From patchwork Thu Aug 5 18:29:27 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Paul Moore X-Patchwork-Id: 12421807 X-Patchwork-Delegate: paul@paul-moore.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-18.8 required=3.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,INCLUDES_PULL_REQUEST, MAILING_LIST_MULTI,MENTIONS_GIT_HOSTING,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3C700C4320A for ; Thu, 5 Aug 2021 18:29:42 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 20F7F61158 for ; Thu, 5 Aug 2021 18:29:42 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237842AbhHES3z (ORCPT ); Thu, 5 Aug 2021 14:29:55 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41600 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240784AbhHES3z (ORCPT ); Thu, 5 Aug 2021 14:29:55 -0400 Received: from mail-ed1-x534.google.com (mail-ed1-x534.google.com [IPv6:2a00:1450:4864:20::534]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5E7D6C061798 for ; Thu, 5 Aug 2021 11:29:39 -0700 (PDT) Received: by mail-ed1-x534.google.com with SMTP id cf5so9730377edb.2 for ; Thu, 05 Aug 2021 11:29:39 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=paul-moore-com.20150623.gappssmtp.com; s=20150623; h=mime-version:from:date:message-id:subject:to:cc; bh=1c3VrQ3FItr1tlZhwJQtIGHjV4vRn9xHIa6kZJ9nIxc=; b=ENJ2jsN+dNUIpx8dGcAJJc8GzMluVKbrtwQDHErnQEU/A81cSqgkoF7qq0hI7vjVBC 6SAeq763ZYep6+7i423qXiE3kOy6oCxfX7Y2JfLsPG1JLfWvy5mJ7LfxrZeBqyMCw4YA oEMOdMhyxUTJvSeiTF2Fg4TObSBepBxN/52U/KCJyHXGzFUXGscu8+7rP/mzed1T9JU8 Zrf+y/MbvTrSGMA6Mlh/NoQTO+pIt3N1ECtqu9hZj5Mzh3p5OejjLV65uESnUJQiEP1v hUp8MlMC4lWTtoNH1DbTRLzTji+LBgC6kVMhfyCf37jljEY9wcDDBsVAC9WM3psi7tg7 v6wQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to:cc; bh=1c3VrQ3FItr1tlZhwJQtIGHjV4vRn9xHIa6kZJ9nIxc=; b=eCbFEnC2Y1FCmyhvNwCB/K4ISpDOqRTKy7gxI7neZNZeub26yMM1Y2r1fa07XGYk8r v9ojd5++tKDn0pK9Cz+PaPDk687vd14NwZLqY7OOLsEg+oGgid4Qlc4oMuFvzSM1jFdz sFNAN1zLP3/awejsyaeCQVHJmniJ/27gsj6gFcXsKBVEjELibVzDOVGKN30oIiRD+x2P 71PJglS/76y31QljhNjlfEbKCRUfjLp7hnPfnoYvQF06d4VZ/nyzevbk0g/iUjEOXqHk PZQDR57r6Xm3CUOOjBvmu2bjfvZHYnhFfXhP3YnXo++8OS+qhjDgOvJCxQcr04N2Z2iX WURg== X-Gm-Message-State: AOAM5304EU0v6K6UwCf5zhBpOM8CGGpemvW6MPhoy5JjhmAKDHD7e0BI HPg98vbQ3aQDfbovFu9lIqzOSFmnDRYLmNRlJCdK X-Google-Smtp-Source: ABdhPJxmgP4jWmPz3uLlSNLgR3I1TzKQRWyBUxibakNf4A77O6mTWX6u7RjsU7kbIgC5PZEppaJdr85FcRRrMvhw6P8= X-Received: by 2002:a05:6402:b83:: with SMTP id cf3mr8328900edb.12.1628188177841; Thu, 05 Aug 2021 11:29:37 -0700 (PDT) MIME-Version: 1.0 From: Paul Moore Date: Thu, 5 Aug 2021 14:29:27 -0400 Message-ID: Subject: [GIT PULL] SELinux fixes for v5.14 (#1) To: Linus Torvalds Cc: selinux@vger.kernel.org, linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: selinux@vger.kernel.org Hi Linus, One small SELinux fix for v5.14-rcX to fix a problem where an error code was not being propagated back up to userspace when a bogus SELinux policy is loaded into the kernel. The patch passes the selinux-testsuite and merges cleanly with your tree as of a few minutes ago; please merge this for the next release. Thanks, -Paul --- The following changes since commit d99cf13f14200cdb5cbb704345774c9c0698612d: selinux: kill 'flags' argument in avc_has_perm_flags() and avc_audit() (2021-0 6-11 13:11:45 -0400) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/selinux.git tags/selinux -pr-20210805 for you to fetch changes up to 4c156084daa8ee70978e4b150b5eb5fc7b1f15be: selinux: correct the return value when loads initial sids (2021-08-02 09:59:50 -0400) ---------------------------------------------------------------- selinux/stable-5.14 PR 20210805 ---------------------------------------------------------------- Xiu Jianfeng (1): selinux: correct the return value when loads initial sids security/selinux/ss/policydb.c | 10 ++++------ 1 file changed, 4 insertions(+), 6 deletions(-)