<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/security/apparmor/include, branch v3.4.84</title>
<subtitle>Linux kernel source tree</subtitle>
<id>https://git.amat.us/linux/atom/security/apparmor/include?h=v3.4.84</id>
<link rel='self' href='https://git.amat.us/linux/atom/security/apparmor/include?h=v3.4.84'/>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/'/>
<updated>2012-04-03T16:48:40Z</updated>
<entry>
<title>LSM: shrink sizeof LSM specific portion of common_audit_data</title>
<updated>2012-04-03T16:48:40Z</updated>
<author>
<name>Eric Paris</name>
<email>eparis@redhat.com</email>
</author>
<published>2012-04-03T16:37:02Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=3b3b0e4fc15efa507b902d90cea39e496a523c3b'/>
<id>urn:sha1:3b3b0e4fc15efa507b902d90cea39e496a523c3b</id>
<content type='text'>
Linus found that the gigantic size of the common audit data caused a big
perf hit on something as simple as running stat() in a loop.  This patch
requires LSMs to declare the LSM specific portion separately rather than
doing it in a union.  Thus each LSM can be responsible for shrinking their
portion and don't have to pay a penalty just because other LSMs have a
bigger space requirement.

Signed-off-by: Eric Paris &lt;eparis@redhat.com&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;
</content>
</entry>
<entry>
<title>AppArmor: add const qualifiers to string arrays</title>
<updated>2012-03-15T02:09:13Z</updated>
<author>
<name>Jan Engelhardt</name>
<email>jengelh@medozas.de</email>
</author>
<published>2012-03-14T12:30:36Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=2d4cee7e3a2b9f9c3237672cc136e20dbad0e2ce'/>
<id>urn:sha1:2d4cee7e3a2b9f9c3237672cc136e20dbad0e2ce</id>
<content type='text'>
Signed-off-by: Jan Engelhardt &lt;jengelh@medozas.de&gt;
Signed-off-by: John Johansen &lt;john.johansen@canonical.com&gt;
</content>
</entry>
<entry>
<title>AppArmor: Add ability to load extended policy</title>
<updated>2012-03-15T02:09:03Z</updated>
<author>
<name>John Johansen</name>
<email>john.johansen@canonical.com</email>
</author>
<published>2012-02-16T15:07:53Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=ad5ff3db53c68c2f12936bc74ea5dfe0af943592'/>
<id>urn:sha1:ad5ff3db53c68c2f12936bc74ea5dfe0af943592</id>
<content type='text'>
Add the base support for the new policy extensions. This does not bring
any additional functionality, or change current semantics.

Signed-off-by: John Johansen &lt;john.johansen@canonical.com&gt;
Acked-by: Kees Cook &lt;kees@ubuntu.com&gt;
</content>
</entry>
<entry>
<title>AppArmor: Move path failure information into aa_get_name and rename</title>
<updated>2012-03-14T13:15:25Z</updated>
<author>
<name>John Johansen</name>
<email>john.johansen@canonical.com</email>
</author>
<published>2012-02-16T14:20:33Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=57fa1e18091e66b7e1002816523cb218196a882e'/>
<id>urn:sha1:57fa1e18091e66b7e1002816523cb218196a882e</id>
<content type='text'>
Move the path name lookup failure messages into the main path name lookup
routine, as the information is useful in more than just aa_path_perm.

Also rename aa_get_name to aa_path_name as it is not getting a reference
counted object with a corresponding put fn.

Signed-off-by: John Johansen &lt;john.johansen@canonical.com&gt;
Acked-by: Kees Cook &lt;kees@ubuntu.com&gt;
</content>
</entry>
<entry>
<title>AppArmor: Update dfa matching routines.</title>
<updated>2012-03-14T13:15:24Z</updated>
<author>
<name>John Johansen</name>
<email>john.johansen@canonical.com</email>
</author>
<published>2012-02-16T14:20:26Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=0fe1212d0539eb6c1e27d388711172d786e299cc'/>
<id>urn:sha1:0fe1212d0539eb6c1e27d388711172d786e299cc</id>
<content type='text'>
Update aa_dfa_match so that it doesn't result in an input string being
walked twice (once to get its length and another time to match)

Add a single step functions
  aa_dfa_next

Signed-off-by: John Johansen &lt;john.johansen@canonical.com&gt;
Acked-by: Kees Cook &lt;kees@ubuntu.com&gt;
</content>
</entry>
<entry>
<title>AppArmor: Fix underflow in xindex calculation</title>
<updated>2012-02-27T19:38:21Z</updated>
<author>
<name>John Johansen</name>
<email>john.johansen@canonical.com</email>
</author>
<published>2012-02-22T08:32:30Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=8b964eae204d791421677ec56b94a7b18cf8740d'/>
<id>urn:sha1:8b964eae204d791421677ec56b94a7b18cf8740d</id>
<content type='text'>
If the xindex value stored in the accept tables is 0, the extraction of
that value will result in an underflow (0 - 4).

