11 Jan, 2019

1 commit

  • This patch provides a general mechanism for passing flags to the
    security_capable LSM hook. It replaces the specific 'audit' flag that is
    used to tell security_capable whether it should log an audit message for
    the given capability check. The reason for generalizing this flag
    passing is so we can add an additional flag that signifies whether
    security_capable is being called by a setid syscall (which is needed by
    the proposed SafeSetID LSM).

    Signed-off-by: Micah Morton
    Reviewed-by: Kees Cook
    Signed-off-by: James Morris

    Micah Morton
     

10 Feb, 2018

1 commit

  • Now that file contexts have been moved into file, and task context
    fns() and data have been split from the context, only the cred context
    remains in context.h so rename to cred.h to better reflect what it
    deals with.

    Signed-off-by: John Johansen

    John Johansen
     

11 Jun, 2017

1 commit


09 Jun, 2017

1 commit

  • prefixes are used for fns/data that are not static to apparmorfs.c
    with the prefixes being
    aafs - special magic apparmorfs for policy namespace data
    aa_sfs - for fns/data that go into securityfs
    aa_fs - for fns/data that may be used in the either of aafs or
    securityfs

    Signed-off-by: John Johansen
    Reviewed-by: Seth Arnold
    Reviewed-by: Kees Cook

    John Johansen
     

16 Jan, 2017

2 commits


30 Oct, 2013

1 commit


15 Aug, 2013

1 commit


10 Apr, 2012

3 commits


04 Apr, 2012

1 commit

  • Linus found that the gigantic size of the common audit data caused a big
    perf hit on something as simple as running stat() in a loop. This patch
    requires LSMs to declare the LSM specific portion separately rather than
    doing it in a union. Thus each LSM can be responsible for shrinking their
    portion and don't have to pay a penalty just because other LSMs have a
    bigger space requirement.

    Signed-off-by: Eric Paris
    Signed-off-by: Linus Torvalds

    Eric Paris
     

02 Aug, 2010

1 commit

  • ipc:
    AppArmor ipc is currently limited to mediation done by file mediation
    and basic ptrace tests. Improved mediation is a wip.

    rlimits:
    AppArmor provides basic abilities to set and control rlimits at
    a per profile level. Only resources specified in a profile are controled
    or set. AppArmor rules set the hard limit to a value
    Signed-off-by: James Morris

    John Johansen