Received: by 2002:a05:6a10:413:0:0:0:0 with SMTP id 19csp2315785pxp; Mon, 21 Mar 2022 16:44:13 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzl4EGXVlAcdRWl/Q2EaKeE4jZAk3KGQJHx7jaKt8H7D8DjDjzu7Kh4Iwji7A4CrilQPiPZ X-Received: by 2002:a17:903:20cd:b0:153:aa6e:88de with SMTP id i13-20020a17090320cd00b00153aa6e88demr15276662plb.110.1647906253447; Mon, 21 Mar 2022 16:44:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1647906253; cv=none; d=google.com; s=arc-20160816; b=hSG3cG3IdiAaTeepyB8D5gI+pbpeOjJ9wWj57VM6XqzaRDsdEczUg91xpgXRnyyr3L P7TRRXYaWY8BVbb9sg6grT86FdY3JhPwKt6I7abwAUSwWW0v1dnmwvyRwYNjARv9mo99 khU5QCa8C6rnUdR91IHl16kt1C1b4tKZsw9c3imBAjQ3Q1KLFmFKz047SlQmlGjuwnuF 7aaPVEJ9Ko+5uedp4TbF1XFVK0h05jgYwnBtJ7ig7WxN7I2QS7Y9lwNbMeSIHCmmcikS yjYmU7JLUzWJQoin4VFOzaYgtvgXSkyf74LLYUwVcjNKX7y0y+N2XFMhGjmJhLJEQ5W5 51ug== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:cc:to:subject :message-id:date:from:mime-version:dkim-signature; bh=9C6i1V5W4MCeD/1gLMcJ+GxUdwOY2A6vsDcUchCpRHU=; b=u8NgZbYLbzDEKrLEaRcqtn1/SSV2e2nezb414AsoW8T/TsWQyxuDK8dxaMRT/Yyrb2 6XisZQ0qmt+DxXRXTH2Jie90SJAz3suUSeYtSocBLswsyTYzYatvP7EY4YZO9jUHO9xM ucrOBe+8pimnoYuT5R4oeeIVTE0VHA4szHivhPu92ik3URFcjgJekPqr4RnxQ6JFIO1S /YWl43xbqpEzpIHBhIRbAqNIj2zeqmA94h578wQLI+oC941QICQK9m/dMLy5tEwyliZu RMIDUCx46+gVHdZ49feABiMk5/GU0UwrG32VcabAYVdFo78bmHovS38A4teGD/dhDplE FLcQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@paul-moore-com.20210112.gappssmtp.com header.s=20210112 header.b=h21Ke7dj; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id e10-20020a17090a9a8a00b001c690a92bdesi603145pjp.104.2022.03.21.16.44.13 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 21 Mar 2022 16:44:13 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; dkim=pass header.i=@paul-moore-com.20210112.gappssmtp.com header.s=20210112 header.b=h21Ke7dj; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 37EFF40523F; Mon, 21 Mar 2022 16:01:31 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232137AbiCUXBy (ORCPT + 99 others); Mon, 21 Mar 2022 19:01:54 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56328 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233265AbiCUW7A (ORCPT ); Mon, 21 Mar 2022 18:59:00 -0400 Received: from mail-ej1-x629.google.com (mail-ej1-x629.google.com [IPv6:2a00:1450:4864:20::629]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 2FFDB65158 for ; Mon, 21 Mar 2022 15:46:21 -0700 (PDT) Received: by mail-ej1-x629.google.com with SMTP id pv16so32840297ejb.0 for ; Mon, 21 Mar 2022 15:46:21 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=paul-moore-com.20210112.gappssmtp.com; s=20210112; h=mime-version:from:date:message-id:subject:to:cc :content-transfer-encoding; bh=9C6i1V5W4MCeD/1gLMcJ+GxUdwOY2A6vsDcUchCpRHU=; b=h21Ke7djN8csNxDP0N2xUzZGpjd3brsfArHEu7cU+flfuHfn3v0Qyr+wOLxIHDFCH6 AKO2Nkn2l++CSvp7bh98y0Ew0PaOUHaaN5+JBd8Mzrt+OtVqUz3Joomtfskoj7Z2WCz5 TblZNEJThXjP3MnSTLuZ6knslhebdT0Ex1hEjlt5CJD/ickAO0dJxanf///Nv9q/hapJ BjBOIHWNXDn7OYSUsCggoG/uy9Yoyj0t1EleEP+48trZdChMtuA7CYKld/xSsKnB4bo0 GH1CCYnG52Smn9ykPcCZFiplkUvwDPciyMQ5HZ1noQmiqo93cNtUqf+6dlijUv1KpJN4 78Ew== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:from:date:message-id:subject:to:cc :content-transfer-encoding; bh=9C6i1V5W4MCeD/1gLMcJ+GxUdwOY2A6vsDcUchCpRHU=; b=OgLgdfBMtSlb3M5bnYlGVkmrUIZ2YNkSya6DixpO/HF2sYCmX7aJZg53rZplHXzOg5 ydzNx7MVMorRBU6NU1C58AdZkEJLxt8cFP4AwlAKIyQ16lwqdGfnQVQ/832oESe17xcc gxy282uSF+FXU2q4rXiQs+AZSzj7DPSl1elUcaca02ZyfobktejPjJ+hvNIAaguiM+ZP 1WTE+1R+OrbqClKytNgyIlXLAx2JwyB7LJ+6ja6suDxdJmUYolIB9S+O6c5mn8A8iOZ1 NvVsloEw84rlvgKq8XE64b/6ZfJQ2ZzJ3qQqc6NhKvqbnlBdrOWPjbf19O6JLA1Vj/rg PdJg== X-Gm-Message-State: AOAM531QqNKvzaX2C7J5ko8m6IOz7zRoi0U1g40HM5ej1pKW082ax0Fa Cao+YCIxLd513RwWNjrd8ksGzM5aQumlXcnzaTir6rb/7W75 X-Received: by 2002:a17:907:1b09:b0:6d8:faa8:4a06 with SMTP id mp9-20020a1709071b0900b006d8faa84a06mr22563111ejc.701.1647900842214; Mon, 21 Mar 2022 15:14:02 -0700 (PDT) MIME-Version: 1.0 From: Paul Moore Date: Mon, 21 Mar 2022 18:13:51 -0400 Message-ID: Subject: [GIT PULL] SELinux patches for v5.18 To: Linus Torvalds Cc: selinux@vger.kernel.org, linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,RDNS_NONE, SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Linus, We've