<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/security/smack, branch v3.8.2</title>
<subtitle>Linux kernel source tree</subtitle>
<id>https://git.amat.us/linux/atom/security/smack?h=v3.8.2</id>
<link rel='self' href='https://git.amat.us/linux/atom/security/smack?h=v3.8.2'/>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/'/>
<updated>2012-12-16T23:40:50Z</updated>
<entry>
<title>Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security</title>
<updated>2012-12-16T23:40:50Z</updated>
<author>
<name>Linus Torvalds</name>
<email>torvalds@linux-foundation.org</email>
</author>
<published>2012-12-16T23:40:50Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=2a74dbb9a86e8102dcd07d284135b4530a84826e'/>
<id>urn:sha1:2a74dbb9a86e8102dcd07d284135b4530a84826e</id>
<content type='text'>
Pull security subsystem updates from James Morris:
 "A quiet cycle for the security subsystem with just a few maintenance
  updates."

* 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security:
  Smack: create a sysfs mount point for smackfs
  Smack: use select not depends in Kconfig
  Yama: remove locking from delete path
  Yama: add RCU to drop read locking
  drivers/char/tpm: remove tasklet and cleanup
  KEYS: Use keyring_alloc() to create special keyrings
  KEYS: Reduce initial permissions on keys
  KEYS: Make the session and process keyrings per-thread
  seccomp: Make syscall skipping and nr changes more consistent
  key: Fix resource leak
  keys: Fix unreachable code
  KEYS: Add payload preparsing opportunity prior to key instantiate or update
</content>
</entry>
<entry>
<title>Smack: create a sysfs mount point for smackfs</title>
<updated>2012-12-14T18:57:23Z</updated>
<author>
<name>Casey Schaufler</name>
<email>casey@schaufler-ca.com</email>
</author>
<published>2012-11-02T01:14:32Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=e93072374112db9dc86635934ee761249be28370'/>
<id>urn:sha1:e93072374112db9dc86635934ee761249be28370</id>
<content type='text'>
There are a number of "conventions" for where to put LSM filesystems.
Smack adheres to none of them. Create a mount point at /sys/fs/smackfs
for mounting smackfs so that Smack can be conventional.

Targeted for git://git.gitorious.org/smack-next/kernel.git

Signed-off-by: Casey Schaufler &lt;casey@schaufler-ca.com&gt;
</content>
</entry>
<entry>
<title>Smack: use select not depends in Kconfig</title>
<updated>2012-12-14T18:57:10Z</updated>
<author>
<name>Casey Schaufler</name>
<email>casey@schaufler-ca.com</email>
</author>
<published>2012-11-02T18:28:11Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=111fe8bd65e473d5fc6a0478cf1e2c8c6a77489a'/>
<id>urn:sha1:111fe8bd65e473d5fc6a0478cf1e2c8c6a77489a</id>
<content type='text'>
The components NETLABEL and SECURITY_NETWORK are required by
Smack. Using "depends" in Kconfig hides the Smack option
if the user hasn't figured out that they need to be enabled
while using make menuconfig. Using select is a better choice.
Because select is not recursive depends on NET and SECURITY
are added. The reflects similar usage in TOMOYO and AppArmor.

Targeted for git://git.gitorious.org/smack-next/kernel.git

Signed-off-by: Casey Schaufler &lt;casey@schaufler-ca.com&gt;
</content>
</entry>
<entry>
<title>consitify do_mount() arguments</title>
<updated>2012-10-12T00:02:04Z</updated>
<author>
<name>Al Viro</name>
<email>viro@zeniv.linux.org.uk</email>
</author>
<published>2012-10-11T15:42:01Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=808d4e3cfdcc52b19276175464f6dbca4df13b09'/>
<id>urn:sha1:808d4e3cfdcc52b19276175464f6dbca4df13b09</id>
<content type='text'>
Signed-off-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
</content>
</entry>
<entry>
<title>Smack: setprocattr memory leak fix</title>
<updated>2012-09-18T16:51:06Z</updated>
<author>
<name>Casey Schaufler</name>
<email>casey@schaufler-ca.com</email>
</author>
<published>2012-08-22T18:44:03Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=46a2f3b9e99353cc63e15563e8abee71162330f7'/>
<id>urn:sha1:46a2f3b9e99353cc63e15563e8abee71162330f7</id>
<content type='text'>
The data structure allocations being done in prepare_creds
are duplicated in smack_setprocattr. This results in the
structure allocated in prepare_creds being orphaned and
never freed. The duplicate code is removed from
smack_setprocattr.

Targeted for git://git.gitorious.org/smack-next/kernel.git

Signed-off-by: Casey Schaufler &lt;casey@schaufler-ca.com&gt;
</content>
</entry>
<entry>
<title>Smack: implement revoking all rules for a subject label</title>
<updated>2012-09-18T16:50:52Z</updated>
<author>
<name>Rafal Krypa</name>
<email>r.krypa@samsung.com</email>
</author>
<published>2012-07-11T15:49:30Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=449543b0436a9146b855aad39eab76ae4853e88d'/>
<id>urn:sha1:449543b0436a9146b855aad39eab76ae4853e88d</id>
<content type='text'>
Add /smack/revoke-subject special file. Writing a SMACK label to this file will
set the access to '-' for all access rules with that subject label.

