1. 11 1月, 2019 3 次提交
    • M
      LSM: generalize flag passing to security_capable · c1a85a00
      Micah Morton 提交于
      This patch provides a general mechanism for passing flags to the
      security_capable LSM hook. It replaces the specific 'audit' flag that is
      used to tell security_capable whether it should log an audit message for
      the given capability check. The reason for generalizing this flag
      passing is so we can add an additional flag that signifies whether
      security_capable is being called by a setid syscall (which is needed by
      the proposed SafeSetID LSM).
      Signed-off-by: NMicah Morton <mortonm@chromium.org>
      Reviewed-by: NKees Cook <keescook@chromium.org>
      Signed-off-by: NJames Morris <james.morris@microsoft.com>
      c1a85a00
    • J
      Merge tag 'blob-stacking-security-next' of... · 2233975c
      James Morris 提交于
      Merge tag 'blob-stacking-security-next' of https://git.kernel.org/pub/scm/linux/kernel/git/kees/linux into next-general
      
      LSM: Module stacking for SARA and Landlock
      
      The combined series of LSM refactoring and addition of blob-sharing for
      SARA and Landlock.
      
      From Casey:
      
      v5: Include Kees Cook's rework of the lsm command
          line interface.
      v4: Finer granularity in the patches and other
          cleanups suggested by Kees Cook.
          Removed dead code created by the removal of SELinux
          credential blob poisoning.
      v3: Add ipc blob for SARA and task blob for Landlock.
          Removing the SELinux cred blob pointer poisoning
          results selinux_is_enabled() being unused, so it and
          all it's overhead has been removed.
          Broke up the cred infrastructure patch.
      v2: Reduce the patchset to what is required to support
          the proposed SARA and LandLock security modules
      
      The SARA security module is intended to be used
      in conjunction with other security modules. It requires
      state to be maintained for the credential, which
      in turn requires a mechanism for sharing the credential
      security blob. It also uses the ipc security blob. The
      module also requires mechanism for user space manipulation
      of the credential information, hence an additional
      subdirectory in /proc/.../attr.
      
      The LandLock security module provides user configurable
      policy in the secmark mechanism. It requires data in
      the credential, file, inode and task security blobs. For
      this to be used along side the existing "major" security
      modules mechanism for sharing these blobs are provided.
      
      A side effect of providing sharing of the crendential
      security blob is that the TOMOYO module can be used at
      the same time as the other "major" modules.
      
      The mechanism for configuring which security modules are
      enabled has to change when stacking in enabled. Any
      module that uses just the security blobs that are shared
      can be selected. Additionally, one other "major" module
      can be selected.
      
      The security module stacking issues around networking and
      IPC are not addressed here as they are beyond what is
      required for TOMOYO, SARA and LandLock.
      2233975c
    • J
      Merge tag 'v5.0-rc1' into next-general · 49e41801
      James Morris 提交于
      Linux 5.0-rc1
      
      Sync to pick up LSM stacking work (which is based on -rc1).
      49e41801
  2. 09 1月, 2019 37 次提交