~sforshee/ubuntu/+source/linux/+git/disco:lsm-stacking

Last commit made on 2019-01-28
Get this branch:
git clone -b lsm-stacking https://git.launchpad.net/~sforshee/ubuntu/+source/linux/+git/disco
Only Seth Forshee can upload to this branch. If you are Seth Forshee please log in for upload directions.

Branch merges

Branch information

Name:
lsm-stacking
Repository:
lp:~sforshee/ubuntu/+source/linux/+git/disco

Recent commits

6e6bb68... by Seth Forshee

UBUNTU: [Config] update configs for LSM stacking update

Signed-off-by: Seth Forshee <email address hidden>

b6213c7... by Casey Schaufler

LSM: Correct handling of ENOSYS in inode_setxattr

The usual "bail on fail" behavior of LSM hooks doesn't
work for security_inode_setxattr(). Modules are allowed
to return -ENOSYS if the attribute specifed isn't one
they manage. Fix the code to accomodate this unusal case.
This requires changes to the hooks in SELinux and Smack.

Signed-off-by: Casey Schaufler <email address hidden>
Signed-off-by: John Johansen <email address hidden>
Signed-off-by: Seth Forshee <email address hidden>

c324c15... by Casey Schaufler

LSM: Use full security context in security_inode_setsecctx

The security hooks security_inode_setsecctx and security_inode_getsecctx
need to maintain the context strings for any and all LSMs that
provide contexts. This information is internal to the kernel
and volitile. If only one LSM uses this information the raw form is
used.

Signed-off-by: Casey Schaufler <email address hidden>
Signed-off-by: John Johansen <email address hidden>
Signed-off-by: Seth Forshee <email address hidden>

1885d25... by Casey Schaufler

LSM: Support multiple LSMs using inode_init_security

Refactor security_inode_init_security() so that it can
do the integrity processing for more than one LSM.

Signed-off-by: Casey Schaufler <email address hidden>
Signed-off-by: John Johansen <email address hidden>
Signed-off-by: Seth Forshee <email address hidden>

ab67421... by Casey Schaufler

LSM: Do not treat unknown mount options as an error in LSMs

SELinux and Smack handle their own mount options. If an unknown
option is encountered it is treated as an error. Remove this
behavior as it interfers with mounting a filesystem with options
when both SELinux and Smack are enabled.

Signed-off-by: Casey Schaufler <email address hidden>
Signed-off-by: John Johansen <email address hidden>
[ saf: resolve conflicts with 4.19 ]
Signed-off-by: Seth Forshee <email address hidden>

ff4a3ec... by Casey Schaufler

Smack: Detect if secmarks can be safely used

Utilize the security_secmark_refcount_in() hooks to determine
if Smack can safely assume that IP secmarks are not being used
by another LSM. Only use secmarks if they can be determined to
belong to Smack.

Signed-off-by: Casey Schaufler <email address hidden>
Signed-off-by: John Johansen <email address hidden>
Signed-off-by: Seth Forshee <email address hidden>

98c3731... by Casey Schaufler

LSM: refactor security_setprocattr

Break the common code for setting the lsm_one hooks into
helper function.

Signed-off-by: Casey Schaufler <email address hidden>
Signed-off-by: John Johansen <email address hidden>
Signed-off-by: Seth Forshee <email address hidden>

a1ad0b0... by Casey Schaufler

LSM: Add secmark refcounting to call_one list - part 2

Add secmark_refcount_dec and secmark_refcount_inc to the
LSM hooks for which only the designated module is called.

Signed-off-by: Casey Schaufler <email address hidden>
Signed-off-by: John Johansen <email address hidden>
Signed-off-by: Seth Forshee <email address hidden>

1127b7a... by Casey Schaufler

LSM: Add secmark refcounting to call_one list

Add secmark_refcount_dec and secmark_refcount_inc to the
LSM hooks for which only the designated module is called.
This is in support of consistant secmark behavior.

Signed-off-by: Casey Schaufler <email address hidden>
Signed-off-by: John Johansen <email address hidden>
Signed-off-by: Seth Forshee <email address hidden>

dd43e97... by Casey Schaufler

netfilter: Remove unnecessary NULL check in lsm_context

There is a redundant NULL check when releasing a security context.
Remove it.

Signed-off-by: Casey Schaufler <email address hidden>
Signed-off-by: John Johansen <email address hidden>
Signed-off-by: Seth Forshee <email address hidden>