Targeted for git://git.gitorious.org/smack-next/kernel.git

Signed-off-by: Rafal Krypa &lt;r.krypa@samsung.com&gt;
</content>
</entry>
<entry>
<title>Smack: remove task_wait() hook.</title>
<updated>2012-09-18T16:50:37Z</updated>
<author>
<name>Casey Schaufler</name>
<email>casey@schaufler-ca.com</email>
</author>
<published>2012-08-10T00:46:38Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=c00bedb368ae02a066aed8a888afc286c1df2e60'/>
<id>urn:sha1:c00bedb368ae02a066aed8a888afc286c1df2e60</id>
<content type='text'>
On 12/20/2011 11:20 PM, Jarkko Sakkinen wrote:
&gt; Allow SIGCHLD to be passed to child process without
&gt; explicit policy. This will help to keep the access
&gt; control policy simple and easily maintainable with
&gt; complex applications that require use of multiple
&gt; security contexts. It will also help to keep them
&gt; as isolated as possible.
&gt;
&gt; Signed-off-by: Jarkko Sakkinen &lt;jarkko.sakkinen@intel.com&gt;

I have a slightly different version that applies to the
current smack-next tree.

Allow SIGCHLD to be passed to child process without
explicit policy. This will help to keep the access
control policy simple and easily maintainable with
complex applications that require use of multiple
security contexts. It will also help to keep them
as isolated as possible.

Signed-off-by: Casey Schaufler &lt;casey@schaufler-ca.com&gt;

 security/smack/smack_lsm.c |   37 ++++++++-----------------------------
 1 files changed, 8 insertions(+), 29 deletions(-)
</content>
</entry>
<entry>
<title>smack: off by one error</title>
<updated>2012-07-30T05:04:17Z</updated>
<author>
<name>Alan Cox</name>
<email>alan@linux.intel.com</email>
</author>
<published>2012-07-26T21:47:11Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=3b9fc37280c521b086943f9aedda767f5bf3b2d3'/>
<id>urn:sha1:3b9fc37280c521b086943f9aedda767f5bf3b2d3</id>
<content type='text'>
Consider the input case of a rule that consists entirely of non space
symbols followed by a \0. Say 64 + \0

In this case strlen(data) = 64
kzalloc of subject and object are 64 byte objects
sscanfdata, "%s %s %s", subject, ...)

will put 65 bytes into subject.

Signed-off-by: Alan Cox &lt;alan@linux.intel.com&gt;
Acked-by: Casey Schaufler &lt;casey@schaufler-ca.com&gt;
Cc: stable@vger.kernel.org
Signed-off-by: James Morris &lt;james.l.morris@oracle.com&gt;
</content>
</entry>
<entry>
<title>Smack: don't show empty rules when /smack/load or /smack/load2 is read</title>
<updated>2012-07-13T22:49:24Z</updated>
<author>
<name>Rafal Krypa</name>
<email>r.krypa@samsung.com</email>
</author>
<published>2012-07-09T17:36:34Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=65ee7f45cf075adcdd6b6ef365f5a5507f1ea5c5'/>
<id>urn:sha1:65ee7f45cf075adcdd6b6ef365f5a5507f1ea5c5</id>
<content type='text'>
This patch removes empty rules (i.e. with access set to '-') from the
rule list presented to user space.

Smack by design never removes labels nor rules from its lists. Access
for a rule may be set to '-' to effectively disable it. Such rules would
show up in the listing generated when /smack/load or /smack/load2 is
read. This may cause clutter if many rules were disabled.

As a rule with access set to '-' is equivalent to no rule at all, they
may be safely hidden from the listing.

Targeted for git://git.gitorious.org/smack-next/kernel.git

Signed-off-by: Rafal Krypa &lt;r.krypa@samsung.com&gt;
Signed-off-by: Casey Schaufler &lt;casey@schaufler-ca.com&gt;
</content>
</entry>
<entry>
<title>Smack: user access check bounds</title>
<updated>2012-07-13T22:49:24Z</updated>
<author>
<name>Casey Schaufler</name>
<email>casey@schaufler-ca.com</email>
</author>
<published>2012-06-19T02:01:36Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=3518721a8932b2a243f415c374aef020380efc9d'/>
<id>urn:sha1:3518721a8932b2a243f415c374aef020380efc9d</id>
<content type='text'>
Some of the bounds checking used on the /smack/access
interface was lost when support for long labels was
added. No kernel access checks are affected, however
this is a case where /smack/access could be used
incorrectly and fail to detect the error. This patch
reintroduces the original checks.

Targeted for git://git.gitorious.org/smack-next/kernel.git

Signed-off-by: Casey Schaufler &lt;casey@schaufler-ca.com&gt;
</content>
</entry>
</feed>
