On Thu, Jun 5, 2025 at 2:09 PM Stephen Smalley <stephen.smalley.work@xxxxxxxxx> wrote: > On Tue, Apr 29, 2025 at 7:35 PM Paul Moore <paul@xxxxxxxxxxxxxx> wrote: > > > > On Mon, Apr 28, 2025 at 4:15 PM Stephen Smalley > > <stephen.smalley.work@xxxxxxxxx> wrote: > > > > > > Update the security_inode_listsecurity() interface to allow > > > use of the xattr_list_one() helper and update the hook > > > implementations. > > > > > > Link: https://lore.kernel.org/selinux/20250424152822.2719-1-stephen.smalley.work@xxxxxxxxx/ > > > > > > Signed-off-by: Stephen Smalley <stephen.smalley.work@xxxxxxxxx> > > > --- > > > This patch is relative to the one linked above, which in theory is on > > > vfs.fixes but doesn't appear to have been pushed when I looked. > > > > > > fs/nfs/nfs4proc.c | 10 ++++++---- > > > fs/xattr.c | 19 +++++++------------ > > > include/linux/lsm_hook_defs.h | 4 ++-- > > > include/linux/security.h | 5 +++-- > > > net/socket.c | 17 +++++++---------- > > > security/security.c | 16 ++++++++-------- > > > security/selinux/hooks.c | 10 +++------- > > > security/smack/smack_lsm.c | 13 ++++--------- > > > 8 files changed, 40 insertions(+), 54 deletions(-) > > > > Thanks Stephen. Once we get ACKs from the NFS, netdev, and Smack > > folks I can pull this into the LSM tree. > > Note that this will need to have a conflict resolved with: > https://lore.kernel.org/selinux/20250605164852.2016-1-stephen.smalley.work@xxxxxxxxx/ > > Fortunately it should be straightforward - just delete the line added > by that patch since this patch fixes the security_inode_listsecurity() > hook interface to return 0 or -errno itself. Yep, I'm pretty much just waiting on -rc1 right now. -- paul-moore.com