<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/security/apparmor, branch v3.4.81</title>
<subtitle>Linux kernel source tree</subtitle>
<id>https://git.amat.us/linux/atom/security/apparmor?h=v3.4.81</id>
<link rel='self' href='https://git.amat.us/linux/atom/security/apparmor?h=v3.4.81'/>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/'/>
<updated>2012-04-03T16:49:59Z</updated>
<entry>
<title>lsm_audit: don't specify the audit pre/post callbacks in 'struct common_audit_data'</title>
<updated>2012-04-03T16:49:59Z</updated>
<author>
<name>Linus Torvalds</name>
<email>torvalds@linux-foundation.org</email>
</author>
<published>2012-04-02T22:48:12Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=b61c37f57988567c84359645f8202a7c84bc798a'/>
<id>urn:sha1:b61c37f57988567c84359645f8202a7c84bc798a</id>
<content type='text'>
It just bloats the audit data structure for no good reason, since the
only time those fields are filled are just before calling the
common_lsm_audit() function, which is also the only user of those
fields.

So just make them be the arguments to common_lsm_audit(), rather than
bloating that structure that is passed around everywhere, and is
initialized in hot paths.

Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;
</content>
</entry>
<entry>
<title>LSM: shrink sizeof LSM specific portion of common_audit_data</title>
<updated>2012-04-03T16:48:40Z</updated>
<author>
<name>Eric Paris</name>
<email>eparis@redhat.com</email>
</author>
<published>2012-04-03T16:37:02Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=3b3b0e4fc15efa507b902d90cea39e496a523c3b'/>
<id>urn:sha1:3b3b0e4fc15efa507b902d90cea39e496a523c3b</id>
<content type='text'>
Linus found that the gigantic size of the common audit data caused a big
perf hit on something as simple as running stat() in a loop.  This patch
requires LSMs to declare the LSM specific portion separately rather than
doing it in a union.  Thus each LSM can be responsible for shrinking their
portion and don't have to pay a penalty just because other LSMs have a
bigger space requirement.

Signed-off-by: Eric Paris &lt;eparis@redhat.com&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;
</content>
</entry>
<entry>
<title>apparmor: Fix change_onexec when called from a confined task</title>
<updated>2012-03-27T14:00:05Z</updated>
<author>
<name>John Johansen</name>
<email>john.johansen@canonical.com</email>
</author>
<published>2012-03-27T11:14:33Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=0421ea91ddc7895a5a68d3bc670ed4b8e6448a42'/>
<id>urn:sha1:0421ea91ddc7895a5a68d3bc670ed4b8e6448a42</id>
<content type='text'>
Fix failure in aa_change_onexec api when the request is made from a confined
task.  This failure was caused by two problems

 The AA_MAY_ONEXEC perm was not being mapped correctly for this case.

 The executable name was being checked as second time instead of using the
 requested onexec profile name, which may not be the same as the exec
 profile name. This mistake can not be exploited to grant extra permission
 because of the above flaw where the ONEXEC permission was not being mapped
 so it will not be granted.

BugLink: http://bugs.launchpad.net/bugs/963756

Signed-off-by: John Johansen &lt;john.johansen@canonical.com&gt;
Signed-off-by: James Morris &lt;james.l.morris@oracle.com&gt;
</content>
</entry>
<entry>
<title>AppArmor: Fix location of const qualifier on generated string tables</title>
<updated>2012-03-20T01:22:46Z</updated>
<author>
<name>Tetsuo Handa</name>
<email>penguin-kernel@i-love.sakura.ne.jp</email>
</author>
<published>2012-03-15T06:41:17Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=7e570145cb022beeb58e3f691e0418477b670223'/>
<id>urn:sha1:7e570145cb022beeb58e3f691e0418477b670223</id>
<content type='text'>
Signed-off-by: Tetsuo Handa &lt;penguin-kernel@i-love.sakura.ne.jp&gt;
Signed-off-by: John Johansen &lt;john.johansen@canonical.com&gt;
</content>
</entry>
<entry>
<title>AppArmor: add const qualifiers to string arrays</title>
<updated>2012-03-15T02:09:13Z</updated>
<author>
<name>Jan Engelhardt</name>
<email>jengelh@medozas.de</email>
</author>
<published>2012-03-14T12:30:36Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=2d4cee7e3a2b9f9c3237672cc136e20dbad0e2ce'/>
<id>urn:sha1:2d4cee7e3a2b9f9c3237672cc136e20dbad0e2ce</id>
<content type='text'>
Signed-off-by: Jan Engelhardt &lt;jengelh@medozas.de&gt;
Signed-off-by: John Johansen &lt;john.johansen@canonical.com&gt;
</content>
</entry>
<entry>
<title>AppArmor: Add ability to load extended policy</title>
<updated>2012-03-15T02:09:03Z</updated>
<author>
<name>John Johansen</name>
<email>john.johansen@canonical.com</email>
</author>
<published>2012-02-16T15:07:53Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=ad5ff3db53c68c2f12936bc74ea5dfe0af943592'/>
<id>urn:sha1:ad5ff3db53c68c2f12936bc74ea5dfe0af943592</id>
<content type='text'>
Add the base support for the new policy extensions. This does not bring
any additional functionality, or change current semantics.

