[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <795b758412f3cb7dc64777a6fde9c16c@paul-moore.com>
Date: Sun, 23 Mar 2025 15:39:42 -0400
From: Paul Moore <paul@...l-moore.com>
To: Linus Torvalds <torvalds@...ux-foundation.org>
Cc: linux-security-module@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: [GIT PULL] lsm/lsm-pr-20250323
Linus,
Here is the LSM framework pull request for the Linux v6.15 merge window,
the highlights are below:
- Various minor updates to the LSM Rust bindings
Changes include marking trivial Rust bindings as inlines and comment
tweaks to better reflect the LSM hooks.
- Add LSM/SELinux access controls to io_uring_allowed()
Similar to the io_uring_disabled sysctl, add a LSM hook to
io_uring_allowed() to enable LSMs a simple way to enforce security
policy on the use of io_uring. This pull request includes SELinux
support for this new control using the io_uring/allowed permission.
- Remove an unused parameter from the security_perf_event_open() hook
The perf_event_attr struct parameter was not used by any currently
supported LSMs, remove it from the hook.
- Add an explicit MAINTAINERS entry for the credentials code
We've seen problems in the past where patches to the credentials
code sent by non-maintainers would often languish on the lists for
multiple months as there was no one explicitly tasked with the
responsibility of reviewing and/or merging credentials related code.
Considering that most of the code under security/ has a vested
interest in ensuring that the credentials code is well maintained,
I'm volunteering to look after the credentials code and Serge Hallyn
has also volunteered to step up as an official reviewer. I posted
the MAINTAINERS update as a RFC to LKML in hopes that someone else
would jump up with an "I'll do it!", but beyond Serge it was all
crickets.
- Update Stephen Smalley's old email address to prevent confusion
This includes a corresponding update to the mailmap file.
Please merge,
-Paul
--
The following changes since commit 2014c95afecee3e76ca4a56956a936e23283f05b:
Linux 6.14-rc1 (2025-02-02 15:39:26 -0800)
are available in the Git repository at:
https://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/lsm.git
tags/lsm-pr-20250323
for you to fetch changes up to 65b796acea1e5efc13eb29fdb4638fd26deabc17:
mailmap: map Stephen Smalley's old email addresses
(2025-03-10 16:06:24 -0400)
----------------------------------------------------------------
lsm/stable-6.15 PR 20250323
----------------------------------------------------------------
Alice Ryhl (3):
lsm,rust: mark SecurityCtx methods inline
lsm,rust: reword "destroy" -> "release" in SecurityCtx
cred,rust: mark Credential methods inline
Hamza Mahfooz (2):
io_uring: refactor io_uring_allowed()
io_uring,lsm,selinux: add LSM hooks for io_uring_setup()
Luo Gengkun (1):
perf: Remove unnecessary parameter of security check
Paul Moore (2):
lsm: fix a missing security_uring_allowed() prototype
MAINTAINERS: add an explicit credentials entry
Stephen Smalley (2):
lsm: remove old email address for Stephen Smalley
mailmap: map Stephen Smalley's old email addresses
sergeh@...nel.org (1):
MAINTAINERS: add Serge Hallyn as a credentials reviewer
.mailmap | 2 ++
MAINTAINERS | 10 ++++++++++
arch/x86/events/intel/bts.c | 2 +-
arch/x86/events/intel/core.c | 2 +-
arch/x86/events/intel/p4.c | 2 +-
drivers/perf/arm_spe_pmu.c | 4 ++--
include/linux/lsm_audit.h | 2 +-
include/linux/lsm_hook_defs.h | 3 ++-
include/linux/perf_event.h | 10 +++++-----
include/linux/security.h | 10 +++++++---
io_uring/io_uring.c | 21 ++++++++++++++-------
kernel/events/core.c | 14 +++++++-------
kernel/trace/trace_event_perf.c | 4 ++--
rust/kernel/cred.rs | 5 +++++
rust/kernel/security.rs | 12 ++++++++----
security/lsm_audit.c | 2 +-
security/security.c | 17 ++++++++++++++---
security/selinux/hooks.c | 16 +++++++++++++++-
security/selinux/include/classmap.h | 2 +-
19 files changed, 99 insertions(+), 41 deletions(-)
--
paul-moore.com
Powered by blists - more mailing lists