<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/security, branch v2.6.18</title>
<subtitle>Linux kernel source tree</subtitle>
<id>https://git.amat.us/linux/atom/security?h=v2.6.18</id>
<link rel='self' href='https://git.amat.us/linux/atom/security?h=v2.6.18'/>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/'/>
<updated>2006-08-02T21:12:06Z</updated>
<entry>
<title>[AF_UNIX]: Kernel memory leak fix for af_unix datagram getpeersec patch</title>
<updated>2006-08-02T21:12:06Z</updated>
<author>
<name>Catherine Zhang</name>
<email>cxzhang@watson.ibm.com</email>
</author>
<published>2006-08-02T21:12:06Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=dc49c1f94e3469d94b952e8f5160dd4ccd791d79'/>
<id>urn:sha1:dc49c1f94e3469d94b952e8f5160dd4ccd791d79</id>
<content type='text'>
From: Catherine Zhang &lt;cxzhang@watson.ibm.com&gt;

This patch implements a cleaner fix for the memory leak problem of the
original unix datagram getpeersec patch.  Instead of creating a
security context each time a unix datagram is sent, we only create the
security context when the receiver requests it.

This new design requires modification of the current
unix_getsecpeer_dgram LSM hook and addition of two new hooks, namely,
secid_to_secctx and release_secctx.  The former retrieves the security
context and the latter releases it.  A hook is required for releasing
the security context because it is up to the security module to decide
how that's done.  In the case of Selinux, it's a simple kfree
operation.

Acked-by:  Stephen Smalley &lt;sds@tycho.nsa.gov&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[PATCH] selinux: fix bug in security_compute_sid</title>
<updated>2006-07-31T20:28:38Z</updated>
<author>
<name>Venkat Yekkirala</name>
<email>vyekkirala@trustedcs.com</email>
</author>
<published>2006-07-30T10:03:18Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=851f8a6906b71f7a19043d4d722dd4ffab7aeafc'/>
<id>urn:sha1:851f8a6906b71f7a19043d4d722dd4ffab7aeafc</id>
<content type='text'>
Initializes newcontext sooner to allow for its destruction in all cases.

Signed-off-by: Venkat Yekkirala &lt;vyekkirala@TrustedCS.com&gt;
Signed-off-by: Stephen Smalley &lt;sds@tycho.nsa.gov&gt;
Acked-by: James Morris &lt;jmorris@namei.org&gt;
Signed-off-by: Andrew Morton &lt;akpm@osdl.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
</content>
</entry>
<entry>
<title>[PATCH] selinux: fix memory leak</title>
<updated>2006-07-31T20:28:37Z</updated>
<author>
<name>Darrel Goeddel</name>
<email>dgoeddel@TrustedCS.com</email>
</author>
<published>2006-07-30T10:03:17Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=ddccef3b5ec906ff181171e8ffad4fcb996792fd'/>
<id>urn:sha1:ddccef3b5ec906ff181171e8ffad4fcb996792fd</id>
<content type='text'>
This patch fixes a memory leak when a policydb structure is destroyed.

Signed-off-by: Darrel Goeddel &lt;dgoeddel@trustedcs.com&gt;
Signed-off-by: Stephen Smalley &lt;sds@tycho.nsa.gov&gt;
Acked-by: James Morris &lt;jmorris@namei.org&gt;
Signed-off-by: Andrew Morton &lt;akpm@osdl.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
</content>
</entry>
<entry>
<title>[PATCH] Fix security check for joint context= and fscontext= mount options</title>
<updated>2006-07-15T04:53:55Z</updated>
<author>
<name>Eric Paris</name>
<email>eparis@parisplace.org</email>
</author>
<published>2006-07-14T07:24:33Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=b04ea3cebf79d6808632808072f276dbc98aaf01'/>
<id>urn:sha1:b04ea3cebf79d6808632808072f276dbc98aaf01</id>
<content type='text'>
After some discussion on the actual meaning of the filesystem class
security check in try context mount it was determined that the checks for
the context= mount options were not correct if fscontext mount option had
already been used.

