[GIT PULL] SELinux patches for v5.3
Paul Moore
paul at paul-moore.com
Tue Jul 2 17:28:37 UTC 2019
Hi Linus,
Like the audit PR this is a little early due to some upcoming vacation
plans and uncertain network access while I'm away. Also like the
audit PR, the list of patches here is pretty minor, the highlights
include:
- Explicitly use __le variables to make sure "sparse" can verify
proper byte endian handling.
- Remove some BUG_ON()s that are no longer needed.
- Allow zero-byte writes to the "keycreate" procfs attribute without
requiring key:create to make it easier for userspace to reset the
keycreate label.
- Consistently log the "invalid_context" field as an untrusted string
in the AUDIT_SELINUX_ERR audit records.
Please pull this once the merge window opens,
-Paul
--
The following changes since commit a188339ca5a396acc588e5851ed7e19f66b0ebd9:
Linux 5.2-rc1 (2019-05-19 15:47:09 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/selinux.git
tags/selinux-pr-20190702
for you to fetch changes up to ea74a685ad819aeed316a9bae3d2a5bf762da82d:
selinux: format all invalid context as untrusted
(2019-07-01 16:29:05 -0400)
----------------------------------------------------------------
selinux/stable-5.3 PR 20190702
----------------------------------------------------------------
Nicholas Mc Guire (1):
selinux: provide __le variables explicitly
Ondrej Mosnacek (2):
selinux: remove some no-op BUG_ONs
selinux: fix empty write to keycreate file
Richard Guy Briggs (1):
selinux: format all invalid context as untrusted
security/selinux/hooks.c | 11 ++++++-----
security/selinux/ss/ebitmap.c | 10 ++++++----
security/selinux/ss/services.c | 33 +++++++++++++++++++--------------
3 files changed, 31 insertions(+), 23 deletions(-)
--
paul moore
www.paul-moore.com
More information about the Linux-security-module-archive
mailing list