1. 29 4月, 2011 5 次提交
  2. 26 4月, 2011 4 次提交
  3. 25 4月, 2011 3 次提交
  4. 20 4月, 2011 1 次提交
  5. 08 4月, 2011 2 次提交
  6. 02 4月, 2011 1 次提交
  7. 29 3月, 2011 3 次提交
  8. 08 3月, 2011 4 次提交
  9. 04 3月, 2011 5 次提交
    • E
      SELinux: implement the new sb_remount LSM hook · 026eb167
      Eric Paris 提交于
      For SELinux we do not allow security information to change during a remount
      operation.  Thus this hook simply strips the security module options from
      the data and verifies that those are the same options as exist on the
      current superblock.
      Signed-off-by: NEric Paris <eparis@redhat.com>
      Reviewed-by: NJames Morris <jmorris@namei.org>
      026eb167
    • E
      LSM: Pass -o remount options to the LSM · ff36fe2c
      Eric Paris 提交于
      The VFS mount code passes the mount options to the LSM.  The LSM will remove
      options it understands from the data and the VFS will then pass the remaining
      options onto the underlying filesystem.  This is how options like the
      SELinux context= work.  The problem comes in that -o remount never calls
      into LSM code.  So if you include an LSM specific option it will get passed
      to the filesystem and will cause the remount to fail.  An example of where
      this is a problem is the 'seclabel' option.  The SELinux LSM hook will
      print this word in /proc/mounts if the filesystem is being labeled using
      xattrs.  If you pass this word on mount it will be silently stripped and
      ignored.  But if you pass this word on remount the LSM never gets called
      and it will be passed to the FS.  The FS doesn't know what seclabel means
      and thus should fail the mount.  For example an ext3 fs mounted over loop
      
      # mount -o loop /tmp/fs /mnt/tmp
      # cat /proc/mounts | grep /mnt/tmp
      /dev/loop0 /mnt/tmp ext3 rw,seclabel,relatime,errors=continue,barrier=0,data=ordered 0 0
      # mount -o remount /mnt/tmp
      mount: /mnt/tmp not mounted already, or bad option
      # dmesg
      EXT3-fs (loop0): error: unrecognized mount option "seclabel" or missing value
      
      This patch passes the remount mount options to an new LSM hook.
      Signed-off-by: NEric Paris <eparis@redhat.com>
      Reviewed-by: NJames Morris <jmorris@namei.org>
      ff36fe2c
    • H
      SELinux: Compute SID for the newly created socket · 2ad18bdf
      Harry Ciao 提交于
      The security context for the newly created socket shares the same
      user, role and MLS attribute as its creator but may have a different
      type, which could be specified by a type_transition rule in the relevant
      policy package.
      Signed-off-by: NHarry Ciao <qingtao.cao@windriver.com>
      [fix call to security_transition_sid to include qstr, Eric Paris]
      Signed-off-by: NEric Paris <eparis@redhat.com>
      Acked-by: NStephen Smalley <sds@tycho.nsa.gov>
      2ad18bdf
    • H
      SELinux: Socket retains creator role and MLS attribute · 6f5317e7
      Harry Ciao 提交于
      The socket SID would be computed on creation and no longer inherit
      its creator's SID by default. Socket may have a different type but
      needs to retain the creator's role and MLS attribute in order not
      to break labeled networking and network access control.
      
      The kernel value for a class would be used to determine if the class
      if one of socket classes. If security_compute_sid is called from
      userspace the policy value for a class would be mapped to the relevant
      kernel value first.
      Signed-off-by: NHarry Ciao <qingtao.cao@windriver.com>
      Signed-off-by: NEric Paris <eparis@redhat.com>
      Acked-by: NStephen Smalley <sds@tycho.nsa.gov>
      6f5317e7
    • H
      SELinux: Auto-generate security_is_socket_class · 4bc6c2d5
      Harry Ciao 提交于
      The security_is_socket_class() is auto-generated by genheaders based
      on classmap.h to reduce maintenance effort when a new class is defined
      in SELinux kernel. The name for any socket class should be suffixed by
      "socket" and doesn't contain more than one substr of "socket".
      Signed-off-by: NHarry Ciao <qingtao.cao@windriver.com>
      Signed-off-by: NEric Paris <eparis@redhat.com>
      Acked-by: NStephen Smalley <sds@tycho.nsa.gov>
      4bc6c2d5
  10. 03 3月, 2011 1 次提交
  11. 26 2月, 2011 5 次提交
  12. 24 2月, 2011 1 次提交
    • M
      ima: remove unnecessary call to ima_must_measure · 1adace9b
      Mimi Zohar 提交于
      The original ima_must_measure() function based its results on cached
      iint information, which required an iint be allocated for all files.
      Currently, an iint is allocated only for files in policy.  As a result,
      for those files in policy, ima_must_measure() is now called twice: once
      to determine if the inode is in the measurement policy and, the second
      time, to determine if it needs to be measured/re-measured.
      
      The second call to ima_must_measure() unnecessarily checks to see if
      the file is in policy. As we already know the file is in policy, this
      patch removes the second unnecessary call to ima_must_measure(), removes
      the vestige iint parameter, and just checks the iint directly to determine
      if the inode has been measured or needs to be measured/re-measured.
      Signed-off-by: NMimi Zohar <zohar@us.ibm.com>
      Acked-by: NEric Paris <eparis@redhat.com>
      1adace9b
  13. 11 2月, 2011 1 次提交
  14. 10 2月, 2011 4 次提交