When labeling the superblock we should be checking relabel_from and
relabel_to.  But if the superblock has already been labeled (with
fscontext) then context= is actually labeling the inodes, and so we should
be checking relabel_from and associate.  This patch fixes which checks are
called depending on the mount options.

Signed-off-by: Eric Paris &lt;eparis@redhat.com&gt;
Acked-by: Stephen Smalley &lt;sds@tycho.nsa.gov&gt;
Acked-by: James Morris &lt;jmorris@namei.org&gt;
Cc: Chris Wright &lt;chrisw@sous-sol.org&gt;
Signed-off-by: Andrew Morton &lt;akpm@osdl.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
</content>
</entry>
<entry>
<title>[PATCH] SELinux: add rootcontext= option to label root inode when mounting</title>
<updated>2006-07-10T20:24:13Z</updated>
<author>
<name>Eric Paris</name>
<email>eparis@parisplace.org</email>
</author>
<published>2006-07-10T11:43:55Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=0808925ea5684a0ce25483b30e94d4f398804978'/>
<id>urn:sha1:0808925ea5684a0ce25483b30e94d4f398804978</id>
<content type='text'>
Introduce a new rootcontext= option to FS mounting.  This option will allow
you to explicitly label the root inode of an FS being mounted before that
FS or inode because visible to userspace.  This was found to be useful for
things like stateless linux, see
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=190001

Signed-off-by: Eric Paris &lt;eparis@parisplace.org&gt;
Acked-by: Stephen Smalley &lt;sds@tycho.nsa.gov&gt;
Signed-off-by: James Morris &lt;jmorris@namei.org&gt;
Signed-off-by: Andrew Morton &lt;akpm@osdl.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
</content>
</entry>
<entry>
<title>[PATCH] SELinux: decouple fscontext/context mount options</title>
<updated>2006-07-10T20:24:13Z</updated>
<author>
<name>Eric Paris</name>
<email>eparis@parisplace.org</email>
</author>
<published>2006-07-10T11:43:53Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=c312feb2931ded0582378712727b7ea017a951bd'/>
<id>urn:sha1:c312feb2931ded0582378712727b7ea017a951bd</id>
<content type='text'>
Remove the conflict between fscontext and context mount options.  If
context= is specified without fscontext it will operate just as before, if
both are specified we will use mount point labeling and all inodes will get
the label specified by context=.  The superblock will be labeled with the
label of fscontext=, thus affecting operations which check the superblock
security context, such as associate permissions.

Signed-off-by: Eric Paris &lt;eparis@parisplace.org&gt;
Acked-by: Stephen Smalley &lt;sds@tycho.nsa.gov&gt;
Signed-off-by: James Morris &lt;jmorris@namei.org&gt;
Signed-off-by: Andrew Morton &lt;akpm@osdl.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
</content>
</entry>
<entry>
<title>[PATCH] audit: support for object context filters</title>
<updated>2006-07-01T09:44:19Z</updated>
<author>
<name>Darrel Goeddel</name>
<email>dgoeddel@trustedcs.com</email>
</author>
<published>2006-06-29T21:57:08Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=6e5a2d1d32596850a0ebf7fb3e54c0d69901dabd'/>
<id>urn:sha1:6e5a2d1d32596850a0ebf7fb3e54c0d69901dabd</id>
<content type='text'>
This patch introduces object audit filters based on the elements
of the SELinux context.

