From patchwork Tue Jun 29 21:36:01 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Paul Moore X-Patchwork-Id: 12350869 X-Patchwork-Delegate: paul@paul-moore.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-18.8 required=3.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,INCLUDES_PULL_REQUEST, MAILING_LIST_MULTI,MENTIONS_GIT_HOSTING,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 29570C11F67 for ; Tue, 29 Jun 2021 21:36:18 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 0C4A061CF1 for ; Tue, 29 Jun 2021 21:36:18 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235942AbhF2Vin (ORCPT ); Tue, 29 Jun 2021 17:38:43 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56624 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235706AbhF2Vim (ORCPT ); Tue, 29 Jun 2021 17:38:42 -0400 Received: from mail-ed1-x530.google.com (mail-ed1-x530.google.com [IPv6:2a00:1450:4864:20::530]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C1A8CC061767 for ; Tue, 29 Jun 2021 14:36:13 -0700 (PDT) Received: by mail-ed1-x530.google.com with SMTP id i24so128382edx.4 for ; Tue, 29 Jun 2021 14:36:13 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=paul-moore-com.20150623.gappssmtp.com; s=20150623; h=mime-version:from:date:message-id:subject:to:cc; bh=kVbXk/jGkX9FNNfyx7X6Mxyt8GqROWHeQ+D0oZ/1rWQ=; b=CKkESIfcf8PxrA+EjyxdXfq/B8pdPyMMuQzo4iLBkBNAO+/4WefIuWjHuhMptM7CvA E8zQicV5wwjKbD1D09KAfTx5xWZUjc7tSGATHt2tlTsRBGWcQbfIoiXzHlgVRgB+PhEb ixtemYRI4pIsOmEdxuzy7ig+vVJ7n6bvqK6hjC3v1c7wnYpw8gbhzIBd+9++G4i1ZcUj /XF8o9HILnUSDESr4I/EeOBN7JOj1xd25r+kTC7lImvpAJvlhjewqFs/vuCISC0puVVc hqVM1uOvEYfJqH3j7VMTRpy0dPF6D0sxLuWdMFQoz4ojezvUOdh9wRj4VivXclaCcg3i 4gwg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to:cc; bh=kVbXk/jGkX9FNNfyx7X6Mxyt8GqROWHeQ+D0oZ/1rWQ=; b=rZ5CjEsACOYEa1lldt0a8Wk3Fvl9FHFJgJOFF4nRYuxoDkQ/fZIl0LpR/XVZux9cOn GOT3amIAmXdCe7Cy1dnN5s3KOgaJ5F0BOTs9KpK8mOVt4KNgZK4Qs4PMdgkU3zh88Cro NHt29zodOaL39Bwt6Hb2ChqiCYgdkrLoAGWe5r46K/3sXX39m7kxfHVyXelLBL/i8K8d OuYbC/Yn/s5uDCoXld34/X1eJxYKzrcAegMKnFEiqE8/HwAsdUSlusYZ+nj/3HQrgzUF xrwNNv0r8wyMs17FmYe0taibbM70DJlU8k9lmgteZu5jjjmxao8OsnKfpW8KUIszm2xB nOmw== X-Gm-Message-State: AOAM531TLV8fkr39zQjKiGixkhF3hFilf/Ymirbvap2RKCV2/H+YBJd6 7PYGYEx0ji2uIsgMODmVH3oazaE86hYBtyIEjYvQ X-Google-Smtp-Source: ABdhPJzN1aqZZm7XMoJpKd6Ir0SHqTfq4WjM5AgSiiYOq+rtX1qeG1OUxTUxRqVSF3naE5Hk5Ki+h3+0gV9c4wgj22Y= X-Received: by 2002:a05:6402:1d17:: with SMTP id dg23mr42849509edb.128.1625002572146; Tue, 29 Jun 2021 14:36:12 -0700 (PDT) MIME-Version: 1.0 From: Paul Moore Date: Tue, 29 Jun 2021 17:36:01 -0400 Message-ID: Subject: [GIT PULL] SELinux patches for v5.14 To: Linus Torvalds Cc: selinux@vger.kernel.org, linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: selinux@vger.kernel.org Hi Linus, Here is the SELinux pull request for v5.14, the highlights are below: * The slow_avc_audit() function is now non-blocking so we can remove the AVC_NONBLOCKING tricks; this also includes the 'flags' variant of avc_has_perm(). * Use kmemdup() instead of kcalloc()+copy when copying parts of the SELinux policydb. * The InfiniBand device name is now passed by reference when possible in the SELinux code, removing a strncpy(). * Minor cleanups including: constification of avtab function args, removal of useless LSM/XFRM function args, SELinux kdoc fixes, and removal of redundant assignments. Everything has been tested against the selinux-testsuite and as of a few moments ago the tag applies cleanly to your tree; please merge this for v5.14. Thanks, -Paul --- The following changes since commit 6efb943b8616ec53a5e444193dccf1af9ad627b5: Linux 5.13-rc1 (2021-05-09 14:17:44 -0700) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/selinux.git tags/selinux-pr-20210629 for you to fetch changes up to d99cf13f14200cdb5cbb704345774c9c0698612d: selinux: kill 'flags' argument in avc_has_perm_flags() and avc_audit() (2021-06-11 13:11:45 -0400) ---------------------------------------------------------------- selinux/stable-5.14 PR 20210629 ---------------------------------------------------------------- Al Viro (2): selinux: slow_avc_audit has become non-blocking selinux: kill 'flags' argument in avc_has_perm_flags() and avc_audit() Jiapeng Chong (1): selinux: Remove redundant assignment to rc Minchan Kim (1): selinux: use __GFP_NOWARN with GFP_NOWAIT in the AVC Ondrej Mosnacek (3): selinux: simplify duplicate_policydb_cond_list() by using kmemdup() selinux: constify some avtab function arguments lsm_audit,selinux: pass IB device name by reference Souptick Joarder (1): selinux: Corrected comment to match kernel-doc comment Yang Li (1): selinux: Fix kernel-doc Zhongjun Tan (1): selinux: delete selinux_xfrm_policy_lookup() useless argument include/linux/lsm_audit.h | 8 ++--- include/linux/lsm_hook_defs.h | 3 +- include/linux/security.h | 4 +-- net/xfrm/xfrm_policy.c | 6 ++-- security/security.c | 4 +-- security/selinux/avc.c | 61 ++++++++-------------------------- security/selinux/hooks.c | 22 ++++---------- security/selinux/include/avc.h | 13 +-------- security/selinux/include/xfrm.h | 2 +- security/selinux/ss/avtab.c | 28 +++++++++--------- security/selinux/ss/avtab.h | 16 +++++----- security/selinux/ss/conditional.c | 14 +++++---- security/selinux/ss/policydb.c | 1 - security/selinux/ss/services.c | 27 +++++++++++++---- security/selinux/xfrm.c | 2 +- 15 files changed, 90 insertions(+), 121 deletions(-)