In properly compiled policy this should not happen for file rules but
it may be possible for other rule types in the future.

To exploit this underflow a user would have to be able to load a corrupt
policy, which requires CAP_MAC_ADMIN, overwrite system policy in kernel
memory or know of a compiler error resulting in the flaw being present
for loaded policy (no such flaw is known at this time).

Signed-off-by: John Johansen &lt;john.johansen@canonical.com&gt;
Acked-by: Kees Cook &lt;kees@ubuntu.com&gt;
</content>
</entry>
<entry>
<title>AppArmor: Fix dropping of allowed operations that are force audited</title>
<updated>2012-02-27T19:38:21Z</updated>
<author>
<name>John Johansen</name>
<email>john.johansen@canonical.com</email>
</author>
<published>2012-02-22T08:20:26Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=ade3ddc01e2e426cc24c744be85dcaad4e8f8aba'/>
<id>urn:sha1:ade3ddc01e2e426cc24c744be85dcaad4e8f8aba</id>
<content type='text'>
The audit permission flag, that specifies an audit message should be
provided when an operation is allowed, was being ignored in some cases.

This is because the auto audit mode (which determines the audit mode from
system flags) was incorrectly assigned the same value as audit mode. The
shared value would result in messages that should be audited going through
a second evaluation as to whether they should be audited based on the
auto audit, resulting in some messages being dropped.

Signed-off-by: John Johansen &lt;john.johansen@canonical.com&gt;
Acked-by: Kees Cook &lt;kees@ubuntu.com&gt;
</content>
</entry>
<entry>
<title>AppArmor: export known rlimit names/value mappings in securityfs</title>
<updated>2012-02-27T19:38:19Z</updated>
<author>
<name>Kees Cook</name>
<email>kees@ubuntu.com</email>
</author>
<published>2012-01-27T00:29:23Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=d384b0a1a35f87f0ad70c29518f98f922b1c15cb'/>
<id>urn:sha1:d384b0a1a35f87f0ad70c29518f98f922b1c15cb</id>
<content type='text'>
Since the parser needs to know which rlimits are known to the kernel,
export the list via a mask file in the "rlimit" subdirectory in the
securityfs "features" directory.

Signed-off-by: Kees Cook &lt;kees@ubuntu.com&gt;
Signed-off-by: John Johansen &lt;john.johansen@canonical.com&gt;
</content>
</entry>
<entry>
<title>AppArmor: add "file" details to securityfs</title>
<updated>2012-02-27T19:38:18Z</updated>
<author>
<name>Kees Cook</name>
<email>kees@ubuntu.com</email>
</author>
<published>2012-01-27T00:29:22Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=a9bf8e9fd561ba9ff1f0f2a1d96e439fcedaaaa4'/>
<id>urn:sha1:a9bf8e9fd561ba9ff1f0f2a1d96e439fcedaaaa4</id>
<content type='text'>
Create the "file" directory in the securityfs for tracking features
related to files.

Signed-off-by: Kees Cook &lt;kees@ubuntu.com&gt;
Signed-off-by: John Johansen &lt;john.johansen@canonical.com&gt;
</content>
</entry>
<entry>
<title>AppArmor: add initial "features" directory to securityfs</title>
<updated>2012-02-27T19:38:17Z</updated>
<author>
<name>Kees Cook</name>
<email>kees@outflux.net</email>
</author>
<published>2012-01-27T00:29:21Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=e74abcf3359d0130e99a6511ac484a3ea9e6e988'/>
<id>urn:sha1:e74abcf3359d0130e99a6511ac484a3ea9e6e988</id>
<content type='text'>
This adds the "features" subdirectory to the AppArmor securityfs
to display boolean features flags and the known capability mask.

Signed-off-by: Kees Cook &lt;kees@ubuntu.com&gt;
Signed-off-by: John Johansen &lt;john.johansen@canonical.com&gt;
</content>
</entry>
</feed>