Signed-off-by: Darrel Goeddel &lt;dgoeddel@trustedcs.com&gt;
Acked-by:  Stephen Smalley &lt;sds@tycho.nsa.gov&gt;

 kernel/auditfilter.c           |   25 +++++++++++++++++++++++++
 kernel/auditsc.c               |   40 ++++++++++++++++++++++++++++++++++++++++
 security/selinux/ss/services.c |   18 +++++++++++++++++-
 3 files changed, 82 insertions(+), 1 deletion(-)
Signed-off-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
</content>
</entry>
<entry>
<title>[PATCH] audit: rename AUDIT_SE_* constants</title>
<updated>2006-07-01T09:44:08Z</updated>
<author>
<name>Darrel Goeddel</name>
<email>dgoeddel@trustedcs.com</email>
</author>
<published>2006-06-29T21:56:39Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=3a6b9f85c641a3b89420b0c8150ed377526a1fe1'/>
<id>urn:sha1:3a6b9f85c641a3b89420b0c8150ed377526a1fe1</id>
<content type='text'>
This patch renames some audit constant definitions and adds
additional definitions used by the following patch.  The renaming
avoids ambiguity with respect to the new definitions.

Signed-off-by: Darrel Goeddel &lt;dgoeddel@trustedcs.com&gt;

 include/linux/audit.h          |   15 ++++++++----
 kernel/auditfilter.c           |   50 ++++++++++++++++++++---------------------
 kernel/auditsc.c               |   10 ++++----
 security/selinux/ss/services.c |   32 +++++++++++++-------------
 4 files changed, 56 insertions(+), 51 deletions(-)
Signed-off-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
</content>
</entry>
<entry>
<title>Merge git://git.kernel.org/pub/scm/linux/kernel/git/bunk/trivial</title>
<updated>2006-06-30T22:39:30Z</updated>
<author>
<name>Linus Torvalds</name>
<email>torvalds@g5.osdl.org</email>
</author>
<published>2006-06-30T22:39:30Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=22a3e233ca08a2ddc949ba1ae8f6e16ec7ef1a13'/>
<id>urn:sha1:22a3e233ca08a2ddc949ba1ae8f6e16ec7ef1a13</id>
<content type='text'>
* git://git.kernel.org/pub/scm/linux/kernel/git/bunk/trivial:
  Remove obsolete #include &lt;linux/config.h&gt;
  remove obsolete swsusp_encrypt
  arch/arm26/Kconfig typos
  Documentation/IPMI typos
  Kconfig: Typos in net/sched/Kconfig
  v9fs: do not include linux/version.h
  Documentation/DocBook/mtdnand.tmpl: typo fixes
  typo fixes: specfic -&gt; specific
  typo fixes in Documentation/networking/pktgen.txt
  typo fixes: occuring -&gt; occurring
  typo fixes: infomation -&gt; information
  typo fixes: disadvantadge -&gt; disadvantage
  typo fixes: aquire -&gt; acquire
  typo fixes: mecanism -&gt; mechanism
  typo fixes: bandwith -&gt; bandwidth
  fix a typo in the RTC_CLASS help text
  smb is no longer maintained

Manually merged trivial conflict in arch/um/kernel/vmlinux.lds.S
</content>
</entry>
<entry>
<title>[PATCH] SELinux: Add security hook definition for getioprio and insert hooks</title>
<updated>2006-06-30T18:25:37Z</updated>
<author>
<name>David Quigley</name>
<email>dpquigl@tycho.nsa.gov</email>
</author>
<published>2006-06-30T08:55:49Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=a1836a42daf5ddfe9a891973734bd9a7d62eb504'/>
<id>urn:sha1:a1836a42daf5ddfe9a891973734bd9a7d62eb504</id>
<content type='text'>
Add a new security hook definition for the sys_ioprio_get operation.  At
present, the SELinux hook function implementation for this hook is
identical to the getscheduler implementation but a separate hook is
introduced to allow this check to be specialized in the future if
necessary.

This patch also creates a helper function get_task_ioprio which handles the
access check in addition to retrieving the ioprio value for the task.

Signed-off-by: David Quigley &lt;dpquigl@tycho.nsa.gov&gt;
Acked-by: Stephen Smalley &lt;sds@tycho.nsa.gov&gt;
Signed-off-by: James Morris &lt;jmorris@namei.org&gt;
Cc: Jens Axboe &lt;axboe@suse.de&gt;
Signed-off-by: Andrew Morton &lt;akpm@osdl.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
</content>
</entry>
</feed>
