15 Aug, 2013
5 commits
-
Provide userspace the ability to introspect a sha1 hash value for each
profile currently loaded.Signed-off-by: John Johansen
Acked-by: Seth Arnold -
Add the ability to take in and report a human readable profile attachment
string for profiles so that attachment specifications can be easily
inspected.Signed-off-by: John Johansen
Acked-by: Seth Arnold -
Allow emulating the default profile behavior from boot, by allowing
loading of a profile in the unconfined state into a new NS.Signed-off-by: John Johansen
Acked-by: Seth Arnold -
Signed-off-by: John Johansen
-
previously profiles had to be loaded one at a time, which could result
in cases where a replacement of a set would partially succeed, and then fail
resulting in inconsistent policy.Allow multiple profiles to replaced "atomically" so that the replacement
either succeeds or fails for the entire set of profiles.Signed-off-by: John Johansen
28 Apr, 2013
2 commits
-
The sid is not going to be a direct property of a profile anymore, instead
it will be directly related to the label, and the profile will pickup
a label back reference.For null-profiles replace the use of sid with a per namespace unique
id.Signed-off-by: John Johansen
Acked-by: Kees Cook -
Signed-off-by: John Johansen
Acked-by: Steve Beattie
10 Apr, 2012
2 commits
-
It isn't needed. If you don't set the type of the data associated with
that type it is a pretty obvious programming bug. So why waste the cycles?Signed-off-by: Eric Paris
-
Just open code it so grep on the source code works better.
Signed-off-by: Eric Paris
04 Apr, 2012
1 commit
-
Linus found that the gigantic size of the common audit data caused a big
perf hit on something as simple as running stat() in a loop. This patch
requires LSMs to declare the LSM specific portion separately rather than
doing it in a union. Thus each LSM can be responsible for shrinking their
portion and don't have to pay a penalty just because other LSMs have a
bigger space requirement.Signed-off-by: Eric Paris
Signed-off-by: Linus Torvalds
15 Mar, 2012
1 commit
-
Add the base support for the new policy extensions. This does not bring
any additional functionality, or change current semantics.Signed-off-by: John Johansen
Acked-by: Kees Cook
14 Mar, 2012
1 commit
-
Post unpacking of policy a verification pass is made on x transition
indexes. When this fails a call to audit_iface is made resulting in an
oops, because audit_iface is expecting a valid buffer position but
since the failure comes from post unpack verification there is none.Make the position argument optional so that audit_iface can be called
from post unpack verification.Signed-off-by: John Johansen
28 Feb, 2012
1 commit
-
The unpacking of struct capsx is missing a check for the end of the
caps structure. This can lead to unpack failures depending on what else
is packed into the policy file being unpacked.Signed-off-by: John Johansen
Acked-by: Kees Cook
10 Sep, 2011
1 commit
-
Fix the following warnings:
security/apparmor/policy_unpack.c:384:35: warning: symbol 'size' shadows an earlier one
security/apparmor/policy_unpack.c:370:24: originally declared here
security/apparmor/policy_unpack.c:443:29: warning: symbol 'tmp' shadows an earlier one
security/apparmor/policy_unpack.c:434:21: originally declared hereSigned-off-by: James Morris
Acked-by: John Johansen
20 May, 2011
1 commit
-
move LSM-, credentials-, and keys-related files from Documentation/
to Documentation/security/,
add Documentation/security/00-INDEX, and
update all occurrences of Documentation/
to Documentation/security/.
31 Mar, 2011
1 commit
-
Fixes generated by 'codespell' and manually reviewed.
Signed-off-by: Lucas De Marchi
02 Aug, 2010
1 commit
-
AppArmor policy is loaded in a platform independent flattened binary
stream. Verify and unpack the data converting it to the internal
format needed for enforcement.Signed-off-by: John Johansen
Signed-off-by: James Morris