest stable release. Again, I verified with gitk that I don't have any weird history in my branch that will mess things up so AFAICT that should be fine too. ---------------------------------------------------------------- Thomas Cedeno (3): LSM: Signal to SafeSetID when setting group IDs LSM: SafeSetID: Add GID security policy handling LSM: SafeSetID: Fix warnings reported by test bot Documentation/admin-guide/LSM/SafeSetID.rst | 29 +++-- kernel/capability.c | 2 +- kernel/groups.c | 2 +- kernel/sys.c | 10 +- security/safesetid/lsm.c | 190 +++++++++++++++++++++------- security/safesetid/lsm.h | 38 ++++-- security/safesetid/securityfs.c | 190 ++++++++++++++++++++-------- 7 files changed, 336 insertions(+), 125 deletions(-)