Merge tag 'selinux-pr-20211101' of git://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/selinux
Pull selinux updates from Paul Moore: - Add LSM/SELinux/Smack controls and auditing for io-uring. As usual, the individual commit descriptions have more detail, but we were basically missing two things which we're adding here: + establishment of a proper audit context so that auditing of io-uring ops works similarly to how it does for syscalls (with some io-uring additions because io-uring ops are *not* syscalls) + additional LSM hooks to enable access control points for some of the more unusual io-uring features, e.g. credential overrides. The additional audit callouts and LSM hooks were done in conjunction with the io-uring folks, based on conversations and RFC patches earlier in the year. - Fixup the binder credential handling so that the proper credentials are used in the LSM hooks; the commit description and the code comment which is removed in these patches are helpful to understand the background and why this is the proper fix. - Enable SELinux genfscon policy support for securityfs, allowing improved SELinux filesystem labeling for other subsystems which make use of securityfs, e.g. IMA. * tag 'selinux-pr-20211101' of git://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/selinux: security: Return xattr name from security_dentry_init_security() selinux: fix a sock regression in selinux_ip_postroute_compat() binder: use cred instead of task for getsecid binder: use cred instead of task for selinux checks binder: use euid from cred instead of using task LSM: Avoid warnings about potentially unused hook variables selinux: fix all of the W=1 build warnings selinux: make better use of the nf_hook_state passed to the NF hooks selinux: fix race condition when computing ocontext SIDs selinux: remove unneeded ipv6 hook wrappers selinux: remove the SELinux lockdown implementation selinux: enable genfscon labeling for securityfs Smack: Brutalist io_uring support selinux: add support for the io_uring access controls lsm,io_uring: add LSM hooks to io_uring io_uring: convert io_uring to the secure anon inode interface fs: add anon_inode_getfile_secure() similar to anon_inode_getfd_secure() audit: add filtering for io_uring records audit,io_uring,io-wq: add some basic audit support to io_uring audit: prepare audit_context for use in calling contexts beyond syscalls
Showing
- drivers/android/binder.c 10 additions, 17 deletionsdrivers/android/binder.c
- drivers/android/binder_internal.h 4 additions, 0 deletionsdrivers/android/binder_internal.h
- fs/anon_inodes.c 29 additions, 0 deletionsfs/anon_inodes.c
- fs/ceph/xattr.c 1 addition, 2 deletionsfs/ceph/xattr.c
- fs/io-wq.c 4 additions, 0 deletionsfs/io-wq.c
- fs/io_uring.c 63 additions, 8 deletionsfs/io_uring.c
- fs/nfs/nfs4proc.c 2 additions, 1 deletionfs/nfs/nfs4proc.c
- include/linux/anon_inodes.h 4 additions, 0 deletionsinclude/linux/anon_inodes.h
- include/linux/audit.h 26 additions, 0 deletionsinclude/linux/audit.h
- include/linux/lsm_hook_defs.h 14 additions, 8 deletionsinclude/linux/lsm_hook_defs.h
- include/linux/lsm_hooks.h 23 additions, 7 deletionsinclude/linux/lsm_hooks.h
- include/linux/security.h 39 additions, 16 deletionsinclude/linux/security.h
- include/uapi/linux/audit.h 3 additions, 1 deletioninclude/uapi/linux/audit.h
- kernel/audit.h 6 additions, 1 deletionkernel/audit.h
- kernel/audit_tree.c 2 additions, 1 deletionkernel/audit_tree.c
- kernel/audit_watch.c 2 additions, 1 deletionkernel/audit_watch.c
- kernel/auditfilter.c 12 additions, 3 deletionskernel/auditfilter.c
- kernel/auditsc.c 368 additions, 100 deletionskernel/auditsc.c
- security/security.c 24 additions, 11 deletionssecurity/security.c
- security/selinux/avc.c 12 additions, 1 deletionsecurity/selinux/avc.c
Please register or sign in to comment