1. 12 7月, 2016 2 次提交
  2. 12 5月, 2015 1 次提交
    • C
      LSM: Switch to lists of hooks · b1d9e6b0
      Casey Schaufler 提交于
      Instead of using a vector of security operations
      with explicit, special case stacking of the capability
      and yama hooks use lists of hooks with capability and
      yama hooks included as appropriate.
      
      The security_operations structure is no longer required.
      Instead, there is a union of the function pointers that
      allows all the hooks lists to use a common mechanism for
      list management while retaining typing. Each module
      supplies an array describing the hooks it provides instead
      of a sparsely populated security_operations structure.
      The description includes the element that gets put on
      the hook list, avoiding the issues surrounding individual
      element allocation.
      
      The method for registering security modules is changed to
      reflect the information available. The method for removing
      a module, currently only used by SELinux, has also changed.
      It should be generic now, however if there are potential
      race conditions based on ordering of hook removal that needs
      to be addressed by the calling module.
      
      The security hooks are called from the lists and the first
      failure is returned.
      Signed-off-by: NCasey Schaufler <casey@schaufler-ca.com>
      Acked-by: NJohn Johansen <john.johansen@canonical.com>
      Acked-by: NKees Cook <keescook@chromium.org>
      Acked-by: NPaul Moore <paul@paul-moore.com>
      Acked-by: NStephen Smalley <sds@tycho.nsa.gov>
      Acked-by: NTetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>
      Signed-off-by: NJames Morris <james.l.morris@oracle.com>
      b1d9e6b0
  3. 19 7月, 2014 1 次提交
  4. 30 10月, 2013 2 次提交
  5. 15 8月, 2013 4 次提交
  6. 28 4月, 2013 5 次提交
  7. 23 2月, 2013 1 次提交
  8. 21 9月, 2012 1 次提交
  9. 14 4月, 2012 2 次提交
  10. 27 3月, 2012 1 次提交
  11. 14 3月, 2012 1 次提交
  12. 29 6月, 2011 1 次提交
  13. 23 6月, 2011 1 次提交
  14. 02 8月, 2010 2 次提交
    • J
      AppArmor: fix build warnings for non-const use of get_task_cred · 77c80e6b
      James Morris 提交于
      Fix build warnings for non-const use of get_task_cred.
      Signed-off-by: NJames Morris <jmorris@namei.org>
      77c80e6b
    • J
      AppArmor: functions for domain transitions · 898127c3
      John Johansen 提交于
      AppArmor routines for controling domain transitions, which can occur at
      exec or through self directed change_profile/change_hat calls.
      
      Unconfined tasks are checked at exec against the profiles in the confining
      profile namespace to determine if a profile should be attached to the task.
      
      Confined tasks execs are controlled by the profile which provides rules
      determining which execs are allowed and if so which profiles should be
      transitioned to.
      
      Self directed domain transitions allow a task to request transition
      to a given profile.  If the transition is allowed then the profile will
      be applied, either immeditately or at exec time depending on the request.
      Immeditate self directed transitions have several security limitations
      but have uses in setting up stub transition profiles and other limited
      cases.
      Signed-off-by: NJohn Johansen <john.johansen@canonical.com>
      Signed-off-by: NJames Morris <jmorris@namei.org>
      898127c3