Linux 7.1 Merge Window
14 Apr 2026 tags: audit lsm selinuxLinux v7.0 was released on Sunday, April 12th, with the Linux v7.1 merge window opening immediately afterwards. Below are the highlights of the LSM, SELinux, and audit pull requests which have been merged into Linus’ tree.
LSM
-
A LSM security blob was added to the
backing_filestructure, along with the associated LSM management hooks, as well as a new hook for controlling the memory mapping of an overlayfs backing file to resolve problems with themmap(2)andmprotect(2)operations on overlayfs files. Those LSMs which enforce memory mapping access controls on overlayfs files will likely need to be use these new additions to ensure proper security policy enforcement. -
Minor changes to leverage
kstrdup_const()andkfree_const()in securityfs. -
A number of small kernel-doc warnings were fixed.
SELinux
-
Updated the existing SELinux
mmap(2)andmprotect(2)access control implementations to leverage the new LSM additions and ensure that security policies involving overlayfs files are properly enforced. Unlike traditional filesystems where only the process acting on the file must have the necessary permissions for an action to succeed, on overlayfs files not only must the process acting on the user visible file have the necessary permissions, but the filesystem’s mounting process must also have the necessary permissions on the underlying backing file. -
A known, and harmless, race condition was annotated to quiet a KCSAN warning.
Audit
-
Additional input checking was added to catch unknown
AUDIT_SETrequests sent from userspace. Current kernels silently ignore anyAUDIT_SETrequests that were not understood and only returned an error if any of the known requests failed. This makes it difficult for userspace tools to determine what a given kernel supports in anAUDIT_SETrequest. Starting with Linux v7.1 if anAUDIT_SETrequest is made where at least one portion of the request is unknown, an-EINVALerror code will be returned to the user. -
A number of small style and formatting cleanups to the audit kernel code.