got a number of SELinux patches queued up for v5.18, the highlights are below: - Fixup the security_fs_context_parse_param() LSM hook so it executes all of the LSM hook implementations unless a serious error occurs. We also correct the SELinux hook implementation so that it returns zero on success. - In addition to a few SELinux mount option parsing fixes, we simplified the parsing by moving it earlier in the process. The logic was that it was unlikely an admin/user would use the new mount API and not have the policy loaded before passing the SELinux options. - Properly fixed the LSM/SELinux/SCTP hooks with the addition of the security_sctp_assoc_established() hook. This work was done in conjunction with the netdev folks and should complete the move of the SCTP labeling from the endpoints to the associations. - Fixed a variety of sparse warnings caused by changes in the "__rcu" markings of some core kernel structures. - Ensure we access the superblock's LSM security blob using the stacking-safe accessors. - Added the ability for the kernel to always allow FIOCLEX and FIONCLEX if the "ioctl_skip_cloexec" policy capability is specified. - Various constifications improvements, type casting improvements, additional return value checks, and dead code/parameter removal. - Documentation fixes. Please merge. -Paul -- The following changes since commit e783362eb54cd99b2cac8b3a9aeac942e6f6ac07= : Linux 5.17-rc1 (2022-01-23 10:12:53 +0200) are available in the Git repository at: https://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/selinux.git tags/selinux-pr-20220321 for you to fetch changes up to cdbec3ede0b8cb318c36f5cc945b9360329cbd25: selinux: shorten the policy capability enum names (2022-03-02 11:37:03 -0500) ---------------------------------------------------------------- selinux/stable-5.18 PR 20220321 ---------------------------------------------------------------- Casey Schaufler (1): LSM: general protection fault in legacy_parse_param Christian G=C3=B6ttsche (11): selinux: check return value of sel_make_avc_files selinux: declare path parameters of _genfs_sid const selinux: declare name parameter of hash_eval const selinux: enclose macro arguments in parenthesis selinux: drop cast to same type selinux: drop unused parameter of avtab_insert_node selinux: do not discard const qualifier in cast selinux: simplify cred_init_security selinux: drop unused macro selinux: drop return statement at end of void functions selinux: use correct type for context length GONG, Ruiqi (1): selinux: access superblock_security_struct in LSM blob way Ondrej Mosnacek (3): selinux: parse contexts for mount options early security: add sctp_assoc_established hook security: implement sctp_assoc_established hook in selinux Paul Moore (3): selinux: fix a type cast problem in cred_init_security() selinux: various sparse fixes selinux: shorten the policy capability enum names Richard Haines (1): selinux: allow FIOCLEX and FIONCLEX with policy capability Scott Mayhew (2): selinux: Fix selinux_sb_mnt_opts_compat() selinux: try to use preparsed sid before calling parse_sid() Wan Jiabing (1): docs: fix 'make htmldocs' warning in SCTP.rst Documentation/security/SCTP.rst | 26 ++- include/linux/lsm_hook_defs.h | 2 + include/linux/lsm_hooks.h | 5 + include/linux/security.h | 8 + net/sctp/sm_statefuns.c | 8 +- security/security.c | 24 ++- security/selinux/hooks.c | 299 ++++++++++++++------------= --- security/selinux/ibpkey.c | 2 +- security/selinux/ima.c | 4 +- security/selinux/include/policycap.h | 21 +- security/selinux/include/policycap_names.h | 5 +- security/selinux/include/security.h | 31 +-- security/selinux/netnode.c | 9 +- security/selinux/netport.c | 2 +- security/selinux/selinuxfs.c | 4 +- security/selinux/ss/avtab.c | 6 +- security/selinux/ss/conditional.c | 2 - security/selinux/ss/ebitmap.c | 1 - security/selinux/ss/ebitmap.h | 6 +- security/selinux/ss/mls.c | 1 - security/selinux/ss/policydb.c | 4 +- security/selinux/ss/services.c | 10 +- security/selinux/ss/sidtab.c | 4 +- security/selinux/xfrm.c | 2 +- 24 files changed, 255 insertions(+), 231 deletions(-) --=20 paul-moore.com