Signed-off-by: John Johansen &lt;john.johansen@canonical.com&gt;
Acked-by: Kees Cook &lt;kees@ubuntu.com&gt;
</content>
</entry>
<entry>
<title>AppArmor: Move path failure information into aa_get_name and rename</title>
<updated>2012-03-14T13:15:25Z</updated>
<author>
<name>John Johansen</name>
<email>john.johansen@canonical.com</email>
</author>
<published>2012-02-16T14:20:33Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=57fa1e18091e66b7e1002816523cb218196a882e'/>
<id>urn:sha1:57fa1e18091e66b7e1002816523cb218196a882e</id>
<content type='text'>
Move the path name lookup failure messages into the main path name lookup
routine, as the information is useful in more than just aa_path_perm.

Also rename aa_get_name to aa_path_name as it is not getting a reference
counted object with a corresponding put fn.

Signed-off-by: John Johansen &lt;john.johansen@canonical.com&gt;
Acked-by: Kees Cook &lt;kees@ubuntu.com&gt;
</content>
</entry>
<entry>
<title>AppArmor: Update dfa matching routines.</title>
<updated>2012-03-14T13:15:24Z</updated>
<author>
<name>John Johansen</name>
<email>john.johansen@canonical.com</email>
</author>
<published>2012-02-16T14:20:26Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=0fe1212d0539eb6c1e27d388711172d786e299cc'/>
<id>urn:sha1:0fe1212d0539eb6c1e27d388711172d786e299cc</id>
<content type='text'>
Update aa_dfa_match so that it doesn't result in an input string being
walked twice (once to get its length and another time to match)

Add a single step functions
  aa_dfa_next

Signed-off-by: John Johansen &lt;john.johansen@canonical.com&gt;
Acked-by: Kees Cook &lt;kees@ubuntu.com&gt;
</content>
</entry>
<entry>
<title>AppArmor: Minor cleanup of d_namespace_path to consolidate error handling</title>
<updated>2012-03-14T13:15:23Z</updated>
<author>
<name>John Johansen</name>
<email>john.johansen@canonical.com</email>
</author>
<published>2012-02-16T14:32:47Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=3372b68a3c982611dcc30b3c872f8bbdee019e5e'/>
<id>urn:sha1:3372b68a3c982611dcc30b3c872f8bbdee019e5e</id>
<content type='text'>
Signed-off-by: John Johansen &lt;john.johansen@canonical.com&gt;
Acked-by: Kees Cook &lt;kees@ubuntu.com&gt;
</content>
</entry>
<entry>
<title>AppArmor: Retrieve the dentry_path for error reporting when path lookup fails</title>
<updated>2012-03-14T13:15:22Z</updated>
<author>
<name>John Johansen</name>
<email>john.johansen@canonical.com</email>
</author>
<published>2012-02-16T14:28:50Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=fbba8d89acea5d628d1d076b1d8962db438ff832'/>
<id>urn:sha1:fbba8d89acea5d628d1d076b1d8962db438ff832</id>
<content type='text'>
When __d_path and d_absolute_path fail due to the name being outside of
the current namespace no name is reported.  Use dentry_path to provide
some hint as to which file was being accessed.

Signed-off-by: John Johansen &lt;john.johansen@canonical.com&gt;
Acked-by: Kees Cook &lt;kees@ubuntu.com&gt;
</content>
</entry>
</feed>
