From patchwork Thu Aug 5 18:29:27 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Paul Moore X-Patchwork-Id: 12421805 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-18.8 required=3.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,INCLUDES_PULL_REQUEST, MAILING_LIST_MULTI,MENTIONS_GIT_HOSTING,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 34639C4338F for ; Thu, 5 Aug 2021 18:29:41 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 1ACC26115B for ; Thu, 5 Aug 2021 18:29:41 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239269AbhHES3y (ORCPT ); Thu, 5 Aug 2021 14:29:54 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41598 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236534AbhHES3y (ORCPT ); Thu, 5 Aug 2021 14:29:54 -0400 Received: from mail-ed1-x52b.google.com (mail-ed1-x52b.google.com [IPv6:2a00:1450:4864:20::52b]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5E331C0613D5 for ; Thu, 5 Aug 2021 11:29:39 -0700 (PDT) Received: by mail-ed1-x52b.google.com with SMTP id d6so9690961edt.7 for ; Thu, 05 Aug 2021 11:29:39 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=paul-moore-com.20150623.gappssmtp.com; s=20150623; h=mime-version:from:date:message-id:subject:to:cc; bh=1c3VrQ3FItr1tlZhwJQtIGHjV4vRn9xHIa6kZJ9nIxc=; b=ENJ2jsN+dNUIpx8dGcAJJc8GzMluVKbrtwQDHErnQEU/A81cSqgkoF7qq0hI7vjVBC 6SAeq763ZYep6+7i423qXiE3kOy6oCxfX7Y2JfLsPG1JLfWvy5mJ7LfxrZeBqyMCw4YA oEMOdMhyxUTJvSeiTF2Fg4TObSBepBxN/52U/KCJyHXGzFUXGscu8+7rP/mzed1T9JU8 Zrf+y/MbvTrSGMA6Mlh/NoQTO+pIt3N1ECtqu9hZj5Mzh3p5OejjLV65uESnUJQiEP1v hUp8MlMC4lWTtoNH1DbTRLzTji+LBgC6kVMhfyCf37jljEY9wcDDBsVAC9WM3psi7tg7 v6wQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to:cc; bh=1c3VrQ3FItr1tlZhwJQtIGHjV4vRn9xHIa6kZJ9nIxc=; b=U9SQAlklwu3AakCCHIkSz0+5xKGGFTLIr92xGrsjV0VKpvEo/ABsItBPyjMsQgzSVa 0+so1l0/StHHk1+NswQfWOnQvrsHnoC8uAdgKavkoLS6eyTWVHTZWj1HOl4LNquv13fE YsGEh4sZM/ddUehdIlA/BnHRKhdpFKpbp4Zx3QTcVHKB5HI7rjN5Hk9Rk55vv0lyBbIK gSoTrK9ocWxpDbh2RqPZVgP5himdN6Sknk1EQUFQAOl4SellonCX36haeBXJ+UNu+ofm 9qaiSVONC3iP6nqA66IliDyOOWo0tixnYJphU6Lx3VEZRrz0RH2n3ByIYyiQXEld9oTD 0upA== X-Gm-Message-State: AOAM532NXoTNvagVoICBRZ/i8316tsuRLhNXZWmpW57ljnH9uz8Twtht dVj5lSrLwjC8AKH8sKsci+Y+3a5z433FAknbeEYb X-Google-Smtp-Source: ABdhPJxmgP4jWmPz3uLlSNLgR3I1TzKQRWyBUxibakNf4A77O6mTWX6u7RjsU7kbIgC5PZEppaJdr85FcRRrMvhw6P8= X-Received: by 2002:a05:6402:b83:: with SMTP id cf3mr8328900edb.12.1628188177841; Thu, 05 Aug 2021 11:29:37 -0700 (PDT) MIME-Version: 1.0 From: Paul Moore Date: Thu, 5 Aug 2021 14:29:27 -0400 Message-ID: Subject: [GIT PULL] SELinux fixes for v5.14 (#1) To: Linus Torvalds Cc: selinux@vger.kernel.org, linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org Precedence: bulk List-ID: Hi Linus, One small SELinux fix for v5.14-rcX to fix a problem where an error code was not being propagated back up to userspace when a bogus SELinux policy is loaded into the kernel. The patch passes the selinux-testsuite and merges cleanly with your tree as of a few minutes ago; please merge this for the next release. Thanks, -Paul --- The following changes since commit d99cf13f14200cdb5cbb704345774c9c0698612d: selinux: kill 'flags' argument in avc_has_perm_flags() and avc_audit() (2021-0 6-11 13:11:45 -0400) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/selinux.git tags/selinux -pr-20210805 for you to fetch changes up to 4c156084daa8ee70978e4b150b5eb5fc7b1f15be: selinux: correct the return value when loads initial sids (2021-08-02 09:59:50 -0400) ---------------------------------------------------------------- selinux/stable-5.14 PR 20210805 ---------------------------------------------------------------- Xiu Jianfeng (1): selinux: correct the return value when loads initial sids security/selinux/ss/policydb.c | 10 ++++------ 1 file changed, 4 insertions(+), 6 deletions(-)