Merge tag 'secureexec-v4.14-rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/kees/linux
Pull secureexec update from Kees Cook: "This series has the ultimate goal of providing a sane stack rlimit when running set*id processes. To do this, the bprm_secureexec LSM hook is collapsed into the bprm_set_creds hook so the secureexec-ness of an exec can be determined early enough to make decisions about rlimits and the resulting memory layouts. Other logic acting on the secureexec-ness of an exec is similarly consolidated. Capabilities needed some special handling, but the refactoring removed other special handling, so that was a wash" * tag 'secureexec-v4.14-rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/kees/linux: exec: Consolidate pdeath_signal clearing exec: Use sane stack rlimit under secureexec exec: Consolidate dumpability logic smack: Remove redundant pdeath_signal clearing exec: Use secureexec for clearing pdeath_signal exec: Use secureexec for setting dumpability LSM: drop bprm_secureexec hook commoncap: Move cap_elevated calculation into bprm_set_creds commoncap: Refactor to remove bprm_secureexec hook smack: Refactor to remove bprm_secureexec hook selinux: Refactor to remove bprm_secureexec hook apparmor: Refactor to remove bprm_secureexec hook binfmt: Introduce secureexec flag exec: Correct comments about "point of no return" exec: Rename bprm->cred_prepared to called_set_creds
No related branches found
No related tags found
Showing
- fs/binfmt_elf.c 1 addition, 1 deletionfs/binfmt_elf.c
- fs/binfmt_elf_fdpic.c 1 addition, 1 deletionfs/binfmt_elf_fdpic.c
- fs/binfmt_flat.c 1 addition, 1 deletionfs/binfmt_flat.c
- fs/exec.c 41 additions, 15 deletionsfs/exec.c
- include/linux/binfmts.h 19 additions, 5 deletionsinclude/linux/binfmts.h
- include/linux/lsm_hooks.h 5 additions, 9 deletionsinclude/linux/lsm_hooks.h
- include/linux/security.h 0 additions, 7 deletionsinclude/linux/security.h
- security/apparmor/domain.c 2 additions, 19 deletionssecurity/apparmor/domain.c
- security/apparmor/include/domain.h 0 additions, 1 deletionsecurity/apparmor/include/domain.h
- security/apparmor/include/file.h 0 additions, 3 deletionssecurity/apparmor/include/file.h
- security/apparmor/lsm.c 0 additions, 1 deletionsecurity/apparmor/lsm.c
- security/commoncap.c 11 additions, 39 deletionssecurity/commoncap.c
- security/security.c 0 additions, 5 deletionssecurity/security.c
- security/selinux/hooks.c 6 additions, 20 deletionssecurity/selinux/hooks.c
- security/smack/smack_lsm.c 3 additions, 31 deletionssecurity/smack/smack_lsm.c
- security/tomoyo/tomoyo.c 1 addition, 1 deletionsecurity/tomoyo/tomoyo.c
Loading
Please register or sign in to comment