[GIT PULL] SELinux patches for v5.4

Paul Moore paul at paul-moore.com
Tue Sep 17 19:38:05 UTC 2019


Hi Linus,

Eight SELinux patches for v5.4, the highlights are listed below and
all pass the selinux-testsuite, please merge for v5.4.

- Add LSM hooks, and SELinux access control hooks, for dnotify,
fanotify, and inotify watches.  This has been discussed with both the
LSM and fs/notify folks and everybody is good with these new hooks.

- The LSM stacking changes missed a few calls to current_security() in
the SELinux code; we fix those and remove current_security() for good.

- Improve our network object labeling cache so that we always return
the object's label, even when under memory pressure.  Previously we
would return an error if we couldn't allocate a new cache entry, now
we always return the label even if we can't create a new cache entry
for it.

- Convert the sidtab atomic_t counter to a normal u32 with
READ/WRITE_ONCE() and memory barrier protection.

- A few patches to policydb.c to clean things up (remove forward
declarations, long lines, bad variable names, etc.).

Thanks,
-Paul

--
The following changes since commit 45385237f65aeee73641f1ef737d7273905a233f:

 selinux: fix memory leak in policydb_init() (2019-07-31 16:51:23 -0400)

are available in the Git repository at:

 git://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/selinux.git
   tags/selinux-pr-20190917

for you to fetch changes up to 15322a0d90b6fd62ae8f22e5b87f735c3fdfeff7:

 lsm: remove current_security() (2019-09-04 18:53:39 -0400)

----------------------------------------------------------------
selinux/stable-5.4 PR 20190917

----------------------------------------------------------------
Aaron Goidel (1):
     fanotify, inotify, dnotify, security: add security hook for fs
       notifications

Ondrej Mosnacek (3):
     selinux: policydb - fix some checkpatch.pl warnings
     selinux: policydb - rename type_val_to_struct_array
     selinux: avoid atomic_t usage in sidtab

Paul Moore (3):
     selinux: shuffle around policydb.c to get rid of forward declarations
     selinux: always return a secid from the network caches if we find one
     lsm: remove current_security()

Stephen Smalley (1):
     selinux: fix residual uses of current_security() for the SELinux blob

fs/notify/dnotify/dnotify.c         |  15 +-
fs/notify/fanotify/fanotify_user.c  |  19 +-
fs/notify/inotify/inotify_user.c    |  14 +-
include/linux/cred.h                |   1 -
include/linux/lsm_hooks.h           |   9 +-
include/linux/security.h            |  10 +-
security/security.c                 |   6 +
security/selinux/hooks.c            |  49 ++++-
security/selinux/include/classmap.h |   5 +-
security/selinux/include/objsec.h   |  20 +-
security/selinux/netif.c            |  31 ++-
security/selinux/netnode.c          |  30 ++-
security/selinux/netport.c          |  24 +--
security/selinux/ss/policydb.c      | 402 +++++++++++++++---------------
security/selinux/ss/policydb.h      |   2 +-
security/selinux/ss/services.c      |   6 +-
security/selinux/ss/sidtab.c        |  48 ++---
security/selinux/ss/sidtab.h        |  19 +-
18 files changed, 403 insertions(+), 307 deletions(-)

-- 
paul moore
www.paul-moore.com



More information about the Linux-security-module-archive mailing list